blog.cloudflare.com Open in urlscan Pro
2606:4700:4400::6812:29ae  Public Scan

URL: https://blog.cloudflare.com/cloudflares-abuse-policies-and-approach/
Submission: On August 31 via api from US — Scanned from DE

Form analysis 2 forms found in the DOM

<form id="mktoForm_1653" novalidate="novalidate" class="mktoForm mktoHasWidth mktoLayoutLeft" style="font-family: Helvetica, Arial, sans-serif; font-size: 13px; color: rgb(51, 51, 51); width: 261px;">
  <style type="text/css">
    .mktoForm .mktoButtonWrap.mktoSimple .mktoButton {
      color: #fff;
      border: 1px solid #75ae4c;
      padding: 0.4em 1em;
      font-size: 1em;
      background-color: #99c47c;
      background-image: -webkit-gradient(linear, left top, left bottom, from(#99c47c), to(#75ae4c));
      background-image: -webkit-linear-gradient(top, #99c47c, #75ae4c);
      background-image: -moz-linear-gradient(top, #99c47c, #75ae4c);
      background-image: linear-gradient(to bottom, #99c47c, #75ae4c);
    }

    .mktoForm .mktoButtonWrap.mktoSimple .mktoButton:hover {
      border: 1px solid #447f19;
    }

    .mktoForm .mktoButtonWrap.mktoSimple .mktoButton:focus {
      outline: none;
      border: 1px solid #447f19;
    }

    .mktoForm .mktoButtonWrap.mktoSimple .mktoButton:active {
      background-color: #75ae4c;
      background-image: -webkit-gradient(linear, left top, left bottom, from(#75ae4c), to(#99c47c));
      background-image: -webkit-linear-gradient(top, #75ae4c, #99c47c);
      background-image: -moz-linear-gradient(top, #75ae4c, #99c47c);
      background-image: linear-gradient(to bottom, #75ae4c, #99c47c);
    }
  </style>
  <div class="mktoFormRow">
    <div class="mktoFieldDescriptor mktoFormCol" style="margin-bottom: 10px;">
      <div class="mktoOffset" style="width: 10px;"></div>
      <div class="mktoFieldWrap mktoRequiredField"><label for="Email" id="LblEmail" class="mktoLabel mktoHasWidth" style="width: 100px;">
          <div class="mktoAsterix">*</div>Email Address
        </label>
        <div class="mktoGutter mktoHasWidth" style="width: 10px;"></div><input id="Email" name="Email" maxlength="255" aria-labelledby="LblEmail InstructEmail" type="email" class="mktoField mktoEmailField mktoHasWidth mktoRequired"
          aria-required="true" style="width: 150px;" placeholder="Email Address"><span id="InstructEmail" tabindex="-1" class="mktoInstruction"></span>
        <div class="mktoClear"></div>
      </div>
      <div class="mktoClear"></div>
    </div>
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="CloudFlare_POP__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="CountryCode__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Lead_Source_Detail__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="[ACQ] WEB - GBL - Blog Subscriber" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="LeadSource" class="mktoField mktoFieldDescriptor mktoFormCol" value="Inbound - Blog Subscriber" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="GCLID__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="utmcampaign" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="utmsource" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="utmmedium" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Accept_Language__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="GACLIENTID__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="GATRACKID__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="GAUSERID__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="GOX__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="botManagementrv1" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoButtonRow"><span class="mktoButtonWrap mktoSimple" style="margin-left: 120px;"><button type="submit" class="mktoButton">Subscribe</button></span></div><input type="hidden" name="formid" class="mktoField mktoFieldDescriptor"
    value="1653"><input type="hidden" name="munchkinId" class="mktoField mktoFieldDescriptor" value="713-XSC-918">
</form>

<form novalidate="novalidate" class="mktoForm mktoHasWidth mktoLayoutLeft" style="font-family: Helvetica, Arial, sans-serif; font-size: 13px; color: rgb(51, 51, 51); visibility: hidden; position: absolute; top: -500px; left: -1000px; width: 1600px;">
</form>

Text Content

Contact Sales: +1 (888) 274-3482


THE CLOUDFLARE BLOG

Subscribe to receive notifications of new posts:

*
Email Address


















Subscribe

Subscription confirmed. Thank you for subscribing!

Product News
Speed & Reliability
Security
Serverless
Zero Trust
Developers
Deep Dive
Life @Cloudflare
Product News
Speed & Reliability
Security
Serverless
Zero Trust
Developers
Deep Dive
Life @Cloudflare


CLOUDFLARE'S ABUSE POLICIES & APPROACH

08/31/2022

August 31, 2022 2:00PM

 * Matthew Prince
 * Alissa Starzak

Cloudflare launched nearly twelve years ago. We’ve grown to operate a network
that spans more than 275 cities in over 100 countries. We have millions of
customers: from small businesses and individual developers to approximately 30
percent of the Fortune 500. Today, more than 20 percent of the web relies
directly on Cloudflare’s services.

Over the time since we launched, our set of services has become much more
complicated. With that complexity we have developed policies around how we
handle abuse of different Cloudflare features. Just as a broad platform like
Google has different abuse policies for search, Gmail, YouTube, and Blogger,
Cloudflare has developed different abuse policies as we have introduced new
products.

We published our updated approach to abuse last year at:

https://www.cloudflare.com/trust-hub/abuse-approach/

However, as questions have arisen, we thought it made sense to describe those
policies in more detail here.  

The policies we built reflect ideas and recommendations from human rights
experts, activists, academics, and regulators. Our guiding principles require
abuse policies to be specific to the service being used. This is to ensure that
any actions we take both reflect the ability to address the harm and minimize
unintended consequences. We believe that someone with an abuse complaint must
have access to an abuse process to reach those who can most effectively and
narrowly address their complaint — anonymously if necessary. And, critically, we
strive always to be transparent about both our policies and the actions we take.


CLOUDFLARE'S PRODUCTS

Cloudflare provides a broad range of products that fall generally into three
buckets: hosting products (e.g., Cloudflare Pages, Cloudflare Stream, Workers
KV, Custom Error Pages), security services (e.g., DDoS Mitigation, Web
Application Firewall, Cloudflare Access, Rate Limiting), and core Internet
technology services (e.g., Authoritative DNS, Recursive DNS/1.1.1.1, WARP). For
a complete list of our products and how they map to these categories, you can
see our Abuse Hub.

As described below, our policies take a different approach on a
product-by-product basis in each of these categories.


HOSTING PRODUCTS

Hosting products are those products where Cloudflare is the ultimate host of the
content. This is different from products where we are merely providing security
or temporary caching services and the content is hosted elsewhere. Although many
people confuse our security products with hosting services, we have distinctly
different policies for each. Because the vast majority of Cloudflare customers
do not yet use our hosting products, abuse complaints and actions involving
these products are currently relatively rare.

Our decision to disable access to content in hosting products fundamentally
results in that content being taken offline, at least until it is republished
elsewhere. Hosting products are subject to our Acceptable Hosting Policy. Under
that policy, for these products, we may remove or disable access to content that
we believe:

 * Contains, displays, distributes, or encourages the creation of child sexual
   abuse material, or otherwise exploits or promotes the exploitation of minors.
 * Infringes on intellectual property rights.
 * Has been determined by appropriate legal process to be defamatory or
   libelous.
 * Engages in the unlawful distribution of controlled substances.
 * Facilitates human trafficking or prostitution in violation of the law.
 * Contains, installs, or disseminates any active malware, or uses our platform
   for exploit delivery (such as part of a command and control system).
 * Is otherwise illegal, harmful, or violates the rights of others, including
   content that discloses sensitive personal information, incites or exploits
   violence against people or animals, or seeks to defraud the public.

We maintain discretion in how our Acceptable Hosting Policy is enforced, and
generally seek to apply content restrictions as narrowly as possible. For
instance, if a shopping cart platform with millions of customers uses Cloudflare
Workers KV and one of their customers violates our Acceptable Hosting Policy, we
will not automatically terminate the use of Cloudflare Workers KV for the entire
platform.

Our guiding principle is that organizations closest to content are best at
determining when the content is abusive. It also recognizes that overbroad
takedowns can have significant unintended impact on access to content online.


SECURITY SERVICES

The overwhelming majority of Cloudflare's millions of customers use only our
security services. Cloudflare made a decision early in our history that we
wanted to make security tools as widely available as possible. This meant that
we provided many tools for free, or at minimal cost, to best limit the impact
and effectiveness of a wide range of cyberattacks. Most of our customers pay us
nothing.

Giving everyone the ability to sign up for our services online also reflects our
view that cyberattacks not only should not be used for silencing vulnerable
groups, but are not the appropriate mechanism for addressing problematic content
online. We believe cyberattacks, in any form, should be relegated to the dustbin
of history.

The decision to provide security tools so widely has meant that we've had to
think carefully about when, or if, we ever terminate access to those services.
We recognized that we needed to think through what the effect of a termination
would be, and whether there was any way to set standards that could be applied
in a fair, transparent and non-discriminatory way, consistent with human rights
principles.

This is true not just for the content where a complaint may be filed  but also
for the precedent the takedown sets. Our conclusion — informed by all of the
many conversations we have had and the thoughtful discussion in the broader
community — is that voluntarily terminating access to services that protect
against cyberattack is not the correct approach.


AVOIDING AN ABUSE OF POWER

Some argue that we should terminate these services to content we find
reprehensible so that others can launch attacks to knock it offline. That is the
equivalent argument in the physical world that the fire department shouldn't
respond to fires in the homes of people who do not possess sufficient moral
character. Both in the physical world and online, that is a dangerous precedent,
and one that is over the long term most likely to disproportionately harm
vulnerable and marginalized communities.

Today, more than 20 percent of the web uses Cloudflare's security services. When
considering our policies we need to be mindful of the impact we have and
precedent we set for the Internet as a whole. Terminating security services for
content that our team personally feels is disgusting and immoral would be the
popular choice. But, in the long term, such choices make it more difficult to
protect content that supports oppressed and marginalized voices against attacks.


REFINING OUR POLICY BASED ON WHAT WE’VE LEARNED

This isn't hypothetical. Thousands of times per day we receive calls that we
terminate security services based on content that someone reports as offensive.
Most of these don’t make news. Most of the time these decisions don’t conflict
with our moral views. Yet two times in the past we decided to terminate content
from our security services because we found it reprehensible. In 2017, we
terminated the neo-Nazi troll site The Daily Stormer. And in 2019, we terminated
the conspiracy theory forum 8chan.

In a deeply troubling response, after both terminations we saw a dramatic
increase in authoritarian regimes attempting to have us terminate security
services for human rights organizations — often citing the language from our own
justification back to us.

Since those decisions, we have had significant discussions with policy makers
worldwide. From those discussions we concluded that the power to terminate
security services for the sites was not a power Cloudflare should hold. Not
because the content of those sites wasn't abhorrent — it was — but because
security services most closely resemble Internet utilities.

Just as the telephone company doesn't terminate your line if you say awful,
racist, bigoted things, we have concluded in consultation with politicians,
policy makers, and experts that turning off security services because we think
what you publish is despicable is the wrong policy. To be clear, just because we
did it in a limited set of cases before doesn’t mean we were right when we did.
Or that we will ever do it again.

But that doesn’t mean that Cloudflare can’t play an important role in protecting
those targeted by others on the Internet. We have long supported human rights
groups, journalists, and other uniquely vulnerable entities online through
Project Galileo. Project Galileo offers free cybersecurity services to
nonprofits and advocacy groups that help strengthen our communities.

Through the Athenian Project, we also play a role in protecting election systems
throughout the United States and abroad. Elections are one of the areas where
the systems that administer them need to be fundamentally trustworthy and
neutral. Making choices on what content is deserving or not of security
services, especially in any way that could in any way be interpreted as
political, would undermine our ability to provide trustworthy protection of
election infrastructure.


REGULATORY REALITIES

Our policies also respond to regulatory realities. Internet content regulation
laws passed over the last five years around the world have largely drawn a line
between services that host content and those that provide security and conduit
services. Even when these regulations impose obligations on platforms or hosts
to moderate content, they exempt security and conduit services from playing the
role of moderator without legal process. This is sensible regulation borne of a
thorough regulatory process.

Our policies follow this well-considered regulatory guidance. We prevent
security services from being used by sanctioned organizations and individuals.
We also terminate security services for content which is illegal in the United
States — where Cloudflare is headquartered. This includes Child Sexual Abuse
Material (CSAM) as well as content subject to Fight Online Sex Trafficking Act
(FOSTA). But, otherwise, we believe that cyberattacks are something that
everyone should be free of. Even if we fundamentally disagree with the content.

In respect of the rule of law and due process, we follow legal process
controlling security services. We will restrict content in geographies where we
have received legal orders to do so. For instance, if a court in a country
prohibits access to certain content, then, following that court's order, we
generally will restrict access to that content in that country. That, in many
cases, will limit the ability for the content to be accessed in the country.
However, we recognize that just because content is illegal in one jurisdiction
does not make it illegal in another, so we narrowly tailor these restrictions to
align with the jurisdiction of the court or legal authority.

While we follow legal process, we also believe that transparency is critically
important. To that end, wherever these content restrictions are imposed, we
attempt to link to the particular legal order that required the content be
restricted. This transparency is necessary for people to participate in the
legal and legislative process. We find it deeply troubling when ISPs comply with
court orders by invisibly blackholing content — not giving those who try to
access it any idea of what legal regime prohibits it. Speech can be curtailed by
law, but proper application of the Rule of Law requires whoever curtails it to
be transparent about why they have.


CORE INTERNET TECHNOLOGY SERVICES

While we will generally follow legal orders to restrict security and conduit
services, we have a higher bar for core Internet technology services like
Authoritative DNS, Recursive DNS/1.1.1.1, and WARP. The challenge with these
services is that restrictions on them are global in nature. You cannot easily
restrict them just in one jurisdiction so the most restrictive law ends up
applying globally.

We have generally challenged or appealed legal orders that attempt to restrict
access to these core Internet technology services, even when a ruling only
applies to our free customers. In doing so, we attempt to suggest to regulators
or courts more tailored ways to restrict the content they may be concerned
about.

Unfortunately, these cases are becoming more common where largely copyright
holders are attempting to get a ruling in one jurisdiction and have it apply
worldwide to terminate core Internet technology services and effectively wipe
content offline. Again, we believe this is a dangerous precedent to set, placing
the control of what content is allowed online in the hands of whatever
jurisdiction is willing to be the most restrictive.

So far, we’ve largely been successful in making arguments that this is not the
right way to regulate the Internet and getting these cases overturned. Holding
this line we believe is fundamental for the healthy operation of the global
Internet. But each showing of discretion across our security or core Internet
technology services weakens our argument in these important cases.


PAYING VERSUS FREE

Cloudflare provides both free and paid services across all the categories above.
Again, the majority of our customers use our free services and pay us nothing.

Although most of the concerns we see in our abuse process relate to our free
customers, we do not have different moderation policies based on whether a
customer is free versus paid. We do, however, believe that in cases where our
values are diametrically opposed to a paying customer that we should take
further steps to not only not profit from the customer, but to use any proceeds
to further our companies’ values and oppose theirs.

For instance, when a site that opposed LGBTQ+ rights signed up for a paid
version of DDoS mitigation service we worked with our Proudflare employee
resource group to identify an organization that supported LGBTQ+ rights and
donate 100 percent of the fees for our services to them. We don't and won't talk
about these efforts publicly because we don't do them for marketing purposes; we
do them because they are aligned with what we believe is morally correct.


RULE OF LAW

While we believe we have an obligation to restrict the content that we host
ourselves, we do not believe we have the political legitimacy to determine
generally what is and is not online by restricting security or core Internet
services. If that content is harmful, the right place to restrict it is
legislatively.

We also believe that an Internet where cyberattacks are used to silence what's
online is a broken Internet, no matter how much we may have empathy for the
ends. As such, we will look to legal process, not popular opinion, to guide our
decisions about when to terminate our security services or our core Internet
technology services.

In spite what some may claim, we are not free speech absolutists. We do,
however, believe in the Rule of Law. Different countries and jurisdictions
around the world will determine what content is and is not allowed based on
their own norms and laws. In assessing our obligations, we look to whether those
laws are limited to the jurisdiction and consistent with our obligations to
respect human rights under the United Nations Guiding Principles on Business and
Human Rights.

There remain many injustices in the world, and unfortunately much content online
that we find reprehensible. We can solve some of these injustices, but we cannot
solve them all. But, in the process of working to improve the security and
functioning of the Internet, we need to make sure we don’t cause it long-term
harm.

We will continue to have conversations about these challenges, and how best to
approach securing the global Internet from cyberattack. We will also continue to
cooperate with legitimate law enforcement to help investigate crimes, to donate
funds and services to support equality, human rights, and other causes we
believe in, and to participate in policy making around the world to help
preserve the free and open Internet.

We protect entire corporate networks, help customers build Internet-scale
applications efficiently, accelerate any website or Internet application, ward
off DDoS attacks, keep hackers at bay, and can help you on your journey to Zero
Trust.

Visit 1.1.1.1 from any device to get started with our free app that makes your
Internet faster and safer.

To learn more about our mission to help build a better Internet, start here. If
you're looking for a new career direction, check out our open positions.

Discuss on Twitter Discuss on Hacker News Discuss on Reddit
Abuse Freedom of Speech Legal

Follow on Twitter

Matthew Prince |@eastdakota
Cloudflare |Cloudflare

Related Posts

July 25, 2017 7:31PM


NET NEUTRALITY DAY: CLOUDFLARE + FIGHT FOR THE FUTURE

For Net Neutrality Day on July 12, Fight for the Future launched a Cloudflare
App installable for websites all over the world. Sites with it installed saw as
many as 178M page views prompting the users to write to their local
congressional representative on the importance of Net Neutrality....

   By 
 * Jameson Sundell

Cloudflare Apps ,  Community ,  Freedom of Speech ,  Legal ,  Net Neutrality

February 27, 2019 1:00PM


OUT OF THE CLOUDS AND INTO THE WEEDS: CLOUDFLARE’S APPROACH TO ABUSE IN NEW
PRODUCTS

In a blogpost yesterday, we addressed the principles we rely upon when faced
with numerous and various requests to address the content of websites that use
our services....

   By 
 * Justin Paine

Freedom of Speech ,  Legal ,  Politics ,  Abuse ,  Due Process

August 16, 2017 11:29PM


WHY WE TERMINATED DAILY STORMER

Earlier today, Cloudflare terminated the account of the Daily Stormer. We've
stopped proxying their traffic and stopped answering DNS requests for their
sites. We've taken measures to ensure that they cannot sign up for Cloudflare's
services ever again....

   By 
 * Matthew Prince

Freedom of Speech ,  Community ,  DDoS ,  Legal ,  Politics

June 12, 2014 2:30PM


NAMING PROJECT GALILEO

Earlier today, CloudFlare announced Project Galileo to protect free speech on
the Web by using its sophisticated anti-DDoS resources....

   By 
 * Kenneth R. Carter

Project Galileo ,  Cloudflare's Mission ,  Legal ,  Community ,  Freedom of
Speech
 * Sales
 * Enterprise Sales
 * Become a Partner



Contact Sales:

+1 (888) 99 FLARE

+1 650 319 8930



 * Getting Started
 * Pricing
 * Case Studies
 * White Papers
 * Webinars
 * Learning Center

 * Community
 * Community Hub
 * Blog
 * Project Galileo
 * Athenian Project
 * Cloudflare TV

 * Developers
 * Developer Hub
 * Technical Resources
 * Cloudflare Workers
 * Integrations

 * Support
 * Support
 * Cloudflare Status
 * Compliance
 * GDPR

 * Company
 * About Cloudflare
 * Our Team
 * Press
 * Analysts
 * Careers
 * Internet Summit
 * Logo
 * Network Map

© 2022 Cloudflare, Inc. | Privacy Policy | Terms of Use | Trust & Safety |
Trademark