Policy Center

Copyright & Policy

This page explains how Cloudzor identifies and removes illegal content, why our enforcement is strict, how to report issues, and how to appeal if you believe we made a mistake. It applies to all users, visitors, and content hosted or transmitted via Cloudzor.

Last updated: October 6, 2025
Strict by necessityDue processPrivacy-aware

1) Overview & Scope

Cloudzor is a hosting and delivery platform for legitimate content. We prohibit illegal materials and policy violations and act quickly when we detect them or receive credible reports. This policy applies to all uploads, links, metadata, and derived assets (thumbnails, previews, archives) stored or proxied by Cloudzor.

2) Why our enforcement is strict

  • Harm reduction: Illegal files (e.g., malware or unlawful media) endanger users and partners.
  • Creator rights: Piracy deprives authors of revenue and undermines ecosystems.
  • Legal obligations: Hosts must respond expeditiously to notices and court orders.
  • Network trust: Partners require low-abuse profiles to keep services stable.
  • Fairness: Consistent, predictable rules protect compliant users and speed resolution.

4) Definitions

  • Illegal content: Materials whose possession, distribution, or access is unlawful under applicable law.
  • Infringing content: Works uploaded without authorization from the rights holder.
  • Notice: A report from a rights holder or authorized agent identifying specific material.
  • Counter-notice: A response disputing a removal, with sufficient legal basis.

5) Prohibited content

  • Copyright-infringing files (audio, video, software, images, text) without authorization or license.
  • Malware, exploits, or files designed to exfiltrate data, gain unauthorized access, or cause harm.
  • Content illegal under applicable law, or violating valid court orders or regulatory directives.
  • Non-consensual or privacy-invasive content when unlawful to host or distribute.

We may block borderline categories if risk is high (e.g., mass-reported mirrors, obvious piracy indexes).

6) Detection & screening

  • Automated screening: Hash/fingerprint checks against internal and external blocklists.
  • Heuristics & signals: File-type validation, structure analysis, metadata patterns, URL intelligence.
  • Behavioral patterns: Abuse-prone bursts, mirrored trees, evasion attempts.
  • User reports: Prioritized manual review when sufficiently detailed evidence is provided.

Automated flags are triaged by humans when necessary. Obvious illegal content may be removed instantly.

7) Enforcement actions

  • Immediate link disablement and file removal for confirmed illegal materials.
  • Account restrictions or termination for severe or repeated violations.
  • Blocking of related mirrors or directories where reasonably linked to the same abuse.
  • Escalation to relevant authorities when legally required.

8) Repeat-infringer policy

Accounts with repeated, substantiated violations may be terminated. Factors include number, severity, and recency of violations, cooperation with investigations, and demonstrable remediation efforts.

9) Takedown notices (how to report)

Rights holders and users can report abuse at /abuse. Include direct URLs or file IDs, a description of the work, legal basis, and a statement of good faith. We prioritize complete, precise notices.

  • Exact URLs/file IDs (no generic search queries).
  • Proof of ownership or authorization (for IP claims).
  • Jurisdiction/legal basis (e.g., DMCA §512, EU/Swiss law).
  • Contact email for follow-up.

10) Counter-notice & appeals

If you believe a removal was erroneous, submit a counter-notice at /appeal with file/URL, case ID (if any), your role (rights holder/uploader), and reasoning (license, authorization, fair use or other legal basis).

We may restore material if the counter-notice is persuasive and lawful, or request further documentation.

11) Data & log retention

  • Minimal audit logs (file IDs, hashes, actions, timestamps) are retained for up to 30 days.
  • We may preserve longer where required by law or to enforce this policy and defend legal claims.
  • Access to case data is restricted to staff on a need-to-know basis.

12) Transparency & metrics

We aim to periodically publish aggregate statistics on notices received, actions taken, and appeal outcomes (subject to legal and privacy constraints).

13) Jurisdiction & conflicts

Primary jurisdiction is Switzerland and the EU (hosting/processing dependent). Where there is a conflict of laws, we apply the stricter rule to illegal content while preserving due-process avenues for users.

14) User responsibilities

  • Only upload content you own or are authorized to distribute.
  • Respect third-party licenses, trademarks, and publicity/privacy rights.
  • Do not attempt to evade filters, mirrors, or bans.

15) Trademark & impersonation

Trademark misuse and impersonation are prohibited. Provide registration or evidence of rights in your notice. We may remove deceptive content and restrict accounts that impersonate brands or individuals.

16) Security, malware & exploits

Security-related uploads that could cause harm (e.g., active malware, credential dumps, working exploits) are prohibited. Educational or research content must not provide weaponized, ready-to-abuse payloads.

17) Platform boundaries

  • Hosting vs. links: We can act on content we host or proxy. Off-platform links may still trigger action if they facilitate abuse on Cloudzor.
  • Third-party services: We may disable integrations used primarily for evasion or abuse.

18) Contact

Abuse reports: /abuse • Appeals: /appeal

For legal correspondence please use the channels above. We may verify identity/authority before discussing cases.

This page is for information only and does not constitute legal advice. Terms may change to reflect evolving law and platform needs.