The program policies below apply to Tenor. The policies play an important role in maintaining a positive experience for everyone using Google products.

We need to curb abuses that threaten our ability to provide these services, and we ask that everyone abide by the policies below to help us achieve this goal. After we are notified of a potential policy violation, we may review the content and take action, including restricting access to the content, removing the content, and limiting or terminating a userā€™s access to Google products.

When applying these policies, we may make exceptions based on artistic, educational, documentary, or scientific considerations, or where there are other substantial benefits to the public from not taking action on the content.

Be sure to check back from time to time, as these policies may change. Please also refer to Google's Terms of Service for more information.

Report Abuse

If you believe that someone is violating the policies found below,  you may flag it for review. On the Tenor App you do this by holding down on the content and scrolling to the ā€œReportā€ button. On Tenor.com you click the flag button next to the content in question.

Program Policies

Account Hijacking

Do not access another userā€™s account without their permission. We may take appropriate action if we are notified of account hijacking, which may include removing access to some of our products or disabling your Google Account.

Child Sexual Abuse and Exploitation

Do not create, upload, or distribute content that exploits or abuses children. This includes all child sexual abuse materials. To report content on a Google product that may exploit a child, click ā€œReport abuse.ā€  If you find content elsewhere on the internet, please contact the appropriate agency in your country directly.

 

More broadly, Google prohibits the use of our products to endanger children. This includes but is not limited to predatory behavior towards children such as:

  • ā€˜Child groomingā€™(for example, befriending a child online to facilitate, either online or offline, sexual contact and/or exchanging sexual imagery with that child);
  • ā€˜Sextortionā€™ (for example, threatening or blackmailing a child by using real or alleged access to a childā€™s intimate images); 
  • Sexualization of a minor (for example, imagery that depicts, encourages or promotes the sexual abuse of children or the portrayal of children in a manner that could result in the sexual exploitation of children); and 
  • Trafficking of a child (for example, advertising or solicitation of a child for commercial sexual exploitation).  
 

We will remove such content and take appropriate action, which may include reporting to the National Center for Missing & Exploited Children, limiting access to product features, and disabling accounts. If you believe a child is in danger of or has been subject to abuse, exploitation, or trafficking, contact the police immediately. If you have already made a report to the police and still need help, or you have concerns a child is being or was being endangered on our products, you can report the behavior to Google.

Circumvention

Do not engage in actions intended to bypass our policies or subvert restrictions placed on your account. This includes the creation or use of multiple accounts or other methods intended to engage in a behavior that was previously prohibited.

Dangerous and Illegal Activities  

Do not use this product to engage in illegal activities or to promote activities, goods, services, or information that cause serious and immediate harm to people or animals. While we permit general information for educational, documentary, scientific, or artistic purposes about this content, we draw the line when the content directly facilitates harm or encourages illegal activity. We will take appropriate action if we are notified of unlawful activities, which may include reporting you to the relevant authorities.

Harassment, Bullying, and Threats  

Do not harass, bully, or threaten others. We also donā€™t allow this product to be used to engage or incite others in these activities. This includes singling someone out for malicious abuse, threatening someone with serious harm, sexualizing someone in an unwanted way, exposing private information of someone else that could be used to carry out threats, disparaging or belittling victims of violence or tragedy or harassing in other ways, or inciting others to carry out these activities. Keep in mind that online harassment is illegal in many places and can have serious offline consequences for both the harasser and the victim. We may take appropriate action if we are notified of threats of harm or other dangerous situations, which may include reporting you to the relevant authorities.

Hate Speech    

Do not engage in hate speech. Hate speech is content that promotes or condones violence, discrimination, disparagement, or has the primary purpose of inciting hatred against an individual or group on the basis of their race or ethnic origin, religion, disability, age, nationality, veteran status, sexual orientation, gender, gender identity, or any other characteristic that is associated with systemic discrimination or marginalization.  

Impersonation and Misrepresentation of Identity  

Do not impersonate a person or organization or misrepresent yourself.  This includes impersonating any person or organizations you donā€™t represent; providing misleading information about a user/siteā€™s identity, qualifications, ownership, purpose, products, services, or business; or falsely implying affiliation with, or endorsement by, another individual or organization. 

 

This also includes content or accounts misrepresenting or concealing their ownership or primary purpose such as misrepresenting or intentionally concealing your country of origin or other material details about yourself when directing content about politics, social issues, or matters of public concern to users in a country other than your own. We do allow parody, satire, and the use of pseudonyms or pen names -- just avoid content that is likely to mislead your audience about your true identity.

Irrelevant Content

Do not distribute content thatā€™s off-topic or doesnā€™t address the content or topic in question.

Malware and Similar Malicious Content

Do not transmit malware or any content that harms or interferes with the operation of the networks, servers, end user devices, or other infrastructure. This includes the direct hosting, embedding, or transmission of malware, viruses, destructive code, or other harmful or unwanted software or similar content. This also includes content that transmits viruses, causes pop-ups, attempts to install software without the userā€™s consent, or otherwise impacts users with malicious code. See our Safe Browsing Policies for more information.

Misleading Content

Do not distribute content that deceives, misleads, or confuses users. This includes:

 

Misleading content related to civic and democratic processes: content that is demonstrably false and could significantly undermine participation or trust in civic or democratic processes. This includes information about public voting procedures, political candidate eligibility based on age / birthplace, election results, or census participation that contradicts official government records. It also includes incorrect claims that a political figure or government official has died, been involved in an accident, or is suffering from a sudden serious illness.

 

Misleading content related to harmful conspiracy theories: content that promotes or lends credibility to beliefs that individuals or groups are systematically committing acts that cause widespread harm. This content is contradicted by substantial evidence and has resulted in or incites violence.

 

Misleading content related to harmful health practices: misleading health or medical content that promotes or encourages others to engage in practices that may lead to serious physical or emotional harm to individuals, or serious public health harm.

 

Manipulated media: media that has been technically manipulated or doctored in a way that misleads users and may pose a serious risk of egregious harm.

 

Misleading content may be allowed in an educational, documentary, scientific, or artistic context, but please be mindful to provide enough information to help people understand this context. In some cases, no amount of context will allow this content to remain on our platforms.

Non-Consensual Intimate Imagery (NCII) 

Do not store or distribute private nude, sexually explicit, or intimate images or videos without the subjectā€™s consent. If someone has sent a private nude, sexually explicit, or intimate image or video of you, please report it to us here.

Personal and Confidential Information

Do not store or distribute other peopleā€™s personal or confidential information without authorization. ā€‹This includes the use of sensitive information, such as U.S. Social Security numbers, bank account numbers, credit card numbers, images of signatures, and personal health documents. In most cases where this information is broadly available elsewhere on the internet or in public records, like national ID numbers listed on a government website, we generally donā€™t process enforcement actions.

Phishing

Do not use this product for phishing. This includes soliciting or collecting sensitive data such as passwords, financial details, and social security numbers.

Regulated Goods and Services   

ā€‹Do not sell, advertise, or facilitate the sale of regulated goods and services. Regulated goods and services include alcohol, gambling, pharmaceuticals, unapproved supplements, tobacco, fireworks, weapons, or health/medical devices.

Sexually Explicit Content

Do not store or distribute content that contains sexually explicit material, such as nudity, graphic sex acts, and pornographic content, or non-explicit sexual material, such as partial nudity or other sexualized content. This includes driving traffic to commercial pornography sites. We allow content for educational, documentary, scientific, or artistic purposes.

Spam

Do not spam. This may include unwanted promotional or commercial content, unwanted content that is created by an automated program, unwanted repetitive content, nonsensical content, or anything that appears to be a mass solicitation.

System Interference and Abuse

Do not abuse this product and do not harm, degrade, or negatively affect the operation of networks, devices, or other infrastructure. This includes degrading, disabling, or negatively interfering with any aspect of the product or its services.

Technical Requirements

Tenor is committed to providing users with a high quality, seamless experience when browsing and sharing content on our platform. To maintain consistency, compatibility, and brand integrity, Tenor has established the following technical format requirement policy.

Content duration: All posts hosted on the Tenor platform must be 14 seconds or less in duration. This supports optimal viewing experiences and reduces load times for users.

Supported Formats: Only compatible file formats, such as GIF, WebP, PNG, MP4, and JPEG, are permitted for upload to Tenor. Non-media files and unsupported formats will be rejected. Content must also not exceed dimension limits or file size limits.

Unauthorized Images of Minors

Do not store or distribute images of minors without explicit consent from the child's parent, guardian, or legal representative. If someone has stored or distributed an image of a minor without necessary consent, please report it to us here

Violence and Gore  

Do not store or distribute violent or gory content involving real-life people or animals thatā€™s primarily intended to be shocking, sensational, or gratuitous. This includes ultra-graphic material, such as dismemberment or close-up footage of mutilated corpses, and graphic material, such as content containing significant amounts of blood. Content may be allowed in an educational, documentary, scientific, or artistic context, but please be mindful to provide enough information to help people understand the context. In some cases, content may be so violent or shocking that no amount of context will allow that content to remain on our platforms. Lastly, don't encourage others to commit specific acts of violence.

Violent Organizations and Movements 

Known violent non-state organizations and movements are not permitted to use this product for any purpose. Do not distribute content that facilitates or promotes the activities of these groups, such as recruiting, coordinating online or offline activities, sharing manuals or other materials that could facilitate harm, promoting ideologies of violent non-state organizations, promoting terrorist acts, inciting violence, or celebrating attacks by violent non-state organizations. Depending upon the content, we may also take action against the user. Content related to violent non-state organizations may be allowed in an educational, documentary, scientific, or artistic context, but please be mindful to provide enough information to help people understand the context.