Secure Usage Policy

 

  1. The copyright, information, and available materials on this website are assets owned by Saudi Business Machines (SBM). It is strictly prohibited to copy, publish, or use them in a way that contradicts what they were published for or to be used for personal purposes and interests without prior written permission.
  2. The user agrees not to use, encourage, promote, facilitate, or instruct others to use the services as follows:
    • To engage in, promote, or encourage activities that violate any applicable law, regulation, governmental order or decree, legal agreement, or SBM published policies.
    • To access or probe any service or system without authorization, including, but not limited to, breaches, vulnerability scans, or penetration testing.
    • To disable, interfere with, or circumvent any service aspect; or to breach any security or authentication measures used by a system or the service.
    • Any theft of resources, including sensitive information.
    • Upload or download files containing non-owned or non-licensed software, materials, data, or other information.
    • Upload or download files containing viruses, corrupted data, or any malicious software, or do anything that might affect the site's integrity, reliability, or continued availability of information.
    • Everything that is considered a violation of the Cybercrime Combating Law or any other related system in the Kingdom of Saudi Arabia.
  3. Legal proceedings will be executed in the case of an illegal act as per applicable law (The Anti-Cyber Crime Law), regulation, governmental order, or decree.