Our Privacy Policy explains:

  • What information we collect and why we collect it.
  • How we use that information.
  • Information Sharing
  • Privacy and Security

Your privacy matters to SEKAT, so whether you are new to MICMAC or a long-time user, please do take the time to get to know our practices – and if you have any questions contact us.

 

INFORMATION GATHERING AND USAGE

MICMAC retrieves individual information when you register with MICMAC, when you use products or services, when you visit MICMAC pages or the pages of certain MICMAC partners. MICMAC may join information about you that we have with information we obtain from business associates or other firms.

When you register as an ISP or an MICMAC Subscriber, we demand for information such as your name, email address, telephone Number, birth date, sex and occupation. For ISP registration, we might also ask for your Bank Name and Account Number. When you register with MICMAC and agree to our terms and conditions, you are not unknown to us.

MICMAC automatically receives and records information from your computer and browser, including your IP Address, software and hardware utilities, and the MICMAC page you request.

 

IP Address

When your web browser demands a web page from another computer system on the Internet, it automatically gives that computer the location where it should send the information. This is called your computer’s “IP address.” (IP stands for “Internet protocol.”) For most users accessing the Internet from a dial-up Internet service provider (ISP), the IP address will be dissimilar every time you log on.

Information Gathering and Use Practices

  • MICMAC retrieves IP addresses from all users because this information is automatically reported by your browser each time you view a web page.
  • Your IP address is also stored in our user registration databases when you register with MICMAC.
  • IP addresses may be used for various assignment, including to:
    • Diagnose service or technology uncertainties stated by our users or engineers that are linked with the IP addresses being managed by a specific web company or internet service provider.
    • Analyze the total number of users visiting MICMAC from specific location.
    • Help resolve which users have access privileges to certain content that we host.

Other

  • When MICMAC web page is requested and viewed, that request is logged on our servers with information including the IP address of the computer that requested the page.

MICMAC uses information for the following general purposes: fulfil your demand for new services, develop our services, contact you, conduct research, and provide anonymous reporting for internal and external use.

 

INFORMATION SHARING AND REVELATION

MICMAC does not hire, trade, or allocate personal information about you with other people or non-affiliated companies except for the reasons mentioned previously. When we have your authorisation, or under the following conditions:

  • We reply to subpoenas, court orders, or legal procedure, or to establish or exercise our legal rights or defend against legal claims.
  • We consider it necessary to share information in order to investigate, prevent, or take action concerning illegal activities, suspected fraud, circumstances involving potential threats to the physical safety of any person, abuse of MICMACterms of use, or as otherwise required by law.
  • We transfer information about you if MICMACis acquired by or merged with another organisation. In these circumstances, MICMAC will inform you before information about you is transferred and becomes subject to a different privacy policy.

We reserve the right to send you certain messages relating to the MICMAC service, such as service publications, administrative messages and the MICMAC Newsletter, that are considered part of your MICMAC account (as a Subscriber or an ISP), without offering you the avenue to opt out of receiving them.

 

PRIVACY AND SECURITY

We restrict access to personal information about you to employees and ISPs who we believe logically needs to come into contact with that information to support you or in order to do their jobs.

We have physical, electronic, and procedural security that complies with federal regulations to protect personal information about you.

 

 

Security on MICMAC

MICMAC takes your security seriously and takes logical steps to safeguard your information. No data transmission over the Internet or information storage technology can be guaranteed to be 100% secure. The following is a summary of the measures MICMAC takes to protect your information and descriptions of ways we implement these measures for different types of information you may provide to us.

MICMAC continues to estimate and execute enhancements in security technology and practices, nonetheless we can only take steps to help trim down the risks of unauthorized access. Each individual using the Internet can take steps to help protect their information and further reduce the likelihood that a security incident may occur.

Security Guidelines We Have Taken

  • Secure Socket Layer (SSL)

MICMAC uses SSL (Secure Socket Layer) encryption when sending certain kinds of information, such as financial services information or payment information. An icon engraving a padlock is displayed on the bottom of most browsers window during SSL transactions. The information you supply will be stored securely on our servers. It will not be displayed back to you in its entirety when you retrieve or edit it in the future. In-place of the entire number, you will only see asterisks.

  • Secure Storage

MICMAC retains reasonable physical, electronic, and procedural safeguards that abide by the federal rules to protect private information about you.

  • Vendors and Partners

MICMAC works with vendors and partners to protect the security and confidentiality of user information.

  • Employee and Contractor Access to Information

MICMAC limits access to personal information about you to those employees or ISPs who we logically believe need to come into contact with that information to assist you or in order to perform their jobs.

  • Education and Training for Employees and ISPs

MICMAC has implemented a company-wide education and training program about security that is needed of every MICMAC employee and ISP

Security Guidelines You Can Take

·         Using shared computers

Many of us may access MICMAC from different locations — a friend’s house, an Internet café, or the library. Sharing a computer is a great convenience, but you must take extra safety measures to safeguard your personal information.

Here are some guidelines to help protect your MICMAC account when you use a communal or public computer.

 

Do not OK the “Would you like to Update the Saved Password” box on your browser

When OK is clicked, your browser “Updates”, it usually sets a continuous cookie on the computer that permits the application to identify you so you don’t have to sign in. If you pick the OK option, you’ll remain signed in after you close your browser. This is an easy option if you are the only user of a computer or mobile device, but if you share a computer, do not “Update Password”

Never leave a computer unattended while signed-in

If someone uses the computer in your absence, they can effortlessly access your MICMAC account information.

Always sign out Absolutely

If you use a public or communal computer, it’s expedient to sign out from MICMAC absolutely. Always click the “Sign Out” link when you are done accessing your MICMAC account.

Clear the browser’s memory

The browser keeps a memory, encapsulating a copy of web pages you accessed. The cache may be stored on the computer’s local drive. Clearing the cache is easy, and will avert subsequent computer users from accessing the locations you visited while online. See your browser’s help for details on how to clear the cache.

 

Keep an eye out for “shoulder surfers”

Use caution — sneaky thieves may try to watch your fingers as you input your password.

Avoid confidential transactions

It is not advisable to use a public or shared computer to log into MICMAC. You should only do this on a trusted computer.

Be wary of malicious programme

Any computer that you do not personally control is hard to trust. It could have malicious programme, such as keystroke loggers, or other malicious software installed. Think about the precautions you would take on your own computer and consider if other computers have the same safeguards. If a computer is infected with malicious programme, even emptying the browser memory or closing the browser and opening it again will not protect you because spyware programs record everything you type.

Check with the computer’s owner or administrator before using it to find out what security guidelines have been taken. Check out if anti-virus and anti-spyware software are installed, how frequent the computers are scanned for vulnerabilities, and whether security updates are current.

Never save passwords

Many web browsers and other programs will automatically recommend saving passwords for you — avoid this attribute on a shared computer!

Modify your password frequently

If you use shared computers so often, make a habit of modifying your MICMAC password often in case you use a computer that’s been infected with spyware or malware. Be certain that you change your password only on a trusted (preferably non-shared) computer.

 

 

·         Guard Your PC

 

Use anti-virus software and keep it up-to-date

If you haven’t installed anti-virus software on your computer system, take a step to doing that. Anti-virus software can spot many — but not all — forms of malicious software before they have a chance to affect your computer. When you buy anti-virus software, look for one that includes anti-spyware. Most anti-virus software can automatically download latest updates for you. Inspect to make sure your software is downloading updates accurately.

Keep all your software up-to-date

You can prevent many harm by regularly checking for and installing latest updates for your programs, including your operating system, browser, messaging software, and other software. Many software programs include a feature that automatically checks for updates. Be wary of clicking links in emails claiming to have updates for your software; it is advisable to type the address of the web site into your browser’s Address bar to visit the site directly.

Check your security configurations

Majority of the operating systems (example: Windows 10) have a built-in firewall and other guides to prevent unpermitted access to your computer. Check your operating system to make sure it’s set up so that your computer is well guarded. Install any security updates or patches for your operating system promptly.

Be cautious of opening email attachments

Consider turning off the accessory in your email programs that automatically opens attachments. If an unexpected attachment is being sent to you, do not open it. Before you unleash any email attachment — even if it’s from someone you trust — scan it using anti-virus software.

Don’t install unknown programs

Have a second thought before installing or running new software, such as freeware or shareware programs found online. Only download software from a source you trust. Do not install software if you cannot attest that it’s from a trusted source. Make sure you know what the software will do and how it will affect your computer. Spyware often masquerade as rightful and even useful programs. For example, you might be lured to download a program that claims to keep your computer clock harmonized with an official clock. But if that program contains adware or spyware, it could also display advertising pop-ups whenever you’re online or trail of where you go on the Internet.

Be wary of pop-up and email warnings

Don’t ascertain every warning you read — particular pop-up warnings that you see while you’re surfing the Web. Unscrupulous companies use pop-up ads to display false warnings about your computer. Disregard them.

Do NOT click any button in the pop-up (such as a “Close” or “No” button) or the Close box that may appear in the upper-right corner of the pop-up. Closing a pop-up in that way might definitely install a virus or other malicious software on your computer. To close a pop-up ad, press Ctrl-W (if you’re using a Windows computer) or Command-W (on a Mac computer). You may receive an email alert that claims to be from a computer “expert” notifying you of a virus. These are form of deceit. Do not stick to the steps explained in any email except that you’re sure the threat is real.

 

·         How do I choose my password?

Your password is more than just an entrance to your MICMAC account. If your password has been compromised, someone can easily imitate you while online, sign your name to MICMAC service agreements or contracts, engage in transactions, or change your account information. So, select your password carefully and then protect it from others.

A password is like an inner wear: Choose a good one and don’t share it. MICMAC password cannot be less than 6characters, and can be a blend of symbols, or numbers and at least one non-alpanumeric character. With so many alternatives, you should be able to come up with a password that’s easy for you to remember but unfeasible for someone else to figure out. A password is an undisclosed entity that only you should have access to.

Here are some guidelines for choosing a strong password — one that is not to guess.

  1. Select a password you’ll remember. It should be unforgettable for you (so that you don’t have to pen down or leave it in the open), but difficult for others to guess.

 

  1. Avoid using a word. Avoid a complete word from a dictionary (English or otherwise) or a name.

 

  1. Use a minimum of 7 characters. The lengthy your password is the harder it becomes to guess. A long but simple password can be more secure than a short, complex one — and often easier to memorize.

 

  1. Use a blend of uppercase and lowercase letters, numbers, and standard symbols (! @ # $ % ^ & *). Your MICMAC password is case-sensitive, which connote that a capital letter A is dissimilar to a lowercase a.

 

  1. Do not use your personal information that someone can figure out. Avoid a password based on information easily obtained about you (like your birthday, your child or pet’s name, phone number, license plate number, employer, automobile brand, or street name). Avoid using a password you already use for another account, such as your bank account PIN. Avoid using your MICMAC password(or other user name) in any form (such as reversed, capitalized, or doubled).

 

  1. Avoid the understandable. Don’t make it easy for attackers, by repeating a digit or letter (like “111111” or “FFFFFF”) or any other common sequence of characters (like “123456”). Abstain from understandable passwords such as “test” or “password.” When you modify your password, change several characters; don’t just join a number like “2” to the end. Ascertain that nobody is watching you while inputting your MICMAC

 

  1. Replace all familiar phrases. Select a favourite phrase or lyric for your password. To shorten it, replace letters with a number or a standard symbol or remove vowels. For example, “fredsboy” can be made into “Fr3d$boy.” Shorten “two tickets to paradise” to “2Tickets2:Paradiz,” or combine “cat” and “dog” into “cAt!Do8.”

 

  1. If you use a password generator, be careful. Ascertain that you can identify and vouch for the creator of a password management or generator program. Never share any personal information except that you trust the company or person you’re working with. Online password-generator programs can help you create a random password that is generally difficult to crack but also harder to remember.

 

·         How do I safeguard my password

Selecting a strong password is just one aspect to protecting your MICMAC account. You should also follow these guidelines to keep it safe:

  • Your MICMAC ID and password are personal information. An MICMAC employee will never ask you for your password in an unwanted phone call or email. Do not attend to any message that demands for your password.
  • Do not pen down your password. If you must pen down, keep it safe away in a confinement where only you can retrieve. Treat it as if it has monetary value.
  • Change your password if you suspect something is incorrect. To modify your MICMAC password, go to “Help” and follow the instructions.
  • Read the fine print. Before saving your password on any browser, plug-in, or program, thoroughly read the security documentation for that program or service. Relying on the program, your passwords may be available to anyone who uses that computer.

 

 

Reporting incidents

  • To Sekat
    • If you believe your MICMAC account has been compromised, please report the incident to your Administrator.
    • If you have been contacted by someone about your MICMAC account requesting for a password, birth date or other personal information, please send the email to info@sekatgroup.com. Please forward the email you received.
    • If you are a member of the security community and need to report a technical vulnerability, contact: info@sekatgroup.com.
  • To Law Enforcement

In the event that you believe that your personal safety is at risk or if you believe that you may be the victim of identity theft or other illegal conduct, please contact the appropriate law enforcement agencies straight ahead.

 

MODIFICATIONS TO THIS PRIVACY POLICY

Sekat may modify this policy. We will notify you about significant changes in the way we treat personal information by sending a notice to the primary email address specified in your MICMAC account or by placing a more visible notice on our site.

 

  1. MICMAC USER ACCOUNT, PASSWORD AND SECURITY

You will receive a temporary password (that can be changed upon receipt) and account designation upon completing the various MICMAC registration processes and procedures. You are responsible for maintaining the confidentiality of the password and account and are fully responsible for all activities that occur under your password or account. You agree to (a) immediately notify Sekat or your Administrator of any unauthorized use of your password or account or any other breach of security, and (b) ensure that you exit from your account at the end of each session. Sekat cannot and will not be liable for any loss or damage arising from your failure to comply with this Section 5.

 

  1. MICMAC USER’S CONDUCT

You, and not Sekat, are entirely responsible for all Content that you upload, post, email, transmit or otherwise make available via MICMAC. Sekat does not control the content posted via MICMAC  and, as such, does not guarantee the accuracy or integrity of such content. You understand that by using MICMAC, you may be exposed to errors that are objectionable. Under no circumstances will Sekat be liable in any way for any content, including, but not limited to, any errors or omissions, or any loss or damage of any kind incurred as a result of the use of any information posted, emailed, transmitted or otherwise made available via MICMAC.

You agree not to use MICMAC to:

  • upload, post, email, transmit or otherwise make available any information that is unlawful, harmful, threatening, abusive, harassing, tortuous, defamatory, vulgar, obscene, libellous, invasive of another’s privacy, hateful, or otherwise objectionable;

 

  • impersonate any person or entity, including, but not limited to, a Sekat official, guide or host, or falsely state or otherwise misrepresent your affiliation with a person or entity;

 

  • forge headers or otherwise manipulate identifiers in order to disguise the origin of any content transmitted through the MICMAC;

 

  • upload, post, email, transmit or otherwise make available any information that you do not have a right to make available under any law or under contractual relationships (such as inside information, proprietary and confidential information learned or disclosed as part of employment relationships or under nondisclosure agreements);

 

  • upload, post, email, transmit or otherwise make available any information that infringes any patent, trademark, trade secret, copyright or other proprietary rights (“Rights”) of any party;

 

  • upload, post, email, transmit or otherwise make available any material that contains software viruses or any other computer code, files or programs designed to interrupt, destroy or limit the functionality of any computer software or hardware or telecommunications equipment;

 

  • disrupt the normal flow of dialogue, cause a screen to “scroll” faster than other users of MICMAC are able to type, or otherwise act in a manner that negatively affects other users’ ability to engage in real time exchanges;

 

  • interfere with or disrupt MICMAC or servers or networks connected to MICMAC, or disobey any requirements, procedures, policies or regulations of networks connected to MICMAC, including using any device, software or routine to bypass our robot exclusion headers;

 

  • “stalk” or otherwise harass another; and/or

 

  • collect or store personal data about other users in connection with the prohibited conduct and activities set forth in the paragraphs above.

You acknowledge that Sekat may or may not pre-screen information, but that Sekat shall have the right (but not the obligation) in their sole discretion to pre-screen, refuse, or remove any information that is available via MICMAC. Without limiting the foregoing, Sekat shall have the right to remove any material that violates the TOS or is otherwise objectionable. You agree that you must evaluate, and bear all risks associated with, the use of any material, including any reliance on the accuracy, completeness, or usefulness of such material.

You acknowledge, consent and agree that Sekat may access, preserve and disclose your information and content if required to do so by law or if such disclosure is reasonably necessary to: (i) comply with legal process; (ii) enforce the TOS; (iii) respond to claims that any content violates the rights of third parties; (iv) respond to your requests for customer service; or (v) protect the rights, property or personal safety of Sekat, MICMAC users and the public.

You understand that MICMAC and software embodied within MICMAC may include security components that permit digital materials to be protected, and that use of these materials is subject to usage rules set by Sekat and/or content providers who provide content to MICMAC. You may not attempt to override or circumvent any of the usage rules embedded into MICMAC. Any unauthorized reproduction, publication, further distribution or public exhibition of the materials provided on MICMAC, in whole or in part, is strictly prohibited.

 

  1. CONTRIBUTIONS TO MICMAC

By submitting ideas, suggestions, documents, and/or proposals (“Contributions”) to Sekat through its suggestion or feedback Pages, you acknowledge and agree that: (a) your Contributions do not contain confidential or proprietary information; (b) Sekat is not under any obligation of confidentiality, express or implied, with respect to the contributions; (c) Sekat shall be entitled to use or disclose (or choose not to use or disclose) such contributions for any purpose, in any way, in any media worldwide; (d) Sekat may have something similar to the contributions already under consideration or in development; (e) your contributions automatically become the property of Sekat without any obligation of Sekat to you; and (f) you are not entitled to any compensation or reimbursement of any kind from Sekat under any circumstances.

 

  1. INDEMNITY

You agree to indemnify and hold Sekat and its subsidiaries, affiliates, officers, ISPs, employees, partners and licensors harmless from any claim or demand, including reasonable attorneys’ fees, made by any third party due to or arising out of content you submit, post, transmit, modify or otherwise make available through MICMAC, your use of MICMAC, your connection to MICMAC, your violation of the TOS, or your violation of any rights of another.

 

  1. NO COMMERCIAL REUSE OF MICMAC

You agree not to reproduce, duplicate, copy, sell, trade, resell or exploit for any commercial purposes, any portion or use of, or access to MICMAC  (including content, software and your MICMAC Account).

 

 

 

 

  1. GENERAL PRACTICES REGARDING USE AND STORAGE

You acknowledge that Sekat may establish general practices and limits concerning use of MICMAC. You agree that Sekat has no responsibility or liability for the deletion or failure to store any messages and other communications or other content maintained or transmitted by MICMAC. You acknowledge that Sekat reserves the right to log off accounts that are inactive for an extended period of time. You further acknowledge that Sekat reserves the right to modify these general practices and limits from time to time.

 

  1. MODIFICATIONS TO MICMAC

Sekat reserves the right at any time and from time to time to modify or discontinue, temporarily or permanently, MICMAC  (or any part thereof) with or without notice. You agree that Sekat shall not be liable to you or to any third party for any modification, suspension or discontinuance of MICMAC (or any part thereof).

 

  1. TERMINATION

You may terminate your MICMAC account, and access to MICMAC by submitting such termination request to Sekat, although we will be sorry to see you go.

We believe that you own your data and preserving your access to such data is important. If we discontinue a service, where reasonably possible, we will give you reasonable advance notice and a chance to get information out of that service.

You agree that Sekat may, without prior notice, immediately terminate, limit your access to or suspend your MICMAC account, and access to MICMAC. Cause for such termination, limitation of access or suspension shall include, but not be limited to, (a) breaches or violations of the TOS or other incorporated agreements or guidelines, (b)requests by law enforcement or other government agencies, (c) discontinuance or material modification to MICMAC  (or any part thereof), (d) unexpected technical or security issues or problems, (e) extended periods of inactivity, (f) engagement by you in fraudulent or illegal activities, and/or (g) non-payment of any fees owed by you in connection with MICMAC. Further, you agree that all terminations, limitations of access and suspensions for cause shall be made in Sekat‘s sole discretion and that Sekat shall not be liable to you or any third party for any termination of your account, or access to MICMAC.

Termination of your Sekat account includes any or all of the following: (a) removal of access to all or part of the offerings within MICMAC, (b) deletion of your password and all related information, files and content associated with or inside your account (or any part thereof), and (c) barring of further use of all or part of MICMAC.

 

  1. LINKS

MICMAC may provide, or third parties may provide, links to other World Wide Web sites or resources. You acknowledge and agree that Sekat is not responsible for the availability of such external sites or resources, and does not endorse and is not responsible or liable for any information or other materials on or available from such sites or resources. You further acknowledge and agree that Sekat shall not be responsible or liable, directly or indirectly, for any damage or loss caused or alleged to be caused by or in connection with use of or reliance on any such content, goods or services available on or through any such site or resource.

 

  1. MICMAC PROPRIETARY RIGHTS

You acknowledge and agree that MICMAC and any necessary software used in connection with MICMAC contain proprietary and confidential information that is protected by applicable intellectual property and other laws. You further acknowledge and agree that information presented to you through MICMAC is protected by copyrights, trademarks, service marks, patents or other proprietary rights and laws. Except as expressly permitted by applicable law or as authorized by Sekat, you agree not to modify, rent, lease, loan, sell, distribute, transmit, broadcast, publicly perform or create derivative works based on MICMAC, such content or the software, in whole or in part.

Sekat grants you a personal, non-transferable and non-exclusive right and license to use the object code of its software on a single computer; provided that you do not (and do not allow any third party to) copy, modify, create a derivative work from, reverse engineer, reverse assemble or otherwise attempt to discover any source code, sell, assign, sublicense, grant a security interest in or otherwise transfer any right in the software. You agree not to modify the software in any manner or form, nor to use modified versions of the software, including (without limitation) for the purpose of obtaining unauthorized access to MICMAC. You agree not to access MICMAC by any means other than through the interface provided by Sekat.

 

 

  1. DISCLAIMER OF WARRANTIES

We provide our services using a commercially reasonable level of skill and care and we hope that you will enjoy using them. But there are certain things we do not promise about our services.

YOU EXPRESSLY UNDERSTAND AND AGREE THAT:

  • YOUR USE OF MICMAC AND SERVICES ARE AT YOUR SOLE RISK. MICMAC AND SERVICES ARE PROVIDED ON AN “AS IS” AND “AS AVAILABLE” BASIS. SEKAT AND ITS SUBSIDIARIES, AFFILIATES, OFFICERS, EMPLOYEES, ISPs, PARTNERS AND LICENSORS EXPRESSLY DISCLAIM ALL WARRANTIES OF ANY KIND, WHETHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF TITLE, MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT.

 

  • SEKAT AND ITS SUBSIDIARIES, AFFILIATES, OFFICERS, EMPLOYEES, ISPs, PARTNERS AND LICENSORS MAKE NO WARRANTY THAT (i) MICMAC AND SERVICES WILL MEET YOUR REQUIREMENTS; (ii) MICMAC AND SERVICES WILL BE UNINTERRUPTED, TIMELY, SECURE OR ERROR-FREE; (iii) THE RESULTS THAT MAY BE OBTAINED FROM THE USE OF MICMAC AND SERVICES WILL BE ACCURATE OR RELIABLE; (iv) THE QUALITY OF ANY SERVICES, INFORMATION OBTAINED BY YOU THROUGH MICMAC AND SERVICES WILL MEET YOUR EXPECTATIONS; AND (v) ANY ERRORS IN THE SOFTWARE WILL BE CORRECTED.

 

  • ANY MATERIAL DOWNLOADED OR OTHERWISE OBTAINED THROUGH THE USE OF MICMAC AND SERVICES IS ACCESSED AT YOUR OWN DISCRETION AND RISK, AND YOU WILL BE SOLELY RESPONSIBLE FOR AND HEREBY WAIVE ANY AND ALL CLAIMS AND CAUSES OF ACTION WITH RESPECT TO ANY DAMAGE TO YOUR COMPUTER SYSTEM, INTERNET ACCESS, DOWNLOAD OR DISPLAY DEVICE, OR LOSS OF DATA THAT RESULTS FROM THE DOWNLOAD OF ANY SUCH MATERIAL.

 

  • NO ADVICE OR INFORMATION, WHETHER ORAL OR WRITTEN, OBTAINED BY YOU FROM SEKAT OR THROUGH OR FROM MICMAC AND SERVICES SHALL CREATE ANY WARRANTY NOT EXPRESSLY STATED IN THE TOS.

 

  • A SMALL PERCENTAGE OF USERS MAY EXPERIENCE EPILEPTIC SEIZURES WHEN EXPOSED TO CERTAIN LIGHT PATTERNS OR BACKGROUNDS ON A COMPUTER SCREEN OR WHILE USING MICMAC. CERTAIN CONDITIONS MAY INDUCE PREVIOUSLY UNDETECTED EPILEPTIC SYMPTOMS EVEN IN USERS WHO HAVE NO HISTORY OF PRIOR SEIZURES OR EPILEPSY. IF YOU, OR ANYONE IN YOUR FAMILY, HAVE AN EPILEPTIC CONDITION, CONSULT YOUR PHYSICIAN PRIOR TO USING MICMAC. IMMEDIATELY DISCONTINUE USE OF MICMAC AND CONSULT YOUR PHYSICIAN IF YOU EXPERIENCE ANY OF THE FOLLOWING SYMPTOMS WHILE USING MICMAC: DIZZINESS, ALTERED VISION, EYE OR MUSCLE TWITCHES, LOSS OF AWARENESS, DISORIENTATION, ANY INVOLUNTARY MOVEMENT, OR CONVULSIONS.

 

  1. LIMITATION OF LIABILITY

YOU EXPRESSLY UNDERSTAND AND AGREE THAT SEKAT AND ITS SUBSIDIARIES, AFFILIATES, OFFICERS, EMPLOYEES, ISPs, PARTNERS AND LICENSORS SHALL NOT BE LIABLE TO YOU FOR ANY PUNITIVE, INDIRECT, INCIDENTAL, SPECIAL, CONSEQUENTIAL OR EXEMPLARY DAMAGES, INCLUDING, BUT NOT LIMITED TO, DAMAGES FOR LOSS OF PROFITS, GOODWILL, USE, DATA OR OTHER INTANGIBLE LOSSES (EVEN IF SEKAT HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES), RESULTING FROM: (a) THE USE OR THE INABILITY TO USE MICMAC;; (b) UNAUTHORIZED ACCESS TO OR ALTERATION OF YOUR TRANSMISSIONS OR DATA; (c) STATEMENTS OR CONDUCT OF ANY THIRD PARTY ON MICMAC; OR (d) ANY OTHER MATTER RELATING TO MICMAC.

 

  1. EXCLUSIONS AND LIMITATIONS

SOME JURISDICTIONS DO NOT ALLOW THE EXCLUSION OF CERTAIN WARRANTIES OR THE LIMITATION OR EXCLUSION OF LIABILITY FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES. ACCORDINGLY, SOME OF THE ABOVE LIMITATIONS OF SECTIONS 19 AND 20 MAY NOT APPLY TO YOU.

 

  1. SPECIAL ADMONITION FOR MICMAC SERVICES RELATING TO FINANCIAL MATTERS

MICMAC is provided for the management of the administrative and financial functions of cooperative societies, credit unions and microfinance institutions only, and no content included in MICMAC is intended for trading or investing purposes. Sekat and its licensors shall not be responsible or liable for the accuracy, usefulness or availability of any information transmitted or made available via MICMAC, and shall not be responsible or liable for any trading or investment decisions based on such information.

 

  1. NO THIRD-PARTY BENEFICIARIES

You agree that, except as otherwise expressly provided in this TOS, there shall be no third-party beneficiaries to this agreement.

 

  1. NOTICE

Sekat may provide you with notices, including those regarding changes to the TOS, including by but not limited to email, regular mail, SMS, MMS, text message, postings, or other reasonable means now known or hereafter developed. Such notices may not be received if you violate this TOS by accessing MICMAC in an unauthorized manner. Your agreement to this TOS constitutes your agreement that you are deemed to have received any and all notices that would have been delivered had you accessed MICMAC in an authorized manner.

  1. TRADEMARK INFORMATION

You agree that all of Sekat’s trademarks, trade names, service marks and other Sekat logos and brand features, and product and service names are trademarks and the property of Sekat Technologies Nigeria Limited. Without Sekat‘s prior permission, you agree not to display or use in any manner.

 

  1. INTELLECTUAL PROPERTY INFRINGEMENT

Sekat respects the intellectual property of others, and we ask our users to do the same. Sekat may, in appropriate circumstances and at its discretion, disable and/or terminate the accounts of users who may be repeat infringers.

  1. DISPUTE RESOLUTION

 

 

All disputes and claims relating to MICMAC, its products, the rights and obligations of its ISPs, Subscribers and Sekat, or any other claim or cause of action relating to subscription or performance, either of an ISP or of Sekat under these General Terms shall be settled totally and finally by arbitration in Lagos, Nigeria, unless the laws of the state in which the user resides expressly requires otherwise. There shall be one arbitrator, an attorney at law with expertise in transactional law. Each party to the arbitration shall be responsible for its own costs and expenses of arbitration, including legal and filing fees. If an ISP or Subscriber or any other user files a claim or counterclaim against Sekat, they may only do so on an individual basis and not with any other user or as part of a class action suit. The decision of the arbitrator shall be final and binding upon the parties and may, if need be, be reduced to a judgment in any court of competent jurisdiction. This agreement to arbitrate shall survive any termination or expiration of the Agreement.

Nothing in these Terms Of Use shall prevent Sekat from applying to and obtaining from any court having jurisdiction a writ of attachment, temporary injunction, preliminary injunction, permanent injunction, or other available relief to safeguard and protect Sekat’s interest prior to, during, or following the filing of any arbitration or other proceeding, or pending the rendering of a decision or award in connection with any arbitration or other proceeding.

 

  1. GENERAL INFORMATION

Entire Agreement. The TOS constitutes the entire agreement between you and Sekat and governs your use of MICMAC, superseding any prior version of this TOS between you and Sekat with respect to MICMAC. You also may be subject to additional terms and conditions that may apply when you use or subscribe to other Sekat services, affiliate services, third-party content or third-party software.

Choice of Law and Forum. You and Sekat each agree that the TOS and the relationship between the parties shall be governed by the laws of the Federal Republic of Nigeria without regard to its conflict of law provisions and that any and all claims, causes of action or disputes (regardless of theory) arising out of or relating to the TOS, or the relationship between you and Sekat, shall be brought exclusively in the courts located within the Federal Republic of Nigeria.

Waiver and Severability of Terms. The failure of Sekat to exercise or enforce any right or provision of the TOS shall not constitute a waiver of such right or provision. If any provision of the TOS is found by a court of competent jurisdiction to be invalid, the parties nevertheless agree that the court should endeavour to give effect to the parties’ intentions as reflected in the provision, and the other provisions of the TOS remain in full force and effect.

Succession. If an ISP dies or becomes incapacitated, their rights to MICMAC Account, Returns together with all ISP responsibilities, will be passed to their successor(s) who could either be the Next-Of-Kin or Beneficiaries supplied during . Upon death or incapacitation, the successor(s) must present the Sekat Compliance Department with proof of death or incapacitation, along with proof of succession, such as a Grant of Probate or an Enduring Power of Attorney, and a properly completed ISP Application and Agreement. An ISP may inherit and retain another position concurrently with owning or operating a previous position.

Statute of Limitations. You agree that regardless of any statute or law to the contrary, any claim or cause of action arising out of or related to use of MICMAC or the TOS must be filed within one (1) year after such claim or cause of action arose or be forever barred.

Others

Sekat may modify these terms or any additional terms, for example, reflect changes to the law or changes to our Services. You should look at the terms regularly. We’ll post notice of modifications to these terms on this page. Changes will not apply retroactively and will become effective no sooner than seven days after they are posted. However, changes addressing new functions for a service or changes made for legal reasons will be effective immediately. If you do not agree to the modified terms for a Service, you should discontinue your use of that service.

If there is a conflict between these terms and the additional terms, the additional terms will control for that conflict.

These terms control the relationship between Sekat and you. They do not create any third party beneficiary rights.

If you do not comply with these terms, and we don’t take action right away, this doesn’t mean that we are giving up any rights that we may have (such as taking action in the future).

If it turns out that a particular term is not enforceable, this will not affect any other terms.

The section titles in the TOS are for convenience only and have no legal or contractual effect.

  1. VIOLATIONS

Please report any violations of the TOS to our US.

Last updated October 22, 2017