Cybersecurity

At Nexus, we prioritize the security and privacy of our users, ensuring that their personal information, accounts, and digital entities remain protected. A safe and open platform is only possible when users trust that their data, profiles, and managed entities are secure. Attempts to compromise accounts, obtain sensitive information through deceptive tactics, or engage in unauthorized access pose a serious threat to our community’s safety. To maintain the authenticity and integrity of our services, we strictly prohibit any activities related to phishing, social engineering, malware distribution, or other forms of cyber threats.

Prohibited Activities & Security Violations:

Nexus does not allow any activity that compromises user security, personal data, or digital infrastructure, including but not limited to:

Unauthorized Access Attempts

Users may not attempt to access accounts, profiles, or Nexus-managed entities through deceptive, fraudulent, or unauthorized means, including:

  • Gaining access to another user’s account, profile, or managed entity without explicit consent.

  • Soliciting or acquiring another user's login credentials, personal data, or security information under false pretenses.

  • Engaging in phishing schemes to deceive users into providing sensitive information.

  • Using social engineering techniques to repeatedly or consistently harvest answers to password recovery questions or other authentication details.

  • Developing or deploying malware, spyware, or unauthorized tracking mechanisms to gain illicit access to user accounts.

Malware, Spyware, and Malicious Code

Nexus strictly prohibits the development, distribution, or sharing of any form of harmful software, including but not limited to:

  • Malware: Any software designed to harm, exploit, or gain unauthorized access to devices, systems, or networks. This includes ransomware that locks users out of their devices or demands payment.

  • Spyware: Software that covertly collects user data and transmits it to third parties without explicit consent, especially if used for blackmail, extortion, or unauthorized surveillance.

  • Greyware: Software that detracts from the usability of devices or is difficult to remove, often slowing down systems or causing persistent pop-ups.

  • Browser extensions, mobile applications, or downloadable files that pose a security risk or compromise user privacy.

  • Encouraging or deceiving users into downloading or executing harmful programs that may steal data, disable security settings, or grant unauthorized access to a user’s account.

Hacking, Exploitation, and Security Circumvention

To protect user security and system integrity, Nexus prohibits:

  • The sharing or promotion of hacking tools or exploits that encourage unauthorized access to accounts, passwords, or security credentials.

  • The development or distribution of tools that bypass security protections, including:

    • Software that enables password cracking or circumvents authentication measures.

    • Tools that intercept communications or allow unauthorized surveillance.

  • Any software, product, or service designed to compromise cybersecurity measures implemented by Nexus or other digital platforms.

Infrastructure Supporting Malicious Activity

Nexus does not permit the hosting, distribution, or facilitation of cyber threats, including:

  • Web hosting services, domain name systems (DNS) servers, or advertising networks that primarily enable the spread of malicious links.

  • Platforms that provide infrastructure for phishing scams, malware distribution, or other security breaches.

Enforcement & Consequences:

Violations of Nexus’s cybersecurity policies result in immediate enforcement actions, including:

  • Account warnings, temporary restrictions, or permanent disabling for users engaged in unauthorized access, hacking, or malicious activity.

  • Permanent removal of hosted content, applications, or services that pose security risks to users.

  • Referral to law enforcement for severe cybersecurity threats, fraud, or data breaches.

Users whose accounts have been restricted or disabled for cybersecurity violations may submit an appeal, provided they demonstrate compliance with security policies.

Policy Updates & Amendments:

This policy is continuously reviewed and updated to address emerging cybersecurity threats, technological advancements, and evolving risks. Updates take effect immediately upon publication.

For reporting cybersecurity violations, appealing enforcement actions, or seeking clarification, contact legal@nexus.realestate.

This document must not be altered or summarized in a way that misrepresents its intent, scope, or enforcement process. Every provision is critical to ensuring user security, digital safety, and data integrity on Nexus.

Previous
Previous

California Privacy Notice