Our Terms And Conditions

By accessing the website gp-maroc.ma or any of its subsidiary landing pages, you agree to be bound by these Terms of Use and all applicable laws and regulations. If you do not agree with any of these terms, you are prohibited from using or accessing these sites.

2. Intellectual Property Rights

The GPM Holding group maintains strict ownership over all original content published on these sites.

  • Proprietary Media: All high-resolution images, drone footage, production line videos, and technical documents are protected by international copyright laws.
  • Trademarks: The logos for GPM Holding, Solaris, GPM Parks, and GPM Mobility are the exclusive property of the group. Unauthorized use or reproduction is strictly prohibited.
  • Technical Documents: Datasheets, catalogs, and technical descriptions shared on the sites remain the intellectual property of the respective entity (e.g., Solaris for panel specifications).

The GPM Holding website serves as a central hub and contains links to external landing pages with their own standalone domains (e.g., solaristangier.ma, gpm-parks.ma).

  • Redirection: Once you leave the GPM Holding site to visit an entity-specific domain, you are subject to the specific terms and policies of that landing page.
  • Third-Party Content: GPM Holding is not responsible for the availability or accuracy of content hosted on external sites linked from our pages.

4. Accuracy of Information

While we strive for precision, the content on these sites—particularly technical specifications and project solution descriptions—is provided for general informational purposes.

  • Updates: Technical details and product descriptions are subject to change without notice as new technology becomes available.
  • Disclaimer: GPM Holding does not warrant that the materials on its websites are accurate, complete, or current.

5. Prohibited Conduct

Users are prohibited from:

  • Attempting to decompile or reverse engineer any software contained on the websites.
  • Using the sites for any fraudulent or illegal purpose.
  • Interfering with the security features of the secure, static architecture.