10 Total
4 High severity
6 Medium severity
0 Low severity
Summary

This is Shopify's rulebook for what merchants and users are and are not allowed to do on the platform. It lists a wide range of businesses and activities that Shopify will not support, such as selling counterfeit products, certain weapons, adult content, or running scams. If Shopify decides you have broken these rules, they can shut down your store.

Technical Summary

Shopify's Acceptable Use Policy (AUP) governs all activities conducted through Shopify's services by merchants, partners, and users. It establishes a comprehensive list of prohibited content categories and business activities, including counterfeit goods, regulated products (firearms, tobacco, cannabis), adult content, deceptive practices, and illegal services. The policy grants Shopify broad unilateral authority to suspend or terminate accounts found in violation, without specifying advance notice requirements. Notable provisions include restrictions on financial services offerings (e.g., cryptocurrency, lending), intellectual property infringement, and specific prohibited industries that merchants may not operate within the platform. The AUP applies globally but defers to applicable local law regarding certain regulated product categories.

Institutional Analysis

The AUP engages FTC regulations on deceptive trade practices, FinCEN/BSA obligations relating to financial services restrictions, and various state and federal laws concerning regulated product categ…

The AUP engages FTC regulations on deceptive trade practices, FinCEN/BSA obligations relating to financial services restrictions, and various state and federal laws concerning regulated product categories including firearms (ATF), cannabis (state-level), and pharmaceuticals (FDA). Compliance teams …

🔒

Compliance intelligence locked

Regulatory exposure, material risk, and due diligence action items.

Evidence Provenance
Captured March 15, 2026 06:04 UTC
Document ID CA-D-000124
Version ID CA-V-000102
Wayback Machine View archived versions →
SHA-256 ac6d9d44e46a316fd28ea5529c161de48c743ea8cf8c4e80e48440a93a6b35e9
✓ Snapshot stored ✓ Text extracted ✓ Change verified ✓ Cryptographically signed
Change Timeline
High Severity — 4 provisions
Medium Severity — 6 provisions