{"id":1316,"date":"2022-02-18T17:02:33","date_gmt":"2022-02-18T16:02:33","guid":{"rendered":"https:\/\/cyber-detect.com\/?page_id=1316"},"modified":"2025-03-25T12:00:50","modified_gmt":"2025-03-25T11:00:50","slug":"terms-of-use","status":"publish","type":"page","link":"https:\/\/cyber-detect.com\/en\/terms-of-use\/","title":{"rendered":"TERMS OF USE"},"content":{"rendered":"<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><strong>CYBER-DETECT<\/strong><\/p>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>The head office is 159, Boulevard d\u2019Haussonville \u2013 54000 NANCY<\/p>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>The director of publication is R\u00e9gis LHOSTE \u2013 CEO<\/p>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><\/p>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><strong>General conditions of use<\/strong><\/p>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>The use of this service is reserved for strictly personal use.<\/p>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>Any reproduction or representation, in whole or in part, for other purposes on any medium is prohibited without the express prior authorization of CYBER-DETECT and would constitute an infringement within the meaning of Articles L 335-2 and following of the Code of Intellectual Property.<\/p>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>The non-observance of this prohibition constitutes a counterfeit being able to engage the civil and penal liability of the counterfeiter.<\/p>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>The information contained in this service is non-contractual and subject to change without notice.<\/p>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>The hypertext links implemented within the site www.cyber-detect.com towards other sites and in a general way towards all existing resources on the Internet cannot engage the responsibility of the agency Billiotte &amp; Co.<\/p>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>Reproduction on paper<\/p>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>With the exception of the iconography, the reproduction of the pages of this site on a paper medium is authorized, subject to compliance with the following three conditions:<\/p>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>&gt; free distribution,<\/p>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>&gt; respect for the integrity of the documents reproduced (no modifications or alterations of any kind),<\/p>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>&gt; explicit citation of the site www.cyber-detect.com as the source and mention that reproduction rights are reserved and strictly limited.<\/p>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><\/p>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><strong>Reproduction on electronic media<\/strong><\/p>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>The reproduction of all or part of this site on an electronic medium is authorized subject to the addition of a clear and legible source www.cyber-detect.com and the mention \u201cRights reserved\u201d.&#13;\nThe information used must only be for personal, associative or professional purposes; any use for commercial or advertising purposes is excluded.<\/p>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>The information used must only be for personal, associative or professional purposes; any use for commercial or advertising purposes is excluded.<\/p>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><\/p>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><strong>Creation of links to the site www.cyber-detect.com<\/strong><\/p>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>CYBER-DETECT authorizes the installation of a hypertext link pointing towards its contents, subject to :<\/p>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>Not to use the technique of the deep link (\u201cdeep linking\u201d),&#13;\ni.e. the pages of the site (www.cyber-detect.com) must not be nested inside the pages of another site, but accessible by opening a window.<\/p>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>Mention the source, which will point directly to the content in question by means of a hypertext link.<\/p>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>The information used must only be for personal, associative or professional purposes; any use for commercial or advertising purposes is excluded.<\/p>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>Please note! This authorization does not apply to websites broadcasting information of a controversial, pornographic or xenophobic nature or which may, to a greater extent, offend the sensibilities of the majority of people.<\/p>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>For any other use, please contact us.<\/p>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><\/p>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><strong>Confidentiality and protection of personal data<\/strong><\/p>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>In accordance with the French Data Protection Act N\u00b0 78-17 of January 6, 1978, you may at any time modify or delete the information related to your registration. This information concerning you being confidential, CYBER-DETECT is committed to protect them.<\/p>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>You have a right of access, of modification, correction and suppression of the data which concern you (art. 34 of the law \u201cInformatique et Libert\u00e9s\u201d). You can exercise this right directly on the site or by contacting us:<\/p>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><\/p>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><strong>CYBER-DETECT<\/strong><\/p>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><strong>159, Boulevard d&#8217;Haussonville &#8211; 54000 NANCY<\/strong><\/p>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>Contact by e-mail: <strong>marketing@cyber-detect.com<\/strong><\/p>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>Design, development by Billiotte &amp; Co \u2013 <a href=\"http:\/\/www.billiotte.fr\/\">www.billiotte.fr<\/a><\/p>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>Shots : private collection.<\/p>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>CYBER-DETECT The head office is 159, Boulevard d\u2019Haussonville \u2013 54000 NANCY The director of publication is R\u00e9gis LHOSTE \u2013 CEO General conditions of use The use of this service is reserved for strictly personal use. Any reproduction or representation, in whole or in part, for other purposes on any medium is prohibited without the express [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-1316","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TERMS OF USE - Cyber-Detect<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyber-detect.com\/en\/terms-of-use\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"TERMS OF USE - Cyber-Detect\" \/>\n<meta property=\"og:description\" content=\"CYBER-DETECT The head office is 159, Boulevard d\u2019Haussonville \u2013 54000 NANCY The director of publication is R\u00e9gis LHOSTE \u2013 CEO General conditions of use The use of this service is reserved for strictly personal use. Any reproduction or representation, in whole or in part, for other purposes on any medium is prohibited without the express [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyber-detect.com\/en\/terms-of-use\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber-Detect\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-25T11:00:50+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cyber-detect.com\/en\/terms-of-use\/\",\"url\":\"https:\/\/cyber-detect.com\/en\/terms-of-use\/\",\"name\":\"TERMS OF USE - Cyber-Detect\",\"isPartOf\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/#website\"},\"datePublished\":\"2022-02-18T16:02:33+00:00\",\"dateModified\":\"2025-03-25T11:00:50+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/terms-of-use\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cyber-detect.com\/en\/terms-of-use\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cyber-detect.com\/en\/terms-of-use\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cyber-detect.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"TERMS OF USE\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cyber-detect.com\/en\/#website\",\"url\":\"https:\/\/cyber-detect.com\/en\/\",\"name\":\"Cyber-Detect\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cyber-detect.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cyber-detect.com\/en\/#organization\",\"name\":\"Cyber-Detect\",\"url\":\"https:\/\/cyber-detect.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyber-detect.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/08\/AI-CYBER-DETECT-MORPHOLOGICAL-ANALYSIS-PAYSAGE-RGB-white-vecto.svg\",\"contentUrl\":\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/08\/AI-CYBER-DETECT-MORPHOLOGICAL-ANALYSIS-PAYSAGE-RGB-white-vecto.svg\",\"width\":728,\"height\":242,\"caption\":\"Cyber-Detect\"},\"image\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TERMS OF USE - Cyber-Detect","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyber-detect.com\/en\/terms-of-use\/","og_locale":"en_US","og_type":"article","og_title":"TERMS OF USE - Cyber-Detect","og_description":"CYBER-DETECT The head office is 159, Boulevard d\u2019Haussonville \u2013 54000 NANCY The director of publication is R\u00e9gis LHOSTE \u2013 CEO General conditions of use The use of this service is reserved for strictly personal use. Any reproduction or representation, in whole or in part, for other purposes on any medium is prohibited without the express [&hellip;]","og_url":"https:\/\/cyber-detect.com\/en\/terms-of-use\/","og_site_name":"Cyber-Detect","article_modified_time":"2025-03-25T11:00:50+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cyber-detect.com\/en\/terms-of-use\/","url":"https:\/\/cyber-detect.com\/en\/terms-of-use\/","name":"TERMS OF USE - Cyber-Detect","isPartOf":{"@id":"https:\/\/cyber-detect.com\/en\/#website"},"datePublished":"2022-02-18T16:02:33+00:00","dateModified":"2025-03-25T11:00:50+00:00","breadcrumb":{"@id":"https:\/\/cyber-detect.com\/en\/terms-of-use\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyber-detect.com\/en\/terms-of-use\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cyber-detect.com\/en\/terms-of-use\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cyber-detect.com\/en\/"},{"@type":"ListItem","position":2,"name":"TERMS OF USE"}]},{"@type":"WebSite","@id":"https:\/\/cyber-detect.com\/en\/#website","url":"https:\/\/cyber-detect.com\/en\/","name":"Cyber-Detect","description":"","publisher":{"@id":"https:\/\/cyber-detect.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyber-detect.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cyber-detect.com\/en\/#organization","name":"Cyber-Detect","url":"https:\/\/cyber-detect.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyber-detect.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/08\/AI-CYBER-DETECT-MORPHOLOGICAL-ANALYSIS-PAYSAGE-RGB-white-vecto.svg","contentUrl":"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/08\/AI-CYBER-DETECT-MORPHOLOGICAL-ANALYSIS-PAYSAGE-RGB-white-vecto.svg","width":728,"height":242,"caption":"Cyber-Detect"},"image":{"@id":"https:\/\/cyber-detect.com\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/pages\/1316","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/comments?post=1316"}],"version-history":[{"count":3,"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/pages\/1316\/revisions"}],"predecessor-version":[{"id":2114,"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/pages\/1316\/revisions\/2114"}],"wp:attachment":[{"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/media?parent=1316"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}