Ackaia One Copyright Policy and Takedown Procedure#
Effective date: May 04, 2026\ Applies to: Ackaia One, including Ackaia One Storage and any public sharing, download, preview, or object-access pages made available through Ackaia One.\ Document owner: Ackaia Corp Legal / Trust & Safety\ Contact: copyright@ackaia.com\ Copyright claim form: https://reports.ackaia.com/copyright\]
Revision history#
| Version | Date | Notes |
|---|---|---|
| 1.0 | 2026-05-04 | Initial Ackaia One copyright policy and takedown procedure. |
1. Plain-English summary#
Ackaia One is a privacy-first storage service. Users may store encrypted files, organize private vaults, and, where enabled, create public or controlled sharing links. Ackaia respects intellectual property rights and expects users to store and share only content they have the right to use.
If you believe that content available through Ackaia One infringes your copyright, you may submit a copyright takedown notice. Ackaia will review complete and valid notices, locate the reported material when possible, and take appropriate action, which may include disabling public access, restricting a shared object, removing a preview/download page, suspending sharing functionality, or taking action against repeat infringers.
A copyright takedown notice is for copyright issues only. It should not be used for malware, phishing, CSAM, threats, privacy violations, impersonation, trademark disputes, defamation, or general abuse. Those should be reported through Ackaia Reports using the appropriate report type.
This document explains:
- what copyright claims Ackaia accepts;
- what information a takedown notice must contain;
- how to submit a notice;
- what Ackaia may do after receiving a notice;
- how account holders may submit a counter-notice;
- how Ackaia handles repeat infringers.
---
2. Important legal notice#
This document is provided for operational and informational purposes. It does not constitute legal advice. Copyright laws differ across jurisdictions, and Ackaia may apply different procedures depending on the location of the claimant, the user, the content, the hosting infrastructure, applicable law, court orders, regulatory obligations, and Ackaia’s legal assessment.
If you are unsure whether you own the relevant rights, whether the reported material is infringing, whether an exception such as fair use, fair dealing, quotation, parody, criticism, education, news reporting, or another limitation applies, you should consult a qualified attorney before submitting a notice.
Knowingly submitting a false or misleading copyright notice or counter-notice may have legal consequences and may result in account restrictions, rejection of future claims, or other action.
---
3. Scope of this policy#
This policy applies to copyright claims concerning material that is made available through Ackaia One, including:
- files publicly shared from Ackaia One Storage;
- public download pages;
- public preview pages;
- public folder listings;
- shared object links;
- thumbnails, previews, metadata, titles, or descriptions exposed through an Ackaia One sharing feature;
- other user-provided content hosted or distributed through Ackaia One.
This policy does not apply to:
- content hosted on third-party services not controlled by Ackaia;
- links that merely point to websites outside Ackaia without hosting infringing content on Ackaia infrastructure;
- trademark complaints;
- privacy complaints;
- defamation complaints;
- contractual disputes;
- ownership disputes between collaborators;
- requests for account recovery;
- malware, phishing, CSAM, exploitation, threats, or safety abuse.
For non-copyright abuse, use the appropriate Ackaia Reports flow.
---
4. Ackaia One encryption and review limitations#
Ackaia One is designed around privacy-first storage principles. Depending on the product configuration, user files may be encrypted before or during storage, and Ackaia may not be able to inspect the contents of private encrypted files.
Because of this:
- Ackaia may not be able to verify the contents of private encrypted files unless they are publicly shared, made accessible through a reportable URL, or otherwise technically available for review under applicable policy and law.
- Ackaia generally reviews copyright complaints using the specific public link, object identifier, shared page, metadata, account signals, file hashes, user-provided evidence, and other available information.
- Ackaia may disable public access to a reported object without viewing the private contents of the underlying encrypted file.
- If a complaint does not identify a specific Ackaia One location, Ackaia may be unable to act.
- Ackaia does not require claimants to obtain or provide private decryption keys.
Ackaia’s privacy-first design does not permit users to use Ackaia One to infringe copyright. It does mean that copyright notices must be specific enough for Ackaia to locate the allegedly infringing material without broad inspection of private user storage.
---
5. When to submit a copyright takedown notice#
You may submit a copyright takedown notice if you are:
- the copyright owner;
- an authorized agent of the copyright owner;
- a person or organization legally permitted to act on behalf of the copyright owner.
Examples of copyrightable works may include:
- photographs;
- videos;
- music;
- books;
- articles;
- illustrations;
- software code;
- design files;
- documents;
- audiovisual works;
- datasets, where protected by applicable law;
- other original creative works.
You should submit a notice only if you have a good-faith belief that the material available through Ackaia One is not authorized by the copyright owner, the copyright owner’s agent, or the law.
---
6. When not to submit a copyright takedown notice#
Do not use the copyright process if your concern is not copyright infringement.
Use an abuse or safety report instead if the issue involves:
- malware;
- phishing;
- credential theft;
- CSAM or child exploitation;
- threats;
- harassment;
- doxxing;
- non-consensual intimate content;
- privacy exposure;
- impersonation;
- spam;
- illegal goods or services;
- account compromise;
- platform abuse.
Use a trademark or brand complaint process, if available, if the issue involves trademark misuse, brand impersonation, counterfeit goods, or confusing use of a company name or logo.
Use a privacy request process, if available, if your concern is that personal data is exposed but you are not claiming copyright ownership over the content.
Being shown in a photo or video does not automatically mean that you own the copyright in that photo or video. In many cases, the photographer, videographer, employer, publisher, studio, or another rights holder may own the copyright. If your concern is privacy, consent, safety, harassment, intimate content, or image rights, choose the appropriate non-copyright report category.
---
7. Information required in a copyright takedown notice#
To allow Ackaia to process your request, your notice must include all of the information below.
7.1 Your identification and authority#
Provide:
- your full legal name;
- your organization name, if applicable;
- your role or title, if applicable;
- whether you are the copyright owner or an authorized agent;
- if you are an agent, the name of the copyright owner you represent;
- your contact email address;
- your telephone number, if available;
- your mailing address, if required by applicable law or requested by Ackaia.
7.2 Identification of the copyrighted work#
Clearly identify the copyrighted work that you claim has been infringed.
Depending on the work, include:
- title;
- author or creator;
- copyright owner;
- registration number, if any;
- publication date, if any;
- original URL, if publicly available;
- ISBN, ISRC, ISWC, DOI, repository URL, package name, or other identifier, if applicable;
- a description sufficient for Ackaia to understand what work is being claimed.
If your notice concerns multiple works, provide a representative list or a structured attachment identifying each work.
7.3 Identification of the allegedly infringing material#
Identify the material on Ackaia One that you claim is infringing.
You must provide specific location information, such as:
- the full Ackaia One public sharing URL;
- the public download URL;
- the public folder URL;
- the object ID, if visible;
- the report object reference;
- the page where the material appears;
- the filename shown on the public page;
- any other information that allows Ackaia to locate the material.
General descriptions such as “someone uploaded my work to Ackaia One” are usually not enough.
7.4 Explanation of the alleged infringement#
Briefly explain why you believe the reported material infringes your copyright.
For example:
- the file is a copy of your photograph;
- the public link distributes your copyrighted video;
- the archive contains your paid software without authorization;
- the document reproduces your copyrighted book;
- the shared folder contains multiple copies of your music files;
- the object uses your artwork without permission.
7.5 Good-faith statement#
Your notice must include the following statement, or a substantially similar statement:
> I have a good-faith belief that the use of the copyrighted material described in this notice is not authorized by the copyright owner, its agent, or the law.
7.6 Accuracy and authority statement#
Your notice must include the following statement, or a substantially similar statement:
> I state that the information in this notice is accurate, and under penalty of perjury, that I am the copyright owner or am authorized to act on behalf of the copyright owner of the exclusive right that is allegedly infringed.
7.7 Signature#
Your notice must include your physical or electronic signature.
An electronic signature may be your typed legal name if submitted through the Ackaia copyright form or by email.
Example:
Electronic signature: Jane Doe
---
8. How to submit a copyright takedown notice#
8.1 Preferred method: Ackaia copyright form#
On the Ackaia One shared object page (https://ackaia.one/share/...), look for the "Report Object" button, usually located in the bottom left corner of the page. Further instructions on how to proceed will be displayed.
The form is the preferred method because it helps collect the required information and routes the request to Ackaia Trust & Safety.
8.2 Email method#
You may also submit a complete notice by email:
copyright@ackaia.com
Use the subject line:
Copyright Takedown Notice - Ackaia One
9. Copyright takedown notice template#
If you are sending it by email, you may use the template below.
Subject: Copyright Takedown Notice - Ackaia One
To Ackaia Corp Trust & Safety / Copyright Agent,
I am submitting this copyright takedown notice regarding material available through Ackaia One.
1. Claimant information
Full legal name:
Organization, if applicable:
Role/title, if applicable:
Email:
Phone:
Mailing address:
2. Authority
I am:
[ ] The copyright owner
[ ] An authorized agent of the copyright owner
If acting as an agent, identify the copyright owner:
3. Copyrighted work
Title or description of the copyrighted work:
Author/creator:
Copyright owner:
Registration number, if any:
Original URL or publication location, if available:
Additional identifying information:
4. Allegedly infringing material on Ackaia One
Ackaia One URL(s):
Filename(s), if visible:
Object ID(s), if visible:
Description of where the material appears:
5. Explanation
Please explain why you believe the material infringes your copyright:
6. Required statements
I have a good-faith belief that the use of the copyrighted material described in this notice is not authorized by the copyright owner, its agent, or the law.
I state that the information in this notice is accurate, and under penalty of perjury, that I am the copyright owner or am authorized to act on behalf of the copyright owner of the exclusive right that is allegedly infringed.
7. Signature
Electronic signature:
Date:
---
10. What happens after Ackaia receives a notice#
After receiving a copyright notice, Ackaia may take one or more of the following steps.
10.1 Intake review#
Ackaia may review whether the notice includes the required information. If the notice is incomplete, Ackaia may reject it or request additional information.
10.2 Location review#
Ackaia may attempt to locate the reported material using the URL, object identifier, filename, public page, account information, or other details provided.
If Ackaia cannot locate the material, Ackaia may request additional information or close the notice as insufficient.
10.3 Facial validity review#
Ackaia may assess whether the notice appears to be a copyright complaint, whether it identifies a copyrighted work, whether it identifies allegedly infringing material, and whether the required statements are present.
Ackaia does not adjudicate complex copyright ownership disputes through this process.
10.4 Action on the reported material#
If the notice appears complete and valid, Ackaia may take appropriate action, such as:
- disabling the public sharing link;
- disabling previews;
- disabling downloads;
- removing access to the reported public page;
- restricting the reported object;
- limiting the account’s sharing capability;
- notifying the account holder;
- preserving relevant records;
- escalating the matter for legal or trust review.
Ackaia may take action without viewing private encrypted content where the reported public link, object metadata, claimant evidence, or other available information is sufficient.
10.5 Notice to the affected user#
When appropriate, Ackaia may notify the user who uploaded, stored, or shared the reported material. The notice may include information from the claimant’s takedown notice, including claimant name, organization, copyrighted work, and the reported URL.
Claimants should avoid including unnecessary personal information in a notice.
10.6 No admission#
Removing, disabling, restricting, or restoring material under this policy is not an admission by Ackaia that the material is infringing, lawful, unlawful, authorized, unauthorized, or otherwise legally determined.
---
11. Incomplete, invalid, or abusive notices#
Ackaia may reject or decline to act on notices that are incomplete, invalid, abusive, misleading, overbroad, or unrelated to copyright.
Examples include:
- notices that do not identify a copyrighted work;
- notices that do not identify a specific Ackaia One URL or object;
- notices submitted by someone who does not claim ownership or authority;
- notices involving trademarks, privacy, defamation, or contract disputes instead of copyright;
- notices seeking removal of criticism, commentary, parody, news reporting, or lawful use without a sufficient basis;
- notices containing obviously false claims;
- mass notices with no meaningful identification of works or URLs;
- notices attempting to obtain private user data;
- notices used to harass users or suppress lawful speech.
Ackaia may restrict access to the copyright process for parties that repeatedly submit abusive or fraudulent claims.
---
12. Counter-notice process#
If your Ackaia One content was removed, disabled, or restricted because of a copyright notice, you may be able to submit a counter-notice.
A counter-notice is a legal request stating that you believe the material was removed or disabled by mistake or misidentification.
Do not submit a counter-notice unless you have a good-faith belief that the material was removed or disabled as a result of mistake or misidentification. If you are unsure, consult a qualified attorney.
---
13. Information required in a counter-notice#
A counter-notice should include:
- Your full legal name.
- Your email address.
- Your telephone number, if available.
- Your mailing address, if required by applicable law.
- Identification of the material that was removed or disabled.
- The Ackaia One URL or object reference where the material appeared before removal or restriction.
- A statement that you have a good-faith belief that the material was removed or disabled as a result of mistake or misidentification.
- A statement consenting to the jurisdiction required by applicable law, if the claim is processed under a legal framework requiring such consent.
- Your physical or electronic signature.
For notices handled under the United States DMCA framework, the counter-notice may need to include consent to the jurisdiction of a Federal District Court for the judicial district in which your address is located, or if your address is outside the United States, for any judicial district in which Ackaia may be found, and a statement that you will accept service of process from the person who submitted the original notice or that person’s agent.
---
14. Counter-notice template#
Subject: Copyright Counter-Notice - Ackaia One
To Ackaia Corp Trust & Safety / Copyright Agent,
I am submitting this counter-notice regarding material removed, disabled, or restricted on Ackaia One.
1. Account holder information
Full legal name:
Ackaia account email:
Contact email, if different:
Phone:
Mailing address:
2. Removed or disabled material
Ackaia One URL or object reference:
Filename or description:
Date of removal/restriction, if known:
Original location where the material appeared:
3. Good-faith statement
I have a good-faith belief that the material was removed or disabled as a result of mistake or misidentification.
4. Jurisdiction and service statement, if applicable
I consent to the jurisdiction of the Federal District Court for the judicial district in which my address is located, or if my address is outside the United States, to the jurisdiction of any judicial district in which Ackaia may be found. I will accept service of process from the person who submitted the original copyright notice or that person’s agent.
5. Accuracy statement
I state under penalty of perjury that the information in this counter-notice is accurate.
6. Signature
Electronic signature:
Date:
---
15. What happens after Ackaia receives a counter-notice#
After receiving a counter-notice, Ackaia may:
- Review it for completeness.
- Reject it if it is incomplete, invalid, abusive, or unrelated to the original action.
- Forward it to the original claimant, where appropriate.
- Inform the claimant that the material may be restored unless the claimant notifies Ackaia that they have filed a legal action seeking to restrain the user from engaging in the allegedly infringing activity.
- Restore access to the material within the applicable legal timeframe if the counter-notice is valid and Ackaia does not receive notice of legal action.
For notices handled under the United States DMCA framework, restoration may occur after no fewer than 10 and no more than 14 business days after the counter-notice is forwarded to the claimant, unless the claimant informs Ackaia that a court action has been filed.
Ackaia may decline to restore material if restoration would violate applicable law, a court order, Ackaia policy, safety requirements, account restrictions, sanctions obligations, or another valid legal or operational restriction.
---
16. Repeat infringer policy#
Ackaia may terminate or restrict accounts of users who repeatedly infringe copyright or repeatedly use Ackaia One to distribute infringing material.
Ackaia may consider, among other factors:
- number of valid copyright notices;
- number of affected works;
- number of affected files or objects;
- whether notices are repeated over time;
- whether the user submitted valid counter-notices;
- whether the user appears to be intentionally distributing infringing material;
- whether the account is primarily used for infringing distribution;
- whether the user attempts to evade restrictions;
- whether the user re-uploads the same or similar material after removal.
Possible actions include:
- warning;
- disabling a public link;
- restricting public sharing;
- removing access to specific objects;
- temporary account restriction;
- permanent account termination;
- preservation of relevant records;
- legal escalation.
Ackaia may act more quickly where an account appears dedicated to infringement or where the same user repeatedly attempts to distribute the same infringing material.
---
17. Copyright and public sharing#
Ackaia One users are responsible for what they store and share.
Users must not use Ackaia One to publicly share content they do not have the right to distribute.
Examples of prohibited sharing include:
- pirated movies;
- leaked music albums;
- cracked software;
- license keys;
- paid courses uploaded without permission;
- ebooks copied without authorization;
- copyrighted design assets redistributed without permission;
- commercial photographs used without a license;
- archives of copyrighted material intended for unauthorized distribution.
Ackaia may disable public sharing links that are used to distribute infringing material.
---
18. Copyright and private storage#
Ackaia One is a private storage product. Ackaia does not proactively inspect private encrypted vaults for copyright compliance.
However, users may not use Ackaia One to operate infringement schemes, evade enforcement, host known infringing libraries for public distribution, or repeatedly share copyrighted material without authorization.
If private storage becomes connected to public infringement, malware, abuse, court orders, law enforcement requests, or repeat violations, Ackaia may take action consistent with its policies and applicable law.
---
19. Privacy and data handling in copyright reports#
Ackaia may process personal data included in copyright notices and counter-notices for purposes of:
- reviewing the claim;
- contacting the claimant;
- contacting the affected account holder;
- complying with legal obligations;
- preserving audit records;
- preventing abuse of the copyright process;
- enforcing Ackaia policies.
Ackaia may share relevant portions of a takedown notice with the affected account holder or relevant legal authorities when appropriate or required.
Do not include unnecessary sensitive personal data in your notice. Do not include passwords, private keys, payment card numbers, government IDs, unrelated private documents, or confidential business information unless specifically required and appropriate.
---
20. Transparency and recordkeeping#
Ackaia may maintain records of copyright notices, counter-notices, actions taken, timestamps, affected URLs, account identifiers, and related communications.
Ackaia may use these records to:
- audit decisions;
- detect repeat infringers;
- prevent fraudulent reports;
- comply with law;
- improve trust and safety workflows;
- produce transparency reporting in aggregated or redacted form.
Ackaia does not guarantee that individual notices will be published publicly.
---
21. Legal orders and law enforcement requests#
Ackaia may respond to court orders, subpoenas, law enforcement requests, regulatory notices, or other legally binding demands according to applicable law and Ackaia’s legal request procedures.
Copyright notices submitted through this policy are not a substitute for legal process where legal process is required.
Ackaia may require a court order before disclosing private account information, private communications, private encrypted content, or other protected user data, unless disclosure is otherwise required or permitted by applicable law.
---
22. Misrepresentation and abuse of process#
Ackaia may take action against claimants, agents, users, or other parties who abuse the copyright process.
Abuse may include:
- knowingly false notices;
- knowingly false counter-notices;
- impersonating a copyright owner;
- submitting notices to suppress lawful speech;
- submitting notices for non-copyright disputes;
- mass reporting without specific URLs;
- using notices to obtain private user information;
- repeatedly submitting rejected claims without new information;
- threatening Ackaia employees or users.
Actions may include rejecting notices, limiting future submissions, preserving abuse evidence, restricting accounts, or escalating for legal review.
---
23. Frequently asked questions#
23.1 Can I submit a copyright claim if I am only shown in a photo?#
Not necessarily. Being visible in a photo does not always mean you own the copyright. The photographer or another rights holder may own the copyright. If your concern is privacy, consent, harassment, intimate content, or safety, use the appropriate non-copyright report category.
23.2 Can Ackaia inspect private encrypted files to find my copyrighted work?#
No. Access to encrypted files by employees is not restricted by policy, but by a lack of technical capacity to mathematically decipher the encryption. You must provide a specific public link, object reference, or other actionable location information.
23.3 Can Ackaia disable a public link without decrypting the underlying file?#
Yes. If a public sharing page or object is specifically identified, Ackaia may be able to disable public access to that object. Additionally, once the file is made public, Ackaia regains the technical ability to view the file's contents.
23.4 What if I do not know the exact Ackaia One URL?#
Ackaia may be unable to act without a specific location. Provide as much information as possible, including screenshots of the public page, filenames, account names, timestamps, referral links, or other details that help locate the material.
23.5 What if the same content appears again after removal?#
Submit a new notice identifying the new location. Ackaia may consider repeat uploads or repeated sharing when applying its repeat infringer policy.
23.6 Will Ackaia delete the user’s entire account after one notice?#
Not usually. Ackaia may disable specific material first. Account-level action depends on severity, repeat behavior, evidence, legal requirements, and policy assessment. The Ackaia ID is used throughout the entire Ackaia Corp ecosystem. Deactivating an ID means revoking that user's access to our entire ecosystem; therefore, actions of this magnitude are reserved as a last resort.
23.7 Does Ackaia decide who owns the copyright?#
No. Ackaia’s notice process is not a court proceeding. Ackaia may take action based on complete and facially valid notices, but complex ownership disputes should be resolved by the parties or appropriate legal authorities.
23.8 Can I submit a notice for trademark infringement?#
This copyright process is not intended for trademark claims. In any case, we do not prohibit the use of this procedure for such a purpose. We simply do not guarantee that action will be taken in such cases.
23.9 Can I submit a notice for leaked personal data?#
If your concern is privacy or personal data exposure rather than copyright infringement, use the privacy or abuse report category.
23.10 Can I use the copyright process to report malware or CSAM?#
No. Malware, CSAM, exploitation, threats, phishing, and other safety issues must be reported through the abuse or safety report flow so that Ackaia can apply the correct urgent handling procedures.
---
24. Reference standards#
Ackaia may consider multiple legal frameworks and best practices when operating this process, including:
- the United States Digital Millennium Copyright Act, including 17 U.S.C. § 512;
- applicable Brazilian law;
- applicable European Union digital services and notice-and-action requirements;
- court orders and legally binding requests;
- Ackaia’s Terms of Service, Privacy Policy, Acceptable Use Policy, and security procedures.
Where legal frameworks conflict or require different treatment, Ackaia may adapt its process to the applicable jurisdiction and circumstances.
---
25. Contact#
Copyright notices should be submitted through the Ackaia copyright form whenever possible.
For email submission:
copyright@ackaia.com
For general abuse reports unrelated to copyright:
https://reports.ackaia.com
For legal repository documents:
https://legal.ackaia.com
---
Explore docs