This Service Agreement is effective as of March 1, 2021 for all users, customers, suppliers, employees, partners, shareholders, third parties or people who use the Keybe service.

If you have previously accepted another version of our Terms of Use or any type of contract with KEYBE SAS or KEYBE AI CORP, please note that this SERVICE AGREEMENT completely supersedes any previous version. Please note that by continuing to use our services after March 1, 2021, you are accepting this updated SERVICE AGREEMENT.




If you have any questions, you can contact us at or through the support chat at 

In this SERVICE AGREEMENT (referred to as “Terms” or “Agreement”), the terminologies “we”, “our” or “Keybe” will collectively refer to KEYBE AI CORP. a West New York corporation, located at 55 RIVERWALK PLACE N. 749, NJ, 07093. United States of America. The terminologies “you”, “your” or “Customer” refer to you. If you create an account to use the Services on behalf of an organization, then you are agreeing to these Terms for that organization and promising that you have the authority to bind that organization to this agreement (and, in that case, the terms “you”, “your” or “Customer” will refer to that organization). The exception to this is if that organization has a separate written agreement with us that covers use of the Services, in which case that agreement will govern that use. Keybe or the Customer may also be referred to in this agreement individually as “party” and together as “parties”. To be eligible to create an account to use the Services, you must review and agree to these Terms.

When we refer to “Services” in this Agreement, we mean all products and services that are used by you, ordered by you pursuant to an order form (as defined below), or provided to you on a basis of test, in a face-to-face activation with one of our commercial agents, or otherwise free of charge. The services may include products and services that provide both (a) the platform services, including access to any application programming interface (“Keybe API”) and (b) where applicable, the connectivity services, which link the Services with the networks of telecommunications providers through the Internet.

When we refer to an “Affiliate” in these Terms, we mean any entity that directly or indirectly controls or is controlled by, or is under common control with, the specified party. For the purposes of this definition, “control” means the direct or indirect ownership of fifty percent plus one (50% + 1) of the voting interests of the organization in question.

This agreement applies to all the services of KEYBE AI CORP and its affiliated companies, including, but not limited to “”, “”, “”, “”, ” »

General provisions applicable to any use of the website and services
  1. Acceptance of the agreement

    You agree to the terms and conditions described in this Terms of Use Agreement (“Agreement”) with respect to our site and services (the “Site” and the “Services” accordingly).

    This Agreement constitutes the sole and complete agreement between us and you, and supersedes all prior or contemporaneous agreements, representations, warranties and understandings with respect to the Site and the Services, content, products or services provided by the Site or through it and the object of this Agreement.

    We may update this Service Agreement from time to time. We will notify you in writing through the registered means of communication (Telephone or Email), of any important update at least thirty (30) days in advance of the effective date; however, we may not be able to notify in writing at least thirty (30) days in advance of important updates to the Conditions that result from changes in legislation, regulations or the requirements of telecommunications providers and/or servers.

    Following such notification, your continued use of the Services from the effective date of the updated version of these Terms constitutes your acceptance of these updated Terms. If you do not accept the updated version of these Terms, you must immediately stop using the Services.

  2. Creation of a Keybe account

    In order to use the Services at Keybe, you will need to create an account. As part of the account creation process, you will be asked to provide your email address, create a password, and verify that you are a person by providing a phone number to which we will send you a verification code for you to enter in a form at the following addresses:, or Until you create an account and accept this agreement, your access to the Services will be limited to what is available to the general public. When creating an account, you must provide true, accurate, current and complete information about yourself, as requested during the account creation process. You must keep that information true, accurate, current and complete after creating each account. As part of our ongoing and routine monitoring of account activity and to help us reduce the risk of fraudulent use of your account and the Services, you will initially be limited in your use of the services while we are activating and verifying your account, or when you have not used an account for a period of at least six (6) months. If you breach these Conditions, including, without limitation, your payment obligations in Section 23 (Fees and Payment Conditions), you are strictly prohibited from creating new accounts until you remedy such breach in full.

  3. Provision of the service
    1. 1.  Our responsibilities: Keybe makes the Services available to you in accordance with this agreement; our Usage Documentation  and any applicable order document between parties that specifies mutually agreed rates for certain Services and other business terms, including any applicable minimum spend-base commitments; (b) comply with our Service Level Agreement (“ANS/SLA”) and our Security Description for the Services, each of which may be updated from time to time; (c) provide the Services in accordance with the laws applicable to our provision of the Services to our customers in general, provided that you use the Services in accordance with these Terms, the applicable Documentation, and any applicable Order Form; (d) use commercially reasonable efforts to use industry standard measures designed to scan, detect, and remove code, files, scripts, agents, or programs intended to do harm, including, for example, viruses, worms, time bombs, and Trojans ; (e) where appropriate, use trained and qualified personnel to provide the Services; and (f) use commercially reasonable efforts to provide you with support applicable to the Services, as described in our Terms of Support.
    2. 2. Alpha or Beta Offerings: From time to time, Keybe may make Services that are identified as Alpha, Beta, not generally available, limited release, developer preview, or any similar service offered by us (collectively, “Beta Offers”) available to you. You may choose to use the Beta Offers at your sole discretion. Keybe may discontinue Beta Offers at any time, at our sole discretion, and decide not to make a Beta Offer generally available.
    3. 3. Suspension of the Services: We may suspend the Services immediately after notifying you for cause if: (a) you or an End User (as defined below) materially breaches (or we believe that you or an End User has materially breached) any provision of these Terms, including any obligation under our Acceptable Use Policy; (b) there is an unusual and material spike or increase in your use of the Services and we believe that such traffic or use is fraudulent or has a material and negative impact on the ability of the Services to function; (c) we determine that our provision of the Services is prohibited by applicable law or regulation; (d) there is a use of the Services by you or an End User that, in our judgment, jeopardizes the security, integrity or availability of the Services; or (e) your account information is false, inaccurate, or incomplete. However, we will use commercially reasonable efforts, under the circumstances, to notify you and give you an opportunity to remedy such violation or threat prior to any suspension; and when possible, limit the suspension based on the circumstances that caused it; and (f) remove the suspension as soon as reasonably possible after the circumstances that caused it have been resolved. If your account is blocked because you operate in a prohibited country or region under Section 8.3 (Export Controls), you will receive a notice that your account is not operational when you attempt to access it in that restricted country or region.

      If we suspend the Services under this Section or Section 23 (Fees and payment terms) we will not be held responsible for any damages, liabilities, losses (including any loss of data or profits), or any other consequence in which you may incur in connection with such suspension.
    4. 4. Changes to the Services: The features and functions of the Services, including the Keybe APIs and our  Service Level Agreement (“ANS/SLA”), may change over time; as long as we do not materially diminish the general functionality of the Services. It is your responsibility to ensure that each client application is compatible with current services. Although we try to avoid making changes to the Services that are not compatible with the past, if such changes are necessary, we will make reasonable efforts to inform you at least sixty (60) days prior to implementation. In the event that we make an unsupported change to a Keybe API and such change materially and negatively affects your use of the Services (“Adverse API Change”), (a) you will notify us of the Adverse API Change and (b) we may agree to work with you, in our sole discretion, to resolve or otherwise address the Adverse API Change, except where we, in our sole discretion, have determined that an Adverse Change of The API is required for security reasons, by vendors, or to comply with applicable law or regulation.
  4. Your responsibilities

    You (a) being solely responsible for all use of the Services and Documentation under your account, including the quality and integrity of any data and other information made available to us by or for you through the use of the Services under this Agreement (“Customer Data”) and each software application or service that you make available to End Users that interacts with the Services (b) not transfer, resell, lease, license or make the Services available to third parties (except to make them available to End Users in connection with the use of each Customer Application, as permitted in this Agreement) or offer them independently; (c) use the Services only in accordance with these Terms, our Acceptance Use Policy, the applicable Documentation, any applicable Order Form, and applicable laws or regulations; (d) be solely responsible for all acts, omissions and activities of any person who accesses or uses any Client Application in any other way (“End User”), including compliance by End Users with these Terms, applicable Documentation, our Acceptable Use Policy, and any applicable Order Form; (e) do everything possible to prevent unauthorized access or use of the Services and immediately notify us of any unauthorized access or use; (f) provide reasonable cooperation in relation to requests for information from law enforcement, regulatory bodies, or telecommunications providers; and (g) comply with the representations and warranties that you make in Section 16 (Representations, warranties and disclaimer); (h) make timely payments as described in section 23 (Fees and payment conditions.)

    We will not be held responsible for any loss or damage resulting from the unauthorized use of your account.

  5. Your affiliates

    Your Affiliates are not authorized to use the Services under this Agreement that you accept. Each of your Affiliates (Parent Company, Affiliate, Subsidiary) who wants to use the Services must create an account and accept these Terms individually.

  6. Copyright

    viewed through the Site or Service. The posting of information or materials on the Site and the Service does not constitute a waiver of any rights over such information and materials. Some of the content on the site is copyrighted works of third parties.

  7. Service trademarks

    “”, “”, “Nipu” and others linked to our site are service trademarks or registered service trademarks. Other product and company names mentioned on the Site or during the work of the Service may be trademarks of their respective owners.

  8. Limited License; allowed uses

    You are granted a non-exclusive, non-transferable, and revocable license to access and use the Site and the Services strictly in accordance with this Agreement;

    You may not use any printed or electronic version of any part of the Site and Service or their contents in any litigation or arbitration matter under any circumstances.

  9. Restrictions and prohibitions of use

    Your license to access and use the Site and the Services, as well as any information, material or document (collectively defined as “Content and Materials”), is subject to the following restrictions and use prohibitions: You may not:

    1. 1. Copy, print (except for the limited and express purpose permitted by Section 4 above), republish, display, distribute, transmit, sell, rent, lease, loan or make available in any form or by any means all or any part of the Site or the Services or any Content and Materials recovered therefrom.
    2. 2. Use the Site or the Services or any material obtained from the Site or the Services to develop, or as a component of, any information, storage and retrieval system, database, information base or similar resource (in any medium currently existing or developed in the future), which is offered for commercial distribution of any kind, including through sale, license, lease, rental, subscription or any other commercial distribution mechanism.
    3. 3. Create compilations or derivative works of any Content and Material on the Site or the Services.
    4. 4. Use any Content and Material on the Site or the Services in any way that may infringe any copyright, intellectual property right, property right or property right of us or of third parties.
    5. 5. Remove, change or conceal any copyright or other proprietary notices or terms of use contained in the Site or the Services.
    6. 6. Make any part of the Site or the Services available through any timeshare system, service bureau, the Internet or any other technology existing or developed in the future.
    7. 7. Remove, decompile, disassemble or reverse engineer any software on the Site or Services or use any network discovery or monitoring software to determine the architecture of the Site or Services plan.
    8. 8. Use any automatic or manual process to collect information from the Site or the Services.
    9. 9. Use the Site or the Services for the purpose of collecting information for or transmitting (1) unsolicited commercial email; (2) email using headers, invalid or non-existent domain names, or other misleading means of addressing; and (3) unsolicited telephone calls or fax transmissions.
    10. 10. Use the Site or the Services in a manner that violates any state or federal law regulating electronic mail, fax transmissions, or telephone requests.
    11. 11. Export or re-export the Site or the Services or any part thereof, or any software available on the Site or the Services or through them, in violation of the export control laws or regulations of the United States and Colombia.
  10. Links to the site and our services

          You can provide links to the Site and our Services, as long as:

      1. 1. The advertisements, the copyright notice or other notices on the Site and the Services, are not removed or concealed by means of frames or otherwise.
      2. 2. Your site is not engaged in illegal or pornographic activities.
      3. 3. You stop providing links to the Site and Services immediately at our request.
    1. Advertisers

      The Site and the Services may contain advertising and sponsorships. Advertisers and sponsors are responsible for ensuring that the material submitted for inclusion on the Site and the Services is accurate and complies with applicable laws. We are not responsible for the illegalit,y or any errors, inaccuracies or problems in the materials of the advertiser or sponsor.

    2. Errors, corrections and changes

      We do not represent or warrant that the Site and the Services are free from errors, viruses or other harmful components, or that defects will be corrected.

      We do not represent or warrant that the information available on or through the Site and the Services is correct, accurate, timely or reliable for any other reason.

      We may make changes to the features, functionality or content of the Site and the Services at any time.

      We reserve the right, at our sole discretion, to edit or delete any documents, information or other content that appears on the Site and the Services.

    3. Illegal activity

      We reserve the right to investigate complaints or violations of this Agreement and to take action as we deem appropriate, including, but not limited to, reporting any suspected illegal activity to law enforcement officials, regulatory bodies, or other third parties, and disclosing any necessary or appropriate information to such persons or entities in relation to your profile, email addresses, usage history, published materials, IP addresses and traffic information.

    4. Ownership and use of data
      1. 1. Ownership: Between the parties, we exclusively own and reserve all rights, titles and interests in the Services, the Documentation, our Confidential Information (as defined below) and any data, in anonymous or aggregated form that does not identify you, any End User or any natural person, generated or derived from the use or operation of the Services, including volumes, frequencies, bounce rates and performance results of the Services. Between the parties, you are the sole owner and reserve all rights, titles and interests in each Client Application, your Confidential Information and Client Data, subject to our rights to use and disclose the Client Data in accordance with these Conditions
      2. 2. Our use of Customer Data: You instruct us to use and disclose Customer Data as necessary to (a) provide the Services in accordance with this Section, Section 15 (Confidentiality), and our Privacy Agreement, including the detection, prevention and investigation of security incidents, fraud, spam or illegal use of the Services, and (b) respond to any technical problems or your inquiries and ensure the correct functioning of the Services. You acknowledge that the Internet and the networks of telecommunications providers, flat files and transit outside of Keybe’s jurisdiction are inherently insecure. Consequently, you agree that we are not responsible for any modification, interception or loss of Customer Data while it is in transit through the Internet or the network of a telecommunications provider outside the Keybe platform.

        If you do not agree to the terms of our Privacy Agreement, you must stop using the Services immediately.
      3. 3. Comments: We welcome any recommendation, suggestion, request for improvement or correction, comment or other opinion from you or any End User about the Services (collectively, “Opinion”). However, you should know that by sending us your comments, you agree that (a) the opinions will not be treated as your Confidential Information; (b) we may use or disclose, or decide not to use or disclose, the opinions for any purpose and in any manner; (c) we own the reviews; and (d) you and any End User are not entitled to any compensation or refund of any kind from us under any circumstances for the opinions.
    5. Confidentiality
      1. 1. Definition: “Confidential Information” means any information or data, regardless of whether it is in tangible form, disclosed by either party (“Disclosing Party”) to the other party (“Receiving Party”) that is marked or designated otherwise as confidential or proprietary or which should otherwise be reasonably understood as confidential given the nature of the information and the circumstances surrounding the disclosure, including but not limited to any order forms, customer data, documentation, reports and safety certificates, audit reports, customer lists, prices, telephone numbers, concepts, processes, plans, designs and other strategies, “know how”, financial information and other commercial and/or technical information and materials of the Disclosing Party and its Affiliates. Confidential information does not include any information that (a) is publicly available without a violation of these Terms or a fault of the receiving Party; (b) has been duly known by the receiving Party, and to the best of its knowledge, without any restriction, before its disclosure by the disclosing Party; (c) it has been duly disclosed to the receiving Party, and to the best of its knowledge, without any restriction, by another person without the rights of the disclosing Party having been infringed; or (d) was independently developed by the receiving party without using or referencing the Disclosing Party’s Confidential Information.
      2. 2. Use and disclosure: Unless otherwise authorized by the Disclosing Party in writing, the Receiving Party will not (a) use any Confidential Information of the Disclosing Party for any purpose outside the scope of these Terms and (b) will not disclose or post Confidential Information of the Disclosing Party available to any party, except its employees, its Affiliates and their respective employees, legal advisors, accountants, contractors and, in our case, subcontractors (collectively, “Representatives”) who have a “need to know” to carry out the purpose of this Agreement. The receiving Party is responsible for its Representatives to comply with this Section. Representatives will be legally bound to protect the Disclosing Party’s Confidential Information under confidentiality terms that are at least as protective as the terms of this Section. The Receiving Party will protect the confidentiality of the Disclosing Party’s Confidential Information using the same degree of care that it uses to protect the confidentiality of its own confidential information, but in no case less than reasonable care. Notwithstanding the foregoing, you may reveal to End Users information, which will constitute our Confidential Information, only to an employee or worker hired by the End User who has a “need to know” said Confidential Information and is legally bound by confidentiality terms that are at least as protective as the terms of this Section.
      3. 3. Mandatory Disclosure: The Receiving Party may disclose the Disclosing Party’s Confidential Information if required by regulation, law, subpoena or court order (collectively, “Mandatory Disclosures”), provided that the Receiving Party notifies the Disclosing Party of a Mandatory Disclosure (to the extent permitted by law). The Disclosing Party will cover the Receiving Party’s reasonable legal fees for the preparation of witnesses, statements and testimony to the extent that such Mandatory Disclosure is related to a lawsuit or legal proceeding to which the Disclosing Party is a party or to the extent fees incurred in connection with reasonable assistance provided to the Disclosing Party in connection with the Disclosing Party’s efforts to challenge such Mandatory Disclosure.
      4. 4. Precautionary measures: The parties expressly acknowledge and accept that there may be no adequate recourse in law for an actual or threatening breach of this Section and that, in the event of an actual or threatening breach of the provisions of this Section, the non-infringing party shall have the right to request immediate precautionary measures and other equitable remedies, without renouncing any other available right or remedy.
    6. Declarations, guarantees and disclaimer
      1. 1. Personal Data: You represent and warrant that you have provided, and will continue to provide, appropriate notifications, and have obtained, and will continue to obtain, the necessary permissions and consents to provide Customer Data for use and disclosure in accordance with Section 14 (Data ownership and use).
      2. 2. Services: We represent and warrant that the Services are materially provided in accordance with the applicable Documentation. Our only obligation, and your sole and exclusive recourse, should we fail to comply with this obligation, will be that, at our option, we re-provide the affected Services or reimburse you for the fees that you actually paid for the affected Services.
      3. 3. Export controls: Each party will comply with the export control laws and economic sanctions in all jurisdictions directly or indirectly applicable to the Services, including, without limitation, the United States of America. You will obtain all licenses or other authorizations necessary to export, re-export or transfer the Services. Each party declares that it (and, where applicable, End Users as well) is not on any governmental list of prohibited/denied/unverified parties, sanctions, disqualification, or exclusion (collectively, “Sanctions Lists”). You will not export, re-export, or transfer the Services to an entity on any Sanctions List without prior authorization from the US government or other required government. You will (a) immediately discontinue your use of the Services if included in any Sanctions List and (b) remove an End User’s access to the Services if said End User is included in any Sanctions List. 
    7. Mutual indemnification
      1. 1. Indemnification by us
        1. 1.1.Scope of compensation: We will defend you against any claim, lawsuit, dispute or proceeding brought against you by a third party that alleges that our provision of the Services infringes or misappropriates the intellectual property rights of said third party (“Infringement Claim” ). We will compensate you for damages, fines or penalties imposed by a government or regulatory body, attorneys’ fees and costs awarded against you or for the amounts of settlements approved by us for a claim of infringement.
        2. 1.2. Infringement Options: If your use of the Services has become, or in our opinion is likely to become, the subject of an infringement claim, we may, at our option and at our expense (a) obtain for you the right to continue using the Services as established in these Conditions; (b) modify the Services to make them non-infringing; or (c) if the above options are not reasonably feasible, terminate these Terms, or, where appropriate, terminate the Services that are the subject of any Infringement Claim, and refund any unused prepaid fees to you.
        3. 1.3. Limitations: We will have no responsibility or liability under this Section with respect to any Infringement Claim (a) arising from your use of the Services in breach of these Terms; (b) arising from the combination, operation or use of the Services with other applications, parts of applications, products or services in which the Services would not themselves be infringing; or (c) arising from the Services for which there is no charge.
      1. 2.Indemnification by you: You will defend us, our officers, directors, employees and Affiliates (collectively, “Keybe Indemnified Parties”) from and against any claim, lawsuit, dispute or proceeding made or brought against an Indemnified Party of Keybe by a third party alleging or arising out of (a) your or any End User’s breach of Section 4 (Your Responsibilities) or (b) a Client Application, including, without limitation, any claim of a Client Application, or their use or an End User’s use of a Client Application, infringes or misappropriates the intellectual property rights of such third party (collectively, “Client Compensable Claims”). You will indemnify us for any damages, fines or penalties imposed by a government or regulatory body, attorneys’ fees and costs awarded against a Keybe Indemnified Party or for settlement amounts approved by you for a Client’s Indemnified Claim.
      2. 3. Conditions of indemnification: As a condition of the above indemnification obligations (a) the indemnified party (“Indemnified Party”) will promptly notify the indemnifying party (“Indemnifying Party”) of any Infringement Claim or Indemnified Claim of the client (individually and collectively referred to as “Claim”); however, failure to notify promptly shall not relieve the indemnifying Party of its obligations under this Section, except to the extent that the indemnifying Party has been actually and materially harmed by such neglect; (b) The Indemnifying Party shall have the sole and exclusive authority to defend or resolve any Claim; and (c) The Indemnified Party will reasonably cooperate with the Indemnifying Party in connection with the Indemnifying Party’s activities under this Section, at the Indemnifying Party’s expense. The Indemnified Party reserves the right, at its own expense, to participate in the defense of any Claim. Notwithstanding any provision to the contrary in this Section, the Indemnifying Party will not resolve any Claim for which it has an obligation to indemnify under this Section by admitting liability or fault on behalf of the Indemnified Party, nor will it create any obligation on behalf of the Indemnified Party, without the prior written consent of the Indemnified Party, which will not be unreasonably withheld, conditioned or delayed.
      3. 4. Exclusive Resource: This Section establishes the sole responsibility of the Indemnifying Party and the exclusive recourse of the Indemnified Party against the other party for any third party claim.
      1. Privacy agreement

        Our Privacy Agreement, which may change from time to time, is part of this Agreement. You can review the Privacy Agreement at the following link:

      2. Information

        The Site and our Services contain information about us. We waive any duty or obligation to update this information. Information about companies other than ours should not be considered as provided or endorsed by us.

      3. Thirdparty services

        We may allow or advertise certain third-party product or service providers (“Merchants”) from which you may purchase certain goods or services. You understand that we do not operate or control the products or services offered by Merchants. Merchants are responsible for all aspects of order processing, fulfillment, billing and customer service. We are not part of the transactions between you and the Merchants.

        You agree that your use or purchase from such Merchants is at your own risk and without warranties of any kind on our part, whether express, implied or otherwise, including warranties of title, fitness for purpose, merchantability or no infringement.

        In no event will we be liable for damages arising from transactions between you and Merchants or from information appearing on Merchant sites or on any other site linked to our site and services.

      4. Third party content

        Third party content may appear on the Site and the Services or it may be accessible through links from the Site and the Services. We are not responsible or liable for errors, misstatements, defamation, omissions, misrepresentation, obscenity, pornography, or blasphemy in statements, opinions, representations, or any other form of content on the Site or the Services provided to you. You understand that the information and opinions in the content of third parties represent the ideas of the author only and are not endorsed or necessarily reflect our beliefs or opinions.

      5. Third-party Merchants Policies

        All Merchant rules, policies (including privacy agreement) and operating procedures will apply to you while on Merchant sites. We are not responsible for the information that you provide to Merchants. We and the Merchants are independent contractors and neither party has the authority to make any representations or commitments on behalf of the other.

      6. Rates and payment conditions
        1. 1.Fees: You agree to pay the fees in accordance with the applicable fees published at, unless otherwise stated in a document signed by the parties with a special negotiation. In addition, we will charge you, and you will pay, in accordance with any and all additional costs, fines or penalties that we incur by a government or regulatory body or telecommunications provider as a result of your use of the Services.
        2. 2. Payment conditions: Payment obligations are non-cancellable, and fees, once paid, are non-refundable. Unless otherwise stated in the applicable Order Sheet(s) and subject to Section 23.3 (Payment Disputes), you will make all payments due under these Conditions in accordance with the following applicable payment method:
            1. 2.1. Credit Card Payment Terms: If you choose to pay by credit card, you are responsible for ensuring that your account has a sufficient positive balance to cover all fees due. If, for any reason, your credit card rejects a charge for the fees due, we reserve the right to suspend the Services to all of your accounts.
            2. 2.2. Billing payment conditions. If you choose to receive invoices and pay in installments and we approve you to do so, the invoices will be emailed to you in PDF electronic format on a monthly basis. You will pay all undisputed fees under these Terms within eight (8) days of the invoice date, all fees are payable in US dollars or Colombian pesos. If you are late in paying the uncontested fees and do not pay within ten (10) business days of the written notice of your delay, we may (a) impose, and you will pay, a late fee of 2% per month or the maximum amount allowed by applicable law (b) suspend Services to all your accounts until you pay the undisputed fees due plus late fees.

          All these conditions are met unless otherwise established in a special negotiation that must be signed by the parties.

        3. 3. Payment disputes: You will notify us in writing if you dispute any communications fee, tax, or surcharge that you have paid or are required to pay under these Terms. If you dispute any communications fee, tax, or surcharge, you must act reasonably and in good faith and cooperate diligently with us to resolve the dispute. You will notify us within sixty (60) days from the date we bill you fees, taxes, or communications surcharges owed that are in dispute and the parties will work together to resolve the dispute promptly.
        4. 4. Payment terms: 
          1. 4.1.A valid credit card is required for bill payment.
          2. 4.2.Any deposit made by the Buyer to Keybe for the purchase of Goods or Services is not refundable.
        5. 5. If you contract the monthly service, you will be billed monthly (Month ended) from the thirtieth (30th) day after the creation of your account.
        6. 6. The service is billed monthly and is non-refundable. There will be no refunds or credits for partial months of service, refunds for upgrade/downgrades, or refunds for unused months with an open account. To treat everyone equally, no exceptions will be made.
        7. 7. We reserve the right to modify or increase the monthly service rates.
        8. 8. In the event of an upgrade or downgrade of your plan level, your credit card will be automatically charged the new rate on your next billing cycle.
      7. Taxes and surcharges for Communications
        1. 1.Taxes: All rates exclude any applicable taxes, levies, duties or other similar levies imposed by a legal, governmental or regulatory authority in any applicable jurisdiction, including, without limitation, sales, use, value added, consumption, communications or withheld taxes (collectively, “Taxes”). You will pay all Taxes associated with these Conditions, excluding any taxes based on our net income, property or employees. If the applicable legislation requires you to withhold any Tax from the payments you owe us, you will reduce or eliminate such withheld Tax upon receipt of the corresponding certificate or tax document that we provide you. You will provide us with proof of payment of any Tax withheld to the appropriate authority.
        2. 2. Communications Surcharges: All rates do not include fees or surcharges applicable to communications services or telecommunications providers (for example, carriers) (collectively, “Communications Surcharges”). You will pay all Communications Charges associated with your use of the Services.
        3. 3. Exemption: If you are exempt from paying certain taxes or communications surcharges, you must provide the necessary information about the exemption that we request, or a valid exemption certificate issued by the competent authority by email to You will be exempt going forward once we approve your exemption request. If the competent authority determines, at any time, that you are not exempt from paying any Tax or Communications Surcharge, you will immediately pay us such Taxes or Communications Surcharges, plus any applicable interest or penalties
      8. Securities laws

        The Site and the Services may include statements regarding our operations, prospects, strategies, financial condition, future economic performance and demand for our products or services, as well as our intentions, plans and objectives (in particular with respect to product offerings and services), which are forward-looking statements. These statements are based on a number of assumptions and estimates that are subject to significant uncertainties, many of which are beyond our control. When used on our Site and Services, words such as “anticipate,” “expect,” “believe,” “estimate,” “search,” “plan,” “intend,” “will,” and similar expressions are intended to identify forward-looking statements designed to enter the havens of securities law for forward-looking statements. The Site and the Services, as well as the information contained therein, do not constitute an offer or a solicitation of an offer for the sale of securities. None of the information contained in this document is intended to be incorporated, and shall not be deemed to be, in any of our securities-related documents or records.

      9. Links to other websites

        The Site and the Services may contain links to other websites. We are not responsible for the content, accuracy, or opinions expressed on such websites, and we do not investigate, monitor, or verify their accuracy or completeness. The inclusion of any linked website on the pages of our Site and Services does not imply approval or endorsement of such website by us. If you decide to leave our Site and Services and access these third-party sites, you do so at your own risk.

      10. Legal compliance

        You agree to comply with all applicable national and international laws, statutes, ordinances and regulations in relation to your use of the Site and our Services, as well as the Content and Materials provided therein.

      11. Additional terms and conditions related to any goods or services provided

        The Buyer agrees to review this Contract before buying anything and the purchase of a good or service will be considered as acceptance of this Contract.

      12. Non-transferable

        Your right to use the Site and the Services is not transferable or assignable. Any username, password or right granted to you to obtain information or documents is not transferable or assignable.

      13. Copyrights on products or services purchased

        The content, organization, compilation, magnetic translation, digital conversion and other matters provided by Keybe are protected by applicable copyrights, trademarks and other proprietary rights (including, but not limited to, the intellectual property), and, the copying, redistribution, use or publication by a Buyer of any content or any part of the Site or the Services is prohibited.

      14. Edition, deletion and modification

        Keybe reserves the right, at its sole discretion, to edit or remove any information or content that appears on the Site and the Services and to remove any goods or services for sale. Following notice posted on the Service, Keybe may modify this Agreement, or the prices, and may discontinue or revise any or all aspects of the Site and the Services at its sole discretion and without prior notice. The modification of this Agreement will be considered effective as of its publication on the Site and the Services with respect to transactions that occur after said date.

      15.  Right of Rejection

        Keybe reserves the right, in its sole discretion, to refuse the service at any time. The sale of any good or service is subject to availability.

      16. Limitation of liability
        4. 4. Bugs and Errors: The information and services may contain bugs, errors, problems or other limitations. we and our affiliated parties have no responsibility for your use of any information or service, except as provided in this agreement. In particular, but not as a limitation thereof, we and our affiliated parties are not liable for any indirect, special, incidental or consequential damages (including damages for loss of business, loss of profit, litigation or the like), whether based on breach of contract, breach of warranty, tort (including negligence), product liability or otherwise, even if the possibility of such damages is advised.
      17. Use of trademarks

        You grant us the right to use your name, logo and a description of your use case to refer to you on our website, press releases and announcements, or marketing or promotional materials, subject to the usage guidelines of your standard mark that you expressly provide us.

      18. Cancellation
        1. 1. Term: These Conditions, which may be periodically updated, will begin on the date they are accepted by you and will continue until terminated in accordance with Section 35 (Cancellation)
        2. 2. Convenience: Either party may terminate these Conditions and close all their accounts for any reason, upon prior written notice to the other party thirty (30) days in advance. Notwithstanding the preceding sentence, if there is an order in force, these Conditions will not end until such order has expired or has been terminated in accordance with its terms.
        3. 3. Material breach: We, in our sole discretion, may terminate this Agreement and close all your accounts in the event that you commit a material breach of this Agreement and do not remedy such material breach within fifteen (15) days to the written notification of such breach. You may also terminate these Conditions if we commit a serious breach of them and do not remedy it within fifteen (15) days after notifying us in writing of such serious breach.
        4. 4. Insolvency: Subject to applicable law, either party may immediately terminate these Terms and close all their accounts by written notice in the event of the liquidation of the other party, initiation of a dissolution proceeding, or any other proceeding related with a receivership, inability to continue business, assignment for the benefit of creditors or becoming the subject of bankruptcy.
        5. 5. Survival: Upon the termination of these Conditions, the terms of this Section, and the terms of the following Sections will survive (that is, they will continue to apply): (b) (related to The Description of the security of the services). Section 23 (Rates and terms of payment), Section 14 (Ownership and use of data), Section 33 (Limitation of liability), Section 17 (Mutual compensation), Section 37 (Miscellaneous) and Section 38 (Dispute resolution).

        You are solely responsible for correctly canceling your account. You can cancel your Account at any time by requesting it in writing.

        Keybe, at its sole discretion, has the right to suspend or terminate your account and refuse any current or future use of the Service, or any other Keybe service, for any reason and at any time. Such termination of the Service will result in the deactivation or deletion of your Account or your access to it, and in the confiscation and resignation of all Content in your account.

      19. Technical support

        Your use of the Service and the Website is at your own risk. The service is provided “as is” and “as available”.
        Technical support is only provided to paid account holders and is only available by email or via the website.

        You understand that the response time to technical support requests may be up to and more than five (5) business days in some circumstances.

        You understand that Keybe uses third-party providers and hosting partners to provide the hardware, software, network, storage, and related technology necessary to run the Service.

      20. Various
        1. 1. Absence of waiver and order of priority: The fact that one of the parties does not exercise a right or apply a provision by virtue of these Conditions will not constitute a waiver of that right or provision, or of any other provision. Any waiver must be in writing and signed by each party to be legally binding. The titles and section headings of these Terms are for convenience only and will not affect the interpretation of any provision of these Terms. In the event of conflict or inconsistency between the following documents, the order of precedence will be: (1) these Conditions, (3)  The Acceptable Use Policy and (4) the applicable Documentation.
        2. 2. Assignment: You will not assign, delegate or otherwise transfer these Terms, in whole or in part, without our prior written consent. Any attempt to assign, delegate or transfer these Conditions will be null and void. We may assign, delegate, or otherwise transfer these Terms, in whole or in part, without your consent. Notwithstanding the provisions of this section, these Conditions will be binding for each of the parties and for their successors and assignees.
        3. 3. Relationship: Each party is an independent contractor in the performance of each and every part of these Terms. Nothing in these Terms is intended to create or shall be construed as creating an employer-employee relationship or a partnership, agency, joint venture, or franchise. Each party will be solely responsible for all their respective employees and agents, as well as their respective labor costs and expenses arising in connection with their respective employees and agents. Each party will also be solely responsible for all claims, responsibilities, damages or debts of any kind that may arise as a result of each of their respective activities, or those of their respective employees and agents, in the fulfillment of these Terms. Neither party is authorized to bind the other in any way and will not attempt to do so or imply that it has the right to do so.
        4. 4. Severability: Except as described in Section 38 (Dispute Resolution), if a court or other tribunal of competent jurisdiction considers that any provision of these Terms is not enforceable, such provision will be limited or eliminated to the extent minimum necessary to make it executable and, in any case, the rest of these Terms will continue in full force.
        5. 5.Notifications: Any notification required or permitted under these Terms to us will be given in writing to the following address by personal delivery, certified mail, return receipt requested, overnight delivery by a nationally recognized carrier or via email:

          KEYBE AI CORP
          55 RIVERWALK PLACE INT 749
          WEST NEW YORK NJ 07093-0709
          +1 (240) 406-6789

        Any notification required or permitted under these Terms for you will be sent by email to the email address that you designate in your account or provided through your account portal.

        1. 6. Force majeure: No breach, delay or non-performance of any obligation of a party will constitute an event of breach or violation of these Terms to the extent that such breach, delay or non-performance arises from a cause, existing or future, which is beyond the control and without negligence of said party, including the action or inaction of governmental, civil or military authority, fire, strike, lockout or other labor dispute, flood, terrorist act, war, riots, theft , earthquake or other natural disaster. The party affected by said cause will take all reasonable measures to minimize the consequences thereof.
        2. 7. Government Terms: We provide the Services, including any related software and technology, for federal government end use only in accordance with these Terms. If you (or any end user) are an agency, department or other entity of any government, the use, duplication, reproduction, release, modification, disclosure or transfer of the Services, or any related documentation of any type, including technical data, software and manuals, is restricted by these Terms. Any other use is prohibited, and no more rights are conferred than those provided in these Conditions. The Services have been developed entirely on their own account.
        3. 8.Applicable law and venue: The applicability and interpretation of Section 38 (Resolution of litigations) will be determined by the Federal Arbitration Law (including its procedural provisions). Other than Section 38 (Resolution of litigations), these Terms will be governed by and construed in accordance with the laws of the State of New Jersey, without regard to conflicts of laws and principles that would cause the laws of another jurisdiction to apply. These Conditions will not be governed by the United Nations Convention on Contracts for the International Sale of Goods. Except as provided in Section 38 (Resolution of litigation), any lawsuit, action or legal proceeding arising out of or related to these Terms or the Services will be brought in the state or federal courts of West New York, NJ, and each party consents to the personal jurisdiction of these courts.
        4. 9. Entire Agreement: Except as provided in these Conditions and in any attached document, applicable order form(s), or other terms incorporated by reference to these Conditions, these Conditions supersede all proposals, statements, sales materials, presentations or prior and contemporaneous agreements, both oral and written. No oral or written information or advice given by us, our agents or our employees will create a warranty or in any way increase the scope of warranties or obligations under these Terms. Any terms or conditions that appear on your seller registration form or registration portal or on any purchase order document or similar document provided by you will be construed solely as proof of your internal business processes, and terms and conditions contained in them will be void and will not have any effect with respect to these Terms between the parties and will not be binding against us, even if they are signed by us after the date of acceptance of these Terms.
        5. 10. Jurisdiction: This Agreement will be treated as if it were executed and performed in West New York, New Jersey, and will be governed by and construed in accordance with the laws of the State of New Jersey (without regard to conflict of laws principles).
        6. 11. Language: The language of this agreement will be interpreted in its proper sense and not strictly for or against any of the parties.
        7. 12. Transfer: This Agreement and all incorporated agreements, as well as your information, may be automatically assigned by us, at our sole discretion, to a third party in the event of acquisition, sale or merger.
        8. 13.Inconsistencies: To the extent that anything on or associated with the Site is in conflict or inconsistent with this Agreement, this Agreement will take precedence.
        9. 14. No Waiver: Failure to enforce any provision of this Agreement shall not be considered a waiver of such provision or the right to enforce it.
        10. 15. Termination: Our rights under this Agreement will continue after termination of this Agreement.
      21. Resolution of litigation
        1. 1. Before filing a formal legal case, first try to contact our Customer Service. Most disputes can be resolved that way.
        2. 2. Arbitration Agreement: If a dispute, claim or controversy related to these Terms or the Services (collectively, “Disputes”) cannot be resolved through our Customer Service team, the main representatives of each party will enter into negotiations in good faith with the main representatives of the other party to amicably resolve a Dispute (except in the case of Disputes established in Section 38.4 (Exceptions to the arbitration agreement), which may be litigated in court). If the parties are unable to resolve a Dispute within thirty (30) days of the first request to enter into negotiations in good faith or within any other time period agreed by the parties in writing, the parties may initiate binding arbitration in accordance with Section 38.3 (Details on the arbitration procedure). If either party has a Dispute as to whether this Section can or does apply to a Dispute between the parties, each party agrees that the arbitrator will decide that as well. In accordance with this Section, you understand that you are waiving the right to have a judge and/or jury resolve any Dispute arising out of or related to these Terms or the Services.
        3. 3.Details of the arbitration procedure: Except in the case of the disputes established in section 38.4 (Exceptions to the arbitration agreement), disputes that have not been resolved between the parties will be submitted to binding arbitration, which will be to conducted by the American Arbitration Association (AAA). You can view the AAA’s policies and procedures on their website or you can call them at 1-800-778-7879. The arbitration will be governed by the current version of the AAA Commercial Arbitration Rules (“Rules”) and will be conducted with a single arbitrator designated in accordance with the Rules. To the extent that anything described in this Section conflicts with the Regulations, the language of this Section will apply. Each party shall have the right to obtain a copy of the relevant non-privileged documents in the possession or control of the other party and to take a reasonable number of representations. All this information will be done in accordance with procedures approved by the arbitrator. This section does not alter in any way the statute of limitations that would apply to disputes raised by either party. The arbitrator’s award will be based on admitted evidence and the substantive law of the State of New Jersey and the United States of America, as applicable, and will contain an award for each issue in dispute. The award will provide written findings of fact and legal reasoning for said award. The arbitrator will not have the right to modify these Conditions. Except as provided in the Federal Arbitration Law, the arbitration award will be final and binding for the parties. The judgment on the award rendered by the arbitrator can be presented in any court of competent jurisdiction. Any arbitration proceeding will take place in West New York, New Jersey.
        4. 4. Exceptions to the arbitration agreement: Each of the parties agrees that they will go to court to resolve disputes related to:
          1. 4.1.  (a) the intellectual property of either party (for example, trademarks, trade dress, domain names, trade secrets, copyrights, or patents)
          2. 4.2. (b) failure by you or an end user to comply with our Acceptable Use Policy.
        5. 5. In addition, either party may file litigation in small claims court, either in West New York, New Jersey, or in the county in which you live, or elsewhere as the parties agree, if you qualify to appear in that court. In addition, if one of the parties brings a dispute to the court that should be arbitrated or one of the parties refuses to arbitrate a dispute that should be arbitrated, the other party may request a court to compel the parties to go to an arbitration to resolve such dispute (i.e., compel arbitration). Either party can also request a court to stop a legal proceeding while an arbitration proceeding is in progress.
        6. 6. Class Action Waiver: Each party agrees that any Dispute between the parties must be filed against the other only individually. This means that neither party can file a Dispute as a plaintiff or a member of a class in a class action, consolidated action, or representative action. An arbitrator may not combine the Disputes of more than one person or entity in a single case and may not preside over any consolidated collective or representative proceeding. Each party agrees that the arbitrator’s decision or award in the case of a person or entity can only impact the person or entity that filed a Dispute and cannot impact or be used to decide Disputes with other people or entities, including other Keybe clients. If a court decides that this Section is not applicable or valid, then this Section will be null and void. However, the rest of these Conditions will continue to apply.

    Our relationships are based on empathy and we will always try to put ourselves in the shoes of the people who use our services. If you would like to send us recommendations on how we can improve our relationship, please write to us at


We guarantee our work and repair the errors detected in the fastest and most stable way possible. We have a specialized team ready to respond and will be available to advise on the best practices for using the Keybe platform.

Notwithstanding any provision in this Agreement, a service unavailability will not be deemed to have occurred if the downtime: (i) is caused by factors beyond Keybe’s reasonable control, including, without limitation, problems or issues related to our telecommunications and cloud service providers, Internet access or related problems that occur beyond the point of the network where Keybe maintains access and control of the Services; (ii) is the result of any action or inactivity of the Client or any third party (except Keybe’s agents and subcontractors); (iii) is the result of the Client’s Applications, Client’s equipment, software or other technology, supplementary services, or third-party equipment, software or other technology (with the exception of equipment within the direct control of Keybe ); (iv) occurs during Keybe’s scheduled maintenance for which Keybe will provide notice at least twenty-four (24) hours in advance; (v) occurs during Keybe’s emergency maintenance (maintenance that is necessary for the purpose of maintaining the integrity or operation of the Services), regardless of the notification provided by Keybe; or (vi) the results of any alpha, beta, developer preview, development benchmark environments, import descriptions, similar or not, otherwise generally available Keybe features or products; or (vii) periods of monthly unavailable time that are less than five (5) minutes of continuous unavailability in duration (collectively, the “Monthly Excluded Times”).

This Agreement guarantees:

It is considered an EMERGENCY when the service is not available in more than 3 IP addresses for more than 5 minutes.
IMPORTANT: If you activate this EMERGENCY channel more than two (2) times without it being a REAL EMERGENCY, the value of USD $80 per hour or fraction of service support will be charged.
Support channel 1 (Assistance Chat)
Support channel 2 WhatsApp Business: +1 (347) 458-3147
Atention Time Immediately to 30 minutes
Solution Time 15 minutes to 1 hour


Based on an AGILE philosophy and SCRUM methodology, we call incidents the service requirements, improvements, requests or error reports.
Availability Monday to Friday 9 am to 5 pm (GMT -5)
Support channel 1 (Chat)
Support channel 2 WhatsApp Business: +1 (347) 458-3147
Atention time Immediately to 2 hours
Solution time Low Complexity 2 to 48 business hours

Medium Complexity 48 to 72 business hours

High Complexity 72 hours to 1 week (If feasible)

With respect to any failure of Keybe to meet the monthly activity uptime percentage threshold or successful connection rate, as the case may be, this addendum sets forth Keybe’s sole and complete liability to the customer and the customer’s sole recourse.


1. Introduction

Keybe is committed to protecting the privacy of the people who visit the Company’s websites (“Visitor(s)”, “You,” and the derived adjective “Your”), the people who register to use the Service as defined below (“Clients”), and the people who register who attend the Company’s corporate events (“Attendees”). This Privacy Statement describes Keybe’s privacy practices with respect to its websites and related services and applications offered by Keybe (collectively, the “Service”).

If you have questions or complaints regarding Keybe’s Privacy Statement or Practices, please contact us at

2. Covered websites

Keybe has established this Privacy Statement to help you understand how Keybe collects and uses personally identifiable information. This Privacy Statement covers the information practices of websites that link to this Privacy Agreement, including but not limited to

Keybe’s websites may contain links to other websites. Keybe is not responsible for the information practices or the content of such websites. The Company encourages you to review the privacy statements of other websites to understand their information practices.

3. Information collected by Keybe

Keybe does not collect the email addresses of Keybe’s fee-based business services for which we sell subscriptions (collectively, the “Service”) for marketing purposes. Keybe collects information from visitors. This information is collected in accordance with this Privacy Statement, from sources including, but not limited to, content syndication, website registration forms, webinar and conference registration forms.

Personal information you provide to us. Keybe collects information from visitors to Keybe’s websites and customers of the service. Keybe receives and stores any information entered when you express interest in obtaining more information about the Service or register to use the Service. When Visitors express an interest in obtaining information about the Service or register to use the Service on Keybe’s websites, Keybe may ask Visitors to provide personal contact information, such as name, company, address, telephone number, email address and any other information necessary for us to provide visitors with access to various aspects of the Services (collectively, “Personal Information”). Personal information provided by visitors can be used to answer questions, improve website content, personalize content, and communicate with visitors about the Keybe service, including specials and new features.

Personal Information Collected Automatically. As visitors browse or interact with Keybe’s websites, Keybe may also collect information automatically through the use of commonly used information collection tools, such as cookies and web beacons.

4. Other third party tracking

Keybe contracts with third parties, who use web beacons, images, and scripts, to help better manage the content on Keybe’s websites. Keybe does not provide personal information to third parties, but may link information collected from third party tracking to personal information of visitors for marketing purposes.

5. Cookies:

Keybe uses cookies to make interactions with websites easy and meaningful. When a visitor interacts with the websites, Keybe’s servers send a cookie to the visitor’s computer. Standing, cookies do not personally identify the visitor, but simply recognize the visitor’s web browser. Unless the visitor chooses to identify themselves with Keybe, either by responding to a promotional offer, opening an account, or completing a web form, Keybe has no way of associating this cookie information with the visitor’s personal information.

For websites, Keybe uses session-based cookies. Session cookies exist only during a session. They disappear from the Vis

Most browsers have an option to disable cookies, which will prevent the browser from accepting new cookies, as well as (depending on the sophistication of the browser software) allowing the visitor to decide on the acceptance of each new cookie in various ways.

Keybe’s websites connect visitors to third-party services, with whom Keybe partners to provide relevant content. The use of cookies by Keybe partners is not covered by the Keybe Privacy Statement. Keybe does not have access or control over these cookies. Keybe’s partners use session ID cookies to manage a Client’s connection to the partner’s service.


Company Name: KEYBE AI CORP


WEST NEW YORK NJ 07093-0709




At Keybe we recognize the importance of the security, privacy and confidentiality of the personal information of our clients, workers, suppliers and the people who use our identity services, who provide us with information through various enabled channels (including websites, applications , API’s, physical documents, among others) and we are committed to the protection and adequate treatment of them, in accordance with the legal regime for the protection of personal data applicable to each country where we operate.

For KEYBE it is necessary to collect certain personal data to carry out the activities intrinsic to its commercial line of business. KEYBE has a legal and social obligation to implement adequate security measures to protect the personal data it has collected for the purposes specified in this Privacy and Personal Data Protection Agreement (“Policy”).

Therefore, the objective of this Policy is to communicate to our clients, workers, suppliers, users of the Website and, in general, to the owners of personal information (data subjects), the type of data, the purposes of the Treatment to make possible the provision of our service, the protection and rights that assist you as the data subject of the information and the procedures to exercise them.

In general, all the information and data that you provide us, or that we otherwise collect in the context, by any means or by reason of the ordinary course of your commercial activities, will be used by KEYBE in accordance with the Regulation (UE) 2016/679 (“GDPR”) and Law 1581 of 2012. The foregoing means that any form of processing of your personal data carried out by KEYBE will uphold the principles of legality, equity, transparency, purpose limitation, storage limitation, data minimization, accuracy, integrity and confidentiality.


For the interpretation of this Policy, we ask you to take into account the following definitions:

  • Authorization: prior, express and informed consent of the Data Subject to carry out the processing of personal data.
  • Database: organized set of personal data that is subject to Treatment.
  • Consent: it is a manifestation of the informed, free, and unequivocal will, through which the data subject of the personal data accepts that a third party uses their information.
  • Queries: the Data Subjects or their successors in title may consult the Data Subject’s personal information that resides in any database, be it the public or private sector. The Data Controller or Data Processor must provide them with all the information contained in the individual record or that is linked to the identification of the Data Subject.
  • Personal Data: refers to any information associated with an identified or identifiable natural person, relative to their identity, as well as their existence and occupations.
  • Public Data: it is the data classified as such by the Constitution or the Law and all that is not semi-private or private, in accordance with this law. The data contained in public documents, gazettes and judicial bulletins, duly executed judicial decisions that are not subject to reserve, and those related to the civil status of people are public, among others.
  • Semi-private data: The data that is not intimate, reserved, or public in nature, and which knowledge or disclosure may interest not only the data subject but also a certain sector or group of people or society in general is semi-private, such as financial and credit data of commercial activity or services.
  • Private Data: It is the data that due to its intimate or reserved nature is only relevant to the data subject.
  • Sensitive Data: For the purposes of this policy, sensitive data is understood to be anything that affects the privacy of the Data Subject or whose improper use may generate discrimination, such as those that reveal racial or ethnic origin, political orientation, religious or philosophical convictions, membership in trade unions, social or human rights organizations or that promote the interests of any political party or that guarantees the rights and warranties of opposition political parties as well as data related to health, sexual life, biometric data, passwords and financial data.
  • Data Processor: Natural or legal person, public or private, that by themselves or in association with others, carries out the Treatment of personal data on behalf of the Data Controller.
  • Habeas Data: It is the right that every owner of information (data subject) has to know, update, rectify or oppose the information concerning their personal data
  • Data Processing Policy, or Policy: refers to this document as the personal data processing policy applied by the Company in accordance with the guidelines of current legislation on the matter.
  • Provider: any natural or legal person that provides a service to the Company by virtue of a contractual or mandatory relationship.
  • Claim: the Data Subject or his successors in title who consider that the information contained in a database should be subject to correction, updating or deletion, or when they notice the alleged breach of any of the duties contained in this law, they may file a claim before the Data Controller or the Data Processor.
  • Data Controller: natural or legal person, public or private, that by itself or in association with others, decides on the database and/or the processing of personal data.
  • Treatment: any physical or automated operation or procedures that allow to capture, record, reproduce, conserve, organize, modify, and/or transmit personal data.
  • Data Subject: is the natural person whose personal data is being processed by a third party, be it a client, supplier, employee, or any third party who, due to a legal or commercial relationship, provides personal data to the Company.
  • Transmission: refers to the communication of personal data by the Responsible Party to the Manager, located within or outside the national territory, so that the Manager, on behalf of the Responsible Party, treats personal data.
  • reatment: Any operation or set of operations on personal data, such as the collection, storage, use, circulation or deletion.

To understand the terms that are not included in the previous list, you must refer to current legislation, especially Law 1581 of 2012 and chapters 25 and 26 of Decree 1074 of 2015 and Regulation (EU) 2016 / 679 (“GDPR”), giving the meaning used in said standards to the terms whose definition there is doubt.


At KEYBE we are committed to complying with the principles that govern the processing of personal data of our stakeholders and, in general, of any natural person whose personal data is in our databases and/or files, guaranteeing the application of the general principles for the treatment of this type of data, which are indicated below:

  • Principle of Legality. The processing of personal data is a regulated activity and must obey a legitimate purpose, for which KEYBE will compulsorily comply with the provisions of Law 1581 and the other provisions that develop it.
  • Principle of Purpose. KEYBE will treat personal data always obeying a legitimate purpose which will be previously informed to the data subject.
  • Principle of Freedom. KEYBE will only process personal data when it has the prior, express and informed consent of the data subject. The Data Subject may, in any case, refuse the processing of their sensitive data.
  • Principle of Veracity or Quality. The personal data processed by KEYBE must be truthful, complete, exact, updated, verifiable and understandable
  • Principle of Transparency. KEYBE, will guarantee the owner of the personal data (data subject), at any time and without restrictions, to obtain information about the existence of data that concerns them.
  • Principle of Access and Restricted Circulation. KEYBE, undertakes that the processing of personal data will be carried out by entities authorized by the data subject and/or by the persons provided for in Law 1581 of 2012. Personal data may not be available on the internet or other means of disclosure or massive communication, unless the access is technically controllable to provide restricted knowledge only to the data subjects or authorized third parties.
  • Principle of Security. The information subject to treatment by KEYBE, will be handled with the technical, human and administrative measures necessary to grant security to the records, avoiding their adulteration, loss, consultation, use or unauthorized or fraudulent access.
  • Principle of Confidentiality. KEYBE, undertakes that the people who intervene in the processing of personal data that are not public in nature will be obliged to guarantee the reserving of the information, even after the end of their relationship with any of the tasks that comprise the treatment, being able to only supply or communicate personal data when this corresponds to the development of authorized activities.
  • Principle of Demonstrated Responsibility (Accountability). One that is based on the approach of recognition and commitment of organizations in order to increase the standards of protection to ensure and guarantee people an adequate treatment of their personal data. This principle entails an obligation for KEYBE to be accountable for its activities regarding the protection of personal data, accept responsibility for them and disclose the results in a transparent manner.


KEYBE as Data Controller will fulfill the following duties, without prejudice to the other provisions provided in the law and in others that govern its commercial activity:

  • Guarantee the Data Subject, at all times, the full and effective exercise of the right to habeas data;
  • Request and keep, under the conditions provided by law, a copy of the respective authorization granted by the Data Subject;
  • Properly inform the Data Subject about the purpose of the collection and the rights that assist him by virtue of the authorization granted;
  • Keep the information under the security conditions necessary to prevent its adulteration, loss, consultation, use or unauthorized or fraudulent access;
  • Guarantee that the information provided to the Data Processor is true, complete, exact, updated, verifiable and understandable;
  • Update the information, communicating in a timely manner to the Data Processor, all the updates regarding the data that you have previously provided and adopt the other necessary measures so that the information provided to them is kept up-to-date;
  • Rectify the information when it is incorrect and communicate the pertinent to the Data Processor;
  • Provide the Data Processor, as the case may be, only data whose Treatment is previously authorized in accordance with the provisions of the law;
  • Require the Data Processor, at all times, to respect the security and privacy conditions of the Data Subject’s information;
  • Process the queries and claims formulated in the terms indicated in the present law;
  • Adopt an internal manual of policies and procedures to guarantee adequate compliance with the law and, especially, for the attention of queries and complaints;
  • Inform the Data Processor when certain information is under discussion by the Data Subject, once the claim has been submitted and the respective procedure has not been completed;
  • Inform at the request of the Data Subject about the use given to their data;
  • Inform the data protection authority when there are violations of the security codes and there are risks in the administration of the information of the Data Subjects.
  • Comply with the instructions and requirements issued by the Superintendency of Industry and Commerce.


KEYBE will only collect, store, use or circulate personal data for as long as is reasonable and necessary, in accordance with the purposes that justified the treatment, taking into account the provisions applicable to the matter in question and the administrative, accounting, fiscal, legal and historical information. Once the purpose or purposes of the treatment have been fulfilled and, without prejudice to legal regulations that provide otherwise, it will proceed to delete the personal data in its possession. However, KEYBE may keep your personal data when required to comply with a legal or contractual obligation.

Notwithstanding the foregoing, you as the Data Subject may, at any time, revoke the consent you have given for the processing of your personal data, unless legally or contractually KEYBE must process said information, by sending a communication and/or written request, through the contact channels contemplated in this Policy, providing a copy of your identification document or any other document that, in the opinion of KEYBE, allows you to prove your identity.


KEYBE recognizes that the owner of personal data (Data Subject) has the right to have a reasonable expectation of their privacy, taking into account, in any case, their responsibilities, rights and obligations with KEYBE. By virtue of the relationship established between you and KEYBE, we inform you that your personal data will be treated with full respect for the principles defined in the applicable law and that the collection, use, circulation, transmission, transfer and, in general, any form of treatment on them, will be done in accordance with the following purposes that will be previously informed, corresponding, in any case, to the development of its corporate purpose and the ordinary course of its activities.

13. General Purposes:

The purposes described below will be applicable to all Data Subjects who have previously, in an express and informed way, authorized the processing of their personal data:

  • Confirm, comply with and provide the services and/or products purchased, directly and/or with the participation of third party providers of products or services.
  • Inform about substantial changes in the Policy adopted by KEYBE.
  • Establish and manage the relationship, may it be pre-contractual and contractual, commercial, labor, civil, and of any other nature that arises by virtue of the fulfillment of a legal or contractual obligation in responsibility of KEYBE.
  • Respond to requests, queries, claims and/or complaints made by the holders of personal information (Data Subjects) through any of the channels enabled by KEYBE for this purpose.
  • Transfer or transmit your personal data to entities and/or judicial and/or administrative authorities, when these are required in relation to their purpose, and necessary for the fulfillment of their legal or contractual functions.

14. Shareholders:

The treatment of the personal data of KEYBE shareholders will be carried out in accordance with the provisions of the Commercial Code, and with any other rule that regulates this matter. The purposes applicable to the shareholders’ personal data are the following:

  • Allow the exercise of the rights and duties derived from the function of shareholders.
  • Make the payment of dividends.
  • Collect, register and update your personal data in order to inform, communicate, organize, control, attend and accredit the activities in relation to their function of shareholders.
  • Comply with judicial, administrative and legal decisions related to their function of shareholders.

15. Candidates for a Vacancy:

KEYBE will use the personal data of the candidates for a vacancy in accordance with the purposes listed below:

  • Establish and manage the recruitment, selection and hiring process.
  • Carry out selection, competencies and skills tests, home visits, psychosocial evaluations, and all other evaluations that are deemed convenient in order to identify the relevance of the candidate’s hiring.
  • Store the personal data in a physical and/or digital file or folder that will be identified with the CANDIDATE’s name; the folder or file, may be accessed by KEYBE management or by whoever has been delegated for this purpose.
  • KEYBE will keep the information that resides in the file or folder of the candidate for a vacancy for an indefinite period of time to meet the requirements of administrative authorities, and audit requirements.

16.  Employees:

KEYBE will use the personal data of its employees in accordance with the purposes listed below:

  • Incorporate the personal data in the employment contract, and make modifications and additions to said contract, as well as in the other documents that are necessary to manage the employment relationship and obligations derived from it that are in care of KEYBE as Data Controller of their personal information.
  • Carry out performance, competencies and skills tests, home visits, psychosocial evaluations and others that are deemed appropriate in order to identify the relevance of the person’s employment relationship.
  • Develop proper management of the employment relationship that links the owner of the personal data (Data Subject) with KEYBE.
  • To have the personal data of the collaborators to incorporate them appropriately in the active and historical labor files of KEYBE and keep them updated.
  • Send internal communications related or not to your employment relationship.
  • Manage personal data so that KEYBE, as an employer, correctly fulfills its obligations. For example: carry out the affiliations to which the worker is entitled by law before the Comprehensive Social Security System, family compensation funds and other matters related to social benefits, contributions, withholdings, taxes, labor disputes, as well as in the case of contributions or payments to other entities where the collaborator had previously authorized the processing of their data.
  • Manage the personal data of the data subject and those of his family nucleus to carry out affiliation procedures with health promoting entities, family compensation funds, labor risk administrators, and others necessary for KEYBE to fulfill its duty as an employer.
  • Respond to requests from the worker regarding the issuance of certificates, records and other documents requested from KEYBE in cause of the employment relationship.
  • Promote the participation in programs developed by KEYBE aimed at well-being and a good work environment.
  • Manage the personal data to guarantee a correct assignment of work tools (including IT tools such as email, computers, mobile devices, access to databases, etc.)
  • Manage the personal data to ensure proper execution of the provisions of the Internal Work Regulations, including disciplinary processes and pertinent investigations.
  • Monitor and use the images captured through video surveillance systems in order to control and evaluate the development and performance of work activities in the workplace.
  • Manage the personal data to make the correct payroll payment, including making discounts for payments to third parties that the employee has previously authorized and making reports related to this process.

17. Suppliers and/or Contractors:

KEYBE will use the personal data of the suppliers and/or contractors in accordance with the purposes listed below:

  • Develop proper management of the contractual relationship
  • Collect, register and update the personal data in order to inform, communicate, organize, control, attend, and/or accredit the activities in relation to your status as provider and/or third party related to KEYBE and other associated procedures in charge of the Data Controller.
  •  Manage the data to carry out the different payment processes, invoices and collection accounts presented to KEYBE, and collection management that are in their control.
  • Evaluate the services offered or provided by the supplier and/or contractor.
  • Comply with any other legal obligation that is in control of KEYBE.
  • Analyze financial, technical and other aspects that allow KEYBE to identify the supplier’s compliance capacity.
  • Fulfill the obligations derived from the commercial relationship established with the supplier or contractor.
  • Provide assistance and/or information of general and/or commercial interest to the supplier or contractor.
  • Develop and apply processes of selection, evaluation, and preparation of responses to a request for information, and prepare requests for quotation and proposal and/or award of contracts.
  • Evaluate the quality of the products and services offered or provided to KEYBE.
  • Use, in the event that it is necessary, the personal data of the supplier’s collaborator in order to establish access controls to the logical or physical infrastructure of KEYBE.
  • Manage personal data to make payments to suppliers, including the administration of bank account numbers for the correct management of payments.
  • Send or provide information to the competent authorities, when so requested, or in the course of contractual disputes.
  • Transfer information to administrative authorities that, due to their functions, require it in order to comply with the legal obligations in our charge.
  • KEYBE understands that your personal data and that of third parties that the supplier or contractor provides, such as workers authorized to carry out the management or service entrusted, references and commercial certifications, have the authorization of the data subjects to be delivered and processed in accordance with the purposes contemplated in this Policy.

18. Clients and Commercial Prospects:

KEYBE will use, directly or with the participation of third-party providers of products or services, the personal data of customers and commercial prospects in accordance with the purposes listed below:

  • Evaluate them as a potential KEYBE customer.
  • Register them as a KEYBE customer.
  • Verify that the information provided is true.
  • Show that their assets do not come from illegal activities.
  •  Consult and report their information in risk and credit information centers.
  • Provide information about the brands and products that we sell, as well as about the promotional activities that we carry out, all within the terms authorized by the respective legislation.
  • Provide services in accordance with the needs of the Data Subject.
  • Collect, register, and update the personal data in order to inform, communicate, organize, control, attend to, and/or accredit activities in relation to their status as a customer or business prospect.
  • Respond to requests or requirements for information about our services.
  • Send to physical or electronic mail, cell phone or mobile device, via text messages (SMS and/or MMS) or via WhatsApp or Facebook Messenger, or through any other analog and/or digital means of communication created or to be created, commercial information, advertising or promotional products and/or services, events and/or promotions of a commercial nature, in order to promote, invite, direct, execute, inform and, in general, carry out campaigns, promotions or contests of a commercial or advertising nature, carried out directly by KEYBE and/or by third parties.
  • Develop loyalty programs.
  • Carry out credit, collection and credit risk studies.
  • Verification of data through consultations in public databases or risk centers.
  • Evaluate the quality of our products or services and carry out satisfaction surveys.
  • Prepare and carry out market studies and statistical analysis of trends, consumption habits, and consumer behavior.
  • Keep accounting, financial and statistical records.
  • Carry out statistical analysis of trends, consumption habits and consumer behavior.
  • Share the information with third parties and/or allied managers for the fulfillment of the purposes described above.
  • Other purposes determined by KEYBE in the information collection processes for its treatment and which are communicated to the Data Subjects at the time of personal data collection.


KEYBE, in its capacity as Data Controller, will identify the sensitive data that it will eventually collect or process to meet the following objectives:

  • Implement special attention and reinforce its responsibility for the treatment of this type of data, which translates into a greater demand in terms of compliance with the principles and duties established by current regulations on data protection.
  • Establish technical, legal and administrative security levels to treat this information appropriately.
  • Increase restrictions on access and use by the staff of KEYBE, in its capacity as employer, and third-party contractors or suppliers.


The processing of personal data of children and adolescents by KEYBE will be carried out always respecting the following requirements:

  • Respond to and respect the best interests of children and adolescents.
  • Ensure, on behalf of the person in charge, the respect for their fundamental rights.
  • Guarantee that the legal representative of the minor grants authorization, after exercising his right to be heard, an opinion that, as far as possible, should be valued taking into account the following factors:
  • Maturity
  • Autonomy
  • Ability to understand the purpose of said treatment
  • Explain the consequences of the treatment

IMPORTANT: The assessment of the above characteristics will not be carried out by KEYBE in a general way. Any person in charge, manager, or third party involved in the processing of the personal data of minors, must always ensure the adequate use of this type of personal data.


If you provide us with Personal Data, this information will be used only for the purposes indicated in this Policy, and we will not proceed to sell, license, transmit or disclose it to third parties, unless, i) you expressly authorize us to do so; ii) it is necessary to enable our contractors or agents to provide the services we have entrusted to them; iii) it is necessary for the effective provision and fulfillment of the service acquired; iv) in order to provide our products or services to you; v) it is necessary to allow third parties to provide marketing services on our behalf or to other entities with which they have joint market agreements; vi) it is related to a merger, consolidation, acquisition, divestment or other restructuring process; vii) it is required to finalize administrative operations; or viii) it is required or permitted by law.

In order to implement the purposes described above, your personal data may be disclosed for the reasons indicated in this Policy to human resources personnel, managers, consultants, advisors and other persons and offices, as appropriate.

KEYBE may subcontract third parties for the processing of certain functions or information. When we effectively subcontract with third parties the processing of your personal information, or provide your personal information to third party service providers, we warn said third parties about the need to protect said personal information with appropriate security measures, we prohibit the use of your personal information for their own purposes and we prevent them from disclosing your personal information to others.

However, when KEYBE carries out a Transmission of Personal Data to third-party Managers located in Colombia or in other jurisdictions, it must prove (i) a prior, express and informed authorization by the Data Subject, or (ii) a contract for the transmission of Personal Data that contains the requirements contemplated in article of Decree 1074 of 2015.

Similarly, KEYBE may transfer or transmit (as appropriate) your personal data to other companies abroad for reasons of security, administrative efficiency and better service, in accordance with the authorizations of each of these persons. Under this understanding, your data may be transmitted or transferred, as appropriate, for the completion of administrative operations in favor and under instructions of KEYBE or in favor of the global operation of KEYBE, Inc., its affiliates or subsidiaries.


KEYBE may act in certain events as in Data Processor of the data supplied or transmitted by some of its interest groups that have hired KEYBE, and by virtue of this contractual relationship, it commits to comply with the following duties:

  • Verify that the Data Controller is authorized to supply the personal data that will be processed as Data Processor.
  • Guarantee to the Data Subject, at all times, the full and effective exercise of the right to habeas data.
  • Keep the information under the security conditions necessary to prevent its adulteration, loss, consultation, use or unauthorized or fraudulent access.
  • Timely update, rectify or delete the data.
  • Update the information reported by the Data Controller within five (5) business days from receipt.
  • Process the queries and claims made by the data subjects by the terms indicated in this policy.
  • Register in the database the caption “claim in process” in the form in which it is established in this policy.
  • Insert in the database the caption “information in judicial discussion” once notified by the competent authority about judicial processes related to the quality of personal data.
  • Refrain from circulating information that is being controverted by the data subject and whose blocking has been ordered by the Superintendency of Industry and Commerce.
  • Allow access to information only to persons authorized by the data subject or empowered by law for that purpose.
  • Inform the Superintendency of Industry and Commerce when there are violations of the security codes and there are risks in the administration of the information of the data subject.
  • Comply with the instructions and requirements issued by the Superintendency of Industry and Commerce.


In development of the security principle contemplated in Law 1581 of 2012, KEYBE has adopted and incorporated in its different processes the necessary and adequate technical, human and administrative measures to grant security to the records with personal information avoiding their adulteration, loss, consultation, unauthorized or fraudulent use or access. The personnel who process the personal data will execute the protocols established by KEYBE in order to guarantee the security of the information. The foregoing in accordance with the state of technology, the type and nature of the data found in our databases and the risks to which they are exposed.

The personal data that KEYBE obtains through any format, contract, physical or electronic communication, will be treated with total reserve and confidentiality, committing to keep due secrecy regarding them and guaranteeing the duty to store them by adopting necessary measures to avoid their alteration, loss, and unauthorized treatment or access, in accordance with the provisions of the applicable legislation.


Personal Data Subjects may exercise the right to habeas data before KEYBE in order to:

  • Know and access their personal data that has been subject to treatment.
  • Update their personal data that has been subject to treatment.
  • Rectify personal data that has been subject to treatment.
  • Delete the authorization for the processing of their personal data, when the principles established in Law 1581 of 2012 have not been respected in the treatment thereof.
  • Request proof of the authorization granted for the processing of their personal data.

These rights may be exercised directly by the Personal Data Subject, his attorney or his successor in title, as the case may be. If the Data Subject wishes to exercise their right to habeas data through a legal representative, they must present a duly authenticated general or special power of attorney.

The content and details of each of the rights that you, as the personal Data Subject, can exercise are described below:

  • Right of access. Any natural person will have the right to know if their personal data has been subjected to any form of treatment by KEYBE in the terms expressed in the norm, in addition to exercising the right to know the origin of their data and if they have been transmitted or transferred or not to third parties and, therefore, the identification of those third parties.
  • Right to update. Any natural person will have the right to update the information kept by KEYBE as personal data in the terms expressed in the norm.
  • Rights of rectification. Any natural person has the right to verify before the data controller the accuracy and veracity of the personal data collected and request the rectification of it when it is inaccurate, incomplete or lead to error. The data subjects must indicate the data they request to correct and also accompany the documentation that justifies the request.
  • Request for deletion or cancellation of the data. The personal data subject must indicate the data that must be canceled or rectified, providing, if necessary, the documentation or proof that justifies it. The cancellation will lead to the blocking of your data, being kept by the data controller, with the sole purpose of making it accessible to administrative or judicial authorities, always obeying the limitation period that exists on it. Once this period has elapsed, the data controller must proceed to the definitive cancellation of the personal information of the interested or affected party, which resides in our databases or files.

Likewise, the data subject may request the deletion or cancellation of their personal data when the treatment of these by the Data Controller or Data Processor is excessive or even inappropriate. The personal data of the data subjects will be kept for the time provided for in the applicable regulations and/or, depending on the case, of the contractual relations between the data subject and the data controller.

In any case, the request to delete the information and the revocation of the authorization will not proceed when the data subject has a legal or contractual duty to remain in the database.


The Data Subjects may exercise habeas data at any time and effectively to guarantee their right of access, rectification, deletion and proof of authorization before KEYBE through any of the following contact channels enabled:

Email: you can contact us via email at


The following are the legally permitted ways to exercise the right to habeas data:

  • On your own behalf: you, as the data subject of personal data that is stored in databases and/or files of KEYBE, will have the right to know, update, access, rectify, delete, and be informed about the use of your data, request proof of authorization granted, and revoke the authorization granted.
  • Through a proxy: This right can be exercised by the duly identified interested party or by the proxy of the data subject of the personal information, for which the duly authenticated special or general power of attorney must be attached to the request.
  • Exercise of the right of minors: Minors must exercise their right to habeas data through whoever proves their legal representation.


  • Query Procedure: Data Subjects who wish to make queries, should bear in mind that KEYBE, as the Data Controller, will provide said persons with all the information contained in the individual record or that is linked to the data subject’s identification. The query will be made through the channels enabled by KEYBE and will be answered within a maximum term of ten (10) business days from the date of receipt of the request. When it is not possible to attend the query within said term, the interested party will be informed, stating the reasons for the delay and indicating the date on which the query will be attended, which in no case may exceed five (5) business days following expiration of the first term, notwithstanding the provisions contained in special laws or regulations issued by the National Government that may establish lower terms, taking into account the nature of the personal data.
  • Claim Procedure: The Data Subject who considers that the information contained in a KEYBE database should be subject to correction, updating or deletion, or when they notice the alleged breach of any of the duties contained in Law 1581 of 2012, may submit a claim before the Data Controller or the Data Processor, which will be processed under the following rules:
    • The claim will be formulated by means of a request addressed to the data controller or the data processor, with the identification of the data subject, the description of the facts that give rise to the claim, and the address, accompanying the documents that you want to enforce.
    • If the claim is incomplete, the interested party will be required within five (5) days after receiving the claim to correct the faults. After two (2) months from the date of the request without the applicant submitting the required information, it will be understood that they have withdrawn the claim.
    • In the event that the person who receives the claim is not competent to resolve it, he or she will transfer it to the corresponding person within a maximum term of two (2) business days and will inform the interested party of the situation
    • Once the complete claim has been received, within a period of no more than two (2) business days, a caption that says “claim in process” and the causes that motivated it will be included in the database. Said caption must be maintained until the claim is resolved in substance.
    • The maximum term to attend the claim will be fifteen (15) business days from the day following the date of receipt. When it is not possible to attend the claim within said term, the interested party will be informed of the reasons for the delay and the date on which their claim will be addressed, which in no case may exceed eight (8) business days following the expiration of the first term.


This policy can be adjusted or modified at any time, for which reason we recommend that you periodically review our corporate website, through which you will be notified of the change and the latest version of this Policy or the mechanisms to obtain a copy of it.


KEYBE, in compliance with the principle of demonstrated responsibility, has internally designated [Daniel Agudelo] as Personal Data Protection Officer (“DPO”), who will be in charge of implementing the policies and procedures adopted by KEYBE to comply with the norm of personal data protection, as well as the implementation of good personal data management practices within the company.

The designated KEYBE DPO is internally responsible for updating and distributing the Policy, which is why any change made must be approved by them. If you, as the data subject, do not agree with the changes made to it, you can exercise your right to habeas data through the channels and in the manner established in this Policy.

At KEYBE the Data Protection Officer is [Daniel Agudelo]


This Policy became effective on [January 1, 2020]


For clients and users of our Website and, in general, any Personal Data Subject residing in a country of the European Union, as well as for clients who purchase KEYBE’s products or services in a country of the European Union, governs the provisions of this annex, which is applied in accordance with the Privacy and Protection of Personal Data Policy of our stakeholders and is an integral part of it.


KEYBE collects personal data from its customers and Website users each time they use our services, including when they use our Website or when they interact with us electronically or through our customer service contact channels.


KEYBE may collect information and personal data from customers and users of its Website, that may vary due to technological facilities, nature of the product or service to be supplied, among others. For that purpose, we may collect the following personal information:

  • General identification data: Name and surname of the client or user, date of birth, identification or ID number, gender, marital status, profession or trade, postal and/or electronic address (personal and/or work), nationality and/or country of residence, landlines and mobile contact numbers (personal and/or work).
  • Socio-economic content data: Personal data of the cardholder (names and surnames, type and identification number), billing address information, credit card information(s).
  • Sensitive data: biometric data, including images, photographs, videos, voices and/or sounds, and fingerprints that identify or make identifiable our clients and users and/or any individual who is or transits in any place where KEYBE has installed video surveillance camera or georeferencing equipment.
  • Other data: IP of the client, through cookies, and information about the location of your device if you have been browsing our website or using our mobile application.
  • Information on purchasing channels (including representatives or agents, call centers, websites, mobile applications)
  • Information and personal data collected through surveys, focus groups or other market research methods.
  • Information required by officials or customer service representatives, such as sales and/or customer relations representatives, in order to attend to requests or claims.
  • Certain categories of personal data, such as those related to racial origin, ethnicity, religion, health, sexual orientation or biometric data, constitute special categories of personal data that require additional protection in accordance with the data protection regulations of the European Union. Although at KEYBE we try to limit the circumstances in which we collect and process data of this nature, it is possible that we collect and process this data from customers and users in certain circumstances.


In addition to the purposes described in paragraph IX of the Privacy and Protection of Personal Data Policy, KEYBE will process your data for the following purposes:

  • Celebration and management of the contractual relationship.
  • Management of marketing activities.
  • Compliance with legal and security obligations.
  • Loyalty programs.
  • Personalized communications.
  • Personalization of content.
  • Analysis and processing of data through Artificial Intelligence.


The personal data provided by clients or users will be kept as long as the commercial or contractual relationship is in force. The foregoing, notwithstanding its conservation for the years necessary to comply with legal obligations, especially in accounting, fiscal and tax matters, and may be kept for a period of up to ten (10) years. For marketing purposes, we will keep your personal data until you ask us to delete or cancel it


The fundamental legal basis that allows us to process the personal data of clients and users of our Website is the execution of any contract with KEYBE, from which rights and obligations are derived for the parties to the contractual relationship.

Also, there are legal obligations in tax and fiscal matters, among others, that oblige us to process your personal data in compliance with the procedures and requirements that KEYBE must comply with before the authorities and entities of control and surveillance of any jurisdiction in which these operate.

For the provision of the services acquired, as well as in compliance with certain legal requirements, certain essential data must be collected. The client or user is obliged to provide that personal data (truthful and updated) that is required by legal requirement, and that that is necessary to sign the contract. In case of not providing it or requesting its deletion prior to the total execution of the contract, we will not be able to manage and perfect the contractual relationship, and may even communicate inaccurate data.

On some occasions, the treatment we carry out is based on our legitimate business interest, such as fraud prevention, or the distribution by email of commercial communications about products and services similar to those contracted by you; provided that they do not prevail over the interests or the rights and freedoms of the clients.

The processing of personal data for the distribution of commercial communications and, where appropriate, the treatment of special categories of data is carried out by KEYBE based on the consent given by the client or user.

Whenever we request your consent for any treatment, we will inform you about it at that time. In any case, we inform you that you have the right to withdraw your consent at any time, without the withdrawal of that consent conditioning the execution of the contract. If you are a registered user of our services, you can change your privacy preferences at any time, modifying your online profile, and accessing your private area. In addition, all commercial communications that we send you by email, SMS, PUSH or WhatsApp, will have an option to “unsubscribe” that will allow you to stop receiving electronic communications of a commercial nature. Although we do everything possible to process requests to unsubscribe from commercial communications within a period of fifteen (15) business days from when we receive the request, it is possible that you will receive some commercial communication during that period.


The data of the clients and users may be legitimately communicated to the following third parties:

  • For the management of the contractual relationship.
  • For marketing activities, although we may share your data with data processors or with commercial partners, we inform you that KEYBE will not sell your personal data to any third party.
  • For the fulfillment of legal obligations.
  • For loyalty programs.

In the event that data is transferred outside the European Economic Area, it will be done in accordance with the GDPR (Regulation (EU) 2016/679 of the European Parliament and of the Council, of April 27, 2016, regarding the Protection of Natural Persons with regard to the Processing of Personal Data and the Free Circulation of this Data, as well as the national laws of the Member States on the matter). For transfers outside the EEA, KEYBE uses contractual data protection clauses adopted by the European Commission and the EU – US Privacy Shield as a guarantee of those transfers made to countries that do not have an adequacy decision from the European Commission.


  • You have the right to obtain confirmation on whether or not we are treating your personal data.
  • You have the right to access your personal data, as well as to request the rectification of inaccurate data or, where appropriate, request its deletion when, among other reasons, the data is no longer necessary for the purposes for which it was collected. Likewise, you will have the right to the portability of your data in the cases provided for in the regulations.
  • n certain circumstances, you may request the limitation of the processing of your data, in which case, with the exception of its conservation, we will only treat it for the formulation, exercise or defense of claims or in the other cases provided for in the applicable legislation.
  • In certain circumstances and for reasons related to your particular situation, you may object to the processing of your data. We will stop processing the data, except for compelling legitimate reasons, or for the formulation, exercise or defense of possible claims.
  • Finally, regarding those treatments that you have voluntarily consented to, you may withdraw your consent at any time; but this withdrawal may not affect the fulfillment of the legal obligations in responsibility of KEYBE.

To exercise your rights, you must send a request through the means enabled by KEYBE, attaching the document that proves your identity, the passport for validation associated with international flights, the description of your request and the means of contact:

38. Enabled media:


If you wish to obtain more information about your rights, if you have not obtained satisfaction in the exercise of your rights, and/or wish to file a claim, you can do so by contacting the data protection control authority of the corresponding country.


KEYBE does not carry out direct marketing to minors, nor can they be users of the products or services we offer, unless they act through, or are duly authorized by, their parents or by those who have parental authority or legal representation of the minor.


This annex is effective from the day of its publication.


This Acceptable Use Policy (“AUP”) describes the rules that apply to any party (“Customer”) that uses any product and service (“Services”) provided by Keybe, or any of its affiliates (collectively, “Keybe”), and any user of any software application or service made available by the Customer who interacts with the Services (“End User”). The examples described in this AUP are not exhaustive. The Client is responsible for compliance with this AUP by its End Users. If the Client or any End User violates this AUP, Keybe may suspend the use of the Services by the Client. This AUP may be updated by Keybe from time to time with reasonable notice, which may be provided through the customer’s account, email, or by posting an updated version of this AUP at

The use of inappropriate content or users is not allowed. Do not use the Services to transmit or store any content or communication (commercial or otherwise) that is illegal, harmful, unwanted, inappropriate, objectionable, confirmed to be criminal misinformation, or poses a threat to the public. This prohibition includes the use of the Services by a hate group or the content or communications that come from a hate group or that are exploitative, abusive or inciting hatred.

Forbidden activities. Do not use the Services to participate in or promote any activity that is illegal, misleading, harmful, violates the rights of others, or detrimental to Keybe’s business operations or reputation, including:

  • Violations of the laws. Violation of applicable laws, regulations, or industry or guidance standards (collectively, “Applicable Laws”). This includes the violation of applicable laws that require (a) the consent that is obtained before transmitting, recording, collecting, or monitoring the data or communications or (b) the fulfillment of requests to opt out of any data or communication.
  • Interference with the services: Interfere with or negatively affect any aspect of the Services or any third-party network that is linked to the Services.
  • Falsification of identity or origin: Creating a false identity or any attempt to deceive others as to the identity of the sender or the origin of any data or communication.

Do not violate the integrity of the Services, including:

  • Bypass the limitations of the Services: Attempt to circumvent, exploit, defeat or deactivate the limitations or restrictions imposed on the Services.
  • Security vulnerabilities: Find security vulnerabilities to exploit the Services or try to circumvent any security mechanism or filtering capacity.
  • Disabling the Services: Any denial-of-service attack (DoS Attack) on the Services or any other conduct that attempts to interrupt, disable or overload the Services.
  • Harmful code or bots: Transmitting code, files, scripts, agents or programs with the intention of doing harm, including viruses or malware, or using automated means, such as bots, to access or use the Services.
  • Unauthorized Access: Attempting to gain unauthorized access to the Services.

Data Protection: The Client is responsible for determining whether the Services offer adequate safeguards for the Client’s use of the Services, including, but not limited to, any safeguards required by Applicable Laws, prior to transmitting or processing, or before allowing End Users to transmit or process any data or communication through the Services.

Violations of this AUP, including any prohibited content or communication, can be reported to The Client agrees to immediately report any violation of this AUP to Keybe and to provide cooperation, as requested by Keybe, to investigate and/or remedy such violation as soon as possible.


Our Vulnerability Disclosure Program aims to minimize the impact that any security breach has on our tool or on users. To be eligible for the Program, the vulnerability must exist in the latest public version. You must remember that only security vulnerabilities will be scored.

Guidelines and scope limitations

Before reporting, please review the following information, including our vulnerability disclosure schedule, scope, and other guidelines. To encourage vulnerability investigation and avoid any confusion between good faith hacking and malicious attack, we ask that you:

  1. Follow this Disclosure Program, as well as any other relevant agreements
  2. Do not cause any damage, do not hinder the flow of the application or act against our Terms of Use Agreement
  3. Do not intentionally access non-public Keybe data more than is necessary to demonstrate vulnerability.
  4. Do not access, modify, destroy, save, transmit, alter, transfer, use or view data that belongs to someone other than you. If a vulnerability provides inadvertent access to data, stop testing, purge local information, and submit a report immediately.
  5.  Avoid violating the privacy of others, disrupting our systems, destroying data and/or impairing the user experience.
  6. Do not compromise the privacy or security of our customers or the operation of our services. Such activity will be treated as illegal.
  7. Maintain the confidentiality of the details of any vulnerabilities discovered, in accordance with this Disclosure Schedule. Uncoordinated public disclosure of a vulnerability may result in disqualification from this program.
  8. Comply with applicable laws and regulations.
  9. Use only designated official channels to discuss vulnerability information with us.
  10. By conducting a genuine vulnerability investigation in accordance with this Disclosure Program, we consider this investigation to be Authorized in accordance with the Computer Fraud and Abuse Act (CFAA) (and/or similar state laws), and we will not initiate or support legal action against you for good faith and accidental violations of this Disclosure Program when conducting a genuine vulnerability investigation.
  11. Exempt from the Digital Millennium Copyright Act (DMCA), and we will not bring a lawsuit against you for circumventing technology controls when conducting a genuine vulnerability investigation in accordance with this Disclosure Program.
  12. Exempt from restrictions in our Terms of Use Agreement that could interfere with conducting a genuine vulnerability security investigation, and we waive those restrictions on a limited basis for genuine vulnerability investigation conducted under this Divulgation Program.
  13. That it is legal, that it helps the general security of the Internet and that it is carried out in good faith.

We reserve the right not to act in the event of findings that do not have a real impact on the integrity and security of our data. Any investigation that violates the conditions of this Program, the Terms of Use Agreement, the documentation related to security and the GDPR, as well as the current legislation, will be treated as an act of bad faith and in an illegal manner. We are not required to provide remuneration, fees or rewards for the disclosure of a vulnerability; such action is at our sole discretion.

If at any time you are concerned or unsure whether your security investigation is consistent with this Disclosure Program, please submit a report through one of our official notification channels before proceeding further.

Scope of application

At this time, the following services and applications are in scope:

Application and web infrastructure:

Outside the scope of application

We only accept manual or semi-manual tests. All findings from automated tools or scripts will be considered out of scope. Additionally, any issues that do not have a clearly identified security impact, missing security headers, or descriptive error messages will be considered out of scope.

These items are also considered outside the scope:

  1. Attacks designed or likely to degrade, deny or negatively affect services or user experience (e.g. denial of service, distributed denial of service, brute force, password spraying, spam…).
  2. Attacks designed or capable of destroying, corrupting, making unreadable (or attempting to do so) data or information that does not belong to you..
  3. Attacks designed or capable of validating stolen credentials, credential reuse, accounting (ATO), hijacking, or other credential-based techniques.
  4. Intentionally accessing data or information that does not belong to you beyond the minimum viable access necessary to demonstrate vulnerability.
  5. Perform physical, social engineering, or electronic attacks against our staff, offices, wireless networks, or property.
  6. Security issues in third-party applications, services or dependencies that integrate with Keybe’s products or infrastructure and that do not have a demonstrable proof of concept of vulnerability (e.g. libraries, SAAS services).
  7. Security issues or vulnerabilities created or introduced by the informant (for example, modifying a library we trust to include a vulnerability for the sole purpose of receiving a reward).
  8. Attacks made on any system not explicitly mentioned as authorized and within the scope of application.
  9. Reports of lack of “best practices” or other guidelines that do not indicate a security problem.
  10.  Attacks related to email servers, email protocols, email security (e.g. SPF, DMARC, DKIM) or spam.
  11.  Lack of cookie indicators in non-sensitive cookies.
  12. Reports on insecure SSL/TLS encryption (unless accompanied by a working proof of concept).
  13. Reports on how you can find out if a certain customer can authenticate with an amoCRM product or service.
  14.  Mapping reports between code names and customer names.
  15.  Simple port or IP scan reports.
  16. Missing HTTP headers (for example, missing HSTS).
  17. Email security best practices or controls (e.g. SPF, DKIM, DMARC).
  18. Banners, fingerprints, or software or infrastructure acknowledgments with no proven vulnerability.
  19. Informes de clickjacking o autoXSS.
  20.  Reports of DNS records that are publicly resolvable or accessible to internal hosts or infrastructure.
  21. Phishing based on domains, typosquatting, punycodes, bitflips or other techniques.
  22.  Violation of any law or breach of any agreement (or any report thereof).


The results must be supported by clear and precise documentation, without speculative information. All findings should have an indication of relevance and impact. Remember to provide a detailed summary of the vulnerability, including the purpose, steps, tools, and artifacts used during the discovery that will allow us to reproduce the vulnerability.

To ensure that your observations are communicated correctly, you must use only approved channels, that is, you must communicate the discovered vulnerability by email to


    1. This Security Overview is incorporated into, and forms part of the Keybe Terms of Service, as set out in, which the Client has accepted, or a signed master sales Agreement, or other similar written agreement between Keybe and the Client which we call: “Contract.” In this Security Description of Keybe Services, (Security Description), references to “Keybe” will collectively refer to KEYBE AI CORP., 55 RIVERWALK PLACE INT 749, WEST NEW YORK, NJ, 07093-0709, and its Affiliates. The terms “Customer” shall refer to you, the Customer and your Affiliates.
    1. Objective. Keybe is committed to maintaining the customer’s trust. The purpose of this Security Description is to describe the security program for the Keybe Services (“Services”). This Security Description describes the minimum security standards that Keybe maintains to protect Customer Data (as defined in the Agreement) from unauthorized use, access, disclosure, theft or manipulation. In addition to this Security Description, the security documentation for the Keybe API. As security threats change and evolve, Keybe continues to update its security program and strategy to help protect Customer Data. Keybe reserves the right to update this Security Description from time to time; always, however, any update will not materially reduce the general protections set forth in this Security Description. Any capitalized term not defined in this Security Description will have the meaning given in the Privacy Agreement
    1. Covered Services. This Security Description describes the architecture, administrative, technical, and physical controls, and third-party security audit certifications that are applicable to the Services. The Beta Offerings and any services provided by telecommunications providers involved in routing, providers of various services and the connection of Customer communications are not covered by this Security Description.
    1. Organization and security program. Keybe maintains a risk-based security assessment program. The framework for Keybe’s security program includes administrative, technical and physical safeguards reasonably designed to protect the confidentiality, integrity and availability of customer data. Keybe’s security program is intended to be appropriate to the nature of the Services provided, the size, and complexity of Keybe’s business operations. Keybe has a team dedicated to managing the security program. This team facilitates and supports independent third party audits and evaluations. Keybe’s security framework is based on the ISO 27001 Information Security Management System, which is currently in the certification process, and includes programs that cover: Policies and Procedures, Asset Management, Access Management, Cryptography , Physical Security, Operations Security, Communications Security, Business Continuity Security, People Security, Product Security, Cloud and Network Infrastructure Security, Security Compliance, Security of Third Parties, Vulnerability Management, as well as Security Supervision and Incident Response. Security is represented at the highest levels of the company, with Keybe’s Head of Trust and Safety meeting with the Board of Directors on an ongoing basis to discuss issues and coordinate company-wide security initiatives. Information security policies and standards are reviewed and approved by management at least once a year and are made available to all Keybe employees for consultation.
      1. Confidentiality. Keybe has controls to maintain the confidentiality of the Client Data that the Client makes available to the Services, in accordance with the Agreement. All Keybe employees and contracted personnel are bound by internal policies and by a signed contract in relation to maintaining the confidentiality of customer data and are contractually bound to these obligations. In turn, Keybe conducts independent investigations of the behaviors and procedures of Keybe’s employees and suppliers.
    1. Security of people.
        1. 1. Background verification of employees. Keybe conducts background checks on individuals who join Keybe in accordance with applicable local laws. Keybe currently verifies the individual’s education and previous employment, and also conducts referral checks. When permitted by local labor law or statutory regulations, and depending on the role or position of the prospective employee, Keybe may also carry out criminal, credit, immigration and security checks.
        2. 2. Training of employees. At least once a year, all Keybe employees must complete the security and privacy training that covers security policies, best security practices, and privacy principles. Licensed employees may have additional time to complete this annual training. Keybe’s dedicated security team also conducts phishing awareness campaigns and communicates emerging threats to employees. Keybe has also established an anonymous hotline for employees to report any unethical behavior where anonymous reporting is legally permitted.
    1. Management of third-party providers
        1. 1. Evaluation of suppliers. Keybe may use third party providers to provide Services. Keybe conducts a security risk-based assessment of prospective vendors prior to working with them to validate that prospective vendors meet security requirements. Keybe periodically reviews each provider in light of Keybe’s business continuity and security standards, including the type of access and classification of the data accessed, the controls necessary to protect the data, and legal/regulatory requirements. Keybe ensures that customer data is returned and/or deleted at the end of the relationship with the provider. To avoid doubt, telecommunications providers are not considered subcontractors of Keybe.
        2. 2. Agreements with suppliers. Keybe enters into written agreements with all its suppliers, that include confidentiality, privacy and security obligations that provide an adequate level of protection for the personal data contained in customer data that these suppliers may process. Keybe conducts ongoing research and evaluations of its providers’ practices at least once a year.
    1. Architecture and data segregation. The cloud communication platform for Keybe Services is hosted on Google Cloud Platform (“GCP”). The current location of the GCP data center infrastructure used to provide the Keybe Services is in the United States. More information about the security provided by GCP can be obtained on the security web page available at Keybe’s production environment within GCP, where customer data and customer-facing applications are located, is a logically isolated virtual private cloud (VPC).
    1. Infrastructure security design. Keybe is based on and uses the GCP security design. You can view the information at
      • Google has a global scale technical infrastructure designed to provide security for the entire information processing life cycle at Google. Provided through this infrastructure is a secure implementation of services, a secure storage of data with end-user privacy protections, secure communications between services, a secure and private communication between clients on the Internet, and a secure operation by the administrators.
      • Google uses this infrastructure to compile its Internet services, including user services, such as Search, Gmail, and Photos, and business services, such as G Suite and Google Cloud.
      • Infrastructure security is designed in progressive layers that begin with the physical security of the data centers, continue with the security of the hardware and software that support the infrastructure, and end with the technical constraints and processes in place to support the operational security.
      • Google invests heavily in protecting its infrastructure, with hundreds of dedicated security and privacy engineers spread across all Google divisions, many of whom are distinguished authorities in the industry.
    1. Access controls.
        1. 1. Access Provisioning. To minimize the risk of data exposure, Keybe follows the principles of least privilege through a team-based access control model when provisioning access to the system. Keybe personnel is authorized to access customer data based on their job function, role and responsibilities, and such access requires the approval of the director of the area to which the employee belongs. Access rights to production environments are reviewed at least semi-annually. An employee’s access to Customer Data is quickly removed upon termination of employment. In order to access the production environment, an authorized user must have a unique username and password, multi-factor authentication, and be connected to the Keybe virtual private network (VPN). Before an engineer is granted access to the production environment, access must be approved by management and the engineer is required to complete internal training for such access, including training on the corresponding equipment systems. Keybe records high-risk actions and changes in the production environment. Keybe leverages automation to identify any deviations from internal technical standards that could indicate anomalous/unauthorized activity to raise an alert within minutes of a configuration change.
        2. 2. Password Controls. Keybe’s current policy for managing employee passwords follows the NIST 800-63B, guide, and as such, our policy is to use longer passwords, with multi-factor authentication, but not requiring special characters or frequent changes. When a customer logs into their Keybe account, Keybe hashes the user’s credentials before storing them. A customer can also require their users to add another layer of security to their account by using two-factor authentication (2FA).
        3. 3. Change Management. Keybe has a formal change management process to manage changes to software, applications, and system software that will be deployed to the production environment. Change requests are documented using a formal and auditable system of record. Before a high-risk change is made, an assessment is performed to consider the impact and risk of a requested change, change recognition testing, approval of the deployment to production by the appropriate approvers, and procedures for reversion. Changes are reviewed and tested before going into production.
    1. Secure Socket Layer. Keybe uses SSL (Secure Socket Layer) which is the standard security technology to establish an encrypted link between Keybe’s web servers and a browser. This secure link ensures that all transferred data is private. Also called TLS (Transport Layer Security). You can find the complete information at:
    1. Web Application Firewall (WAF). Every request to the WAF is inspected with the rules engine and threat intelligence curated from the protection of approximately 25 million websites. Suspicious requests can be blocked, questioned or logged based on Keybe’s needs, while legitimate requests are directed to the destination regardless of whether they are on premises or in the cloud. Complete information on the service can be found at:
    1. Vulnerability management. Keybe maintains controls and policies to mitigate the risk of security vulnerabilities in a measurable time frame that balances risk and business/operational requirements. Keybe uses a third-party classified tool to conduct regular vulnerability scans to assess vulnerabilities in Keybe’s cloud infrastructure and corporate systems. Critical software patches are proactively evaluated, tested, and applied. For Keybe services, operating system patches are applied through the rebuild of a base virtual machine image and are deployed to all nodes in the cluster according to a predefined schedule. For high-risk patches, Keybe will deploy directly to existing nodes through internally developed orchestration tools.
    1. Penetration testing. Keybe performs penetration testing and contracts with independent third-party entities to carry out penetration testing at the application level. Penetration test results are quickly prioritized, trialed, and remediated by Keybe’s security team.
    1. Security incident management. Keybe maintains security incident management policies and procedures in accordance with NIST SP 800-61.Keybe’s Security Incident Response Team assesses the threat of all relevant vulnerabilities or security incidents and establishes remediation and mitigation actions for all events. Keybe keeps security records for 360 days. Access to these security logs is limited to senior management only. Keybe uses third-party tools and services to detect, mitigate, and help prevent distributed denial of service (DDoS) attacks.
    1. Discovery, investigation and notification of a security incident. Upon discovery or notification of any security incident, Keybe:
      • 1. Will promptly investigate said Security Incident.
      • 2. To the extent permitted by applicable law, will promptly notify the Client. The Client will receive a notification by email associated with the Keybe account.
      • 3. Will take the necessary measures and corrective measures to resolve the incident as soon as possible.
    1. Resilience and continuity of service. Keybe’s infrastructure uses a variety of tools and mechanisms to achieve high availability and resilience. The infrastructure spans multiple fault-independent GCP Availability Zones in physically separated geographic regions. For Keybe services, there are manual or automatic capabilities to redirect and regenerate hosts within the Keybe infrastructure. The infrastructure is able to detect and route problems experienced by hosts or even entire data centers in real time and employ orchestration tools that have the ability to regenerate hosts, building them from the latest backup. Keybe uses specialized tools that monitor server performance, data, and traffic load capacity within each Availability Zone and colocation data center. If suboptimal server performance or overloaded capacity is detected on a server within an Availability Zone or colocation data center, then these specialized tools will increase capacity or shift traffic to alleviate any suboptimal server performance or capacity overload. Keybe has notifications of different levels that work immediately and has the ability to take immediate action to correct the causes behind these problems if specialized tools cannot.
    1. Backup and recovery. Keybe regularly backs up account information, logs, recordings, chats, documents, and other critical data using GCP’s cloud storage. Backup data is preserved redundantly across Availability Zones and is encrypted in transit and at rest using Advanced Encryption Standard (AES-256) 256-bit server-side encryption.


Keybe brings together different global services and providers of cloud services, financial services and telecommunications services (Providers). By accepting the Service Agreement you are directly accepting the Terms and conditions of use of the Providers

The following is the list of Keybe providers and contains the link to their own Terms and Conditions of use of the service:

  1. WhatsApp Business:
  2. Facebook:
  3. Instagram:
  4. Google Cloud Platform:
  5. IBM Watson:
  6. Amazon Web Services:
  7. Mandrill:
  8. CloudFlare:
  9. Mongo DB:
  10. Zendesk:
  11. Text messages (SMS): Depending on the country, we use different telecommunications providers (Carriers) that have different delivery rules. We make an effort to consolidate the best benefits and costs for you. The following should be taken into account:
    • Message prices vary depending on the territory, the number of messages sent and the number of characters used in the message.
    • The character limit allowed by Carriers in messages is 160 characters, we call this limit Parts.
    • If the number of characters exceeds 1 Part (160 characters), the message will be charged as 2 Parts, if it exceeds 360 characters it will be charged as 3 parts and so on.
    • In some countries we have Premium Messages that allow us to send some special characters and emojis.
    • Premium Messages have more characters, therefore it can increase the number of Parts of the message, therefore it can increase the price.
    • We recommend using this powerful communication channel in an efficient and effective way to achieve successful results. You can reach out to our support channels to help you make better decisions in this regard.