We collect and use personal information to provide you with our products and services. We may collect personal information that you provide us, such as your name, email address, phone number, and other contact details. We may also collect information about your use of our website and services, such as your IP address, browser type, and operating system.
We may also collect information about your infrastructure and the code you use to manage it. This information is collected securely and is used solely to provide you with our services.
We use your personal information to provide you with our products and services, including automating your infrastructure as code. We may also use your information to improve our services, such as by analyzing how our customers use our platform.
We will not sell your personal information to third parties. We may disclose your personal information to our service providers and partners who assist us in providing our services, such as our cloud hosting provider.
We take the security of your personal information seriously and have implemented technical and organizational measures to protect your personal information from unauthorized access, use, or disclosure. We regularly review our security practices to ensure that your personal information is protected.
You may opt out of receiving promotional emails from us by following the instructions in the emails. However, you will still receive important emails related to your account and our services.
You may access, update, or delete your personal information by contacting us at firstname.lastname@example.org. We will respond to your request within a reasonable timeframe.
We understand the importance of maintaining a secure environment for our customers, and we take this responsibility very seriously. This Security Policy outlines our practices and procedures with respect to the security of our website, products, and services.
We use industry-standard security practices to protect our infrastructure, including encryption, firewalls, and access controls. Our servers are located in data centers that are physically secured and have strict access controls.
We encrypt all data in transit and at rest using industry-standard encryption protocols. We also use secure authentication methods to prevent unauthorized access to our systems and data.
Access to our systems and data is strictly controlled through authentication and authorization protocols. We use multi-factor authentication to ensure that only authorized individuals have access to our systems and data.
Our employees undergo background checks before they are hired, and we provide ongoing security training to ensure that they understand and follow our security policies and procedures.
We only work with service providers and partners who meet our high standards for security and privacy. We conduct due diligence on all of our service providers and partners to ensure that they have appropriate security measures in place to protect our customers’ data.
We have a comprehensive incident response plan in place to respond quickly and effectively to any security incidents. We regularly test our incident response plan to ensure that it is effective.
If you believe you have discovered a security vulnerability in our systems, please contact us immediately at email@example.com. We take all reports of security vulnerabilities seriously and will respond promptly to investigate and remediate any reported vulnerabilities.
We may update this Security Policy from time to time. If we make material changes to this Security Policy, we will notify you by email or by posting a notice on our website. We encourage you to review this Security Policy regularly to stay informed about our security practices.
This Legal Policy outlines our terms and conditions of use, as well as our disclaimers and limitations of liability.
By using our website, products, and services, you agree to these terms and conditions of use:
You may use our website, products, and services only for lawful purposes.
You may not use our website, products, and services in any way that violates any applicable laws or regulations.
You may not use our website, products, and services to infringe on any intellectual property rights or other proprietary rights of any third party.
You may not attempt to gain unauthorized access to our website, products, and services or our systems or networks.
Our website, products, and services are provided on an “as is” and “as available” basis. We do not make any representations or warranties of any kind, whether express, implied, or statutory, regarding the accuracy, reliability, or completeness of any information or content provided through our website, products, or services.
We will not be liable for any direct, indirect, incidental, special, or consequential damages arising out of or in connection with your use of our website, products, or services. This includes, but is not limited to, any loss of profits, revenue, or data, even if we have been advised of the possibility of such damages.
You agree to indemnify and hold us harmless from and against any and all claims, damages, losses, liabilities, costs, and expenses (including reasonable attorneys’ fees) arising out of or in connection with your use of our website, products, or services or your violation of these terms and conditions of use.
These terms and conditions of use and any disputes arising out of or in connection with them will be governed by and construed in accordance with the laws of the State of California, without giving effect to any principles of conflicts of laws.
We may update this Legal Policy from time to time. If we make material changes to this Legal Policy, we will notify you by email or by posting a notice on our website. We encourage you to review this Legal Policy regularly to stay informed about our legal terms and conditions.