Alixo-Yolloo Corporation
Terms of Service
1. Introduction
These Terms of Service ("Agreement") govern your use of the API services
and associated features ("Services") provided by Alixo-Yolloo Corporation. By
accessing or using our Services, you agree to be bound by the terms and
conditions of this Agreement. If you do not agree to these terms, you are not
permitted to use our Services.
2. Subscription Terms and Payment
2.1 Subscription: Access to the Services is granted only after full payment for
the selected subscription plan is made. The subscription period will be
specified in the invoice that will be sent to your email.
2.2 Subscription Plans: We offer different subscription plans: Basic, Standard,
and Premium. You can find the details of each plan on our website
(https://alixo-yolloo.com/).
2.3 Enterprise Plan: For clients interested in the Enterprise plan, subscription
terms and payments are negotiated on a case-by-case basis in a separate
agreement. Flexible terms may be provided based on your business needs.
The agreement will be sent to you via email, and the conditions may vary
depending on the scale and requirements of your enterprise.
2.4 Pricing Changes: We reserve the right to change the pricing of our
subscription plans with reasonable notice provided at least 30 days in
advance. For clients who subscribed before the price change, the original
terms will remain effective until the end of their current subscription period.
3. Access and Use of API
3.1 Access to the API: To access the API, you must select a subscription plan
and complete the subscription process via our website or contact form
(https://alixo-yolloo.com/). After subscribing, you will receive a unique key via
email to authenticate your application.
3.2 Unique Keys: Unique Keys are sent to clients via email once the
subscription is confirmed. The Unique Key is required for secure and
authorized use of our Services. It is your responsibility to:
• Keep your Unique Key confidential and not share it with third parties.
• Implement best security practices to protect your Unique Key.