By using Govaio Network services, you agree to our terms, policies, and acceptable use rules. Services may be modified or terminated for violations.
Effective Date: 26/01/2026.
To ensure abuse complaints are:
Handled quickly and professionally
Investigated fairly
Resolved with minimum service disruption
Fully compliant with legal, upstream, and policy obligations
This SOP applies to all abuse reports involving:
Spam
Malware
Phishing
Copyright infringement (DMCA)
Network abuse (DDoS, scanning)
Illegal content
Resource abuse
Abuse reports may arrive via:
Data center / upstream provider
Automated monitoring systems
Law enforcement agencies
All abuse tickets must be created in the ticketing system immediately.
Examples:
Malware distribution
Phishing
Spam campaigns
Child sexual abuse material (CSAM)
Active hacking or botnet activity
⏱ Action Time: Immediate (0–120 minutes)
Examples:
Copyright infringement
Proxy misuse
Repeated resource abuse
Open relays
⏱ Action Time: Within 1–2 hours
Examples:
Policy violations
Misconfigured scripts
Non-malicious excessive usage
⏱ Action Time: Within 24 hours
Confirm IP, domain, timestamp
Verify server ownership
Cross-check logs
❌ Do NOT act on incomplete or fake reports
For Level 1 abuse:
Suspend service instantly
Block outgoing traffic
Preserve logs and evidence
No prior notice required.
Send abuse notice including:
Nature of abuse
Evidence summary
Required corrective action
Deadline for response
Use clear, non-accusatory language.
Validate customer explanation
Check corrective actions
Re-scan system if needed
Failure to respond = escalation.
Possible outcomes:
Service restored
Service restricted
Permanent termination
Report to authorities (if legally required)
Immediate termination without restoration:
CSAM
Terrorism-related content
Financial fraud
Repeated spam offenses
No refunds. No appeals.
Logs retained for minimum 30–90 days
Legal requests override retention limits
Access restricted to senior staff only
Respond within upstream SLA
Maintain professional tone
Provide action taken summary
Never disclose customer PII unless legally required
Appeals allowed only for non-critical abuse
Reviewed by senior admin
Decision is final
PART B — SLA HANDLING SOP
To ensure:
Accurate uptime tracking
Fair SLA credit processing
Consistent customer communication
Controlled financial exposure
Internal monitoring systems
Data center alerts
Network monitoring tools
All outages must be logged with:
Start time
End time
Root cause
Resolution details
✔ Hardware failure
✔ Network outage
✔ Power failure
❌ Maintenance
❌ Customer misconfiguration
❌ Abuse suspension
❌ DDoS beyond mitigation scope
Auto alert or customer report
Validate issue immediately
Declare incident severity
Notify internal team
Start incident log
Assign technical owner
Apply fix
Monitor stability
Record downtime duration
Identify root cause
Document preventive steps
Confirm:
Valid service
No policy violation
Downtime exceeded SLA threshold
Use monthly uptime formula
Apply correct credit tier
Credits = hosting fee only
No cash refunds.
Tier 1 support → Verification
Tier 2 admin → Approval
Billing → Credit applied
Acknowledge SLA request within 24 hours
Provide transparent explanation
Clearly state approval or rejection reason
Never promise credits verbally.
Red flags:
Repeated false claims
Downtime outside monitoring window
Customer-caused outages
Escalate repeat abuse cases.
Monthly internal review:
Abuse cases count
SLA incidents
Credit issued
Repeat offenders
Used for:
Capacity planning
Policy updates
Staff training
| Role | Responsibility |
|---|---|
| Support Agent | Intake & initial response |
| System Admin | Technical investigation |
| Abuse Officer | Final abuse decisions |
| Billing Team | SLA credit processing |
| Management | Policy enforcement |
This SOP is confidential
Do not share with customers
Do not publish publicly
Access limited to authorized staff
Reviewed quarterly
Updated as needed
Management approval required