These Website Terms and Conditions ("Terms") govern your access to and use of the website where these Terms are published (the "Website").
The Website is provided by Onicore Technologies Ltd (together with its permitted successors and assigns, "Onicore", "we", "us", "our").
These Terms are intended to be readable and practical. They cover:
If you do not agree to these Terms, do not use the Website.
Onicore Technologies Ltd
DIFC License No.: CL11444
Principal place of business: IH-00-01-02-OF-01, Level 2, Innovation Hub 05, Dubai International Financial Centre, Dubai, United Arab Emirates
Telephone: +971 54 201 3311
Email: info@onicore.ae
For convenience, these Terms are split into sections. However, all sections form part of a single agreement between you and Onicore.
Some sections apply more strongly depending on how you use the Website. For example:
In these Terms:
By accessing or using the Website, you confirm that:
If you use the Website on behalf of an organisation, you confirm that you have authority to bind that organisation.
We may update these Terms from time to time to reflect:
When we update these Terms, we will update the "Last updated" date where displayed. Your continued use of the Website after a change means you accept the updated Terms.
If changes are material, we may also provide additional notice on the Website.
These Terms sit alongside our:
If you become a customer and sign a contract with us, that contract governs the Services and will generally override these Website Terms for the specific Service relationship.
We grant you a limited, non-exclusive, non-transferable, revocable licence to access and use the Website for lawful purposes and in accordance with these Terms.
We aim to keep the Website available, but we do not guarantee uninterrupted access.
The Website may be unavailable due to:
We may change or discontinue parts of the Website at any time.
The Website is available globally, but not all content or services described may be available in every location. We may restrict access in some circumstances (for example, to comply with sanctions, export controls, or legal restrictions).
You agree to:
We designed the Website to share information about our company and offerings. You must not use it in ways that harm us, our users, or others.
You must not:
We understand that visitors may:
That is generally permitted if it is fair and does not infringe our rights or mislead others.
If you want to reproduce substantial parts of the Website, use our trademarks, or republish our content, you need our written permission unless a legal exception applies.
You agree not to use the Website in a way that:
We may allow search engines and certain automation for legitimate purposes, but you must not:
If you need structured access (for example, for integration evaluation), contact us to discuss options.
If you believe you have found a security vulnerability, see Section 14 (Security and vulnerability reporting). Do not exploit it.
Unless stated otherwise, the Website and its Content are owned by Onicore or licensed to us.
This includes:
You may:
You may not:
"Onicore", our logo, and other marks displayed on the Website may be our trademarks or the trademarks of third parties.
Nothing in these Terms grants you a licence to use our trademarks without prior written consent.
The Website or associated materials may reference open-source software. Open-source components are governed by their own licences. Where we provide open-source notices, they should be respected.
The Website may allow you to submit information through:
You should not send:
If you submit information, you confirm it is accurate to the best of your knowledge and that you have the right to submit it.
Where you submit feedback, ideas, suggestions, or proposals (excluding personal data protected by privacy laws), you agree that we may use that feedback to improve our products and services without a duty to compensate you, unless a separate agreement states otherwise.
This does not mean we will publicly disclose your confidential business information; it means that high-level feedback can inform product development.
We aim to respond to enquiries, but we do not guarantee:
Content on the Website is provided for general information. It may describe products, features, roadmaps, and concepts.
Because products and technology evolve, Website information may be incomplete or outdated.
Unless we expressly state otherwise in writing, the Website does not constitute:
Any binding commitments must be set out in a written agreement signed by Onicore.
If we describe beta or preview features:
Roadmaps are statements of intent, not contractual promises.
Testimonials, metrics, and case studies are examples and do not guarantee that all users will achieve the same outcomes.
Outcomes depend on many factors, including customer configuration and compliance obligations.
The Website is not intended to provide:
If we provide professional advice services, it will be under a separate agreement and may require additional disclosures.
Nothing on the Website is an offer, invitation, or solicitation to:
Onicore is incorporated in the DIFC. Some financial services activities in DIFC are regulated by the Dubai Financial Services Authority (DFSA). Onicore does not represent through this Website that it is authorised by DFSA to carry on any regulated activity, unless we explicitly state this with proper licensing information.
If you are evaluating Onicore for use in regulated activities (for example, payments, digital assets, financial services), you must perform your own regulatory assessment and obtain appropriate professional advice.
If the Website includes content about digital assets, tokens, or blockchain technology:
Digital assets can be volatile and risky. You should obtain professional advice before making decisions.
The Website may include links to third-party websites. We provide links for convenience and do not control third-party sites.
We are not responsible for:
We may embed or integrate tools such as:
These tools may have their own terms and privacy notices. Use of such tools may result in data being processed by those third parties as independent controllers.
All third-party marks and content remain the property of their owners.
Most Website content is public and not confidential.
Confidentiality may apply where:
If confidentiality matters, do not rely on Website Terms alone. Ask for an NDA.
We understand that demo and proposal discussions can involve sensitive business context. We generally treat such information responsibly, but formal confidentiality obligations must be in writing.
We care about security. If you believe you have found a security issue relating to the Website:
We may choose to run a responsible disclosure programme. Unless we explicitly authorise it in writing, you must not perform:
Any unauthorised security testing may be unlawful and may expose you to liability.
To the maximum extent permitted by law:
Some jurisdictions do not allow certain warranty exclusions. In those cases, exclusions apply only to the extent permitted.
To the maximum extent permitted by applicable law, Onicore will not be liable for:
The Website is an informational service. We provide it without charge. It is reasonable to allocate risk in this way.
If you need commercial commitments, reliability guarantees, or indemnities, those must be in a separate written agreement for Services.
Where liability cannot be excluded, our total aggregate liability for claims arising out of or in connection with the Website and these Terms may be limited to an amount that is reasonable in the circumstances (for example, the amount you paid to us for Services in the 12 months before the claim, if any). If you paid nothing, the cap may be a nominal amount.
The exact cap can vary depending on applicable law and the nature of the claim.
Nothing in these Terms excludes or limits liability to the extent it cannot be excluded or limited under applicable law.
To the extent permitted by law, you agree to indemnify and hold Onicore harmless against claims, liabilities, damages, losses, and expenses arising from:
This indemnity is subject to any mandatory legal limits.
We may suspend or terminate your access to the Website if:
Suspension may be temporary or permanent.
Your use of the Website is also governed by our:
If you submit personal data through the Website, our Privacy Statement explains how it is handled.
These Terms are governed by the laws of the Dubai International Financial Centre (DIFC), without regard to conflict of laws principles that would require the application of other laws.
Subject to any mandatory rights, disputes arising out of or in connection with these Terms or the Website shall be subject to the exclusive jurisdiction of the DIFC Courts.
If you are a consumer, mandatory consumer protection rules may grant you additional rights in your home jurisdiction. These Terms do not limit such mandatory rights.
Before filing a formal claim, we encourage you to contact us so we can attempt to resolve the issue informally.
A practical escalation route:
You agree not to use the Website or any related Services if doing so would violate applicable sanctions laws or regulations.
We may restrict access where necessary to comply with sanctions regimes, including those applicable in the UAE and internationally.
Technology can be subject to export controls. You agree not to export, re-export, or transfer any Content or Services in violation of applicable export control laws.
You agree not to offer, promise, or provide anything of value to improperly influence anyone in connection with your relationship with Onicore.
If we enter into a commercial relationship, you may be asked to comply with specific anti-corruption clauses and policies.
If we provide services that touch financial crime compliance, we may:
These measures may be required to align with applicable legal and regulatory frameworks and with customer requirements.
You can contact us by email at info@onicore.ae.
If a formal notice is required (for example, for legal disputes), we may ask you to provide it in writing and with sufficient detail.
We may contact you through:
These Terms, together with the Cookies Policy and Privacy Statement, form the entire agreement between you and us regarding Website use.
If any part of these Terms is found unlawful or unenforceable, the remainder remains in effect.
If we do not enforce a term immediately, that does not mean we waive the right to enforce it later.
We may assign these Terms in connection with a corporate transaction. You may not assign your rights without our written consent.
These Terms do not create rights enforceable by third parties except where required by law.
These Terms are written in English. If translated, the English version prevails in the event of inconsistency, unless a mandatory law requires otherwise.
These Terms are drafted with reference to common DIFC legal principles and relevant UAE laws, including laws relating to:
A consolidated list with official sources is included in Appendix A.
This appendix lists the key laws, regulations, and official guidance materials referenced by this pack.
Notes:
Data Protection Law, DIFC Law No. 5 of 2020 (as amended)
Official DIFC legal database page (includes download link):
https://www.difc.com/business/laws-and-regulations/legal-database/difc-laws/data-protection-law-difc-law-no-5-2020
DIFC Laws Amendment Law No. 1 of 2025 (includes amendments impacting DIFC Data Protection Law and other DIFC laws)
Official DIFC news and enactment information:
https://www.difc.ae/newsroom/news/difc-introduces-laws-amendment-law
Official PDF (Annex A - Amendment Law No. 1 of 2025):
https://assets.difc.com/loader/annex-a_amendment-law-no-1-of-2025.pdf
Data Protection Regulations (Consolidated Version No. 2), in force 1 September 2023
Official PDF:
https://assets.difc.com/loader/data-protection-regulation.pdf
Regulation 10 (Autonomous and semi-autonomous systems/AI systems)
Official DIFC Commissioner of Data Protection page:
https://www.difc.com/business/registrars-and-commissioners/commissioner-of-data-protection/regulation-10
DIFC Commissioner of Data Protection guidance
https://www.difc.com/business/registrars-and-commissioners/commissioner-of-data-protection/guidance
Intellectual Property Law, DIFC Law No. 4 of 2019
https://www.difc.com/business/laws-and-regulations/legal-database/difc-laws/intellectual-property-law-difc-law-no-4-of-2019
Digital Assets Law, DIFC Law No. 2 of 2024
https://www.difc.com/business/laws-and-regulations/legal-database/difc-laws/digital-assets-law-difc-law-no-2-2024
Electronic Transactions Law, DIFC Law No. 2 of 2017
https://www.difc.com/business/laws-and-regulations/legal-database/difc-laws/electronic-transactions-law-difc-law-no-2-2017
Contract Law, DIFC Law No. 6 of 2004
https://www.difc.com/business/laws-and-regulations/legal-database/difc-laws/contract-law-difc-law-no-6-of-2004
Implied Terms in Contracts and Unfair Terms Law, DIFC Law No. 6 of 2005
https://www.difc.com/business/laws-and-regulations/legal-database/difc-laws/implied-terms-contracts-and-unfair-terms-law-difc-law-no-6-2005
Law of Damages and Remedies, DIFC Law No. 7 of 2005
https://www.difc.com/business/laws-and-regulations/legal-database/difc-laws/law-damages-and-remedies-difc-law-no-7-2005
DIFC Court Law, DIFC Law No. 10 of 2004
https://www.difc.com/business/laws-and-regulations/legal-database/difc-laws/difc-court-law-difc-law-no-10-of-2004
Companies Law, DIFC Law No. 5 of 2018
https://www.difc.com/business/laws-and-regulations/legal-database/difc-laws/companies-law-difc-law-no-5-2018
Operating Law, DIFC Law No. 7 of 2018
https://www.difc.com/business/laws-and-regulations/legal-database/difc-laws/operating-law-difc-law-no-7-2018
DIFC Legal Database
https://www.difc.com/business/laws-and-regulations/legal-database
Federal Decree-Law No. (45) of 2021 Concerning the Protection of Personal Data ("UAE PDPL")
Official download:
https://uaelegislation.gov.ae/en/legislations/1972/download
Practical note: The UAE PDPL includes an exclusion for entities located in UAE free zones that have special personal data protection legislation. DIFC is such a free zone. The UAE PDPL may still be relevant where processing occurs outside DIFC, where required by counterparties, or where other fact patterns bring the processing into scope.
Federal Decree-Law No. (34) of 2021 On Countering Rumors and Cybercrimes
Official download:
https://uaelegislation.gov.ae/en/legislations/1526/download
Federal Decree-Law No. (46) of 2021 on Electronic Transactions and Trust Services
Official federal legislation entry (includes executive regulation link):
https://uaelegislation.gov.ae/en/legislations/2585
Official download:
https://tdra.gov.ae/-/media/About/Trust-Services/Laws-and-regulations/Federal-Decree-Law-No-46-OF-2021-On-Electronic-Transactions-and-Trust-Services-EN.ashx
Cabinet Resolution No. (28) of 2023 Regarding the Executive Regulation of the Federal Decree-Law No. (46) of 2021
Official download:
https://uaelegislation.gov.ae/en/legislations/2199/download
Federal Law No. (15) of 2020 on Consumer Protection
Official download:
https://uaelegislation.gov.ae/en/legislations/1455/download
Cabinet Resolution No. (56) of 2024 Concerning the Telemarketing Regulations
Official download :
https://uaelegislation.gov.ae/en/legislations/2519/download
Cabinet Resolution No. (57) of 2024 Concerning Administrative Violations and Penalties related to Telemarketing (penalty schedule)
Official download:
https://uaelegislation.gov.ae/en/legislations/2520/download
TDRA Regulatory Policy: Unsolicited Electronic Communications
Official download :
https://tdra.gov.ae/-/media/About/regulations-and-ruling/EN/cellular-phone-spam-regulatory-policy-English.ashx
Practical note: TDRA policies are often directed at telecom licensees, but they shape the compliance environment for senders and are widely used as a baseline for acceptable marketing practices.
Federal Decree-Law No. (20) of 2018 On Anti-Money Laundering, Combating the Financing of Terrorism and Financing of Illegal Organisations
Official download:
https://uaelegislation.gov.ae/en/legislations/1016/download
Cabinet Resolution No. (10) of 2019 Concerning the Executive Regulations of Federal Decree-Law No. (20) of 2018
Official download:
https://uaelegislation.gov.ae/en/legislations/1015/download
Cabinet Resolution No. (24) of 2022 (amending some provisions of Cabinet Resolution No. (10) of 2019)
Central Bank rulebook page:
https://rulebook.centralbank.ae/en/rulebook/cabinet-resolution-no-24-2022-amending-some-provisions-cabinet-resolution-no-10-2019
If Onicore provides technology to regulated entities in the DIFC, those entities may be subject to DFSA requirements. Onicore may be asked to support customer compliance, but compliance responsibility remains with the regulated entity unless a contract states otherwise.
DFSA Rulebook: Anti-Money Laundering, Counter-Terrorist Financing and Sanctions Module (AML)
Official DFSA rulebook entry point:
https://dfsaen.thomsonreuters.com/rulebook/anti-money-laundering-aml
Depending on your operations and offerings, additional DIFC, Dubai, UAE, and international laws may be relevant, including but not limited to:
If you operate globally or market into other jurisdictions, you may also need to consider local privacy and consumer laws where users are located.
This glossary is intended to reduce confusion when reading legal documents. It does not override statutory definitions, but it aims to explain terms in everyday language.
Cookie
A small text file stored by your browser. Cookies can store preferences or identifiers. Some cookies are essential for a website to work.
First-party cookie
A cookie set by the website domain you are visiting.
Third-party cookie
A cookie set by another domain, often because a third-party tool (analytics, video, social media widget) is embedded in the page.
Session cookie
A cookie that exists only until you close your browser.
Persistent cookie
A cookie that remains until it expires or you delete it.
Local storage/session storage
Browser storage that can store small amounts of information. Unlike cookies, local storage is not automatically sent with every web request.
Pixel/beacon/tag
A technique that notifies a server that a page was visited or an action occurred. Often used for analytics or marketing measurement.
SDK (Software Development Kit)
A package of code used to add features such as analytics or messaging to an application. On websites, similar code is often loaded as scripts.
CDN (Content Delivery Network)
A network of servers that deliver website content quickly by serving it from a location near the visitor.
CMP (Consent Management Platform)
A tool that shows a cookie banner, records consent, and allows visitors to manage cookie preferences.
Personal Data
Information about an identified or identifiable person. A person can be identifiable even without a name if other identifiers can link the data to them.
Special Category Data/Sensitive Data
Data that receives additional protection. Depending on the legal framework, this can include health data, biometric identifiers, religious beliefs, and similar categories.
Processing
Any action on personal data: collecting, storing, using, sharing, deleting, and more.
Controller
The party that decides why and how personal data is processed.
Processor
The party that processes personal data on behalf of a controller, following the controller’s instructions.
Sub-processor
A processor engaged by another processor (for example, a cloud hosting provider used by a SaaS vendor).
Data Subject
The person whose personal data is being processed.
Data Protection Officer (DPO)
A role required in some circumstances. A DPO advises on compliance and acts as a contact point for regulators and individuals.
Record of Processing Activities (ROPA)
A structured record that lists processing activities, the purposes, the categories of data and recipients, transfers, retention, and security measures.
Data Protection Impact Assessment (DPIA)
A risk assessment used when processing may create high risks for individuals. DPIAs help identify risks and mitigation steps.
Privacy by design / privacy by default
A practice of considering privacy early in product design and choosing privacy-friendly settings as defaults where appropriate.
Anonymisation
A process that removes the ability to identify a person. True anonymisation is hard and must be assessed carefully.
Pseudonymisation
Replacing identifiers with a pseudonym (for example, replacing a name with a random ID). Pseudonymised data can still be personal data if re-identification is possible.
Data minimisation
Collecting only the data you need for a specific purpose.
Purpose limitation
Using data only for the purpose that was explained, unless another lawful basis applies.
Retention
How long data is kept. Retention should be driven by purpose, legal obligations, and risk.
International transfer
Sending, storing, or allowing access to personal data in another country. Transfers can happen even if data stays in one place but is accessed from another.
Adequacy
A legal concept where a jurisdiction is recognised as providing an acceptable level of data protection.
Contractual safeguards
Transfer mechanisms based on contractual commitments and enforceable rights (for example, clauses requiring security, access controls, and transparency).
Direct marketing
Communications that promote products or services. It can include email newsletters, calls, SMS, and messaging apps.
Opt-in
A model where marketing messages are sent only after explicit consent.
Opt-out
A model where marketing may be sent until the recipient unsubscribes or objects, subject to legal limits.
Suppression list
A list used to ensure a person who opted out is not contacted again. It typically stores minimal identifiers (such as email address) and the opt-out date.
DNCR (Do Not Call Register)
A register used to stop unwanted marketing phone calls under UAE telemarketing rules.
Authentication
Verifying identity (for example, logging in with a password or multi-factor authentication).
Authorisation
Determining what an authenticated user is allowed to do.
Least privilege
Giving users and systems the minimum access they need to do their job.
Encryption in transit
Protecting data as it moves over networks, for example using HTTPS/TLS.
Encryption at rest
Protecting stored data, for example in databases or backups.
Incident
A security event that could affect confidentiality, integrity, or availability. Not all incidents become reportable breaches.
Breach
A security incident that results in accidental or unlawful destruction, loss, alteration, unauthorised disclosure, or access to personal data.
B2B (Business-to-business)
An arrangement where products or services are offered to businesses.
B2C (Business-to-consumer)
An arrangement where products or services are offered to individual consumers.
Limitation of liability
A clause that limits the types or amount of damages one party can recover.
Indemnity
A promise to compensate another party for certain losses or claims.
Force majeure
An event outside reasonable control (for example, natural disasters, major outages) that prevents performance.
Governing law
The legal system that applies to the contract.
Jurisdiction
Which courts have authority to resolve disputes.
This appendix contains example templates that can help keep the Cookies Policy and Privacy Statement accurate over time. The templates are illustrative and should be adapted to your actual tools, products, and data flows.
Cookie banners and policies are most accurate when they reflect:
A cookie register is a practical bridge between legal transparency and technical reality.
A practical cookie register may include:
The following are examples only. Your actual cookie list should come from your website configuration and a technical scan.
Entry 1
Entry 2
Entry 3
Entry 4
A retention schedule should:
Retention should be realistic and operational: a retention schedule that cannot be implemented will quickly drift away from reality.
This example is not legal advice and must be adapted.
Website access logs
Cookie preference records
Enquiry and contact form submissions
CRM lead records (B2B)
Customer account contacts
Support tickets and incident records
Marketing mailing lists
Recruitment records
Accounting and invoicing records (if applicable)
Practical approaches include:
A controller-focused ROPA may include:
Links to relevant policies (privacy notice, cookie notice)
Activity: Website security logs
Activity: Business communications
International transfers can occur when:
A transfer register can list:
If you use AI systems that process personal data, consider maintaining a simple register:
If you use phone calls or messaging apps for marketing, a practical checklist may include:
This Acceptable Use Policy ("AUP") expands on Section 7 of the Website Terms and Conditions. It is designed to be specific and operational. If there is any inconsistency between this AUP and the Website Terms, the Website Terms take priority.
The Website is intended to:
The AUP exists to protect:
When using the Website, you must:
You must not use the Website in any way that is deceptive, harmful, or abusive.
You must not attempt to:
Examples of prohibited activity:
Security testing can be valuable, but it must be coordinated.
Without our express written permission, you must not:
If you find a vulnerability, report it to info@onicore.ae and wait for our response.
You must not:
Even well-intentioned automated tools can cause harm if they generate high traffic. If you need to access the Website programmatically, contact us first.
You must not upload, transmit, or otherwise introduce:
This includes attempts to inject scripts through input fields.
If the Website includes protected areas (for example, a portal), you must not:
Publicly delivered code is visible to browsers, but copying it to replicate the Website or to bypass restrictions may violate these Terms and applicable laws.
Normal browsing, caching by your browser, and standard search indexing are generally acceptable.
You must not scrape or harvest:
at scale or for spam purposes.
You must not use bots to collect content in a way that competes with the Website or harms performance.
We may implement:
You agree not to bypass these measures.
You must not:
If you want to announce a partnership, request written approval for brand usage.
You must not use the Website to:
Even where the Website does not provide "posting" features, this applies to content you submit through forms, chat, or files.
If you submit a message to us, you must not include:
If you are a business customer providing contact details of colleagues, ensure you have permission or a lawful basis.
You must not use the Website to:
You must not use contact forms or chat to:
If we provide support channels, you must not:
We may block abusive traffic.
If the Website allows file uploads:
You must not:
We understand that competitors may visit our Website. Normal competitive research is common, but automated extraction and misuse is not.
If you breach this AUP, we may:
We may take immediate action if the breach creates security risks or harms users.
This appendix provides operational context that supports the commitments made in the Cookies Policy and Privacy Statement. It is written in a practical style so it can also function as an internal checklist.
In practice, privacy and security are not owned by one team. They are shared responsibilities across:
Under some data protection frameworks, a Data Protection Officer (DPO) may be required in certain circumstances. Whether or not a formal DPO appointment is required, we aim to have:
Privacy compliance is hard to demonstrate without records. Practical documents and evidence can include:
The specific controls we implement depend on our systems, risk profile, and vendors. The aim is to match controls to risk.
Common practices include:
Operational practices may include:
Engineering practices may include:
Common safeguards include:
Security is not only confidentiality. It is also availability and integrity.
Resilience practices may include:
When using third-party vendors, practical controls may include:
Incidents can include:
Not every incident becomes a reportable breach, but every incident should be evaluated.
A structured incident response process often includes:
Detect and triage - identify the event, gather facts, stabilise systems.
Contain and mitigate - stop the spread, revoke credentials, isolate affected systems.
Assess impact - what data was involved, how many individuals, what harm could occur.
Notify where required
- notify customers under contract if relevant,
- notify regulators where required,
- notify individuals where required.
Remediate and recover - fix root cause, restore services, validate security.
Learn and improve - post-incident review, update controls, training.
During an incident:
For incident handling and potential legal obligations, it is often important to:
document decisions and timelines.
When a data subject makes a request (access, deletion, objection, etc), an operational procedure can include:
Receive and log the request - record date, channel, request type, requester identity details.
Verify identity - verify in proportion to risk (avoid collecting excessive new data to verify).
Clarify scope where needed - for example, "Which email address did you use?" or "Which interaction are you referring to?"
Locate data - search relevant systems (email, CRM, support tools, analytics where applicable).
Assess applicability and exceptions - legal retention, impact on others, confidentiality, privilege.
Respond - provide data or confirm action, or explain limitations.
Update suppression lists (if marketing-related) - ensure opt-out is respected across systems.
Close and archive - retain minimal evidence that the request was handled (for accountability).
A practical vendor checklist may include:
Depending on the risk level, key terms can include:
For cross-border processing, practical steps may include:
If AI systems are used in a way that processes personal data, practical governance may include:
Privacy and security are not one-time tasks. Practical review routines may include:
This FAQ is provided to make the legal documents easier to use. It is not a substitute for the binding Terms, Cookies Policy, or Privacy Statement.
Q1: Do I have to accept cookies to use the Website?
No. In many cases, you can use the Website with only strictly necessary cookies. However, if you reject optional cookies:
Q2: What happens if I accept analytics cookies?
If you accept analytics cookies (where offered), we may collect information such as:
We use this to improve the Website. We aim to avoid unnecessary identification and we use settings that reduce data collection where feasible.
Q3: What happens if I accept marketing cookies?
Marketing cookies can support:
If you do not want this, you can decline marketing cookies through the cookie banner or settings.
Q4: Are cookies always personal data?
Not always. Some cookies store purely technical settings. However, many cookie identifiers and device identifiers can become personal data when they can be linked to an individual. We treat cookie data cautiously and in line with our Privacy Statement.
Q5: How do I change my cookie choices later?
Typically, you can:
Deleting cookies can reset your consent record, so you may see the cookie banner again.
Q6: Do you track me across other websites?
Our intent is to use tracking only where it supports legitimate purposes and only where enabled through preferences, where required. Third-party embedded tools may have their own tracking behaviour, which is why we recommend reviewing third-party notices and using cookie controls.
Q1: What data do you collect if I only browse the Website?
Browsing can create:
You do not need to provide your name or email to browse most public pages.
Q2: What data do you collect if I fill out a contact form?
A typical contact form submission may include:
We use it to respond. We may store a record of the conversation for continuity and audit.
Q3: Do you sell personal data?
We do not sell personal data as a standard business practice. We share personal data with service providers only to the extent needed to operate the Website and manage communications.
Q4: Do you share personal data with authorities?
We may share personal data with authorities only when required by law or where necessary for legal claims and protection. We aim to validate requests, minimise disclosures, and document our decisions.
Q5: Where is my data stored?
Storage depends on the systems involved (hosting, email, CRM, support tools). Some systems may store or process data outside DIFC/UAE. Where personal data is transferred internationally, we apply safeguards described in the Privacy Statement.
Q6: How long do you keep my data?
We keep personal data for as long as needed for the purpose, plus as needed for legal and security reasons. Retention differs by data type. Appendix C provides example retention periods.
Q7: How do I request access or deletion?
Email info@onicore.ae with your request. We may ask for verification. We will respond in line with applicable law and may explain if an exception applies (for example, legal retention obligations).
Q8: Do you use AI tools with my data?
We may use automation and AI tools to improve security, operations, or productivity. Where such tools process personal data, we aim to use safeguards such as minimisation and human oversight. For significant automated processing, we will assess risks and provide information where required.
Q1: Can I copy content from the Website into my own website or marketing materials?
Not without permission, unless a legal exception applies. You can usually:
If you want to reproduce substantial parts, request written consent.
Q2: Can I use your logo to say I work with Onicore?
Only with permission. Brand use should be agreed in writing to avoid confusion.
Q3: Is the Website an offer to provide services?
No. The Website is informational. Any binding commitment requires a written contract signed by Onicore.
Q4: Can I rely on the Website to make compliance decisions?
No. The Website does not provide legal, compliance, or financial advice. If you are operating in a regulated industry, get professional advice.
Q5: What should I do if I find a security issue?
Do not exploit it. Report it to info@onicore.ae with details. We may ask for additional information. Do not publish details without permission.
Q6: What happens if I breach the Terms?
We may block access or take other action to protect the Website and our users. Serious breaches (for example, hacking attempts) may be reported to authorities where required.
Scenario 1: A prospect requests a demo and later asks to be deleted
We may delete the prospect’s information where appropriate, but we may retain minimal suppression information to respect the opt-out and limited records needed for compliance.
Scenario 2: A visitor rejects cookies and the Website behaves differently
If optional cookies are rejected, some convenience features may not work, and analytics may be limited. The Website should still function with essential cookies.
Scenario 3: A business contact receives a marketing email and unsubscribes
We will process the unsubscribe request and place the contact on a suppression list so they do not receive marketing emails again. We may still send operational emails if there is an active customer relationship and the message is not marketing.
Scenario 4: A third-party embeds content on our pages and sets cookies
Embedded third-party content can create third-party cookies and additional data flows. Where feasible, we provide transparency and control through cookie settings and by limiting unnecessary embeds.