9 Total
5 High severity
3 Medium severity
1 Low severity
Summary

This is Amazon Web Services' Acceptable Use Policy — the rulebook for what you are and are not allowed to do when using AWS cloud services. The most important thing to know is that AWS can immediately suspend or terminate your access and remove your content if it determines you have violated these rules, including for the actions of your own users or customers. If you use AWS to build a product or service, you must make sure your own users also follow these rules, or you risk losing access to all your AWS infrastructure.

Technical Summary

The AWS Acceptable Use Policy (AUP) governs all use of Amazon Web Services cloud infrastructure, services, and APIs, and is incorporated by reference into the AWS Customer Agreement and other governing service contracts as a binding legal instrument. The AUP imposes absolute prohibitions on specific categories of use — including illegal content distribution, security violations, network abuse, email/messaging abuse, and the operation of systems designed to harm third parties — and requires customers to ensure downstream end-users comply with equivalent restrictions. Notable provisions include AWS's unilateral right to investigate suspected violations and to remove or disable access to any content or resource, a broad prohibition on 'harmful contact' and 'phishing' that extends liability to customers whose end-users engage in such conduct, and an explicit prohibition on using services to generate or distribute content that violates third-party intellectual property rights. The AUP engages the Computer Fraud and Abuse Act (18 U.S.C. § 1030), the CAN-SPAM Act (15 U.S.C. § 7701), the DMCA (17 U.S.C. § 512), GDPR Article 28 (processor obligations), and the FTC Act Section 5 for unfair or deceptive trade practices. Compliance teams must ensure their service agreements with end-users incorporate equivalent use restrictions and that incident response procedures address AWS's self-help enforcement rights, which include suspension without prior notice.

Institutional Analysis

REGULATORY EXPOSURE: This document engages the Computer Fraud and Abuse Act (18 U.S.C. § 1030) through its prohibition on unauthorized access and network interference; the CAN-SPAM Act (15 U.S.C. § 7…

REGULATORY EXPOSURE: This document engages the Computer Fraud and Abuse Act (18 U.S.C. § 1030) through its prohibition on unauthorized access and network interference; the CAN-SPAM Act (15 U.S.C. § 7701) and analogous international anti-spam frameworks through its email/messaging abuse provisions; …

🔒

Compliance intelligence locked

Regulatory exposure, material risk, and due diligence action items.

Evidence Provenance
Captured March 6, 2026 18:27 UTC
Document ID CA-D-000028
Version ID CA-V-000024
Wayback Machine View archived versions →
SHA-256 465240a1d70b2c133d9db1d009cd54219a81597be922882750bc69826085723b
✓ Snapshot stored ✓ Text extracted ✓ Change verified ✓ Cryptographically signed
Change Timeline
High Severity — 5 provisions
Medium Severity — 3 provisions
Low Severity — 1 provision