Acceptable Use Policy (AUP)
This policy outlines which practices are acceptable and which practices are not.
Application Privacy Notice
Keap takes the protection of personal data very seriously. This Notice addresses data subjects whose personal data we may receive in our hosted sales and marketing software applications from our customers or business partners.
This has our Billing Policy and our Refund Policy, as well as other related policies.
California Employee Privacy Notice
The California Employee Privacy Notice is designed to assist California residents who are employees, contractors or job applicants of Keap in understanding how we process their personal data.
This is a quick guide to chargebacks, how they work and how to avoid them.
Data Migration PGP Key
Encrypt sensitive data for PCI-compliant migration using this PGP key.
Data Protection and Privacy at Keap
Learn more about our data protection program and compliance initiatives.
Data Security Statement
Keap's Data Security Statement describes some of the security controls that we have implemented to help ensure the security of your data.
Learn more about how Keap handles DMCA takedown and counter requests.
End User License Agreement (EULA) for Mobile
Legal terms and conditions for using the Keap mobile application.
Third-Party Integrations API Privacy Notice
This Notice outlines how we will collect and use information if you connect certain third-party accounts for use with our services.
Learn more about Keap's HIPAA compliance program.
Marketplace Guidelines & Policy
Download this PDF for listing requirements, listing guidelines and read our policy related to listings in the Marketplace.
Pay Per Click Advertising Services
Terms of Service
This is the really long legal document that outlines all the things you agree to when you start using our software.
Trademark Usage Guidelines
Here are guidelines for correct Keap trademark usage, along with a list of Keap trademarks.
View our trademark usage guidelines
Vulnerability Reporting Policy (VRP)
This policy outlines vulnerability reporting practices.