Privacy & Acceptable

Use Policy

POLICIES

ACCEPTABLE USE POLICY

We need to be able to make sure our customers use their Application superpowers for good, not evil.

This policy describes prohibited uses of our Services, Sites/Applications. Terms used but not otherwise defined here are defined in the Terms of Service.

By using the Services or the Site, you agree to the latest version of this policy. If you violate this policy or authorize or help others to do so, we may suspend or terminate your use of the Services.

The examples described in this policy are not exhaustive. We may modify this policy at any time by issuing a revised version.

WE RESERVE FULL AND FINAL DISCRETION AS TO WHETHER CERTAIN USES VIOLATE THIS ACCEPTABLE USE POLICY. YOU AGREE THAT OUR DETERMINATION IS FINAL.

No Illegal, Harmful, or Offensive Use or Content

You may not use, or encourage, promote, facilitate or instruct others to use, the Services or Sites for any illegal, harmful or offensive use, or to transmit, store, display, distribute or otherwise make available content that is illegal, harmful, or offensive.

Prohibited activities or content include:

  1. Illegal Activities: Any illegal activities, including advertising, transmitting, or otherwise making availablegambling sites or services or disseminating, promoting or facilitating child pornography.
  2. Harmful or Fraudulent Activities: Activities that may be harmful to others, our operations or reputation,including offering or disseminating fraudulent goods, services, schemes, or promotions (e.g., make-money-fast schemes, Ponzi and pyramid schemes, phishing, or pharming), or engaging in other deceptivepractices.
  3. Infringing Content: Content that infringes or misappropriates the intellectual property or proprietaryrights of others.
  4. Offensive Content: Content that is defamatory, obscene, abusive, invasive of privacy, or otherwiseobjectionable, including content that constitutes child pornography, relates to bestiality, or depicts non-consensual sex acts.
  5. Harmful Content: Content or other computer technology that may damage, interfere with, surreptitiouslyintercept, or expropriate any system, program, or data, including viruses, Trojan horses, worms, timebombs, or cancelbots.

No High-Risk Activities

You agree not to use the Services for High Risk Activities, as defined in our Terms of Service.

No Arms Dealing

You agree not to use the Services to process or store any data that is subject to the International Traffic in Arms Regulations.

No Security Violations

You may not use the Services to violate the security or integrity of any network, computer or communications system, software application, or network or computing device.

Prohibited activities include:

  1. Unauthorized Access: Accessing or using any System without permission, including attempting to probe,scan, or test the vulnerability of a System or to breach any security or authentication measures used by aSystem.
  2. Interception: Monitoring of data or traffic on a System without permission.
  3. Falsification of Origin: Forging TCP/IP packet headers, e-mail headers, or any part of a message describingits origin or route. This prohibition does not include the use of aliases or anonymous remailers.
  4. acking: Interfering with the security-related features of the Services

No E-Mail or Other Message Abuse

You will not distribute, publish, send, or facilitate the sending of unsolicited mass e-mail or other messages, promotions, advertising, or solicitations (like “spam”), including commercial advertising and informational announcements. You will not alter or obscure mail headers or assume a sender’s identity without the sender’s explicit permission. You will not collect replies to messages sent from another Internet service provider if those messages violate this policy or the acceptable use policy of that provider.

No Network Abuse

You may not make network connections to any users, hosts, or networks unless you have permission to communicate with them.

Prohibited activities include:

  1. Monitoring or Crawling: Monitoring or crawling of a System that impairs or disrupts the System beingmonitored or crawled.
  2. Denial of Service (DoS): Inundating a target with communications requests so the target either cannotrespond to legitimate traffic or responds so slowly that it becomes ineffective.
  3. deliberateattempt to overload a system by mail bombing, news bombing, broadcast attacks, or flooding techniques.
  4. Operation of Certain Network Services: Operating network services like open proxies, open mail relays, oropen recursive domain name servers.
  5. Avoiding System Restrictions: Using manual or electronic means to avoid any use limitations placed on aSystem, such as access and storage restrictions.
  6. Domain Impersonation: Creating applications pointing at domains you do not own or lawfully control.
  7. Malware: Uploading or otherwise any disseminating viruses, adware, spyware, worms, or other maliciouscode.

Usage and Quotas

You agree that you will be billed accordingly based on you and your End users’ data, network/bandwidth requirements and usage, as per Billing Policy. Where there is a different billing agreement in place, then that agreement’s terms shall apply. You agree not to take any action (directly or indirectly) that imposes or may impose (as determined by us in our sole discretion) an unreasonable or disproportionately large load on our or our third-party providers’ infrastructure.

No Trolling

You agree not to:

  1. Access the Services to bring an intellectual property infringement claim against us or any of our affiliates,customers, vendors, business partners, or licensors;
  2. Develop or create a competing product or service;
  3. Copy, modify, create a derivative work of, reverse engineer, decompile, translate, disassemble, orotherwise attempt to extract the source code of the Services or any component thereof;
  4. Sub-license, resell, or distribute the Services or any component thereof separate from any integratedapplication;
  5. olate, or encourage others to violate, any right of a third party, including by infringing ormisappropriating any third-party intellectual property right;
  6. Post, upload, or distribute any Content or other content that is unlawful, defamatory, libellous,inaccurate, or that a reasonable person could deem to be objectionable, profane, indecent, pornographic,harassing, threatening, embarrassing, hateful, or otherwise inappropriate;
  7. Perform any fraudulent activity, including impersonating any person or entity or claiming a falseaffiliation; misrepresenting the source, identity or content of information transmitted via the Services;accessing any other Service account without permission, or falsifying your age or date of birth.

Our Monitoring and Enforcement

We reserve the right, but do not assume the obligation, to investigate any violation of this policy or misuse of the Services or Sites. We may:

  1. Investigate violations of this policy or misuse of the Services or Sites;
  2. Remove, disable access to, or modify any content or resource that violates this Policy or any otheragreement we have with you for use of the Services or the Sites; and
  3. Report any activity that we suspect violates any law or regulation to appropriate law enforcementofficials, regulators, or other appropriate third parties. Our reporting may include disclosing appropriatecustomer information. We also may cooperate with appropriate law enforcement agencies, regulators, orother appropriate third parties to help with the investigation and prosecution of illegal conduct byproviding network and systems information related to alleged violations of this policy.

Reporting of Violations of this Policy

If you become aware of any violation of this policy, you will immediately notify us and provide us with assistance, as requested, to stop or remedy the violation. To report any violation of this policy, please email your account manager.

PRIVACY POLICY

Your privacy is important to us. We want to be clear how we use your information, and the ways in which you can protect your privacy.

Our Privacy Policy explains:

  • What information we collect and why we collect it.
  • How we use that information and when we disclose it.
  • How to access and update your information.
  • The steps we take to protect your information.

This Privacy Policy applies to the information that we obtain through your use of our services, including our Sites, platforms, and web-based tools (collectively the “Services”). Please familiarize yourself with our policies, and if you have any questions contact your account manager.


INFORMATION WE COLLECT


1. INFORMATION YOU PROVIDE TO US

We collect the following information:

Account and Profile Information:

We collect information about you when you procure or use our services. If you provide information (including personal information) about someone else, you confirm that you have the authority to act for them and to consent to the collection and use of their information as described in this Privacy Policy.

Content:

We collect and store content that you create, input, submit, post, upload, transmit, or store in the process of using our Services, including information from end users in accordance with the Protection of Personal Information Act. Such content may include any personal or other sensitive information submitted using our Services.

Other submissions:

We collect other data that you may submit to our Services or us directly, such as when you request customer support or communicate with us via email or social media sites or any other interactions or mediums of communication.


2. INFORMATION WE COLLECT FROM YOUR USE OF OUR SERVICES

Web Logs and Analytics Information:

We record certain information and store it in log files when you interact with our Services. This information may include Internet protocol (IP) or other device addresses or ID numbers as well as browser type, Internet service provider, URLs of referring/exit pages, operating system, date/time stamp, information you search for, locale and language preferences, your mobile carrier, and system configuration information. We and our analytics providers also collect and store analytics information when you use our Services to help us improve our Services.

Cookies and Other Tracking Technologies:

We use various technologies to collect information, including cookies that we save to your computer or mobile device. Cookies are small data files stored on your hard drive or in device memory. We use cookies to improve and customize our Services and your experience; for example, to manage user sessions, to allow you to access and use the Services without re-entering your username or password; and to count visits and understand which areas and features of the Services are most popular. We may also associate the information we store in cookies with personal information you submit while on our Services. If you do not accept cookies, however, you will not be able to use all aspects of our Services.


3. INFORMATION WE COLLECT FROM OTHER SOURCES

Information from third party services: We may obtain information, including personal information, from third parties such as our partners and service providers, and combine it with other information we collect from you for research purposes in order to improve our services.


HOW WE USE INFORMATION WE COLLECT

We may use the information we collect for a variety of purposes, including to:

  • Provide, operate, maintain, improve, personalize, and promote our Services without disclosing anyconfidential information or infringing on any regulations;
  • Develop new products, services, features, and functionality;
  • Enable you to access and use our Services;
  • Process and complete transactions, and send you related information, including purchase confirmationsand invoices;
  • Communicate with you, including responding to your comments, questions, and requests; providingcustomer service and support; providing you with information about services, including technical notices,updates, security alerts, administrative messages, or advertising or marketing messages; and providingother news or information about us and our select partners;
  • Monitor and analyse trends, usage, and activities in connection with our Services; and
  • Investigate and prevent fraudulent transactions, unauthorized access to our Services, and other illegalactivities.

We may also use the information we collect for other purposes about which we notify you.


INFORMATION SHARING AND DISCLOSURES

We may share your information in the following ways:

With your express consent:

We will never share your information for any reason whatsoever without your express consent or outside the confinements of the agreed upon terms and policies.

Access by your System administrator:

Your account owner may be able to:

  • Access information in and about your account.
  • Disclose, restrict, or access information that you have provided or that is made available to you whenusing our services, including your content.
  • Control how your Services may be accessed or deleted.

Access by your System administrator:

With your prior written consent, we may share your information with service providers and other third parties who perform services on our behalf, such as infrastructure, analytics, marketing, and advertising services. We provide your payment information to our service providers for payment processing and verification. Service providers such as analytics providers may collect information about your online activities over time and across different online services when you use our Services.

Compliance with Laws and Law Enforcement Requests; Protection of Yours and Our Rights:

We may disclose your information (including your personal information) to a third party if:

We believe that disclosure is reasonably necessary to comply with any applicable law, regulation, legal process or governmental request;

  • To enforce our agreements, policies and terms of service.
  • To protect the security or integrity of your information or of our products and services.
  • To protect the property, rights, and safety of us, our customers or the public from harm or illegalactivities.
  • To respond to an emergency that we believe in the good faith requires us to disclose information to assistin preventing the death or serious bodily injury of any person.
  • To investigate and defend ourselves against any third-party claims or allegations.

Business Transfers:

We may share or transfer your information (including your personal information) in connection with, or during negotiations of, any merger, sale of company assets, financing, or acquisition of all or a portion of our business to another company. We will notify you of such a change in ownership or transfer of assets.

Aggregate or Non-identifying Data:

We may share aggregate or other non-personal information that does not directly identify you with third parties in order to improve the overall experience of our Services.


THE CHOICES YOU HAVE WITH YOUR INFORMATION

You may decline to share certain personal information with us, in which case we may not be able to provide to you some of the features and functionality of our Services. You may opt out of receiving promotional communications from us by using the unsubscribe link within each email. Even after you opt out from receiving promotional messages from us, you will continue to receive administrative messages from us regarding the Services.

International Users/Data locations

Our Services are hosted in the South Africa and due to The Protection of Personal Information Act and data residency requirements.


CHANGES TO THIS PRIVACY POLICY

We may change this Privacy Policy from time to time. If we make any changes, we will notify you. Your continued use of our Services after the revised Policy has become effective indicates that you have read, understood, and agreed to the current version of this Policy.


CONTACT INFORMATION

Please contact us with any questions or comments about this Policy, your information, our use and disclosure practices, or your consent choices by emailing your account manager.



RESPONSIBLE DISCLOSURE POLICY

We are dedicated to maintaining the security and privacy of our platform and Services. While we do our best to ensure that we are always up to date and on top of all security vulnerabilities, we also welcome security researchers who want to help us improve our services.

If you discover a security vulnerability, please give us the chance to fix it by emailing your account manager. Publicly disclosing a security vulnerability without informing us first puts you and the rest of our clients at risk. When you notify us of a potential problem, we will work with you to make sure we understand the scope and cause of the issue, and then take the necessary measures to resolve it.

Thank you for your work and interest in making our Services safer and more secure!

Security researches are to comply with the following rules when testing our services:

  1. NEVER attempt to gain access to another user’s account or data.
  2. NEVER attempt to degrade the services.
  3. NEVER impact other users with your testing.
  4. Test only on in-scope domains.

Do not use fuzzers, scanners, or other automated tools to find vulnerabilities.