kapalya.com
Open in
urlscan Pro
54.183.20.169
Public Scan
Submitted URL: http://kapalya.com/
Effective URL: https://kapalya.com/
Submission: On November 19 via api from US — Scanned from DE
Effective URL: https://kapalya.com/
Submission: On November 19 via api from US — Scanned from DE
Form analysis
1 forms found in the DOMPOST forms/contactphpemail.php
<form id="contact_us" action="forms/contactphpemail.php" method="post" role="form" class="php-email-form">
<div class="form-row">
<div class="form-group col-md-6">
<label for="name">Your Name</label>
<input type="text" name="name" class="form-control" id="name" data-rule="minlen:4" data-msg="Please enter at least 4 chars">
<div class="validate"></div>
</div>
<div class="form-group col-md-6">
<label for="name">Your Email</label>
<input type="email" class="form-control" name="email" id="email" data-rule="email" data-msg="Please enter a valid email">
<div class="validate"></div>
</div>
</div>
<div class="form-group">
<label for="name">Subject</label>
<input type="text" class="form-control" name="subject" id="subject" data-rule="minlen:4" data-msg="Please enter at least 8 chars of subject">
<div class="validate"></div>
</div>
<div class="form-group">
<label for="name">Message</label>
<textarea class="form-control" name="message" rows="10" data-rule="required" data-msg="Please write something for us"></textarea>
<div class="validate"></div>
</div>
<div class="form-group">
<div class="g-recaptcha" data-sitekey="6Ld359caAAAAAGcM23g0yDY2HeJjZ-7gN-1EL4O1">
<div style="width: 304px; height: 78px;">
<div><iframe title="reCAPTCHA"
src="https://www.google.com/recaptcha/api2/anchor?ar=1&k=6Ld359caAAAAAGcM23g0yDY2HeJjZ-7gN-1EL4O1&co=aHR0cHM6Ly9rYXBhbHlhLmNvbTo0NDM.&hl=de&v=Km9gKuG06He-isPsP6saG8cn&size=normal&cb=w34vbjkvvjm2" width="304"
height="78" role="presentation" name="a-kx035p4agxc8" frameborder="0" scrolling="no" sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox"></iframe></div>
<textarea id="g-recaptcha-response" name="g-recaptcha-response" class="g-recaptcha-response" style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
</div><iframe style="display: none;"></iframe>
</div>
</div>
<div class="mb-3">
<div class="loading">Loading</div>
<div class="error-message"></div>
<div class="sent-message">Your message has been sent. Thank you!</div>
</div>
<div class="text-center">
<button type="submit">Send Message</button>
</div>
</form>
Text Content
x AI/ML BASED RANSOMWARE INOCULATION & DATA ENCRYPTION Learn More 00 0 0 00 0 0 00 0 0 00 0 0 00 0 0 00 0 0 00 0 0 00 0 0 Kapalya's crowdfunding campaign is live. Find out how you can join the fight. Learn More * Home * About Us * Solution * Government * Enterprise * SMB * Who We Are * Press Release * Blog * Partners * Resources * Sales Sheet * Data Sheet * User Guide * Contact Us ENCRYPTION MANAGEMENT PLATFORM CONFIDENTIAL FILES, ALWAYS ENCRYPTED. MANAGE YOUR OWN KEYS, ENCRYPT, STORE AND SHARE SENSITIVE DATA ACROSS ENDPOINTS (WINDOWS, MAC, IOS & ANDROID), PUBLIC CLOUDS (BOX, AWS, GOOGLE & AZURE) AND PRIVATE CLOUD. Watch Video For US State and Federal Government Agencies DUNS # 080041915; CAGE # 7HLM3 ABOUT US KAPALYA empowers businesses and their employees to securely store sensitive files at-rest and in-transit across multiple platforms through a user-friendly desktop and mobile application. This ubiquitous encryption solution protects all your corporate data by seamlessly encrypting files on: * End-points computers/mobile devices. * Corporate servers and public cloud providers. * With KAPALYA, users have the ability to share encrypted files across multiple cloud platforms. * Integerated with Box, Amazon S3, Google and Microsoft Azure. KAPALYA SOLUTION FOR GOVERNMENT * 01 End-point Security The encryption management platform creates a secure vault on user endpoints where: * A data classification engine scans the endpoint for sensitive files and prompts users to encrypt. * All data within the vault is encrypted. * Each file and folder is assigned a unique encryption key. * No additional disk or storage space is taken up on the endpoint. * 02 Public Cloud Security The problem with using the encryption offered by public cloud vendors: * Vendors will encrypt files at-rest on their cloud, however, files sitting on a user’s endpoint are left unencrypted and vulnerable to attacks. * The cloud provider won’t protect your files on endpoints or private clouds. * Most cloud providers control the encryption keys, making data visible to their cloud administrators. * Some cloud providers allow customers to bring and manage their own keys. However, integrating with a cloud provider’s key management system requires programming which could result in time consuming efforts and if not configured properly, could expose the customer’s data. * The Encryption Management Platform is cloud agnostic and uses client-side encryption so files and folders are encrypted before leaving the endpoint. While in-transit, files are double encrypted as they move through an SSL tunnel. Since the user controls the keys, your files are protected from eavesdropping by any third-party, including your cloud storage provider. * A unique encryption key per file allows users to share protected files across cloud storage platforms and to other Encryption Management Platform users. * 03 Private Cloud Security KAPALYA creates a secure vault for each user on your private cloud as well, to allow file and folder protection within your network. * Your internal corporate administrators do not have privileges to view end-user data. * User’s credentials are not tied to the enterprise’s active directory. * 04 Encryption Key Management Key management done differently: * One unique key for each file and folder Keys are served in real-time. * Keys are never stored on endpoints, public clouds or private clouds. Once the function is complete, the keys are destroyed. * This approach allows for encrypted file sharing within and outside your network. * When file sharing, only the unique key for that file is shared, not the keys to all your files. * 05Data Classification * KAPALYA’s data classification engine scans 250+ file types for social security numbers, credit card numbers, state I.D.s and driver's’ license numbers. The engine is customizable to identify the sensitive data your organization handles. * If confidential data is found sitting on endpoints, the platform will prompt users with a list of files, and options to preview, encrypt or delete. The frequency of scans can be on-demand or programmed to run at certain times or intervals and can be configured based on business needs. KAPALYA SOLUTION FOR ENTERPRISE * 01 End-point Security The encryption management platform creates a secure vault on user endpoints where: * A data classification engine scans the endpoint for sensitive files and prompts users to encrypt. * All data within the vault is encrypted. * Each file and folder is assigned a unique encryption key. * No additional disk or storage space is taken up on the endpoint. * 02 Public Cloud Security The problem with using the encryption offered by public cloud vendors: * Vendors will encrypt files at-rest on their cloud, however, files sitting on a user’s endpoint are left unencrypted and vulnerable to attacks. * The cloud provider won’t protect your files on endpoints or private clouds. * Most cloud providers control the encryption keys, making data visible to their cloud administrators. * Some cloud providers allow customers to bring and manage their own keys. However, integrating with a cloud provider’s key management system requires programming which could result in time consuming efforts and if not configured properly, could expose the customer’s data. * The Encryption Management Platform is cloud agnostic and uses client-side encryption so files and folders are encrypted before leaving the endpoint. While in-transit, files are double encrypted as they move through an SSL tunnel. Since the user controls the keys, your files are protected from eavesdropping by any third-party, including your cloud storage provider. * A unique encryption key per file allows users to share protected files across cloud storage platforms and to other Encryption Management Platform users. * 03 Private Cloud Security KAPALYA creates a secure vault for each user on your private cloud as well, to allow file and folder protection within your network. * Your internal corporate administrators do not have privileges to view end-user data. * User’s credentials are not tied to the enterprise’s active directory. * 04 Encryption Key Management Key management done differently: * One unique key for each file and folder Keys are served in real-time. * Keys are never stored on endpoints, public clouds or private clouds. Once the function is complete, the keys are destroyed. * This approach allows for encrypted file sharing within and outside your network. * When file sharing, only the unique key for that file is shared, not the keys to all your files. * 05Data Classification * KAPALYA’s data classification engine scans 250+ file types for social security numbers, credit card numbers, state I.D.s and driver's’ license numbers. The engine is customizable to identify the sensitive data your organization handles. * If confidential data is found sitting on endpoints, the platform will prompt users with a list of files, and options to preview, encrypt or delete. The frequency of scans can be on-demand or programmed to run at certain times or intervals and can be configured based on business needs. KAPALYA SOLUTION FOR SMB * 01 End-point Security The encryption management platform creates a secure vault on user endpoints where: * A data classification engine scans the endpoint for sensitive files and prompts users to encrypt. * All data within the vault is encrypted. * Each file and folder is assigned a unique encryption key. * No additional disk or storage space is taken up on the endpoint. * 02 Public Cloud Security The problem with using the encryption offered by public cloud vendors: * Vendors will encrypt files at-rest on their cloud, however, files sitting on a user’s endpoint are left unencrypted and vulnerable to attacks. * The cloud provider won’t protect your files on endpoints or private clouds. * Most cloud providers control the encryption keys, making data visible to their cloud administrators. * Some cloud providers allow customers to bring and manage their own keys. However, integrating with a cloud provider’s key management system requires programming which could result in time consuming efforts and if not configured properly, could expose the customer’s data. * The Encryption Management Platform is cloud agnostic and uses client-side encryption so files and folders are encrypted before leaving the endpoint. While in-transit, files are double encrypted as they move through an SSL tunnel. Since the user controls the keys, your files are protected from eavesdropping by any third-party, including your cloud storage provider. * A unique encryption key per file allows users to share protected files across cloud storage platforms and to other Encryption Management Platform users. * 03 Private Cloud Security KAPALYA creates a secure vault for each user on your private cloud as well, to allow file and folder protection within your network. * Your internal corporate administrators do not have privileges to view end-user data. * User’s credentials are not tied to the enterprise’s active directory. * 04 Encryption Key Management Key management done differently: * One unique key for each file and folder Keys are served in real-time. * Keys are never stored on endpoints, public clouds or private clouds. Once the function is complete, the keys are destroyed. * This approach allows for encrypted file sharing within and outside your network. * When file sharing, only the unique key for that file is shared, not the keys to all your files. * 05Data Classification * KAPALYA’s data classification engine scans 250+ file types for social security numbers, credit card numbers, state I.D.s and driver's’ license numbers. The engine is customizable to identify the sensitive data your organization handles. * If confidential data is found sitting on endpoints, the platform will prompt users with a list of files, and options to preview, encrypt or delete. The frequency of scans can be on-demand or programmed to run at certain times or intervals and can be configured based on business needs. FEATURES Encrypt Data is encrypted in-transit and at-rest on endpoints, corporate servers and public clouds. Auto-Protect Out-of-the-box data classification engine scans over 250 file types for sensitive data. Hidden Zero-knowledge encryption masks cloud and corporate admins visibility into your data and encryption keys. Keys A unique key for each file and folder provides ultimate data security. Share Allows end-to-end encrypted file sharing across multiple public cloud platforms. Save Time & Money Eliminates the need of managing multiple vendors to secure your data at different points. HOW IT WORKS ? Launch the app on your Windows or Mac computer and the Encryption Management System automatically scans for sensitive data. Upload and encrypt any confidential data on endpoints (computers/mobile devices), corporate servers and/or public cloud providers. Securely share your encrypted files, photos and videos through a public cloud provider. Encryption is based on NSA Suite B Cryptography Standards using a FIPS 140-2 certified virtual key manager (vHSM). Your browser did not support HTML5 video. Thisis a link to download the video. SERVICE OFFERINGS MANAGED PLATFORM SERVICES MANAGED AND HOSTED BY KAPALYA * Configure Encryption Management System on multiple devices per user (PC, Mac, iOS & Android). * Encrypted file sharing across multiple cloud providers (AWS/Box/Google/Microsoft). * Dashboard to view all user activities and registered devices. * Unlimited unique encryption keys for each file and folder. * Auto-detection and encryption of 250+ sensitive file types. * Encryption support on private cloud storage (Windows, Linux). * Biometric, pin and user ID/password authentication. * Ability to provision users. * 60-day file recovery. * Version control. * Multi-tenanted management and encryption key servers. * Email/Live Chat Support. * Service delivered from AWS. Request Demo CUSTOMER OWNED PLATFORM SERVICES MANAGED AND HOSTED BY CUSTOMER * Configure Encryption Management System on multiple devices per user (PC, Mac, iOS & Android). * Encrypted file sharing across multiple cloud providers (AWS/Box/Google/Microsoft). * Dashboard to view all user activities and registered devices. * Unlimited unique encryption keys for each file and folder. * Auto-detection and encryption of 250+ sensitive file types. * Encryption support on private cloud storage (Windows, Linux). * Biometric, pin and user ID/password authentication. * Ability to provision users. * 60-day file recovery. * Version control. * Dedicated management and encryption key servers. * 24/7 Tech support (Email, live chat and phone). * Servers hosted either on AWS or on-prem inside customers data center. * Masked public and private cloud admin visibility. * Integration with your existing Active Directory forest. * Point-to-Point IPsec VPN tunnel from customer prem to AWS. * Professional services to assist in setup of dedicated instance on AWS or your private cloud. * End-user and admin training. * Batch end-user creation. Request Demo KAPALYA'S DIFFERENTIATORS CLOUD KEY MANAGEMENT KAPALYA’s Approach: Manage your own encryption keys. Other Vendor's: Use cloud provider’s encryption keys. FILE & FOLDER ENCRYPTION KAPALYA’s Approach: Unique key served per file and folder. Other Vendor's: One key served per user for all their files. KEY STORAGE KAPALYA’s Approach: Keys are served in real-time and destroyed after encrypting. Other Vendor's: Keys could be stored on endpoints or public clouds. SSL TUNNEL KAPALYA’s Approach: Files are sent encrypted and through an SSL tunnel. Other Vendor's: Files are sent in clear-text via an SSL tunnel. ENCRYPTION KAPALYA’s Approach: Client-side - Files are encrypted on the endpoint before upload. Other Vendor's: Server-side - Files are encrypted after data is uploaded. PROXY-BASED KAPALYA’s Approach: Files are encrypted on the end-point, before upload. Other Vendor's: Files are in clear text on endpoints and encrypted only when leaving the corporate perimeter. ROLE-BASED POLICIES KAPALYA’s Approach: Privileged users never have visibility into end-user data. Other Vendor's: Access to end user data is defined using role-based policies. PRIVILEGED CLOUD ADMINS KAPALYA’s Approach: Cloud admins are masked from viewing all data. Other Vendor's: Admins at public cloud providers have visibility into your corporate data. WHO WE ARE Executive Management SUDESH KUMAR Founder & CEO SAEED KHOSRAVI Co-founder & CTO MOHAMED MENAKBI VP of Sales & Marketing | EMEA Sales/Marketing/Business Developer EMANUELE CERRONI Managing Director Engineering NANCIROSA PIAZZA Data Scientist Advisors RAMESH IYER Senior Cyber Security Leader DEREK TUMULAK Chief Product Officer SANTHANA KRISHNASAMY Product Leader | Startup Advisor GREG CARTER Global Licenses Advisor N JAYANTHA PRABHU Technicial Advisor RABEA CHAUDHARY Brand & Marketing Advisor MICHAEL TURNER Technicial Advisor JAGDISH AMIN Business Development Advisor Board of Directors SUDESH KUMAR SAEED KHOSRAVI Administration THANH NGUYEN Administrative Assistant Investors CALTROP HOLDINGS LLC PRIVATE INVESTORS PRESS RELEASE Kapalya Awarded Competitive Grant from the National Science Foundation CoCre8 Technology Solutions are extremely excited to announce a distribution agreement with Caltrop for KAPALYA Cybersecurity Startup KAPALYA Closes Seed Funding Round Led by Caltrop Holdings LLC KAPALYA wins the best Cybersecurity startup company in North America award KAPALYA Accepted in Platinum-Ranked Accelerator for Enterprise Startups KAPALYA Partners with Thales to Provide Centralized Key Management KAPALYA Partners with Gemalto to Leverage Their Latest Key Management Solution KAPALYA Launches Intelligent End-to-End Encryption Software KAPALYA partners with NSA to securing Data from Send to Receive FROM THE NEWS Kapalaya joins Berkeley Startup Cluster for a historic Berkeley-wide pitch competition at the intersection of innovation and equity KAPALYA distribution rights awarded to CoCre8 Technology Solutions Store Sensitive Business Files Through Multiple Platforms with KAPALYA KAPALYA in Berkeley Startup Cluster Protect your Data, wherever it Resides Cybersecurity Startup KAPALYA Is Making Remote Work Companies Safer Encryption is Non-negotiable Navigating the cybersecurity challenges of the new normal, with Omar Ben Hamadou, KAPALYA's EMEA Sales Manager Why you should worry about ransomware breaches during COVID-19 In conversation with Sudesh Kumar of KAPALYA, an ICE71 Accelerate 4 startup KAPALYA Live Webcast - Safeguarding Elections: Protecting Citizen PII Data Founder and CEO of KAPALYA, Sudesh Kumar speaking at the 2019 Alchemist Accelerator Demo Day KAPALYA Live Webcast - Protect and Manage Your Unstructured Data with KAPALYA KAPALYA Partners with Gemalto to Leverage Their Latest Key Management Solution Gemalto boosts cloud security with scalable virtual key management Sudesh Kumar keeps the key safe Honolulu-based data encryption app Kapalya call NSA patent a game changer The Hawaii Venture Capital Association selects Sudesh Kumar as one of the three finalists of the Tech Entrepreneur of the Year Weekly Rotary Meeting-Sudesh Kumar-CEO of KAPALYA Inc Entrepreneurial competition won by mobile app developer PARTNERS THALES/GEMALTO Gold OEM Partner HYTRUST Integration Partner DISTRIBUTORS CARAHSOFT US Federal & State Government CALTROP MIDDLE EAST Europe/Middle East/Africa CONTACT US Contact Us For More Informations LOCATION: CALIFORNIA 1935A Addison St Berkeley, CA 94704 HAWAII Entrepreneurs Sandbox 643 Ilalo St, Suite 102 Honolulu, HI 96813 EMAIL: info@kapalya.com CALL: +1 (310) 400-6139 Your Name Your Email Subject Message Loading Your message has been sent. Thank you! Send Message FREQUENTLY ASKED QUESTIONS * How is KAPALYA different from a file sharing/storage service? We provide encrypted file sharing across multiple clouds and is cloud-agnostic. Individual file-sharing companies only allow file sharing on their own service. You have the choice to do encrypted file sharing across multiple cloud providers. * How is KAPALYA different from a cloud collaboration service? KAPALYA is cloud-agnostic so you have the choice to encrypt and share files across multiple clouds. Individual public cloud providers only allow file sharing within their own platform. KAPALYA complements and enhances your cloud provider(s) by providing the ability to share files across platforms in a secure manner. * Where does KAPALYA encrypt my files? KAPALYA uses client-side encryption, therefore all encryption happens on the endpoint. * How are keys managed? Keys are served in real-time from a FIPS 140-2 key manager and never stored on any endpoint, public cloud, or private cloud storage. * Can I do encrypted file sharing? Yes, you can share encrypted files across multiple public clouds, private clouds and file storage platforms. * How do you ensure my keys will not get compromised? Each user gets assigned unique keys for each encrypted file and/or folder. The keys reside in a FIPS 140-2 key manager and are never stored on endpoints, cloud storage or private clouds. Keys are destroyed after the encrypt or decrypt function is performed. * How do I know which files contain sensitive data? The data classification engine scans for sensitive data of 250+ file types including; credit card numbers, social security numbers, driver’s licenses and more. KAPALYA’s Encryption Management System then shows users a list of sensitive files sitting on their endpoints and prompts users with the option to encrypt some or all detected files. * Which public clouds do you support? Currently, KAPALYA supports Amazon S3, Box, and OneDrive. We are in development to release integrations with Google Drive and Dropbox in the near future. * Which end-points do you support? KAPALYA supports the following endpoints: * Windows versions: 7, 8, 8.1, 10. * Mac OS versions: Yosemite, Sierra, High Sierra, Mojave, Catalina and Big Sur. * iOS devices: Any smartphone/tablet with versions 10 and higher. * Android devices: Any smartphone/tablet with versions 6.0 and higher. * Which private clouds do you support? Currently, KAPALYA supports Windows’ private cloud. We are in development to release an integration with Linux in the near future. * Does this replace existing encryption services provided by public cloud vendors? No, KAPALYA does not replace the encryption provided by your current public cloud provider. It complements and enhances the public cloud by providing an additional layer of security by protecting data at rest and in transit and allowing for secure file sharing across multiple platforms. With KAPALYA, you manage your keys, subsequently masking your cloud provider’s admins from viewing your sensitive data. * Can I share my encrypted files with people outside my enterprise? Yes, provided the recipient of the file is also using the KAPALYA Encryption Management System. * Do you support version control? Yes, but only on public clouds. * How do you ensure no local, cloud or enterprise administrators can view my files? Each user is assigned a new set of keys and credentials which administrators do not have access to. The new set of user credentials are assigned their own set of keys for every file or folder. KAPALYA creates an account for each user, upon initial login, the user must change their password and enter a pin. On mobile endpoints, in addition to these credentials, a 6-digit pin is also used to authenticate a user before allowing access to the file. * Do you support single sign-on? Yes, through biometrics and facial recognition. But you have the option to enable multi-factor authentication. * Do you support multi-factor authentication on mobile end-points? Yes. * Can I encrypt and upload entire folders? Yes. * Do you support VDI environments? Yes. KAPALYA has been tested successfully on VMware VDI environments. * Can I use my existing HSM (Hardware Services Module) or software based key managers to integrate with KAPALYA’s solution? Yes, custom configurations can be deployed for KAPALYA to support third party HSMs provided they are KMIP compliant. * Is it hosted in the cloud or do you have an on-prem version? Both; hosted on AWS and Azure, and on-prem on a VMware environment. * How do I size the key managers to be used (Enterprise customers only)? This will depend on your number of users, number of devices and average number of anticipated files and folders. * Do you provide automatic synchronization of files and folders from end-points to any public cloud? Currently we do not automate this process but it is in the works. However, all files and folders from any endpoint can be easily moved to the cloud. * How are existing cloud security policies managed? KAPALYA integrates with the existing cloud vendor’s security policies. * How are users provisioned on the system? Users are provisioned through KAPALYA’s provisioning server. Users can be provisioned one-at-a-time or in batches (with enterprise edition.) * Do you have existing integration into enterprise Active Directory servers? KAPALYA can integrate with existing Active Directory, however, we recommend against this as an added protective layer in the event the Active Directory gets compromised. * How are keys rotated for users? Keys do not need to be rotated because each file and folder gets assigned a unique key. * How do I recover files for employees that have left the company? An administrator needs to reset the user’s credentials and use the new credentials to recover files. * How are mobile devices registered with the solution? Mobile devices are registered using their UDID, ESN and IMEI to ensure uniqueness of the device. * Can you revoke access to individual devices belonging to a user? Yes, administrators have the ability to revoke access to any device registered to any user. * If I lose my mobile device, can a third party run forensics and read the data on my mobile device? No, because they will not be able to get to the encryption keys because they are not stored on the device. * How do you protect data-in-transit? Through a VPN tunnel, IPSec or SSL. * What kinds of VPN do you support? KAPALYA supports IPSec or SSL VPN tunnels. TERMS & CONDITIONS Read Details TERMS & CONDITIONS × KAPALYA respects your privacy and is committed to maintaining the privacy and confidentiality of personal data we collect. The purpose of our Privacy Policy is to demonstrate our firm commitment to the privacy and protection of all persons who provide personal data to KAPALYA and its affiliates. This Privacy Policy describes the ways we collect information from and about you, and what we do with the information, so that you may decide whether or not to provide information to us. By visiting KAPALYA websites or otherwise providing your personal information to KAPALYA through any other means, you accept and consent to the practices described in this Privacy Policy. For purposes of this Privacy Policy, the term “visitor” includes visitors to our websites who are not yet customers, those who become customers, as well as those who do not become customers; whether you upload information to our websites or services, download information, or are merely viewing our websites and services. You can choose not to provide certain information when using our websites and/or services but this may result in you not being able to take advantage of their features. 1. What do we collect and where? The information we collect may include your personal information, such as your name, contact information, financial account numbers, IP addresses, Live Chat Messages, Telephone conversations, product and service selections and orders or other things that identify you individually. Generally, we may collect information about you in multiple manners which include without limitation: 1. * You may provide your personal information to us via chat, email or other written or electronic. * We use automated technical means to collect information about all website visitors (for example, using cookies); * Via third party providers; * Website visit; and/or * Through our services or software. You may visit our Websites or utilize our services in different ways including without limitation: 1. * By using your browser to navigate to our Websites including, but not limited to, KAPALYA.com and _______________.com and their sub-domains. * By viewing an advertisement displayed on a third party website that is served content by our web server; * By viewing an email that is served content by our or a third party web server. * By utilizing a software client of ours * By utilizing a service or software of a 3rd party that accesses our service or software. When you visit our Website, our server logs your IP address (unique network addresses), the time and duration of your visit, and the time and duration of the pages on our website you view. If you arrive at our website by clicking a paid advertisement (including a paid search engine result) or a link in an email, then we will capture information that tracks your visit from that link. If you arrive at our Website by clicking a non-paid source, such as link in a non-paid search engine result or an unsponsored link on another website, we may capture information that tracks your visit from that source, to the extent we are able to do so. We may also capture information about your computer system, such as your browser type and operating system. We may place a cookie on your storage device during the web visit. A cookie is a unique alphanumeric identifier that we use to help us identify the number of unique visitors to our Website, whether or not those visitors are repeat visitors, and the source of the visits. To our knowledge cookies cannot be executed as code or used to deliver a virus. Similarly we understand that other servers cannot read them and personal information cannot be gathered from them. They are simply an identifier shared between you and us to allow us to improve the services we offer to you through our Website. If you do not wish cookies to be placed on your computer, then they can be disabled in your web browser. The option to do so is normally found in your browser’s “security settings” section. However, please note, permanently disabling cookies in your browser may hinder your use of our Website as well as other websites and interactive services. We reserve the right to use a web beacon, also known as a web bug, which is a small graphic (usually 1 pixel x 1 pixel), that is embedded in a web advertisement, email, or page on our web site. When you view a page on our web site, an email or an advertisement your web browser will request the web beacon from a web server, which in turn will set a cookie in your web browser containing a unique identifier. This unique identifier will be linked to log information that is used to track your movements on our web site in order to determine the effectiveness of content and advertising campaigns. We do not collect personal information about you as part of a web visit, but web visit information may be tied to other information (including personal information) we collect from you via chat, web forms, and the other means we describe in this Privacy Policy. Our service providers may also use web beacons, cookies, and other means to track your activity on our website. Our service providers maintain their own privacy policies, and you should also review those as they are not covered by this Privacy Policy. Links to non-KAPALYA Websites We may provide links to third-party websites for your convenience and information. The privacy practices of those sites may differ from KAPALYA practices and are not controlled by KAPALYA and are not covered by this Privacy Policy. We do not make any representations about third-party websites. We encourage you to review their privacy policies before submitting your personal data. Sensitive Information We will not intentionally collect or maintain, and do not want you to provide, any information regarding your medical or health condition, race or ethnic origin, political opinions, religious or philosophical beliefs and other sensitive information. Children’s Online Privacy Protection Our services are not designed for or directed to children under the age of 13, and we will not intentionally collect or maintain information about anyone under the age of 13. 1. What do we use this information for? Personal Information We may use your information to process your service requests, handle orders, deliver products and services, process payments, communicate with you about orders, provide access to secure areas of the Website, recommend merchandise and services that might be of interest to you, to personalize your visit to our Website, and to enable us to review develop and continually improve the products services and offers we provide online. We also use this information to prevent or detect fraud or abuses of our Website and to enable third parties to carry out technical, logistical or other functions on our behalf. Contact Information We use visitor information to send information about our company to visitors and to get in touch with them when necessary. We also use the information we collect to improve the content of our websites and as training aides for our employees. Visitors are given the choice at the point when we request their information. Financial Information and payment card details We may ask visitors to enter credit card or account information in order to process orders for services placed with KAPALYA or its affiliates. Financial information provided via our website or via the KAPALYA portal is transferred over a secure connection. We collect this information on a transaction by-transaction basis and will not authorize the release of the information with anyone not directly involved in processing the transaction. This information may be encrypted and stored for logging purposes in accordance with applicable regulatory requirements. Credit card numbers are used only for processing payments and are not used for any other purposes. When we use third party service providers for credit card processing services we will enter into a written agreement with such third party ensuring appropriate security and confidentiality measures are in place in safeguarding your personal data. We use web visit information to measure interest in and develop our web pages and marketing plans, customize the content you view on your web visits based on your activity on past visits, and administer our Website. 1. * We may use the visitors’ IP address to help diagnose problems with our servers, and to administer our Websites. * We may use cookies to help us recognize visitors as unique visitors (just a number) when they return to our websites. For example, if there are 1,000 visits to our website on a certain day, we can use cookies to discover how many of those visits were made via the same browser (same visitor). We may also use the cookie to discover whether a certain visitor has visited our site more than once, and the source for each visit. We also use cookies to: allow us to tailor content or advertisements to match your preferred interest; avoid showing visitors the same advertisements repeatedly; compile anonymous, aggregated statistics that allow us to understand how users use our site and to help us improve the structure of our Website (we cannot identify visitors personally in this way); count the number of anonymous users of our sites. * When electing to use them, we use web beacons to count the number of times that our advertisements and web-based email content are viewed. We combine web beacon information with cookies to track activity on our website originating from advertisements and web-based email content. * We use information you provide to us via telephone calls, chat, email, web forms and other communications to correspond with you about services you may be interested in purchasing. If you elect to purchase a service online using a web form, we will use the information to establish your account. Information you submit in writing, such as chat, email, and web form information may be archived and may be tied to information that we collect about your web visits. Your telephone call may be recorded for training purposes and we may enter information you provide via telephone into our systems to use for the purposes described in this paragraph. 2. Disclosure of Personal Information Personal information we gather is for internal use only and we will not authorize the release of this information to anyone outside KAPALYA (except to third party service providers to KAPALYA who perform functions on our behalf but in such event personal information will only be shared to the extent reasonably necessary to perform their functions. Should you breach our terms and conditions or website terms, or if we are under a duty to disclose or share your personal data in order to comply with a legal obligation, we may disclose your information to a relevant authority without notification to you. This may include exchanging information with other companies and organizations for the purposes of fraud protection and credit risk reduction. In particular, we may release the information we collect to third parties when we believe it is appropriate to comply with the law, to enforce our legal rights, to protect the rights and safety of others, or to assist with industry efforts to control fraud, spam or other undesirable conduct. We may release the information we collect to third parties, where the information is provided to enable such third party to provide services to us, provided that the third party has agreed to use at least the same level of privacy protections described in this Privacy Policy, and is permitted to use the information only for the purpose of providing services to us. 1. Opting out of communications KAPALYA provides you an opportunity to opt-out of personal data being disclosed to third parties (except for meeting applicable legal requirements, required for the provision of services, or permitting third party service providers who perform functions on our behalf as described in section 3 of this Privacy Policy), including your opting out of receiving future marketing mailings. We will not use your contact information to correspond with you about our services if you ask us not to. Please send your request to info@KAPALYA.com. Please note that it may take up to ten days to remove your contact information from our marketing communications lists, so you may receive correspondence from us for a short time after you make your request. 1. Security of your information KAPALYA is committed to industry best practices approaches concerning security measures to prevent the loss, misuse and alteration of the information in our possession. We use various security measures to protect the information we collect, as appropriate to the type of information, including encryption, firewalls, and access controls. We store information you provide to us on a computer system located in a controlled facility with a limited access. Visitor textual information is encrypted during transmission, our company databases are accessible only by KAPALYA employees, contractors and agents on a need to know basis and who have entered into and are bound by a confidentiality and nondisclosure agreement with KAPALYA. 1. Data Integrity Personal data we collect is relevant for the purposes for which it is to be used. KAPALYA takes reasonable steps to ensure that data is reliable for its intended use, accurate, complete, and current. 1. Right to access your personal information If you believe that any personal information we have about you is incorrect, or is, has been, or might be used inappropriately, please contact us immediately at info@KAPALYA.com, and we will take steps to correct or delete the information, or restrict its use, as set forth above upon reasonable verification of identity. 1. Verification KAPALYA utilizes the self-assessment approach to assure its compliance with its Privacy Policy. KAPALYA regularly verifies that the Privacy Policy is accurate, comprehensive, prominently displayed, completely implemented and in conformity with the Safe Harbor Principles and conducts its self-assessment on an annual basis to ensure that all relevant privacy practices are being followed. Appropriate employee training is in place and internal procedures for periodically conducting objective reviews of compliance are in place. A statement verifying this self-assessment is completed by a corporate officer or other authorized representative annually. 1. Inquiries or complaints If you have a question or complaint about this Privacy Policy or our information collection practices, please contact us at info@KAPALYA.com. We will investigate the matter and are committed to resolve any reasonable and legitimate privacy concerns. 1. Changes Our business changes constantly and our Privacy Policy may also change from time to time. You should check our website frequently to see recent changes, however, we will never materially change our policies and practices to make them less protective of personal information collected in the past without providing significant advanced and conspicuous warning. This Privacy Policy was last updated on May 3, 2018. KAPALYA ACCEPTABLE USE POLICY Updated May 3, 2018 This Acceptable Use Policy (this “Policy”) describes prohibited uses of the services offered by KAPALYA and its affiliates (the “Services”) and the websites located at the domains (and sub-domains) located at KAPALYA.com (collectively the “KAPALYA Sites”). The examples described in this Policy are not exhaustive and apply to you and any other entities you or your affiliates enable to utilize the services (collectively “You”). This Policy may be modified at any time by posting a revised version on the KAPALYA Sites. By utilizing the Services or accessing the KAPALYA Sites, following such modification, You agree to abide and be bound by the then-current version of this Policy. Should You violate the Policy, or authorize or otherwise assist others to do so, we may, at our sole and unlimited discretion, immediately suspend or terminate part or all of Your use of the Services. No Illegal, Harmful, or Offensive Use or Content You may not use or encourage, facilitate or otherwise enable others to use the Services or KAPALYA Sites for any illegal, harmful, or offensive use, or to transmit, store, display, distribute or otherwise make available content that is illegal, harmful, or offensive. Prohibited activities or content include: 1. Illegal Activities. Any illegal activities, including advertising, transmitting, or otherwise making available gambling sites or services or disseminating, promoting or facilitating child pornography. 2. Harmful or Fraudulent Activities. Activities that may be harmful to KAPALYA’ users, operations, or reputation, including offering or disseminating fraudulent goods, services, schemes, or promotions (e.g., phishing, make-money-fast schemes, ponzi and/or pyramid schemes, or pharming), or engaging in other unfair or deceptive practices. 3. Infringing Content. Content that infringes or misappropriates the intellectual property or proprietary rights of others.<l/i> 4. Offensive Content. Content that is defamatory, obscene, abusive, invasive of privacy, or otherwise objectionable, including content that constitutes child pornography, relates to bestiality, or depicts non-consensual sex acts. 5. Harmful Content. Content or other computer technology that may damage, interfere with, surreptitiously intercept, or expropriate any system, program, or data, including viruses, Trojan horses, worms, time bombs, or cancelbots. No Security Violations You may not use the Services to violate or to facilitate the violation of the security or integrity of any network, computer or communications system, software application, or network or computing device (each, a “System”). Prohibited activities include: 1. Unauthorized Access. Accessing or using any System without permission, including attempting to probe, scan, or test the vulnerability of a System or to breach any security or authentication measures used by a System. 2. Interception. Monitoring of data or traffic on a System without permission. 3. Falsification of Origin. Forging TCP-IP packet headers, e-mail headers, or any part of a message describing its origin or route. This prohibition does not include the use of aliases or anonymous remailers. No Network Abuse You may not make network connections to any users, hosts, or networks without permission to communicate with them. Prohibited activities include: 1. Monitoring or Crawling. Unauthorized monitoring or crawling of a System that impairs, disrupts, or otherwise improperly accesses the System being monitored or crawled. 2. Denial of Service (DoS). Inundating a target with communications requests so the target either cannot respond to legitimate traffic or responds so slowly that it becomes ineffective. 3. Intentional Interference. Interfering with the proper functioning of any System, including any deliberate attempt to overload a system by mail bombing, news bombing, broadcast attacks, or flooding techniques. 4. Operation of Certain Network Services. Operating network services like open proxies, open mail relays, or open recursive domain name servers. 5. Avoiding System Restrictions. Using manual or electronic means to avoid any use limitations place on a System, such as access and storage restrictions. No E-Mail Abuse You will not distribute, publish, send, or facilitate unsolicited mass e-mailings, promotions, advertising, or solicitations (e.g., “spam emails”), including commercial advertising and informational announcements. You will not alter or obscure mail headers or assume a sender’s identity without the sender’s explicit permission. You will not collect replies to messages sent from another Internet service provider if those messages violate this Policy or the acceptable use policy of that provider. Our Monitoring and Enforcement We reserve the right, but do not assume the obligation, to investigate any violation of this Policy or misuse of the Services or KAPALYA Sites. We may, in our sole and unlimited discretion: 1. Investigate violations of this Policy or misuse of the Services or KAPALYA Sites; or remove, disable access to, or modify any content or resource that violates this Policy or any other agreement we have with You for use of the Services or the KAPALYA Sites; 2. Report any activity that we suspect violates any law or regulation to appropriate law enforcement officials, regulators, or other appropriate third parties. Our reporting may include disclosing appropriate customer information. We also may cooperate with appropriate law enforcement agencies, regulators, or other appropriate third parties to help with the investigation and prosecution of illegal conduct by providing network and systems information related to alleged violations of this Policy. Reporting of Violations of this Policy If you become aware of any violation of this Policy, you will immediately notify us and provide us with assistance, as requested, to stop or remedy the violation. To report any violation of this Policy, please inform us via email at info@KAPALYA.com. Close KAPALYA CALIFORNIA 1935A Addison St Berkeley, CA 94704 HAWAII Entrepreneurs Sandbox 643 Ilalo St, Suite 102 Honolulu, HI 96813 Phone: +1 (310) 400-6139 Email: info@kapalya.com USEFUL LINKS * Home * About Us * Solution * Features * Who We Are * Press Release * Contact Us * FAQs * Privacy Policy PRIVACY POLICY × Kapalya respects your privacy and is committed to maintaining the privacy and confidentiality of personal data we collect. The purpose of our Privacy Policy is to demonstrate our firm commitment to the privacy and protection of all persons who provide personal data to Kapalya and its affiliates. This Privacy Policy describes the ways we collect information from and about you, and what we do with the information, so that you may decide whether or not to provide information to us. By visiting Kapalya websites or otherwise providing your personal information to Kapalya through any other means, you accept and consent to the practices described in this Privacy Policy. For purposes of this Privacy Policy, the term “visitor” includes visitors to our websites who are not yet customers, those who become customers, as well as those who do not become customers; whether you upload information to our websites or services, download information, or are merely viewing our websites and services. You can choose not to provide certain information when using our websites and/or services but this may result in you not being able to take advantage of their features. 1. What do we collect and where? The information we collect may include your personal information, such as your name, contact information, financial account numbers, IP addresses, Live Chat Messages, Telephone conversations, product and service selections and orders or other things that identify you individually. Generally, we may collect information about you in multiple manners which include without limitation: * You may provide your personal information to us via chat, email or other written or electronic * We use automated technical means to collect information about all website visitors (for example, using cookies); * Via third party providers; * Website visit; and/or * Through our services or software You may visit our Websites or utilize our services in different ways including without limitation: * By using your browser to navigate to our Websites including, but not limited to, kapalya.com and _______________.com and their sub-domains. * By viewing an advertisement displayed on a third party website that is served content by our web server; * By viewing an email that is served content by our or a third party web server * By utilizing a software client of ours * By utilizing a service or software of a 3rd party that accesses our service or software. When you visit our Website, our server logs your IP address (unique network addresses), the time and duration of your visit, and the time and duration of the pages on our website you view. If you arrive at our website by clicking a paid advertisement (including a paid search engine result) or a link in an email, then we will capture information that tracks your visit from that link. If you arrive at our Website by clicking a non-paid source, such as link in a non-paid search engine result or an unsponsored link on another website, we may capture information that tracks your visit from that source, to the extent we are able to do so. We may also capture information about your computer system, such as your browser type and operating system. We may place a cookie on your storage device during the web visit. A cookie is a unique alphanumeric identifier that we use to help us identify the number of unique visitors to our Website, whether or not those visitors are repeat visitors, and the source of the visits. To our knowledge cookies cannot be executed as code or used to deliver a virus. Similarly we understand that other servers cannot read them and personal information cannot be gathered from them. They are simply an identifier shared between you and us to allow us to improve the services we offer to you through our Website. If you do not wish cookies to be placed on your computer, then they can be disabled in your web browser. The option to do so is normally found in your browser’s “security settings” section. However, please note, permanently disabling cookies in your browser may hinder your use of our Website as well as other websites and interactive services. We reserve the right to use a web beacon, also known as a web bug, which is a small graphic (usually 1 pixel x 1 pixel), that is embedded in a web advertisement, email, or page on our web site. When you view a page on our web site, an email or an advertisement your web browser will request the web beacon from a web server, which in turn will set a cookie in your web browser containing a unique identifier. This unique identifier will be linked to log information that is used to track your movements on our web site in order to determine the effectiveness of content and advertising campaigns. We do not collect personal information about you as part of a web visit, but web visit information may be tied to other information (including personal information) we collect from you via chat, web forms, and the other means we describe in this Privacy Policy. Our service providers may also use web beacons, cookies, and other means to track your activity on our website. Our service providers maintain their own privacy policies, and you should also review those as they are not covered by this Privacy Policy. Links to non-Kapalya Websites We may provide links to third-party websites for your convenience and information. The privacy practices of those sites may differ from Kapalya practices and are not controlled by Kapalya and are not covered by this Privacy Policy. We do not make any representations about third-party websites. We encourage you to review their privacy policies before submitting your personal data. Sensitive Information We will not intentionally collect or maintain, and do not want you to provide, any information regarding your medical or health condition, race or ethnic origin, political opinions, religious or philosophical beliefs and other sensitive information. Children’s Online Privacy Protection Our services are not designed for or directed to children under the age of 13, and we will not intentionally collect or maintain information about anyone under the age of 13. 2. What do we use this information for? Personal Information We may use your information to process your service requests, handle orders, deliver products and services, process payments, communicate with you about orders, provide access to secure areas of the Website, recommend merchandise and services that might be of interest to you, to personalize your visit to our Website, and to enable us to review develop and continually improve the products services and offers we provide online. We also use this information to prevent or detect fraud or abuses of our Website and to enable third parties to carry out technical, logistical or other functions on our behalf. Contact Information We use visitor information to send information about our company to visitors and to get in touch with them when necessary. We also use the information we collect to improve the content of our websites and as training aides for our employees. Visitors are given the choice at the point when we request their information. Financial Information and payment card details We may ask visitors to enter credit card or account information in order to process orders for services placed with Kapalya or its affiliates. Financial information provided via our website or via the Kapalya portal is transferred over a secure connection. We collect this information on a transaction by-transaction basis and will not authorize the release of the information with anyone not directly involved in processing the transaction. This information may be encrypted and stored for logging purposes in accordance with applicable regulatory requirements. Credit card numbers are used only for processing payments and are not used for any other purposes. When we use third party service providers for credit card processing services we will enter into a written agreement with such third party ensuring appropriate security and confidentiality measures are in place in safeguarding your personal data. We use web visit information to measure interest in and develop our web pages and marketing plans, customize the content you view on your web visits based on your activity on past visits, and administer our Website. * We may use the visitors’ IP address to help diagnose problems with our servers, and to administer our Websites. * We may use cookies to help us recognize visitors as unique visitors (just a number) when they return to our websites. For example, if there are 1,000 visits to our website on a certain day, we can use cookies to discover how many of those visits were made via the same browser (same visitor). We may also use the cookie to discover whether a certain visitor has visited our site more than once, and the source for each visit. We also use cookies to: allow us to tailor content or advertisements to match your preferred interest; avoid showing visitors the same advertisements repeatedly; compile anonymous, aggregated statistics that allow us to understand how users use our site and to help us improve the structure of our Website (we cannot identify visitors personally in this way); count the number of anonymous users of our sites. * When electing to use them, we use web beacons to count the number of times that our advertisements and web-based email content are viewed. We combine web beacon information with cookies to track activity on our website originating from advertisements and web-based email content. * We use information you provide to us via telephone calls, chat, email, web forms and other communications to correspond with you about services you may be interested in purchasing. If you elect to purchase a service online using a web form, we will use the information to establish your account. Information you submit in writing, such as chat, email, and web form information may be archived and may be tied to information that we collect about your web visits. Your telephone call may be recorded for training purposes and we may enter information you provide via telephone into our systems to use for the purposes described in this paragraph. 3. Disclosure of Personal Information Personal information we gather is for internal use only and we will not authorize the release of this information to anyone outside Kapalya (except to third party service providers to Kapalya who perform functions on our behalf but in such event personal information will only be shared to the extent reasonably necessary to perform their functions. Should you breach our terms and conditions or website terms, or if we are under a duty to disclose or share your personal data in order to comply with a legal obligation, we may disclose your information to a relevant authority without notification to you. This may include exchanging information with other companies and organizations for the purposes of fraud protection and credit risk reduction. In particular, we may release the information we collect to third parties when we believe it is appropriate to comply with the law, to enforce our legal rights, to protect the rights and safety of others, or to assist with industry efforts to control fraud, spam or other undesirable conduct. We may release the information we collect to third parties, where the information is provided to enable such third party to provide services to us, provided that the third party has agreed to use at least the same level of privacy protections described in this Privacy Policy, and is permitted to use the information only for the purpose of providing services to us. 4. Opting out of communications Kapalya provides you an opportunity to opt-out of personal data being disclosed to third parties (except for meeting applicable legal requirements, required for the provision of services, or permitting third party service providers who perform functions on our behalf as described in section 3 of this Privacy Policy), including your opting out of receiving future marketing mailings. We will not use your contact information to correspond with you about our services if you ask us not to. Please send your request to info@Kapalya.com. Please note that it may take up to ten days to remove your contact information from our marketing communications lists, so you may receive correspondence from us for a short time after you make your request. 5. Security of your information Kapalya is committed to industry best practices approaches concerning security measures to prevent the loss, misuse and alteration of the information in our possession. We use various security measures to protect the information we collect, as appropriate to the type of information, including encryption, firewalls, and access controls. We store information you provide to us on a computer system located in a controlled facility with a limited access. Visitor textual information is encrypted during transmission, our company databases are accessible only by Kapalya employees, contractors and agents on a need to know basis and who have entered into and are bound by a confidentiality and nondisclosure agreement with Kapalya. 6. Data Integrity Personal data we collect is relevant for the purposes for which it is to be used. Kapalya takes reasonable steps to ensure that data is reliable for its intended use, accurate, complete, and current. 7. Right to access your personal information If you believe that any personal information we have about you is incorrect, or is, has been, or might be used inappropriately, please contact us immediately at info@Kapalya.com, and we will take steps to correct or delete the information, or restrict its use, as set forth above upon reasonable verification of identity. 8. Verification Kapalya utilizes the self-assessment approach to assure its compliance with its Privacy Policy. Kapalya regularly verifies that the Privacy Policy is accurate, comprehensive, prominently displayed, completely implemented and in conformity with the Safe Harbor Principles and conducts its self-assessment on an annual basis to ensure that all relevant privacy practices are being followed. Appropriate employee training is in place and internal procedures for periodically conducting objective reviews of compliance are in place. A statement verifying this self-assessment is completed by a corporate officer or other authorized representative annually. 9. Inquiries or complaints If you have a question or complaint about this Privacy Policy or our information collection practices, please contact us at info@Kapalya.com. We will investigate the matter and are committed to resolve any reasonable and legitimate privacy concerns. 10. Changes Our business changes constantly and our Privacy Policy may also change from time to time. You should check our website frequently to see recent changes, however, we will never materially change our policies and practices to make them less protective of personal information collected in the past without providing significant advanced and conspicuous warning. This Privacy Policy was last updated on May 3, 2018. KAPALYA ACCEPTABLE USE POLICY Updated May 3, 2018 This Acceptable Use Policy (this “Policy”) describes prohibited uses of the services offered by Kapalya and its affiliates (the “Services”) and the websites located at the domains (and sub-domains) located at Kapalya.com (collectively the “Kapalya Sites”). The examples described in this Policy are not exhaustive and apply to you and any other entities you or your affiliates enable to utilize the services (collectively “You”). This Policy may be modified at any time by posting a revised version on the Kapalya Sites. By utilizing the Services or accessing the Kapalya Sites, following such modification, You agree to abide and be bound by the then-current version of this Policy. Should You violate the Policy, or authorize or otherwise assist others to do so, we may, at our sole and unlimited discretion, immediately suspend or terminate part or all of Your use of the Services. No Illegal, Harmful, or Offensive Use or Content You may not use or encourage, facilitate or otherwise enable others to use the Services or Kapalya Sites for any illegal, harmful, or offensive use, or to transmit, store, display, distribute or otherwise make available content that is illegal, harmful, or offensive. Prohibited activities or content include: 1. Illegal Activities. Any illegal activities, including advertising, transmitting, or otherwise making available gambling sites or services or disseminating, promoting or facilitating child pornography. 2. 3. Harmful or Fraudulent Activities. Activities that may be harmful to Kapalya’ users, operations, or reputation, including offering or disseminating fraudulent goods, services, schemes, or promotions (e.g., phishing, make-money-fast schemes, ponzi and/or pyramid schemes, or pharming), or engaging in other unfair or deceptive practices. 4. Infringing Content. Content that infringes or misappropriates the intellectual property or proprietary rights of others. 5. Offensive Content. Content that is defamatory, obscene, abusive, invasive of privacy, or otherwise objectionable, including content that constitutes child pornography, relates to bestiality, or depicts non-consensual sex acts. 6. Harmful Content. Content or other computer technology that may damage, interfere with, surreptitiously intercept, or expropriate any system, program, or data, including viruses, Trojan horses, worms, time bombs, or cancelbots. No Security Violations You may not use the Services to violate or to facilitate the violation of the security or integrity of any network, computer or communications system, software application, or network or computing device (each, a “System”). Prohibited activities include: 1. Unauthorized Access. Accessing or using any System without permission, including attempting to probe, scan, or test the vulnerability of a System or to breach any security or authentication measures used by a System. 2. Interception. Monitoring of data or traffic on a System without permission. 3. Falsification of Origin. Forging TCP-IP packet headers, e-mail headers, or any part of a message describing its origin or route. This prohibition does not include the use of aliases or anonymous remailers. No Network Abuse You may not make network connections to any users, hosts, or networks without permission to communicate with them. Prohibited activities include: 1. Monitoring or Crawling. Unauthorized monitoring or crawling of a System that impairs, disrupts, or otherwise improperly accesses the System being monitored or crawled. 2. Denial of Service (DoS). Inundating a target with communications requests so the target either cannot respond to legitimate traffic or responds so slowly that it becomes ineffective. 3. Intentional Interference. Interfering with the proper functioning of any System, including any deliberate attempt to overload a system by mail bombing, news bombing, broadcast attacks, or flooding techniques. 4. Operation of Certain Network Services. Operating network services like open proxies, open mail relays, or open recursive domain name servers. 5. Avoiding System Restrictions. Using manual or electronic means to avoid any use limitations place on a System, such as access and storage restrictions. No E-Mail Abuse You will not distribute, publish, send, or facilitate unsolicited mass e-mailings, promotions, advertising, or solicitations (e.g., “spam emails”), including commercial advertising and informational announcements. You will not alter or obscure mail headers or assume a sender’s identity without the sender’s explicit permission. You will not collect replies to messages sent from another Internet service provider if those messages violate this Policy or the acceptable use policy of that provider. Our Monitoring and Enforcement We reserve the right, but do not assume the obligation, to investigate any violation of this Policy or misuse of the Services or Kapalya Sites. We may, in our sole and unlimited discretion: 1. Investigate violations of this Policy or misuse of the Services or Kapalya Sites; or remove, disable access to, or modify any content or resource that violates this Policy or any other agreement we have with You for use of the Services or the Kapalya Sites; 2. Report any activity that we suspect violates any law or regulation to appropriate law enforcement officials, regulators, or other appropriate third parties. Our reporting may include disclosing appropriate customer information. We also may cooperate with appropriate law enforcement agencies, regulators, or other appropriate third parties to help with the investigation and prosecution of illegal conduct by providing network and systems information related to alleged violations of this Policy. Reporting of Violations of this Policy If you become aware of any violation of this Policy, you will immediately notify us and provide us with assistance, as requested, to stop or remedy the violation. To report any violation of this Policy, please inform us via email at info@Kapalya.com. Close * Terms & Conditions OUR SERVICES * Cloud Key Management * File & Folder Encryption * Key Storage * SSL Tunnel * Encryption OUR SOCIAL NETWORKS Follow KAPALYA Copyright © 2021 KAPALYA. All Rights Reserved * Home * About Us * Solution * Government * Enterprise * SMB * Who We Are * Press Release * Blog * Partners * Resources * Sales Sheet * Data Sheet * User Guide * Contact Us