Rayner Software produces Mac and iPhone consumer applications
Rayner Software produces Mac and iPhone consumer applications. Started in 2002, Rayner Software has been producing and releasing apps spanning a broad array of categories from games to aviation software to privacy tools.
Rayner Software is registered as an LLC in the state of California.
Any purchase made through our website may be returned within 30 days for a full refund. Please contact us via the support form to request a refund. Purchases made through Apple's App Store must be refunded through Apple.
Purchasing System information & practices
The order page and the pages it communicates with all require encrypted transport using HTTPS. Credit card numbers are not stored on our server. Our servers are secure and have very limited access. Credit card orders are processed by Chase, using the Chase Paymentech system. Server communication between Rayner Software's server and the Chase server is secure and encrypted.
We do not share customer information. We maintain a database of software registration codes, as well as a database of orders. Each of these contains customer information. This information is considered private and privileged between the customer and Rayner Software. We will never sell or otherwise share customer information with any third party except when compelled by legal process to do so.
The NetShade User Agreement
1) Server Use Both paying subscribers and free trial users of NetShade shall comply with all US laws regarding their usage of the NetShade Proxy and/or VPN services. Examples of prohibited activities: exploitation of minors, blackmail/fraud, spam, pyramid or forwarding schemes, transmitting or receiving content outside the bounds of that content's copyright, or any other conduct or activity which violates United States law.
2) ISP Agreements Any agreement or contract you have in place with your ISP (Internet Service Provider, i.e. Comcast, Verizon, etc.) shall remain in effect. The activation of your NetShade agreement does not supersede any in-effect agreements with your ISP, but rather appends to it.
3) Copyright / DMCA DMCA refers to the Digital Millennium Copyright Act. When we receive a DMCA notice about a user activity conducted on one of our servers, we take the following steps:
1. Based upon information supplied in the complaint, attempt to identify the NetShade user responsible for the transmission.
2. Notify the user of the event and provide details. Ask them to stop.
3. If a DMCA comes in three times for the same user over a 1 year period, that account is banned.
DMCA takedown notices can be sent to firstname.lastname@example.org (see the About area of raynersw.com for more detailed DMCA contact information).
NetShade Legal & Data Retention
No person may use the NetShade Proxy and VPN servers in any illegal capacity, including but not limited to the unlicensed transfer of copyrighted materials, fraud, blackmail, spamming, threats to induce harm, or exploitation of a minor. Such cases may be subject to the disclosure policies defined below. No person may use NetShade in such a way as to cause deliberate harm to NetShade’s systems and services, including but not limited to DoS attacks or flooding. Such accounts will be deactivated.
NetShade Proxy servers maintain activity logs for a limited amount of time. These logs are protected and reside on servers with very limited administrative access. Logs are considered highly privileged information.
NetShade VPN servers maintain logs as sets of IP pairs for a period of seven days, after which time they are discarded and reduced to statistics. At this point they are no longer useful for determining user activity, and are used just for bandwidth accounting. The VPN servers also maintain logs of client connections and disconnections to the VPN, consisting of an IP, NetShade code, and timestamp. The access restrictions that apply to Proxy logs apply to VPN logs as well.
The divulgence of any portion of the NetShade accounts database or NetShade server logs to a third party shall generally require a court order or subpoena from a legitimate public authority. At our discretion, we may provide log information if we in good faith believe that our actions may prevent any heinous act, or preserve life or limb.
In the weeks following the NSA information leaks, the public became aware of a legal device being used by the U.S. Government known as a “National Security Letter”. These letters are reserved for matters pertaining to national security. The letters are purportedly requests for information such as log or subscriber data, with a clause that bars the recipient from talking about the letter or its contents. This gag clause is the reason these letters' existence has only recently been revealed.
To date, we have never received such a letter. In the future that may no longer be the case, but please be aware that we will likely be unable to discuss the letter's existence or contents, should we receive one.
Use of Log Data
Activity log data will never be used for marketing, research, or any other purpose outside of those specified above. Log data or derivatives thereof shall never be offered for sale in any form to any party.