1. Acceptance of our Terms
By visiting, viewing, accessing or otherwise using any of the services or information created, collected, compiled or submitted to ICS Software, Ltd., you agree to be bound by the following Terms and Conditions of Service. If you do not want to be bound by our Terms your only option is not to visit, view or otherwise use the services of website. You understand, agree and acknowledge that these Terms constitute a legally binding agreement between you and ICS Software, Ltd. and that your use of ICS Software, Ltd. shall indicate your conclusive acceptance of this agreement.
2. Provision of Services
You agree and acknowledge that ICS Software, Ltd. is entitled to modify, improve or discontinue any of its services at its sole discretion and without notice to you even if it may result in you being prevented from accessing any information contained in it. Furthermore, you agree and acknowledge that ICS Software, Ltd. is entitled to provide services to you through subsidiaries or affiliated entities.
3. Proprietary Rights
You acknowledge and agree that ICS Software, Ltd. may contain proprietary and confidential information including trademarks, service marks and patents protected by intellectual property laws and international intellectual property treaties. ICS Software, Ltd. authorizes you to view and make a single copy of portions of its content for offline, personal, non-commercial use. Our content may not be sold, reproduced, or distributed without our written permission. Any third-party trademarks, service marks and logos are the property of their respective owners. Any further rights not specifically granted herein are reserved.
4. Disclaimer of Warranties
You understand and agree that your use of ICS Software, Ltd. is entirely at your own risk and that our services are provided “As Is” and “As Available”. ICS Software, Ltd. does not make any express or implied warranties, endorsements or representations whatsoever as to the operation of the ICS Software, Ltd. website, information, content, materials, or products. This shall include, but not be limited to, implied warranties of merchantability and fitness for a particular purpose and non-infringement, and warranties that access to or use of the service will be uninterrupted or error-free or that defects in the service will be corrected.
5. Limitation of Liability
You understand and agree that ICS Software, Ltd.and any of its subsidiaries or affiliates shall in no event be liable for any direct, indirect, incidental, consequential, or exemplary damages. This shall include, but not be limited to damages for loss of profits, business interruption, business reputation or goodwill, loss of programs or information or other intangible loss arising out of the use of or the inability to use the service, or information, or any permanent or temporary cessation of such service or access to information, or the deletion or corruption of any content or information, or the failure to store any content or information. The above limitation shall apply whether or not ICS Software, Ltd. has been advised of or should have been aware of the possibility of such damages. In jurisdictions where the exclusion or limitation of liability for consequential or incidental damages is not allowed the liability of ICS Software, Ltd. is limited to the greatest extent permitted by law.
6. External Content
ICS Software, Ltd. may include hyperlinks to third-party content, advertising or websites. You acknowledge and agree that ICS Software, Ltd. is not responsible for and does not endorse any advertising, products or resource available from such resources or websites.
1. What we do and do not access: We access the Google user data to retrieve the user’s name, and to send email on behalf of the user. We do not access any other mail features, including but not limited to mail folders, mail messages, contacts, calendar events, favorites, etc.
2. How we protect your data: We only store the name of the user and the Oauth access token in our datastore encrypted using FIPS compliant AES encryption. No other information is stored. The name of the user can only be viewed by authenticated users of the application. The token is never viewable or accessible.
3. What information we share: We do not share any user information.