Acceptable Use Policy

Last Update: December 16, 2025

How to use this page

This page provides information on the types of businesses, products, and industries that can’t use Privy’s services. To use Privy’s services, you must remain compliant with these rules and restrictions. 

High-risk jurisdictions and persons

Jurisdictions or persons that may never use Privy, regardless of the industry.

Prohibited businesses

Industries that can’t use Privy, and products Privy doesn’t support.

Prohibited Uses of Privy Products

Privy may never be used for certain activities, regardless of the industry.

High-risk jurisdictions and persons

Use of Privy’s services for any dealings, engagement, or sale of goods or services either directly or indirectly with the following are prohibited:

High-risk jurisdictions

Persons located in, resident in, or a citizen of, or products or services originating from jurisdictions that Privy has determined for various reasons, including legal, contractual, and commercial reasons, to be prohibited, including, Cuba, Iran, North Korea, and Syria, and the Crimea, Donetsk, and Luhansk regions.

High-risk persons

Persons Privy has determined for various reasons, including legal, contractual, and commercial reasons, to be prohibited, such as those individuals or entities named to a restricted person or party list of, or otherwise restricted by, the United States, United Kingdom, European Union, or United Nations, including the sanctions maintained by the US Office of Foreign Assets Control or the Denied Persons List or Entity List maintained by the US Department of Commerce.

Prohibited businesses

You must not use Privy’s services for any illegal activities or for the businesses of the types listed below. The types of businesses listed here are representative of prohibited categories, but this is not an exhaustive list.

  • Illegal drugs and substances designed to mimic illegal drugs

  • Illegal adult services

  • Content, products, or services promoting or displaying non-consensual sexual acts, sexual abuse, or child exploitation or abuse

  • Products and services involved in or facilitating human trafficking

  • Businesses engaging in deceptive, fraudulent, or abusive acts or practices

  • Any other products or services that directly infringe or facilitate infringement upon the trademark, patent, copyright, trade secrets, or proprietary rights of any third party (including Privy)

  • Businesses operating in or undertaking activities in violation of any law or regulation, including, without limitation, any applicable export control laws, anti-money laundering laws, payment services or money transmission laws, privacy laws, or any other purpose not reasonably intended by Privy

Prohibited Uses of Privy Products

You must not use Privy’s products in a manner that is harmful to Privy, Privy’s customers, or third parties. The types of uses listed here are representative of prohibited uses, but this is not an exhaustive list.  

  • Use of Privy’s products with false, manipulated, inaccurate, or misleading information regarding your identity, business entity, or the nature of the business

  • Use of Privy’s products in the capacity as a custodian, payment services institution, money transmitter, or similar capacity without appropriate licensure 

  • Use of Privy’s intellectual property other than as permitted in writing by Privy; use of the Privy name or logo including use of Privy trade or service marks inconsistent with the Privy Brand Guidelines, or in a manner that otherwise harms Privy or the Privy brand; any action that implies an untrue endorsement by, or affiliation with, Privy

  • Jeopardizes the security of your or another customers’ Wallets, Credentials, Privy User ID, or accounts (such as allowing another person or entity to log in to the Services as you)

  • Attempts, in any manner, to obtain the Credentials, password, account, or other security information from any other user

  • Bypasses any measures Privy may use to prevent or restrict access to the Services (or other accounts, computer systems or networks connected to the Service)

  • Violates the security of any computer network, or cracks any passwords or security encryption codes;

  • Runs Maillist, Listserv, any form of auto-responder or “spam” on the Services, or any processes that run or are activated while you are not logged into the Services, or that otherwise interfere with the proper working of the Services (including by placing an unreasonable load on the Services’ infrastructure);

  • “Crawls,” “scrapes,” or “spiders” any page, data, or portion of or relating to the Services or Content (through use of manual or automated means);

  • Decompiles, reverse engineers, or otherwise attempts to obtain the source code or underlying ideas or information of or relating to the Services.

A violation of any of the foregoing is grounds for termination of your right to use or access the Services.