1. Scope
This policy applies to your use of the website at unhectic.com and to any service we host on your behalf or for your use under a separate engagement. It supplements, and does not replace, our Terms of Service and any service contract you have with us. Where there is a direct conflict, the most specific document governs — usually the service contract for hosted-service questions, and these terms for everything else.
2. Prohibited use
You must not use the site, or any service we host, for any of the following.
- Anything unlawful in any jurisdiction relevant to you or to us, including the laws of England and Wales.
- Anything that infringes the intellectual property rights of a third party — copyright, trade-marks, design rights, patents, or rights in confidential information.
- Anything that harasses, threatens, defames, or unlawfully discriminates against any person.
- Sending unsolicited bulk email, spam, or phishing messages from any service we host.
- Distributing malware, viruses, ransomware, or any other malicious code.
- Attempting to gain unauthorised access to any system, account, network, or data — whether ours or anybody else’s.
- Interfering with the operation of the site or any hosted service, including denial-of-service attacks, brute-force attempts, or excessive automated requests.
- Scraping content at a rate or scale that disrupts service for other users, or that copies substantial portions of our content for republication.
- Using the site to develop a competing service that copies our content, branding, or proprietary methodology.
- Reverse-engineering, decompiling, or disassembling our code beyond what is expressly permitted by applicable law.
3. Security violations
You agree not to probe, scan, or test the vulnerability of our systems without our prior written permission; not to breach or attempt to bypass any security or authentication measure; not to access data not intended for you (including logs, configuration files, or other users’ data); and not to bypass any technical limitation we have in place.
If you are a security researcher and want to report a vulnerability responsibly, please email [email protected] first. We will not pursue any researcher acting in good faith under the principles of coordinated disclosure.
4. Reporting abuse
If you become aware of any breach of this policy, or any security vulnerability in our site or services, please email [email protected]. We aim to acknowledge reports within one working day and to give you a meaningful update on the action we are taking within five working days.
5. Consequences
We may suspend or terminate access to the site or to any hosted service, with or without notice, for any breach of this policy. Where the breach is serious, ongoing, or causes harm to others, we may report it to law enforcement or to the relevant regulator. We reserve all other rights and remedies, including the right to claim damages and to recover the costs of investigating and responding to the breach.
Where access is provided under a service contract, suspension and termination follow the procedure in that contract; this clause does not override it.
6. Changes
We review this policy at least annually, and earlier whenever our practice or the threat landscape changes materially. The version number at the top of this page reflects the current version. When we make a material change we will surface it via the version banner.