BEE Manager SaaS (Software as a Service)
BEE Manager a product of Liber8 Holdings (Pty) Ltd hereof referred to as :
( “The BEE Manager System”, “The BEE Manager Software System”, “The BEE Manager Online Portal”, ”The Software”, “We”)
The User hereof referred to as :
(“The User”, “User Profile”, “The Client”, “You”)
Terms and Conditions
Only supported document file types are allowed to be stored on the platform. Each upload is validated to check for validity of the document type.
A maximum of 5MB (Five Megabytes) are allowed per upload. Although every effort is taken to ensure documents are securely stored and retrieved, its good practice to ensure you have an offline backup of your documents.
Each created profile has a data storage limit and this is indicated by our space usage indicator on each profiles dashboard.
Abuse of our document storage system can result in a temporary suspension of the system profile where all access to the profile would be blocked pending resolution.
User Data and Input
The BEE Manager system is equipped with the latest in threat detection and hack protection. If, in the event, a profile user tries to insert malicious data by means of brute force attacks, cross site scripting, external automated form completion or any other form of malicious code and activities that aims at challenging the integrity of the data and system, the platform would automatically inform our security department and lock down access to the compromised profile.
BEE Manager assumes that the client/user has a reputable antivirus installed and the latest virus updates have been performed as well as ensure their computer is free from any malware, spyware, cryptoware or computer virus prior to using the system.
BEE Manager utilizes the latest browser features for quality user experiences, security and stability of its performance. Our console would automatically detect supported browsers and deny any browser that poses a security or operational risk.
The BEE Manager online portal makes use of SSL certificates to ensure secure access to the software and this would always be indicated by either a green lock or https:// or both in your address bar on your browser.
Ensure that the url that you are accessing BEE Manager from is correct. To avoid unauthorised collection of data, hacking techniques or phishing scams please ensure that the only links to the BEE Manager portal is indicated below
Browser guarantees and/warrantees are not carried or serviced by BEE Manager or its third parties. Please note that if you do find any bugs related to the BEE Manager software, you can report it to email@example.com. However if any bugs are found within the browser you can contact your browser vendors support line for more help.
The BEE Manager is regularly checked on the latest version of The Google Chrome browser and if any bugs are found that affect the software clients would be notified immediately if a fix is currently in progress.
These cookies are necessary for BEE Manager to operate on your browser. This is an added security layer expires and is reset according to the software’s discretion. The security cookie stored within your browser doesn’t store any personal data other than a browser fingerprint access code that ensures your profile is not tampered with whilst operating your software from your browser.
These cookies ensure that your software tracks any bugs relating to errors that occur during use of the BEE Manager software system, these cookies are automatically detected by the software and via the system and notifies you if the system needs support via our support team or it has resolved to correct itself. However these cookies are set and unset dynamically and has a very short lifespan based on its ability to self-resolve or report.
E-mail and online Messaging System
By using the email and online messaging system you hereby agree to the following terms and conditions.
All emails and user profile linked email addresses are valid, real and active email accounts.
Our emailing system is for use with the BEE Manager software only and does not warrant any illegal or suspicious activities arising from use of such system.
If in the event the system detects abuse of our emailing or messaging platform, it would immediately limit access to the profile of origin.
The online messaging system is not an Instant Messenger or social media platform. The use of this messenger is purely for information and notifications within the system. Notifications are generated via a push system and can only be accessed by people within your company/agencies workgroup.
Our Mercury Procurement module makes use of our email system within its operation of obtaining certificates, however there is a per/hour limit to the amount of email requests it sends. We cannot guarantee delivery of emails to recipients due to a number of factors which includes recipients flagging addresses as spam, incorrect mail recipient addresses, or rejection of mails due to unforeseen circumstances.
By using our Mercury Procurement System you hereby agree to respect the wishes of the recipient in opting to reject or unsubscribe to your requests. If a profile is reported by any Mercury recipient the profile would be added to the BEE Managers Risk User database and the profile would be quarantined pending further investigation.
The BEE Manager system can be accessed via the client and agency portal. This controlled access environments ensure the login process is sanitized and blocked from any malicious activities.
For security purposes, the system would not allow the use of weak passwords under 6 characters long.
If a profile is not allowed to be added on the system due to the profile noted as “Profile Already In Use” and you are certain that the profile belongs to your agency, relevant documents need to be provided to BEE Manager and or its 3rd Parties in order to reactivate the profile or change ownership of the profile.
The BEE Manager system does not employ the use of outside marketing within the system. We aim to keep the system ad free and we do not track any data be it cookies, sessions, user trails, clicks, pixel tags or IP and time trackers used for marketing purposes.
If need be, the system would collect support and bug related data, time settings and system global settings to improve and secure the user experience and operations within the system.
BEE Manager and its 3rd Parties would not sell or distribute data to any other company or organisation. Each profile is carefully controlled and all activities are logged regarding the input and output of data on the system. However BEE Manager and its 3rd Parties cannot be held responsible for loss or damage to data due to user negligence, improper use of the system, granting incorrect user created profile access or improper upload and data formats.
BEE Manager assumes that the user undertakes to create a back of documents and data loaded on the system.
If in the event of a major security breach, the entire system would be locked down to prevent further damage to data and a backup from one of our mirror servers would be restored which could, in severe cases, take up to 8 hours to resolve.
In such cases, BEE Manager and its 3rd Parties cannot be held liable for loss of business to the client as we keep security at the utmost importance. In this time data is securely moved from locations which may result in minute anomalies such as user access and/profile settings.
BEE Manager adheres to the Protection of Personal Information Act and would not share any information without written consent from the client or by means of a court order. However clients have full access to their profiles and information stored within.
Fair Usage Policy
Although BEE Manager allows agencies to add multiple users without a set limit, depending on the network load and number of new registrations, we reserve the right to limit any profiles that show an abnormal amount of intensive processing activities.
Due to the system AI, complex calculations memory and processing resources, BEE Manager System would distribute the load according to the demand at any given time; this would result in a very slight possibility that your system would be fractionally slower during peak processing periods for very large data intensive profiles.
By proceeding your acknowledge and agree all of our terms and conditions herein.