Pricing P2P Encrypted Chat Desktop App Browser Extension
Upload a file

Acceptable Use Policy

Last Updated: March 1, 2026

1. Purpose

This Acceptable Use Policy ("AUP") defines what you may and may not do when using FileShot.io ("Service"). It supplements our Terms of Service and Privacy Policy. Using the Service in any way constitutes acceptance of this AUP. We may update this policy at any time; continued use after updates constitutes acceptance.

2. Permitted Uses

FileShot.io is built for legitimate, privacy-respecting file transfer. Permitted uses include:

  • Sharing your own files, documents, media, or code with intended recipients
  • Transferring files between your own devices
  • Sending work deliverables, client assets, or project files in a professional context
  • Encrypted backup or transit of personal data you own
  • Developer workflows: logs, build artifacts, config files, database exports
  • Creative work: photos, video footage, audio, and design files you have rights to
  • Academic or research data you are authorized to share
  • Using free tools (converter, PDF editor, archive builder, etc.) for legitimate purposes

3. Prohibited Content

You may not upload, share, store, or transmit any content that:

3.1 Is Illegal

  • Child sexual abuse material (CSAM) or any sexual content involving minors — zero tolerance; reported to NCMEC and law enforcement immediately
  • Content that facilitates terrorism, mass violence, or human trafficking
  • Stolen personal data, credentials, or financial information
  • Content that violates any applicable local, national, or international law

3.2 Violates Intellectual Property Rights

  • Copyrighted works you do not have rights to distribute (movies, music, software, ebooks, etc.)
  • Content distributed in violation of a license agreement
  • Trademarked material used in a way that creates confusion or infringement

3.3 Is Malicious or Harmful

  • Malware, ransomware, spyware, trojans, keyloggers, or any malicious executable
  • Phishing kits, credential harvesting pages, or deceptive files
  • Files designed to exploit vulnerabilities in software or systems
  • Content used to conduct denial-of-service attacks

3.4 Constitutes Harassment or Abuse

  • Content intended to harass, threaten, or harm specific individuals
  • Doxxing: sharing private personal information of others without their consent
  • Non-consensual intimate imagery ("revenge porn")
  • Hate speech targeting individuals or groups based on protected characteristics

3.5 Abuses the Platform

  • Automated uploads at scale intended to overwhelm storage or bandwidth
  • Using FileShot as permanent hosting infrastructure (we are a transfer tool, not a CDN)
  • Circumventing rate limits, file size limits, or expiration policies through automated means
  • Attempting to access, disrupt, or tamper with infrastructure or other users' files
  • Creating false or misleading file names to deceive recipients into downloading harmful content

4. Zero-Knowledge Encryption and Enforcement

FileShot.io is built on a zero-knowledge architecture: your file is encrypted in your browser before upload and we never receive your decryption key. We cannot read the contents of your files.

This architecture protects your privacy — but it does not exempt you from this AUP. Using zero-knowledge encryption to conceal prohibited content (CSAM, malware, stolen data, etc.) is a serious violation and does not shield you from legal consequences. We cooperate fully with law enforcement when presented with valid legal process.

Because all uploads are encrypted, content-based scanning is not possible. We apply file-type validation, metadata analysis, and behavioral abuse detection to maintain platform safety.

5. Copyright & DMCA

We respect intellectual property rights and comply with the Digital Millennium Copyright Act (DMCA). If you believe a file on our service infringes your copyright:

  • Email a complete DMCA takedown notice to abuse@fileshot.io
  • Include: identification of the copyrighted work, the URL of the infringing file, your contact information, a statement of good faith, and your signature
  • We will respond to valid notices promptly and take down infringing content
  • Repeat infringers will have their accounts terminated

Note: Zero-knowledge encrypted files cannot be reviewed for content prior to removal. For encrypted files, we will disable the link upon receipt of a valid DMCA notice; we cannot confirm or deny the file's contents.

6. Reporting Abuse

If you encounter content that you believe violates this policy, please report it promptly:

Email: abuse@fileshot.io

Include the full URL of the file or page you are reporting and a brief description of the concern. We aim to review all abuse reports within 24 hours.

For CSAM specifically, you may also report directly to the NCMEC CyberTipline. We report all confirmed CSAM to NCMEC and relevant law enforcement regardless of encryption status.

7. Enforcement

When we determine a violation of this AUP has occurred or is reasonably suspected, we may take any of the following actions without prior notice:

  • File removal: Immediate deletion or disabling of the link to the offending file
  • Account suspension or termination: Temporary or permanent suspension of your account and all associated files
  • IP blocking: Rate limiting or blocking of IP addresses associated with abuse
  • Legal referral: Disclosure of information to law enforcement or other authorities when required by law or when we believe there is a credible threat to safety
  • Billing action: Forfeiture of paid subscription without refund for serious violations

We reserve the right to investigate any activity that we believe may violate this AUP. The severity of our response will be proportional to the nature and seriousness of the violation.

8. Fair Use of Storage and Bandwidth

FileShot.io provides unlimited storage to all users as a core feature. "Unlimited" means we do not artificially cap storage for legitimate use — but it does not mean you may abuse our infrastructure:

  • FileShot is a transfer tool, not a content delivery network or permanent storage service. Files should be shared and then allowed to expire.
  • Automated bulk uploading that has no legitimate human transfer purpose is prohibited.
  • Using FileShot as origin storage for a website, app, or media distribution service is not a permitted use.
  • Generating excessive bandwidth through public redistribution of file links (i.e., effectively using us as a CDN) may result in rate limiting or removal.

Accounts or IPs found to be abusing storage or bandwidth in bad faith may be throttled, suspended, or required to upgrade to a plan that better matches their use case.

9. Relationship to Terms of Service

This AUP is incorporated by reference into our Terms of Service. Violations of this AUP are violations of our Terms of Service and subject to all remedies described therein. In the event of any conflict between this AUP and the Terms of Service, the Terms of Service control.

10. Contact

For abuse reports: abuse@fileshot.io

For general questions about this policy: admin@fileshot.io or use our contact page.

For DMCA takedown notices, include "DMCA" in the subject line and send to abuse@fileshot.io.