Acceptable use policy

This policy governs Voxell, Simplx and Jessica Sutherland Design services (our, us, we, Jessica Sutherland Design, Voxell, Simplx). All users of such services agree to be bound by the acceptable use policy (AUP) during the operation of live services on our network.

Prohibited content

To summarise: content that promotes malicious or harmful activity, content enabling dishonest or illegal behaviour, content promoting hate based upon identity or content promoting solutions that can interfere with dexterity or negatively influence health are not allowed on our networks. Read on below for more specific information about content restrictions:

The following content is prohibited from our network:

  • Counterfeit goods
  • Dangerous products or services

Gun parts and associated items that increase the safety of a gun are allowed on our network.

Functional devices that appear to discharge a projectile at high velocity, whether for sport, self-defence or combat; any part or component, whether finished or unfinished, that’s essential to or enhances the functionality of a gun; instructions on the assembly or enhancement of the functionality of firearms; knives that are designed or promoted (in modern-day usage) as products that can be used to injure an opponent in sport, self-defence or combat; any other product that’s designed to (in modern-day usage) injure an opponent in sport, self-defence or combat and instructional content about the assembly, enhancement, or acquisition of any product listed under this policy is not allowed on our network.

Substances that alter mental state for the purpose of recreation or otherwise induce “highs”; products or services marketed as facilitating recreational drug use and instructional content about producing, purchasing or using recreational drugs are not allowed on our network.

Tobacco products or any product containing tobacco are not allowed on our network. This also includes components of a tobacco product, products that facilitate or promote tobacco consumption, products designed to stimulate tobacco smoking and products with an overall association with tobacco.

  • Enabling dishonest behaviour
  • Inappropriate content
  • Products enabling illegal behaviour
  • Violent, vulgar or offensive content; including but not limited to gender, sexual orientation, disability, ethnicity, religion, age, preferred operating system, programming language, or text editor.
  • Systems where failure of the services could lead to death, personal injury or environmental damage., including but not limited to operation of nuclear facilities, air traffic control and life support systems. 

The following content is subject to restrictions:

  • Adult content

Text, image, audio, or video of graphic sexual acts intended to arouse; Content that is made to appear appropriate for a family audience but contains adult themes, including sex, violence, vulgarity or other depictions of children or popular children’s characters, that are unsuitable for a general audience;  Content promoting underage, non-consensual or other illegal sexual themes, whether simulated or real and Content that may be interpreted as promoting a sexual act in exchange for compensation is not allowed on our networks. Exceptions apply to some of the above restrictions (see below).

Promotion of dating when motivated by sexual encounters; People or representations of people that display sexual body parts; Promotion of sex-related entertainment, including location-specific entertainment; Promotion or sale of merchandise that’s intended to enhance sexual activity; Content containing sexually suggestive text, images, audio or video; Content containing sexually suggestive poses and Plastic surgery services focused on genitalia or breast augmentation are allowed under certain conditions.

Pornography (Text, image, audio, or video of graphic sexual acts intended to arouse) that dosent violate any of the above not allowed content and does not contain CSAM or non-consensual pornography are allowed on our network if the website is exclusively dedicated to sharing pornography. This must be discussed with an account supervisor prior to opening an account as additional safeguards are needed.

  • Alcohol

The sale of alcohol and alcohol information are allowed on our networks.

The promotion of drinking to individuals below the legal drinking age in any country you want your website to be visited in, implying that drinking alcohol can improve social, sexual, professional, intellectual or athletic standing, implying that drinking alcohol provides health or therapeutic benefits, portraying excessive drinking favourably or featuring binge or competition drinking and showing alcohol consumption in conjunction with the operation of a vehicle of any kind, the operation of machinery, or the performance of any task requiring alertness or dexterity is not allowed on our networks.

  • Gambling and games
  • Copyrights
  • Healthcare and medicines
  • Political content
  • Election content
  • Trademarks
  • Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) compliant businesses

Further information regarding restrictions is coming shortly. For now, please contact us.

Unacceptable content

Unacceptable content or links include:

  • Pirated software and Warez sites
  • Content prohibited by law

Unacceptable content is ground for immediate investigation following restriction, suspension or termination of the client’s account.

Unwanted software

We take claims or unwanted software distribution seriously. Our networks should not be used to distribute malware, viruses or other unwanted software.

Software distributed via our network must be able to be easily removed through the user’s operating system, not download additional software beyond what is initially installed without consent, impair usability of the system, circumvent anti-virus or protection measures or redirect network traffic.

Software distributed via our network should not exhibit the following behaviours (included but not limited to):

  • It is deceptive, promising a value proposition that it does not meet.
  • It tries to trick users into installing it or piggybacks on the installation of another program.
  • It doesn’t tell the user about all of its principal and significant functions.
  • It affects the user’s system in unexpected ways.
  • It is difficult to remove.
  • It collects or transmits private information without the user’s knowledge.
  • It is bundled with other software and its presence is not disclosed.

Data protection

We require all customers of our infrastructure to be compliant with relevant privacy legislation that they are subject to. Jessica Sutherland Design offers services to assist our customers with legal compliance.


We take a zero tolerance approach to the sending of unsolicited email or spam over our network. We do not permit the use of our infrastructure to transact unsolicited spam emails, messages or notifications. Violations of this policy are ground for immediate investigation following restriction, suspension or termination of the client’s account. We reserve the right to pursue remedies for any costs associated with the investigation of a policy violation.

We require all email marketing communication from our customers to be compliant with the CAN-SPAM Act. Personal and consensual, non-marketing communications are exempt from this requirement.


Customers of our network found to be exhibiting unacceptable behavior or harassment will be subject to immediate investigation following restriction, suspension or termination of the client’s account. We reserve the right to pursue remedies for any costs associated with the investigation of a policy violation.

Unacceptable behaviors include: intimidating, harassing, abusive, discriminatory, derogatory or demeaning conduct by any users of our network.

Harassment includes: offensive verbal comments related to gender, sexual orientation, race, religion, disability, age; inappropriate use of nudity and/or sexual images in public spaces; deliberate intimidation, stalking or following; harassing photography or recording; sustained disruption of talks or other events; inappropriate physical contact, and unwelcome sexual attention.

All claims of harassment will be kept anonymous.

Child sexual abuse material (CSAM) or child sexual abuse imagery content (CSAI)

Responding to incidents of Child sexual abuse material (CSAM) or child sexual abuse imagery content (CSAI) is a top priority for us. We do not tolerate CSAM content. It is a crime, and we will report it to relevant law enforcement authorities as a part of our action.

If a website/customer of our network is clearly dedicated to sharing CSAM or if the operators of the website fail to take appropriate steps to take down or moderate CSAM content, we will terminate the service without warning or refund.

All services that we can control that make use of Cloudflare infrastructure must have the CSAM Scanning Tool enabled, which allows website owners to proactively identify and take action on CSAM located on their websites. This service will alert website owners and the National Center for Missing and Exploited Children (NCMEC) of your cached image files that match known CSAM hashes. Additionally, this tool will attempt to proactively block material that is identified by this tool.

End-to-end (E2E) encryption for users under 18 years old

We require that services hosted using our networks DO NOT implement E2E encryption for user accounts held by those who have indicated they are under the age of 18 years old.

Our process for taking down CSAM/CSAI

  1. A confidential report is filed with our abuse department
  2. “Child Pornography” category is selected
  3. Request goes into our urgent queue for examination
  4. Our Trust & Safety officer files a report with the Australian Centre to Counter Child Exploitation and the Australian Federal Police (AFP) and/or local law enforcement authorities.
  5. We notify the website owner/customer of the report.
  6. The malicious content is either removed or ordered to be removed. If the content is not promptly removed, we will restrict access to the website and limit the customer’s access to our network.
  7. We notify our down-stream hosting providers’s abuse departments.
  8. The reporter receives a redacted report showing our actions.

Scripts policy

Disallowed scripts include:

  • Shell, SSH, Telnet Scripts and Shell, SSH, Telnet Alternatives
  • Any script that processes a massive number of flat files or large flat file databases.
  • Any script that requires a “register_globals = on” directive.
  • Any script that facilitates the exploitation of our servers in any way

Any script installed on our servers must at all times be kept up to date by the Client with the latest stable version available from the supplier or developer of the application.

In the case of the Client allowing a script with a reported exploit or vulnerability to remain installed on a server, they will be subject to immediate investigation following restriction, suspension or termination of the client’s account. 


Customer is solely responsible for the content it uploads to its website in connection with the services provided by us. We do not review or screen the content in our Customer’s websites and do not assume any obligation to monitor such content. However, Customer agrees that we may review all hosted websites or other content in response to a third party complaint or for any other reason.

Transparency report

We may receive requests from government, law enforcement agencies or the eSafety Commissioner for private information about our users or to take down content. We will endeavour to push back on any requests we view as overbroad or are unnecessarily invasive of privacy, and only respond to requests compiled with proper evidence. Requests may be expedited if evidence is displayed of a potential to commit harm by a user.

Our policy is that users subject to requests from law enforcement or government will be notified, and we will publish a transparency report of rejected and compliant complaints on an annual basis if any complaints are made.

Report abuse

To report abuse, please get in touch with [email protected]. You can also file a ticket on our legal desk.

If you wish to report anonymously, use our ProtonMail address from another ProtonMail account:

[email protected].

We offer other modes of reporting, including by PGP encrypted email or Onion service connection. Contact us to learn more.

Law-enforcement / government / E-safety Commissioner contact

To contact us on behalf of as a member of law-enforcement / government / E-safety Commissioner contact, please get in touch with [email protected]. You can also request a mailing address from there. We require the use of registered mail.

Legal contact for private companies

To contact us regarding a legal complaint from a private company, please get in touch with [email protected]. You can also file a ticket on our legal desk.

Policy formatting

The formatting and headings of this policy should not be used to interpret its contents.

Policy modifications

This policy is a living document. Jessica Sutherland Design reserves the right to update this document effective immediately and will endeavour to notify all affected parties. You can see when this policy was last updated with the Google Docs ‘Last updated’ tool which is visible at the top of the screen.


We welcome your feedback.

Phone: +61 402 188 961

E-mail: [email protected]

We try to respond to feedback within 5 business days.