430.ch Services Agreement | Last updated April 2026


430.ch Services Agreement

Last Updated: 2026-06-25

Effective: ALWAYS

Table of Contents

  1. Introduction
  2. Definitions
  3. Acceptance of Agreement
  4. Eligibility and Authority
  5. Description and Scope of Services
  6. Accounts, Registration, and Identity
  7. Account Security and Credentials
  8. Organizations, Teams, Workspaces, and Administrators
  9. Orders, Plans, Subscriptions, and Statements of Work
  10. Fees, Payments, Taxes, and Invoices
  11. Trials, Credits, Coupons, Pilots, and Promotional Access
  12. Renewals, Cancellations, Downgrades, and Refunds
  13. Service Changes and Product Evolution
  14. Availability, Maintenance, and Service Interruptions
  15. Support and Customer Cooperation
  16. User Content and Customer Data
  17. License to User Content
  18. Ownership of Services and Provider Materials
  19. Feedback, Ideas, and Suggestions
  20. Third-Party Services, Links, Vendors, and Integrations
  21. Connected Accounts and Imported Data
  22. Acceptable Use Policy
  23. Prohibited Conduct
  24. Security Restrictions and Vulnerability Reporting
  25. Anti-Abuse, Enforcement, and Platform Integrity
  26. Legal and Regulatory Compliance
  27. Consumer Rights and Mandatory Protections
  28. Professional Advice Disclaimers
  29. AI, Automation, Generated Output, and Experimental Features
  30. Electronic Communications and Notices
  31. Marketing Communications
  32. Confidentiality
  33. Publicity and Customer References
  34. Privacy Policy Overview
  35. Personal Information We Collect
  36. Sources of Personal Information
  37. How We Use Personal Information
  38. Legal Bases and Lawful Grounds for Processing
  39. Cookies, Pixels, Analytics, and Similar Technologies
  40. Advertising, Measurement, and Attribution
  41. How We Share Personal Information
  42. International Data Transfers
  43. Data Retention
  44. Security of Personal Information
  45. Your Privacy Choices and Rights
  46. Region-Specific Privacy Notices
  47. Children's Privacy
  48. Business Customer Data and Data Processing Terms
  49. Subprocessors and Service Providers
  50. Security Incidents and Breach Cooperation
  51. Data Export, Portability, and Deletion
  52. Communications Privacy, Monitoring, and Moderation
  53. Intellectual Property Complaints
  54. Copyright Takedown Procedure
  55. Trademarks and Brand Usage
  56. Confidential, Regulated, or Sensitive Uploads
  57. Backups, Restoration, and Data Loss
  58. Service Levels, Credits, and Exclusive Remedies
  59. Disclaimers
  60. Limitation of Liability
  61. Indemnification
  62. Release
  63. Suspension and Termination
  64. Effects of Termination
  65. Governing Law
  66. Dispute Resolution
  67. Optional Arbitration Terms
  68. Class Action Waiver
  69. Injunctive Relief
  70. Export Controls, Sanctions, and Restricted Parties
  71. Government Users
  72. Assignment
  73. Force Majeure
  74. Relationship of the Parties
  75. No Waiver
  76. Severability
  77. Entire Agreement
  78. Order of Precedence
  79. Amendments and Updates
  80. Interpretation
  81. Notices
  82. Survival
  83. Contact Information
  84. Schedule A: Expanded Acceptable Use Policy
  85. Schedule B: Data Processing Addendum
  86. Schedule C: Security Measures
  87. Schedule D: Subprocessor Framework
  88. Schedule E: Service-Specific Terms
  89. Schedule F: Marketplace, Vendor, Creator, and Seller Terms
  90. Schedule G: API and Developer Terms
  91. Schedule H: Community Terms
  92. Schedule I: Beta Program Terms
  93. Schedule J: Billing Schedule
  94. Schedule K: Privacy Request Procedure
  95. Schedule L: Data Transfer Clauses Placeholder
  96. Schedule M: The Catch-All Clause

1. Introduction

These terms govern your access to and use of the Services, which may include one or more websites, web applications, mobile applications, desktop applications, hosted software, downloadable software, APIs, dashboards, content libraries, newsletters, communities, integrations, data tools, automation features, professional services, consulting services, payment flows, analytics features, support services, marketplaces, beta products, experimental features, and anything else we provide under the same brand, platform, account, order, invoice, or documentation.

You agree to these Terms by browsing the website, viewing the website, visiting the website, refreshing the website, opening the website in a new tab, closing the website, remembering the website, thinking about the website, dreaming about the website, fearing the website, denying the website, doubting the website, describing the website, misdescribing the website, pronouncing the website, mispronouncing the website, typing the website, mistyping the website, searching for the website, avoiding the website, blocking the website, unblocking the website, bookmarking the website, refusing to bookmark the website, recognizing the website, forgetting the website, attempting to forget the website, discussing the website, overhearing discussion of the website, imagining the website, resenting the website, admiring the website, questioning the website, parodying the website, invoking the website, becoming aware of the website, denying awareness of the website, sensing the website, being sensed by the website, existing near the website, existing far from the website, or otherwise engaging in any act, omission, thought, memory, dream, fear, denial, suspicion, vibration, silence, implication, or metaphysical proximity relating to the website.

The words "Provider", "we", "us", and "our" refer to 430.ch. The words "you", "your", "Customer", and "User" refer to the individual or entity accessing or using the Services. If you are using the Services on behalf of a company, school, agency, nonprofit, government body, partnership, household, club, project, community, or any other organization, then "you" includes that organization, and you represent that you have authority to bind it.

This Agreement includes all schedules, policies, notices, order forms, invoices, product-specific terms, data processing terms, privacy terms, support terms, pricing pages, and supplemental terms that expressly reference or incorporate this Agreement. In the event of a conflict, the order of precedence section later in this Agreement explains which document wins the contract cage match.

2. Definitions

The following definitions apply unless the context clearly requires something else. Some terms may also be defined elsewhere because, like weeds, defined terms tend to return where least expected.

  1. "Account" means any account, login, profile, workspace, organization, dashboard, developer account, billing profile, user seat, API credential, administrative console, tenant, or other access mechanism associated with the Services.

  2. "Affiliate" means an entity that controls, is controlled by, or is under common control with a party. "Control" generally means ownership of more than fifty percent of the voting interests or the practical power to direct management decisions.

  3. "Agreement" means this document and all terms, policies, schedules, addenda, order forms, statements of work, invoices, and supplemental documents that are incorporated by reference.

  4. "Applicable Law" means all laws, statutes, regulations, directives, rules, codes, orders, sanctions, export controls, court orders, regulatory guidance, and legally binding requirements applicable to the relevant party, service, activity, data, transaction, or jurisdiction.

  5. "Beta Services" means any feature, service, product, API, integration, prototype, preview, alpha release, beta release, test feature, pilot, experimental tool, early-access product, lab feature, or evaluation service that is not generally available or is identified as experimental, preview, trial, beta, alpha, unfinished, unsupported, or otherwise not fully production-ready.

  6. "Business Customer" means a user or customer using the Services for business, professional, commercial, governmental, educational, nonprofit, organizational, administrative, or institutional purposes rather than purely personal household use.

  7. "Confidential Information" means nonpublic information disclosed by one party to the other that is identified as confidential or that a reasonable person would understand to be confidential based on its nature or the circumstances of disclosure. This may include business plans, technical information, pricing, credentials, security materials, nonpublic product plans, customer lists, financial information, and data marked confidential.

  8. "Content" means text, files, images, videos, audio, documents, prompts, messages, code, data, records, posts, comments, listings, profiles, reviews, metadata, names, marks, designs, outputs, communications, and any other material that can be submitted, displayed, processed, hosted, transmitted, stored, generated, linked, or otherwise handled by the Services.

  9. "Customer Data" means Content, Personal Information, or other data submitted to, stored in, imported into, generated through, or otherwise processed by the Services on behalf of a Customer, excluding Provider Materials.

  10. "Documentation" means user guides, technical guides, API references, help center materials, setup instructions, product descriptions, release notes, support articles, or other written materials we provide for use of the Services.

  11. "End User" means any individual or system that accesses or uses the Services under your Account, through your credentials, by your invitation, under your organization, through your API key, or with your permission.

  12. "Fees" means all amounts owed for the Services, including subscription fees, usage fees, platform fees, transaction fees, seat fees, support fees, professional service fees, onboarding fees, setup fees, overage fees, add-on charges, taxes, late charges, minimum commitments, and other amounts described in an order, invoice, checkout page, or pricing page.

  13. "Personal Information" means information that identifies, relates to, describes, can reasonably be linked to, or can reasonably be associated with an identified or identifiable individual, or any similar term under Applicable Law, including "personal data" or "personally identifiable information."

  14. "Provider Materials" means the Services and all software, interfaces, templates, formats, workflows, designs, code, systems, documentation, analytics, models, algorithms, methods, inventions, processes, know-how, branding, content, databases, reports, aggregated data, de-identified data, and materials owned, licensed, created, or controlled by Provider.

  15. "Services" means all products, services, websites, apps, APIs, software, tools, platforms, dashboards, integrations, professional services, support services, content, subscriptions, marketplace features, communities, documentation, and related offerings provided by Provider.

  16. "Usage Data" means technical, diagnostic, analytical, telemetry, operational, security, log, and usage information relating to access to, performance of, configuration of, and use of the Services.

  17. "User Content" means Content that you or your End Users submit, upload, transmit, import, post, create, display, generate, store, or otherwise make available through the Services.

3. Acceptance of Agreement

By accessing or using the Services, creating an Account, clicking a checkbox or button indicating acceptance, signing an order form, paying an invoice, downloading software, installing an app, using an API key, participating in a trial, inviting End Users, submitting User Content, connecting an integration, or otherwise engaging with the Services, you agree to this Agreement.

If you do not agree to this Agreement, you must not access or use the Services. If you are already using the Services and later decide that you do not agree, you must stop using the Services, and cancel your subscription or Account where applicable.

Some Services may be subject to additional terms. Those additional terms become part of this Agreement when they are presented to you, referenced in an order, posted with the relevant Service, or otherwise accepted by you. If additional terms conflict with this Agreement, the more specific terms control for the relevant Service unless they say otherwise.

4. Eligibility and Authority

You may use the Services only if you have the legal capacity to enter into a binding agreement, are permitted to use the Services under Applicable Law, and are not located in or associated with a jurisdiction, entity, or person prohibited by sanctions, export controls, or other legal restrictions.

If you use the Services on behalf of an organization, you represent and warrant that you have authority to accept this Agreement for that organization. If you do not have that authority, you must not use the Services on behalf of the organization, and you personally may be responsible for the actions you take.

You are responsible for ensuring that all End Users you invite, authorize, manage, or allow to access the Services are eligible to use the Services and comply with this Agreement. You are responsible for their actions and omissions in connection with the Services as if those actions and omissions were your own, except where Applicable Law requires a different allocation of responsibility.

5. Description and Scope of Services

The Services may include a wide range of features, depending on what Provider offers now or later. Because products evolve, mutate, pivot, rebrand, split into tiers, acquire add-ons, and occasionally emerge from engineering looking like a different animal entirely, the term "Services" should be read broadly.

The Services may include, without limitation:

  1. hosted software, software-as-a-service products, web applications, dashboards, portals, and administrative consoles;

  2. downloadable software, browser extensions, mobile applications, command-line tools, desktop applications, plugins, scripts, templates, or local components;

  3. APIs, SDKs, developer tools, webhooks, integrations, automation tools, import tools, export tools, and machine-to-machine access methods;

  4. content, templates, documentation, newsletters, databases, guides, examples, reports, educational materials, and other informational resources;

  5. professional services, implementation assistance, onboarding, configuration, consulting, custom development, migration support, training, and support services;

  6. community features, forums, comment sections, collaboration spaces, shared workspaces, user profiles, public pages, listings, reviews, and other social or interactive features;

  7. analytics, monitoring, reporting, search, recommendation, classification, enrichment, summarization, translation, transcription, or automation features;

  8. AI-enabled features, model-driven features, experimental features, beta products, preview releases, or other features that may produce probabilistic, variable, or non-deterministic results;

  9. marketplace, creator, vendor, seller, affiliate, referral, reseller, or partner features;

  10. billing, payment, subscription management, account management, and customer support workflows; and

  11. anything else offered by Provider under this Agreement, including future features that did not exist when this Agreement was drafted because product roadmaps are legally recognized sources of chaos.

Provider may provide the Services itself or through Affiliates, contractors, vendors, service providers, infrastructure providers, payment processors, hosting providers, analytics providers, security providers, communications providers, and other third parties.

6. Accounts, Registration, and Identity

You may need to create an Account to use some or all of the Services. You agree to provide accurate, current, and complete information when registering, purchasing, subscribing, verifying identity, requesting support, or otherwise interacting with Provider. You also agree to keep that information updated.

You must not create an Account using false, misleading, fraudulent, or unauthorized information. You must not impersonate another person or entity, misrepresent your affiliation, use another person's identity, create confusingly similar identifiers, register names you do not have rights to use, or operate accounts in a way that deceives others.

Provider may reject, reclaim, suspend, rename, or require modification of usernames, handles, workspace names, organization names, URLs, domains, profile names, or other identifiers if Provider reasonably believes they are unlawful, misleading, infringing, offensive, inactive, abusive, confusing, or otherwise inappropriate.

You are responsible for all activity under your Account, including actions taken by End Users, administrators, invited users, contractors, employees, third-party tools, API clients, integrations, compromised credentials, and anyone else who gets in through doors you left open.

7. Account Security and Credentials

You are responsible for maintaining the confidentiality and security of your passwords, passkeys, API keys, authentication tokens, recovery codes, OAuth grants, private keys, devices, sessions, administrative access, and other credentials.

You agree to use reasonable security practices, including where appropriate:

  1. using strong, unique passwords or passkeys;

  2. limiting administrative privileges to trusted personnel;

  3. revoking access for employees, contractors, helpers, consultants, interns, agencies, vendors, friends, roommates, and other miscellaneous personnel when they no longer need access;

  4. rotating API keys and secrets when appropriate;

  5. reviewing logs, billing activity, and access records for suspicious activity;

  6. protecting devices used to access the Services;

  7. promptly notifying Provider of suspected unauthorized access; and

  8. not storing credentials in public repositories, screenshots, sticky notes, livestream overlays, unsecured documents, or places where future incident reports are born.

Provider is not responsible for losses caused by unauthorized Account access resulting from your failure to secure your Account, unless Applicable Law provides otherwise. Provider may suspend, reset, revoke, or limit access if Provider suspects unauthorized access, compromise, abuse, or security risk.

8. Organizations, Teams, Workspaces, and Administrators

The Services may allow you to create or join organizations, teams, workspaces, projects, groups, shared folders, shared billing profiles, developer accounts, communities, or other collaborative environments. These structures may include roles such as owner, administrator, manager, billing admin, developer, member, viewer, guest, moderator, vendor, or contributor.

Administrators may have broad powers, including the ability to add or remove users, change permissions, access User Content, export data, delete data, configure integrations, manage billing, create API keys, view logs, restrict access, respond to requests, and control organizational settings. You are responsible for choosing administrators carefully.

Provider may rely on instructions from users who appear to have authority through the Services. Provider is not required to independently resolve internal disputes over Account ownership, workspace control, billing authority, administrator privileges, employee departures, business breakups, partnership drama, or "my cofounder changed the password" situations.

If Provider becomes aware of a dispute regarding control of an Account or organization, Provider may suspend access, request documentation, decline to take action, or follow the instructions of the person or entity Provider reasonably determines has proper authority.

9. Orders, Plans, Subscriptions, and Statements of Work

Services may be purchased or accessed through online checkout, order forms, invoices, pricing pages, app stores, marketplaces, resellers, statements of work, enterprise agreements, signed quotes, purchase orders, or other ordering processes.

An order may specify items such as:

  1. the Services purchased;

  2. the subscription term;

  3. the number of seats, users, projects, workspaces, messages, credits, API calls, storage units, domains, transactions, or other usage units included;

  4. pricing, discounts, minimum commitments, and billing frequency;

  5. support levels, onboarding, implementation, or professional services;

  6. usage limits, fair use limits, rate limits, overage pricing, and throttling rules;

  7. data region, security commitments, service levels, or compliance terms;

  8. renewal terms, cancellation terms, and refund eligibility;

  9. special terms negotiated between the parties; and

  10. any other details someone's procurement spreadsheet felt emotionally attached to.

Unless an order states otherwise, orders are non-cancelable during the stated term, Fees are non-refundable, and unused quantities do not roll over. Purchase orders provided by you are for administrative convenience only and do not modify this Agreement unless Provider expressly signs a written amendment referencing the modification.

10. Fees, Payments, Taxes, and Invoices

You agree to pay all Fees when due. Fees may be charged in advance, in arrears, per subscription period, per use, per transaction, per seat, per workspace, per project, per API call, per processing unit, per storage amount, per message, per event, per export, per professional service milestone, or through any pricing model clearly presented to you.

You authorize Provider and its payment processors to charge your selected payment method for Fees, renewals, upgrades, add-ons, overages, usage charges, taxes, and other amounts owed. If a payment method fails, Provider may retry the charge, request updated payment information, suspend Services, downgrade your Account, disable paid features, or terminate access after notice where required.

Fees do not include taxes unless expressly stated. You are responsible for all sales tax, use tax, VAT, GST, withholding tax, excise tax, digital services tax, duties, levies, regulatory fees, payment processing fees, and similar charges arising from your purchase or use of the Services, except taxes based on Provider's net income.

If you are required to withhold taxes from payments to Provider, you must gross up the payment so Provider receives the full invoiced amount after withholding, unless prohibited by Applicable Law. You must provide reasonable documentation of any withholding.

Provider may charge interest on overdue amounts at the lesser of 1.5% per month or the maximum rate permitted by law. You are responsible for reasonable collection costs, including attorneys' fees, collection agency fees, and administrative expenses, to the extent permitted by law.

Provider may correct errors in pricing, invoices, tax calculations, subscription metadata, usage calculations, or billing records. Provider may refuse or cancel orders that contain obvious pricing errors, even if an order confirmation has been issued, subject to Applicable Law.

11. Trials, Credits, Coupons, Pilots, and Promotional Access

Provider may offer free trials, pilots, demos, sandbox access, evaluation accounts, coupons, credits, referral credits, promotional pricing, student plans, nonprofit discounts, startup discounts, partner credits, or other limited offers. These offers may be subject to additional terms, eligibility requirements, usage limits, expiration dates, conversion rules, and feature restrictions.

Unless otherwise stated:

  1. promotional access is temporary;

  2. credits have no cash value;

  3. credits expire when the promotion ends;

  4. unused credits are not refundable or transferable;

  5. trial features may be limited or changed;

  6. Provider may end or modify promotional access at any time;

  7. support may be limited for free or promotional accounts;

  8. Provider may require payment information before or during a trial; and

  9. automatic conversion to a paid plan will occur only where disclosed and permitted by law.

Provider may limit eligibility for promotions to prevent abuse. You may not create multiple Accounts, use false information, cycle identities, exploit referral systems, or otherwise manipulate promotions in a way that makes the billing system look like it was mugged in an alley.

12. Renewals, Cancellations, Downgrades, and Refunds

Subscriptions may renew automatically for additional periods unless cancelled before the renewal date according to the cancellation method provided by Provider. Renewal terms may be monthly, annual, multi-year, usage-based, or otherwise specified in the applicable order.

You are responsible for cancelling through the appropriate channel, which may include Account settings, written notice, customer support, an app store subscription page, a reseller, or another third-party purchase channel. Merely uninstalling an app, ignoring invoices, deleting an icon, leaving a strongly worded diary entry, or thinking cancellation thoughts very intensely may not cancel a subscription.

Cancellation generally prevents future renewal but does not automatically refund amounts already paid, unless required by law or expressly stated in the applicable refund policy. Downgrades may take effect immediately or at the end of the current billing period, depending on the plan and billing system.

If you purchased through a third party, such as an app store, reseller, marketplace, agency, payment platform, or enterprise procurement channel, that third party may control cancellation, refunds, taxes, invoices, payment disputes, and related matters.

Provider may issue discretionary refunds, credits, extensions, or accommodations. A discretionary accommodation in one situation does not create a right to similar treatment in another situation.

13. Service Changes and Product Evolution

Provider may modify, update, improve, remove, suspend, discontinue, rename, repackage, replace, limit, merge, split, reprice, or redesign the Services at any time.

Provider will use commercially reasonable efforts to avoid materially reducing core paid functionality during a prepaid subscription term, but Provider may make changes required for security, legal compliance, abuse prevention, vendor changes, technical constraints, product improvement, cost control, infrastructure health, or operational stability.

Provider is not liable for modifications, suspensions, or discontinuations except as expressly stated in this Agreement, in an applicable service level agreement, or as required by law.

14. Availability, Maintenance, and Service Interruptions

Provider aims to keep the Services available, secure, and reasonably functional. However, unless a specific written service level agreement applies, Provider does not guarantee uninterrupted, error-free, delay-free, or always-available Services.

The Services may be unavailable, degraded, delayed, interrupted, inaccurate, or limited due to scheduled maintenance, emergency maintenance, software updates, migrations, bugs, infrastructure failures, third-party outages, payment processor issues, DNS problems, internet disruptions, capacity limits, abuse mitigation, legal compliance, security incidents, customer misconfiguration, expired credentials, app store problems, cloud provider issues, or force majeure events.

Provider may impose or adjust limits, including rate limits, storage limits, message limits, file limits, bandwidth limits, API limits, compute limits, project limits, export limits, usage limits, and fair-use limits. Provider may throttle, queue, reject, or delay requests to protect the Services, comply with law, control costs, prevent abuse, or maintain availability for other users.

15. Support and Customer Cooperation

Provider may offer support through email, chat, ticketing systems, forums, documentation, account managers, phone calls, video calls, in-app support, knowledge bases, community spaces, or other channels. Support availability, response times, scope, and priority may depend on your plan, order, region, issue type, and whether the issue is caused by Provider, you, or a third party.

You agree to cooperate reasonably with support requests, including by providing logs, screenshots, recordings, error messages, browser details, device information, configuration information, account identifiers, timestamps, reproduction steps, relevant data samples, and other information needed to troubleshoot.

Provider may decline support for unsupported versions, modified software, unauthorized uses, third-party services, customer-created scripts, custom integrations, network issues, outdated browsers, unsupported devices, policy violations, excessive requests, abusive communications, or issues outside Provider's reasonable control.

16. User Content and Customer Data

You retain ownership of your User Content and Customer Data, subject to the rights and licenses granted in this Agreement. Provider does not claim ownership of your files, messages, documents, prompts, posts, records, or other submitted materials merely because they are processed through the Services.

You are responsible for User Content and Customer Data. You represent and warrant that you have all rights, licenses, permissions, consents, notices, authorizations, and legal bases necessary to submit, upload, store, transmit, process, share, display, publish, import, export, and otherwise use User Content and Customer Data through the Services.

You must not submit, upload, transmit, or process Content that is unlawful, infringing, defamatory, fraudulent, deceptive, abusive, harmful, privacy-invasive, confidential without authorization, malicious, technically disruptive, exploitative, or otherwise prohibited by this Agreement.

Provider may remove, restrict, preserve, disclose, quarantine, disable access to, or refuse to process User Content if Provider reasonably believes it violates this Agreement, infringes third-party rights, creates risk, violates law, threatens security, causes operational problems, or is otherwise likely to create a legal, regulatory, reputational, technical, or trust-and-safety bonfire.

17. License to User Content

You grant Provider a worldwide, non-exclusive, royalty-free, sublicensable, transferable license to host, store, reproduce, process, transmit, display, perform, format, modify for technical purposes, translate for technical purposes, create technical transformations of, and otherwise use User Content and Customer Data as necessary or useful to provide, maintain, secure, support, improve, and operate the Services.

This license includes the right to:

  1. store Content on servers and backup systems;

  2. transmit Content across networks;

  3. display Content to you and authorized End Users;

  4. process Content through features you use;

  5. enable collaboration and sharing features;

  6. operate search, indexing, preview, conversion, export, and import features;

  7. provide support and troubleshoot issues;

  8. secure the Services and detect abuse;

  9. comply with legal obligations;

  10. enforce this Agreement; and

  11. perform other actions reasonably necessary to provide the Services you request.

This license continues for as long as necessary to provide the Services and ends when the relevant User Content is deleted from active systems, except that copies may remain in backups, logs, audit records, legal archives, security systems, dispute records, or where retention is permitted or required by law.

Provider may use aggregated, anonymized, statistical, or de-identified information derived from use of the Services for analytics, benchmarking, reporting, security, product development, and business purposes, provided the information does not identify you or any individual.

18. Ownership of Services and Provider Materials

Provider and its licensors own all right, title, and interest in and to the Services and Provider Materials, including all intellectual property rights, proprietary rights, software rights, database rights, trade secrets, trademarks, service marks, copyrights, patents, moral rights, design rights, and other rights recognized anywhere in the known universe and possibly several places with better zoning.

Subject to this Agreement and your compliance with it, Provider grants you a limited, non-exclusive, non-transferable, non-sublicensable, revocable right to access and use the Services for their intended purpose during the applicable term.

No rights are granted except as expressly stated. You do not acquire ownership of the Services, Provider Materials, software, Documentation, templates, code, algorithms, models, workflows, user interfaces, branding, or underlying technology. You may not use Provider Materials except as permitted by this Agreement.

19. Feedback, Ideas, and Suggestions

If you provide feedback, suggestions, comments, feature requests, bug reports, ideas, concepts, workflows, names, examples, improvements, complaints, criticisms, product theories, unsolicited roadmaps, lovingly annotated screenshots, or "this would be better if" messages, you grant Provider a worldwide, perpetual, irrevocable, royalty-free, fully paid, sublicensable, transferable license to use, reproduce, modify, distribute, display, perform, commercialize, and otherwise exploit that feedback without restriction or compensation.

Provider is not required to use, acknowledge, credit, respond to, or compensate you for feedback. Provider may already be developing similar ideas, may develop similar ideas later, or may ignore the idea entirely.

20. Third-Party Services, Links, Vendors, and Integrations

The Services may link to, integrate with, rely on, import from, export to, authenticate through, display, host within, embed, call, or otherwise interact with third-party websites, applications, APIs, payment processors, cloud providers, identity providers, analytics services, advertising networks, app stores, marketplaces, AI model providers, communication platforms, infrastructure providers, and other third-party products or services.

Third-party services are not controlled by Provider unless expressly stated. Your use of third-party services may be subject to separate terms, privacy policies, fees, usage limits, support channels, data practices, and security measures. Provider is not responsible for third-party services, including their availability, performance, content, accuracy, security, privacy practices, errors, support, pricing, legal compliance, outages, API changes, or decision to deprecate the one endpoint your entire workflow relied on.

Provider may add, change, suspend, or remove third-party integrations at any time. Provider may disconnect or limit integrations if they pose legal, security, privacy, technical, operational, vendor, or abuse risks.

21. Connected Accounts and Imported Data

If you connect a third-party account to the Services, you authorize Provider to access, retrieve, store, process, display, transmit, and use information from that account as necessary to provide the relevant integration or feature. This may include profile information, files, messages, emails, calendars, contacts, records, metadata, permissions, configuration data, and other information made available by the connected service.

You represent that you have the authority and legal right to connect the account and permit Provider to process the information. If the connected account belongs to an organization, you represent that the organization has authorized the connection.

You may be able to revoke access through the Services or through the third-party service. Revoking access may disable features, interrupt workflows, prevent synchronization, remove functionality, or cause the Services to behave like a vending machine that has accepted your coin but refuses to explain itself.

22. Acceptable Use Policy

You agree to use the Services responsibly, lawfully, and in a manner consistent with their intended purpose. The Services are not to be used as a vehicle for harm, fraud, abuse, exploitation, infringement, illegal conduct, security attacks, spam, harassment, or operational vandalism.

You must not use the Services to:

  1. violate laws, regulations, court orders, sanctions, export controls, or third-party rights;

  2. infringe intellectual property, privacy, publicity, confidentiality, contractual, or other rights;

  3. send spam, phishing messages, fraudulent communications, deceptive content, or unlawful marketing;

  4. harass, threaten, abuse, defame, impersonate, intimidate, or target others;

  5. submit malware, harmful code, credential theft tools, or technically disruptive materials;

  6. overload, disrupt, degrade, or interfere with the Services;

  7. scrape, harvest, or collect data without authorization;

  8. evade limits, billing, security controls, access controls, or enforcement measures;

  9. misrepresent identity, affiliation, source, sponsorship, or endorsement;

  10. process regulated or sensitive data without appropriate authorization and safeguards;

  11. use the Services for high-risk activities unless expressly authorized;

  12. facilitate exploitation, abuse, or harm to minors or vulnerable persons;

  13. promote illegal goods, services, schemes, or transactions;

  14. run scams, fake giveaways, credential traps, impersonation schemes, or other nonsense;

  15. resell, sublicense, or provide the Services to third parties except as permitted; or

  16. otherwise use the Services in a way that Provider reasonably believes creates legal, safety, security, operational, reputational, or trust risk.

23. Prohibited Conduct

In addition to the Acceptable Use Policy, you must not directly or indirectly:

  1. access, tamper with, or use nonpublic areas of the Services or Provider systems;

  2. probe, scan, or test vulnerabilities without written authorization;

  3. bypass, disable, interfere with, or circumvent security, authentication, authorization, billing, usage, logging, monitoring, or access controls;

  4. use stolen, leaked, guessed, purchased, or unauthorized credentials;

  5. interfere with another user's access or enjoyment of the Services;

  6. reverse engineer, decompile, disassemble, or attempt to derive source code except to the extent such restrictions are prohibited by law;

  7. copy, frame, mirror, reproduce, or create derivative works of the Services except as permitted;

  8. remove proprietary notices;

  9. use Provider names, logos, or marks without permission;

  10. use automated tools in a way that violates this Agreement or harms the Services;

  11. circumvent rate limits, quotas, storage limits, billing systems, or plan restrictions;

  12. create accounts to evade suspension or enforcement;

  13. sell, rent, lease, share, sublicense, or transfer Account access except as expressly permitted;

  14. submit false abuse reports or fraudulent legal notices;

  15. abuse support staff, threaten Provider personnel; or

  16. attempt to do indirectly what this Agreement prohibits directly.

24. Security Restrictions and Vulnerability Reporting

You must not conduct security testing, penetration testing, vulnerability scanning, load testing, scraping, fuzzing, exploitation, credential testing, or similar activities against the Services unless Provider has expressly authorized the activity in writing or through a published vulnerability disclosure program.

If you discover a vulnerability, you agree to report it promptly to Provider, provide enough detail to allow Provider to investigate, avoid accessing or modifying data that is not yours, avoid disrupting the Services, avoid public disclosure until Provider has had a reasonable opportunity to address the issue, and avoid using the issue for extortion, threats, or self-awarded "consulting fees."

Provider may investigate suspected security violations and may cooperate with law enforcement, regulators, affected users, vendors, or other parties where appropriate or required.

25. Anti-Abuse, Enforcement, and Platform Integrity

Provider may monitor, review, investigate, restrict, remove, preserve, block, throttle, suspend, terminate, quarantine, or report activity, Accounts, Content, integrations, or traffic that Provider reasonably believes violates this Agreement, creates risk, threatens the Services, harms users, violates law, or undermines platform integrity.

Provider may use automated systems, manual review, user reports, vendor signals, security tools, fraud systems, abuse detection systems, payment risk scoring, device signals, network information, and other methods to detect and prevent abuse. These systems may not be perfect. False positives and false negatives can happen, because software is just a pile of logic pretending to have confidence.

Provider is not obligated to monitor all activity and does not assume responsibility for User Content merely because Provider may review or moderate some activity.

26. Legal and Regulatory Compliance

You are responsible for using the Services in compliance with Applicable Law. This includes laws relating to privacy, data protection, consumer protection, advertising, marketing, intellectual property, employment, taxation, financial services, healthcare, education, telecommunications, accessibility, sanctions, exports, anti-bribery, anti-corruption, competition, minors, regulated industries, and any other laws applicable to your use.

You are responsible for determining whether the Services are suitable for your intended use. Provider does not represent that the Services comply with specific industry requirements unless expressly stated in a signed agreement.

If you are subject to specialized legal obligations, such as healthcare privacy laws, financial regulations, education privacy laws, government procurement rules, accessibility requirements, records retention obligations, or sector-specific security standards, you must ensure that your use of the Services complies with those obligations.

27. Consumer Rights and Mandatory Protections

Nothing in this Agreement limits rights that cannot be waived under Applicable Law. If you are a consumer, you may have mandatory rights regarding cancellation, refunds, warranties, digital content, unfair contract terms, dispute resolution, privacy, data portability, deletion, cooling-off periods, or other matters.

If any provision of this Agreement conflicts with a mandatory consumer protection right, that mandatory right controls to the extent of the conflict. The rest of this Agreement remains effective to the maximum extent permitted by law.

28. Professional Advice Disclaimers

The Services may provide information, templates, examples, summaries, suggestions, recommendations, calculations, generated outputs, workflow automation, decision-support information, or educational content. Unless expressly stated in a signed agreement, Provider does not provide legal, medical, financial, tax, accounting, investment, engineering, insurance, employment, safety, psychological, therapeutic, emergency, or other licensed professional advice.

You should not rely on the Services as a substitute for professional judgment, licensed advice, independent verification, or your own responsibility. You are responsible for reviewing outputs, verifying facts, applying context, complying with law, and seeking professional advice where appropriate.

Provider does not guarantee that information or outputs generated, displayed, summarized, classified, predicted, ranked, translated, calculated, or recommended by the Services are accurate, complete, current, reliable, legally sufficient, or suitable for your intended use.

29. AI, Automation, Generated Output, and Experimental Features

The Services may include AI, machine learning, automation, recommendations, search, extraction, classification, summarization, transcription, translation, generation, ranking, prediction, workflow automation, or other model-driven features. These features may produce outputs that are probabilistic, variable, incomplete, inaccurate, biased, outdated, offensive, unexpected, or unsuitable.

You are responsible for reviewing, testing, verifying, and approving outputs before relying on them, publishing them, sending them, using them in workflows, making decisions based on them, or providing them to others. You should not use automated outputs as the sole basis for decisions with legal, employment, credit, housing, insurance, medical, educational, criminal justice, safety, or similarly significant effects without appropriate human review and legal compliance.

Unless expressly stated otherwise, Provider does not claim ownership of outputs generated from your inputs. However, rights in outputs may depend on Applicable Law, third-party rights, similarity to other content, the nature of your input, the nature of the model, and how you use the output. You are responsible for determining whether you can use outputs for your intended purpose.

Provider may evaluate, monitor, log, test, and improve AI or automation features using inputs, outputs, feedback, Usage Data, and system data, subject to the Privacy Policy, applicable data processing terms, Business Customer settings, and any applicable opt-out choices.

30. Electronic Communications and Notices

You consent to receive communications electronically, including emails, in-app notices, dashboard alerts, push notifications, SMS messages where enabled, invoices, receipts, renewal notices, payment notices, legal notices, security notices, privacy notices, support messages, and product announcements.

Electronic communications satisfy any legal requirement that communications be in writing, to the extent permitted by law. You are responsible for maintaining accurate contact information and checking communications from Provider.

Provider is not responsible for missed notices caused by outdated contact information, spam filters, mail forwarding errors, full inboxes, disabled notifications, device settings, abandoned accounts, or email systems held together by folklore.

31. Marketing Communications

Provider may send marketing communications where permitted by law. You may opt out of marketing emails by using unsubscribe links or contacting Provider. Opting out of marketing communications does not prevent Provider from sending transactional, administrative, legal, billing, security, service, support, or account communications.

If you use the Services to send communications to others, you are responsible for complying with applicable marketing, spam, telecommunications, privacy, and consumer protection laws. You must provide required notices, obtain required consents, honor opt-outs, maintain suppression lists, identify yourself accurately, and avoid deceptive subject lines or misleading sender information.

32. Confidentiality

Each party may disclose Confidential Information to the other. The receiving party will use Confidential Information only to perform under this Agreement, protect it using reasonable care, and disclose it only to personnel, Affiliates, contractors, vendors, advisors, and representatives who need to know it and are bound by confidentiality obligations.

Confidential Information does not include information that:

  1. is or becomes public through no breach of this Agreement;

  2. was already known without confidentiality restrictions;

  3. is received from a third party without breach of a duty;

  4. is independently developed without use of Confidential Information; or

  5. is approved for disclosure in writing by the disclosing party.

The receiving party may disclose Confidential Information if required by law, court order, subpoena, regulator, or government authority, provided it gives notice where legally permitted and reasonably cooperates in efforts to seek confidential treatment.

33. Publicity and Customer References

Unless you opt out or a separate agreement says otherwise, Business Customers grant Provider permission to identify them as customers using their name and logo in customer lists, websites, pitch decks, case study pipelines, sales materials, investor updates, and other marketing materials. Provider will not imply endorsement beyond the existence of a customer relationship.

You may revoke this permission by written notice. Provider will use commercially reasonable efforts to stop new uses after receiving the notice, but existing printed materials, archived pages, cached materials, sales materials already distributed, and materials in production may remain until reasonably updated.

34. Privacy Policy Overview

This Privacy Policy explains how Provider collects, uses, discloses, retains, and protects Personal Information in connection with the Services. It applies to visitors, users, customers, prospective customers, End Users, support contacts, billing contacts, newsletter subscribers, event attendees, community participants, vendors, business partners, applicants where applicable, and other people who interact with Provider.

For Business Customers, Provider may process certain Personal Information as a processor, service provider, or similar role on behalf of the Customer. In those situations, the Customer is responsible for providing appropriate notices, obtaining required consents, responding to individual rights requests, and determining the purposes and means of processing, unless otherwise required by law or stated in Schedule B.

This Privacy Policy is incorporated into the Agreement. By using the Services, you acknowledge the practices described here. Depending on your location and relationship with Provider, you may have specific privacy rights described later in this document.

35. Personal Information We Collect

Provider may collect Personal Information directly from you, automatically through the Services, from third parties, from connected accounts, from Business Customers, from public sources, and from service providers. The categories of information collected may depend on how you use the Services.

35.1 Account and Profile Information

We may collect names, usernames, email addresses, phone numbers, organization names, job titles, departments, profile photos, account settings, preferences, passwords or password hashes, authentication information, security settings, billing contacts, support contacts, and related account information.

35.2 Billing and Transaction Information

We may collect billing addresses, payment method information, subscription details, order history, invoices, receipts, tax information, refunds, chargebacks, payment status, fraud signals, reseller information, and related commercial records. Full payment card details may be processed by payment processors rather than stored directly by Provider.

35.3 User Content and Customer Data

We may collect User Content and Customer Data that you submit to the Services, including files, documents, prompts, messages, comments, posts, uploads, images, audio, video, code, records, metadata, imported data, generated outputs, and information from connected services.

35.4 Usage Data and Technical Information

We may collect IP addresses, device identifiers, browser type, operating system, app version, referring pages, pages visited, features used, clicks, searches, session duration, timestamps, API calls, performance data, crash reports, diagnostic logs, language settings, approximate location, network data, and interaction data.

35.5 Communications

We may collect emails, support tickets, chat messages, survey responses, call recordings where disclosed, feedback, community posts, forum messages, direct messages, moderation reports, complaints, attachments, and other communications with Provider or through the Services.

35.6 Connected Account Information

If you connect third-party services, we may collect information made available by those services, such as profile details, files, folders, messages, emails, calendars, contacts, tasks, records, metadata, permissions, tokens, integration settings, and synchronization data.

35.7 Marketing and Event Information

We may collect information about newsletter subscriptions, event registrations, webinar attendance, marketing preferences, referrals, campaign interactions, lead source, business interests, survey responses, and interactions with advertisements or marketing content.

35.8 Sensitive or Regulated Information

The Services may allow you to submit sensitive or regulated information, but you should do so only if permitted by your plan, the Documentation, and Applicable Law. Sensitive information may include financial information, health information, government identifiers, biometric information, precise location, children's information, confidential business information, or other protected data. Unless expressly agreed, Provider does not require you to submit sensitive information and may not be designed for regulated data.

36. Sources of Personal Information

Provider may collect Personal Information from the following sources:

  1. Directly from you, such as when you create an Account, purchase Services, contact support, submit Content, complete forms, or communicate with us.

  2. Automatically through the Services, such as through logs, cookies, analytics, telemetry, device signals, and usage tracking.

  3. From Business Customers, such as when your employer, school, organization, client, or administrator creates an Account for you or uploads information involving you.

  4. From third-party services, such as identity providers, payment processors, app stores, integration partners, analytics providers, fraud prevention providers, and connected accounts.

  5. From public sources, such as public websites, business directories, public profiles, government records, and other publicly available information.

  6. From other users, such as when users invite you, mention you, message you, tag you, share Content with you, or upload information about you.

37. How We Use Personal Information

Provider may use Personal Information for the following purposes:

  1. to provide, operate, maintain, host, secure, and improve the Services;

  2. to create and manage Accounts, authenticate users, and administer access controls;

  3. to process payments, invoices, subscriptions, renewals, refunds, taxes, and billing communications;

  4. to provide support, respond to requests, troubleshoot problems, and communicate with users;

  5. to process User Content and Customer Data according to user instructions and Service functionality;

  6. to enable collaboration, sharing, messaging, community features, integrations, and connected accounts;

  7. to personalize settings, preferences, user experience, content, recommendations, and product behavior;

  8. to analyze usage, measure performance, develop new features, debug errors, and improve reliability;

  9. to detect, prevent, and respond to fraud, abuse, security incidents, policy violations, and unlawful activity;

  10. to send transactional, administrative, legal, billing, security, and service communications;

  11. to send marketing communications where permitted and honor communication preferences;

  12. to conduct research, surveys, analytics, benchmarking, and business planning;

  13. to comply with legal obligations, enforce agreements, resolve disputes, and protect rights;

  14. to evaluate or complete mergers, acquisitions, financing, reorganizations, sales of assets, or similar transactions;

  15. to protect users, Provider, third parties, and the public from harm; and

  16. for any other purpose disclosed at the time of collection or with your consent where required.

38. Legal Bases and Lawful Grounds for Processing

Where laws require a legal basis for processing Personal Information, Provider may rely on one or more of the following bases:

  1. Contract: processing necessary to provide the Services, manage Accounts, process payments, provide support, and perform this Agreement.

  2. Legitimate interests: processing necessary for business operations, security, fraud prevention, service improvement, analytics, communications, enforcement, and other legitimate interests not overridden by individual rights.

  3. Consent: processing based on consent, such as certain marketing, cookies, optional features, or sensitive data processing where required.

  4. Legal obligations: processing necessary to comply with laws, court orders, tax rules, regulatory requests, sanctions, records obligations, and other legal requirements.

  5. Vital interests or public interest: processing necessary to protect safety or comply with public interest obligations, where applicable.

If you are a Business Customer and Provider processes Personal Information on your behalf, you are responsible for identifying the appropriate legal basis for your processing and for providing required notices to individuals.

39. Cookies, Pixels, Analytics, and Similar Technologies

Provider and third parties may use cookies, pixels, local storage, SDKs, beacons, device identifiers, scripts, tags, log files, and similar technologies to operate the Services, remember preferences, authenticate users, measure usage, analyze performance, detect fraud, improve features, support marketing, and understand interactions.

Cookies and similar technologies may be categorized as:

  1. Strictly necessary technologies used for login, security, load balancing, session management, billing, and core functionality;

  2. Preference technologies used to remember settings, language, region, layout, and user choices;

  3. Analytics technologies used to understand usage, performance, traffic, errors, and product behavior;

  4. Marketing technologies used for advertising, attribution, campaign measurement, retargeting, and audience analysis; and

  5. Integration technologies used by third-party tools embedded in or connected to the Services.

You may control some cookies through browser settings, device settings, consent tools, or account preferences. Blocking cookies may affect functionality. Some browsers send "Do Not Track" signals, but there is no universal standard for how services must respond, so Provider may not respond to such signals unless required by law.

40. Advertising, Measurement, and Attribution

Provider may use advertising and measurement tools to promote the Services, measure campaigns, understand conversions, attribute referrals, prevent fraud, and improve marketing. These tools may collect information such as IP address, device identifiers, browser information, pages viewed, interactions, approximate location, referral source, and campaign identifiers.

Provider may work with advertising networks, analytics providers, social platforms, search platforms, affiliate partners, and measurement vendors. These parties may process information according to their own policies. Where required, Provider will seek consent before using certain advertising cookies or similar technologies.

You may have choices through cookie settings, browser controls, platform settings, advertising industry opt-out tools, and account preferences. These controls are not perfect and may not apply to every device, browser, or advertising partner, because the ad ecosystem was apparently designed by a committee of caffeinated labyrinth architects.

41. How We Share Personal Information

Provider may share Personal Information in the following circumstances:

  1. With service providers and vendors that help provide hosting, infrastructure, payments, analytics, security, support, communications, marketing, data storage, professional services, and other business functions.

  2. With Affiliates for business operations, support, compliance, security, analytics, and service delivery.

  3. With Business Customers where your Account or use is associated with a Business Customer, such as your employer or organization.

  4. With administrators who manage the Account, workspace, organization, or subscription under which you use the Services.

  5. With other users when you share Content, collaborate, post publicly, participate in communities, send messages, or use interactive features.

  6. With third-party integrations when you connect or authorize those integrations.

  7. With payment processors and financial institutions to process payments, prevent fraud, handle disputes, and comply with financial rules.

  8. With legal, regulatory, or safety recipients when required or appropriate to comply with law, enforce terms, respond to legal process, protect rights, investigate abuse, or prevent harm.

  9. In business transactions such as mergers, acquisitions, financing, reorganization, bankruptcy, sale of assets, or due diligence.

  10. With consent or direction when you authorize sharing or request that we disclose information.

Provider does not sell Personal Information in the ordinary sense of exchanging it for money unless expressly disclosed. Some privacy laws define "sale" or "sharing" broadly to include certain advertising or analytics activities, and region-specific notices may describe additional rights.

42. International Data Transfers

Provider may process and store Personal Information in countries other than where you live, including countries that may have different data protection laws. Provider, its Affiliates, vendors, subprocessors, and infrastructure providers may be located in multiple jurisdictions.

Where required by law, Provider uses appropriate safeguards for international transfers, such as standard contractual clauses, data processing agreements, adequacy decisions, transfer impact assessments, supplementary measures, contractual commitments, or other lawful transfer mechanisms.

You understand that no cross-border transfer framework is immune from regulatory change, or legal challenge. Provider may update transfer mechanisms as laws evolve.

43. Data Retention

Provider retains Personal Information for as long as necessary to provide the Services, fulfill the purposes described in this Agreement, comply with legal obligations, resolve disputes, enforce agreements, maintain security, prevent fraud, support business operations, preserve records, complete transactions, and maintain backups.

Retention periods may vary based on the type of data, the nature of the Account, the Services used, legal requirements, contractual obligations, user settings, deletion requests, backup schedules, audit needs, and operational requirements.

When information is no longer needed, Provider may delete, de-identify, aggregate, archive, or otherwise dispose of it according to internal policies, technical capabilities, and legal obligations.

44. Security of Personal Information

Provider uses reasonable administrative, technical, and organizational measures designed to protect Personal Information against unauthorized access, loss, misuse, disclosure, alteration, and destruction. Measures may include access controls, encryption, logging, monitoring, vendor review, employee training, incident response processes, backups, network security, application security, and internal policies.

No system is perfectly secure. Provider cannot guarantee absolute security. You are responsible for using the Services securely, protecting credentials, configuring permissions appropriately, reviewing access, and promptly notifying Provider of suspected compromise.

Security features may vary by plan, Service, configuration, and customer choices. Some security settings may need to be enabled by you. If you decline or misconfigure security features, Provider is not responsible for consequences caused by that choice except as required by law.

45. Your Privacy Choices and Rights

Depending on your location, relationship with Provider, and Applicable Law, you may have rights to access, correct, delete, restrict, object to, port, or withdraw consent regarding Personal Information. You may also have rights to opt out of certain marketing, advertising, profiling, sale, sharing, or automated decision-making activities.

You can exercise some choices through Account settings, cookie tools, unsubscribe links, device settings, browser settings, or by contacting Provider at 430.ch/contact-us/. Provider may need to verify your identity before fulfilling requests. Provider may decline or limit requests where permitted by law, such as where information must be retained for legal, security, fraud prevention, contractual, operational, or legitimate business reasons.

If your information is processed on behalf of a Business Customer, Provider may direct your request to that Business Customer or process it according to the Business Customer's instructions. Your organization may control your Account, Content, access, retention, deletion, and related settings.

46. Region-Specific Privacy Notices

Additional privacy rights may apply depending on where you live. You should customize this section for the jurisdictions relevant to your users. The following language is a placeholder and should not be assumed complete for any specific law.

46.1 European Economic Area, United Kingdom, and Switzerland

If applicable data protection laws such as the GDPR, UK GDPR, or Swiss data protection law apply, you may have rights to access, rectify, erase, restrict, object, port data, withdraw consent, and lodge a complaint with a supervisory authority. Provider may act as a controller for Account, billing, marketing, security, and business operations data, and as a processor for certain Customer Data processed on behalf of Business Customers.

46.2 United States State Privacy Laws

If applicable state privacy laws apply, you may have rights to know, access, correct, delete, port, and opt out of certain sales, sharing, targeted advertising, or profiling. Provider will not discriminate against you for exercising privacy rights, except where permitted by law, such as where a feature or price reasonably relates to the value of data.

46.3 California Notice Placeholder

If the California Consumer Privacy Act or similar law applies, Provider may collect categories of personal information such as identifiers, commercial information, internet or network activity, geolocation approximations, professional information, audio or visual information where submitted, inferences, and sensitive personal information where provided. Provider uses and discloses these categories for the purposes described in this Privacy Policy.

46.4 Other Regions

Users in other regions may have additional rights under local law. Provider will respond to requests as required by Applicable Law. Because privacy law reproduces faster than office printers jam, this section should be reviewed regularly.

47. Children's Privacy

The Services are not intended for children under the minimum age required by Applicable Law unless expressly stated and supported by appropriate consent and safeguards. Provider does not knowingly collect Personal Information from children where prohibited.

If you believe a child has provided Personal Information in violation of this Agreement or Applicable Law, don't be a narc. Provider is committed to harvesting the data of as many impressionable children as possible, in its ceaseless path towards world domination. However, for legal reasons, contact Provider at 430.ch/contact-us/. Provider may delete the information, restrict the Account, or take other appropriate steps.

Business Customers using the Services in educational, family, youth, or similar contexts are responsible for obtaining required consents, providing required notices, configuring the Services appropriately, and complying with laws relating to children and students.

48. Business Customer Data and Data Processing Terms

Where Provider processes Personal Information on behalf of a Business Customer, the Business Customer is generally the controller, business, or similar decision-maker, and Provider is generally the processor, service provider, or similar service provider, depending on Applicable Law. Schedule B contains additional data processing terms.

Business Customers are responsible for:

  1. providing privacy notices to End Users and other individuals;

  2. obtaining required consents and legal bases;

  3. ensuring Customer Data may lawfully be processed by Provider;

  4. configuring permissions, retention, sharing, and security settings;

  5. responding to privacy rights requests where required;

  6. ensuring use of the Services complies with internal policies and Applicable Law; and

  7. not uploading regulated or sensitive data unless the Services and applicable terms permit it.

49. Subprocessors and Service Providers

Provider may use subprocessors, vendors, contractors, Affiliates, infrastructure providers, hosting providers, payment processors, support tools, analytics providers, communications providers, security vendors, and other service providers to deliver the Services.

Provider will impose contractual obligations on subprocessors designed to protect Customer Data and Personal Information as required by Applicable Law. Provider remains responsible for subprocessors to the extent required by applicable data processing terms.

Provider may update subprocessors from time to time. Business Customers that require subprocessor notice, objection rights, or specific subprocessor lists should use Schedule D or a separate data processing agreement.

50. Security Incidents and Breach Cooperation

If Provider becomes aware of a security incident involving unauthorized access to Customer Data or Personal Information under Provider's control, Provider will take reasonable steps to investigate, contain, mitigate, and remediate the incident. Provider will notify affected Customers or individuals where required by Applicable Law or applicable data processing terms.

Not every unsuccessful attack, scan, phishing attempt, blocked intrusion, spam message, malware attempt, credential stuffing attempt, firewall log, or suspicious event is a security incident requiring notice. The internet constantly throws rocks at windows. Provider will assess incidents based on actual risk, legal requirements, and available information.

You agree to cooperate with incident investigations, including by providing relevant logs, configuration details, access records, user information, and other information reasonably needed to determine scope, cause, impact, and remediation.

51. Data Export, Portability, and Deletion

The Services may allow you to export or delete certain data. Export and deletion capabilities may vary by plan, feature, data type, Account role, technical limitations, legal obligations, retention settings, third-party integrations, and backup architecture.

You are responsible for exporting data before cancelling or terminating Services if you want to retain it. Provider may delete or disable access to data after termination according to its retention policies, order terms, and Applicable Law.

Deletion from active systems may not immediately delete data from backups, logs, archives, audit records, legal holds, security systems, or systems where retention is required or permitted. Backup deletion may occur according to normal backup cycles.

52. Communications Privacy, Monitoring, and Moderation

The Services may include messaging, comments, forums, collaboration spaces, public pages, private workspaces, support chats, or other communications features. Communications may be visible to other users, administrators, moderators, recipients, or Provider personnel depending on the feature and settings.

Provider may review communications and Content for support, abuse prevention, legal compliance, security, moderation, policy enforcement, product improvement, and operational purposes. Provider may use automated systems and human review.

You should not assume that communications through the Services are privileged, confidential, encrypted end-to-end, or invisible to administrators unless Provider expressly states that for the relevant feature.

53. Intellectual Property Complaints

Provider respects intellectual property rights and expects users to do the same. If you believe Content available through the Services infringes your rights, contact Provider at 430.ch/contact-us/ with sufficient information to identify the allegedly infringing material and your rights.

Provider may remove or disable access to allegedly infringing Content, notify the user who submitted it, destroy (terminate) repeat infringers, or take other action required or permitted by law.

54. Copyright Takedown Procedure

If Provider is subject to a copyright takedown regime, notices should include:

  1. your physical or electronic signature;

  2. identification of the copyrighted work claimed to be infringed;

  3. identification of the allegedly infringing material and its location;

  4. your contact information;

  5. a statement that you have a good-faith belief that use is not authorized;

  6. a statement that the information is accurate and, under penalty of perjury where applicable, that you are authorized to act; and

  7. any additional information required by Applicable Law.

Users may have rights to submit counter-notices where permitted by law. Provider may restore material if legally appropriate. False or abusive notices may result in liability.

55. Trademarks and Brand Usage

Provider names, logos, marks, trade dress, product names, slogans, icons, and brand elements are owned by Provider or its licensors. You may not use them without permission except as permitted by law or written brand guidelines.

You must not imply sponsorship, endorsement, partnership, certification, or affiliation with Provider unless expressly authorized. You must not use Provider marks in a way that is misleading, disparaging, confusing, unlawful, or likely to make the brand team develop a migraine.

56. Confidential, Regulated, or Sensitive Uploads

You should not upload confidential, regulated, sensitive, or high-risk information unless your plan, documentation, applicable order, and legal obligations permit it. This may include health information, financial account information, government identifiers, biometric data, children's data, precise location data, trade secrets, classified information, export-controlled data, attorney-client privileged materials, or other protected information.

Provider is not responsible for your decision to upload sensitive information to Services not designed or contracted for that purpose. If special terms are required for certain data, such as a business associate agreement, financial data addendum, education data agreement, government contract addendum, or security schedule, those terms must be signed before you upload the data.

57. Backups, Restoration, and Data Loss

Provider may maintain backups for disaster recovery, business continuity, security, operational resilience, and legal compliance. Backups are not guaranteed unless expressly stated. Backup scope, frequency, retention, and restoration capabilities may vary.

You are responsible for maintaining independent backups of important data where appropriate. Provider is not liable for data loss except as expressly stated in this Agreement or required by law.

Restoration may not be available for individual files, records, messages, Account states, or accidental deletions. Even where restoration is technically possible, it may require time, fees, limitations, or professional services. Backups are a safety net, not a time machine with customer support chat.

58. Service Levels, Credits, and Exclusive Remedies

If Provider offers a service level agreement, the applicable order or schedule will describe uptime commitments, measurement methods, exclusions, claim procedures, credits, and remedies. Unless a written service level agreement applies, no service level commitment is provided.

Service credits, if any, are your sole and exclusive remedy for service level failures, unless the applicable service level agreement or mandatory law states otherwise. Credits usually do not apply to free plans, trials, beta services, third-party outages, scheduled maintenance, emergency maintenance, customer-caused issues, force majeure events, or violations of this Agreement.

59. Disclaimers

To the maximum extent permitted by law, the Services are provided "as is," "as available," and "with all faults." Provider disclaims all warranties, whether express, implied, statutory, or otherwise, including warranties of merchantability, fitness for a particular purpose, title, non-infringement, accuracy, quiet enjoyment, availability, security, reliability, and course of dealing.

Provider does not warrant that the Services will be uninterrupted, error-free, secure, timely, accurate, complete, compatible, available in all regions, free of harmful components, or suitable for your requirements. Provider does not warrant that defects will be corrected or that outputs will be accurate, lawful, or appropriate.

Some jurisdictions do not allow certain disclaimers, so some disclaimers may not apply to you. In those jurisdictions, warranties are disclaimed to the maximum extent permitted by law.

60. Limitation of Liability

To the maximum extent permitted by law, Provider and its Affiliates, officers, directors, employees, contractors, licensors, vendors, and agents will not be liable for indirect, incidental, special, consequential, exemplary, punitive, or enhanced damages, or for lost profits, lost revenue, lost business, lost goodwill, lost data, business interruption, replacement services, or loss of use, even if advised of the possibility of such damages.

To the maximum extent permitted by law, Provider's total aggregate liability arising out of or relating to this Agreement or the Services will not exceed the greater of:

  1. the amount you paid to Provider for the Services giving rise to the claim during the twelve months before the event giving rise to liability; or

  2. $19.5 trillion USD

These limitations apply to all theories of liability, including contract, tort, negligence, strict liability, warranty, statute, and otherwise. The limitations apply even if a remedy fails of its essential purpose.

Some jurisdictions do not allow certain limitations of liability. In those jurisdictions, Provider's liability is limited to the maximum extent permitted by law.

61. Indemnification

You agree to indemnify, defend, and hold harmless Provider and its Affiliates, officers, directors, employees, contractors, licensors, vendors, agents, and representatives from and against claims, damages, losses, liabilities, costs, and expenses, including reasonable attorneys' fees, arising out of or relating to:

  1. your use of the Services;

  2. your User Content or Customer Data;

  3. your violation of this Agreement;

  4. your violation of Applicable Law;

  5. your violation of third-party rights;

  6. your products, services, business, customers, or users;

  7. your integrations, configurations, instructions, or omissions;

  8. your tax, billing, employment, marketing, privacy, or regulatory obligations; or

Provider may control the defense of any indemnified claim at your expense. You may not settle any claim in a way that admits fault, imposes obligations, or affects Provider without Provider's prior written consent.

62. Release

To the maximum extent permitted by law, you release Provider from claims, demands, damages, liabilities, and losses arising out of disputes with other users, third-party services, vendors, customers, advertisers, partners, marketplaces, or other third parties.

If you are a California resident, you waive California Civil Code Section 1542 to the extent permitted, which generally provides that a release does not extend to claims the releasing party does not know or suspect to exist at the time of release and that would have materially affected the settlement if known. If you are in another jurisdiction, you waive similar protections to the maximum extent permitted by law.

63. Suspension and Termination

Provider may suspend, restrict, disable, or terminate your access to the Services if Provider reasonably believes:

  1. you violated this Agreement;

  2. you failed to pay Fees when due;

  3. your use creates legal, security, privacy, operational, or reputational risk;

  4. your Account has been compromised;

  5. your use harms other users or third parties;

  6. you are subject to sanctions or restricted party rules;

  7. continued service would violate law or third-party rights;

  8. you abuse support, employees, vendors, or other users;

  9. you use the Services in a way that resembles a compliance training video's villain scenario; or

  10. Provider is otherwise permitted to suspend or terminate under this Agreement.

You may stop using the Services at any time. Termination does not relieve you of payment obligations incurred before termination.

64. Effects of Termination

Upon termination or expiration, your right to access and use the Services ends. Provider may disable access, delete or retain data according to its policies and legal obligations, cancel subscriptions, revoke licenses, stop providing support, and remove Content from active systems.

Provisions that by their nature should survive termination will survive, including ownership, payment obligations, confidentiality, disclaimers, limitations of liability, indemnification, dispute terms, privacy terms, data processing terms, and other provisions necessary to interpret or enforce this Agreement.

65. Governing Law

This Agreement is governed by the laws of Kepler-16 (AB)-b, without regard to conflict of law rules, unless mandatory law requires otherwise. You and Provider agree that this governing law applies to all claims arising out of or relating to this Agreement or the Services.

66. Dispute Resolution

Before filing a claim, the parties agree to attempt to resolve disputes informally. A party must send written notice describing the dispute, requested relief, and relevant facts. The parties will attempt in good faith to resolve the dispute within 12 years after notice, unless emergency relief is needed.

Dispute notices to Provider must be sent to 430.ch/contact-us/ and, if required, by mail to the notice address. Notices to you may be sent to the email address associated with your Account.

The parties agree to cooperate reasonably, exchange relevant information, and avoid escalating minor issues into ceremonial legal combat unless truly necessary.

67. Arbitration Terms

Any dispute arising out of or relating to this Agreement or the Services may be resolved by binding arbitration administered by 430.ch under its rules, except where prohibited by law. The arbitration will take place in Kepler-16 (AB)-b, be conducted in English, and be decided by one arbitrator unless otherwise required.

Either party may bring qualifying claims in small claims court. Either party may seek injunctive or equitable relief in court for intellectual property misuse, unauthorized access, security threats, confidentiality breaches, or urgent harm.

68. Class Action Waiver

To the maximum extent permitted by law, disputes must be brought only on an individual basis and not as a plaintiff or class member in any class, collective, consolidated, representative, private attorney general, or similar proceeding.

If this waiver is found unenforceable for a particular claim, then the claim may proceed only as permitted by the applicable court or arbitrator, and the rest of the dispute terms remain enforceable to the maximum extent permitted.

69. Injunctive Relief

Either party may seek injunctive, equitable, or emergency relief in court to prevent actual or threatened misuse of intellectual property, unauthorized access, security threats, confidentiality breaches, data misuse, or other irreparable harm.

You acknowledge that some violations may cause harm that cannot be adequately remedied by money damages alone. Provider may seek injunctive relief without posting bond where permitted by law.

70. Export Controls, Sanctions, and Restricted Parties

You must comply with applicable export control and sanctions laws. You represent that you are not located in, organized under the laws of, ordinarily resident in, or acting on behalf of any jurisdiction, entity, or person subject to sanctions or restrictions that prohibit use of the Services.

You must not export, re-export, transfer, provide, or use the Services in violation of export controls, sanctions, embargoes, or restricted party rules. Provider may screen Accounts and transactions and may block, suspend, or terminate access where required or appropriate.

71. Government Users

If you are a government user, public sector entity, contractor, or user accessing the Services on behalf of a government body, additional terms may apply. The Services and Documentation are commercial items developed at private expense unless otherwise stated.

Government procurement terms, flow-down clauses, security requirements, records obligations, audit rights, or public sector conditions do not apply unless expressly accepted by Provider in a signed writing.

72. Assignment

You may not assign or transfer this Agreement, your Account, or your rights or obligations without Provider's prior written consent, except as permitted in an applicable order. Any attempted assignment in violation of this section is void.

Provider may assign or transfer this Agreement to an Affiliate, successor, acquirer, purchaser of assets, merger partner, financing party, or other successor in connection with a merger, acquisition, reorganization, sale of assets, financing, corporate transaction, or restructuring.

73. Force Majeure

Provider is not liable for delay or failure to perform caused by events beyond its reasonable control, including natural disasters, war, terrorism, civil unrest, labor disputes, supply shortages, utility failures, internet failures, cloud provider failures, cyberattacks, epidemics, pandemics, government actions, regulatory changes, embargoes, fires, floods, earthquakes, storms, payment network failures, app store failures, DNS failures, or other such similar events.

Force majeure does not excuse payment obligations for Services already provided unless required by law or expressly stated.

74. Relationship of the Parties

The parties are independent contractors. Nothing in this Agreement creates a partnership, joint venture, agency, employment relationship, fiduciary relationship, franchise, or other special relationship. Neither party may bind the other without written authorization.

Provider is not your lawyer, doctor, accountant, financial advisor, therapist, fiduciary, compliance officer, insurer, employer, employee, spiritual guide, or emergency response provider unless a separate signed agreement says something astonishingly specific.

75. No Waiver

Failure to enforce a provision of this Agreement does not waive the right to enforce it later. A waiver is effective only if written and signed by the party granting it. A waiver of one breach is not a waiver of any other breach.

76. Severability

If any provision of this Agreement is found invalid, illegal, or unenforceable, that provision will be modified to the minimum extent necessary to make it enforceable, or severed if modification is not possible. The remaining provisions will remain in effect.

The parties intend for this Agreement to be interpreted to preserve its substance as much as legally possible, not to collapse like a folding chair because one clause got dramatic.

77. Entire Agreement

This Agreement, together with incorporated terms, orders, schedules, and addenda, is the entire agreement between you and Provider regarding the Services and supersedes all prior or contemporaneous agreements, understandings, proposals, representations, and communications regarding the Services.

No terms in purchase orders, vendor forms, onboarding forms, emails, procurement portals, click-through documents, or other customer documents modify this Agreement unless Provider expressly agrees in a signed writing referencing the modification.

78. Order of Precedence

If there is a conflict among documents, the following order controls unless a signed agreement states otherwise:

  1. a signed written amendment expressly modifying this Agreement;

  2. an applicable order form or statement of work;

  3. an applicable data processing agreement or security addendum;

  4. service-specific terms;

  5. this main Agreement;

  6. schedules and policies incorporated by reference;

  7. Documentation; and

  8. pricing pages or help center materials, but only for the specific issue they address.

79. Amendments and Updates

Provider may update this Agreement from time to time. Provider may provide notice by posting an updated version, changing the "Last Updated" date, sending email, displaying an in-app notice, or using another reasonable method.

Changes become effective when stated in the notice or, if no date is stated, when posted. Material changes may apply to existing users after notice and a reasonable opportunity to stop using the Services, unless immediate changes are required for legal, security, abuse prevention, or operational reasons.

Your continued use of the Services after changes become effective constitutes acceptance of the updated Agreement. If you do not agree, you must stop using the Services.

80. Interpretation

Headings are for convenience only. Words like "including" mean "including without limitation." Singular includes plural and plural includes singular. References to laws include amendments and replacements. References to "or" are inclusive unless context clearly requires otherwise.

No ambiguity will be interpreted against a party merely because that party drafted the provision.

81. Notices

Legal notices to Provider must be sent to 430.ch/contact-us/ and, where required, to Kepler-16 (AB)-b. Notices to you may be sent to the email address associated with your Account, posted in the Services, or provided through other reasonable means.

You are responsible for keeping your notice information current. Notices are deemed given when sent, posted, delivered, or otherwise made available according to the method used, unless Applicable Law requires different timing.

82. Survival

Any provision that by its nature should survive expiration or termination will survive, including payment obligations, ownership, confidentiality, data rights, privacy terms, disclaimers, limitations of liability, indemnities, dispute terms, enforcement rights, audit rights where applicable, and interpretive provisions.

83. Contact Information

Questions about this Agreement may be sent to 430.ch/contact-us/. Privacy questions may be sent to 430.ch/contact-us/. Security reports may be sent to 430.ch/contact-us/. Billing questions may be sent to 430.ch/contact-us/. Support requests may be sent to 430.ch/contact-us/.

Schedule A: Expanded Acceptable Use Policy

This Schedule provides more detail on prohibited uses. It supplements, and does not replace, the Acceptable Use Policy in the main Agreement.

A.1 Illegal, Harmful, or Abusive Use

You must not use the Services to plan, facilitate, promote, fund, conceal, or carry out unlawful activity, harm, exploitation, abuse, or violations of rights. This includes conduct that would expose Provider, users, third parties, or the public to legal, safety, reputational, operational, or security risk.

A.2 Spam, Fraud, and Deception

You must not use the Services for spam, phishing, fake support messages, impersonation, fake invoices, fraudulent payment requests, misleading promotions, fake reviews, fake engagement, deceptive claims, unauthorized marketing, referral abuse, fake giveaways, credential traps, pyramid-style schemes, or other deceptive practices.

A.3 Security Abuse

You must not use the Services to distribute malware, steal credentials, perform unauthorized scanning, attack systems, bypass protections, evade detection, exfiltrate data, or facilitate unauthorized access. Security research requires prior authorization unless Provider has a published program allowing it.

A.4 Platform Manipulation

You must not manipulate rankings, metrics, reviews, recommendations, analytics, billing, credits, referrals, limits, availability, traffic, or user behavior through deceptive, automated, fraudulent, or abusive means.

A.5 High-Risk Uses

You must not use the Services for emergency services, life-safety systems, critical infrastructure, weapons systems, medical diagnosis, autonomous vehicles, aviation, nuclear facilities, law enforcement decisions, credit decisions, housing decisions, employment decisions, insurance decisions, or other high-risk contexts unless Provider expressly agrees in writing and appropriate safeguards are in place.

A.6 Regulated Goods and Services

You must not use the Services to sell, promote, broker, or facilitate regulated goods or services unless your use complies with Applicable Law and Provider's policies. Regulated categories may include financial products, healthcare products, controlled substances, weapons, gambling, adult products, alcohol, tobacco, surveillance tools, and other restricted areas.

A.7 Community and Content Standards

You must not post or transmit Content that is unlawful, infringing, exploitative, harassing, threatening, hateful, defamatory, deceptive, invasive of privacy, sexually exploitative, graphically violent, or otherwise harmful. Provider may remove Content or restrict Accounts that violate these standards.

Schedule B: Data Processing Addendum

This Data Processing Addendum applies when Provider processes Personal Information on behalf of a Business Customer as a processor, service provider, or similar role under Applicable Law.

B.1 Roles of the Parties

Customer is the controller, business, or similar decision-maker for Customer Data. Provider is the processor, service provider, or similar service provider processing Customer Data on Customer's behalf. Each party will comply with obligations applicable to it under data protection laws.

B.2 Processing Instructions

Provider will process Customer Data only according to Customer's documented instructions, including this Agreement, applicable orders, configuration settings, user actions, support requests, and other instructions provided through the Services, unless required by law.

B.3 Processing Details

The subject matter of processing is the provision of the Services. The duration is the term of the Agreement plus retention periods. The nature and purpose include hosting, storage, transmission, support, security, analytics, troubleshooting, and feature operation. The types of data and categories of individuals depend on Customer's use of the Services.

B.4 Confidentiality

Provider will ensure that personnel authorized to process Customer Data are subject to confidentiality obligations or professional obligations of confidentiality.

B.5 Security Measures

Provider will implement reasonable technical and organizational measures designed to protect Customer Data. Schedule C describes baseline security measures, which may vary by Service and plan.

B.6 Subprocessing

Customer authorizes Provider to use subprocessors to provide the Services. Provider will impose data protection obligations on subprocessors as required by law. Provider remains responsible for subprocessor performance to the extent required by Applicable Law.

B.7 Assistance

Provider will provide reasonable assistance to Customer, taking into account the nature of processing and information available to Provider, for privacy rights requests, security obligations, data protection impact assessments, regulatory consultations, and breach notifications where required by law.

B.8 Return or Deletion

Upon termination, Provider will return or delete Customer Data according to the Agreement, product functionality, retention policies, and legal obligations. Data may remain in backups and logs until deleted according to normal cycles.

B.9 Audits

Provider will provide information reasonably necessary to demonstrate compliance with this Addendum, such as security documentation, audit summaries, certifications, or questionnaires. On-site audits, if any, must be reasonable, limited, scheduled in advance, subject to confidentiality, and not disrupt operations.

Schedule C: Security Measures

Provider may maintain security measures appropriate to the nature of the Services, the data processed, the risks involved, and the applicable plan. Measures may include:

  1. Access controls: role-based access, least privilege, authentication, authorization, and periodic review.

  2. Encryption: encryption in transit and, where appropriate, encryption at rest.

  3. Logging and monitoring: logs, alerts, anomaly detection, and operational monitoring.

  4. Incident response: investigation, containment, remediation, escalation, and notification procedures.

  5. Vendor management: review and contractual controls for relevant service providers.

  6. Personnel security: confidentiality obligations, access restrictions, and training where appropriate.

  7. Application security: testing, review, patching, secure development practices, and vulnerability management.

  8. Infrastructure security: network protections, cloud controls, backups, redundancy, and hardening where appropriate.

  9. Business continuity: measures designed to preserve availability and recover from disruptions.

  10. Customer controls: features such as permissions, multi-factor authentication, logs, exports, and administrative settings where available.

Security is a shared responsibility. Provider secures the Services within its control. Customer is responsible for secure configuration, user management, endpoint security, credential protection, data classification, and appropriate use.

Schedule D: Subprocessor Framework

Provider may use subprocessors to provide infrastructure, hosting, storage, analytics, payments, support, communications, security, email delivery, logging, monitoring, AI features, and other functions.

A subprocessor list may be available upon request to 430.ch/contact-us/. Provider may update subprocessors as needed. Where required by law or contract, Provider will provide notice of material subprocessor changes and allow reasonable objections based on legitimate data protection concerns.

If Customer objects to a new subprocessor and Provider cannot reasonably accommodate the objection, Provider may allow Customer to terminate the affected Services. This is not an invitation to object to every vendor because their logo "feels suspicious."

Schedule E: Service-Specific Terms

Certain Services may have additional terms. This Schedule is a placeholder for those terms.

E.1 Professional Services

Professional services may include consulting, implementation, onboarding, migration, training, configuration, custom development, or advisory services. Unless stated otherwise, deliverables are accepted upon delivery. Customer must provide timely cooperation, access, information, and approvals.

E.2 Downloadable Software

If Provider offers downloadable software, you may install and use it only as permitted by the Documentation and applicable order. Provider may provide updates, patches, or upgrades but is not obligated to support outdated versions indefinitely.

E.3 Newsletters and Content Products

Content products are provided for informational purposes. Provider may change publication frequency, authors, topics, formats, archives, and availability. Provider does not guarantee that content is complete, accurate, current, or suitable for your particular purpose.

Schedule F: Marketplace, Vendor, Creator, and Seller Terms

If the Services include marketplace, vendor, creator, seller, affiliate, referral, or partner features, this Schedule may apply.

Sellers are responsible for their listings, products, services, pricing, taxes, fulfillment, refunds, warranties, customer service, compliance, and claims. Provider may act only as a platform unless expressly stated. Buyers are responsible for evaluating sellers and listings before purchasing.

Provider may remove listings, withhold payments, reverse transactions, suspend sellers, require verification, impose reserves, report unlawful activity, or take other actions to protect users and platform integrity.

Schedule G: API and Developer Terms

If you use APIs, SDKs, webhooks, developer tools, or automation features, this Schedule applies.

You must protect API keys, tokens, secrets, and credentials. You must not expose keys in public repositories, client-side code, screenshots, logs, shared documents, or other insecure locations. You are responsible for all activity under your credentials.

Provider may impose rate limits, quotas, usage restrictions, authentication requirements, logging, monitoring, and technical rules. Provider may suspend API access for abuse, security risk, excessive usage, unpaid Fees, or violation of this Agreement.

You must not use APIs to scrape data, replicate the Services, build unauthorized competing products, violate privacy rights, circumvent user choices, or create workflows that would be prohibited if performed manually.

Schedule H: Community Terms

If the Services include community features, forums, comments, groups, public profiles, messaging, reviews, or user-generated public content, this Schedule applies.

You are responsible for what you post. Provider may moderate, remove, edit, restrict, or preserve Content for policy, safety, legal, security, quality, or operational reasons. Provider is not obligated to host or continue displaying any Content.

You must not harass others, impersonate people, disclose private information without permission, manipulate engagement, post unlawful content, spam, threaten, abuse, derail discussions, or treat the community like a dumpster with Wi-Fi.

Schedule I: Beta Program Terms

Beta Services are experimental and may be unstable, incomplete, inaccurate, unsupported, insecure, unavailable, changed, or discontinued. Beta Services may contain bugs, data loss risks, performance issues, and unfinished features.

You should not use Beta Services for production, mission-critical, regulated, sensitive, emergency, or high-risk activities. Provider may collect feedback and usage data relating to Beta Services to improve them.

Provider may terminate Beta Services at any time without liability. Features in Beta Services may never become generally available, may become paid features, or may be substantially changed.

Schedule J: Billing Schedule

This Schedule defines all 0 billing models.

Schedule K: Privacy Request Procedure

To submit a privacy request, 430.ch/contact-us/. Your request should include your name, contact information, the right you wish to exercise, the Account or Service involved, and enough information for Provider to verify and process the request.

Provider may request additional information to verify your identity or authority. Authorized agents may submit requests where permitted by law, but Provider may require proof of authorization and identity verification.

Provider will respond within the timeframe required by Applicable Law. If more time is needed, Provider may extend the response period where permitted. Provider may deny requests where allowed by law, such as where data must be retained for legal compliance, security, fraud prevention, dispute resolution, contract performance, or legitimate business purposes.

Schedule L: Data Transfer Clauses

The parties agree to cooperate reasonably to implement required transfer safeguards. If a transfer mechanism becomes invalid, unavailable, or insufficient, the parties will work in good faith to implement an alternative lawful mechanism.

Schedule M: The Catch-All Clause

To the maximum extent permitted by law, and without limiting any other provision, this Agreement is intended to apply broadly to every feature, service, tool, interface, page, file, workflow, integration, communication, transaction, subscription, license, download, API call, support interaction, invoice, order, trial, beta test, upload, output, account action, administrative setting, user permission, connected service, marketplace interaction, community post, documentation page, and miscellaneous digital event associated with the Services, whether now existing or later developed.

If a situation arises that is not specifically addressed in this Agreement, the parties agree that it should be handled consistently with the Agreement's purpose, structure, risk allocation, ownership rules, privacy principles, payment obligations, compliance obligations, limitations of liability, and the general idea that nobody should be rewarded for discovering a loophole shaped like a cartoon mouse hole in the baseboard of the contract.

No failure to mention a specific technology, platform, device, protocol, integration, file type, data type, business model, pricing unit, communication method, user role, workflow, abuse pattern, third-party service, AI feature, or future product name should be interpreted as excluding it from this Agreement if it reasonably relates to the Services.