Last Revised: June 16, 2022

PROPERTIES ONLINE INC. MESSAGING POLICY

Consent Requirements

  • Prior to sending the first message, you must obtain agreement from the message recipient to communicate with them – this is referred to as “consent”, you must make clear to the individual they are agreeing to receive messages of the type you’re going to send. You need to keep a record of the consent, such as a copy of the document or form that the message recipient signed, or a timestamp of when the customer completed a sign-up flow.

Alternative Consent Requirements

While consent is always required and the consent requirements noted above are generally the safest path, there are two scenarios where consent can be received differently.

Contact initiated by an individual

If an individual sends a message to you, you are free to respond in an exchange with that individual. For example, if an individual texts your phone number asking for your hours of operation, you can respond directly to that individual, relaying your open hours. In such a case, the individual’s inbound message to you constitutes both consent and proof of consent. Remember that consent is limited only to that particular conversation. Unless you obtain additional consent, don’t send messages that are outside that conversation.

Informational content to an individual based on a prior relationship

You may send a message to an individual with whom you have a prior relationship, provided that individual provided their phone number to you, and has taken some action to trigger the potential communication, and has not expressed a preference to not receive messages from you.

The message can’t attempt to promote a product, convince someone to buy something, or advocate for a social cause.

Identifying Yourself as the Sender

Every message you send must clearly identify you (the party that obtained the opt-in from the recipient) as the sender, except in follow-up messages of an ongoing conversation.

Opt-out

The initial message that you send to an individual needs to include the following language: “Reply STOP to unsubscribe,” or the equivalent using another standard opt-out keyword, such as STOPALL, UNSUBSCRIBE, CANCEL, END, and QUIT.

PROPERTIES ONLINE INC. ACCEPTABLE USE  POLICY

This Acceptable Use Policy (“AUP”) describes rules that apply to any party (“you”, “your”, “yours”, or “Customer”) using Text Announce (aka Smart Lead Capture) provided by Properties Online Inc. Customer is responsible for compliance with this AUP. If the Customer violates this AUP, Properties Online Inc. may suspend the Customer’s use of the Services. This AUP may be updated by Properties Online Inc. from time to time upon reasonable notice, which may be provided via the Customer’s account, e-mail, or by posting an updated version of this AUP at: https://textannounce.com/pol-acceptable-use-policy/

No Inappropriate Content or Users. Do not use the Services to transmit or store any content or communications (commercial or otherwise) that is illegal, harmful, unwanted, inappropriate, objectionable, confirmed to be criminal misinformation, or otherwise pose a threat to the public. This prohibition includes the use of the Services by a hate group or content or communications that originate from a hate group or are exploitive, abusive or hate speech.

Prohibited Activities. Do not use the Services to engage in or encourage any activity that is illegal, deceptive, harmful, violating others’ rights, or harmful to Properties Online Inc.’s business operations or reputation, including: 

  • Violations of Laws. Violating laws, regulations, governmental orders, or industry standards or guidance in any applicable jurisdiction (collectively, “Applicable Laws”). This includes violating Applicable Laws requiring (a) consent be obtained prior to transmitting, recording, collecting, or monitoring data or communications or (b) compliance with opt-out requests for any data or communications. 
  • Interference with the Services. Interfering with or otherwise negatively impacting any aspect of the Services or any third-party networks that are linked to the Services.
  • Reverse Engineering. Reverse engineering, copying, disassembling or decompiling the Services.
  • Falsification of Identity or Origin. Creating a false identity or any attempt to mislead others as to the identity of the sender or the origin of any data or communications. 

No Service Integrity Violations. Do not violate the integrity of the Services, including: 

  • Bypassing Service Limitations. Attempting to bypass, exploit, defeat, or disable limitations or restrictions placed on the Services. 
  • Security Vulnerabilities. Finding security vulnerabilities to exploit the Services or attempting to bypass any security mechanism or filtering capabilities. 
  • Disabling the Services. Any denial of service (DoS) attack on the Services or any other conduct that attempts to disrupt, disable or overload the Services.
  • Harmful Code or Bots. Transmitting code, files, scripts, agents, or programs intended to do harm, including viruses or malware, or using automated means, such as bots, to gain access to or use the Services. 
  • Unauthorized Access. Attempting to gain unauthorized access to the Services.