Company Policies, Terms and Conditions¶

  • Privacy Policy
    • General
    • Data Collection
    • Opt out of subscriptions or newsletters
  • Information Security Policy
    • Introduction
    • Principles of Data Protection
    • Security Management
    • Security Culture
    • Structure of Information Security Management System
    • Monitoring and Reviews
  • Terms and Conditions
    • Definitions
    • Term
    • Hosted Services
    • Maintenance Services
    • Support Services
    • Customer Data
    • No assignment of Intellectual Property Rights
    • Charges
    • Payments
    • Provider’s confidentiality obligations
    • Data protection
    • Warranties
    • Acknowledgements and warranty limitations
    • Limitations and exclusions of liability
    • Force Majeure Event
    • Termination
    • Effects of termination
    • Notices
    • Subcontracting
    • General
    • Interpretation
  • Support Agreement
    • Agreement
    • Schedule 1 (Software Particulars)
    • Schedule 2 (Support SLA)
  • Acceptable Use Policy
    • Introduction
    • General usage rules
    • Unlawful Content
    • Graphic material
    • Marketing and spam
    • Monitoring
    • Data mining
    • Hyperlinks
    • Harmful software
  • Data Processing Information
    • 1 Introduction
    • 2. Data Processing
    • 3. Data Retention
    • 4. Data Sharing
    • 5. Data Protection
    • 6. Your rights
    • 7. Changes
    • 8. Contact us
  • Reporting Security Issues
    • Bug Validation
    • Bug Bounties

Logo

Navigation

  • User Guide
  • Release Notes
  • Data Sheet
  • Service and Support
  • IT Requirements
  • Policies, T&C

Related Topics

  • Documentation overview
    • Previous: Airside Sync IT Requirements
    • Next: Privacy Policy