Você está aqui: Página Inicial / TERMS OF USE

TERMS OF USE

Hackerrangers.com and all its domains are owned and operated by Perallis Security, herein referred to as "we", "us", "our", "Hacker Rangers" and "Perallis". The following terms and conditions, referred to as "Terms of Use", establish an agreement between you (any user of Hacker Rangers) and us.

Please read these Terms of Use carefully and thoroughly. Your access or use of your Hacker Rangers instance and any information, material, data, products, services and other materials made available through Hacker Rangers are subject to these terms and conditions and to all applicable laws.

By accessing or using any part of Hacker Rangers, you agree to the Terms of Use. If you are accessing or using Hacker Rangers on behalf of an entity or company, you represent and warrant that you have the authority to bind such entity or company to these Terms of Use. If you do not wish to be bound by these Terms of Use, please exit Hacker Rangers and cease using all content, as you are not permitted to access or use it.

These Terms of Use may be amended by us at our discretion at any time with or without notice. Any changes or modifications to these Terms of Use will be effective after its posting on the website. You must always review these Terms of Use before accessing or using the website to ensure that you understand the current terms and conditions that apply to your access or use. Your continued use of the website after the posting of any changes or modifications will constitute your acceptance of such changes or modifications. If you cannot access these Terms of Use via Internet, we may provide you with a copy of the current Terms of Use by email upon request.

 

GENERAL CONDITIONS FOR ACCESS AND RESTRICTION OF USE

 

The access and use of any information, material, data, products, services and other materials made available on this website are authorized solely for the internal business purposes of the organization you represent and exclusively for the period contracted. It is strictly prohibited to share and/or disclose screenshots, downloads or other ways of copying, duplication or replication of products, services, documents and other related materials, publicly or otherwise, out of your organization or regular use of the service.

 

DATA OWNERSHIP

 

Perallis owns all content created and stored at Hacker Rangers. You are not licensed to use, reproduce, adapt, modify, publish or distribute the content for commercial, marketing or any other use except with express permission. All trademarks, logos, service marks, symbols, trade dress and all materials provided on or through the platform are protected by copyright and industrial property laws.

The publication, display or other provision of any content on this site shall not constitute a waiver of any right or interest of Perallis. Except as expressly provided herein, nothing contained in these Terms of Use or in the website shall be construed as conferring any license, interest or right under any copyright, trademark or proprietary rights of Perallis or any third party. Unless otherwise stated, no content, in whole or in part, may be used, copied, reproduced, distributed or redistributed, published or republished, downloaded, modified, displayed, posted, transmitted, imitated, adapted, translated or transmitted in any form or by any means without our consent.

 

PHISHING SIMULATION

 

The mention of real and widely known images, brands and symbols in phishing simulations serves the educational purpose of cybersecurity awareness only, so that it does not offer risks to users, does not constitute a link to the brands/companies eventually mentioned and does not have a defamatory character to their reputation.

 

USE PERMISSIONS

 

You are granted permission to access and use your Hacker Rangers instance and its contents, as well as use the contents herein for your personal, informational and non-economic use only, while respecting the terms and conditions of these Terms of Use, and you are prohibited from:

(I) modifying or tampering with the contents, in whole or in part;

(II) using Hacker Rangers or its contents in a fraudulent, accusatory, defamatory, offensive, obscene, threatening, abusive, malicious, offensive, objectionable manner that would constitute or encourage a criminal offense, violate the rights of another, or violate or conflict with these Terms of Use or any applicable law;

(III) using this website to damage or attempt to gain unauthorized access to the content, other Hacker Rangers accounts, any restricted portions of the website, or any computer network or related equipment;

(IV) interfering with or disrupting Hacker Rangers in any way, as well as manipulating, violating, or attempting to probe, scan, or test the vulnerability of the website or any related computer network or equipment;

(V) using any software, devices or other processes (manual or automated) to extract any content or data, or to simulate the layout or tools of this website; and

(VI) removing or modifying any copyrights, trademarks, and other proprietary notices contained on the site or in its contents.

 

PRIVACY POLICY

 

All personal data provided to us in connection with your use of your Hacker Rangers instance are in accordance and in compliance with current legislation.

 

TERMINATION

 

These Terms of Use will remain in full force and effect as long as you use your Hacker Rangers instance or maintain an account. You may terminate these Terms of Use at any time by ceasing your use and access to the website and its contents, and by destroying all materials that you have saved, printed or downloaded from the website. We reserve the right, without notice, to terminate your permission to use the website and to block or prevent future access and use of the website and its contents, in appropriate circumstances, when a repeated violation of these Terms of Use occurs.

 

FINAL ARRANGEMENTS

 

We emphasize that any references to individuals, businesses, entities, products, processes or services on the website are provided solely as examples and information. The way these individuals or organizations act in the marketplace or position themselves before the community does not reflect any opinion of ours and such references must not be quoted or reproduced for the purpose of stating or suggesting approval or disapproval by Perallis.