- Infringes or violates the intellectual property rights or any other rights of anyone else;
- Violates any law;
- Is harmful, fraudulent, deceptive, threatening, harassing, defamatory, obscene, or otherwise objectionable;
- Jeopardizes the security of your Rasayel account or anyone else’s (such as allowing someone else to log in to the service as you);
- Attempts, in any manner, to obtain the password, account, or other security information from any other user;
- Violates the security of any computer network, or cracks any passwords or security encryption codes;
- Runs Mail list, Listserv, any form of auto-responder or “spam” on the service, or any processes that run or are activated while you are not logged into the service, or that otherwise interfere with the proper working of the service (including by placing an unreasonable load on the service’ infrastructure);
- “Crawls,” “scrapes,” or “spiders” any page, data, or portion of or relating to the service or Content (through use of manual or automated means);
- Copies or stores any significant portion of the Content; or
- Decompiles, reverse engineers, or otherwise attempts to obtain the source code or underlying ideas or information of or relating to the service.
- provide System passwords or other log-in information to any third-party;
- share nonpublic System features or content with any third-party;
- access the System in order to build a competitive product or service, to build a product using similar ideas, features, functions or graphics of the System, or to copy any ideas; or
- engage in web scraping or data scraping on or related to the System, including without limitation collection of information through any software that simulates human activity or any bot or web crawler.
- your use of the Platform, including unauthorised conduct and conduct that would violate the requirements of these Terms;
- any use of the Platform through your account or passwords, whether authorized or not.
- Exposure to inappropriate material
- Illegal activities
- Harassment
- Legal and financial risks
- Identity theft
- Cyberattack
- Invasion of privacy
- Data breach
- Scams
- Cyber Security is technologies, processes, procedures and controls that are designed to protect Digital Environments from Cyber Security Incidents;
- Cyber Security Incident is the loss or unauthorised destruction, alteration, disclosure of, access to, or control of a Digital Environment;
- Digital Environment is information technology systems, operational technology systems, networks, internet-enabled applications or devices and the data contained within such systems.
- Your use of or your inability to use our Platform or Site Service;
- Delays or disruptions in our Platform or Site Service;
- Viruses or other malicious software got by accessing, or linking to, our Platform or Site Service;
- Glitches, bugs, errors, or inaccuracies of any kind in our Platform or Site Service;
- Damage to your hardware device from the use of the Platform or Site Service;
- The content, actions, or inactions of third parties’ use of the Platform or Site Service;
- A suspension or other action taken regarding your Account;
- Regularly we consult with our developers if urgent issues arise with the Platform or if there are scheduled feature releases or upgrades.
- Hosting company will only be asked to access the data in the Platform’s event being down or server issues.
- We may consult with security experts to ensure continuous Platform safety and compliance.
- Malware : is a type of application that can perform a variety of malicious tasks – spy on the user in other to obtain credentials or other valuable data or to cause disruption.
- Phishing : is where the attacker tries to trick an unsuspecting victim into handing over valuable information, such as passwords, credit card details, intellectual property, and so on.
- MITM - Man-in-the-middle-attack is where an attacker intercepts the communications between two parties in an attempt to spy on the victims, steal personal information or credentials, or perhaps alter the conversation in some way.
- DDoS – Distributed Denial-of-Service attack – is where an attacker essentially floods a target server with traffic in an attempt to disrupt, and perhaps even bring down the target. A DDoS attack is able to leverage multiple compromised devices to bombard the target with traffic.
- SQL injection : is a type of attack which is specific to SQL databases. The attacker can exploit the HTML form to execute queries that will create, read, modify, or delete the data stored in the database.
- Zero-day exploit : is where cyber-criminals learn of a vulnerability that has been discovered in certain widely-used software applications and operation systems, and then target organizations who are using that software in order to exploit the vulnerability before a fix becomes available.
- DNS tunnelling : is a sophisticated attack vector that is designed to provide attackers with persistent access to a given target. Attacker are able to insert or tunnel malware into DNS queries. The malware is used to create a persistent communication channel that most firewalls are unable to detect.
- BEC – Business Email Compromise : is where the attacker targets specific individuals, usually an employee who has the ability to authorize financial transactions, in order to trick into transferring money into an account controlled by the attacker. BEC attacks usually involve planning and research in order to be effective.
- Cryptojacking : is where cyber criminals compromise a user’s computer or device and use it to mine cryptocurrencies, such as Bitcoin. Organizations don’t have great visibility when it comes to this type of attack, which means that a hacker could use valuable network resources to mine a cryptocurrency without the organization having any knowledge of it.
- Drive by Attack : A drive by download’ attack is where an unsuspecting victim visits a Platform which in turn infects their device with malware. The Platform in question could be one that is directly controlled by the attacker, or one that has been compromised. In some cases, the malware is served in content such as banners and advertisements.
- Cross-site scripting (XSS) attacks: Cross-site scripting attacks are quite similar to SQL injection attacks, although instead of extracting data from a database, they are typically used to infect other users who visit the Platform. It can happen on the comment section on a webpage.
- Password attack : is a type of cyberattack where an attacker tries to guess or cracks a user’s password. Some examples: Brute-force attack, Dictionary attack, Rainbow table attack, Credential stuffing, Password spraying and Keylogger attack.
- Eavesdropping attack : Sometimes referred as “snooping” or “sniffing”, an eavesdropping attack is where the attacker looks for unsecured network communications to intercept and access data that is being sent across the network.
- AI-Powered attack : AI-powered software is able to slave machines to perform a huge DDoS attack. Also, can learn what kinds of approaches work best and adapt their attack methods accordingly. They can use intelligence feeds to quickly identify software vulnerabilities, as well as scan systems themselves for potential vulnerabilities. AI-powered attacks can work around the clock, they are fast, efficient, affordable and adaptable.
- IOT-Based attacks : is a type of attack where an attacker goes through an IOT (internet-of-things) device and exploit target such as medical devices, security systems, smart thermometers in order to launch large-scale DDoS attacks.
- we think that you are creating problems or possible legal liabilities for us, our users, suppliers or other third parties;
- we think that such restrictions will improve the security of the Rasayel community or reduce our or another Rasayel User’s exposure to financial liabilities;
- we think that you are infringing the rights of third parties;
- we think that you are acting inconsistently with the letter or spirit of these Terms or our policies or abuse our employees or users.