Effective Date: 1 January 2014

General Information
At Cyber City Systems, Incorporated ("CyberCity"), we recognize that security is an important issue, so we design and operate our services and systems with enhanced security features including multi-tier strong authentication and hardened servers. CyberCity is committed to protecting the security of this Web Site ("Site"), its data, and accompanying services and systems and have instituted polices and procedures to accomplish this goal.

CyberCity monitors this Site for security purposes to insure it and its accompanying services remain available and to protect information in the system. CyberCity utilizes software programs and additional equipment to monitor network traffic to identify unauthorized attempts to access, obtain, alter, damage or destroy information, or otherwise to interfere with the system or its operation.

Unauthorized attempts to defeat or circumvent security features or otherwise interfere with the services, systems, Site or its operation is prohibited, including, but not limited to (a) using the services, system or Site for other than intended purposes; (b) logging into or attempting to log into a server or account that you are not authorized to access; (c) accessing data or taking any action to obtain data, information or services not intended for you or your use; (d) attempting to probe, scan or test the vulnerability of any system or network; (e) tampering, hacking, modifying or otherwise corrupting or breaching security or authentication measures; or (f) transmitting material that contains viruses, Trojan horses, worms, time bombs, cancelbots, corrupted files or other computer programming routines or engines or engage in conduct that could damage, disrupt or otherwise impair or interfere with a computer's functionality or the operation of the Site. Furthermore, you are prohibited from (a) attempting to interfere with service to any user, system, host or network, including, without limitation, via means of submitting a virus to the Site, overloading, "flooding," "spamming," "mailbombing" or "crashing;" (b) sending unsolicited e-mail including promotions and/or advertising of products or services; or (c) forging any TCP/IP packet header information in any e-mail. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under applicable criminal laws. Violations of system or network security may also result in civil liability. You agree, further, not to use or attempt to use any engine, software, tool, agent or other device or mechanism (including without limitation browsers, spiders, robots, avatars or intelligent agents) to navigate or search this Site other than the search engine and search agents available from CyberCity on this Site and use other than generally available third party web browsers.
Anyone continuing to use this Site expressly consents to these terms and conditions of use. If you do not agree to the conditions stated in this notice, please exit immediately.


Security of your Personal Information
Cyber City is committed to protecting the security of your personal information. We use a variety of security technologies and procedures to help protect your personal information from unauthorized access, use, or disclosure. For example, we store the personal information you provide on computer servers with limited access that are located in controlled facilities. Additionally, when we transmit sensitive personal information over the Internet, we protect it through the use of encryption, such as the Secure Socket Layer (SSL) protocol.


Use of Services and Systems
All users of CyberCity services and systems are pre-qualified and all information provided by prospective users is verified prior to access being granted. Registration for the use of the demonstration system is mandatory for security purposes and its use is only permitted to qualified and verified parties.


Employee Background Checks
Applicants are thoroughly investigated prior to employment with CyberCity. The background investigation encompasses contacting former and current employers, checking references, and reviewing school, credit, arrest, and related records. The complete background investigation is assessed before a final decision on employment is rendered.


Monitoring
You agree that CyberCity may monitor and review information you transmit over the Site. You agree that CyberCity may censor, edit, remove or prohibit the transmission or receipt of any information that CyberCity deems inappropriate or in violation of its Terms of Use, and use any such information as it deems necessary to protect the Site and/or to protect the rights or property of CyberCity. You agree that CyberCity may also monitor and review stored information without restriction. You hereby acknowledge and consent to such monitoring.


Usage Tracking
For security purposes, all usage of the services and systems, including the demonstration system, is tracked and detailed records of their usage are maintained. These records of usage will not be shared with third parties, unless required by law, governmental regulations, or to protect the rights of Cyber City or others.