pointidentity.com

Terms of Use

Last updated: 12 January 2026 – Version 0.1

The Point Identity Terms of Use define the essential rules ensuring safe, compliant and controlled use of our sovereign platform. They govern access to our identity, access management, secure communications and critical‑infrastructure protection services, ensuring unified security, maximum integrity and uncompromised operational continuity. By using our services, you agree to a contractual framework designed to protect your digital environments, and to preserve the resilience of both yours and ours.

1. DEFINITIONS

This section clarifies key terms to ensure precise understanding of the contractual framework. It prevents ambiguity and strengthens the legal security of the Parties.

User: Any natural or legal person accessing or using the Services.

Services: All solutions, platforms, modules, APIs, SDKs, infrastructures and tools provided by Point Identity.

Platform: The sovereign Point Identity environment including identity, access, secure communications and critical‑infrastructure protection.

DID: Self‑sovereign decentralised digital identifier.

VC: Verifiable digital credential.

ZKP: Zero‑knowledge cryptographic proof.

PQC: Cryptography resistant to quantum attacks.

Terms: These Terms of Use.

Incident: Any interruption, failure or anomaly affecting the Services.

 

2. ACCEPTANCE OF THE TERMS

This section establishes the contractual foundation: using the Services implies explicit and irrevocable acceptance of the Terms.

By accessing or using the Services, the User fully and unreservedly accepts these Terms. If the User does not agree, they must cease all use immediately. This acceptance ensures a clear, transparent and legally binding framework.

 

3. CHANGES TO THE TERMS

This section protects Point Identity by allowing the Terms to evolve in line with technical, regulatory or security developments.

Point Identity may amend the Terms at any time to reflect:

  • legal or regulatory changes,

  • technical improvements,

  • security updates,

  • necessary contractual adjustments.

Any substantial modification will be communicated through our official channels. Continued use of the Services constitutes acceptance of the updated Terms.

 

4. DESCRIPTION OF THE SERVICES

This section clarifies the exact scope of the Services, preventing excessive or improper interpretation.

Point Identity provides a sovereign unified security platform including:

  • decentralised identity management (DID, VC),

  • Zero Trust access control,

  • protection of digital communications,

  • critical‑infrastructure security,

  • advanced cryptography (PQC, ZKP),

  • APIs, SDKs and integrations,

  • compliance and orchestration tools.

The Services may be accessed via website, applications, APIs, SDKs or dedicated interfaces. Point Identity reserves the right to modify, enhance or withdraw certain features for technical, security or regulatory reasons.

 

5. USER RESPONSIBILITIES

This section protects Point Identity by clearly defining User obligations.

The User agrees to:

  • use the Services lawfully and in accordance with the Terms,

  • not attempt to bypass security measures,

  • not introduce malware,

  • protect their credentials and access,

  • immediately notify Point Identity of any unauthorised access,

  • respect the rights of other users and network security,

  • not use the Services for fraudulent, illegal or unlawful activities.

Any violation may result in immediate suspension or termination.

 

6. ELIGIBILITY

This section ensures that only legitimate and legally responsible users access the Services.

The Services are reserved for:

  • adults of legal age,

  • legally constituted entities,

  • individuals or entities with legal capacity to contract.

The User guarantees the accuracy of the information provided and assumes full responsibility for any false declaration.

 

7. INTELLECTUAL PROPERTY

This section protects your technological assets, sovereign architecture and cryptographic innovations.

Point Identity retains full rights over:

  • its technologies,

  • its algorithms,

  • its infrastructures,

  • its trademarks,

  • its interfaces,

  • its cryptographic models,

  • its documentation.

Any unauthorised reproduction, modification, distribution or reverse engineering is strictly prohibited. No implicit licence is granted.

 

8. ACCEPTABLE USE

This section strictly governs authorised uses and protects the platform from abuse.

It is prohibited to:

  • use the Services for illegal, fraudulent or unlawful purposes,

  • violate privacy or the rights of others,

  • disrupt the functioning of the Services,

  • bypass security mechanisms,

  • perform audits, benchmarks or penetration tests without written authorisation,

  • use the Services to harm third parties or critical infrastructures.

Point Identity may suspend or terminate any account in case of violation.

 

9. SUSPENSION AND TERMINATION

This section enables Point Identity to act swiftly in case of risk.

Point Identity may suspend or terminate access to the Services in case of:

  • serious or repeated violation of the Terms,

  • security risk,

  • non‑compliance with legal obligations,

  • abusive or malicious behaviour.

The User may request deletion of their account in accordance with the Privacy Policy.

 

10. SUPPORT AND MAINTENANCE

This section clarifies the scope of support and prevents unrealistic expectations.

Point Identity provides:

  • standard or premium support depending on the contract,

  • security updates,

  • patches,

  • functional enhancements.

Certain interventions may be billed if they fall outside the contractual scope.

 

11. PERSONAL DATA

This section refers to the Privacy Policy to avoid duplication and ensure legal consistency.

Use of the Services involves the processing of personal data. This processing is governed by the Privacy Policy, which forms an integral part of these Terms.

 

12. DISCLAIMER

This section protects Point Identity from unrealistic expectations and operational risks.

The Services are provided “as is”. Point Identity does not guarantee:

  • the complete absence of vulnerabilities,

  • compatibility with all environments,

  • absolute service continuity,

  • uninterrupted performance,

  • suitability for any specific undocumented need.

 

13. LIMITATION OF LIABILITY

This section legally limits Point Identity’s financial exposure.

To the extent permitted by law, Point Identity’s liability is limited to:

  • the total amount paid by the User over the last twelve (12) months,

  • excluding indirect damages, data loss, business interruption or non‑material harm.

 

14. APPLICABLE LAW AND JURISDICTION

This section secures the applicable legal framework.

These Terms are governed by French and European law. In the event of a dispute, the courts of Versailles have exclusive jurisdiction, unless otherwise required by mandatory provisions.

 

15. FORCE MAJEURE

This section protects Point Identity from unforeseeable events.

Point Identity cannot be held liable in the event of unforeseeable or irresistible events such as:

  • natural disasters,

  • large‑scale cyberattacks,

  • global infrastructure failures,

  • armed conflicts,

  • governmental decisions.

 

16. MISCELLANEOUS

This section ensures the legal robustness of the contract.

If any clause is deemed invalid, the remaining clauses remain applicable. No verbal agreement may override these Terms. The Terms constitute the entire agreement between the User and Point Identity. Any tolerance shall not constitute a waiver.

 

17. CONTRACTUAL FRAMEWORK

This section clarifies the associated contractual documents.

These Terms must be read together with:

  • the Privacy Policy,

  • the General Terms of Sale (GTS),

  • any Special Conditions applicable to specific modules,

  • the ethical charters of the Point Identity Foundation.

 

18. CONTACT

For any question or request: legal@slategrey-chinchilla-890702.hostingersite.com

Point Identity, 21 Allée des Saules, 78480 Verneuil‑sur‑Seine, France