Terms of Use

PLEASE READ THESE TERMS AND CONDITIONS CAREFULLY. BY ACCESSING THIS SITE AND ANY PAGES THEREOF, YOU AGREE TO BE BOUND BY THE TERMS AND CONDITIONS BELOW. IF YOU DO NOT AGREE TO THE TERMS AND CONDITIONS BELOW, DO NOT ACCESS THIS SITE, OR ANY PAGES THEREOF.

COPYRIGHT - 2015, Alpha Catalyst Consulting Sdn. Bhd. All rights reserved

I. User Accounts and Account Ownership

Accounts may only be used by one person. A single login shared by multiple people is not permitted. Accounts may only be used by the department, group or team that licensed the software.

You are responsible for maintaining the security of your account and password. We cannot and will not be liable for any loss or damage from your failure to comply with this security obligation.

You may not use the Service for any illegal or unauthorized purpose. You must not, in the use of the Service, violate any laws in your jurisdiction (including but not limited to copyright laws).

II. Anti SPAM Policy

InnovAsian® Space expressly forbids SPAM (the term "SPAM" meaning the sending of unsolicited e-mail to parties unknown to the sender). InnovAsian® Space has a zero tolerance SPAM policy. Any customer found to be using InnovAsian® Space for SPAM will have their account subject to immediate termination.

InnovAsian® Space may only be used in connection with e-mail lists for which recipients have voluntarily registered. Using InnovAsian® Space to send email to an address you obtain without the consent of such addressee is a violation of the InnovAsian® Space Terms of Use. You may not import any e-mail addresses to your list that have not chosen to receive your mailings.

We cannot and do not, monitor, censor or edit the contents of email messages sent using our system. Users alone are responsible for the contents of their messages and the consequences of any such messages. We do not assume any responsibility or liability for messages or other content that is created by our users. You may not send, post, distribute or disseminate any defamatory, obscene, or otherwise unlawful messages, material or information, including another person's proprietary information (including trademarks, trade secrets, or copyrighted information) without express authorization from the rights holder. We will cooperate with legal authorities in releasing names and IP addresses of users who are involved in SPAM or other illegal activities.

III. General Conditions

We provide space for hosting communities. We make no guarantee of the accuracy, correctness, or completeness of any information on these web pages, communities, databases, or results and are not responsible for any errors or omissions arising from the use of such information. User represents, warrants and agrees that no materials of any kind submitted through your account or otherwise posted or shared by you through the Service will violate or infringe upon the rights of any third party, including copyright, trademark, privacy, publicity or other personal or proprietary rights; or contain libelous, defamatory or otherwise unlawful material.

User agrees to indemnify, defend and hold harmless Alpha Catalyst Consulting Sdn. Bhd, its affiliates, and their respective directors, agents and employees from and against all claims, demands, damages, loses, liabilities or costs (including court costs and attorneys? fees) arising out of or in connection with: (a) use of the Service (including use of or reliance on any information or materials obtained through the use of the Service), (b) use of the Service by a third party), (c) breach of this agreement

Verbal, physical, written or other abuse (including threats of abuse or retribution) of anyone is expressly prohibited.

IV. Prohibited Uses

Illegal Activities - Any activity that violates local, state, federal or international law. Examples include: Posting or disseminating illegal material (such as child pornography or obscene material.)

Security - Attempting to gain unauthorized access to any network; attempting to disrupt network services or services of external networks using the Service; attempting to gather third party personal information without consent. Examples include: DoS attacks, computer virus distribution or the transmission of any other software or application that contains features harmful to any network.

Bandwidth, Data Storage and Other limitation - Use of the network infrastructure and service in a manner that puts an excessive burden on the limitations of the network.