Prohibited Business Verticals
Illegal drugs (substances designed to mimic illegal drugs, synthetic cannabis, herbal smoking blends, herbal incense, and HCG/HGH-like substances)
Products/services to be used to create drugs or grow them
Pyramid Selling / Schemes
Multi-Level Marketing
Escort Agencies / Massage Parlours / Sexual Services
- Promotion of Prostitution
- Timeshare and timeshare maintenance
- Independent financial advisers (IFA), payday loans and unsecured loan/lines
- Counterfeit Goods/Replicas
Trade of weapons, ammunitions, military arms, explosive devices, and firearm parts
Products/services that promote hate, violence, discrimination, terrorism, harassment, or abuse racism, religious persecution, glorification of war
- Products designed to circumvent copyright protection techniques
Providing gambling services in jurisdictions where this is illegal or (where applicable) offering gambling services without a valid license to the relevant jurisdiction.
- Illegal products/services or any service providing peripheral support of illegal activities
Fake references and other services/products that foster deception (including fake IDs and government documents)
Mail order spouse and international match-making services
Social media “click farms” (i.e., the sale of clicks/likes/reviews/endorsements on social
- Telemarketing companies involved with the following methods of operations
Offering a free gift, prize, or sweepstakes/contest entry as an inducement to purchase products/services
Inbound telemarketing companies that receive calls as the result of post cards or similar mailings (as opposed to catalogue or media advertising).
- Selling products/services as an agent for a third party
Merchants engaged in any form of deceptive marketing practice including but not limited
Merchants offering substantial rebates or special incentives (e.g., free gift, prize, sweepstakes)
Fake dating profiles: merchants actively using fake profiles, chats etc. and making promises to users on a platform
Aggressive software; malware including but not limited to computer viruses, worms, Trojan horses, spyware
- Merchants that have ransom-like or extortion-like basis for their business model (e.g., mugshot removal)
Negative response marketing techniques by any type of merchant (i.e., customer is automatically charged if they do not return the merchandise at the end of a free trial period)
Jammers or devices that are designed to block, jam, or interfere with cellular and personal communication device/signals (e.g., GPS), Decryption and descrambler products including mod chips, Spy devices / services / software
Proxy avoidance/ Anonymizer sites
Usenet Merchants/ Internet Forums/ Bulletin Board Systems