Acceptable Use Policy
Last Updated: December 2025
1. Purpose
This Acceptable Use Policy ("AUP") outlines the permitted and prohibited uses of the Cryptio encryption software (the "Service"). This Policy is incorporated by reference into the Terms of Service and is legally binding on all users.
2. Intended Use
Cryptio is designed to provide legitimate data protection services, including:
- Protecting sensitive business documents and client information
- Securing personal files and private communications
- Complying with data protection regulations (Data Protection Act 843, GDPR, HIPAA, etc.)
- Protecting intellectual property and trade secrets
- Safeguarding attorney-client privileged communications
3. Prohibited Uses
You must NOT use Cryptio for any illegal purpose or to facilitate any criminal activity.
3.1 Absolutely Prohibited
The following uses are strictly prohibited and may result in immediate termination and referral to law enforcement:
- Child Sexual Abuse Material (CSAM): Using Cryptio to store, transmit, or conceal any content depicting the sexual exploitation of minors
- Terrorism: Using Cryptio to plan, facilitate, or conceal terrorist activities as defined under the Anti-Terrorism Act, 2008 (Act 762)
- Obstruction of Justice: Using Cryptio to destroy, conceal, or alter evidence relevant to a lawful investigation or legal proceeding
- Money Laundering: Using Cryptio to conceal the proceeds of crime or facilitate money laundering as defined under the Anti-Money Laundering Act, 2008 (Act 749)
- Cybercrime: Using Cryptio in connection with offences under the Cybersecurity Act, 2020 (Act 1038)
3.2 Other Prohibited Uses
- Violating any applicable law or regulation
- Infringing the intellectual property rights of others
- Harassing, threatening, or harming others
- Distributing malware or engaging in hacking activities
- Circumventing security measures or attempting to gain unauthorized access to systems
- Reselling or sublicensing the Service without authorization
4. User Responsibility
You are solely responsible for all content you encrypt using Cryptio and for ensuring that your use complies with all applicable laws. While we cannot monitor or access your encrypted content due to our zero-knowledge architecture, this does not exempt you from legal responsibility for misuse.
5. Enforcement
5.1 Violation Consequences
If we become aware of a violation of this AUP, we may:
- Issue a warning
- Suspend your access to the Service
- Terminate your license without refund
- Report the violation to appropriate law enforcement authorities
5.2 Technical Limitations
Due to our zero-knowledge architecture, we cannot proactively monitor your use of the Service or the content you encrypt. Enforcement action will typically be based on information provided by third parties, law enforcement, or your own communications with us.
6. Reporting Violations
If you become aware of any violation of this AUP, please report it to abuse@getcryptio.com. We take all reports seriously and will investigate to the extent possible within our technical capabilities.