BIOCATCH

TERMS & CONDITIONS

The following terms and conditions of use apply to the use of this Website (the "Website"). Read these terms and conditions carefully before using the Website with or without logging in or downloading content from the site. These Terms and Conditions of use and all other legal notices on this website (e.g. specific Terms of Use of password protected zones and Privacy Policy) may change from time to time at the sole discretion of BioCatch and will become binding immediately upon posting. By accessing or using the Website, you are accepting and agreeing to the terms below and to any changes thereto that may become applicable from to time as indicated above.

Terms Applicable to Specific Content and Areas of the Website. Some areas of the Website or content provided on or through the Website may have additional rules, guidelines, license agreements, user agreements or other terms and conditions that apply to your access or use of that area of the Website or content (including terms and conditions applicable to a corporation or other organization and its users). If there is a conflict or inconsistency between these Terms and Conditions of Use for the BioCatch website, and the rules, guidelines, license agreement, user agreement or other terms and conditions for a specific area of the Website or for specific content, the latter shall have precedence and control with respect to your access and use of that area of the Website or content.

Copying and Reverse Engineering. You agree that you will not: (i) copy, modify, create any derivative work of; or (ii) reverse assemble, decompile, reverse engineer or otherwise attempt to derive source code (or the underlying ideas, algorithms, structure or organization); or (iii) remove any copyright notices, identification or any other proprietary notices from any of the software, copyrighted content and any proprietary information in this Website.

Intellectual Property Rights. You acknowledge and agree that these Terms and Conditions are not intended to convey or transfer to you any intellectual property rights or to grant any licenses in or to any technology or intellectual property or content, other than as expressly provided herein. The content contained in this Website, including, but are not limited to, software, product information, technology information, user guides, white papers, analysis, trade names, graphics, designs, icons, audio or video clips and logos, is BioCatch' proprietary information, protected by copyright, trademark, patent and/or other intellectual property rights, under US and international law. Third-party trademarks and information are the property of their respective owners.

Trademarks. The various solutions and/or services and/or products and/or platforms provided by BioCatch, including those which are named and/or marketed and/or sold and/or marked as BIOCATCH (R) and/or BIOCATCH CONNECT (TM) and/or CONTINUOUS BEHAVIORAL SEQUENCING (TM) and/or INVISIBLE CHALLENGES (R) and/or BIOCATCH SCOUT (TM) and/or BIOCATCH FUSE (TM) and/or BIOCATCH TRUST (TM), include or may include (among other solutions) the following goods and services: (1) Downloadable computer software, Downloadable computer firmware, and Downloadable computer programs featuring algorithms for authentication, threat detection, blocking, identifying, analyzing, monitoring and maintaining the security, integrity and users of computer networks, servers, computers, handheld and mobile devices, mobile and web applications; Computer hardware; Downloadable computer software and downloadable computer programs for user authentication, for user identification, for user identity verification, for logging-in a user into a computerized system, for differentiating among human users, for differentiating between a human user and a non-human user, for detecting online and cyber threats and fraud, for detecting malicious cyber activity, for detecting malicious log-in attempts, for detecting malicious online activity, for detecting bots and automatic scripts, for detecting suspicious online activity, for detecting fraudulent online activity, for detecting suspicious online activity, for detecting fraudulent transactions, for detecting suspicious transactions, for detecting cyber security threats, for mitigating cyber security threats, for blocking cyberattacks and online attacks, for blocking fraudulent transactions, for securing banking transactions, for securing credit card transactions, for securing  electronic commerce transactions, for detecting online fraud, for mitigating online fraud, for monitoring or analyzing user gestures on electronic devices, mobile devices, or computerized devices for monitoring user behavior on computerized devices, for extracting and utilizing behavioral characteristics of users of electronic, mobile or computerized devices, for securing financial transactions performed via electronic, mobile or computerized devices, mobile applications, web-based applications or web browser, for collecting and analyzing data pertaining to gestures and online behavior of users of electronic devices, mobile devices or computerized devices for generating reports and alerts regarding fraudulent transactions, for generating reports and alerts regarding suspicious transactions, for generating reports and alerts regarding suspicious user accounts. (2) Collection, compilation and analysis of data for the purpose of generating and transmitting information reports on and ratings of the level of security of third-party software residing on the computers and mobile devices of others. (3) Software as a service and platform as a service and providing temporary use of non-downloadable software featuring software and/or algorithms for performing some or all of the above-mentioned operations. (3) Downloadable computer software, downloadable computer firmware, and downloadable computer programs, for authenticating users, for verifying online transactions, for verifying banking transactions, for maintaining the integrity of banking transactions, for maintaining the integrity of online transactions, for verifying the authenticity of banking transactions, for verifying the authenticity of online transactions, for detecting fraudulent banking transactions, for detecting fraudulent bank accounts, for detecting fraud-related banking transactions, for detecting fraud-related bank accounts, for detecting fraud-related online transactions, for detecting mule bank accounts that are used as middleman in fraudulent transactions, for detecting money laundering transactions, for generating Anti Money Laundering (AML) alerts and reports with regard to banking transactions, for generating Anti Money Laundering (AML) alerts and reports with regard to bank accounts, for detecting criminal banking transactions, for detecting crime-related banking transactions, for detecting terror-funding banking transactions, for blocking fraudulent transactions, for mitigating online fraud, for preventing online fraud, for mitigating banking fraud, for preventing banking fraud, for detecting malicious online activity, for detecting malicious banking activity, for detecting bots and automatic scripts, for detecting suspicious online activity, for detecting suspicious banking activity, for detecting fraudulent online activity, for detecting cyber security threats, for mitigating cyber security threats, for securing banking transactions, for securing credit card transactions, for securing electronic commerce transactions, for detecting online fraud, for mitigating online fraud, for monitoring and analyzing user gestures on electronic devices, for monitoring and analyzing user gestures on mobile electronic devices, for monitoring and analyzing user gestures on portable electronic devices, for monitoring and analyzing user gestures on smartphones, for monitoring and analyzing user gestures on tablets, for monitoring and analyzing user gestures on laptop computers, for monitoring and analyzing user gestures on desktop computers, for securing banking transactions and online transactions performed via mobile  applications, for securing banking transactions and online transactions performed via computers, for securing banking transactions and online transactions performed via web-based applications, for securing banking transactions and online transactions performed via web browsers, for monitoring and analyzing behavior of users of electronic devices, for monitoring and analyzing behavior of users of mobile electronic devices, for monitoring and analyzing behavior of users of portable electronic devices, for monitoring and analyzing behavior of users of smartphones, for monitoring and analyzing behavior of users of tablets, for monitoring and analyzing behavior of users of laptop computers, for monitoring and analyzing behavior of users of desktop computers, for monitoring and analyzing behavior of users of web-based applications, for monitoring and analyzing behavior of users of web browsers, for generating reports and alerts regarding fraudulent banking transactions, for generating reports and alerts regarding suspicious banking transactions, for generating reports and alerts regarding fraudulent online transactions, for generating reports and alerts regarding suspicious online transactions; (4) Collection, compilation and analysis of data for the purpose of generating and providing alerts and reports about fraudulent banking transactions, about fraud-related banking transactions, about fraudulent online transactions, about fraudulent bank accounts, about suspicious banking transactions, about suspicious bank accounts, about mule bank accounts, about money laundering bank accounts, about money laundering transactions, about terror-funding transactions, about fraudulent banking activity, about criminal banking activity, about fraudulent transactions performed via electronic devices, about fraudulent transactions performed via mobile electronic devices, about fraudulent transactions performed via portable electronic devices, about fraudulent transactions performed via computers, about fraudulent transactions performed via laptop computers, about fraudulent transactions performed via desktop computers, about fraudulent transactions performed via mobile applications, about fraudulent transactions performed via web browsers; (5) Software as a service and/or platform as a service and/or providing temporary use of non-downloadable software, featuring software and/or programs and/or algorithms for performing one or more of the above-mentioned operations.

Disclaimer of Warranty. Although BioCatch attempts to provide accurate and up-todate information on this Website, BioCatch makes no warranty with respect to the accuracy or completeness of the information on the Website. Information, software and documentation provided on this Website are provided "as is" and without warranty of any kind either expressed or implied, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose and non-infringement.

Limitation of Liability. BioCatch shall not be liable to you or any other party for any indirect, special, incidental or consequential damages, including, but not limited to, any amounts representing loss of profits, loss of business, loss of information or punitive damages. In any event, the extent of liability shall not exceed the amount of US$20. The above limitations shall apply to the fullest extent permitted by law.

Links to Third-party Websites. This Website may contain links to third-party Websites. Such links are provided for convenience only and BioCatch makes no warranty, nor does it assume any responsibility or liability in connection with the access and use of any other Website.

Termination of Access and Use. BioCatch reserves the right to modify, suspend or terminate the Website and/or your use or access to the Website for any or no reason with or without notice at its sole and absolute discretion. BioCatch will not be liable to you or any third-party for any modification, suspension, or termination of the Website, and/or termination of your use thereof or access thereto.

Privacy. Information submitted by you or collected by us in connection with the use of this Website is subject to our Privacy Policy, the terms of which are incorporated herein by reference.

Export. The information, products or services available on this Website or any part thereof may be subject to export or import controls under the laws and regulations of the United States and/or Israel. You agree to comply with such laws and regulations and agree not to knowingly export, re-export, import or re-import, or transfer products without first obtaining all required government authorizations or licenses.

Governing Law. This Agreement and any action related thereto shall be governed, controlled, interpreted and defined in accordance with the laws of the State of Israel, without regard to the conflicts of laws provisions thereof.

Safe Harbor. This Website may contain forward-looking statements that are subject to risks and uncertainties. Factors that could cause actual results to differ materially from these forward-looking statements.

Actionable Behavioral Insights Start Here

Request a Demo