Explore docs
Ackaia OneCore DocumentsVersion 1.00.00Updated 2026-04-27

Ackaia One Acceptable Use & Abuse Policy#

Ackaia Corporation v1.00.00 April 27, 2026 1233 York Avenue, Apt. 301 New York, NY 10065 United States of America www.ackaia.com

Effective Date: April 27, 2026

Entity: Ackaia Corporation, 1233 York Avenue, New York, NY 10065, United States

(“Ackaia”, “Ackaia Corp.”, “we”, “our”, “us”)

Platform: Ackaia One (“the Platform”)

Revision History#

VersionChangesDate
1.00.00Initial Publication04/27/2026

1. Overview of this policy#

This Acceptable Use & Abuse Policy explains the rules that apply to the use of Ackaia One, including Ackaia One Storage, public sharing features, encrypted storage, account systems, APIs, websites, dashboards, and related services provided by Ackaia Corp. Ackaia One is designed to provide private, secure, end-to-end encrypted storage and related privacy-first services. However, privacy-first does not mean abuse-blind. The Service may not be used to store, distribute, conceal, facilitate, or support illegal, exploitative, harmful, abusive, fraudulent, or rights-infringing activity. This Policy forms part of the Ackaia One Terms of Service. By using Ackaia One, you agree to comply with this Policy. The purpose of this Policy is to protect users, third parties, children, victims, public safety, the integrity of the Service, and Ackaia’s infrastructure. Ackaia One provides strong privacy protections, including client-side encryption for supported storage features. These protections are intended to defend lawful users from unnecessary exposure, unauthorized access, surveillance, and avoidable data compromise. They are not intended to provide a safe haven for abuse. This Policy explains:

  • what types of content and activity are prohibited;
  • how Ackaia may detect, prevent, and respond to abuse;
  • how public sharing features may be restricted or disabled;
  • how the Risk Assessment Engine may operate before encryption;
  • when Ackaia may suspend accounts, block uploads, disable links, preserve records, or report suspected illegal activity;
  • how users and third parties may report abuse.

2. Relationship to Privacy and Encryption#

Ackaia One may use end-to-end encryption and a zero-knowledge storage model for supported storage features. In normal operation, after client-side encryption is completed, Ackaia does not possess the cryptographic keys required to decrypt stored encrypted file contents. However, this encryption model does not prevent Ackaia from enforcing this Policy. Ackaia may enforce this Policy through account controls, public-link controls, transfer limits, upload checks, rate limits, Metadata review, abuse reports, automated safety systems, legal compliance processes, and the Risk Assessment Engine. The Risk Assessment Engine may operate before client-side encryption is completed. It may generate or evaluate technical safety signals, including hashes, perceptual hashes, file fingerprints, similarity indicators, upload risk signals, and other abuse-prevention indicators. Ackaia Corp’s position is simple: Ackaia One is privacy-first. It is not a platform for illegal activity, exploitation, or abuse.

3. Scope#

This Policy applies to all use of Ackaia One, including:

  • uploaded files;
  • encrypted files;
  • filenames and folder names;
  • folder structures;
  • public links;
  • shared folders;
  • downloads;
  • account activity;
  • APIs;
  • automated activity;
  • billing activity;
  • support communications;
  • use of Ackaia websites and dashboards;
  • attempts to bypass, manipulate, or abuse Ackaia systems.

This Policy applies regardless of whether content is private, encrypted, publicly shared, temporarily uploaded, partially uploaded, deleted, stored in trash, cached, or transmitted through a public link.

4. General Standard of Use#

You may use Ackaia One only for lawful, legitimate, and authorized purposes. You are responsible for your content, your account, your devices, your public links, your use of bandwidth, your interactions with others, and any activity performed through your Account. You may not use Ackaia One in a way that:

  • violates applicable law;
  • harms or exploits another person;
  • infringes the rights of others;
  • threatens the security or availability of the Service;
  • attempts to evade Ackaia’s safety systems;
  • abuses public sharing features;
  • interferes with other users;
  • exposes Ackaia, users, children, victims, or the public to serious harm.

5. Prohibited Content#

You may not create, upload, store, transmit, share, preserve, distribute, link to, promote, or facilitate any prohibited content through Ackaia One. The following categories are strictly prohibited.

6. Child Sexual Abuse Material and Child Exploitation#

Ackaia maintains a zero-tolerance policy for child sexual abuse material and child exploitation. You may not use Ackaia One to create, upload, store, preserve, transmit, distribute, request, access, share, link to, trade, promote, facilitate, conceal, or otherwise process:

  • child sexual abuse material;
  • sexualized content involving minors;
  • grooming content;
  • sextortion material;
  • content involving child trafficking or exploitation;
  • instructions, communities, archives, indexes, links, or references intended to facilitate access to child exploitation material;
  • manipulated, synthetic, AI-generated, cartoon, illustrated, edited, or otherwise altered sexual content involving or depicting minors, where prohibited by law or by this Policy;
  • any content, communication, or activity intended to exploit, sexualize, abuse, coerce, blackmail, or harm a child.

Ackaia may block uploads, disable access, preserve records, suspend or terminate accounts, and report suspected child exploitation to appropriate authorities, reporting organizations, or child-protection entities. Attempts to use encryption, public links, fragmented uploads, renamed files, compressed archives, obfuscation, steganography, or other techniques to conceal child exploitation material are also strictly prohibited.

7. Non-Consensual Intimate Content and Sexual Abuse#

You may not use Ackaia One to store, distribute, threaten to distribute, promote, or facilitate:

  • non-consensual intimate images or videos;
  • sexual blackmail or sextortion;
  • intimate content involving a person who did not consent to its creation or distribution;
  • hidden-camera sexual content;
  • sexual assault material;
  • content used to harass, humiliate, threaten, coerce, or exploit another person sexually;
  • content that violates privacy, dignity, image rights, or applicable law.

Ackaia may disable public links, preserve evidence, restrict accounts, and cooperate with lawful requests involving non-consensual intimate content.

8. Violence, Terrorism, and Severe Harm#

You may not use Ackaia One to store, distribute, promote, or facilitate:

  • credible threats of violence;
  • instructions for committing violent crimes;
  • terrorist content or violent extremist operational material;
  • recruitment, coordination, or support for terrorist or violent extremist acts;
  • glorification or encouragement of real-world violence where it creates a risk of harm;
  • content used to plan or coordinate kidnapping, murder, assault, sabotage, or other severe harm;
  • graphic violence shared for harassment, intimidation, exploitation, or recruitment.

Ackaia may restrict or report content or activity that creates a credible risk of physical harm.

9. Malware, Ransomware, and Technical Abuse#

You may not use Ackaia One to store, host, distribute, share, sell, test against others, or facilitate:

  • malware;
  • ransomware;
  • spyware;
  • credential-stealing tools;
  • botnet software;
  • destructive scripts;
  • unauthorized exploit kits;
  • phishing kits;
  • malicious browser extensions;
  • droppers, loaders, or payload delivery systems;
  • tools primarily designed for unauthorized access, persistence, evasion, or exfiltration;
  • command-and-control infrastructure;
  • files or instructions primarily intended to compromise systems, networks, accounts, or data.

Security research materials may be permitted only when used lawfully, responsibly, and without harm to others. You may not use Ackaia One as infrastructure for attacks, unauthorized testing, malware distribution, exploit staging, credential theft, or evasion.

10. Phishing, Fraud, Scams, and Deception#

You may not use Ackaia One to support, host, distribute, preserve, or facilitate:

  • phishing pages;
  • fake login forms;
  • fraudulent payment pages;
  • scam documents;
  • impersonation campaigns;
  • fake invoices;
  • fraudulent investment schemes;
  • credential theft;
  • identity theft;
  • social-engineering campaigns;
  • counterfeit documents;
  • deceptive files or links intended to mislead recipients;
  • files used to bypass fraud detection or facilitate financial crime.

Ackaia may disable public links, restrict accounts, preserve records, and report fraud-related activity where appropriate.

11. Stolen Data, Credentials, and Unauthorized Access#

You may not use Ackaia One to store, share, sell, preserve, index, or distribute:

  • stolen passwords;
  • session tokens;
  • API keys obtained without authorization;
  • private keys obtained without authorization;
  • leaked databases;
  • payment card data;
  • identity documents obtained or distributed unlawfully;
  • personal data obtained through breach, scraping, phishing, malware, or unauthorized access;
  • internal company documents obtained unlawfully;
  • confidential information where storage or sharing violates law, contract, fiduciary duty, or professional obligation.

This includes using Ackaia One as a “dead drop,” archive, mirror, transfer point, or backup for stolen or unlawfully obtained data.

12. Intellectual Property Infringement#

You may not use Ackaia One to store, distribute, share, or facilitate access to content that infringes copyright, trademark, trade secret, patent, database rights, contractual rights, or other intellectual property rights. Prohibited activity may include:

  • distributing pirated movies, software, music, books, courses, games, or other protected works;
  • hosting cracks, license bypass tools, stolen source code, or unauthorized activation systems;
  • sharing confidential source code or trade secrets without authorization;
  • using public links to distribute infringing material;
  • repeatedly uploading or sharing content after receiving infringement notices.

Ackaia may disable public links, restrict access, remove or block content where technically possible, terminate repeat infringers, or respond to valid legal notices. Because Ackaia One may use encryption, Ackaia may not always be able to inspect encrypted file contents. However, Ackaia may act on reports, public-link evidence, Metadata, risk signals, account activity, legal notices, or other available information.

13. Harassment, Doxxing, and Abuse of Individuals#

You may not use Ackaia One to harass, threaten, stalk, intimidate, shame, extort, or abuse another person. Prohibited conduct includes:

  • doxxing;
  • storing or sharing personal information to facilitate harassment;
  • distributing private files to harm or intimidate someone;
  • coordinated harassment archives;
  • blackmail materials;
  • threats involving stored or shared files;
  • malicious exposure of private communications;
  • content intended to enable stalking, surveillance, or targeted abuse.

Ackaia may restrict public links, suspend accounts, preserve evidence, and cooperate with lawful requests involving threats, harassment, or abuse.

You may not use Ackaia One public links, storage, or APIs to send, host, support, or facilitate spam or unwanted mass distribution. Prohibited activity includes:

  • mass unsolicited sharing;
  • using Ackaia links in spam campaigns;
  • using public links to distribute malware, scams, or deceptive content;
  • link cloaking to hide abusive destinations;
  • repeatedly creating links after enforcement;
  • using Ackaia One as a content-delivery network for unrelated high-volume public distribution;
  • abusing public download bandwidth;
  • embedding public links in abusive campaigns;
  • using automated systems to create, rotate, or distribute abusive links.

Ackaia may rate-limit, throttle, disable public links, restrict sharing, or suspend accounts involved in public-link abuse.

15. Bandwidth, Quota, and Infrastructure Abuse#

You may not use Ackaia One in a way that abuses storage, bandwidth, compute resources, public transfer limits, APIs, or infrastructure. Prohibited conduct includes:

  • attempting to bypass storage limits;
  • attempting to bypass transfer limits;
  • creating multiple accounts to evade quotas;
  • automating downloads to drain bandwidth;
  • using public links as a high-volume CDN without authorization;
  • intentionally triggering excessive requests;
  • denial-of-service activity;
  • scraping, crawling, or enumeration of objects, accounts, or links;
  • exploiting bugs to obtain free storage or transfer;
  • manipulating upload flows, multipart uploads, or failed uploads to consume resources;
  • using the Service in a way that materially degrades availability for others.

Ackaia may enforce rate limits, bandwidth limits, public-link limits, upload limits, download limits, billing controls, and fair-use restrictions.

16. Circumvention of Security or Safety Systems#

You may not attempt to bypass, disable, deceive, overload, manipulate, evade, reverse engineer for abuse, or interfere with Ackaia’s security, encryption, abuse-prevention, billing, quota, or safety systems. This includes attempts to bypass or interfere with:

  • authentication systems;
  • rate limits;
  • public-link restrictions;
  • file-size limits;
  • transfer limits;
  • subscription enforcement;
  • Risk Assessment Engine checks;
  • CSAM detection systems;
  • malware detection or abuse-prevention systems;
  • account suspension controls;
  • IP-based restrictions;
  • device or session security controls;
  • logging, monitoring, or audit systems.

Security research must follow Ackaia’s responsible disclosure policy. You may not test Ackaia systems in a way that harms users, accesses data that is not yours, disrupts the Service, or attempts to evade safety systems for abusive purposes.

17. Misuse of Encryption and Privacy Features#

Ackaia provides encryption and privacy features to protect lawful users. You may not use these features to:

  • hide illegal content;
  • distribute prohibited material;
  • preserve evidence of crimes;
  • operate abuse networks;
  • evade lawful enforcement;
  • conceal stolen data;
  • coordinate exploitation;
  • protect malware infrastructure;
  • obstruct child-safety systems;
  • bypass abuse-prevention mechanisms.

The fact that Ackaia One may encrypt stored files does not excuse violations of this Policy.

18. Risk Assessment Engine#

Ackaia may operate a Risk Assessment Engine to detect and prevent severe abuse. The Risk Assessment Engine may run before client-side encryption is completed. It may generate, evaluate, compare, transmit, or store technical safety signals, including:

  • cryptographic hashes;
  • perceptual hashes;
  • file fingerprints;
  • similarity indicators;
  • media signatures;
  • known-content match indicators;
  • upload risk signals;
  • CSAM-related indicators;
  • blocked-upload records;
  • account, session, IP, timestamp, and object identifiers associated with a risk event.

The Risk Assessment Engine may compare technical signals against trusted safety databases, child-safety databases, anti-abuse systems, internal abuse-prevention systems, third-party safety tools, or other reputable sources. Ackaia may use the Risk Assessment Engine to:

  • block uploads;
  • detect known CSAM;
  • identify severe abuse risks;
  • prevent public sharing of prohibited content;
  • preserve relevant records;
  • support legal compliance;
  • protect children and victims;
  • prevent Ackaia One from being used as abuse infrastructure.

The Risk Assessment Engine is not intended for advertising, commercial profiling, or selling information about user files. You may not attempt to evade the Risk Assessment Engine by altering, compressing, fragmenting, encrypting externally, renaming, encoding, modifying, nesting, obfuscating, steganographically hiding, or repeatedly re-uploading prohibited content.

19. Public Sharing Enforcement#

Ackaia may disable, restrict, rate-limit, or block public links when:

  • the linked content appears to violate this Policy;
  • the link is used in spam, phishing, malware, fraud, harassment, or abuse;
  • the link exceeds transfer limits;
  • the link creates security, legal, operational, or reputational risk;
  • Ackaia receives a credible abuse report;
  • Ackaia receives a valid legal notice;
  • the link is associated with an account under investigation;
  • the link appears to be used to bypass enforcement.

Ackaia may act on public links even if it cannot decrypt the underlying stored content. Public link context, reports, filenames, Metadata, transfer patterns, user activity, and other available information may be sufficient for enforcement. Revoking or disabling a public link does not delete copies already downloaded, copied, forwarded, cached, screenshotted, or redistributed by others.

20. Abuse Reports#

Users and third parties may report abuse involving Ackaia One. Reports may include:

  • CSAM or child exploitation;
  • malware;
  • phishing;
  • fraud;
  • non-consensual intimate content;
  • threats or harassment;
  • copyright infringement;
  • stolen data;
  • public-link abuse;
  • account abuse;
  • other violations of this Policy.

Abuse reports should be sent to: Abuse Contact: abuse@ackaia.com Child Safety / CSAM Contact: contact@ackaia.com​ Security Contact: security@ackaia.com​ Legal Contact: legal@ackaia.com To help Ackaia investigate, reports should include, where available:

  • the Ackaia public link or URL;
  • a description of the alleged abuse;
  • why the content or activity violates this Policy;
  • screenshots or evidence, if safe and lawful to provide;
  • your contact information;
  • any relevant legal notice or law-enforcement reference.

Do not send CSAM or illegal content to Ackaia as an attachment. If reporting CSAM, provide the link, context, and relevant details without redistributing illegal material.

Rights holders may report alleged intellectual property infringement by contacting: Copyright Contact: copyright@ackaia.com A report should include:

  • identification of the copyrighted work or protected material;
  • the allegedly infringing Ackaia link or location;
  • the rights holder’s contact information;
  • a statement that the report is made in good faith;
  • a statement that the information is accurate;
  • proof of authority to act on behalf of the rights holder, where applicable;
  • any additional information required by applicable law.

Ackaia may disable access, restrict links, notify users, request additional information, or take other appropriate action. Repeat infringement may result in account termination.

22. Enforcement Actions#

Ackaia may take enforcement action when it determines, in its sole reasonable discretion, that content, activity, or account behavior violates this Policy, creates risk, or may violate law. Enforcement actions may include:

  • blocking an upload;
  • rejecting a file;
  • disabling a public link;
  • limiting downloads;
  • throttling traffic;
  • restricting public sharing;
  • requiring re-authentication;
  • requiring additional verification;
  • suspending an account;
  • terminating an account;
  • preserving records;
  • reporting suspected illegal activity;
  • refusing future service;
  • deleting, disabling, or restricting access to content where technically and legally appropriate;
  • taking other action necessary to protect users, children, victims, third parties, Ackaia, or the public.

Ackaia may act without prior notice where notice would create risk, where the violation is serious, where required by law, where necessary to prevent harm, or where immediate action is needed to protect the Service.

23. Evidence Preservation#

When Ackaia detects or reasonably suspects serious abuse, illegal activity, CSAM, exploitation, fraud, security threats, or other severe violations, it may preserve relevant records. Preserved records may include:

  • account identifiers;
  • IP addresses;
  • timestamps;
  • session records;
  • public-link records;
  • transfer logs;
  • storage object identifiers;
  • risk signals;
  • hash matches;
  • blocked-upload records;
  • billing or payment identifiers;
  • support communications;
  • enforcement history;
  • other Metadata or technical records relevant to the violation.

Because Ackaia One may use zero-knowledge encryption, Ackaia may not possess plaintext file contents after encryption. However, Ackaia may preserve and disclose information it does possess, including Metadata and risk signals.

24. Reporting to Authorities and Safety Organizations#

Ackaia may report suspected illegal activity, including suspected CSAM, child exploitation, credible threats, malware operations, fraud, or severe abuse, to appropriate authorities, child-protection organizations, safety organizations, reporting bodies, or law-enforcement channels. Ackaia may also cooperate with valid legal process, emergency requests, or lawful requests where required or appropriate. In cases involving CSAM or child exploitation, Ackaia may preserve and report relevant technical information without prior notice to the user.

25. Appeals#

If your account, file, upload, or public link is restricted and you believe this was a mistake, you may contact Ackaia at: Appeals Contact: contact@ackaia.com An appeal should include:

  • your account email;
  • the affected file, link, or action, if known;
  • the reason you believe enforcement was incorrect;
  • any supporting information.

Ackaia may review appeals at its discretion. Appeals may not be available for all enforcement actions, especially where prohibited content, CSAM, serious legal risk, fraud, or security threats are involved. Ackaia may decline to provide detailed explanations where doing so would compromise safety systems, reveal detection methods, endanger others, interfere with investigations, violate law, or create additional risk.

26. False Reports and Abuse of Reporting Systems#

You may not abuse Ackaia’s reporting systems. Prohibited conduct includes:

  • knowingly submitting false reports;
  • using reports to harass another user;
  • submitting repeated bad-faith complaints;
  • impersonating a rights holder, victim, law-enforcement official, or authority;
  • submitting manipulated evidence;
  • attempting to obtain private information through abuse reports;
  • submitting illegal content directly to Ackaia instead of safely reporting it.

Ackaia may restrict or ignore reports from individuals or entities that abuse the reporting process.

27. Enterprise, Professional, and Regulated Use#

Organizations, professionals, law firms, clinics, and other regulated users are responsible for ensuring that their use of Ackaia One complies with applicable legal, professional, contractual, confidentiality, retention, and regulatory obligations. This Policy does not replace your own compliance program. You may not use Ackaia One to evade professional duties, destroy required records, conceal unlawful conduct, improperly disclose regulated information, or violate obligations owed to clients, patients, employees, customers, courts, regulators, or third parties.

28. Automated Use and APIs#

You may not use bots, scripts, automation, APIs, crawlers, upload tools, download tools, or integrations in a way that violates this Policy. Automated use must not:

  • bypass limits;
  • create abusive accounts;
  • mass-upload prohibited content;
  • mass-create public links;
  • scrape or enumerate objects;
  • drain bandwidth;
  • interfere with the Service;
  • distribute malware, spam, or phishing;
  • bypass Risk Assessment Engine checks;
  • create operational instability.

Ackaia may restrict API access, revoke tokens, throttle requests, or block automation that creates risk or violates this Policy.

29. No Retaliation Against Reporters#

You may not retaliate against anyone who reports abuse, suspected illegal activity, security vulnerabilities, rights violations, or safety concerns to Ackaia, authorities, or appropriate organizations. Retaliation may include harassment, threats, doxxing, intimidation, legal threats made in bad faith, public exposure, or attempts to interfere with a legitimate report. Ackaia may suspend or terminate accounts involved in retaliation.

30. Changes to This Policy#

Ackaia may update this Policy from time to time to reflect changes in law, product features, safety practices, abuse patterns, enforcement processes, or operational requirements. When changes are material, Ackaia will provide notice where appropriate, such as through the Service, website, email, dashboard notice, or other reasonable means. Your continued use of Ackaia One after the updated Policy becomes effective means that you agree to the updated Policy.

31. Contact#

For abuse, safety, legal, or security reports, contact: Ackaia Corp.​ Abuse Contact: abuse@ackaia.com​ Child Safety / CSAM Contact: contact@ackaia.com​ Security Contact: security@ackaia.com​ Legal Contact: legal@ackaia.com​ Website: www.ackaia.com​ Address: 1233 York Avenue, New York, NY 10065, United States of America If you are reporting child sexual abuse material or child exploitation, do not send illegal material directly to Ackaia. Provide the relevant Ackaia link, account information if known, and contextual details sufficient for investigation. End of Policy