Token2 Terms and Conditions
By using Token2 websites, control panel, Token2 API and mobile applications, you are agreeing
to be bound by the terms and conditions. No other contract or terms of service may be created in any other manner,
including, but not limited to purchase orders, emails or written communications.
Token2 reserves the right to update and change the Terms and Conditions at any time without prior notice. Any new features or products
shall be subject to the Terms and Conditions. By continuing using the any of our services, you are agreeing to these changes.
Token2 reserves the right to terminate your account for any reason and without notice. You agree to use the Service at your own risk.
- You agree not to remove, modify, disable, damage or otherwise interfere with security-related features of the service.
- You can not use the service for any illegal or unauthorized purpose. You must not violate any laws in your jurisdiction.
- You must protect your own account and API keys. Token2 cannot, and will not be liable for loss or damage that arises from
your failure to protect your account information.
- You are responsible for the sole usage of the Service. Token2 cannot, and will not be liable for any loss or damage that arises from the use of this Service.
- Any attempt to compromise the security, hack or disable the system are completely prohibited.
- By using any of our services you agree to identify yourself as who you are.
- You understand and agree that Token2 will not be liable for any direct, indirect, incidental damages, included but not limited
to loss of profits, goodwill or intangible losses that result from your use of the Token2 API.
- Any abuse or excessive use of the Token2 API may result on temporary or permanent suspension of the access to the Service.
- In the even that any of your API keys are compromised, Token2 will temporarily disable your account. Apathy will make
reasonable attempts via e-mail and text-message to warn you prior to suspension.
- Token2 reserves the right to discontinue temporarily or permanently access to the API with or without noticed for any
- The use of the service is at your sole risk. The service is provided "as is " without any warranties, whether
written, oral, statuary, express or implied to the maximum extent permitted by the law.
- You agree not to copy, reproduce, duplicated, sell or resell any portion of the service.
- Any verbal, physical, written or other abuses to customers, employees or anyone associated with Token2 will result
in immediate account termination.
- Any attempt to hack or circumvent the system for any reason will result in immediate account termination.
- You may not modify, disassemble, decompile or reverse engineer any portion of the service.
What information we collect and why we collect it.
How we use that information.
The choices we offer, including how to access and update information.
Information we collect
We collect information to provide better services to all of our users . from figuring out basic stuff like which language you speak, to more complex things like your approximate location.
We collect information in two ways:
Information you give us. For example, many of our services require you to sign up for an Token2 account. When you do, we.ll ask for personal information, like your email address, telephone number or credit card.
Information we get from your use of our services. We may collect information about how you use Token2. This information includes:
Device information. We may collect device-specific information (such as your hardware model, operating system version, unique device identifiers, and mobile network information including phone number). Token2 may associate your device identifiers or phone number with your Token2 account.
Log information. When you use our product or services, we may automatically collect and store certain information in server logs. This may include:
Details of how you used our service.
Telephony log information like your phone number, calling-party number, forwarding numbers, time and date of calls, duration of calls, SMS routing information and types of calls.
Internet protocol address.
Device event information such as crashes, system activity, hardware settings, browser type, browser language, the date and time of your request and referral URL.
Cookies that may uniquely identify your browser or your Token2 account.
Location information. We do not store precise location information. We might obtain an approximate location estimate based on your ip address.
How we use information we collect
We use the information we collect from all of our services to provide, maintain, protect and improve them, to develop new ones, and to protect Token2 and our users.
We use information collected from cookies and other technologies, to improve your user experience and the overall quality of our services. For example, by saving your language preferences, we.ll be able to have our services appear in the language you prefer.
Token2 processes personal information on our servers in many countries around the world. We may process your personal information on a server located outside the country where you live.
Transparency and choice
People have different privacy concerns. Our goal is to be clear about what information we collect, so that you can make meaningful choices about how it is used.
You may, for example, set your browser to block all cookies, including cookies associated with our services, or to indicate when a cookie is being set by us. However, it.s important to remember that many of our services may not function properly if your cookies are disabled. For example, we may not remember your language preferences.
Accessing and updating your personal information
Whenever you use our services, we aim to provide you with access to your personal information. If that information is wrong, we strive to give you ways to update it quickly or to delete it . unless we have to keep that information for legitimate business or legal purposes. When updating your personal information, we may ask you to verify your identity before we can act on your request.
We may reject requests that are unreasonably repetitive, require disproportionate technical effort (for example, developing a new system or fundamentally changing an existing practice), risk the privacy of others, or would be extremely impractical (for instance, requests concerning information residing on backup systems).
Where we can provide information access and correction, we will do so for free, except where it would require a disproportionate effort. We aim to maintain our services in a manner that protects information from accidental or malicious destruction. Because of this, after you delete information from our services, we may not immediately delete residual copies from our active servers and may not remove information from our backup systems.
Information we share
We do not share personal information with companies, organizations and individuals outside of Token2 unless one of the following circumstances applies:
With your consent. We will share personal information with companies, organizations or individuals outside of Token2 when we have your consent to do so. We require opt-in consent for the sharing of any sensitive personal information.
For legal reasons. We will share personal information with companies, organizations or individuals outside of Token2 if we have a good-faith belief that access, use, preservation or disclosure of the information is reasonably necessary to: meet any applicable law, regulation, legal process or enforceable governmental request.
Enforce applicable Terms of Service, including investigation of potential violations.
detect, prevent, or otherwise address fraud, security or technical issues.
protect against harm to the rights, property or safety of Token2, our users or the public as required or permitted by law.
We may share aggregated, non-personally identifiable information publicly and with our partners. For example, we may share information publicly to show trends about the general use of our services.
We work hard to protect Token2 and our users from unauthorized access to or unauthorized alteration, disclosure or destruction of information we hold. In particular:
We encrypt many of our services using SSL.
We offer you two step verification when you access your Token2 account.
We review our information collection, storage and processing practices, including physical security measures, to guard against unauthorized access to systems.
We restrict access to personal information to Token2 employees, contractors and agents who need to know that information in order to process it for us, and who are subject to strict contractual confidentiality obligations and may be disciplined or terminated if they fail to meet these obligations.
Compliance and cooperation with regulatory authorities