Protection From Digital Blackmailing
Where Is Digital Blackmailing Common?
- Porn websites
- Disclosure websites
- Other websites
Getting rid of blackmailing
is possible with artificial intelligence.
Digital blackmailing protection service is the monitoring of all the posts about you on search engines and social media sites, and the rapid removal of your posted images with innovative technologies
Digital blackmailing: Threatening and compulsion with the sharing of sensitive information
Online blackmailing includes the compulsion made by threatening the victim about sharing sensitive information that will harm her/his reputation in the world. (Trend Micro “Digital Blackmailing: A Forward Looking Perspective, 2018)
Online blackmailing and fraud gangs took money from many people in many countries especially in Turkey with the allegation that they have an “image of masturbation in their hands”. (BBC News “The Skype sex scam”, 2016)
Digital blackmailing protection service enables you to prevent cyberbullying and disrespect towards your reputation.
Blackmailing protection technology. The innovative way of digital peace.
Did you have to send money to the blackmailer or do what they wanted? You started the legal process but it didn’t work? The Altahonos technology prevents the content that the blackmailer to reach your relatives.
How does Altahonos stop digital blackmailing?
Conversations that start on social media channels such as WhatsApp, Facebook, and Instagram are turned into sexual conversations. Vicious cyberbullies blackmail people by stating that they will send content like private pictures, videos, messages, etc., to the person’s social circle/workplace. Legal actions towards blackmailers often remain incapable against overseas or domestic blackmailers.
Altahonos determines behavioral measures that need to be implemented against digital blackmailing specific to each event. Then, it provides the service buyer with the necessary behavioral training. Artificial intelligence technology monitors thousands of websites, especially search engines, social media websites and video platforms with determined keywords and data (e.g. country/IP no) every day. Detected inappropriate/private contents are quickly removed. Detailed reports about the protection service are sent periodically.
How does the process work?
What’s the benefit?
You take an important step against cyberbullying thanks to the digital blackmailing protection service. Thus, you get the digital peace that you deserve. As if it never happened!
See some examples and results of blackmailing cases that we stopped in the last year.
Secure your digital privacy with Altahonos artificial intelligence technology.
*Bilgileriniz gizlilik politikamız gereği korunmaktadır.
This “Confidentiality and Non-Disclosure Agreement” (hereinafter referred to as the “CONTRACT”) is signed between the customer (hereinafter referred to as “BUSINESS OWNER”) and ” 284 Chase Road A Block 2nd Floor, London, England, N14 6HF United Kingdom, “a resident at the address Altahonos Ltd. (hereinafter referred to as “COMPANY”).
The business owner and the Company can hereinafter be referred to as “Parties” separately and together as “Parties”.
The parties will be able to share certain confidential information with each other in the statements they will make to each other during all the negotiations to be made by the parties to be used in case of need.
This contract has been arranged in order to determine the method of exchange of confidential information that the parties will open to each other during their negotiations and to determine the rights and obligations for the protection of confidential information opened by one party to the other.
This contract; does not oblige the parties to open / provide any documents and / or information to each other, except for the requirements of the work subject to fee in the service contract to which this contract is attached.
2.Definition and Scope of Confidential Information:
“Confidential information” that can be exchanged between the parties for the purpose specified in Article 1 of this contract means all of the information of the party that owns them in the nature of commercial and personal secrets and / or under their ownership; without any limitation to these; personal data, technical information, trade secrets, the content of links to be removed, if any, software programs, algorithms, software modules, program source codes, technical features, service plans and technologies, user booklets, marketing information, customer lists, contract terms, records and all information and materials related to the business of the party, all kinds of products, goods and services related to the company itself, its shareholders, affiliates, other persons, customers and consultants to whom it has licensed, the method used to obtain them, trade secret, all kinds of formulas, know-how, It covers all kinds of information such as patents, inventions, designs, customer lists, budget, business development, marketing and pricing plans and strategies, and so on. Confidential information does not include the name and logo of the business owner.
Information with a degree of confidentiality that can be obtained through the use of verbal, visual, examples or models (unwritten) and confidential information and / or the examination, testing and similar methods of projects, documents or components that can be given to the other party by the party that opened the information, is hereinafter ” will be referred to as “confidential information” and will be processed under this contract.
In the event that a verbally opened information other than the confidential information specified, the information given to the other party verbally is confidential, if the party that opened the information clearly states that this information is confidential and informs the other party in writing within 10 (ten) days after opening the information. will be treated as information. All other information will be protected and used like confidential information.
The party receiving the confidential information agrees to comply with the following clauses for the protection and use of confidential information indefinitely from the termination or expiration date during the term of this contract and the service contract to which this contract is annexed, or if the contract is terminated in accordance with the article 7 below, or expires, declares and undertakes:
a)Using confidential information only for the purpose given by the other party,
b)Providing confidential information to its own personnel according to the “need to know” principle, provided that they are relevant to the subject, by ensuring that they comply with the terms of this contract,
c)To show the care of the party who opened the confidential information to protect the confidential information that belongs to him at least and is equally important,
d)Confidential information; not to disclose the confidential information to third parties, including its shareholders, affiliates and subsidiaries, without the written consent of the party that opened it
e)Not to copy or duplicate the confidential information, in whole or in part, except where necessary for the fulfillment of the purposes of this contract and the service contract to which it is attached,
f)In accordance with the purpose of this contract, to ensure that the organization, subcontractor or other third parties to whom confidential information is transferred are bound by the same restrictions regarding the storage and disclosure of confidential information.
4.Information Not Covered By Confidential Information:
The party receiving the confidential information will not have any responsibility or liability under article 4 for any confidential information with the following characteristics:
a)If the confidential information is known by the party receiving the confidential information at the time of receipt and this situation can be proven by evidence (s),
b)If it was developed independently by the personnel of the party receiving the confidential information who were not aware of this confidential information and this situation can be proven by evidence (s),
c)If it was known to the public at that time or if it was later notified to the public without any fault of the party receiving the confidential information,
d)If they are legally obtained from a third party without similar restrictions and without violating this contract, following all necessary investigations and investigations regarding that the third party is not under the obligation to disclose confidential information and this situation can be proven by evidence (s),
e)If disclosure to the government of the receiving party within the framework of the laws is necessary, by informing the party who opened the confidential information in advance,
f)If their publication or use is approved by the written consent of the party that opened the information,
g)If the company has used the work of the business owner as a reference in case presentations and its name and logo in its website and documents without using confidential information.
5.State of Irresponsibility:
Direct, indirect, special, incidental or consequential use damage, loss of profit or any other damage to the device, tools, equipment, personnel and / or third parties of the user party due to any error or deficiency in confidential information disclosed by one party to the other party under this contract. The party who opened the information will not be held responsible for any losses.
6.Breach of Contract:
6.1 The parties shall be liable for the damages and damages ruled by the court that may occur within the scope of this Agreement and in particular in case of breach of any of its obligations regarding the protection of confidential information obtained under this contract. Also;
a)If it becomes apparent that confidential information has been disclosed or used, the party will endeavor to prevent further disclosure or use.
- b) The receiving party will immediately notify the party providing the confidential information of the then current conditions and implement all corrective measures requested by the party providing the confidential information.
6.2 The failure of any of the parties to exercise or postpone a right or authority arising from any breach of this contract does not mean that it relinquishes any of its rights in this contract or prevents it from being used later or from exercising its other rights and powers in subsequent violations.
7.Duration of Contract:
If this contract is not extended with the written agreement of the parties, it will remain in effect for 10 (ten) years from the date of signature and will be invalid at the end of its term without the need for another notice.
However, if each party makes a written request to the other party 30 (thirty) calendar days in advance and the other party approves this in writing, they may terminate this contract before the expiration date. In case the contract is terminated for any reason, the confidentiality obligations of the parties will continue indefinitely.
If this contract is terminated or terminated as stated herein, copies of all information and documents belonging to the party that opened the information and held by the other party will be destroyed upon the request of the party that opened the information.
8.Settlement of Disputes:
This Agreement and all disputes that may arise from the execution of the review is to apply the laws of the United Kingdom shall be entitled to look exclusively to the dispute London Courts and Enforcement Directorate.
The parties agree not to demand from the other party the expenses that may be required for the work to be carried out within the scope of this contract.
10.The Entire Agreement and Modification:
The above articles constitute the entire agreement between the parties and replace any agreements, commitments, and agreements made orally or in writing before regarding the subject of this agreement.
Amendments to this contract can only be made with the written agreement of the parties.
11.Separability of Substances:
If one or more of the provisions of this contract are declared invalid, illegal and unenforceable under any law or regulation, the validity, legality and enforceability of the remaining provisions will not be affected or damaged in any way.
None of this contract and / or its related rights and obligations can be transferred or assigned to another third party without the prior written consent of the other party.
This contract; It does not create any rights or obligations to the parties other than the provisions explained here. Also; It cannot be interpreted as the purpose of establishing a partnership or other official business for the parties and that another contract will be made in the future.
All kinds of notifications, requests, requests and other notices required or permitted to be given in accordance with this contract are prepared in Turkish in writing. It is delivered to the other party by registered mail, electronic mail or a notary. Notifications are made to the e-mail addresses of the parties specified on the first page of the service contract. Changes in these addresses are notified to the other party in writing. The addresses in question are the addresses determined between the parties for notification and the notifications to be made to these addresses are deemed to have reached the addresse.
This contract has been signed by the parties as 14 (fourteen) articles and entered into force after confirming the above points.