Corporate Legal Document

Terms and Conditions

88 TECH GROUP S.A.S.
Effective as of: April 09, 2024

This document is a legal agreement between you and 88 TECH GROUP S.A.S. By accessing or using our website and services, you agree to comply with these terms and conditions. If you do not agree with any of these terms, please do not use our website or our services.

Policy Document

Version 2.3  | Document Code: TC-2024

In Force

1. Introduction

Foundations and Purpose of the Terms and Conditions

88 TECH GROUP S.A.S.

With the purpose of offering a reliable technological solution, 88 TECH GROUP S.A.S has developed and made available to merchants a payment service called “Payment Gateway,” whose main objective is to facilitate the acceptance of a wide range of local and international payment methods.

By accessing, browsing, or using this service provided by 88 TECH GROUP S.A.S. you acknowledge and accept these Terms and Conditions, which govern the relationship between the company and the users of the platform.

These terms constitute a legally binding agreement that establishes the rights, obligations, and limitations governing the use of the system.

General Scope

The Terms and Conditions cover the use of the platform, user responsibilities, information protection, and the legal provisions governing the payment service.

We facilitate online payments transparently
We promote digital trust between merchants and customers

Our commitment is to ensure that operations are carried out securely, transparently, and in compliance with applicable regulations.

With this introduction, we make it clear that the use of the Payment Gateway implies full and unconditional acceptance of the Terms and Conditions described herein. We invite every user to read them carefully before using the service, as proper compliance ensures smooth interaction among all parties involved.

2. Our Software

Components, Updates, and Usage Responsibilities

We provide an API and other software components to enable you to use the 88 TECH GROUP S.A.S payment service securely and in a standardized manner.

We reserve the right to require the installation or update of versions when necessary to ensure functionality, security, compliance, and compatibility. software updates which may include changes to endpoints, data schemas, client libraries, or integration behaviors.

Technical Scope of the Software

REST/HTTP API implementations and documentation
SDKs and reference examples
Integration tools, admin panel, and utilities
Webhooks and event notification mechanisms

Some components may be optional, but certain features require minimum versions or specific configurations.

Updates and Compatibility

Update Cycles

When new versions are released, we may communicate coexistence periods (deprecations) and deadlines. You agree to keep your integrations up to date to avoid service interruptions.

Compatibility and Environments

Compatibility may depend on environments, dependencies, and configurations managed by you. It is your responsibility to validate the integration in testing before moving to production.

Recurring Billing and Consent

The service may include features to manage recurring charges and subscriptions. It is the sole responsibility of the merchant to obtain and retain the customer’s explicit consent in accordance with applicable regulations and payment method rules.

  • Clearly inform periodicity, amounts, taxes, and cancellation conditions.
  • Provide suspension or cancellation mechanisms in accordance with the law.
  • Maintain verifiable records of the customer’s granted consent.

You acknowledge that version management, the security of your environments, and compliance with legal obligations related to recurring charges are the merchant’s responsibilities. Our software is provided to facilitate operations but does not replace your duties regarding compliance, data protection, or obtaining customer consent.

3. Authorization for the Management of Funds

Retention, Receipt, and Disbursement on Your Behalf

By accepting this agreement, you authorize us to retain, receive, and disburse funds on your behalf when the amounts from your transactions are settled by payment partners; you additionally authorize 88 TECH GROUP S.A.S to hold settlement funds in a deposit (escrow) account until their disbursement in your favor, in accordance with these Terms.

You acknowledge and agree that you are not entitled to receive any interest or compensation on settlement funds held in the deposit account, interest or compensation and that you have no right to direct the deposit account or assign or encumber any interest in it.

Conditions and Limitations on Funds

No interest or compensation shall accrue on settlement funds held in deposit.
The merchant may not direct, instruct, or otherwise dispose of the deposit account.
The merchant may not assign, transfer, or encumber rights over the deposit account or its funds.
Custody is maintained until the crediting of funds to the merchant’s designated deposit account.

These conditions apply to all settlement flows managed by 88 TECH GROUP S.A.S and/or its payment partners.

Admin Panel and Informative Nature

We display in the administration panel the settlement amounts received or scheduled on your behalf. Such information is for informational purposes only and does not constitute a deposit, credit, guarantee, or enforceable obligation by 88 TECH GROUP S.A.S until funds are credited to your designated account.

Validity of Authorization

The authorization granted herein shall remain valid and in full effect until the closure or termination of your account with 88 TECH GROUP S.A.S, without prejudice to obligations that must survive under applicable regulations.

4. Payment Methods

Available Options, Coverage, and Merchant Obligations

We offer a global payment solution that integrates a wide range of payment methods, allowing merchants to accept local options preferred by customers in each country. Through 88 TECH GROUP S.A.S you can orchestrate collections across different channels in a uniform, secure manner with operational visibility.

The catalog of methods evolves over time and may vary by region, acquirer, network rules, and payment partner alliances.

Method Catalog

Electronic wallets (e-wallets)

Availability is subject to country, merchant KYC, business vertical, risk, and compliance.

Direct debit / bank debits

Availability is subject to country, merchant KYC, business vertical, risk, and compliance.

Bank transfers (instant or scheduled)

Availability is subject to country, merchant KYC, business vertical, risk, and compliance.

Cash payments through collection networks

Availability is subject to country, merchant KYC, business vertical, risk, and compliance.

Prepaid cards or vouchers

Availability is subject to country, merchant KYC, business vertical, risk, and compliance.

Other local alternatives enabled by partners

Availability is subject to country, merchant KYC, business vertical, risk, and compliance.

Coverage and Availability

The enablement of a specific method depends on regulatory and operational requirements. In some cases, additional contracts, technical validations, or country-specific configurations are required.

  • Certain methods are exclusive to a region or local payment network.
  • Cutoff and settlement times may differ by method or bank.
  • The processing currency and settlement currency may differ.
Merchant Compliance and Obligations

Each method operates under its own rules (regulatory frameworks, partner policies, and technical standards). The merchant agrees to maintain its integration in compliance with such rules and applicable laws.

  • Respect the terms of use, limits, reversals, chargebacks, and dispute procedures of each method.
  • Comply with applicable KYC/AML, fraud prevention, and restricted list requirements.
  • Clearly inform the payer of payment steps, timelines, fees, and instructions.

The selection and activation of methods are subject to approval and risk and compliance verifications. We may modify, suspend, or temporarily withdraw specific methods when required by partners, authorities, or operational conditions.

5. Taxes

Determination, Collection, Reporting, and Remittance

It is your sole responsibility to determine which taxes (e.g., VAT/IGV/ITBIS/GST, local taxes, withholdings, fees, or contributions) apply to the sale of your goods and services and/or payments received through the 88 TECH GROUP S.A.S platform. You are solely responsible for complying with the corresponding tax obligations in each jurisdiction in which you operate.

88 TECH GROUP S.A.S is not obligated to determine whether a tax applies, nor to calculate, collect, report, or remit any taxes to any authority as a result of your transactions.

Merchant Obligations

Assess the applicability of taxes by country, product/service, channel, and destination.

Set up rules and rates for proper tax collection during checkout.

Issue tax reports and filings according to official deadlines and formats.

Timely remit the amounts collected to the relevant tax authority.

Maintain books, receipts, and transaction traceability for legally required periods.

Issue an invoice or tax receipt when required by law.

Tax configuration (rates, exemptions, withholdings, perceptions, codes) must be managed by the merchant within its systems or tools.

Reports and Informational Nature

We may provide you with transaction exports or operational reports to assist with reconciliation. Such reports are for informational purposes only and may not constitute sufficient tax documentation.

  • Exports of transaction and settlement movements for reconciliation.
  • Filters by payment method, country, currency, or date range.
  • Operational traceability for the merchant’s internal audits.

Common Scenarios

VAT/IGV/ITBIS/GST on Local Sales

The determination of indirect tax depends on the type of goods/services, seller/buyer location, and exemption rules. The merchant must configure the correct rate.

Withholdings/Perceptions

In some jurisdictions, the merchant must apply withholdings or perceptions on payments. Third-party withholdings may also apply under law.

Cross-Border Transactions

Taxes may apply to digital services, service imports, or destination-based rules. Review double taxation and supporting documentation.

Marketplace/Facilitator Model

If operating as a marketplace, additional obligations may apply (e.g., collection on behalf of sellers, third-party reporting, tax splitting).

Legal Notice

We do not provide tax advice nor act as your tax agent. You acknowledge that we may make certain reports to tax authorities related to processed transactions and serviced merchants when required by applicable law.

6. The Security of Your Data

Merchant Responsibilities, Suggested Controls, and Limitations

You are fully responsible for the security of the data stored on your website, applications, and systems (including personal, financial, payment, and transaction information, hereinafter “Data”). 88 TECH GROUP S.A.S will make commercially reasonable efforts to protect your account from unauthorized access and fraudulent login attempts.

You agree to comply with all applicable laws on privacy, information security, and payments, and you are responsible for safeguarding access credentials to the admin panel, API keys, secrets, and other authentication artifacts linked to your operation.

Shared Responsibility Model

Merchant Responsibilities
  • Comply with applicable laws, regulations, and standards (privacy, cybersecurity, and payments).
  • Protect credentials, API keys, and tokens; define access and rotation policies.
  • Keep your stack (OS, dependencies, frameworks) up to date and apply patches promptly.
  • Secure databases, backups, and files; encrypt sensitive information when applicable.
  • Have an incident response plan and notify authorities as required by law.
88 TECH GROUP S.A.S Commitments
  • Maintain reasonable administrative, technical, and physical controls over the platform.
  • Apply best practices for hardening, segmentation, and attack surface minimization.
  • Restrict internal access under the principle of least privilege and segregate duties.
  • Monitor relevant platform events for prevention and early detection.
  • Implement anti-fraud measures aimed at protecting merchants and payers.

This model does not transfer the merchant’s legal obligations to the provider nor replace its internal controls.

Credential Hygiene and Best Practices

Credential exposure is a critical risk vector. We recommend adopting authentication and secret governance controls appropriate to your level of criticality.

  • Enable MFA/2FA on all administrative and panel accounts.
  • Rotate passwords and API keys; revoke inactive or compromised tokens.
  • Restrict administrative access via IP allowlists or secure tunnels.
  • Use keys with the minimum necessary scopes/grants for each integration.
  • Apply least privilege and segregation of duties across users and services.

Suggested Technical Controls

  • End-to-end encryption in transit (TLS); disable insecure protocols and cipher suites.
  • Encryption at rest and key management; periodic rotation and environment segregation.
  • Avoid storing PAN/sensitive data directly; use tokenization or vouchers for de-scoping.
  • Use tokenization to minimize exposure; never log sensitive data in plain text.
  • Centralize logs, protect them from tampering, and define retention per regulation.
  • Set alerts for anomalous patterns, authentication errors, and atypical behaviors.

Specific controls depend on your architecture, inherent risk, and sector/country regulatory requirements.

Notice and Limitations

We do not guarantee absolute prevention of unauthorized third-party access. You understand that no technical measure is infallible and that fulfilling your security obligations is essential to mitigate risks.

We continuously work to reduce fraud and misuse of the service; however, securing your environments, integrations, and credentials is essential to preserve the confidentiality, integrity, and availability of Data.

7. Our Security

Administrative, Technical, and Physical Controls to Protect Information

We are responsible for protecting the security of personal and transaction information stored and processed on our platform. 88 TECH GROUP S.A.S will maintain commercially reasonable administrative, technical, and physical procedures to protect the data in our custody against unauthorized access, loss, misuse, or accidental alteration.

Our security program is inspired by industry best practices and a risk-based approach of continuous improvement.

Our Security Commitments

Governance and risk management with policies, standards, and periodic reviews.

Layered technical controls (defense in depth) and environment hardening.

Rooms and data centers with appropriate physical and environmental controls.

Identity and access management under least privilege and segregation of duties.

Event monitoring, telemetry, and incident response.

Operational resilience: backups, redundancy, continuity, and recovery testing.

Controls may vary according to asset criticality, infrastructure provider, and regulatory requirements.

Control Domains

Platform and Infrastructure

Network segmentation, environment isolation (dev/test/prod), patch management, inventory, and continuous vulnerability scanning.

Cryptography and Key Management

Encryption in transit and at rest, key rotation and safeguarding, and secure data deletion according to retention periods.

Visibility and Logging

Centralization of logs, tamper protection, event correlation, and alerting for anomalous behavior.

Identity and Access

Strong authentication, MFA for critical access, privilege reviews, and session expiration.

Compliance and Privacy

We adopt measures consistent with recognized frameworks where relevant and provide evidence of controls upon request and under applicable agreements.

  • Policies and procedures available for review under confidentiality agreements.
  • Periodic security and privacy training for relevant personnel.
  • Third-party and subprocessor management with security assessments proportional to risk.

We recommend reviewing our Privacy Policy to understand how we collect, use, and safeguard your information.

Limitations and Acknowledgment

Although we maintain robust controls, no measure is infallible. We cannot guarantee that unauthorized third parties will never overcome such defenses or misuse information. You understand that providing information is at your own risk and that security is a shared effort.

8. Right to Audit

Authorities, Scope, Cooperation, and Corrective Measures

If 88 TECH GROUP S.A.S believes a security breach, data compromise, material non-compliance, or a significant risk to the platform may have occurred, 88 TECH GROUP S.A.S it may require that an external, independent auditor approved by 88 TECH GROUP S.A.S conduct a security audit of your systems and facilities and issue a report that we may share with banks, payment partners, and other entities when required by law or contracts.

The audit will aim to verify controls, evidence, and practices related to information security, compliance, and fraud prevention.

When We May Require an Audit

  • Indications or confirmation of a security incident, leak, or unauthorized access.
  • Suspected non-compliance with these Terms, policies, or partner requirements.
  • A request from a competent authority or the need to fulfill regulatory obligations.
  • Contractual requirements from acquirers, banks, or other critical partners.

We may initiate reasonable preliminary verifications (e.g., information requests) before ordering a formal audit.

Scope and Process

Scope may include:
  • Review of security/privacy policies, procedures, and records.
  • Verification of technical controls, configurations, and patches.
  • Sampling of relevant evidence and logs protected against tampering.
  • Tests and/or reviews of network architecture, segmentation, and access.
  • Interviews with key personnel and validation of roles and permissions.
Typical Process
  1. Notice including objective, scope, and minimum access requirements.
  2. Execution by an approved external auditor, at reasonable times and proportionately.
  3. Report with findings, risk levels, and recommendations.
  4. Remediation plan with deadlines, responsible parties, and closure evidence.
  5. Verification of compliance and, if applicable, a follow-up audit.

The audit should not unduly disrupt your operations and will be limited to information necessary to meet its purpose.

Cooperation, Confidentiality, and Data Handling

You will provide reasonable access to facilities, systems, documentation, and personnel, as well as the assistance necessary to complete the audit.

  • Auditors and 88 TECH GROUP S.A.S will maintain the confidentiality of reviewed information, subject to law and legitimate requests from authorities.
  • Data minimization and restricted copying will apply; information will be used exclusively for audit and compliance purposes.
  • The audit does not require disclosure of trade secrets unrelated to security or communications protected by legal privilege.

We may share excerpts of the report with banks/partners when necessary for operational continuity or compliance.

Costs and Measures

Costs and actions resulting from the audit will be managed proportionally to the origin of the risk and the findings.

  • If the audit confirms material non-compliance or serious deficiencies under your control, you will bear the reasonable costs of the audit and remediation.
  • If no material findings attributable to you are confirmed, the direct costs of the audit will be borne by 88 TECH GROUP S.A.S.
  • We may suspend or temporarily limit services/credentials where there is unacceptable risk until corrective measures are completed.

The purpose of the right to audit is to protect the payments ecosystem and data subjects. Timely cooperation and application of recommended remediations mitigate risks and preserve operational continuity in line with best practices.

9. Privacy

How We Handle Your Personal Information and Our Obligations

Your privacy and the protection of your data are fundamental to our operation. 88 TECH GROUP S.A.S adopts measures to collect, use, retain, and disclose personal information responsibly and in accordance with applicable regulations.

By using the service, you acknowledge that you have read and agree to the terms of our Privacy Policy, which is incorporated by reference into these Terms.

Privacy Policy (Incorporated by Reference)

The Privacy Policy describes in detail the categories of data we process, the purposes, legal bases (where applicable), recipients, retention periods, and security measures.

  • Scope and categories of personal data processed.
  • Processing purposes and applicable legal bases.
  • Data subject rights (access, rectification, erasure, objection, portability, etc.) and channels to exercise them.
  • Technical and organizational security measures, and retention criteria.

In case of any discrepancy, the Privacy Policy is the primary guide on data processing.

Principles and Commitments

Lawfulness, fairness, and transparency in processing.

Data minimization and purpose limitation.

Accuracy and reasonable updating of data.

Storage limitation and secure deletion.

Integrity, confidentiality, and security of information.

Proactive responsibility and evidence of compliance.

Disclosures Required by Law and Authorities

We may disclose information when necessary to comply with a legal obligation, judicial process, or requests from competent authorities.

  • Valid court orders requiring identification of your company or directors, or the provision of specific information.
  • Compliance with anti-money laundering, counter-terrorist financing, and sanctions regimes.
  • Prevention and detection of fraud, network security, and protection of the integrity of the payments ecosystem.

Payment Partners and Providers

Certain information you provide to us (or generated during operation) may be shared with payment partners solely to operate and improve the service, enable payment methods, and fulfill contractual or regulatory obligations.

  • Processing and settlement of transactions, reconciliation, and dispute handling.
  • Enablement of local payment options and acceptance improvements.
  • Compliance with contracts, payment system standards, and risk requirements.

We require our partners to apply reasonable security and confidentiality measures proportional to risk.

No Sale of Data for Marketing

88 TECH GROUP S.A.S does not sell your data or your users’ data to third parties for marketing purposes.

To learn in detail how we collect, use, and protect your information, please review the Privacy Policy. We recommend periodically reviewing its content, keeping your preferences up to date, and raising any concerns through the indicated channels.

10. Third-Party Privacy

Consents, Transparency, and Roles in Data Processing

You declare that you comply with applicable privacy regulations and that you have obtained all rights and consents necessary to provide 88 TECH GROUP S.A.S with your users’ Data (or to authorize its direct collection by us), so that we may process it in accordance with these Terms and the Privacy Policy.

Between you and 88 TECH GROUP S.A.S, you are responsible for informing your customers that we provide payment services and, for that purpose, receive and process certain Data arising from your relationship with them.

Consent and Legal Bases

You warrant that the processing of third-party Data you provide to us is based on a valid legal basis under the applicable jurisdiction and that you can substantiate it.

  • Informed, specific, and verifiable consent where required by law.
  • Clear privacy notices regarding purposes, transfers, and retention periods.
  • Retention of evidence of consent and/or lawful basis for processing.
  • Mechanisms to revoke consent and to handle data subject rights.

Lack of adequate legal bases or consents could limit or prevent the provision of the service.

Duty of Transparency Toward Your Customers

Identify 88 TECH GROUP S.A.S as the payment service provider where applicable.

Explain the purposes of Data sharing and its necessity for processing payments.

Inform about third-party recipients (e.g., banks, acquirers, networks, and subprocessors).

Indicate how to exercise data subject rights (access, rectification, erasure, objection, portability, etc.).

Notices must be accessible, understandable, and kept up to date.

Processing Roles

Depending on the flow and payment method, we may act as a controller or processor. The applicable role will be defined in the agreements and technical documentation.

  • When we determine the purposes and essential means of processing, we act as a controller and fulfill the corresponding information and security obligations.
  • When we process Data on your behalf and under your instructions, we act as a processor and implement security measures and data processing agreements.
  • We may require data processing agreements (DPAs) or other clauses to govern transfers and subprocessing.

Warranties and Consequences of Non-Compliance

You warrant the lawfulness of the Data you provide and agree to cooperate with requests from authorities or data subjects. Non-compliance may result in proportional measures.

  • Representations and warranties regarding the truthfulness, sufficiency, and updating of consents and notices.
  • Cooperation in legitimate investigations, audits, or legal requests.
  • Adoption of corrective measures and, where appropriate, suspension of integrations or credentials.

Protecting third-party Data requires transparency, valid consent, and appropriate controls. Your collaboration is essential to maintain data subjects’ trust and service continuity.

11. Restricted Use

Prohibited Activities, Legal Obligations, and Control Measures

You must comply with all laws, rules, and regulations applicable to the use of the service (financial services, consumer protection, competition, non-discrimination, advertising, among others). 88 TECH GROUP S.A.S In addition to what is set forth in these Terms, certain activities are strictly prohibited.

The following list is illustrative and may be updated to reflect new regulatory or payment-partner requirements.

Commercial Prohibitions

  • Use payment methods to provide advances, loans, or direct financing to users.
  • Submit transactions that do not arise from a bona fide sale of goods/services to a buyer or a bona fide charitable donation.
  • Act as a payment intermediary/aggregator or resell the service on behalf of third parties.
  • Submit authorizations or transactions you deem potentially fraudulent, or use the platform abusively per network or partner rules.

We reserve the right to request evidence of the economic purpose of a transaction and to reject non-compliant operations.

Technical and Platform Prohibitions
  • Access or attempt to access systems, programs, or data not available for public use.
  • Copy, reproduce, publish, transmit, resell, or distribute service materials without authorization.
  • Allow third-party use via rental, lease, time-sharing, service bureau, or similar schemes.
  • Transfer rights granted under this agreement without prior written approval.
  • Bypass technical limitations, enable disabled functions, decompile, disassemble, or reverse engineer except where expressly permitted by law.
  • Interfere with the operation of the service, impede other users’ access, or place unreasonable or disproportionate load on the infrastructure.
  • Use the service in any manner other than as expressly permitted by these Terms.

Compliance and Best Practices

  • Meet consumer protection, transparency, and dispute-resolution obligations.
  • Avoid unfair competition practices, discrimination, and misleading advertising.
  • Comply with KYC/AML/CFT and cooperate regarding risk signals or legitimate requests.
  • Observe sanctions lists and regimes applicable to the country, customer, and transaction.
  • Align checkout commercial communications with the actual conditions of the transaction.

Activation and continued availability of payment methods are subject to risk, compliance validations, and ongoing controls.

Measures and Consequences

  • Review, retention, or reversal of operations that violate these Terms or payment system rules.
  • Suspension or limitation of credentials, features, or settlements while the risk persists.
  • Reporting to payment partners and/or competent authorities where appropriate.

Repeated or severe non-compliance may lead to service termination and other actions provided by law.

Proper use of the service protects merchants, payers, and the payments ecosystem. Your timely compliance with these restrictions is an essential condition for operational continuity.

12. Suspected Unauthorized or Illegal Use

Red Flags, Mitigation Measures, and Cooperation

We reserve the right not to authorize, to hold, or not to settle transactions that we consider to violate these Terms or other agreements with 88 TECH GROUP S.A.S , or that expose you, other users, our processors, or 88 TECH GROUP S.A.S to fraud or other undue risks.

We may apply additional controls, request information, and/or suspend functionalities while we assess the situation.

Red Flags

  • Unusual patterns of volume, velocity, IPs or geolocation; matches against risk lists.
  • High rates of chargebacks, returns, or unjustified disputes.
  • Inconsistencies among transaction data, declared identity, or supporting documentation.
  • Indications of violation of usage policies, payment network terms, or applicable regulations.

The presence of one or more indicators does not by itself determine a violation, but enables reviews and preventive measures.

Measures We May Take

Verification and Due Diligence
  • Apply enhanced due diligence (KYC/KYB, additional validations, and restricted lists).
  • Request supporting documentation (invoices, contracts, proof of delivery).
  • Contact you for clarifications and specific information requests.
Risk Management and Continuity
  • Decline or reverse specific transactions when risk is unacceptable.
  • Temporarily hold funds or settlements while the review is completed.
  • Limit or suspend functionalities/credentials until remediation.

Measures will be proportional to the detected risk and may vary according to network and payment-partner rules.

Merchant Cooperation

You agree to cooperate in good faith during any risk review or investigation related to your account or transactions.

  • Provide timely evidence supporting the legitimacy of the transaction.
  • Respond within the reasonable timeframes indicated in our requests.
  • Implement corrective actions when causes or gaps are identified.
Authorities and Legal Requests

With your authorization in these Terms and in accordance with applicable law, we may share information about you, your transactions, or your account if validly requested by a competent authority.

We will respect applicable legal procedures and confidentiality obligations.

Where permitted, we will endeavor to notify you of government requests before disclosing information.

Our goal is to protect the payments ecosystem and data subjects. Timely prevention and mitigation of risks allow us to preserve service continuity with the least possible impact.

13. Disclosures and Notices

Notification Channels, Deemed Receipt, and Confidentiality

You agree that we may send you information and notices related to the service by posting on our website, by sending to the email address registered to your account, or by postal mail to the address associated with your merchant account. 88 TECH GROUP S.A.S Electronic notices have the same meaning and effect as a paper copy, unless a law expressly requires a different means.

By using the service, you agree to keep your contact details up to date for notification purposes.

Channels and Deemed Receipt

Website / Panel Posting

We may post notices in designated sections of the website or the admin panel.

Email

Sent to the address associated with your account. Add our domains to allowlists and check spam folders.

Postal Mail

Where applicable, we may send communications to the address you provide.

Deemed Receipt
  • Within 24 hours after posting on the website/panel.
  • Within 24 hours after sending by email, unless a non-delivery notice is received.
  • Within the timeframes established by applicable postal regulations.

Presumptions of receipt may vary if a mandatory law provides a different calculation.

Confidentiality Regarding Third-Party Information

If you receive information about other persons through the service (including cardholders), you must keep it confidential and use it only in connection with the service.

  • Use the information solely to process payments, manage disputes, or meet legal requirements.
  • Do not disclose or distribute to third parties except with the data subject’s express consent or as permitted by law.
  • Do not disclose payment information to third parties, except where necessary to process a payment under the service.

You are responsible for ensuring adequate controls for access, retention, and secure deletion.

Good Communication Practices
  • Keep email addresses and physical addresses in your account up to date.
  • Allowlist our domains and monitor notification mailboxes.
  • Set up shared mailboxes or operational aliases for critical matters.
  • Keep proof of receipt and reading where relevant.

Warnings and Limitations

Failures in receipt due to internal configurations, spam filters, or outdated data do not invalidate the effectiveness of a duly issued notice.

  • If an email bounces, we may use alternative registered channels.
  • We recommend periodically checking spam or promotions folders.
  • Certain communications may require additional formalities under your jurisdiction’s law.

These rules aim to ensure timely and traceable notifications and to protect the confidentiality of information you may receive about third parties while using the service.

14. References to Our Relationship

Identification as a Client, Brand Use, and Communication Limits

From the time you begin processing payments with our platform until your account is closed, you agree that we may publicly identify you as a client of 88 TECH GROUP S.A.S . This identification does not imply sponsorship, endorsement, certification, or any corporate relationship other than the provision of the service.

Neither you nor we will imply nonexistent sponsorships, endorsements, or affiliations. All communications must be accurate, verifiable, and consistent with these Terms.

Identification as a Client

Where We Might Identify You
  • Client lists and/or reference pages, using your logo pursuant to current brand guidelines.
  • Commercial or technical communications (website, presentations, events) mentioning the corporate name.
  • Brief descriptions of service use (e.g., “processes payments with 88 TECH GROUP S.A.S”).

We may request prior confirmation where context warrants it (e.g., public campaigns or press).

Request Not to Appear

You may ask us to stop using your brand for identification by sending a reasonable request. We will honor the request within a reasonable time, without affecting materials already printed or ongoing campaigns.

Brand Use and Public Communications
  • Both parties will use the other party’s names, logos, and other brand assets in accordance with current guidelines and solely for the authorized purpose.
  • No false sponsorships or endorsements will be expressed, directly or indirectly, nor will a relationship different from the contractual one be suggested.
  • Public metrics, results, or claims must be accurate, traceable, and, where applicable, anonymized.
  • We may request prior review of high-impact materials (e.g., press, mass campaigns, or studies with figures).

Restrictions and Prohibitions

  • Do not attribute certifications, integrations, or features that do not exist or are not available.
  • Avoid misleading or disparaging comparisons regarding third parties.
  • Do not use brand assets alongside unlawful, discriminatory, or offensive content.
  • Do not register domains, accounts, or profiles that could mislead users about brand ownership.

Credits and Case Studies (Opt-In)

We may invite you to participate in joint visibility initiatives. Participation is voluntary and requires prior written approval.

  • Case studies, success stories, or technical reviews.
  • Testimonials or quotes approved by your team.
  • Co-marketing activities, webinars, or events.

Any additional use of logos and public statements will follow your guidelines and internal processes.

Confidentiality and Revocation

Non-public information shared between the parties remains protected by the agreement’s confidentiality obligations.

  • No non-public financial, technical, or security information will be disclosed without consent and a lawful basis.
  • If a party believes brand use is inappropriate, it may request its removal and the other party will comply without undue delay.
  • Identification rights cease when the contractual relationship ends, without prejudice to materials already issued in good faith.

Mutual recognition strengthens ecosystem trust, provided the truthfulness of information, brand guidelines, and confidentiality of non-public aspects of the relationship are respected.