ELoss Technologies: Global Privacy Policy
1. PREAMBLE AND CONTRACTUAL BINDING
1.1 Formal Agreement and Execution
This Master Terms of Service Agreement (the "Agreement") constitutes a definitive and legally binding contract governing the relationship between ELoss Technologies ("ELoss," "the Company," "we," "us," or "our") and the party identified as the user or subscriber ("Customer," "User," "you," or "your"). This Agreement governs all access to and use of ELoss products, services, websites, and associated technologies.
1.2 Consent and Affirmation
By executing an Order Form, clicking "I Accept," "Sign Up," or otherwise accessing the ELoss Ecosystem, you formally acknowledge that you have reviewed this Agreement in its entirety. This electronic action constitutes a digital signature under the Electronic Signatures in Global and National Commerce Act (ESIGN) and the Uniform Electronic Transactions Act (UETA).
1.3 Corporate Authority
If you are entering into this Agreement on behalf of a corporation, limited liability company, partnership, or other legal entity, you represent and warrant that you possess the requisite legal authority to bind such entity and its affiliates to these terms. In the event you do not have such authority, or if you do not agree with these terms, you must immediately cease all use of the ELoss Services.
2. THE ELOSS ECOSYSTEM: SCOPE OF SERVICES
2.1 The Multi-Tenant Environment
The "ELoss Ecosystem" refers to a sophisticated, multi-tenant cloud and hardware environment designed for high-availability enterprise operations. The scope includes:
Proprietary Software-as-a-Service (SaaS): This includes the "ELoss Engine," cloud-based analytics dashboards, infrastructure management tools, and any mobile applications provided by ELoss.
Hardware Integration & IoT: Specialized proprietary sensors, edge computing devices, and firmware. Note that hardware usage is governed by both this Agreement and any specific Hardware Lease or Purchase Agreements.
Professional and Managed Services: This encompasses custom implementation, legacy data migration, system optimization, and 24/7 priority technical support as defined in the applicable Service Level Agreement (SLA).
2.2 Continuous Evolution of Services
ELoss Technologies operates on a model of continuous delivery. We reserve the right, at our sole discretion, to update, enhance, or modify features of the Ecosystem. While we strive to avoid "breaking changes," ELoss shall not be liable for modifications that require Customer-side configuration updates to maintain compatibility.
3. USER ACCOUNTS AND ARCHITECTURE
3.1 Account Creation and "Know Your Customer" (KYC)
Access to the ELoss Ecosystem requires the creation of a verified Account. For enterprise-level hardware procurement and high-capacity SaaS tiers, ELoss mandates a Know Your Customer (KYC) and Know Your Business (KYB) verification process.
Verification Data: Customers must provide valid government-issued identification, corporate registration documents, and verifiable tax identification numbers.
Accuracy Warranty: You represent that all provided information is truthful. Providing fraudulent data is grounds for immediate termination of service without refund.
3.2 User Hierarchy and Administrative Responsibility
The ELoss architecture utilizes a hierarchical permission structure:
Administrative Users (Admins): Admins hold "Super-User" status. They are authorized to purchase additional seats, modify billing cycles, export global data sets, and delete Managed User accounts. The Customer is solely responsible for the actions of its Admins.
Managed Users: These are individual employees, contractors, or agents authorized by the Admin.
Third-Party Collaborators: If the Service allows for external guest access, the Customer assumes full liability for the guest’s compliance with the Acceptable Use Policy.
4. INTELLECTUAL PROPERTY AND LICENSING
4.1 Exclusive Ownership of the "ELoss Engine"
All intellectual property rights, including but not limited to patents, copyrights, trade secrets, trademarks, and "look and feel" elements of the ELoss Engine, remain the exclusive property of ELoss Technologies. This Agreement is a service agreement and a license, not a sale of software or hardware design.
4.2 Limited Usage License and API Access
Software License: ELoss grants a limited, non-exclusive, non-sublicensable, and non-transferable license to access the software for internal business operations only.
API Usage: Access to the ELoss API is a privilege, not a right. Usage is capped at 10,000 requests per hour to ensure system stability. Exceeding this limit without an upgraded SLA may result in automated "throttling" or temporary IP suspension.
4.3 Feedback and Innovations
We encourage a "Feedback Loop" with our users. However, you agree that any suggestions or feature requests you submit automatically become the sole property of ELoss. You hereby irrevocably assign all rights, titles, and interests in such Feedback to ELoss, waiving any claims to royalties or "moral rights."
5. ACCEPTABLE USE POLICY (AUP)
To protect our global network and ensure equitable resource distribution, the following actions are strictly prohibited:
5.1 Reverse Engineering and Decompilation
Users shall not, and shall not permit any third party to, reverse engineer, decompile, or attempt to derive the source code, underlying ideas, or algorithms of the ELoss software or hardware schematics. This includes the use of "sniffing" tools to intercept proprietary communication protocols between ELoss hardware and the cloud.
5.2 Benchmark Confidentiality
The performance data of the ELoss Ecosystem is considered a Trade Secret. You are prohibited from publishing, disclosing, or circulating "Benchmark Leaks" or comparative performance analyses of our hardware and software without the express written consent of the ELoss Chief Technology Officer (CTO).
5.3 Security and Penetration Testing
Security is paramount. Therefore:
Unauthorized Scanning: Any attempt to conduct vulnerability scans or penetration tests against the ELoss IP range is considered a hostile act.
Authorization: Official testing requires a signed "Letter of Authorization" (LOA) from our security team, detailing the window of time and specific IP addresses involved.
5.4 Network Integrity and Malware
The Services must not be used to host, store, or distribute malicious code, including but not limited to:
Logic Bombs: Code designed to execute under specific conditions that disrupts operations.
Resource Hijacking: Using ELoss computing power for unauthorized activities like cryptocurrency mining or Distributed Denial of Service (DDoS) attacks.
Email-ID: elosstechnologies@gmail.com
Location: Bengaluru, Karnataka India
Website: www.elosstechnologies.com