8 Total
4 High severity
4 Medium severity
0 Low severity
Summary

This is Amazon Web Services' rulebook for what you are and are not allowed to do when using AWS cloud services — covering everything from running websites to processing data to sending emails through AWS infrastructure. The single most important thing to know is that AWS can suspend or terminate your account immediately and without advance notice if it determines you have violated any of these rules, which could take down any application or business you run on AWS. If you rely on AWS for critical services, you should maintain backups and understand which activities are prohibited so you are not caught off guard by an unexpected suspension.

Technical Summary

The AWS Acceptable Use Policy (AUP) governs permissible and prohibited uses of Amazon Web Services cloud infrastructure, services, and APIs, operating as a binding addendum to the AWS Customer Agreement or equivalent enterprise agreement. Its most significant obligation is an absolute prohibition on using AWS services for illegal, harmful, or abusive activities, including unauthorized system access, distribution of malicious code, violations of intellectual property rights, and content that exploits minors — with AWS retaining unilateral authority to suspend or terminate access for violations without notice. Notably, AWS reserves the right to investigate suspected violations and cooperate with law enforcement, and it may modify the AUP at any time with changes effective upon posting, placing the burden on users to monitor updates — a provision that creates asymmetric contractual risk. The AUP engages the Computer Fraud and Abuse Act (18 U.S.C. § 1030), CAN-SPAM Act (15 U.S.C. § 7701), COPPA (15 U.S.C. § 6501), and intersects with international frameworks including the EU Network and Information Security Directive (NIS2) and GDPR Article 28 processor obligations for AWS customers acting as data controllers. Compliance teams operating regulated workloads on AWS must ensure their own use cases do not inadvertently trigger AUP prohibitions, particularly in contexts involving security testing, AI-generated content, healthcare data, and financial services where regulatory overlap creates heightened enforcement exposure.

Evidence Provenance
Captured April 19, 2026 06:03 UTC
Document ID CA-D-000028
Version ID CA-V-000641
Wayback Machine View archived versions →
SHA-256 81a5b31fdec6cb285a2169be6e946476749b9f851b29b39f7e57892fb401ad7b
✓ Snapshot stored ✓ Text extracted ✓ Change verified ✓ Cryptographically signed
Institutional Analysis

🔒 Institutional analysis locked

Regulatory exposure by statute, material risk assessment, vendor due diligence action items, and enforcement precedent. Available on Professional.

Upgrade to Professional — $149/mo
Change Timeline
View full version history (0 captures) →
High Severity — 4 provisions
Medium Severity — 4 provisions

Cross-platform context

See how other platforms handle Customer Liability for End-User Conduct and similar clauses.

Compare across platforms →

Applicable Regulations

EU AI Act
European Union
BIPA
Illinois, USA
CCPA/CPRA
California, USA
COPPA
United States Federal
CFAA
United States Federal
CAN-SPAM
United States Federal
DMA
European Union
DMCA
United States Federal
DSA
European Union
GDPR
European Union
HIPAA
United States Federal
TCPA
United States Federal
UK GDPR
United Kingdom