Privacy Policy | Klys.ai

Privacy Policy

How We Bill

Billing cycle

You are billed monthly/ Annually for each app based on:

  1. the Klys products in your subscription,
  2. the plan you select (i.e., Pro or Enterprise etc), and
  3. the number of credits you are using.
  4. the number of API calls you make to these models

These are the “Pricing Metrics” that are used to calculate your bill. We bill you each month in advance based on what your Pricing Metrics were on the last day of the prior month.

Overages and credits

We know that your usage, however, may change. If you increase or decrease the number of API calls or Models, which Klys products or plans you use, we may charge you overages or issue you credits. These charges or credits will be based on how and when your Pricing Metrics changed over the course of the last month.

Estimating your upcoming invoice

You can see your current monthly/annual fee for each app when you first sign up and any time after that in your Billing Settings (available through your dashboard). To estimate any overage charges or credits based on changes in your Pricing Metrics.

Klys Trustworthy AI Policy

Ethical Use

Klys is committed to safety, trust, and transparency in AI development and deployment. We encourage all customers and partners to:

  • Ensure AI-powered products and services comply with applicable legal and ethical requirements.
  • Take reasonable steps to identify and mitigate unintended bias and potential harm, especially to underrepresented or vulnerable groups.
  • Clearly inform users about the nature, intended use, and limitations of AI systems.

 

Prohibited Uses

Klys strictly prohibits the use of its products or services for unlawful or harmful purposes, including but not limited to:

  • Illegal surveillance or monitoring.
  • Unlawful biometric data collection or processing without valid consent where required.
  • Harassment, abuse, threats, or bullying of individuals or groups.
  • Intentional deception or misleading practices, including unauthorized impersonation or deepfakes.

Privacy Policy

Thank you for choosing to be part of our community at Klys Inc., doing business as Klys (“Klys”, “we”, “us”, “our”). We are committed to protecting your personal information and your right to privacy. If you have any questions or concerns about this privacy notice, or our practices with regards to your personal information, please contact us at sales@klystronglobal.com.

When you visit our website https://klys.ai (the “Website”) or Subdomains and more generally, use any of our services (the “Services”, which include the Website and our Subdomains), we appreciate that you are trusting us with your personal information. We take your privacy very seriously. In this privacy notice, we seek to explain to you in the clearest way possible what information we collect, how we use it and what rights you have in relation to it. We hope you take some time to read through it carefully, as it is important. If there are any terms in this privacy notice that you do not agree with, please discontinue use of our Services immediately.

This privacy notice applies to all information collected through our Services (which, as described above, includes our Website), as well as, any related services, sales, marketing or events.

Please read this privacy notice carefully as it will help you understand what we do with the information that we collect.

  1. WHAT INFORMATION DO WE COLLECT?

Personal information you disclose to us

In Short: We collect personal information that you provide to us.

We collect personal information that you voluntarily provide to us when you register on the Website, express an interest in obtaining information about us or our products and Services, when you participate in activities on the Website or otherwise when you contact us.

The personal information that we collect depends on the context of your interactions with us and the Website, the choices you make and the products and features you use. The personal information we collect may include the following:

Personal Information Provided by You. We collect names; phone numbers; email addresses; mailing addresses; job titles; usernames; passwords; contact preferences; contact or authentication data; billing addresses; and other similar information.

All personal information that you provide to us must be true, complete and accurate, and you must notify us of any changes to such personal information.

Information automatically collected

In Short: Some information – such as your Internet Protocol (IP) address and/or browser and device characteristics – is collected automatically when you visit our Website.

We automatically collect certain information when you visit, use or navigate the Website. This information does not reveal your specific identity (like your name or contact information) but may include device and usage information, such as your IP address, browser and device characteristics, operating system, language preferences, referring URLs, device name, country, location, information about how and when you use our Website and other technical information. This information is primarily needed to maintain the security and operation of our Website, and for our internal analytics and reporting purposes.

Like many businesses, we also collect information through cookies and similar technologies.

The information we collect includes:

  • Log and Usage Data. Log and usage data is service-related, diagnostic, usage and performance information our servers automatically collect when you access or use our Website and which we record in log files. Depending on how you interact with us, this log data may include your IP address, device information, browser type and settings and information about your activity in the Website (such as the date/time stamps associated with your usage, pages and files viewed, searches and other actions you take such as which features you use), device event information (such as system activity, error reports (sometimes called ‘crash dumps’) and hardware settings).
  • Device Data. We collect device data such as information about your computer, phone, tablet or other device you use to access the Website. Depending on the device used, this device data may include information such as your IP address (or proxy server), device and application identification numbers, location, browser type, hardware model Internet service provider and/or mobile carrier, operating system and system configuration information.
  • Location Data. We collect location data such as information about your device’s location, which can be either precise or imprecise. How much information we collect depends on the type and settings of the device you use to access the Website. For example, we may use GPS and other technologies to collect geolocation data that tells us your current location (based on your IP address). You can opt out of allowing us to collect this information either by refusing access to the information or by disabling your Location setting on your device. Note however, if you choose to opt out, you may not be able to use certain aspects of the Services.

Information collected from other sources

In Short: We may collect limited data from public databases, marketing partners, social media platforms, and other outside sources.

In order to enhance our ability to provide relevant marketing, offers and services to you and update our records, we may obtain information about you from other sources, such as public databases, joint marketing partners, affiliate programs, data providers, social media platforms, as well as from other third parties. This information includes mailing addresses, job titles, email addresses, phone numbers, intent data (or user behavior data), Internet Protocol (IP) addresses, social media profiles, social media URLs and custom profiles, for purposes of targeted advertising and event promotion. If you interact with us on a social media platform using your social media account (e.g. Facebook or Twitter), we receive personal information about you such as your name, email address, and gender. Any personal information that we collect from your social media account depends on your social media account’s privacy settings.

  1. HOW DO WE USE YOUR INFORMATION?

In Short: We process your information for purposes based on legitimate business interests, the fulfillment of our contract with you, compliance with our legal obligations, and/or your consent.

We use personal information collected via our Website for a variety of business purposes described below. We process your personal information for these purposes in reliance on our legitimate business interests, in order to enter into or perform a contract with you, with your consent, and/or for compliance with our legal obligations. We indicate the specific processing grounds we rely on next to each purpose listed below.

We use the information we collect or receive:

  • To facilitate account creation and logon process. If you choose to link your account with us to a third-party account (such as your Google or Facebook account), we use the information you allowed us to collect from those third parties to facilitate account creation and logon process for the performance of the contract.
  • To post testimonials. We post testimonials on our Website that may contain personal information. Prior to posting a testimonial, we will obtain your consent to use your name and the content of the testimonial. If you wish to update, or delete your testimonial, please contact us at sales@Klys.com and be sure to include your name, testimonial location, and contact information.
  • Request feedback. We may use your information to request feedback and to contact you about your use of our Website.
  • To enable user-to-user communications. We may use your information in order to enable user-to-user communications with each user’s consent.
  • To manage user accounts. We may use your information for the purposes of managing our account and keeping it in working order.
  • To send administrative information to you. We may use your personal information to send you product, service and new feature information and/or information about changes to our terms, conditions, and policies.
  • To protect our Services. We may use your information as part of our efforts to keep our Website safe and secure (for example, for fraud monitoring and prevention).
  • To enforce our terms, conditions and policies for business purposes, to comply with legal and regulatory requirements or in connection with our contract.
  • To respond to legal requests and prevent harm. If we receive a subpoena or other legal request, we may need to inspect the data we hold to determine how to respond.
  • Fulfill and manage your orders. We may use your information to fulfill and manage your orders, payments, returns, and exchanges made through the Website.
  • Administer prize draws and competitions. We may use your information to administer prize draws and competitions when you elect to participate in our competitions.
  • To deliver and facilitate delivery of services to the user. We may use your information to provide you with the requested service.
  • To respond to user inquiries/offer support to users. We may use your information to respond to your inquiries and solve any potential issues you might have with the use of our Services.
  • To send you marketing and promotional communications. We and/or our third-party marketing partners may use the personal information you send to us for our marketing purposes, if this is in accordance with your marketing preferences. For example, when expressing an interest in obtaining information about us or our Website, subscribing to marketing or otherwise contacting us, we will collect personal information from you. You can opt-out of our marketing emails at any time.
  • Deliver targeted advertising to you. We may use your information to develop and display personalized content and advertising (and work with third parties who do so) tailored to your interests and/or location and to measure its effectiveness.
  1. WILL YOUR INFORMATION BE SHARED WITH ANYONE?

In Short: We only share information with your consent, to comply with laws, to provide you with services, to protect your rights, or to fulfill business obligations.

We may process or share your data that we hold based on the following legal basis:

  • Consent: We may process your data if you have given us specific consent to use your personal information for a specific purpose.
  • Legitimate Interests: We may process your data when it is reasonably necessary to achieve our legitimate business interests.
  • Performance of a Contract: Where we have entered into a contract with you, we may process your personal information to fulfill the terms of our contract.
  • Legal Obligations: We may disclose your information where we are legally required to do so in order to comply with applicable law, governmental requests, a judicial proceeding, court order, or legal process, such as in response to a court order or a subpoena (including in response to public authorities to meet national security or law enforcement requirements).
  • Vital Interests: We may disclose your information where we believe it is necessary to investigate, prevent, or take action regarding potential violations of our policies, suspected fraud, situations involving potential threats to the safety of any person and illegal activities, or as evidence in litigation in which we are involved.

More specifically, we may need to process your data or share your personal information in the following situations:

  • Business Transfers. We may share or transfer your information in connection with, or during negotiations of, any merger, sale of company assets, financing, or acquisition of all or a portion of our business to another company.
  • Vendors, Consultants and Other Third-Party Service Providers. We may share your data with third-party vendors, service providers, contractors or agents who perform services for us or on our behalf and require access to such information to do that work. Examples include: payment processing, data analysis, email delivery, hosting services, customer service and marketing efforts. We may allow selected third parties to use tracking technology on the Website, which will enable them to collect data on our behalf about how you interact with our Website over time. This information may be used to, among other things, analyze and track data, determine the popularity of certain content, pages or features, and better understand online activity. Unless described in this notice, we do not share, sell, rent or trade any of your information with third parties for their promotional purposes. We have contracts in place with our data processors, which are designed to help safeguard your personal information. This means that they cannot do anything with your personal information unless we have instructed them to do it. They will also not share your personal information with any organization apart from us. They also commit to protect the data they hold on our behalf and to retain it for the period we instruct.
  • We may share your information with our affiliates, in which case we will require those affiliates to honor this privacy notice. Affiliates include our parent company and any subsidiaries, joint venture partners or other companies that we control or that are under common control with us.
  • Business Partners. We may share your information with our business partners to offer you certain products, services or promotions.
  1. WHO WILL YOUR INFORMATION BE SHARED WITH?

In Short: We only share information with the following third parties.

We only share and disclose your information with the following third parties. We have categorized each party so that you may be easily understand the purpose of our data collection and processing practices. If we have processed your data based on your consent and you wish to revoke your consent, please contact us using the contact details provided.

  • Advertising, Direct Marketing, and Lead Generation

Google AdSense and Bing Ads

  • Allow Users to Connect to Their Third-Party Accounts

Google account

  • Cloud Computing Services

Microsoft Azure, Amazon Web Services (AWS) and Google Cloud Platform

  • Communicate and Chat with Users

Intercom

  • Content Optimization

YouTube video embed

  • Data Backup and Security

Google Drive Backup and Dropbox Backup

  • Invoice and Billing

Stripe

  • User Account Registration and Authentication

Google OAuth 2.0 and Auth0

  • Web and Mobile Analytics

Google Analytics, HubSpot Analytics and Smartlook

  1. DO WE USE COOKIES AND OTHER TRACKING TECHNOLOGIES?

In Short: We may use cookies and other tracking technologies to collect and store your information.

We may use cookies and similar tracking technologies (like web beacons and pixels) to access or store information. Specific information about how we use such technologies and how you can refuse certain cookies is set out in our Cookie Notice.

  1. HOW DO WE HANDLE YOUR SOCIAL LOGINS?

In Short: If you choose to register or log in to our services using a social media account, we may have access to certain information about you.

Our Website offers you the ability to register and login using your third-party social media account details (like your Facebook or Twitter logins). Where you choose to do this, we will receive certain profile information about you from your social media provider. The profile Information we receive may vary depending on the social media provider concerned, but will often include your name, email address, friends list, profile picture as well as other information you choose to make public on such social media platform.

We will use the information we receive only for the purposes that are described in this privacy notice or that are otherwise made clear to you on the relevant Website. Please note that we do not control, and are not responsible for, other uses of your personal information by your third-party social media provider. We recommend that you review their privacy notice to understand how they collect, use and share your personal information, and how you can set your privacy preferences on their sites and apps.

 

 

  1. HOW LONG DO WE KEEP YOUR INFORMATION?

In Short: We keep your information for as long as necessary to fulfill the purposes outlined in this privacy notice unless otherwise required by law.

We will only keep your personal information for as long as it is necessary for the purposes set out in this privacy notice, unless a longer retention period is required or permitted by law (such as tax, accounting or other legal requirements). No purpose in this notice will require us keeping your personal information for longer than the period of time in which users have an account with us.

When we have no ongoing legitimate business need to process your personal information, we will either delete or anonymize such information, or, if this is not possible (for example, because your personal information has been stored in backup archives), then we will securely store your personal information and isolate it from any further processing until deletion is possible.

 

  1. HOW DO WE KEEP YOUR INFORMATION SAFE?

In Short: We aim to protect your personal information through a system of organizational and technical security measures.

We have implemented appropriate technical and organizational security measures designed to protect the security of any personal information we process. However, despite our safeguards and efforts to secure your information, no electronic transmission over the Internet or information storage technology can be guaranteed to be 100% secure, so we cannot promise or guarantee that hackers, cybercriminals, or other unauthorized third parties will not be able to defeat our security, and improperly collect, access, steal, or modify your information. Although we will do our best to protect your personal information, transmission of personal information to and from our Website is at your own risk. You should only access the Website within a secure environment.

  1. DO WE COLLECT INFORMATION FROM MINORS?

In Short: We do not knowingly collect data from or market to children under 18 years of age.

We do not knowingly solicit data from or market to children under 18 years of age. By using the Website, you represent that you are at least 18 or that you are the of such a minor and consent to such minor dependent’s use of the Website. If we learn that personal information from users less than 18 years of age has been deactivate the account and take reasonable measures to promptly delete such data from our records.

  1. WHAT ARE YOUR PRIVACY RIGHTS?

In Short: In some regions, such as the European Economic Area and the UK and Switzerland, you have rights that allow you greater access to and control over your personal information. You may review, change, or terminate your account at any time.

In some regions (like the European Economic Area, UK and Switzerland), you have certain rights under applicable data protection laws. These may include the right (i) to request access and obtain a copy of your personal information, (ii) to request rectification or erasure; (iii) to restrict the processing of your personal information; and (iv) if applicable, to data portability. In certain circumstances, you may also have the right to object to the processing of your personal information. We will consider and act upon any request in accordance with applicable data protection laws.

If we are relying on your consent to process your personal information, you have the right to withdraw your consent at any time. Please note however that this will not affect the lawfulness of the processing before its withdrawal, nor will it affect the processing of your personal information conducted in reliance on lawful processing grounds other than consent. If you are a resident in the European Economic Area and you believe we are unlawfully processing your personal information, you also have the right to complain to your local data protection supervisory authority.

Klys commits to arbitrate claims and follow the terms as set forth in Annex I of the DPF Principles , provided that an individual has invoked binding arbitration by delivering notice to our organization and following the procedures and subject to conditions set forth in Annex I of Principles .

If you have questions or comments about your privacy rights, you may email us at sales@klystronglobal.com.

Account Information

If you would at any time like to review or change the information in your account or terminate your account, you can:

  • Contact us using the contact information provided.

Upon your request to terminate your account, we will deactivate or delete your account and information from our active databases. However, we may retain some information in our files to prevent fraud, troubleshoot problems, assist with any investigations, enforce our Terms of Use and/or comply with applicable legal requirements.

Cookies and similar technologies:

Most Web browsers are set to accept cookies by default. If you prefer, you can usually choose to set your browser to remove cookies and to reject cookies. If you choose to remove cookies or reject cookies, this could affect certain features or services of our Website.

Opting out of email marketing:

You can unsubscribe from our marketing email list at any time by clicking on the unsubscribe link in the emails that we send or by contacting us using the details provided below. You will then be removed from the marketing email list – however, we may still communicate with you, for example to send you service-related emails that are necessary for the administration and use of your account, to respond to service requests, or for other non-marketing purposes. To otherwise opt-out, you may:

  • Contact us using the contact information provided.
  1. CONTROLS FOR DO-NOT-TRACK FEATURES

Most web browsers and some mobile operating systems and mobile applications include a Do-Not-Track (“DNT”) feature or setting you can activate to signal your privacy preference not to have data about your online browsing activities monitored and collected. At this stage no uniform technology standard for recognizing and implementing DNT signals has been finalized. As such, we do not currently respond to DNT browser signals or any other mechanism that automatically communicates your choice not to be tracked online. If a standard for online tracking is adopted that we must follow in the future, we will inform you about that practice in a revised version of this privacy notice.

Security

Overview

At Klys we take the protection of customer data extremely seriously. This Klys Security Policy describes the organizational and technical measures Klys implements platform wide designed to prevent unauthorized access, use, alteration or disclosure of customer data. The Klys services operate on Amazon Web Services (“AWS”); this policy describes activities of Klys within its instance on AWS unless otherwise specified. As you continue to learn more about Klys we recommend you also review our Terms of Service and Privacy Policy.

Security Team

Our infrastructure and security team includes people who’ve played lead roles in designing, building, and operating highly secure Internet facing systems at companies ranging from startups to large public companies.

Best Practices

Incident Response Plan

  • We have implemented a formal procedure for security events and have educated all our staff on our policies.
  • When security events are detected they are escalated to our emergency alias, teams are paged, notified and assembled to rapidly address the event.
  • After a security event is fixed we write up a post-mortem analysis.
  • The analysis is reviewed in person, distributed across the company and includes action items that will make the detection and prevention of a similar event easier in the future.
  • Klys will promptly notify you in writing upon verification of a security breach of the Klys services that affects your data. Notification will describe the breach and the status of Klys’s investigation.

Build Process Automation

  • We have functioning, frequently used automation in place so that we can safely and reliably rollout changes to both our application and operating platform within minutes.
  • We typically deploy code dozens of times a day, so we have high confidence that we can get a security fix out quickly when required.

Infrastructure

  • All of our services run in the cloud. Klys does not run our own routers, load balancers, DNS servers, or physical servers.
  • All of our services and data are hosted in AWS and GCP facilities and protected by AWS and GCP security. Klys services have been built with disaster recovery in mind.
  • All of our servers are within our own virtual private cloud (VPC) with network access control lists (ACL’s) that prevent unauthorized requests getting to our internal network.
  • Klys uses a backup solution for datastores that contain customer data.

Data

  • All customer data is stored in cloud.
  • Customer data is stored in multi-tenant datastores; we do not have individual datastores for each customer. However strict privacy controls exist in our application code that are designed to ensure data privacy and to prevent one customer from accessing another customer’s data (i.e., logical separation). We have many unit and integration tests in place to ensure these privacy controls work as expected. These tests are run every time our codebase is updated and even one single test failing will prevent new code being shipped to production.
  • Each Klys system used to process customer data is adequately configured and pathed using commercially-reasonable methods according to industry-recognized system-hardening standards.
  • Klys engages certain sub processors to process customer data. as may be updated by Klys from time to time.

Data Transfer

  • All data sent to or from Klys is encrypted in transit using 256-bit encryption.
  • Our API and application endpoints are TLS/SSL only and score an “A+” rating on SSL Labs’ tests. This means we only use strong cipher suites and have features such as HSTS and Perfect Forward Secrecy fully enabled.
  • We also encrypt data at rest using an industry-standard AES-256 encryption algorithm.

Authentication

  • Klys is served 100% over https.
  • There are no corporate resources or additional privileges from being on Klys’s network.
  • We have two-factor authentication (2FA) and strong password policies on Google, AWS to ensure access to cloud services are protected.

Permissions and Admin Controls

  • Klys enables permission levels to be set for any employees with access to Klys.
  • Permissions and access can be set to include app settings, billing, user data, or the ability to send/edit manual messages and auto messages.

Application Monitoring

  • On an application level, we produce audit logs for all activity, ship logs to our service providers for analysis, and use S3/Glacier for archival purposes.
  • All access to Klys applications is logged and audited.
  • Bastion hosts are used to login to devices.
  • All actions taken on production consoles or in the Klys application are logged.

Security Audits and Certifications

  • We bi-annually engage with well-regarded third-party auditors to audit our code-base, and work with them to resolve potential issues.
  • We use technologies to provide an audit trail over our infrastructure and the Klys application. Auditing allows us to do ad-hoc security analysis; track changes made to our setup and audit access to every layer of our stack.
  • Information about AWS security certifications and obtaining copies of security reports from AWS is available at http://aws.amazon.com/compliance/pci-data-privacy-protection-hipaa-soc-fedramp-faqs/

All payment instrument processing for purchase of the Klys services is performed by Stripe. For more information on Stripe’s security practices, please see https://stripe.com/docs/security/stripe.

Customer Responsibilities

  • Managing your own user accounts and roles from within the Klys services.
  • Protecting your own account and user credentials by using two-factor authentication for all of your employees accessing the Klys services.
  • Compliance with the terms of your services agreement with Klys, including with respect to compliance with laws.
  • Promptly notifying Klys if a user credential has been compromised or if you suspect possible suspicious activities that could negatively impact security of the Klys services or your account.
  • You may not perform any security penetration tests or security assessment activities without the express advance written consent of Klys.

Service Level Agreement

This Klys Service Level Agreement (“SLA”) accompanies the Klys Subscription Terms of Service, available at terms of service or a successor URL (the “Agreement”) entered into between you (“Customer”) and Klys. Capitalized terms used in this SLA that are not defined herein have the meanings given to them in the Agreement.

 

Target Availability.

Klys will use commercially reasonable efforts to make each Service available with an uptime of 99.5% of each calendar month (“Target Availability”).

 

Exclusions.

The calculation of uptime will not include unavailability to the extent due to: (a) use of the Service by Customer in a manner not authorized in this Agreement or the applicable Documentation; (b) general Internet problems, force majeure events or other factors outside of Klys’s reasonable control; (c) Customer’s equipment, software, network connections or other infrastructure; (d) third party systems, acts or omissions; or (e) Scheduled Maintenance or reasonable emergency maintenance.

 

Scheduled Maintenance.

“Scheduled Maintenance” means Klys’s scheduled routine maintenance of the Services for which Klys notifies Customer at least twenty-four (24) hours in advance. Scheduled Maintenance will not exceed eight (8) hours per month. Klys typically performs Scheduled Maintenance once per month.

 

Remedy for Failure to Meet Target Availability.

If there is a verified failure of a Service to meet Target Availability in two (2) consecutive months, then Customer may terminate the applicable Subscription Term by sending written notice of termination within thirty (30) days after the end of the second such month, in which case Klys will refund to Customer any fees Customer has pre-paid for use of such Service for the terminated portion of the applicable Subscription Term. This termination and refund right is Customer’s sole and exclusive remedy, and Klys’s sole and exclusive liability, for Klys’s failure to meet the Target Availability.

Support Policy at klys.ai

This klys.ai Support Policy (“Support Policy“) accompanies the Klys Subscription Terms of Service, available at Terms of Service or a successor URL (the “Agreement“) entered into between you (“Customer“) and klys.ai. Capitalized terms used in this Support Policy that are not defined herein have the meanings given to them in the Agreement.

Klys.ai offers support services for the Service (“Support “) in accordance with the following terms:

  1. Support Hours. Support is provided 24 hours per day, 7 days per week.
  2. Incident Submission and Customer Cooperation. Customer may report errors or abnormal behavior of the Service (“Incidents“) by contacting klys.ai via email at sales@klystronglobal.com Customer will provide information and cooperation to Klys.ai as reasonably required for Klys.ai to provide Support. This includes, without limitation, providing the following information to klys.ai

regarding the Incident:

  • Aspects of the Service that are unavailable or not functioning correctly
  • Incident’s impact on users
  • Start time of Incident
  • List of steps to reproduce Incident
  • Relevant log files or data
  • Wording of any error message
  1. Incident Response. Klys.ai Support personnel will assign a priority level (“Priority Level“) to each Incident and seek to provide responses in accordance with the below.

Priority 1

Operation of the Service is critically affected (not responding to requests or serving content) for a large number of users; no workaround available.

2 Hours

Priority 2

Service is responding and functional but performance is degraded, and/or Incident has potentially severe impact on operation of the Service for multiple users.

1 Day

Priority 3

Non-critical issue; no significant impact on performance of the Service but user experience may be affected.

3 Days

  1. Exclusions. Klys.ai will have no obligation to provide Support to the extent an Incident arises from: (a) use of the Service by Customer in a manner not authorized in the Agreement or the applicable Documentation; (b) general Internet problems, force majeure events or other factors outside of klys.ai reasonable control; (c) Customer’s equipment, software, network connections or other infrastructure; or (d) third party systems, acts or omissions.