Last update: 31 May 2020
General guidelines for a pleasant and productive use of the Cudy marketplace.
General guidelines for educators to run a successful business on the Cudy marketplace.
Students & Parents
Job Success scores, the Top Rated program, and detailed profile information make it easy to find freelancers with stellar work histories.
Upwork Messages lets you have real-time conversations before and after you hire. Keep communication open and expectations clear to enable a safe and successful workplace.
Escrow lets you double-check finished work once milestones are met – before you release pre-funded payments to your freelancer.
Work Diary helps ensure that an hour paid is an hour worked – giving you an easy-to-access billable time system with work details and in-progress screenshots.
Get help from our customer support team anytime, from anywhere. They’re living, breathing humans, here to help you solve Upwork-related issues.
Disputes rarely happen. But in the event they do occur, Upwork helps with dispute resolution.
Tutors & Coaches
Your success revolves around doing great work for great clients. Start by double-checking client trustworthiness through detailed profiles. Leverage our marketplace feedback system to browse comments from freelancers who’ve previously worked with the client.
Upwork Messages lets you have conversations in real time before and after you’re hired. Keep communication open and expectations clear to enable a safe and successful workplace.
Projects funded with escrow ensure that your work is funded before you even begin working on your client’s milestones.
Make sure an hour worked is an hour paid. As outlined in Upwork’s hourly escrow instructions, our Work Diary ensures that freelancers logging hourly time using the Upwork Team App are paid for hours worked.
You decide whether your profile and work are public or private. You can also change your privacy at any time in your profile settings. Read our privacy policy here.
Get help from our customer support team anytime, from anywhere. They’re living, breathing humans, here to help you solve Upwork-related issues.
Disputes rarely happen. But in the event they do occur, Upwork helps with dispute resolution.
Security
At Upwork, we take great measures to help ensure a safe and thriving online workplace. This includes security models that flag suspicious activity, tools that scan site content, and entire teams dedicated to freelancer and client success. But keeping our community safe takes teamwork. Here are some general tips and resources for best protecting yourself and your information online – whether on Upwork or elsewhere.
It’s important to keep your computer secure, both inside and out. Consider the following:
Treat your personal information like you would your wallet. Here are some tips:
Phishing is when unscrupulous users try to steal your financial information by impersonating a person or a business. A phishing attempt may:
Educating yourself and trusting your instincts are key to protecting yourself:
To report phishing attempts on Upwork, please contact us.
Malware includes computer viruses, spyware, and other intrusive software installed on your computer without your consent. To avoid malware:
To report possible malware on Upwork, please contact us.
To report a user, contact Customer Support. Or click “Report Message” within Upwork Messages to flag a specific message. To report a job or a user profile, please use the “Flag as inappropriate” link on the page. For more detailed instructions, refer to our help article here.
If you believe you’ve discovered a potential security vulnerability on Upwork, please email us as soon as possible while following the Guidelines for Responsible Disclosure.
FAQ
Tutor/Coach profiles include detailed information such as work experience, resumes, portfolios, and skillsets so you can better know who you’re hiring. Ultimately, however, it is your responsibility to do the final screening to help ensure that the tutor/coach is a great match for you and your learning.
It’s important to have a clear idea of what you want when creating an assignment post. As a tutor/coach, protect yourself by only accepting requests with reasonable requirements that you can meet.
With escrow, students pre-fund their transactions with Cudy Credits and release funds to their tutors/coaches as lessons are completed – knowing that they’ll be able to dispute or complete their lessons before releasing payment. Escrow also gives tutors/coaches the comfort of knowing that the student account is funded before they begin working.
We would encourage users to use the Cudy Chat function to resolve the dispute between parties before filing a case in our Dispute Resolution Centre at https://dispute.cudy.co.
We take security seriously at Cudy Technologies. If you think you’re the victim of a possible scam, immediately contact Customer Support – or use one of the “Flag as inappropriate” links throughout the site.
Our security model flags fraudulent activity to help ensure a safe community. We’re also here to help you succeed along the way, with 24/7 Cudy Technologies customer support and dispute assistance.
Educating yourself and trusting your instincts are key to safety. Here are certain types of scams and abuse to know and avoid.
Cudy Technologies is highly protective of your privacy, only disclosing information permitted by our Privacy Policy. This may include the rare instance of subpoena or other legal requirements, which you’ll find outlined in our protocol here.
All attachments and links transferred on Cudy marketplace are scanned for potentially malicious content.
Data sanitization is a type of security control that does not rely on threat detection. It works by assuming all files are malicious and then sanitizing and rebuilding each file to ensure the content is safeIt is effective against known and unknown threats, including zero-day attacks, undetectable malware, obfuscation, and more.
Executable files such as .exe, .bat and .vbs are prohibited and blocked. File attachments (such as Microsoft Office documents, Adobe .pdfs, images, etc.) are allowed but scanned for potentially malicious content.
In some cases, malware scanning will remove embedded macros, formulas or active content that is deemed potentially malicious.
Unknown file shares have previously been used for malicious activity on the Cudy marketplace. We regularly flag files for being suspicious and are automatically blocked.
A data scan is a type of security control that does not rely on threat detection. It works by assuming all files are malicious and then scans and rebuilds each file to ensure the content is safe. It is effective against known and unknown threats, including zero-day attacks, undetectable malware, obfuscation, and more.
Cudy Technologies utilizes modern link scanning tools to block malicious links from being shared within the Cudy marketplace.