Peer5. The Peer to Peer, P2P CDN For Streaming With WebRTC. Boost Your Video Streaming Performance

Legal Information

Acceptable Use Policy

This Acceptable Use Policy ("AUP") specifies the actions prohibited by Peer5 Inc. Peer5 Inc. is a company incorporated under the laws of the State of Delaware (hereinafter referred to as "Peer5"). This AUP specifies prohibited user behavior of Peer5's Content Delivery Network which is based on third party CDNs and a p2p network operated by Peer5 ("CDN"). Peer5 reserves the right to modify this AUP at any time by posting an updated version of this document at Peer5's website.

Illegal Use

Peer5's CDN and all other services may be used only for lawful purposes. Transmission, distribution or storage of any material in violation of any applicable law or regulation is prohibited. This includes, without limitation, material protected by copyright, trademark, trade secret or other intellectual property right used without proper authorization, and material that is obscene, defamatory, constitutes an illegal threat, or violates export control laws.

Adult Content

Peer5 allows "adult content" providers to use Peer5's services. There are no restrictions on what "adult content" providers may serve, however all content must be legal under the laws of the United States of America and each of the 50 States of the Union, as well as to any other applicable law and any restrictions that may apply with respect to age limitation and verification of users, etc. "Adult content" providers must abide by all other Terms of Service and the Services and License Agreement at all times. The use of Peer5's services to store, post, display, transmit, advertise or otherwise make available child pornography is prohibited. Peer5 will as required by law, notify law enforcement agencies when it becomes aware of the presence of child pornography on, or being transmitted through its services.

Malicious or Unauthorized Hacking

Violations of system or network security are strictly prohibited, and Peer5 reserves the right to immediately suspended or terminate an account suspected in such violation, without notice. Moreover, an authorized breach of system or network security may result in criminal and civil liability. Peer5 will investigate incidents involving such violations and may involve and will cooperate with law enforcement if a criminal violation is suspected. Examples of system or network security violations include, but are not limited to, the following: Unauthorized access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without express authorization of the owner of the system and network; Unauthorized monitoring of data or traffic on any network or system without express authorization of the owner of the system and network; Interference with service to any user, host or network including, without limitation, mail-bombing, flooding, deliberate attempts to overload a system and broadcast attacks; Forging of any TCP-IP packet header or any part of the header information in an email or a newsgroup posting.


Posting the same or similar message to one or more newsgroups (excessive cross-posting or multiple-posting, also known as "SPAM") is explicitly prohibited.


Sending unsolicited mail messages (SPAM), including, without limitation, commercial advertising and informational announcements, is explicitly prohibited. A user shall not use another site's mail server or system to relay mail without the express permission of the site. In addition, this policy applies to any email or content transmitted by a user or on a user's behalf which uses a Peer5 account as a mailbox for responses or promotes content hosted or transmitted using Peer5 facilities, or which indicates in any way that Peer5 was involved in the transmission of such email or content.


Complaints regarding suspected Illegal Use or System or Network Security issues should be sent to


Infringement Notifications under the Digital Millennium Copyright Act

To file a notice of infringement with Peer5, you must provide a written communication that contains your legal signature (we cannot process a DMCA complaint without a signature) by email (in PDF format), fax or regular mail that sets forth the items specified below. Please note that in addition to being forwarded to the person who provided the allegedly infringing content, a copy of your legal notice will be sent to a third-party which may publish and/or annotate it. As such, your letter (with your personal information removed) may be forwarded to Chilling Effects (

To expedite our ability to process your request, please use the following format (including section numbers):

  1. Identify in sufficient detail the copyrighted work that you believe has been infringed upon (for example, "The copyrighted work at issue is the text that appears on") or other information sufficient to specify the copyrighted work being infringed (for example, "The copyrighted work at issue is the "Touch Not This Cat" by Dudley Smith, published by Smith Publishing, ISBN #0123456789″).
  2. Identify the material that you claim is infringing the copyrighted work listed in item #1 above. If you are sending a large number of URLs in one removal request, please also send an electronic copy of the notice to
  3. Provide information reasonably sufficient to permit Peer5 to contact you (email address is preferred).
  4. Provide information, if possible, sufficient to permit Peer5 to notify the owner/administrator of the allegedly infringing webpage or other content (email address is preferred).
  5. Include the following statement: "I have a good faith belief that use of the copyrighted materials described above as allegedly infringing is not authorized by the copyright owner, its agent, or the law."
  6. Include the following statement: "I swear, under penalty of perjury, that the information in the notification is accurate and that I am the copyright owner or am authorized to act on behalf of the owner of an exclusive right that is allegedly infringed."
  7. Sign the paper.
  8. Send the written communication to the following email address:

9. Counter Notifications

10. The administrator of an affected site or the provider of affected content may make a counter notification pursuant to sections 512(g)(2) and (3) of the Digital Millennium Copyright Act. When Peer5 receives a counter notification, we may reinstate the material in question. To file a counter notification with Peer5, you must provide a written communication that contains your LEGAL SIGNATURE (we cannot process a DMCA complaint without a signature) by email (in PDF format), fax or regular mail that sets for the items specified below. Please note that you will be liable for damages (including costs and attorney's fees) if you materially misrepresent that a product or activity is not infringing the copyrights of others. Accordingly, if you are not sure whether certain material infringes the copyrights of others, we suggest that you first contact an attorney. A sample counter notification may be found at Chilling Effects.

For any additional questions regarding the DMCA process for Peer5 services, please contact us at

Privacy Policy

Peer5 demonstrates its commitment to customers' privacy by providing this statement. We will do everything in our power to ensure your right to privacy. We are committed to developing long lasting relationships that are built on trust.

Personal Data Transmissions Are Encrypted

When you order from Peer5, all your personal information is protected. We use Secure Sockets Layer (SSL), the industry standard, for encrypting all personal information. Peer5 keeps all your information confidential.

Collection of Personal Data

We log visitor's domain, IP address and other device unique identifiers automatically; this information identifies only the computer or device that is being used to access our services. Peer5 uses several tools such as HTML offline storage and other web storage tools and protocols to gather data stored in your web browser, in both local storage and session storage. We may also use cookies to help us improve our website and web hosting services. Information collected in in these ways is used mainly to constantly improve and maintain our services, including among others, for ensuring the technical functioning of our system, to help prevent fraudulent use of our services, optimize the content we display, personalize your experience and for developing new services and features. For example, we may use location information for directing your stream and data feed to the nearest geographic relevant server which support our services, and therefore allowing you to enjoy our services at better speed.

We may also use third-party cookies to collect statistics in aggregate form in analysis tools such as Google Analytics. Other users may be temporarily exposed to details of your IP address.

Policy Changes

Peer5 is dedicated to providing the best content delivery network service possible to every one of our clients. We are also dedicated to staying on top of available technology. While Peer5 strives to provide our clients with reasonable notification, Peer5 reserves the right to change its policy at any time to meet the needs of our customers, changing laws and new technology.

Language for Customers' Terms of Use

Customers who use the Peer5 services are obligated by the License and Services Agreement which they signed with Peer5 to include in their website / application's terms of use language in connection with the operation of Peer5. The following language is a suggestion and shall not be viewed as a legal or any other advice to the customer, in connection with the compliance of such language with any privacy law or in any other context. The Customer is advised to consult with its own legal counsel in connection with the inclusion of such language and shall have no claim towards Peer5, which specifically disclaims liability, in connection therewith.

"Please note that by using our services, you are also agreeing to use the services by utilizing a technology provided by a p2p services provider (the "p2p Provider"). The p2p Provider uses your local resources to store content temporarily, upload content to other users, and download content from different users that can effectively contribute to your experience and other users' experience, while temporarily exposing other users to your IP address. The p2p Provider is doing some computation on your device to choose the best sources, negotiate the pieces of information, validate the correctness of pieces and similar actions that are required to operate the p2p network. Please be aware that though p2p Provider strives to limit such effect, the use by p2p Provider of your resources may put a burden on your internet connection and downloading speed, and might increase your use under a limited internet connection package."