◆ filetemp.io
Upload My Files

Acceptable Use Policy

Last updated: 2026-04-23

This Acceptable Use Policy (“AUP”) describes content and conduct that is prohibited on filetemp.io. It is incorporated into our Terms of Service. Violation may result in immediate removal of content, blocking of your access, and/or referral to law enforcement.

Strictly prohibited content

You may not upload, store, link to, or distribute any of the following through the Service:

  • Child sexual abuse material (CSAM). Any sexual or sexualised depiction of a minor, real or computer-generated, in any form. When we become aware of apparent CSAM on the Service we preserve the file and its metadata (per 18 U.S.C. § 2258A and equivalent laws in other jurisdictions), submit a report to the National Center for Missing & Exploited Children (NCMEC) CyberTipline and/or the relevant national hotline (e.g. UK IWF, INHOPE network), and provide the file, its cryptographic hash, and any metadata we hold to those authorities. Because we do not collect government-identifying information from uploaders (no accounts, no required identification), the metadata we can provide is limited to what is described in our Privacy Notice; we cannot retroactively produce information we never collected.
  • Non-consensual intimate imagery (NCII), “revenge porn”, or sexually explicit depictions of any identifiable person without their explicit, informed, current consent.
  • Deepfake or AI-generated sexual content of real people created without their consent.
  • Content that sexualises, grooms, or endangers minors, including non-explicit sexualised imagery of minors.
  • Terrorist or violent-extremist content, including content produced by or in support of designated terrorist organisations, or content that incites, glorifies, or instructs imminent violence.
  • Content that incites, threatens, or facilitates violence against any person or group.
  • Malware, ransomware, exploit kits, stalkerware, credential stealers, RATs, or any code intended to damage, disrupt, or gain unauthorised access to computer systems or data.
  • Stolen data dumps, breached personal-data dumps, leaked credentials, payment-card numbers, or stolen account information.
  • Doxing material — the personal information of others (real name, address, phone, ID documents, financial records) shared without consent.
  • Pirated software, films, music, books, games, premium streams, or any content that infringes intellectual-property rights.
  • Forged or counterfeit identity documents, payment instruments, or government-issued credentials.
  • Content that depicts gratuitous gore, real-world torture, animal cruelty, or other shock content intended to harass or disturb.
  • Content used for unlawful harassment, stalking, blackmail, or extortion.
  • Content that violates applicable export controls or sanctions law (e.g. ITAR, EAR).
  • Any other content that is unlawful in your jurisdiction or in the jurisdiction where the Service is operated.

Strictly prohibited conduct

  • Using the Service to attack, probe, or interfere with any network, computer system, or service (yours or anyone else's).
  • Circumventing or attempting to circumvent any security or authentication mechanism, rate limit, abuse filter, file-size limit, or expiration.
  • Using the Service for command-and-control, payload delivery, or any other component of an attack chain.
  • Mass-uploading, scripted abuse, or any usage pattern that imposes an unreasonable load on the Service.
  • Uploading content on behalf of, or to evade a takedown against, a previously-banned user or piece of content.
  • Misrepresenting the source, author, or rights of any content.

Enforcement

We may, in our sole discretion and without notice:

  • Remove or disable access to any content;
  • Block any IP address, network, or session;
  • Preserve content and associated metadata for law-enforcement disclosure; and
  • Report violations to NCMEC, INHOPE, IC3, your national CSAM hotline, or other competent authorities.

Where the Service is operated within the United States, we comply with our reporting obligations under 18 U.S.C. § 2258A regarding apparent CSAM.

Reporting violations

If you encounter content on the Service that violates this AUP, please report it via /abuse. We aim to act on credible reports of illegal content within 24 hours, and on credible reports of CSAM immediately. We do not publish a contact email address; the report form is the only public channel. If you supply an email address in the form we may use it to reply or to ask follow-up questions.

Files self-destruct on schedule. No tracking. No accounts.
Terms · Acceptable Use · DMCA · Report Abuse · Privacy
Uploading CSAM, terrorist content, malware, NCII, or other illegal material is strictly prohibited and will be removed and reported to authorities. By using this service you agree to the Terms and Acceptable Use Policy.