Terms and Conditions

Last updated: 23/02/2025

1. Introduction

These Terms and Conditions ("Terms") govern your use of Cifr.io's ("we", "our", "us") authentication services, mobile applications, and related technologies. By accessing our website, downloading our mobile application, or using any of our services, you expressly agree to be bound by these Terms and our Privacy Policy. If you disagree with any part of these Terms, you must not use our services.

1.1. Acceptance of Terms:

  • These Terms constitute a legally binding agreement
  • Accessing the website or using the app indicates acceptance
  • Business Clients must have authority to bind their organisation

1.2. Changes to Terms:

  • We may modify these Terms at our discretion
  • Changes become effective immediately upon posting
  • Continued use constitutes acceptance of modifications
  • Users are responsible for reviewing Terms regularly

2. Definitions

  • "Service" refers to Cifr.io's authentication technology, including the Cifr Chip, mobile applications, and related platforms
  • "Business Client" refers to businesses utilising our authentication services
  • "End User" refers to individuals who interact with our authentication technology
  • "Cifr Chip" refers to our proprietary authentication hardware
  • "Platform" refers to our mobile applications, websites, and digital interfaces

3. Service Description

Cifr.io provides advanced product authentication services through proprietary technology. Our primary services include:

  • Product authentication via Cifr Chip technology
  • Mobile application services for product verification
  • Access to exclusive content and offers
  • Brand protection services
  • Consumer engagement solutions

4. Authentication Disclaimer

4.1. Whilst we employ advanced technology and security measures, we make no absolute guarantees regarding authentication results. Our service is provided on an "as is" and "as available" basis.

4.2. We shall not be held liable for:

  • Any authentication errors or failures
  • Consequential losses arising from authentication results
  • Damages resulting from reliance on authentication outcomes
  • Technical malfunctions affecting authentication processes
  • Third-party misuse of our authentication technology

4.3. Authentication Process:

  • Authentication results depend on proper Cifr Chip scanning
  • Users must follow provided authentication instructions
  • Network connectivity may affect authentication process
  • Authentication history is stored for security purposes

4.4. Security Measures:

  • Users must maintain device security
  • Suspicious authentication attempts should be reported
  • Multiple failed attempts may trigger security protocols
  • Authentication tokens are time-sensitive

5. Data Management and Privacy

5.1. Data Collection and Usage:

  • We collect and process data necessary for service operation
  • Information is gathered through product interactions and platform usage
  • Data collection complies with UK and EU data protection regulations

5.2. Data Rights:

  • Users retain ownership of their personal data
  • We maintain a licence to use anonymised data for service improvement
  • Data may be used for analytics, research, and system enhancement
  • We may share aggregated, non-personal data with Business Clients

5.3. Business Client Data:

  • Business Clients maintain ownership of their product and brand data
  • We process such data solely for service provision and improvement
  • Confidential information is protected under separate agreements

5.4. Data Security:

  • We implement industry-standard security measures
  • Data transmission uses encryption protocols
  • Regular security audits are conducted

5.5. Marketing Communications:

  • Users may receive service-related communications
  • Marketing preferences can be modified
  • Certain service notifications cannot be opted out
  • Business Clients may receive additional communications

6. User Obligations

Users agree to:

  • Provide accurate information
  • Use the service lawfully
  • Not attempt to circumvent security measures
  • Not reverse engineer the Cifr Chip or related technology
  • Report suspected security breaches promptly

7. Intellectual Property

7.1. All intellectual property rights in the Service, including:

  • Cifr Chip technology
  • Software applications
  • Authentication algorithms
  • Brand materials remain the exclusive property of Cifr.io or our licensors.

8. Limitation of Liability

8.1. To the fullest extent permitted by law, Cifr.io shall not be liable for:

  • Direct, indirect, or consequential losses
  • Business interruption
  • Loss of profits or revenue
  • Data loss or corruption
  • Third-party claims

8.2. Our total liability shall not exceed the amount paid for the relevant service.

9. Indemnification

Business Clients agree to indemnify and hold harmless Cifr.io against any claims arising from:

  • Product authentication outcomes
  • End User interactions
  • Breach of these Terms
  • Misuse of our technology

10. Modifications

We reserve the right to modify these Terms at any time. Continued use of the Service following modifications constitutes acceptance of updated Terms.

11. Governing Law

These Terms shall be governed by and construed in accordance with the laws of England and Wales. Any disputes shall be subject to the exclusive jurisdiction of the courts of England and Wales.

12. Contact Information

For any queries regarding these Terms, please contact: [email protected]


© Cifr.io 2025. All rights reserved.

13. User Accounts

13.1. Account Security:

  • Users are responsible for maintaining account confidentiality
  • Suspicious account activity must be reported promptly
  • We may suspend accounts for security reasons
  • Account sharing is prohibited

13.2. Account Termination:

  • We reserve the right to terminate accounts
  • Users may delete accounts subject to conditions
  • Some data may be retained post-termination
  • Business Client termination requires written notice

14. Service Availability

14.1. We strive to maintain service availability but:

  • Cannot guarantee uninterrupted service
  • May suspend service for maintenance
  • Are not liable for service interruptions
  • May modify features without notice

14.2. Technical Requirements:

  • Users must maintain compatible devices
  • App updates may be required
  • Minimum system requirements apply
  • Network connectivity is user responsibility

15. Intellectual Property Usage

15.1. Permitted Use:

  • Limited licence for personal/business use
  • No commercial exploitation permitted
  • Attribution requirements must be followed
  • Usage guidelines must be respected

15.2. Restrictions:

  • No reverse engineering
  • No unauthorised modification
  • No competitive use
  • No white-labelling without agreement

16. Dispute Resolution

16.1. Process:

  • Initial informal resolution attempt
  • Written notice of disputes required
  • 30-day resolution period
  • Mediation before litigation

16.2. Class Action Waiver:

  • Individual disputes only
  • No class action participation
  • Small claims court rights preserved
  • Binding arbitration options

17. Force Majeure

We shall not be liable for failures or delays due to:

  • Natural disasters
  • Government actions
  • Network failures
  • Other circumstances beyond reasonable control

18. Severability

If any provision is found invalid:

  • Remaining terms remain in effect
  • Invalid terms shall be modified
  • Purpose of agreement preserved
  • Interpretation favours validity

19. Assignment

19.1. Company Rights:

  • May assign or transfer rights
  • May delegate obligations
  • May undergo corporate restructuring
  • May engage subcontractors

19.2. User Restrictions:

  • No assignment without consent
  • No transfer of obligations
  • No delegation of responsibilities
  • No sublicensing permitted