1. Introduction
Thank u for using Databeamer by Full Join (“ we ”, “ us ”)! We value your trust in our software. In return, we ask you to use our services responsibly. By using Databeamer (“our Service ”), you acknowledge that you have read, understood, and agreed to this Acceptable Use Policy.
Our Service adheres to the Dutch Notice and Takedown Code of Conduct issued by the Platform Internetveiligheid (Platform for Internet Security). This Code provides a framework for online service providers like Databeamer to handle reports of potentially unlawful content and to take appropriate action when such content is identified or reported.
This Acceptable Use Policy (“ Policy ”) sets forth the guidelines for the appropriate and lawful use of our Service. By using Databeamer, you agree to comply with this Policy and not to misuse our Services. Violations may result in restricted access, suspension, or termination of your use of the software.
Encryption
Databeamer uses AEAD (Authenticated Encryption with Associated Data) streaming end-to-end encryption to protect files both in transit and at rest, ensuring confidentiality and integrity at every stage. This encryption model means that only the sender and recipient can access file contents. We have no ability to view, decrypt, or retrieve user files under any circumstances.
Retention
Transferred files on Databeamer are retained for a maximum of three (3) days from the time of upload. After this period, files are automatically and permanently deleted from our systems. Our Service does not include file contents in any backups; only limited metadata related to the transfer will be retained for operational and compliance purposes.
Updates to this policy
Full Join may update this Policy at any time to reflect changes in regulations, technology, or our services. Users are responsible for reviewing this Policy periodically. Continued use of Databeamer after updates constitutes acceptance of the revised terms.
2. Prohibited Uses
Use of our Service must be responsible, lawful, and aligned with its intended purpose. You may not use the Service in any way that violates these rules.
2.1 Prohibited Activities
You are not permitted to use our Service to:
- Break the law: Transmit, store, or distribute content that violates applicable laws, regulations, or the rights of others,
- Engage in fraud or harm: Participate in or facilitate activities such as fraud, identity theft, money laundering, impersonation, or other unlawful acts,
- Disrupt the Service: Interfere with or degrade the operation of the Service or supporting infrastructure, including performing denial-of-service (DoS) attacks or introducing harmful code such as viruses, worms, or malware,
- Gain unauthorized access: Attempt to bypass security controls, gain unauthorized access to systems or data (ours or others’), or probe for vulnerabilities,
- Violate intellectual property rights: Infringe upon copyrights, trademarks, trade secrets, or other proprietary rights, including using or distributing content without appropriate permission,
- Misuse encryption: Use encrypted storage or transfers to conceal illegal activities, including but not limited to trafficking, child sexual abuse material (CSAM), or terrorist communications,
- Spam or send unauthorized communications: Send unsolicited, bulk, deceptive, or unlawful communications (e.g., spam, phishing, or promotional messages without consent),
- Abuse pricing or subscriptions: Circumvent subscription limits, resell accounts without permission, or use discounted plans for unauthorized resale or redistribution,
- Resell or offer our services through unauthorized channels: Purchase our services from, or resell to, any party without our prior written authorization,
- Abuse reporting or escalation mechanisms – Use complaint, flagging, or dispute tools in bad faith, including submitting unfounded or malicious claims,
- Facilitate or support misuse – Assist, enable, or incentivize others to carry out any of the prohibited activities listed above.
1.2 Prohibited Content
You may not use our Service to create, upload, store, send, request or distribute content that:
- Promotes, supports, or facilitates illegal activity,
- Harasses, threatens, defames, or abuses others,
- Includes pornography or sexually explicit material,
- Promotes terrorism, violent extremism, or hate speech,
- Sells or advertises counterfeit or unlicensed goods,
- Misleads recipients or impersonates individuals or organizations,
- Contains misleading, manipulated, or unlawful pricing (e.g., price gouging),
- Promotes scams, pyramid schemes, or deceptive financial products.
We may take down prohibited content, suspend or terminate access, and take further action as required by law or to protect others.
1.3 Prohibited Persons and Entities
You may not use the Service if you or the organization you represent:
- Are/Is in any other jurisdiction then the EU, the UK, Norway or Switzerland,
- Are/Is on any sanctions list or prohibited from doing business under applicable trade, export, or economic sanctions laws (including but not limited to laws in the EU and UK),
- Are/Is located in a country or region where use of the Service is restricted or prohibited by law,
- Have publicly expressed, promoted, or supported positions, objectives, or actions that could reasonably be seen as endorsing hate, violence, or physical harm toward others, whether through public statements, affiliations, or behavior,
- Are/Is acting on behalf of, or for the benefit of, any person or organization listed above.
We reserve the right to deny access or remove accounts in compliance with our legal obligations.
1.4 Misuse of Accounts or Credentials
Users must:
- Keep account credentials confidential and secure,
- Use their account only for their own organization, unless specifically delegated,
- Notify us immediately of any suspected misuse or breach,
- Avoid sharing access with unauthorized individuals.
We may suspend or revoke access if we detect misuse or compromise.
1.5 Reverse Engineering and Unauthorized Copying
Except as explicitly allowed by law, you may not:
- Reverse engineer, decompile, or disassemble any part of the Service,
- Copy, modify, translate, or create derivative works based on the Service,
- Use the Service or our IP to build competing products or services,
- Remove, alter, or obscure any proprietary notices or labels.
3. Enforcement and Consequences
3.1 Security and compliance obligations
To ensure the responsible use of Databeamer, all users are expected to uphold strict security practices and adhere to relevant legal standards.
- Users must maintain the confidentiality of their authentication credentials and ensure they are not shared or disclosed to unauthorized parties.
- Users must comply with all applicable data protection laws and regulations, including GDPR or other jurisdiction-specific requirements when handling personal data.
3.2 Misuse of Databeamer service
This enforcement provision applies solely to prohibited uses of the Databeamer service as set forth in Chapter 2 and does not extend to the contents of any files transmitted via the platform.
Full Join reserves the right to investigate any suspected violations of prohibited uses of the Databeamer services. If a violation is confirmed, we may take actions including, but not limited to:
- Issuing warnings or requesting corrective actions,
- Suspending or terminating access to our Service,
- Reporting violations to law enforcement or regulatory authorities if required.
3.3 Unlawful Content and Rights Infringement
All file data is protected by end-to-end encryption and remains inaccessible to Full Join. If we are informed about content distributed via our service that may be unlawful or infringe on the rights of others, we will follow the procedure outlined in this chapter. By using our platform, you acknowledge and agree to comply with the process described below.
3.3.1 Submitting a report
Any individual or organization may submit a notice (a ” Report ”) regarding unlawful or otherwise inappropriate content shared via our Service. It is the responsibility of the reporting party (the “ Notifier ”) to ensure the accuracy and completeness of the Report. If the Report relates to a criminal investigation, we must be able to verify that it originates from a recognized investigative or law enforcement body. For all other types of reports, the following minimum information must be provided:
- contact details of the Notifier,
- a clear explanation as to why the content is considered unlawful or in violation of our Privacy Policy or Acceptable Use Policy,
- all relevant information necessary for us to evaluate the content on its unlawfulness,
- a justification as to why Full Join is the appropriate party to address the issue.
By submitting a Report, the Notifier agrees to indemnify Full Join against any legal claims resulting from actions taken in response to the Report. This includes (1) claims from the content provider whose material is under review and (2) any claims from the Notifier related to the transmission or removal of the reported content.
If a Notifier believes that urgent action is required, they must explicitly state and justify the reasons for urgency in their Report. Full Join will assess the request and determine whether the circumstances justify expedited handling.
3.3.2 Review and response
Upon receipt of a Report, we will review the case and classify it into one of the following categories: A. Reported by authorities: Content flagged by law enforcement or another official investigative body following a criminal inquiry or legal order, B. Clearly Unlawful: Content that is plainly illegal or criminal in nature, as assessed by us based on the provided information, C. Unclear or Disputed: Content that does not clearly fall under category 1 or 2.
This classification determines our response actions:
- If the content falls under category 1 or 2, we will remove the content without delay,
- If the content falls under category 3 and Full Join cannot determine that it is clearly unlawful or punishable, it will not be removed. The Notifier will be informed of this decision,
- If Full Join is unable to conclusively determine the content’s status, we will notify the user (the “Content Provider”) and request either (i) consent to remove the content or (ii) that they contact the Notifier directly. If both parties cannot reach an agreement, the Notifier may pursue further action—such as filing a police report (in case of a criminal issue) or initiating civil proceedings before a Dutch court.
We aim to assess and respond to Reports as promptly as possible, ideally within 7 business days of receipt. When removal of content is deemed necessary, we will take appropriate care to ensure that only the specific content identified in the Report is taken down—no more, no less.
About & Contact
Databeamer by Full Join
Databeamer is created and licensed by Full Join B.V. and is located in Eindhoven, The Netherlands. Full Join is a software and data development/consultancy agency. We develop applications and provide consultancy services, including advising organizations about data, privacy and development projects.
KVK: 71160620
BTW: NL 858 603 573 B01
Contact Us
For more information about this policy or other legal matters, contact us via our Contact Form