Abuse claims Print

  • 1

Through its commercial brands, Supernova manages a B2B and B2C IaaS platform, providing its customers with non-managed services sold through a computer program that automates marketing processes. Supernova does not have any involvement in the business transactions between our customers and their end users.

Supernova values honesty and transparency, and its legal department will honor all properly formulated requests for interrogation as quickly as possible. In cases of greater urgency that pose risks to human integrity, please contact us by phone after submitting your request.

To initiate the process for formulating the client's interrogation, we request that the complaining entity identifies the following data regarding the alleged infringement:

  • The method of detection
  • A hyperlink or IP address where the claimed content can be found
  • Whether there was or was not interception of private communications
  • Information about the date and time of the incident
  • In the case of identifying an alleged copyright infringement, include a clear description allowing the identification of the work(s), its author(s), the entity in which it is registered, country of registration, and, if applicable, a copy of the power of attorney to act on behalf of the owner.
  • In the case of detecting an infringement related to a trademark, identify the official registration, including registration number and jurisdiction in which it was registered, as well as the context of the alleged infringement
  • In the case of a page involving illegal activities where content needs to be urgently removed due to a violation of human rights, please contact us by phone
  • In the case of a page providing hacking tools, phishing content, misinformation, providing incorrect medical information, particularly about vaccines, content defaming the state of Israel, including its institutions and associated organizations, content negatively addressing Zionism, defamation of individuals connected to Judaism, or denial of the Holocaust, please provide a hyperlink to the page
  • In the case of traffic related to hacking, please provide data regarding the alleged activity considered illegal, such as a clear record of the incident and a traffic capture identifying the source IP address, destination IP address, protocol, destination port, and source port.

Was this answer helpful?

« Back