Terms and Conditions which you must follow in order to use our Website:
01. COMPLIANCE WITH INTELLECTUAL PROPERTY LAWS.
When accessing our Website, you agree to obey the law and to respect the intellectual property rights of others. Your use of our Website is at all times governed by and subject to laws regarding copyright ownership and use of intellectual property. You agree not to upload, download, display, perform, transmit, or otherwise distribute any information or content (collectively, “Content”) in violation of any third party’s copyrights, trademarks, or other intellectual property or proprietary rights. You agree to abide by laws regarding copyright ownership and use of intellectual property, and you shall be solely responsible for any violations of any relevant laws and for any infringements of third party rights caused by any Content you provide or transmit, or that is provided or transmitted using your User ID. The burden of proving that any Content does not violate any laws or third party rights rests solely with you.
02. PROHIBITED USES.
We impose certain restrictions on your permissible use of our Website. You are prohibited from violating or attempting to violate any security features of our Website, including, without limitation, (a) accessing content or data not intended for you, or logging onto a server or account that you are not authorized to access; (b) attempting to probe, scan, or test the vulnerability of our Website, or any associated system or network, or to breach security or authentication measures without proper authorization; (c) interfering or attempting to interfere with service to any user, host, or network, including, without limitation, by means of submitting a virus to our Website, overloading, “flooding,” “spamming,” “mail bombing,” or “crashing;” or (d) attempting to modify, reverse-engineer, decompile, disassemble, or otherwise reduce or attempt to reduce to a human- perceivable form any of the source code used by us in providing our Website. Any violation of system or network security may subject you to civil and/or criminal liability.
03. INAPPROPRIATE CONTENT.
04. ALLEGED VIOLATIONS.
05. USER CONTENT.
You grant us a license to use any materials you post to our Website, if applicable. By posting, downloading, displaying, performing, transmitting, or otherwise distributing information or other content (“User Content”) to our Website, you are granting us, our affiliates, officers, directors, employees, consultants, agents, and representatives a license to use User Content in connection with the operation of the internet business of us, our affiliates, officers, directors, employees, consultants, agents, and representatives, including without limitation, a right to copy, distribute, transmit, publicly display, publicly perform, reproduce, edit, translate, and reformat User Content. You will not be compensated for any User Content. You agree that we may publish or otherwise disclose your name in connection with your User Content. By posting User Content on our Website, you warrant and represent that you own the rights to the User Content or are otherwise authorized to post, distribute, display, perform, transmit, or otherwise distribute User Content.
06. COPYRIGHT INFRINGEMENT.
We have in place certain legally mandated procedures regarding allegations of copyright infringement occurring on our Website. If you believe your work has been copied in a way that constitutes copyright infringement, please provide a notice containing all of the following information to our Copyright Agent:
(a) An electronic or physical signature of the person authorized to act on behalf of the owner of the copyright interest;
(b) A description of the copyrighted work that you claim has been infringed;
(c) A description of where the material that you claim is infringing is located on the Website;
(d) Your address, telephone number, and e-mail address;
(e) A statement by you that you have a good faith belief that the disputed use is not authorized by the copyright owner, its agent, or the law; and
(f) A statement by you, made under penalty of perjury, that the above information in your notice is accurate and that you are the copyright owner or authorized to act on the copyright owner’s behalf.
Apify Media Pvt. Ltd.
Tamil Nadu, INDIA- 600054
Email- [email protected]
07. AFFILIATED WEBSITES.
08. PREDISPUTE NOTIFICATION AND MEDIATION.
This Agreement provides for final, binding arbitration of all disputed claims (discussed immediately below). We and you agree, however, that it would be advantageous to discuss and hopefully resolve any disputes before arbitration proceedings or any other proceedings authorized herein are initiated. In the event of a dispute, you shall send a notice to us briefly summarizing the claim and the request for relief to the following email address: [email protected] If the dispute is not resolved within 60 days after notice is sent, you may proceed to initiate arbitration proceedings or any other proceedings authorized herein.
09. OPTING OUT OF THE ARBITRATION CLAUSE AND CLASS ACTION WAIVER.
You may elect to opt out (exclude yourself) from the final, binding arbitration procedure and the class action waiver specified in this Agreement by doing the following: Within 30 days of signing up for our website, or submitting information to our website, whichever occurs first, you must send a notice by email to [email protected] that specifies (1) your name, (2) your mailing address and email address, and (3) your request to be excluded from the final, binding arbitration procedure and class action waiver specified in this Agreement. All other terms shall continue to apply, including the requirement to pre-dispute notification and mediation. Your notice must be received by the applicable 30-day deadline to be effective.
a. No License. Nothing contained on our Website should be understood as granting you a license to use any of the trademarks, service marks, or logos owned by us or by any third party.
11. INVESTIGATION RULES.
- When investigating a suspected security vulnerability, users must target their own accounts. Unauthorized access of another user’s account or private data is forbidden.
- Do not use automated testing tools or initiate attacks that could impact the reliability or integrity of our services (port scanning, fuzzing, denial of service attacks, etc).
- Investigation should be limited to services on Vox Media domains. Targeting our third party vendors is not allowed.
- Violations of these rules will result in account suspension and/or IP banning.
12. REPORTING SUSPECTED VULNERABILITIES.
- All vulnerabilities or security concerns should be reported by email to [email protected].
- Please provide as detailed an explanation of the vulnerability as possible (including reproduction steps and/or examples), so that we can evaluate and respond as quickly as possible.
13. OUR RESPONSE.
Our team will review the submitted report, and create a case in our issue tracking system. You will receive a response via email within 24-72 hours outlining the next steps in the process and regular updates from us as we investigate and/or fix the issue.
To protect our users, we ask that you not publicly discuss the issue until we have addressed the reported vulnerability.
Last updated 22/09/ 2018