InboxEagle / Content Policy
Content Policy
InboxEagle's content policies and procedures for monitoring, reviewing, and managing user-generated content.
InboxEagle Content Policies and Procedures
We Employ Three Sets Of Safeguards To Monitor Our Reviews And Flag Them If They Do Not Pass:
- We run automatic checks for certain content (outlined below) that is not permitted in reviews, such as coarse language and links.
- We monitor the source of reviews. If we see more than two reviews from a single IP address within 24 hours, they are flagged.
- We have integrated into the Website two notification options in connection with any public review:
- we can receive notifications from users that a review is inappropriate, and
- companies can report or delete a review that doesn't meet our Guidelines. Collectively, we call these two options for notifying and reporting reviews "flagging".
Once Reviews Are Flagged, We Review Them And Delete Them If:
- They contain certain content that is not permitted in reviews, such as coarse language and links.
- They contain personal information about another individual, such as a person's name, address, phone number, email address, credit card information, or any other information that could be used to track, identify, contact or impersonate someone.
- They include promotional references or links.
- They violate other people's or companies' rights, including intellectual property rights, rights of privacy/confidentiality, and/or personality rights.
- They are of a marketing nature or have marketing purposes.
- They are unlawful, deceptive, misleading, fraudulent, threatening, abusive, harassing, libelous, defamatory, tortious, obscene, pornographic, or profane.
- They have sexist, political, or racial character.
- They are offensive or in any way breach any applicable local, national, or international law or regulation.
- They violate our Terms of Service or Privacy Policy.
- They are technically harmful (including, without limitation, computer viruses, logic bombs, Trojan horses, worms, harmful components, corrupted data, or other malicious software, harmful data or conduct).