Acceptable Use Policy

Acceptable Use Policy

This Acceptable Use Policy (“Acceptable Use Policy”) sets forth guidelines for acceptable use of the iProov Services which are provided by iProov Limited or a member of its group of companies (“iProov” “we” or “us”), including software and any associated documentation provided by iProov in connection therewith (as used herein, collectively the “Services”).

By using the Services, you acknowledge that you have read, understood and agreed to comply with the terms of this Acceptable Use Policy. Any defined terms used herein and not otherwise defined herein shall have the meaning as set forth in the Subscription Terms, Offering-Specific Terms and other Policies, or other agreement(s) to which you are party, that is or are applicable to the Services (the “Agreement”).

You agree to ensure that there is no breach of this Acceptable Use Policy by you or (where relevant) your employees, consultants, agents, customers, suppliers or independent contractors, and you acknowledge that you will be liable and responsible for any such breach.

For the purposes of this Acceptable Use Policy, references to “you” include (a) any natural person or entity that uses or accesses the Services, (b) any direct or indirect customer of iProov that provides people with access to the Services (whether discretely or as part of another offering or service), and (c) any business that markets, sells or licenses the Services (whether discretely or as part of another offering or service) directly or indirectly to one or more customers or users.

Restrictions, Limitations, Misuse

The following restrictions and limitations shall apply to your access to and use of the Services, and your breaches of any of the following shall be deemed a misuse of the Services and a breach of your obligations:

  1. You agree to use the Services for lawful purposes only.
  2. You are minimum 18 years of age.
  3. You will not, and will not allow a third party to:
    a) copy, modify, sell, sub-license, rent, or transfer the Services to any third party;
    b) attempt to defeat, circumvent or disable any copy protection mechanism in the Services;
    c) modify, distribute, alter, or tamper with the Services;
    d) use, or permit access to, the Services separately to operate in or as a time-sharing, outsourcing, service bureau, application service provider, or managed service provider environment;
    e) reverse engineer, disassemble, or decompile the Services or apply any other process or procedure to derive the source code of any software included in the Services (except to the extent applicable legal requirements don’t allow this restriction, and then only after you have given us notice and an opportunity to resolve any interoperability issues);
    f) access or use any part of the Services in a way intended to avoid incurring fees or exceeding usage limits or quotas;
    g) introduce any infringing, obscene, libellous, or otherwise unlawful data or material into the Services;
    h) access all or any part of the Services in order to build or facilitate the build of a product or service which competes with the Services;
    i) remove, obscure, or alter any intellectual property right or confidentiality notices or legends appearing in or on any aspect of any of the Services;
    j) introduce or attempt to introduce any form of computer virus, malware, worm or other form of malicious software to any part of the Services; or
    k) introduce into or distribute through the Services any imagery or other content that: (a) does not meet iProov’s stated guidelines or requirements; (b) is sexually explicit or indecent; (c) is discriminatory based on race, gender, colour, religious belief, sexual orientation or disability; (d) may infringe iProov’s intellectual property rights, or is capable of causing damage or injury to any person or property.
  4. In addition to the restrictions set out above, the below is conduct deemed by us to be inappropriate, improper or harmful to our reputation, network, or the Services and therefore prohibited when using the Services:
    a) causing, aiding, encouraging, or facilitating any end user to point to or otherwise direct traffic to any material in breach of any applicable legal requirements;
    b) accessing or using the iProov Services other than as expressly permitted by your Agreement;
    c) knowingly generate Transactions that are prevented from completing;
    d) attempt to spoof the Services, including by means of images or by injecting digital data into the iProov APIs, without iProov’s specific written approval;
    e) probe or attempt to penetrate Service, either through access to Services or other online methods, by communication with iProov staff, by attempted physical access to iProov facilities or sites of third party servers hosting the Services or elements of it, without iProov’s specific written approval;
    f) submit Transactions or TCP/IP traffic to iProov at a sustained rate faster than that agreed in writing with, or in the absence of such agreement specified from time to time by, iProov;
    g) test the throughput, performance, latency, simultaneous Transaction capacity or other performance parameters of the Services without the written agreement of iProov;
    h) publish or publicly disclose statistical measures of the performance of the Services, nor existence or details of any spoof attempts made against the Services, without the written agreement of iProov;
    i) indicate or suggest that the Services are provided without the involvement of iProov;
    j) using, encouraging, aiding or facilitating the use of the Services to (including by pointing to web sites or locations that) create, transmit, distribute or store material that: violates trademark, patent, copyright, trade secret or other intellectual property laws, violate the privacy, publicity or other personal rights of others, include tools designed for compromising security (including but not limited to password guessing programs, cracking tools or network probing tools), violate any applicable legal requirements related to export control, data protection or anti-terrorism, or impair the privacy of communications; or
    k) attempting to penetrate or manipulate, or encourage, aid or facilitate the penetration or manipulation of, the security features of the Services or any other system (including but not limited to unauthorized access to or use of data, systems or networks, probing, scanning or testing the vulnerability of a system or network, breaching security authentication measures, unauthorized monitoring of data or traffic, interfering with the service of any user, host or network by any means; forging any TCP/IP packet header or any part of a message header).

In addition to the other rights or remedies available to us, we may (i) immediately, temporarily suspend Services where continued use of Services (a) breaches applicable legal requirements, (b) will have an adverse impact on our network or systems, or (c) we reasonably believe suspension is necessary to mitigate any damage or liability resulting from breach of this Acceptable Use Policy; and (ii) notify the appropriate law-enforcement agencies of any breach of this Acceptable Use Policy.

Under data protection laws, iProov is a processor of the personal data of users of the Services; the controller of that personal data (which determines the purpose and means of the processing of the user’s personal data) is the business, governmental or other entity that provides the user with its interface to the Services (whether discretely or in combination with another offering or service). This Acceptable Use Policy is intended to protect the controller and its users, as well as the Services.

We reserve the right to modify or replace this Acceptable Use Policy at any time and at our sole discretion. We will indicate at the top of this Acceptable Use Policy the date such document was last updated. Any changes to or new versions of this Acceptable Use Policy will be effective immediately upon posting the revised version on or a successor website.