Terms for using the Tailored Bytes website and services.
Last updated: May 2, 2026
1. Acceptable website use
You may use the Tailored Bytes website to learn about our services, contact us, request quotations, and access public information. You must not use the website for unlawful activity, spam, automated abuse, attempts to break security, or interference with normal operation.
2. Service enquiries
When you submit an enquiry, you are responsible for providing accurate contact details and enough information for us to understand your request. Submitting an enquiry does not create a binding service agreement until both parties agree on scope, price, payment, and delivery terms.
3. Quotations
Quotations are based on the information available at the time they are prepared. Prices, timelines, features, and assumptions may change if requirements change, technical constraints are discovered, third-party costs change, or additional work is requested.
4. Client responsibilities
Clients are responsible for giving timely feedback, supplying accurate content and access details, reviewing deliverables, paying agreed fees, and using systems responsibly. Delays in client input may affect delivery timelines.
5. Support limitations
Support is provided according to the agreed service arrangement. Unless otherwise agreed, support does not include unlimited feature development, third-party platform failures, issues caused by unauthorised changes, or work outside the agreed scope.
6. Intellectual property
Tailored Bytes retains rights to reusable methods, know-how, frameworks, templates, and internal tools used to deliver services. Client-specific content and deliverables are handled according to the agreed quotation, contract, or project terms.
7. Data and confidentiality
Both parties should treat non-public business, technical, client, school, billing, and access information as confidential. Clients must avoid sending passwords or sensitive access details through insecure channels where a safer method is available.
8. No misuse of systems
You must not misuse Tailored Bytes websites, portals, hosting accounts, software systems, demos, forms, or support channels. Prohibited misuse includes unauthorised access, vulnerability probing without permission, malware, credential sharing abuse, spam, scraping, or attempts to disrupt service.
9. Third-party services
Some services may rely on domain registrars, hosting providers, payment providers, email services, APIs, or other third-party systems. Their own terms, prices, uptime, privacy practices, and limitations may apply.
10. Changes to these terms
Tailored Bytes may update these Terms of Use from time to time. The updated version will be posted on this website and will apply from the date shown above unless otherwise stated.
11. Contact
For questions about these terms, contact Tailored Bytes at sales@tailoredbytes.co.zw or WhatsApp +263 774 226 785.