Acceptable Use
Acceptable Use Policy
Last updated: 2026-05-02
This Acceptable Use Policy ("AUP") describes prohibited uses of Cloudless. It forms part of the Cloudless Terms of Service.
1. Purpose
Cloudless is intended for lawful backup and restore use cases. You may not use the service in ways that create legal, operational, reputational, or security risk for Cloudless, its users, its infrastructure providers, or its payment providers.
2. Prohibited Activities
You may not use Cloudless to:
- violate any applicable law or regulation
- infringe intellectual property, privacy, publicity, or data protection rights
- store or distribute malware, ransomware, spyware, or other malicious code
- facilitate phishing, credential theft, fraud, or impersonation
- send unsolicited bulk or commercial messages, or store mailing lists used for such activity
- run cryptocurrency mining, proof-of-work workloads, or similar resource-abusive computation against Cloudless infrastructure
- interfere with, disrupt, or probe the security of Cloudless systems
- abuse signup, billing, trial, discount, or referral flows
- attempt unauthorized access to accounts, systems, or networks
- use the service in connection with sanctions violations or restricted parties
- export, re-export, or transfer the Cloudless software or any data processed with it in violation of applicable export control or sanctions laws, including U.S. Export Administration Regulations (EAR) and U.S. Office of Foreign Assets Control (OFAC) sanctions programs
3. Restricted Business Categories
Without prior written approval, Cloudless may not be used in connection with:
- illegal goods or services
- adult sexual content or exploitation
- child sexual abuse material (CSAM) or exploitative content
- hate speech or violent extremist activity
- unlawful surveillance or stalking activity
- high-risk financial, lending, or money transmission activity
- gambling or betting activity where prohibited or unlicensed
- deceptive, fraudulent, or misleading schemes
3a. Child Sexual Abuse Material (CSAM)
Cloudless has zero tolerance for child sexual abuse material. Cloudless does not have access to plaintext file contents because backups are encrypted on the user's device, and Cloudless does not perform content scanning of encrypted backup data. However, where Cloudless becomes aware of CSAM-related activity in connection with the service through any means, Cloudless will:
- terminate the account immediately
- preserve relevant non-content metadata as required by law
- report the activity to the U.S. National Center for Missing & Exploited Children (NCMEC) and other competent authorities as required by applicable law
4. Content Responsibility
You remain solely responsible for:
- the legality of the data you choose to back up
- obtaining required permissions and rights
- complying with legal hold, retention, privacy, and disclosure obligations
5. Enforcement
Cloudless may investigate suspected violations and may take action including:
- warning the user
- suspending or terminating access
- blocking transactions
- preserving evidence
- reporting conduct to payment providers, hosting providers, or legal authorities
6. Changes
We may update this policy from time to time by posting the updated version on our website.
7. Contact
For questions about this policy, contact:
support@trycloudless.io