Don't miss out on our upcoming webinar 📢: Boost your Sales with Reviews & Rewards ⭐🎁 Join us on Wednesday, February 28 @ 1 PM EST

TargetBay Content Policies and Procedures

We Employ Three Sets Of Safeguards To Monitor Our Reviews And Flag Them If They Do Not Pass:

1. We run automatic checks for certain content (outlined below) that is not permitted in reviews, such as coarse language and links.

2. We monitor the source of reviews. If we see more than two reviews from a single IP address within 24 hours, they are flagged

3. We have integrated into the Website two notification options in connection with any public review:

we can receive notifications from users that a review is inappropriate, and

companies can report or delete a review that doesn’t meet our Guidelines. Collectively, we call these two options for notifying and reporting reviews “flagging”.

Once Reviews Are Flagged, We Review Them And Delete Them If:

– We run automatic checks for certain content (outlined below) that is not permitted in reviews, such as coarse language and links.
– They contain personal information about another individual, such as a person’s name, address, phone number, email address, credit card information, or any other information that could be used to track, identify, contact or impersonate someone
– They include promotional references or links

– They violate other people’s or companies’ rights, including intellectual property rights, rights of privacy/confidentiality, and/or personality rights.

– They are of a marketing nature or has marketing purposes.

– They are unlawful, deceptive, misleading, fraudulent, threatening, abusive, harassing, libelous, defamatory, tortious, obscene, pornographic, or profane

– They have sexist, political, or racial character

– They are offensive or in any way breaches any applicable local, national or international law or regulation

– They violate these our Terms of Service or Privacy Policy

– They are technically harmful (including without limitation computer viruses, logic bombs, Trojan horses, worms, harmful components, corrupted data or other malicious software, harmful data or conduct).