Secure Usage Policy
Â
- The copyright, information, and available materials on this website are assets owned by Saudi Business Machines (SBM). It is strictly prohibited to copy, publish, or use them in a way that contradicts what they were published for or to be used for personal purposes and interests without prior written permission.
- The user agrees not to use, encourage, promote, facilitate, or instruct others to use the services as follows:
- To engage in, promote, or encourage activities that violate any applicable law, regulation, governmental order or decree, legal agreement, or SBM published policies.
- To access or probe any service or system without authorization, including, but not limited to, breaches, vulnerability scans, or penetration testing.
- To disable, interfere with, or circumvent any service aspect; or to breach any security or authentication measures used by a system or the service.
- Any theft of resources, including sensitive information.
- Upload or download files containing non-owned or non-licensed software, materials, data, or other information.
- Upload or download files containing viruses, corrupted data, or any malicious software, or do anything that might affect the site's integrity, reliability, or continued availability of information.
- Everything that is considered a violation of the Cybercrime Combating Law or any other related system in the Kingdom of Saudi Arabia.
- Legal proceedings will be executed in the case of an illegal act as per applicable law (The Anti-Cyber Crime Law), regulation, governmental order, or decree.