Select Page

Privacy Policy – Pi Epsilon 

Revised: 02/28/2022

    Thank you for your interest in our Pi Epsilon Communication Platform. You have legitimate concerns regarding your privacy; and therefore, we clearly outline how we process and collect your personal data. We want you to understand what limited information we collect and what may happen to that information when you use any of apps or services. Importantly, Pi Epsilon messages, calls, videos, file shares, etc. cannot be accessed by our Company

     

    Privacy Policy

    This document (hereinafter – the “Privacy Policy”) explains the privacy rules applicable to all information collected or submitted when you access, install, or use Pi Epsilon services. Our top priority is customer data security. 

     

    Account Lookup by Third Party Identifier

    Pi Epsilon server/client incorporates third-party identifiers. The server resides within the customer preferred environment where the Pi Epsilon server is compiled based on customized options and preferences. 

     

    Account Information

    Creation of a Pi Epsilon account does not require registration of any phone number or email account. Account generation is accomplished via an administration console that provides the customer direct access and control. The customer’s administrator has access to a configuration menu within the Pi Epsilon application to edit their profile, add a profile picture, change their name, or enable two-way authentication etc. The server is fully decentralized, based on end-to-end encryption configuration and can be hosted by customer preferences a.k.a virtual private server, dedicated virtual private server, bare metals, or physical server at the customer’s location, while retaining full administration console.

     

    Contacts

    The Pi Epsilon application supports contact discovery by allowing users to look up Third Party Identifiers to see if the user has linked them with their Pi Epsilon ID.  Users then must obtain access to the app on an invitation basis and the invitee has to accept the invitation in order to exchange the private and public crypto keys.

     

    Messages

    Pi Epsilon server does not retain any type of content information, it only retains hardware ID of the devices that the application is installed. The content resides only on the end users’ devices, where the user controls and manipulates the content. Pi Epsilon queues end-to-end encrypted messages on its servers for delivery to devices that are temporally  offline (e.g., a phone whose battery died). Limited technical information is stored on the Pi Epsilon server in order to establish calls, text video and video conferences. 

    Pi Epsilon Server

    The PiEpsilon server supports contact discovery by allowing individuals who were given permission by the customer administrator to look up existing users via the Third-Party Identifier. 

     

    Third Party Identifiers

    A Third-Party Identifier uniquely identifies a person.  It is a Pi Epsilon ID within the customer’s dedicated server.  An individual can also lookup via the Third-Party Identifier but only by inviting a user to a Pi Epsilon room by their Third Party Identifier.

    User Support

    Technical support levels 1, 2, and 3 is provided 24 hours per day, 7 days per week.

     

    Your Information

    Contact upload in the context of our application only includes the ability of users to share contact information with each other, similar to contact sharing in messaging applications like WhatsApp.

    The user has the ability to manage all personal information in the Pi Epsilon application Settings. This area allows to edit a profile, choose options for Security & Privacy settings, Preferences, and Notifications. 

    Exception scenarios to release any relevant, available information that may reside within the Pi Epsilon infrastructure:

    • To meet any applicable law, regulation, legal process, or enforceable governmental request.
    • To enforce applicable Terms, including investigation of potential violations.
    • To detect, prevent, otherwise address fraud, security, or technical issues.
    • To protect against harm to the rights, property, or safety of Pi Epsilon, our users, or the public as required or permitted by law.

     

    Terms of Service 

    These terms of service (the “Terms”) govern your access to and use of our apps, services, or website (together, “Services). Therefore, we kindly ask you to carefully read them when visiting our website, before you register, download, install and use any services, which include software, mobile applications, and any services that (“we,” “us,” “our,” or “Company ”) provides through our software, application or otherwise (all of which collectively are referred as the “Services”).

    Please note that the Terms constitute a binding legal agreement between you and our Company. By visiting the website, registering for, installing and/or using our Services on any platform or device you agree to be bound by these Terms. It is only under these Terms that we allow visitors / users (the “users”) to use our Services. If you do not agree to these Terms or any provisions hereof, please do not install and do not use our software, our mobile application and/or any of our products or services.

    If you are using the Services on behalf of an organization, you are agreeing to these Terms for that organization and acknowledging that you have the authority to act on behalf of that organization and commit to these Terms on behalf of that organization. Services are transitory digital network communications services, which enhance internet security and privacy. We do not condone any unlawful use and you agree that they shall not be used for any criminal, illicit and illegal acts. You accept and agree not to violate any law of any jurisdiction that you are originating from and any other applicable law. It is your (user’s) responsibility to know and comprehend any and all relevant laws related to any jurisdiction or venue that concerns you, your actions, and your use of these Services. 

    By using our Services, you agree to the whole Terms of Service including all said general provisions incorporated by reference. We hold the right to modify the Terms from time to time. It is your responsibility to check and read current Terms periodically. The amendment of Terms may be communicated to you by sending an email and/or by publishing the updated Terms on our website.

    You must be at least 13 years old or minimum age as approved by a parent or guardian. 

    We do not sell, rent, or monetize your personal data or content. 

     

    Our services

    You are solely and exclusively responsible for the use of the Services. Importantly, we will not be liable in any way or form for actions done by its users including criminal liability and civil liability for harm executed or not executed. Liability is further limited by other provisions of these Terms. We grant you a permission to use our Services subject to the restrictions set forth in these Terms. Your use of the Services is at your own risk. Furthermore, Services may be modified, updated, interrupted, or suspended at any time without notice or liability. We do not bear any liability for any harm or other adverse consequences to you, caused by this. Pi Epsilon, the Company, its owners, employees, agents, and others that are involved with the Services are not in any way or form liable for any harm of any kind executed or not executed, resulting from, or arising through or from the use of any account registered.

     

    No-logs policy

    Our Company guarantees a strict no-logs policy for all Services, meaning that Services are provided by an automated process and your activities while using it are not monitored, recorded, logged, stored, or passed to any third party. We do not store connection timestamps, session information, used bandwidth, traffic logs, IP addresses or other data.

     

    Legal and Acceptable Use

    We do not condone or endorse any unlawful, illicit, criminal, or fraudulent activities perpetrated by using the Services. Therefore, our Company reserves the right to suspend or terminate an account in case any violation of the Terms of Service becomes apparent. As we protect and respect customer privacy; we do not log or track their activity in any way. However, in the eventuality that an offense outside of those means is discovered (i.e., a customer would notify of them having done so); it would have the right to suspend or terminate the account.

     

    Intellectual Property Rights

    Subject to the terms and conditions of these Terms, we grant you a limited, non-exclusive,  non-transferable, non-sublicensable, license to use our Services in accordance with these Terms. The license provided herein is effective until terminated. This license automatically terminates if you fail to comply with these Terms. The Services, including, but not limited to, the software, mobile applications, and all other items, are owned and copyrighted by our Company and are protected worldwide. We retain all rights, title, and interest in and to the Services and any portion thereof, including, without limitation, all copyrights, trademarks, patents, logos, trade dress, domains, service marks, trade secrets and other intellectual property rights. You shall not take any action to jeopardize, limit or interfere in any manner with our ownership of and rights with respect to the Services. All rights are reserved unless otherwise noted.

     

    Prohibited and Restricted Uses

    Your access to and use of the Services is subject to these Terms and all applicable laws and regulations. We reserve the right, at any time, in our sole discretion, with or without notice, to terminate the accounts of, and block access to Services to any user who infringe any applicable laws or these Terms. While using the Services you yourself agree not to, and agree not assist, encourage, or enable others to use the Services:

    1. for unlawful, illicit, illegal, criminal or fraudulent activities, including but not limited to port scanning, sending spam, sending opt-in email, scanning for open relays or open proxies, sending unsolicited e-mail or any version or type of email sent in vast quantities even if the email is routed through third-party servers, any pop-up launching, use of stolen credit cards, credit card fraud, financial fraud, cryptocurrency fraud, cloaking, extortion, blackmail, kidnapping, rape, murder, sale of stolen credit cards, sale of stolen goods, offer or sale of prohibited, military and dual use goods, offer or sale of controlled substances, identity theft, hacking, pharming, phishing, scraping in any form or scale, digital piracy, intellectual property infringements and other similar activities;

    2. to assault, interfere, gain unauthorized access, deny service in any way or form to any other network, computer, or node through our Services;

    3. to exploit children in any way, including audio, video, photography, digital content, etc.;

    4. to upload or distribute in any way files that contain viruses, worms, trojans, corrupted files, or any other similar software or programs that may damage the operation of another’s computer;

    5. to take any action that imposes or may impose an unreasonable or disproportionately large load on our infrastructure;

    6. to share any data or other content with any unreasonably large number of persons, including without limitation sending blast communications to a large number of recipients or sharing content with persons you do not know or who do not know you; 

    7. to modify, translate, reverse engineer, decompile, disassemble, or create any derivative works, including any of its files or documentation, or any portion thereof, or determine or attempt to determine any source code, algorithms, methods, or techniques embodied in the application or any portion thereof;

    8. to violate general ethic or moral norms, good customs, and fair conduct norms;

    9. attempt to gain unauthorized access, user accounts, computer systems or networks connected to the Services through hacking, password mining, brute force or any other means;

    10. to otherwise infringe or circumvent these Terms.

    We are under no obligation to enforce the Terms against you. We encourage you to let us know about the violation of these Terms by any users; however, in case of such violations we may take appropriate action at our sole discretion.

     

    User’s Rights and License with Pi Epsilon

    We own all copyrights, trademarks, domains, logos, trade dress, trade secrets, patents, and other intellectual property rights associated with our Services. You may not use our copyrights, trademarks, domains, logos, trade dress, patents, and other intellectual property rights unless you have our written permission. Pi Epsilon grants you a limited, revocable, non-exclusive, and non-transferable license to use our Services in accordance with these Terms.

     

    Disclaimer of warranties

    Reasonable efforts are taken to improve the accuracy and integrity of our Services, but we are not responsible for downtime, loss of data, corrupt data, service delay, mistakes, out-of-date information, or other errors. Notwithstanding any other provision of these Terms, we reserve the right to change, suspend, remove, or disable access, or any functionality comprising a part of the Services at any time without notice. In no event will we be liable for making these changes. As a registered user in good standing, you may be provided with limited service by our Company. We do not warrant and will not have any liability or responsibility for your use of Services or other the products or services we provide. We may also impose limits on the use of or access to the Services, for any reason and without notice or liability. Our website, products and services may be unavailable from time to time due to human, digital, mechanical, telecommunication, software, and other failures. We cannot predict or control when such downtime may occur and cannot control the duration of such downtime.

     

    Disclaimers and Limitations

    USE OF OUR SERVICES (INCLUDING, WITHOUT LIMITATION, OUR SOFTWARE, MOBILE APPLICATIONS, SERVICES AND WEBSITE) ARE PROVIDED “AS IS” AND WITH ALL FAULTS. WE MAKE NO REPRESENTATION OR WARRANTY WHATSOEVER REGARDING THE COMPLETENESS, ACCURACY, ADEQUACY, SUITABILITY, FUNCTIONALITY, AVAILABILITY, OR OPERATION. YOU ACKNOWLEDGE THAT WE DO NOT HAVE CONTROL OVER YOUR USE, AND WE DO NOT WARRANT THE PERFORMANCE OR RESULTS THAT MAY BE OBTAINED THROUGH YOUR USE OF THE SERVICES. YOU ASSUME ALL RISKS AND RESPONSIBILITY FOR YOUR USE AND FOR ANY LOSS OF OR ERRORS IN ANY DATA OR INFORMATION. TO THE FULL EXTENT PERMISSIBLE BY APPLICABLE LAW, WE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT, AND ANY WARRANTIES ARISING THROUGH COURSE OF DEALING OR USAGE OF TRADE. WITHOUT LIMITING THE FOREGOING, WE NEITHER WARRANT NOR REPRESENT THAT YOUR USE OF THE SERVICES WILL NOT INFRINGE THE RIGHTS OF ANY THIRD PARTIES, NOR THAT THE SERVICES WILL BE AVAILABLE FOR YOUR ACCESS OR USE, NOR THAT OPERATION WILL BE ERROR FREE OR UNINTERRUPTED. PLEASE NOTE THAT SOME JURISDICTIONS MAY NOT ALLOW THE EXCLUSION OF IMPLIED WARRANTIES, SO SOME OF THE ABOVE EXCLUSIONS MAY NOT APPLY TO YOU. IN ADDITION, YOU MAY ALSO HAVE OTHER RIGHTS THAT VARY FROM ONE JURISDICTION TO ANOTHER JURISDICTION.

     

    Limitation of Liability

    We shall not be responsible or have any liability for any delay or failure to perform to the extent due to unforeseen circumstances or causes beyond its reasonable control, including, without limitation, failures of your telecommunication or internet service providers, Force Majeure, earthquakes, fires, floods, embargoes, labor disputes and strikes, riots, war, novelty of product manufacture or other unanticipated product development problems, and acts of civil and military authorities.

    There are inherent risks in relying upon, using, transmitting, or retrieving any data and/or content on the Internet, and we urge you to make sure you understand these risks before using these Services.

    YOUR USE IS AT YOUR OWN RISK. NEITHER OUR COMPANY, NOR ANY OF ITS AFFILIATES, NOR ANY OF THEIR EMPLOYEES, OFFICERS OR DIRECTORS, SHALL BE LIABLE FOR ANY DIRECT, INDIRECT, PUNITIVE, INCIDENTAL, SPECIAL, CONSEQUENTIAL, OR OTHER DAMAGES (INCLUDING, WITHOUT LIMITATION, LOSS OF DATA OR INFORMATION OF ANY KIND, LOSS OF BUSINESS, LOST PROFITS, INTERRUPTION OF BUSINESS, COST OF COVER OR ANY OTHER DAMAGES) ARISING OUT OF OR IN ANY WAY RELATED TO THIS AGREEMENT OR THE USE OR INABILITY TO USE OUR SERVICES, WHETHER BASED ON CONTRACT, TORT, STRICT LIABILITY OR OTHERWISE, EVEN IF WE HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. IN ANY CASE, THE LIABILITY OF OUR COMPANY SHALL NOT EXCEED WHAT THE CLIENT PAID FOR THEIR SERVICE/PRODUCT AND SHALL NOT INCLUDE ATTORNEY FEES OR COURT COSTS IRRESPECTIVE OF ANY LAWS OR STATUTES THAT MAY PRESCRIBE OTHERWISE.

     

    Electronic communications

    You consent to receive communications from us electronically, e.g., by email. We will communicate with you through the email that you provide. You agree that all agreements, notices, disclosures, and other communications that we provide to you electronically satisfy any legal requirement that such communications be in writing. You agree that we may communicate to you for the purpose of advising you of changes or additions to our Services, about any of our products or services, or for such other purposes that are reasonable or required by applicable law.

    or other third parties because they are end-to-end encrypted, private, and secure. Please find our Privacy Policy and Terms of Service below.

     

    Please contact us by email at [email protected] if you have any questions on our Privacy Policy or you want to enforce any of your rights related to your privacy.

    [END OF POLICY]