Security
Goldidate Team of users quality assurance checking and working on making a safer environment for everyone.  

Prohibited activities and uses
You may not use the Services to publish content or engage in activity that is illegal under applicable law, that is harmful to others, or that would subject us to liability, including, without limitation, in connection with any of the following, each of which is prohibited under this Policy:
Distributing malware or other malicious code.
Disclosing sensitive personal information about others.
Collecting, or attempting to collect, personal information about third parties without their knowledge or consent.
Distributing pornography or adult-related content.
Promoting or facilitating prostitution or any escort services.
Hosting, distributing, or linking to child pornography or content that is harmful to minors.
Promoting or facilitating gambling, violence, terrorist activities or selling weapons or ammunition.
Engaging in the unlawful distribution of controlled substances, drug contraband or prescription medications.
Managing payment aggregators or facilitators such as processing payments on behalf of other businesses or charities.
Facilitating pyramid schemes or other models intended to seek payments from public actors.
Threatening harm to persons or property or otherwise harassing behavior.
Manual or automatic credit card or other available payment methods testing using bots or scripts.
Misrepresenting or fraudulently representing products or services.
Infringing the intellectual property or other proprietary rights of others.
Facilitating, aiding, or encouraging any of the above activities through the Services.

System abuse
Any User in violation of the Services security is subject to criminal and civil liability, as well as immediate account termination. Examples include, but are not limited to the following:
Use or distribution of tools designed for compromising security of the Services.
Intentionally or negligently transmitting files containing a computer virus or corrupted data.
Accessing another network without permission, including to probe or scan for vulnerabilities or breach security or authentication measures.
Unauthorized scanning or monitoring of data on any network or system without proper authorization of the owner of the system or network.

Security
Goldidate Team of users quality assurance checking and working on making a safer environment for everyone.  

Prohibited activities and uses
You may not use the Services to publish content or engage in activity that is illegal under applicable law, that is harmful to others, or that would subject us to liability, including, without limitation, in connection with any of the following, each of which is prohibited under this Policy:
Distributing malware or other malicious code.
Disclosing sensitive personal information about others.
Collecting, or attempting to collect, personal information about third parties without their knowledge or consent.
Distributing pornography or adult-related content.
Promoting or facilitating prostitution or any escort services.
Hosting, distributing, or linking to child pornography or content that is harmful to minors.
Promoting or facilitating gambling, violence, terrorist activities or selling weapons or ammunition.
Engaging in the unlawful distribution of controlled substances, drug contraband or prescription medications.
Managing payment aggregators or facilitators such as processing payments on behalf of other businesses or charities.
Facilitating pyramid schemes or other models intended to seek payments from public actors.
Threatening harm to persons or property or otherwise harassing behavior.
Manual or automatic credit card or other available payment methods testing using bots or scripts.
Misrepresenting or fraudulently representing products or services.
Infringing the intellectual property or other proprietary rights of others.
Facilitating, aiding, or encouraging any of the above activities through the Services.

System abuse
Any User in violation of the Services security is subject to criminal and civil liability, as well as immediate account termination. Examples include, but are not limited to the following:
Use or distribution of tools designed for compromising security of the Services.
Intentionally or negligently transmitting files containing a computer virus or corrupted data.
Accessing another network without permission, including to probe or scan for vulnerabilities or breach security or authentication measures.
Unauthorized scanning or monitoring of data on any network or system without proper authorization of the owner of the system or network.

COMMUNITY

CONTACT US

Help & Support

Help & Support

CONTACT

[contact-form-7 id="311" title="footer form"]

CONTACT US

CONTACT

[contact-form-7 id="311" title="footer form"]