Terms and Conditions
Thanks for taking the time to learn about SecureIT's legal policies. This is where you'll find information about how we protect your privacy, what you can and can't do with SecureIT, and how we handle user accounts. If you still have questions after reading them, drop us a line.
This Business Software and Appliance Agreement supersedes all prior versions published by SecureIT with respect to transactions consummated on or after 5 July 2017
Thanks for using SecureIT.
Please read these Terms carefully. By using SecureIT or signing up for an account, you’re agreeing to these Terms. This is a legal agreement. We’ll start with the basics, including a few definitions that should help you understand this agreement. SecureIT (“SecureIT” or the “Service”) is a cybersecurity service offered through the URL secureit.io (we’ll refer to it as the “Website”) that allows you to check for known information technologis vulnerabilities that your servers/infrastructure might be exposed to. SecureIT has employees, independent contractors, and representatives (“our Team”). As a customer of the Service or a representative of an entity that’s a customer of the Service, you’re a “Member” according to this agreement (or “you”). Usage of our Service is possible through a sign up, or through a “Anonymous/Demo” mode that doesn’t require the sign up process.
1 - Eligibility
In order to use SecureIT, you must:
be at least eighteen (18) years old and able to enter into contracts; Either complete the registration process, or use our Anonymous/Demo mode; agree to the Terms; and provide true, complete, and up to date contact information whenever prompted for it. By using SecureIT, you represent and warrant that you meet all the requirements listed above, and that you won’t use SecureIT in a way that violates any laws or regulations. (Representing and warranting is like making a legally enforceable promise.) SecureIT may refuse service, block incoming traffic, close accounts of any users, and change eligibility requirements at any time.
The Term begins when you use our application in ‘Anonymous/Demo’ mode, and/or when you sign up for SecureIT and continues as long as you use the Service. Using either the Anonymous/Demo service or the registered one means that you’ve officially “signed” the Terms. If you sign up for SecureIT on behalf of a company or other entity, you represent and warrant that you have the authority to accept these Terms on their behalf.
3- Closing Your Account
You or SecureIT may terminate this Agreement at any time and for any reason by giving Notice to the other party. We may suspend our Service to you at any time, with or without cause. If we terminate your account without cause, we’ll refund a prorated portion of your monthly prepayment. We won’t refund or reimburse you if there’s cause, like a violation of these Terms or our Acceptable Use Policy. Once terminated, we may permanently delete your account and all the data associated with it. If you don’t log in to your account for 12b or more months for a regular account, or 2 days for an ‘Anonymous/Demo’ account, we may treat your account as “inactive” and permanently delete the account and all the data associated with it.
5- Account and Password
You’re responsible for keeping your account name and password confidential. You’re also responsible for any account that you have access to, whether or not you authorized the use. You’ll immediately notify us of any unauthorized use of your accounts. We’re not responsible for any losses due to stolen or hacked passwords. We don’t have access to your current password, and for security reasons, we may only reset your password.
6- Anonymous/Demo mode credentials
While the access to the data in Anonymous/Demo mode is restricted in time, and the credentials are, under normal circumstances, ephemeral, you are responsible to clearing any data and to keep those same credentials secure. These kinds of accounts should be treated as a try before signing up feature and thus shouldn’t be relied upon for continuous use of our service.
7- Account Disputes
We don’t know the inner workings of your organization or the nature of your personal relationships, and we don’t arbitrate disputes over who owns an account. You won’t request access to or information about an account that’s not yours, and you’ll resolve any account-related disputes directly with the other party. We decide who owns an account based on the content of the emails in that account, and if multiple people or entities are identified in the content, then we’ll rely on the contact information listed for that account.
8- Proprietary Rights Owned by Us
You will respect our proprietary rights in the Website and the software used to provide SecureIT (proprietary rights include patents, trademarks, service marks, trade secrets, and copyrights).
10- Right to Review Data
We may view, copy, and internally distribute content from your usage of our Service to create algorithms and programs (“Tools”) that help us spot problem accounts, or improve our Service. We also use these Tools to find Members who violate these Terms or laws. For example, We study data internally to help us make decisions regardind which Operating systems/Webapp languages to offer more services for.
11- General Rules
You promise to follow these rules:
You won’t use our service for information technology infrastructure that you don’t own or are responsible for. You won’t violate our Acceptable Use Policy, which is part of this Agreement. If you use our API, you’ll comply with our API Use Policy. If you violate any of these rules, then we may suspend or terminate your account.
12- Reporting Abuse
If you think anyone is violating any of these Terms, please notify us immediately.
13- Bandwidth Abuse/Throttling
We may throttle your data uploads or connections through our API at our discretion.
14- Compliance with Laws
You represent and warrant that your use of SecureIT will comply with all applicable laws and regulations. You’re responsible for determining whether our Services are suitable for you to use in light of any regulations. If you’re subject to regulations and you use our Service, then we won’t be liable if our Service doesn’t meet those requirements. You may not use our Service for any unlawful or discriminatory activities, including acts prohibited by the Federal Trade Commission Act, Fair Credit Reporting Act, Equal Credit Opportunity Act, or other laws that apply to commerce.
If you or your infrastructure are located in the European Economic Area (EEA), you represent and warrant that in using our service and collecting information, you:
15- U.S. Export Controls
The software that supports the Services (the “Software”) is subject to United States export controls. Export laws are set up by the government to keep certain goods and services from reaching other countries, usually because of security concerns or trade agreements. None of the Software may be downloaded or otherwise exported or re-exported in violation of United States export laws. You’re downloading and using the Software at your own risk.
12- Limitation of Liability
To the maximum extent permitted by law, you assume full responsibility for any loss that results from your use of the Website and the Services, including any downloads from the Website. We and our Team won’t be liable for any indirect, punitive, special, or consequential damages under any circumstances, even if they’re based on negligence or we’ve been advised of the possibility of those damages. Our total liability for all claims made about the Service in any month will be no more than what you paid us for the Service the month before.
13- No Warranties
To the maximum extent permitted by law, we provide the material on the Website and the Service as is. That means we don’t provide warranties of any kind, either express or implied, including but not limited to warranties of merchantability and fitness for a particular purpose. Since people use SecureIT for a variety of reasons, we can’t guarantee that it will meet your specific needs.
You agree to indemnify and hold us and our Team harmless from any losses, including attorney fees that result from any claims you make that aren’t allowed under these Terms due to a “Limitation of Liability” or other provision. (Indemnity is an agreement to compensate someone for a loss.) You also agree to indemnify and hold us harmless from any losses, including attorney fees, that result from third-party claims that you or someone using your password did something that, if true, would violate any of these Terms.
15- Attorney Fees
If we file an action against you claiming you breached these Terms and we prevail, we’re entitled to recover reasonable attorney fees and any damages or other relief we may be awarded.
16- Equitable Relief
If you violate these Terms then we may seek injunctive relief (meaning we may request a court order to stop you) or other equitable relief.
17- Subpoena Fees
If we have to provide information in response to a subpoena related to your account, then we may charge you for our costs. These fees may include attorney and employee time spent retrieving the records, preparing documents, and participating in a deposition.
We and our Team aren’t responsible for the behavior of any advertisers, linked websites, or other Members.
19- Notice to U.S. Government End Users
The Software and Website, including all documentation, are “Commercial Items,” as that term is defined at 48 C.F.R. §2.101, and consist of “Commercial Computer Software” and “Commercial Computer Software Documentation.” The Commercial Computer Software and Commercial Computer Software Documentation are licensed to U.S. Government end users:
only as Commercial Items, with the same rights as all other end users, and according to the Terms Published and Unpublished rights are reserved under the copyright laws.
You may not assign any of your rights under this agreement to anyone else. We may assign our rights to any other individual or entity at our discretion.
21- Choice of Law
22- Force Majeure
We won’t be held liable for any delays or failure in performance of any part of the Service, from any cause beyond our control. This includes, but is not limited to, acts of God, changes to law or regulations, embargoes, war, terrorist acts, riots, fires, earthquakes, nuclear accidents, zombie apocalypse, floods, strikes, power blackouts, volcanic action, unusually severe weather conditions, and acts of hackers or third-party internet service providers.
Even if this Agreement is terminated, the following sections will continue to apply: Proprietary Rights Owned by Us, Proprietary Rights Owned by You, Compliance with Laws, Limitation of Liability, No Warranties, Indemnity, Choice of Law, Severability, and Entire Agreement.
If it turns out that a section of this Agreement isn’t enforceable, then that section will be removed or edited as little as necessary, and the rest of the Terms will still be valid.
The headers and sidebar text are provided only to make this agreement easier to read and understand. The fact that we wrote these Terms won’t affect the way this Agreement is interpreted.
26- Amendments and Waiver
Amendments or changes to these Terms won’t be effective until we post revised Terms on the Website. If we don’t immediately take action on a violation of these Terms, we’re not giving up any rights under the Terms, and we may still take action at some point.
27- No Changes in Terms at Request of Member
Because we have so many Members, we can’t change these Terms for any one Member or group.
28- Further Actions
You’ll provide all documents and take any actions necessary to meet your obligations under these Terms.
29- Notification of Security Breach
In the event of a security breach that may affect you or anyone on your organization, we’ll notify you of the breach and provide a description of what happened.
Any notice to you will be effective when we send it to the last email or physical address you gave us or posted on our Website. Any notice to us will be effective when delivered to us
31- Entire Agreement
Where there’s a conflict between these Terms and the Additional Terms, the Additional Terms will control.
Legal - Acceptable Use Policy
You may not:
- Use our service for IT infrastructure for which you don’t have the right to. Meaning servers, web apps, or any other kind of IT infrastructure which you don’t own or aren’t responsible for maintaining.
- Share your password.
- Decipher, decompile, disassemble, or reverse engineer any of the software on our Website, or in any way used or downloaded from the Website.
- Use any of the software on our Website, or downloaded from the Website, to create a competing product.
- Abuse our ‘Anonymous/Demo’ or regular account mode by making an excessive amount of requests. An excessive amount is considered at least to be one each two minutes. We reserve ourselves the right to change this amount at any time, without notice. Blocking of any account because of this reason will be communicated by the email provided by the affected Members, if any exists.
Thanks for using SecureIT or visiting one of our websites. This policy explains the what, how, and why of the information we collect when you visit one of our websites, or when you use our Services. It also explains the specific ways we use and disclose that information. We take your privacy extremely seriously, and we never sell your data or email.
These definitions should help you understand this policy. When we say “we,” “us,” “our,” and “SecureIT,” we are referring to our company and all of its services. We provide online platforms that you may use to diminish risk of cybersecurity related attacks. We process sensitive data on behalf of our members. When we say “Member,” we are referring to the person or entity that is registered with us to use the Services, or that is using the service in the “Anonymous/Demo” mode. When we say “you,” we are referring either to a Member or to some other person who visits any of our Websites. “Personal Information” means information that can be used to identify you, including, but not limited to, first and last name, date of birth, email address, gender, occupation or other demographic information.
4- Questions & Concerns
If you have any questions or comments, or if you want to update, delete, or change any Personal Information we hold, or you have a concern about the way in which we have handled any privacy matter, please use our email for legal enquiries to send us a message.
5- Information We Collect
(c) Information from your use of the Service: We may receive information about how and when you use the Services, store it in log files or other types of files associated with your account, and link it to other information we collect about you. This information may include, for example, your IP address, time, date, browser used, and actions you have taken within the application. This type of information helps us to improve our Services for both you and for all of our users.
(e) Web beacons: We use web beacons on our Websites and in our emails. When we send emails to Members, we may track behavior such as who opened the emails and who clicked the links. This allows us to measure the performance of our outgoing email campaigns and to improve our features for specific segments of Members. To do this, we include single pixel gifs, also called web beacons, in emails we send. Web beacons allow us to collect information about when you open the email, your IP address, your browser or email client type, and other similar details.
(f) Information from other sources: We may receive more information about you or your Subscribers, such as name, email address, demographic information, IP addresses, location, and use of social media websites, by searching the Internet or querying third parties (we refer to that information as “Supplemental Information”). We use Supplemental Information to develop features including Social Profiles, a tool that helps you learn about your Subscribers and allows you to send them more relevant content.
(g) Information from the use of our Mobile Apps: When you use our mobile apps, we may collect certain information in addition to information described elsewhere in this Policy. For example, we may collect information about the type of device and operating system you use. We may ask you if you want to receive push notifications about activity in your account. If you have opted in to these notifications and no longer want to receive them, you may turn them off through your operating system. We do not ask for, access or track any location-based information from your mobile device at any time while downloading or using our Mobile Apps or Services. We may use mobile analytics software (such as Fabric.io) to better understand how people use our application. We may collect information about how often you use the application and other performance data.
6- Use and Disclosure of Personal Information
We may use and disclose Personal Information only for the following purposes:
(b) To send you informational and promotional content that you may choose (or “opt in”) to receive. You can stop receiving our promotional emails by following the unsubscribe instructions included in every email.
(c) To bill and collect money owed to us by our Members. This includes sending you emails, invoices, receipts, notices of delinquency, and alerting you if we need a different credit card number. We use third parties for secure credit card transaction processing, and we send billing information to those third parties to process your orders and credit card payments. To learn more about the steps we take to safeguard that data, see Section 12 below.
(e) To communicate with our Members about their account and provide customer support.
(g) To protect the rights and safety of our Members and third parties, as well as our own.
(h) To meet legal requirements, including complying with court orders, valid discovery requests, valid subpoenas, and other appropriate legal mechanisms.
(i) To provide information to representatives and advisors, including attorneys and accountants, to help us comply with legal, accounting, or security requirements.
(j) To prosecute and defend a court, arbitration, or similar legal proceeding.
(k) To respond to lawful requests by public authorities, including to meet national security or law enforcement requirements.
(l) To provide, support, and improve the Services we offer. This includes our use of the data that our Members provide us in order to enable our Members to use the Services to communicate with their Subscribers. This also includes, for example, aggregating information from your use of the Services or visit to our Websites and sharing this information with third parties to improve our Services. This might also include sharing your information or the information you provide us about your Subscribers with third parties in order to provide and support our Services or to make certain features of the Services available to you. When we do have to share Personal Information with third parties, we take steps to protect your information by requiring these third parties to enter into a contract with us that requires them to use the Personal Information we transfer to them in a manner that is consistent with this policy.
7- Data Collected for and by our Users
As you use our Services, you may import into our system Information you have collected from your clients or other individuals. We have no direct relationship with your clients or any person other than you, and for that reason, you are responsible for making sure you have the appropriate permission for us to collect and process information about those individuals. Consistent with the uses of Personal Information covered in Section 6, we may transfer Personal Information of you or your clients to companies that help us promote, provide, or support our Services or the services of our Members (“Service Providers”). All Service Providers enter into a contract with us that protects Personal Information and restricts their use of any Personal or other Information consistent with this policy. As part of our Services, we may use and incorporate into features information you have provided, we have collected from you, or we have collected about your clients. We may share this information, in line with the approved uses in Section 6.
If you are a client and no longer want to be contacted by our Service, please follow the links included in those communications. If you contact us, we may remove or update your information within a reasonable time.
We will retain Personal Information we process on behalf of our Members for as long as needed to provide our Services or to comply with our legal obligations, resolve disputes, prevent abuse, and enforce our agreements.
8- Public Information and Third Party Websites
(a) Blog. We have public blogs on our Websites. Any information you include in a comment on our blog may be read, collected, and used by anyone. If your Personal Information appears on our blogs and you want it removed, contact us here. If we are unable to remove your information, we will tell you why.
(b) Social media platforms and widgets. Our Websites may include social media features, such as the Facebook Like button. These features may collect information about your IP address and which page you are visiting on our Website, and they may set a cookie to make sure the feature functions properly. Social media features and widgets are either hosted by a third party or hosted directly on our Website. We also maintain presences on social media platforms including Facebook, Twitter, and Instagram. Any information, communications, or materials you submit to us via a social media platform is done at your own risk without any expectation of privacy. We cannot control the actions of other users of these platforms or the actions of the platforms themselves. Your interactions with those features and platforms are governed by the privacy policies of the companies that provide them.
9- Third Parties
We may disclose Personal Information to the following types of third parties for the purposes described in this policy:
(a) Service providers. Sometimes, we need to use third party Service Providers in order to provide and support the features of our Services. For example, if it is necessary to provide you something you have requested (like send you a T-shirt or enable a feature such as Social Profiles), then we may share your Personal Information with a Service Provider for that purpose. We will tell you we are working with a Service Provider whenever reasonably possible, and you may request at any time the names of our Service Providers. Just like with the other third parties we work with, these third party Service Providers enter into a contract that requires them to use your Personal Information in a manner that is consistent with this policy.
10- Contest and Sweepstakes
We may, from time to time, offer surveys, contests, sweepstakes, or other promotions on our Websites or through social media (collectively “Our Promotions”). Participation in our Promotions is completely voluntary. Information requested for entry may include personal contact information such as your name, address, date of birth, phone number, email address, username, and similar details. We use the information you provide to administer Our Promotions. We may also, unless prohibited by the Promotion’s rules or law, use the information provided to communicate with you, or other people you select, about our Services. We may share this information with our affiliates and other organizations or Service Providers in line with this policy and the rules posted for the Promotion.
11- Notice of Breach of Security
If a security breach causes an unauthorized intrusion into our system that materially affects you or your clients, then SecureIT will notify you as soon as possible and later report the action we took in response.
We take reasonable and appropriate measures to protect Personal and other Information from loss, misuse and unauthorized access, disclosure, alteration and destruction, taking into account the risks involved in the processing and the nature of the Personal and Business Information.
Our credit card processing vendor uses security measures to protect your information both during the transaction and after it is complete. Our vendor is certified as compliant with card association security initiatives, including the Visa Cardholder Information Security and Compliance (CISP), MasterCard® (SDP), and Discovery Information Security and Compliance (DISC). If you have any questions about the security of your Personal Information, you may contact us at our listed email.
SecureIT regular accounts require a username and password to log in. You must keep your username and password secure, and never disclose it to a third party. Because the information we process is so sensitive, account passwords are encrypted, which means we cannot see your passwords. We cannot resend forgotten passwords either. We will only reset them.
SecureIT ‘Anonymous/Demo’ accounts are issued temporary credentials to your browser. Access to the data may be time limited or not depending on a warning that we provide on our service page. Regardless of such a time limit, you are responsible to keep the credentials safe and/or to delete the data when you have used it, or keep it and transfer it to a registered account by signing up.
13- We Operate in the European Union
Our offices are located in Lisbon, Portugal, and the servers are in France and other countries in the European Union, so your information may be transferred to, stored, or processed in the European Union. While the data protection, privacy, and other laws of the European Union might not be as comprehensive as those in your country, we take many steps to protect your privacy, including offering a data processing agreement. By using our Websites, you understand and consent to the collection, storage, processing, and transfer of your information to our facilities, and those third parties with whom we share it as described in this policy.
14- Accuracy of Data, Transparency, and Choice
We do our best to keep your data accurate and up to date, to the extent that you provide us with the information we need to do so. If your data changes (for example, if you have a new email address), then you are responsible for notifying us of those changes. Upon request, we will provide you with information about whether we hold, or process on behalf of a third party, any of your Personal Information.
We will retain your information for as long as your account is active or as long as needed to provide you with our Services. We may also retain and use your information in order to comply with our legal obligations, resolve disputes, prevent abuse, and enforce our Agreements.
As explained in Sections 6 and 9 of this policy, SecureIT shares your Personal Information with Service Providers in order to provide and support our Services. With respect to Personal Information we share with our advertising partners, you have a choice. You can opt-out of this sharing with our third party advertising partners by adjusting your cookie settings as explained in more detail in Section 5 and in our Cookie Statement here
We will give an individual access to any Personal Information we hold about them within 30 days of any request for that information. Individuals may request to access, correct, amend or delete information we hold about them by contacting us here. Unless it is prohibited by law, we will remove any Personal Information about an individual from our servers at your request. There is no charge for an individual to access or update their Personal Information.
16- California Privacy
Under California Law, California residents have the right to request in writing from businesses with whom they have an established business relationship, (a) a list of the categories of Personal Information, such as name, email and mailing address and the type of services provided to the customer, that a business has disclosed to third parties (including affiliates that are separate legal entities) during the immediately preceding calendar year for the third parties’ direct marketing purposes and (b) the names and addresses of all such third parties. To request the above information, please contact us through our contact form or email listed in this page.
17- Do Not Track Disclosure
“Do Not Track” is a standard that is currently under development. Because it is not yet finalized, SecureIT adheres to the standards in this policy and does not monitor or follow any Do Not Track browser requests. That said, some of our features may have the ability to monitor or follow Do Not Track browser requests.
Legal - Cookie statement
What are cookies?
Cookies are small data files that are placed on your computer or mobile device when you visit a website. Cookies are widely used by website owners in order to make their websites work, or to work more efficiently, as well as to provide reporting information.
Cookies set by the website owner (in this case, SecureIT) are called “first party cookies”. Cookies set by parties other than the website owner are called “third party cookies”. Third party cookies enable third party features or functionality to be provided on or through the website (e.g. like advertising, interactive content and analytics). The parties that set these third party cookies can recognise your computer both when it visits the website in question and also when it visits certain other websites.
We use first party and third party cookies for several reasons. Some cookies are required for technical reasons in order for our Websites to operate, and we refer to these as “essential” or “strictly necessary” cookies. Other cookies also enable us to track and target the interests of our users to enhance the experience on our Websites. Third parties serve cookies through our Websites for advertising, analytics and other purposes. This is described in more detail below.
The specific types of first and third party cookies served through our Websites and the purposes they perform are described in the table below:
|Types of cookie||Who serves these cookies||How to refuse|
|Essential website cookies: These cookies are strictly necessary to provide you with services available through our Websites and to use some of its features, such as access to secure areas.||SecureIT||Because these cookies are strictly necessary to deliver the Websites to you, you cannot refuse them without impacting how our Websites function. You can block or delete them by changing your browser settings however, as described below under the heading “How can I control cookies?”|
|Performance and functionality cookies: These cookies are used to enhance the performance and functionality of our Websites but are non-essential to their use. However, without these cookies, certain functionality may become unavailable.||SecureIT; Survs (these cookies are used to embed forms/surveys on our website, such as our Contact and Feedback forms and other surveys we make available to website visitors); Resend (these cookies support our chat service and accelerate loading times for chat functionality available through our website)||To refuse these cookies, please follow the instructions below under the heading “How can I control cookies?”|
|Analytics and customisation cookies: These cookies collect information that is used either in aggregate form to help us understand how our Websites are being used or how effective our marketing campaigns are, or to help us customise our Websites and application for you in order to enhance your experience.||SecureIT; Google, as well as its subsidiary, DoubleClick; HotJar; Mixpanel - These cookies enable analytics reporting for visitor engagement on the Websites.||To refuse these cookies, please follow the instructions below under the heading “How can I control cookies?”|
What about other tracking technologies, like web beacons and pixels?
Cookies are not the only way to recognise or track visitors to a website. We and our third party partners may use other, similar technologies from time to time, like web beacons, pixels (or “clear gifs”) and other tracking technologies. These are tiny graphics files that contain a unique identifier that enable us to recognise when someone has visited our Websites or, in the case of web beacons, opened an e-mail that we have sent them. This allows us, for example, to monitor the traffic patterns of users from one page within our Websites to another, to deliver or communicate with cookies, to understand whether you have come to our Websites from an online advertisement displayed on a third-party website, to serve targeted advertisements to you and others like you, to improve site performance, and to measure the success of marketing campaigns. While you may not have the ability to specifically reject or disable these tracking technologies, in many instances, these technologies are reliant on cookies to function properly; accordingly, in those instances, declining cookies will impair functioning of these technologies. You can control the use of those cookies directly with these third parties. Please note you might continue to receive generic ads.
How can I control cookies?
You have the right to decide whether to accept or reject cookies. You can exercise your cookie preferences by clicking on the appropriate opt-out links provided in the cookie table above.
How often will you update this Cookie Statement?
Where can I get further information?
Legal - API Guidelines
You won’t use the API to take any actions that violate our Acceptable Use Policy. You’ll follow all documentation we provide for the APIs. You won’t attempt to hack or change the way the Services function. We may throttle your use of the APIs at any time. We may monitor your use of the APIs for compliance with these rules, and we may deny You access to the API or shut down your Integration if you try to go around or exceed the limitations we set.
We own all worldwide rights, titles, and interest in the Services and the APIs, including all intellectual property rights, marks, code, and features. You won’t infringe or copy our code, design, or content. Any rights not expressly granted by this policy are withheld, so if you don’t see it here, then it’s not a right we’re giving you. You own all worldwide rights, titles, and interest in the Integration, except for the APIs, our marks, and the Services, including all intellectual property rights. If you give us comments about the APIs or the Services, we may copy, modify, create derivative works, display, disclose, distribute, and use that feedback without any obligation to compensate you.
4- Use of Marks
You may only use our name and marks (meaning our logos, mascots, and copyrighted images) according to these guidelines. You may not alter or remove any proprietary notices in our marks. You won’t use our name or marks in your Integration name or logo, or in any way that implies an endorsement by us. If you use our marks to create your logo or name, you’ll immediately assign those rights to us at no expense.
5- Representations and Warranties
You represent and warrant that you’ll maintain all the licenses required for your Integration, and that your Integration won’t violate any law or regulations in any way.
To the maximum extent permitted by law, We provide the APIs as-is. That means we don’t provide warranties of any kind, either express or implied, including but not limited to merchantability and fitness for a particular purpose.
We may update or modify the APIs and this Policy from time to time by posting the changes on this site or notifying you via email. These changes may affect your use of the APIs or the way your Integration interacts with the API. If we make a change that’s unacceptable to you, you should stop using the APIs. Continued use of the APIs means you accept the change.
You may have access to confidential, proprietary, and non-public information specific to the APIs (“Confidential Information”). You may use this information only to use and build with the APIs. You won’t disclose the Confidential Information to anyone without our written consent, and you’ll protect the Confidential Information from unauthorized use and disclosure in the same way you’d protect your own confidential information.
You’ll indemnify and hold us and our Team harmless from any losses (including attorney fees) that result from third-party claims that relate to your use of the API.
10- The Rest
Thanks for taking the time to read our API Use Policy. People like you are why we have an API in the first place.
- Legal - Acceptable Use Policy
- Legal - Cookie statement
- Legal - API Guidelines