Client company CoreNough LLC

Channel:
Compose

What isn't possible and allowed

to me & Billy Whitten
...
...

Hey guys,

Hope you are having a good week so far.

To begin with, you need to know that all of these mailboxes are governed by a minimalist yet effective whitelisting mechanism explained in this additional permanent email.

In concrete terms, you can't send emails to external addresses or receive emails from them. Exchanges can only be carried out between CoreNough employees, such as me, Aaron, Megan or Julianne from the sales team. This hard limit can be broken by asking our systems to make an exception, a special rule that only applies to one external email addresss.

As a result, the following is not allowed to be done with your email addresses j.doeson@corenough.com and b.whitten@corenough.com:

  • register it into any external and unknown online service,
  • add it to any mailing list,
  • or create any account with any website or app.

Why? because these third party services will at some point try to send emails to it, such as a confirmation email, a validation email, or something of the kind, and they will do it through an email address of their own, such as no-reply@website-UVW.com or registration@app-XYZ.com for instance, but not whitelisted, these email addresses will receive an error and their messages will never reach this online mailbox demo.

If you are known and trusted by the system, you will be able to write and respond to any email in order to get a better understanding of timeNough, with no particular limitation, and with attachments like in the screenshot above:

attachment screenshot

This interface is public and anyone can access it and view the received emails, so please be careful about what you want to exchange or test. Do not do anything that can be construed as illegal, illicit, or borderline in your communications!

Check out this fair use policy on the right by clicking here and see what is allowed and what is not.

Emails sent to or from whitelisted addresses will be automatically deleted after 1 hour.

That's all for me,

see ya later.


Researcher
Ryan Farell   
Senior Developer | CoreNough LLC
p:  +1 606-806-7604
w:  www.corenough.com
e:  r.farell@corenough.com
IMPORTANT: The contents of this email and any attachments are confidential. It is strictly forbidden to share any part of this message with any third party, without a written consent of the sender. If you received this message by mistake, please reply to this message and follow with its deletion, so that we can ensure such a mistake does not occur in the future.
  1. You must not use this mailbox replica of the specimen employee John Doeson (the Services) for:
    1. Unlawful, fraudulent, criminal or otherwise illegal activities;
    2. Sending, receiving, publishing, posting, distributing, disseminating, encouraging the receipt of, uploading, downloading or using any material which is offensive, abusive, defamatory, indecent, obscene, unlawful, harassing or menacing or a breach of the copyright, trademark, intellectual property, confidence, privacy or any other rights of any person;
    3. Commercial purposes, unless:
      1. You are working from home as a sole trader in business on your own account; or,
      2. You are a Business Customer and you use the Services only in the ordinary course of your business; and provided that in either case, any such use of the Services is always subject to paragraph 10 below;
    4. Sending or uploading unsolicited emails, advertising or promotional materials, offering to sell any goods or services, or conducting or forwarding surveys, contests or chain letters, except if you are working from home as a sole trader in business on your own account or you are a Business Customer and in either case you are permitted to send marketing communications in accordance with the Privacy and Electronic Communications Regulations;
    5. Knowingly or negligently creating, transmitting, storing, publishing or uploading any electronic material (including, without limit, files that contain viruses, corrupted files, Trojans or any other similar software or program) which is known or likely to cause, interrupt, damage, destroy or limit the functionality of any computer software, hardware or telecommunications equipment owned by us or any other Internet user or person;
    6. Activities that invade another’s privacy, cause annoyance, inconvenience or needless anxiety to any person;
    7. Activities that are in breach of any other third party’s rights, including downloading, installation or distribution of pirated software or other inappropriately licensed software, deletion of any author attributions, legal notices or proprietary designations or labels in any file that is uploaded, falsification of the origin or source of any software or other material;
    8. Anything that may disrupt or interfere with our network or Services or cause a host or the network to crash;
    9. Launching ‘denial of service’ attacks; ‘mailbombing’ attacks; or ‘flooding’ attacks against a host or network;
    10. Granting access to the Services to others not located at the premises at which the Services are connected, or, in any way reselling or re-providing the Services to third parties;
    11. Making excessive use of, or placing unusual burdens on, the network, for example by sending or receiving large volumes of email or excessively large email attachments; or circumventing the user authentication or security process of a host or network.
    12. You are responsible for all use of the Services through your whitelisted email address and for any breach of this Fair Usage Policy whether an unacceptable use occurs or is attempted, whether you knew or should have known about it, whether or not you carried out or attempted the unacceptable use alone, contributed to or acted with others or allowed any unacceptable use to occur by omission.
    13. It’s your responsibility to determine whether any of the content accessed via the Services is appropriate for children or anyone else in your household or office to view or use.
  2. This Quick Fair Usage Policy may be updated from time to time, and the latest version of the document will be made available in this page.

  3. If you believe that copyright material has been used in violation of this policy or otherwise been made available on the Services in a manner that is not authorized by the copyright owner, its agent or by law, please contact our legal team by writing to legal@timenough.com or to:

    timeNough Inc.
    2010 El Camino Real #2079
    Santa Clara, CA,
    USA 95050,
    Attention: legal team.

  4. Effective Date: March 20, 2022.
5 hours 11 mins You
Pic
late
Pic
Time Late 5 hours
⏱  When do you expect to arrive?

Please answer by following this safe link: https://time.sn/7wrcNv
4 hours 48 mins You
Pic
in
Pic
Time Clock-in 4 hours 46 mins
✅  Work day started: Clock-in signal received.
4 hours You
Pic
pause
Pic
Time Pause 3 hours 55 mins
Pause signal received: see you later.
1 hour You
Pic
back
Pic
Time Back 57 mins
✅  Back signal received: the pause is over.
32 mins You
Pic
out
🚫  Clock-out is not possible before 3:50 PM. Company's rules.
Just now You
Pic
Pic
Time Quant Just now