Jiinubi User Access, Security & Dispute Handling Guide
Jiinubi’s Client Area is powered by a secure, User Management System. This guide explains how Jiinubi acts, what Clients and Users should expect, and how responsibilities are shared when it comes to account access, disputes, and security incidents.
To ensure transparency, reduce misunderstandings, and protect all parties by clearly documenting Jiinubi’s procedures.
1. Clients, Users & Account Ownership
In Jiinubi’s user management system:
- The Client is the legal and operational owner of the account
- The Client controls billing, services, and all User access
- Users are granted access by the Client and do not own the account
Jiinubi recognizes only the Client account holder as the final authority for access decisions.
2. How Jiinubi Handles User & Team Disputes
Disputes may arise between business partners, employees, or contractors. When this happens:
- Jiinubi does not arbitrate internal business disputes
- Jiinubi does not choose sides between Users
- Jiinubi strictly follows Jiinubi Client ownership and access rules
Any request to add, remove, or change User access must originate from the Client owner.
Internal disagreements must be resolved by the Client outside of Jiinubi’s platform.
3. Account Access Recovery & Ownership Verification
If access to a Jiinubi account is lost, Jiinubi will only restore access after successful ownership verification.
Verification may require:
- Access to the registered Client email address
- Invoice numbers or payment confirmation
- Account creation or service details
If ownership cannot be verified, access will not be restored — without exception.
4. Abuse, Suspicious Activity & Account Compromise
If Jiinubi detects suspicious, abusive, or potentially harmful activity, protective measures may be applied immediately.
Possible actions include:
- Temporary suspension of User access
- Password or session resets
- Security notifications sent to the Client
Account protection and service integrity take priority over convenience.
5. Phishing, Fake Invoices & Impersonation
Attackers may attempt to impersonate Jiinubi using fake emails, invoices, or messages.
- Jiinubi will never ask for your password
- Jiinubi will never request payment via WhatsApp, SMS, or social media
- All invoices must be verified inside the official Client Area
Always log in manually — never trust invoice links from unknown sources.
6. Preventing Account Takeover
Jiinubi provides enterprise-grade tools, but Clients are responsible for access control.
- Use strong, unique passwords
- Enable Two-Factor Authentication (2FA)
- Assign individual User accounts
- Remove access immediately when roles change
Never share login credentials between Users.
7. Responsibility Breakdown
| Party | Responsibility |
|---|---|
| Client | User access, passwords, internal controls, staff management |
| Jiinubi | Platform security, uptime, policy enforcement, support response |
| Jiinubi User Management System | Account framework, permission model, audit logging |
Jiinubi is not liable for losses caused by shared credentials, internal disputes, or Client-side negligence.
8. What Clients Can Expect From Jiinubi
- Consistent, policy-based decisions
- No favoritism or arbitrary actions
- Security-first responses
- Transparent communication
Clear rules protect everyone.