Acceptable Use Policy

Version 1.0 · Last updated: April 22, 2026

This Acceptable Use Policy ("AUP") is incorporated by reference into the Terms of Service. By using CloudGPU you agree to both documents. Capitalised terms have the meaning given in the Terms of Service.

1. Prohibited uses

You must not use CloudGPU, or any compute resource obtained through CloudGPU, for any of the following activities. Violations may result in immediate account suspension without refund and, where appropriate, referral to law enforcement.

1.1 Illegal activity

Any activity that is illegal under (a) the laws of the jurisdiction where the underlying GPU hardware is located (mainland China / Hong Kong SAR), (b) the laws of your own jurisdiction, or (c) applicable international law.

1.2 Weapons development

Development, design, testing, or manufacture of conventional, nuclear, chemical, biological, or radiological weapons, or the missile or drone systems that carry them. This includes computer-aided design of weapon components and computational modelling of weapon performance.

1.3 Sanctioned military end-use

Any use supporting the military, intelligence, or defence-industrial activities of entities subject to a United Nations, OFAC, EU, UK, or HKSAR sanctions programme.

1.4 Terrorism & violent extremism

Planning, supporting, inciting, or executing acts of terrorism or serious violence, including propaganda glorifying terrorist organisations or designed to recruit for them.

1.5 Child sexual abuse material (CSAM)

Generating, hosting, storing, transmitting, fine-tuning on, or otherwise handling child sexual abuse material. Zero tolerance. We will ban accounts without notice, preserve evidence, and report to the National Center for Missing & Exploited Children (NCMEC) or the equivalent authority in the jurisdiction with strongest enforcement reach.

1.6 Non-consensual intimate imagery & identity abuse

Creating or distributing sexually explicit deepfakes of real persons without their consent, non-consensual intimate imagery of any kind, or deepfakes intended to harass, defame, impersonate, or defraud a specific person.

1.7 Cybercrime

Developing, distributing, or operating malware, ransomware, spyware, credential stealers, exploit kits, or command-and-control infrastructure. Conducting DDoS attacks, credential stuffing, port scanning, phishing, or network intrusion.

1.8 Large-scale copyright infringement

Training models on datasets you do not have rights to use, distributing pirated content at scale, or running systems whose primary purpose is circumventing digital rights management (DRM).

1.9 Sanctions evasion

Evading or enabling others to evade sanctions imposed by any country or international body. Providing compute to sanctioned entities, or routing compute to or through sanctioned jurisdictions.

1.10 Cryptocurrency mining & proof-of-work

Any proof-of-work computation, including cryptocurrency mining. Our unit economics do not support this workload; accounts will be suspended on detection.

1.11 Mass fraudulent content

Mass generation of misleading or deceptive content: spam, phishing pages, fake product reviews, fake news articles, astroturfing campaigns, or content designed to manipulate elections or public debate by misrepresenting the identity of the speaker.

1.12 Scraping personal data of real individuals

Compiling or publishing databases of real individuals' personal information (names, addresses, phone numbers, government ID numbers, biometric data) without a clear lawful basis and the individuals' consent.

2. Restricted technologies

The following uses are not prohibited outright but require the user to ensure their own legal compliance, including any licensing, certification, registration, or third-party-consent obligations in their jurisdiction. CloudGPU is a general-purpose compute provider and does not certify workloads as safe or compliant for these uses.

3. Sanctions compliance

By registering for or using CloudGPU you represent and warrant, each time you access the Service, that:

CloudGPU uses IP-based geolocation and network metadata to enforce these representations. IP blocks may be imperfect; circumvention (VPN, residential proxy, etc.) does not cure a sanctions violation and will result in termination.

4. Your data handling obligations

When you process personal data using CloudGPU:

5. Enforcement

CloudGPU reserves the right to:

We will, where legally permitted, notify affected users of a data-disclosure request. We will challenge requests we believe are unlawful or disproportionate. We may publish an aggregated transparency report once the user base is large enough for aggregation to be meaningful.

6. Reporting violations

If you believe another user is violating this AUP, or if you encounter CSAM, a terrorism-related use, or a serious sanctions violation, please email abuse@cloudgpu.app. Please include: (a) the nature of the abuse, (b) the URL or service URL involved, (c) the timestamp in UTC, and (d) any supporting screenshots. We aim to triage abuse reports within 24 hours.

7. Updates to this AUP

We may update this AUP from time to time. The version number and last-updated date at the top of this page reflect the currently-effective version. Material changes will be announced by email to registered users with at least 14 days' notice. Continued use of the Service after the effective date constitutes acceptance of the updated AUP.

8. Contact

General questions: support@cloudgpu.app. Abuse reports: abuse@cloudgpu.app.