Content on this website is for informational purposes. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described in this website remains at the sole discretion of ISAAC Intelligence. This website is not warranted to be error-free, nor is it subject to any other warranties or conditions, whether expressed orally or implied in law, including implied warranties and conditions of merchantability or fitness for a particular purpose. Contents of this website in any form, software or printed matter, contains proprietary information that is the exclusive property of ISAAC Intelligence. This website and information contained herein may not be copied, reproduced or distributed without the prior written consent of ISAAC Intelligence. This website and its contents are not part of any license agreement nor can it be incorporated into any contractual agreement with ISAAC Intelligence. ISAAC Intelligence cannot be made responsible for the content delivered through the solutions described on this website.
Who we are
We, ISAAC Intelligence Limited, are committed to protecting and respecting your privacy. This policy (together with our Terms of Service and any other documents referred to therein) sets out the basis on which any personal data we collect from you, or that you provide to us, will be processed by us. Please read the following carefully to understand our views and practices regarding your personal data and how we will treat it. For the purpose of the Data Protection Act 1998 (the Act), the data controller is ISAAC Intelligence Limited, company registration No.08556325, 3rd Floor 2, Portland House, Bressenden Place, London, SW1E 5RS. Our nominated representative for the purpose of the Act is the Managing Director.
Information we may collect from you
We may collect and process the following data about you:
- Information that you submit via our website isaacintelligence.com (our ‘sites’) or other identified website. This includes information provided at the time of registering to use our site or subscribing to our services, posting material or requesting further services. We may also ask you for information when you report a problem with our site and we may record any telephone calls with you, for your protection and to monitor the standard of services provided to you.
- If you contact us, we may keep a record of that contact and any related correspondence (including emails).
- Details of transactions you carry out through our site, the fulfillment of orders and the provision of services to you.
- Details of your visits to our site (including, but not limited to, traffic data, location data, weblogs and other communication data, whether this is required for our own billing purposes or otherwise) and the resources that you access.
IP addresses and cookies
We may collect information about your computer, including where available your IP address, operating system and browser type, for system administration and reporting purposes. This is statistical data about your browsing actions and patterns, and does not identify any individual. We may obtain information about your general internet usage by using a cookie file which is stored on the hard drive of your computer. Cookies contain information that is transferred to your computer’s hard drive. They help us to improve our site and to deliver a better and more personalised service. They enable us:
- To estimate our customer size, demographics and usage pattern.
- To store information about your preferences, and so allow us to customise our site according to your individual interests.
- To speed up and accelerate your searches.
- To authenticate your credentials when you return to our site.
Where we store your personal data
Uses made of the information
We use information held about you in the following ways:
- To ensure that content from our site is presented in the most effective manner for you and for your computer.
- To provide you with information, products or services that you request from us or which we feel may interest you, where you have consented to be contacted for such purposes.
- To carry out our obligations arising from any contracts entered into between you and us.
- To allow you to participate in interactive features of our service, when you choose to do so.
- To notify you about changes to our service.
We (and any of our subsidiary companies) may also use your data to provide you with information about our goods and services which may be of interest to you and we may contact you about these by email, post or telephone. If you do not want us to use your data in this way, or to pass your details on to third parties for marketing purposes, please tick the relevant box situated on the form on which we collect your data.
Disclosure of your information
We may disclose your personal information to any member of our group, which means our subsidiaries, our ultimate holding company and its subsidiaries, as defined in section 1159 Companies Act 2006. We may disclose your personal information to third parties:
- In the event that we sell or buy any business or assets, in which case we may disclose your personal data to the prospective seller or buyer of such business or assets.
- If ISAAC or substantially all of its assets are acquired by a third party, in which case personal data held by it about its customers will be one of the transferred assets.
- If we are under a duty to disclose or share your personal data in order to comply with any legal obligation, including a contractual obligation, or in order to enforce or apply our Terms of Service and other agreements; or to protect the rights, property, or safety of ISAAC, our customers, or others. This includes exchanging information with other companies and organisations for the purposes of fraud protection and credit risk reduction.
You have the right to ask us not to process your personal data for marketing purposes. We will usually inform you (before collecting your data) if we intend to use your data for such purposes or if we intend to disclose your information to any third party for such purposes. You can exercise your right to prevent such processing by checking certain boxes on the forms we use to collect your data. You can also exercise the right at any time by contacting us. Our site may, from time to time, contain links to and from the websites of our partner networks, other partners and affiliates. If you follow a link to any of these websites, please note that these websites have their own privacy policies and that we do not accept any responsibility or liability for these policies. Please check these policies before you submit any personal data to these websites.
Access to information
The Data Protection Act gives you the right to access information held about you. Your right of access can be exercised in accordance with the Act. Any access request may be subject to a fee of £10 to meet our costs in providing you with details of the information we hold about you.
This Acceptable Use Policy (AUP) governs your use of any Services provided by ISAAC, including the use of, and access to, your Equipment and/or any ISAAC or third party systems and any use of ISAAC’s website. When we refer to ‘Services’ within this document, it should be construed in this manner. Unless otherwise stated, capitalised terms not defined in this document shall bear the definitions set out in our Terms of Service.
By subscribing for or receiving any Services from ISAAC, or by using our website, you agree to abide by the terms of this AUP, which will be incorporated into any agreement between you and ISAAC and shall apply to any use you make of our website.
Prohibited Uses – Overview
You may use our Services only for lawful purposes. You may not use our Services:
- in any way that breaches any applicable local, national or international law or regulation.
- in any way that is unlawful or fraudulent, or has any unlawful or fraudulent purpose or effect.
- for the purpose of harming or attempting to harm anyone, including minors, or in any manner which will, or is likely to, infringe the personal rights of others;
- in any manner that will, or is likely to, infringe the copyright, trademark, trade secret or other intellectual property rights of others;
- to transmit, or procure the sending of, any unsolicited or unauthorised advertising or promotional material or any other form of similar solicitation or spam.
- in connection with any defamatory, indecent, obscene, offensive, threatening, racist, homophobic, terrorist or abusive conduct or activity;
- to knowingly transmit any data, send or upload any material that contains viruses, Trojan horses, worms, time-bombs, keystroke loggers, spyware, adware or any other harmful programs or similar computer code designed to adversely affect the operation of any computer software or hardware; or
- in any way that is inconsistent with the terms of your agreement with ISAAC.
Without prejudice to the generality of the overview principles set out above, unacceptable use includes, but is not limited to, the following:
- Posting, transmission, re-transmission, or storing material on or through any of ISAAC’s Products or Services, if ISAAC reasonably believes that such posting, transmission, re-transmission or storage is:
- in violation of any local, national or international law or regulation (including rights protected by copyright, trade secret, patent or other intellectual property or similar laws or regulations);
- threatening or abusive;
- racist, homophobic
- promoting violence or terrorist acts
- indecent; or
- Installation or distribution of pirated or other software products that are not appropriately licensed for use.
- Resale of ISAAC’s Products and Services without the express prior written consent of ISAAC (unless you are an authorised wholesaler).
- Deceptive or fraudulent marketing practices.
- Actions that restrict or inhibit anyone – whether a customer of ISAAC or otherwise – in his or her use or enjoyment of ISAAC’s Products and Services, or that generate excessive network traffic through the use of automated or manual routines that are not related to ordinary personal or business use of internet services.
- Introduction of malicious programs into the ISAAC network or servers or other Products and Services of ISAAC (e.g., viruses, Trojan horses and worms).
- Causing or attempting to cause security breaches or disruptions of Internet communications. Examples of security breaches include but are not limited to accessing data of which the customer is not an intended recipient, or logging into a server or account that the customer is not expressly authorized to access(e.g., port scans, flood pings, packet spoofing and forged routing information).
- Executing any form of network monitoring that will intercept data not intended for you.
- Circumventing user authentication or security of any host, network or account.
- Interfering with or denying service to any user other than the customer’s host (e.g., denial of service attack-DDOS).
- Using any program/script/command, or sending messages of any kind, designed to interfere with, or to disable a user’s terminal session.
- Failing to comply with ISAAC’s procedures relating to the activities of customers on ISAAC-owned facilities.
- Furnishing false or incorrect data on the order form contract (electronic or paper) including fraudulent use of credit card numbers or attempting to circumvent or alter the processes or procedures to measure time, bandwidth utilisation or other methods to document use of ISAAC’s products or services.
- Sending unsolicited mail messages, including the sending of junk mail or other advertising material to individuals who did not specifically request such material, who were not previous customers of the customer or with whom the customer does not have an existing business relationship (e.g., e-mail spam).
- Harassment (e.g., through language, frequency, or size of e-mail messages).
- Unauthorised use or forging of mail header information.
- Solicitations of mail or any other e-mail address other than that of the poster’s account or service, with the intent to harass or to collect replies.
- Creating or forwarding chain letters or other pyramid schemes of any kind.
- Use of unsolicited e-mail originating from within the ISAAC network or networks of other Internet Service Providers on behalf of or to advertise any service hosted by ISAAC or connected via the ISAAC network.
- Exporting, re-exporting, or permitting downloads of any content in violation of the export or import laws of the United Kingdom or without all required approvals, licenses and exemptions.
- Use of IRC servers or bots connected to public IRC networks or servers.
Security and Penetration Testing on ISAAC Managed Services
Any form of security testing (also known as penetration testing) on any system managed by ISAAC is subject to ISAAC’s prior written authorisation. The request for authorisation is to be submitted to ISAAC representative giving at least five (5) working days’ notice. Authorisation request should include the scope of the testing activity as well as planned start and end times. ISAAC technical teams will then review the request and identify the set of addresses / systems that can be included in the testing activity and issue an authorisation e-mail to the customer.
ISAAC will determine, in its discretion, whether there has been a breach of this AUP by you. When a breach of this policy has occurred, we may take such action as we deem appropriate.
Failure to comply with this AUP constitutes a material breach of the Terms of Services upon which you are permitted to use the Services, and may result in our taking all or any of the following actions:
- Immediate, temporary or permanent withdrawal of your right to use the Services.
- Immediate, temporary or permanent removal of any posting or material uploaded by you.
- Issue of a written warning to you.
- Legal proceedings against you for reimbursement of all costs on an indemnity basis (including, but not limited to, reasonable administrative and legal costs) resulting from the breach.
- Further legal action against you as recommended by our lawyers.
- Disclosure of such information to law enforcement authorities as we reasonably feel is necessary.
We exclude liability for actions taken in response to breaches of this AUP. The responses described in this policy are not limited, and we may take any other action we reasonably deem appropriate.
Changes to this Policy
We may revise this acceptable use policy at any time by publishing it on our webpage. You are expected to check this page periodically to take notice of any changes we make, as they are legally binding on you. Amendments shall automatically come into effect 30 days after being posted on the Website unless you notify us that you do not agree to any of the proposed amendments. Some of the provisions contained in this AUP may also be superseded by provisions or notices published elsewhere on our Website.
Waiver and Severance
Any failure or delay in exercising or enforcing this policy shall not constitute a waiver of this policy or of any other right or remedy.