Explore docs
Ackaia OneCore DocumentsVersion 1.00.00Updated 2026-04-27

Ackaia One Terms of Service#

Ackaia Corporation v1.00.00 April 27, 2026 1233 York Avenue, Apt. 301 New York, NY 10065 United States of America www.ackaia.com

Effective Date: April 27, 2026

Entity: Ackaia Corporation, 1233 York Avenue, New York, NY 10065, United States

(“Ackaia”, “Ackaia Corp.”, “we”, “our”, “us”)

Platform: Ackaia One (“the Platform”)

Revision History#

VersionChangesDate
1.00.00Initial Publication04/27/2026

1. Acceptance of Terms#

By creating an account, accessing, or using the Ackaia One platform (“the Platform”), you (“User”, “Customer”, “you”) agree to comply with and be legally bound by these Terms of Service (“Agreement”). If you do not agree to these Terms, do not access or use ACP or any of its products. This Terms is valid and enforceable in all jurisdictions, regardless of the country, state, province, or region where the User resides or operates. By accepting these Terms, you confirm that you are literate in the English language and have read, understood, and fully comprehended the contents of this Agreement prior to using the Ackaia One platform.

2. Overview of Terms#

These Terms of Service govern your access to and use of Ackaia One, including Ackaia One Storage and any related websites, applications, interfaces, APIs, features, systems, and services provided by Ackaia Corp. Please read these Terms carefully. By creating an account, accessing Ackaia One, uploading files, storing content, sharing links, subscribing to a plan, or otherwise using the Service, you agree to be bound by these Terms. If you are using Ackaia One on behalf of an organization, company, law firm, clinic, medical practice, institution, or other legal entity, you represent that you have authority to bind that entity to these Terms. In that case, “you” and “your” refer to both you individually and the entity you represent. Ackaia One is designed around privacy, confidentiality, security, and transparency. However, privacy does not mean lawlessness, immunity from abuse-prevention systems, or permission to store, distribute, conceal, or facilitate illegal content. These Terms explain both the privacy protections we provide and the safety boundaries that apply to the Service.

3. Definitions#

For purposes of these Terms, the following definitions apply.

“Ackaia,” “we,” “us,” or “our” means Ackaia Corporation (d/b/a Ackaia Corp.), the provider and operator of Ackaia One.

“Ackaia One” means the suite of private digital services provided by Ackaia, including Ackaia One Storage, user dashboards, sharing features, account systems, security mechanisms, billing features, applications, websites, APIs, and related services.

“Service” means Ackaia One and any related feature, system, product, website, application, interface, API, or infrastructure made available by Ackaia.

“User,” “you,” or “your” means any individual or entity that accesses, uses, subscribes to, tests, interacts with, or benefits from the Service.

“Account” means your Ackaia ID account or any account, identity, session, credential, or access profile used to access Ackaia One.

“User Content” means any file, folder, document, image, video, text, data, filename, metadata, material, information, or other content uploaded, stored, created, transmitted, shared, processed, or otherwise made available through the Service by or on behalf of a user.

“Encrypted Content” means User Content that has been encrypted before being stored by Ackaia.

“End-to-End Encryption” or “E2EE” means a technical model under which certain User Content is encrypted on the user’s device, browser, or client environment before being transmitted to Ackaia’s storage infrastructure.

“Zero-Knowledge” means that, under normal operation and after client-side encryption has completed, Ackaia does not possess the cryptographic keys required to decrypt the encrypted file contents stored by the Service.

“Risk Assessment Engine” means Ackaia’s technical safety system that may run before client-side encryption to generate, evaluate, compare, or transmit technical safety signals, including cryptographic hashes, perceptual hashes, file fingerprints, or other indicators, for the purpose of detecting, preventing, blocking, reporting, or responding to illegal, abusive, exploitative, or severely harmful content.

“CSAM” means child sexual abuse material, including any image, video, file, media, representation, data, or content involving sexual abuse, exploitation, or sexualization of children or minors, as defined by applicable law and relevant child-protection standards.

“Public Link” means any share link, public URL, access token, fragment-based key URL, or other mechanism that allows another person or system to access User Content through the Service.

“Metadata” means information associated with User Content or Service usage that may not itself be the underlying file content, including account identifiers, object identifiers, file size, encrypted size, upload time, update time, folder relationships, sharing status, transfer usage, IP addresses, device/session information, billing status, audit events, risk signals, and similar operational information.

4. Description of Ackaia One#

Ackaia One is a privacy-first suite of digital services. Its initial features may include secure file storage, encrypted file uploads, encrypted file downloads, folder management, public or private sharing, storage limits, transfer limits, account management, subscription management, and related functionality. Ackaia One is built for users who value confidentiality, including individuals and professionals who may handle sensitive documents. However, Ackaia One is not a substitute for your own legal, professional, regulatory, medical, financial, archival, or cybersecurity obligations. The Service may evolve over time. Ackaia may add, remove, modify, suspend, rename, merge, replace, or discontinue features when necessary for product development, security, legal compliance, abuse prevention, operational stability, business sustainability, or technical improvement. Certain features may be available only to specific plans, regions, account types, devices, browsers, or users who meet technical, legal, payment, or security requirements.

5. Account Registration and Ackaia ID#

To use Ackaia One, you may need an Ackaia ID account. You are responsible for maintaining the confidentiality of your login credentials, recovery methods, devices, browser sessions, local encryption keys, vault passphrases, PINs, and any other authentication or access mechanisms associated with your Account. You agree to provide accurate and current information when creating or maintaining your Account. You may not impersonate another person, create accounts using false information, bypass identity or security controls, or use the Service in a way that misrepresents your identity or authority. You are responsible for all activity under your Account unless such activity results solely from Ackaia’s proven breach of its own security obligations. You must promptly notify Ackaia if you believe your Account, credentials, device, session, encryption keys, or shared links have been compromised. Ackaia may require additional verification, authentication, payment validation, anti-abuse checks, or security measures before enabling or continuing access to certain features.

6. Privacy-First Design#

Ackaia One is designed with a privacy-first approach. This means we seek to reduce unnecessary access to User Content, limit internal exposure to sensitive data, use client-side encryption where applicable, minimize data collection where practical, and provide transparent explanations of how major security systems operate. Privacy-first does not mean that Ackaia collects no data. The Service requires certain Metadata and operational information to function. For example, Ackaia may process account identifiers, subscription status, storage usage, transfer usage, object identifiers, encrypted object sizes, timestamps, public-link status, security logs, payment status, and risk signals. Privacy-first also does not mean that Ackaia permits illegal activity. Ackaia may implement safety systems, abuse-prevention systems, rate limits, fraud-prevention systems, security monitoring, and legal compliance processes. The privacy guarantees of Ackaia One must be understood together with the limitations described in these Terms, including the sections on encryption, Metadata, local device security, public sharing, and the Risk Assessment Engine.

7. End-to-End Encryption and Zero-Knowledge Storage#

Ackaia One may use client-side end-to-end encryption for certain file-storage features. In general, this means that files are encrypted in your browser, device, or client environment before being uploaded to Ackaia’s storage infrastructure. Under the zero-knowledge storage model, Ackaia stores encrypted file data, encrypted key material, operational Metadata, and related technical records. After client-side encryption has completed, Ackaia does not ordinarily possess the plaintext file contents or the cryptographic keys required to decrypt your stored file contents. This architecture is intended to prevent Ackaia from reading your encrypted stored files under normal operating conditions. It is also intended to reduce the consequences of unauthorized access to storage infrastructure by ensuring that stored file contents remain encrypted. However, zero-knowledge storage has limits. It does not mean:

  • that your device, browser, operating system, extensions, or local environment cannot be compromised;
  • that someone with access to your Account, browser session, device, recovery method, local key material, or public share link cannot access your files;
  • that all Metadata is hidden from Ackaia;
  • that Ackaia cannot enforce plan limits, transfer limits, abuse-prevention rules, legal obligations, or security controls;
  • that content is never analyzed before encryption, as described in the Risk Assessment Engine section;
  • that deleted, shared, downloaded, cached, exported, or previously accessed files can always be fully recalled or revoked;
  • that the Service is suitable for every regulated, classified, legally privileged, medical, governmental, financial, or mission-critical use case without your own independent assessment.

You are responsible for understanding these limitations before relying on the Service for sensitive information.

8. Local Device Security and Key Storage#

Ackaia One’s encryption model depends on the security of your local environment. Your browser, operating system, device, extensions, clipboard, downloads folder, screen, local storage, IndexedDB, session storage, password manager, and network environment may affect the confidentiality of your files. For usability, Ackaia One may store local cryptographic material or wrapped key material in your browser or device so that you do not need to re-enter your vault passphrase or PIN every time you access the Service. This improves user experience but means that a compromised device, malicious browser extension, malware, unauthorized local user, or stolen session may create a risk to your encrypted files. You are responsible for securing your device, using strong credentials, avoiding untrusted extensions, keeping your browser and operating system updated, locking your device, and signing out or clearing local access where appropriate. Ackaia may provide controls to revoke sessions, clear local keys, disable remembered devices, or require re-authentication. These controls may not protect content that was already downloaded, copied, shared, cached, or accessed before revocation.

9. Vault Passphrases, PINs, Recovery, and Loss of Access#

Depending on the feature, Ackaia One may require a vault passphrase, PIN, recovery phrase, device key, or similar access secret to unlock encrypted content. Because Ackaia One is designed around zero-knowledge storage, Ackaia may be unable to recover your encrypted files if you lose the required keys, passphrases, recovery credentials, or local access mechanisms. Ackaia may not be able to reset encryption keys or decrypt files on your behalf. You understand that losing access to your encryption credentials may permanently prevent access to encrypted files. You are responsible for storing recovery information safely. Ackaia may provide account recovery for authentication purposes, but account recovery does not necessarily mean encrypted content recovery. Recovering access to your Ackaia ID account may not restore access to encrypted files if the relevant cryptographic secrets are lost.

10. Risk Assessment Engine and Pre-Encryption Safety Analysis#

Ackaia One is not designed to be a safe haven for illegal, exploitative, or severely harmful content. To protect children, victims, users, the public, and the integrity of the Service, Ackaia may operate a technical safety system called the Risk Assessment Engine. The Risk Assessment Engine may run before client-side encryption is completed. This means that certain files or file categories may be evaluated in the browser, device, client environment, or another controlled processing step before they are encrypted and stored. The purpose of the Risk Assessment Engine is to generate, evaluate, compare, or transmit technical safety signals. These signals may include cryptographic hashes, perceptual hashes, file fingerprints, similarity signals, media signatures, metadata-derived indicators, or other risk indicators. Ackaia may compare these signals against trusted safety databases, industry-recognized hash databases, child-safety databases, anti-abuse databases, public or private safety lists, internal abuse-prevention systems, or systems operated by reputable child-protection, safety, security, or law-enforcement-related organizations. This may include systems designed to detect known CSAM or other illegal content. Technologies such as Microsoft PhotoDNA and similar hash-matching or perceptual-hashing systems are commonly used in the technology industry to detect known child exploitation material by comparing digital signatures or hashes rather than relying solely on manual review. You expressly acknowledge and agree that:

  • Ackaia One may perform safety analysis before encryption;
  • such analysis is compatible with Ackaia’s zero-knowledge storage model because zero-knowledge applies primarily to stored encrypted content after client-side encryption has completed;
  • the existence of end-to-end encryption does not prevent Ackaia from performing pre-encryption abuse-prevention checks;
  • Ackaia may block, reject, interrupt, flag, or restrict uploads when risk signals indicate suspected illegal, abusive, exploitative, or prohibited content;
  • Ackaia may preserve and process risk signals, hashes, technical records, logs, account identifiers, IP addresses, timestamps, and other relevant Metadata where necessary for safety, enforcement, reporting, legal compliance, or investigation;
  • Ackaia may report suspected CSAM or other serious illegal activity to appropriate authorities, child-protection organizations, reporting bodies, or law-enforcement channels where legally required or reasonably appropriate.

The Risk Assessment Engine is not intended for advertising, behavioral profiling, commercial data mining, or selling information about your files. Its purpose is safety, legal compliance, prevention of severe abuse, and protection of victims. The Risk Assessment Engine may not detect all illegal or harmful content. It may also generate false positives or false negatives. Ackaia may use automated systems, manual review of limited technical information, appeals processes, additional verification, account restrictions, or other safeguards where appropriate and feasible. You may not attempt to bypass, disable, manipulate, overload, deceive, reverse engineer for abuse, or interfere with the Risk Assessment Engine or any other safety mechanism.

11. Prohibited Content and Prohibited Conduct#

You may not use Ackaia One to create, upload, store, transmit, preserve, distribute, share, facilitate, promote, conceal, or otherwise process content or activity that is illegal, abusive, exploitative, harmful, fraudulent, or prohibited by these Terms. The following are strictly prohibited:

  • CSAM, child exploitation material, sexualized content involving minors, grooming content, sextortion material, child trafficking content, or any content that facilitates or promotes harm to children;
  • content involving non-consensual intimate imagery, sexual exploitation, coercion, blackmail, or abuse;
  • content that promotes, facilitates, instructs, or coordinates terrorism, violent extremism, credible threats, targeted violence, or severe physical harm;
  • malware, ransomware, spyware, credential theft tools, botnet tools, unauthorized intrusion tools, malicious scripts, or content primarily designed to compromise systems or data;
  • stolen credentials, stolen personal data, payment-card dumps, identity documents distributed without authorization, or tools and datasets primarily intended for fraud;
  • content that violates intellectual property rights, trade secrets, confidentiality obligations, privacy rights, publicity rights, or contractual restrictions;
  • content used to harass, stalk, threaten, extort, defame, dox, impersonate, or abuse another person;
  • content that violates applicable law, regulation, court order, professional duty, fiduciary duty, or legal obligation;
  • attempts to use encryption, public links, account systems, or Ackaia infrastructure to hide, distribute, preserve, or facilitate illegal content;
  • automated scraping, abuse of public links, excessive bandwidth consumption, denial-of-service activity, credential stuffing, spam, phishing, or attempts to disrupt the Service;
  • attempts to bypass storage limits, transfer limits, payment obligations, security systems, access controls, or abuse-prevention measures.

Ackaia maintains a zero-tolerance policy for CSAM and child exploitation. Any suspected involvement with CSAM may result in immediate account restriction, upload blocking, preservation of evidence, termination, reporting, and cooperation with appropriate authorities or child-protection organizations.

12. Enforcement, Blocking, Suspension, and Termination#

Ackaia may investigate suspected violations of these Terms. Investigations may involve automated systems, technical review, risk-signal review, Metadata review, account review, public-link review, payment review, security-log review, or other lawful and proportionate methods. Ackaia may take enforcement action when it reasonably believes that you have violated these Terms, created risk for users or third parties, abused the Service, attempted to bypass security controls, failed to pay required fees, or used the Service unlawfully. Enforcement actions may include:

  • blocking an upload;
  • disabling a public link;
  • limiting downloads or transfers;
  • requiring additional verification;
  • suspending or terminating an Account;
  • restricting access to specific features;
  • preserving technical records;
  • reporting suspected illegal activity;
  • refusing future service;
  • deleting or disabling access to content where technically and legally appropriate;
  • taking any other action reasonably necessary to protect the Service, users, third parties, victims, Ackaia, or the public.

Because Ackaia One uses encryption, Ackaia may not always be able to inspect or remove encrypted file contents directly. However, Ackaia may still restrict access to encrypted objects, accounts, links, storage records, download endpoints, transfer systems, and related infrastructure. Ackaia may act without prior notice when required by law, when necessary to prevent harm, when notice would create risk, when a serious violation is suspected, or when immediate action is necessary to protect children, victims, users, infrastructure, or the Service.

13. Reporting and Cooperation with Authorities#

Ackaia may report suspected illegal activity, including suspected CSAM, exploitation, threats, fraud, or serious abuse, to appropriate law-enforcement agencies, child-protection organizations, reporting bodies, or other competent authorities where legally required or reasonably appropriate. Ackaia may preserve and disclose relevant information in response to valid legal process, emergency requests, safety threats, legal obligations, or good-faith determinations that disclosure is necessary to prevent severe harm, protect children, protect victims, protect users, protect Ackaia, or comply with applicable law. Information preserved or disclosed may include Account information, payment identifiers, IP addresses, session logs, timestamps, public-link records, storage-object identifiers, transfer logs, risk signals, hashes, technical indicators, and other Metadata or records relevant to the suspected violation. Ackaia’s ability to disclose plaintext file contents may be limited by the zero-knowledge encryption model. However, this limitation does not prevent Ackaia from disclosing available Metadata, risk signals, hashes, account records, logs, or other information it lawfully possesses.

Ackaia One may allow you to create Public Links or otherwise share files and folders with other people. You are solely responsible for deciding what to share, who receives access, and whether the shared content may lawfully be shared. A Public Link may contain or rely on cryptographic material, access tokens, URL fragments, identifiers, or other mechanisms that allow recipients to access encrypted content. Anyone who possesses the necessary link and key material may be able to access the shared content. You understand and agree that:

  • sharing a link may grant access to the shared file or folder;
  • anyone who receives the link may copy, download, save, forward, screenshot, re-upload, or redistribute the content;
  • revoking a link may prevent future access through Ackaia’s systems, but it cannot revoke copies already downloaded, copied, cached, screenshotted, or redistributed;
  • Ackaia may disable Public Links that violate these Terms, exceed limits, create abuse risk, or are associated with prohibited content;
  • Ackaia may apply bandwidth, transfer, rate, security, and abuse-prevention limits to Public Links.

You may not use Public Links to distribute illegal content, infringing content, malware, CSAM, non-consensual intimate imagery, stolen data, or any other prohibited content.

15. Storage Limits, Transfer Limits, and Fair Use#

Ackaia One plans may include storage limits, daily transfer limits, public transfer limits, file-size limits, bandwidth limits, API limits, rate limits, feature limits, or other usage restrictions. Transfer limits may include both uploads and downloads. Public sharing may have separate limits from private account usage. Ackaia may measure limits using encrypted file sizes, stored object sizes, transfer records, or other technical accounting methods. Ackaia may enforce limits by preventing uploads, blocking downloads, throttling requests, disabling public links, requiring plan upgrades, delaying transfers, or restricting features. You may not attempt to bypass limits by creating multiple accounts, manipulating requests, splitting activity across accounts, abusing public links, automating downloads, exploiting implementation details, or using the Service in a way that degrades availability for others. Ackaia may apply fair-use restrictions even if a specific numeric limit has not been exceeded, where usage creates abnormal load, security risk, operational risk, abuse risk, or material harm to the Service.

16. Payments, Subscriptions, Billing, and Cancellation#

Certain Ackaia One features may require a paid subscription, usage-based payment, prepaid balance, payment method, or other billing arrangement. By subscribing to a paid plan or using a paid feature, you authorize Ackaia and its payment processors to charge applicable fees, taxes, usage charges, renewal amounts, and other amounts disclosed to you at purchase or during use. Unless otherwise stated, subscriptions may renew automatically until cancelled. You are responsible for cancelling before renewal if you do not want to continue a paid plan. Failure to pay may result in suspension, downgrade, restriction, deletion according to retention policies, loss of access, or termination. Ackaia may provide grace periods, but is not required to do so. Fees are generally non-refundable except where required by law or expressly stated by Ackaia. Promotional credits, trials, discounts, or free tiers may be modified, limited, revoked, or discontinued at any time. If your plan is cancelled, suspended, downgraded, or terminated, your ability to upload, download, share, or access content may be limited. Because encrypted content may require your own keys, you are responsible for exporting or backing up content before cancellation where possible.

17. Availability, Backups, Data Loss, and Service Changes#

Ackaia will make reasonable efforts to provide a reliable Service, but does not guarantee uninterrupted availability, permanent storage, error-free operation, or compatibility with every device, browser, network, or file type. The Service may be unavailable due to maintenance, upgrades, outages, third-party failures, attacks, rate limits, infrastructure issues, legal restrictions, emergency security actions, or events outside Ackaia’s control. You are responsible for maintaining your own backups of important files. Ackaia One should not be your only copy of critical data unless you have independently accepted that risk. Ackaia may implement deletion, retention, suspension, archival, or lifecycle policies for inactive accounts, unpaid accounts, deleted files, trash folders, expired shares, failed uploads, incomplete multipart uploads, or abandoned data. Such policies may vary by plan and may change over time. Ackaia is not responsible for loss of access caused by your loss of encryption keys, vault passphrases, local key material, devices, credentials, or recovery information.

18. Metadata, Logs, and Operational Records#

Although Ackaia One may encrypt file contents, the Service requires certain Metadata and operational records to function. Ackaia may collect, process, store, and use Metadata and logs for purposes including authentication, billing, storage accounting, transfer accounting, abuse prevention, security, debugging, service improvement, legal compliance, fraud prevention, support, rate limiting, and enforcement. Metadata may include:

  • Account identifiers;
  • plan and subscription information;
  • object identifiers;
  • encrypted file size and storage size;
  • upload, update, deletion, and access timestamps;
  • folder hierarchy and parent-child relationships;
  • public sharing status;
  • transfer usage;
  • IP addresses and session records;
  • device, browser, or client information;
  • risk signals, hashes, and abuse-prevention records;
  • payment and billing status;
  • error logs and security events.

Ackaia may minimize, protect, aggregate, pseudonymize, or delete Metadata where appropriate and feasible. However, some Metadata is necessary to provide the Service and cannot be fully hidden while maintaining functionality. Zero-knowledge storage does not mean zero Metadata.

19. Privacy Policy#

Ackaia’s processing of personal information is described in its Privacy Policy. The Privacy Policy explains what information Ackaia collects, how it uses that information, how long it may retain certain information, and what rights may apply to users. These Terms and the Privacy Policy should be read together. If there is a conflict between these Terms and the Privacy Policy regarding use of the Service, these Terms govern the contractual use of the Service, while the Privacy Policy governs the processing of personal information to the extent required by applicable privacy law.

20. User Content Ownership and License to Operate the Service#

You retain ownership of your User Content, subject to any rights held by third parties and applicable law. You grant Ackaia a limited, worldwide, non-exclusive, royalty-free license to host, store, transmit, process, display, retrieve, route, secure, back up, make available, and otherwise handle User Content and related Metadata solely as necessary to provide, maintain, secure, improve, enforce, and operate the Service. Because Ackaia One may use end-to-end encryption, Ackaia may not be able to view or use encrypted file contents in plaintext after encryption. However, you grant Ackaia the rights necessary to process files and signals before encryption where required by the Risk Assessment Engine, upload flow, safety systems, or other disclosed Service functionality. You represent and warrant that you have all rights necessary to upload, store, process, and share User Content through the Service.

21. Intellectual Property of Ackaia#

Ackaia owns or licenses all rights in the Service, including software, interfaces, designs, systems, trademarks, logos, documentation, architecture, security systems, product names, visual elements, code, and infrastructure, except for User Content and third-party materials. These Terms do not grant you ownership of Ackaia’s intellectual property. You receive only a limited, revocable, non-exclusive, non-transferable right to access and use the Service in accordance with these Terms. You may not copy, modify, distribute, sell, lease, sublicense, reverse engineer, attempt to extract source code from, or create derivative works of the Service except where expressly permitted by law or by a separate written license from Ackaia.

22. Source-Available Cryptography and Transparency#

Ackaia may publish portions of its cryptographic engine, technical specifications, documentation, protocol descriptions, or related materials under a source-available license. The purpose of source-available publication is to improve transparency, allow public inspection, support security review, and help users understand how Ackaia One protects stored content. Source-available does not necessarily mean open source. Published code may be subject to license restrictions, including restrictions on commercial use, competitive use, redistribution, modification, or production deployment. No security documentation, public repository, source-available release, blog post, diagram, or technical explanation modifies these Terms unless expressly incorporated by written amendment. Ackaia welcomes responsible security research, but you must comply with Ackaia’s security disclosure rules, avoid harm to users, avoid accessing data that does not belong to you, and avoid disrupting the Service.

23. Third-Party Services and Infrastructure#

Ackaia One may rely on third-party services, infrastructure providers, payment processors, hosting providers, storage providers, security vendors, analytics providers, email providers, child-safety systems, abuse-prevention services, or other vendors. Ackaia is not responsible for third-party services outside its reasonable control. Third-party services may have their own terms, privacy policies, security practices, availability limitations, and legal obligations. Use of third-party infrastructure does not necessarily mean that third parties can read encrypted file contents. However, third parties may process Metadata, encrypted blobs, payment information, network information, logs, or other data as necessary for their role.

24. Professional, Regulated, or Sensitive Use#

Ackaia One may be used by professionals handling sensitive information. However, Ackaia does not represent that the Service automatically satisfies all legal, regulatory, professional, medical, financial, governmental, confidentiality, evidentiary, data-retention, or compliance obligations applicable to you. You are solely responsible for determining whether the Service is appropriate for your intended use, including whether it satisfies obligations related to attorney-client privilege, medical confidentiality, professional secrecy, data protection, records retention, auditability, export controls, sector-specific regulation, or local law. Ackaia may offer additional compliance documentation, security documentation, data-processing terms, enterprise terms, or contractual commitments separately. Unless expressly agreed in writing, these Terms do not create regulated hosting, archival, fiduciary, escrow, medical-record, legal-record, or compliance-certification obligations.

25. Security Research and Vulnerability Disclosure#

Ackaia supports responsible security research. If you discover a vulnerability, you must report it through the security contact or disclosure process provided by Ackaia. You may not:

  • access, modify, delete, copy, or disclose data that does not belong to you;
  • degrade or disrupt the Service;
  • perform denial-of-service testing;
  • exfiltrate secrets, keys, or user data;
  • publicly disclose an unresolved vulnerability before Ackaia has had a reasonable opportunity to investigate and remediate;
  • use a vulnerability for personal gain, extortion, coercion, or unauthorized access.

Ackaia may provide safe-harbor terms separately. Unless such terms are published or agreed in writing, your testing must remain limited, lawful, non-destructive, and respectful of user privacy.

26. Export Controls and Sanctions#

You may not use, export, re-export, transfer, or access the Service in violation of applicable export-control, sanctions, embargo, or trade-compliance laws. You represent that you are not located in, organized under the laws of, or ordinarily resident in a jurisdiction where access to the Service is prohibited by applicable law, and that you are not subject to sanctions or restrictions that prohibit your use of the Service. Ackaia may restrict access to the Service where required by law, risk controls, payment limitations, infrastructure limitations, or compliance requirements.

27. Beta Features, Experimental Features, and Changes#

Ackaia may release beta, preview, experimental, early-access, or limited-availability features. Such features may be incomplete, unstable, changed without notice, or discontinued. Beta features may be subject to additional limitations, reduced support, separate terms, or additional risks. You should not rely on beta features for critical workflows unless Ackaia expressly states otherwise. Ackaia may modify the Service, including encryption implementation details, risk systems, upload flows, sharing systems, storage architecture, user interface, APIs, plans, pricing, limits, and documentation, as the Service evolves. Where changes materially affect your rights or obligations, Ackaia will provide notice where reasonably required by law or appropriate under the circumstances.

28. Disclaimers#

The Service is provided on an “as is” and “as available” basis to the maximum extent permitted by law. Ackaia does not warrant that:

  • the Service will be uninterrupted, error-free, or permanently available;
  • all data will always be preserved or recoverable;
  • encryption will protect against compromised devices, malware, malicious extensions, phishing, stolen credentials, weak passphrases, local attacks, or user error;
  • the Risk Assessment Engine will detect all prohibited content or avoid all false positives;
  • the Service will meet every legal, professional, regulatory, security, or business requirement applicable to you;
  • public links can be fully revoked after recipients have accessed or copied content;
  • any specific feature will remain available indefinitely.

Nothing in these Terms excludes warranties or rights that cannot be excluded under applicable law.

29. Limitation of Liability#

To the maximum extent permitted by law, Ackaia will not be liable for indirect, incidental, special, consequential, exemplary, punitive, or similar damages, including loss of profits, loss of revenue, loss of business, loss of goodwill, loss of data, loss of access, loss of use, or cost of substitute services. To the maximum extent permitted by law, Ackaia’s total liability for all claims arising out of or relating to the Service or these Terms will not exceed the amount you paid to Ackaia for the Service during the three months preceding the event giving rise to the claim, or one hundred U.S. dollars, whichever is greater. The limitations above apply regardless of the legal theory, whether based on contract, tort, negligence, strict liability, warranty, statute, or otherwise, and even if Ackaia has been advised of the possibility of such damages. Some jurisdictions do not allow certain limitations of liability. In such cases, the limitations apply to the maximum extent permitted by law.

30. Indemnification#

You agree to indemnify, defend, and hold harmless Ackaia, its officers, directors, employees, contractors, affiliates, service providers, and agents from and against any claims, damages, liabilities, losses, costs, expenses, and fees, including reasonable attorneys’ fees, arising out of or related to:

  • your use of the Service;
  • your User Content;
  • your violation of these Terms;
  • your violation of applicable law;
  • your infringement or misappropriation of third-party rights;
  • your sharing of content through Public Links;
  • your misuse of encryption, storage, or account systems;
  • your prohibited content or prohibited conduct.

Ackaia reserves the right to assume exclusive defense and control of any matter subject to indemnification, and you agree to cooperate with Ackaia’s defense.

31. Termination by You#

You may stop using the Service at any time. You may cancel your subscription or delete your Account through available account controls, subject to applicable billing, retention, security, and legal requirements. Before terminating your Account, you are responsible for downloading or exporting any content you wish to keep. Because files may be encrypted, Ackaia may not be able to restore access if you lose keys or terminate access before exporting content. Cancellation of a paid plan may not automatically delete all data immediately. Ackaia may retain certain records as required or permitted by law, security needs, backup systems, billing obligations, dispute resolution, fraud prevention, abuse prevention, or legitimate business purposes.

32. Termination by Ackaia#

Ackaia may suspend, restrict, or terminate your access to the Service if:

  • you violate these Terms;
  • you fail to pay required fees;
  • your use creates security, legal, operational, or reputational risk;
  • your Account is associated with fraud, abuse, illegal activity, CSAM, exploitation, malware, spam, or serious harm;
  • Ackaia is required to do so by law or legal process;
  • continuing to provide the Service is no longer commercially, technically, or legally feasible;
  • the Service or a feature is discontinued.

Upon termination, your right to access the Service ends immediately. Ackaia may delete, preserve, disable, restrict, or retain data according to applicable law, retention policies, security needs, backup practices, and enforcement requirements. Sections that by their nature should survive termination will survive, including provisions on prohibited conduct, enforcement, reporting, intellectual property, payment obligations, disclaimers, limitation of liability, indemnification, dispute resolution, and legal compliance.

33. Governing Law and Dispute Resolution#

These Terms are governed by the laws of the United States of America, without regard to conflict-of-law principles. Any dispute arising out of or relating to these Terms or the Service will be resolved in the courts located in New York, NY, unless applicable law requires a different forum or unless Ackaia and you agree to another dispute-resolution mechanism in writing. If you are a consumer, you may have mandatory rights under the laws of your place of residence that cannot be waived by these Terms. Before initiating formal proceedings, you agree to contact Ackaia and attempt to resolve the dispute informally, unless the dispute involves urgent injunctive relief, unauthorized access, intellectual property misuse, illegal content, child safety, or other circumstances where immediate action is appropriate.

34. Changes to These Terms#

Ackaia may update these Terms from time to time. Changes may be made to reflect new features, legal requirements, security practices, business changes, payment terms, risk controls, or operational updates. When changes are material, Ackaia will provide notice where reasonably required, such as through the Service, email, account notice, website notice, or other appropriate means. Your continued use of the Service after updated Terms become effective means you accept the updated Terms. If you do not agree to the updated Terms, you must stop using the Service and, where applicable, cancel your subscription.

35. Notices#

Ackaia may provide notices through the Service, by email, through your Account, by posting on its website, or by other reasonable means. You are responsible for keeping your contact information current. Notices sent to the email address associated with your Account may be deemed received even if you fail to read them, if they are filtered, or if your email address is no longer valid. Legal notices to Ackaia must be sent to: Ackaia Corp.​ legal@ackaia.com

36. Miscellaneous#

These Terms constitute the entire agreement between you and Ackaia regarding your use of the Service, except for additional written agreements, plan terms, data-processing agreements, enterprise agreements, or policies expressly incorporated by reference. If any provision of these Terms is found unenforceable, the remaining provisions will remain in full force and effect. Ackaia’s failure to enforce a provision is not a waiver of its right to do so later. You may not assign or transfer your rights or obligations under these Terms without Ackaia’s prior written consent. Ackaia may assign these Terms in connection with a merger, acquisition, corporate restructuring, sale of assets, change of control, or by operation of law. No person or entity other than you and Ackaia has rights under these Terms, except where expressly stated.

37. Contact#

For questions about these Terms, contact: Ackaia Corp.​ Email: legal@ackaia.com​ Website: ackaia.com​ Security Contact: Miguel Sales (m.sales@ackaia.com) For security vulnerabilities, please follow Ackaia’s responsible disclosure process described in the applicable security documentation. End of Terms