Terms of Service; Didn't Read

“I have read and agree to the Terms” is the biggest lie on the web. We aim to fix that.

Welcome to our edit tool

Using this online tool, you can help to update the content of the ToS;DR website. Below are the most recent changes people have made. Above, you can see the menu bar, where you can navigate to the list of Services, or the Points search page.

How it works

A service is a website or online application, for instance YouTube. A case is an individual remark that can form part of the review of a service, for instance "you need to be 13 years old to use this service"; each is assigned a topic to provide grouping. A point links a case to a service, for instance "you need to be 13 years old to use YouTube".

To review a service's terms and conditions, first make sure the service is listed, and raise it on the reviewers forum if it isn't. Then read the actual terms and policies you have to agree to to use this service, and make a note about anything that you find remarkable. Find the existing case for each of these review remarks, or create it if necessary, and create a point to add that case as a remark in the review of the service. Use the checklist to see if you forgot to review any aspects.

Then you need to wait for a curator to approve your changes, after which your review will show up on https://tosdr.org, will be picked up by the ToS;DR browser extensions, and included in DuckDuckGo's Privacy Grade, for which our API is one of several input factors. For services whose terms and policies are tracked by ToSBack, you can try out our experimental annotate view.

This tool is still very much under construction, and has bugs. Please open a github issue for anything you think should be improved.

Examples (see all):

SourceHut

  •  Users shall not interfere with another person's enjoyment of the service
  •  The service provides two factor authentification for your account
  •  This service allows you to retrieve an archive of your data
  •  Users can scrape the site, as long as it doesn't impact the server too much
  •  Prohibits the posting of pornographic content
  •  You authorise the service to charge a credit card supplied on re-occurring basis
  •  The service has a no refund policy
  •  You are responsible for maintaining the security of your account and for the activities on your account
  •  User logs are deleted after a finite period of time
  •  This service requires first-party cookies, which are cookies that only belong to the domain of the service and not a third party.
  •  The service's data retention period is kept to the minimum necessary for fulfilling its purposes
  •  Users can access most of the pages on the service's website without revealing any personal information
  •  This service does not sell your personal data
  •  You can request access and deletion of personal data
  •  This service only shares user information with third parties when given specific consent
  •  The service warns you of the potential consequences related to third-party access
  •  This service can delete your content if you violate the terms
  •  The service can suspend your account for several reasons
  •  The service can delete specific content without prior notice and without a reason
  •  They may stop providing the service at any time
  •  The service can delete your account without prior notice and without a reason
  •  When the service wants to change its terms, users are notified a week or more in advance.
  •  The service may change its terms at any time, but the user will receive notification of the changes.
  •  Features of the website are made available under a free software license
  •  There is a date of the last update of the terms
  •  The service provides a free help desk
  •  The service provides information about how they intend to use your personal data
  •  The service provides details about what kinds of personal information they collect
  •  User feedback is invited regarding changes to the terms.
  •  You can choose the copyright license
  •  You can opt out of promotional communications
  •  The terms for this service are easy to read
  •  This service provides archives of their terms of service so that changes can be viewed over time
  •  This service does not guarantee that it or the products obtained through it meet the users' expectations or requirements
  •  The service provider makes no warranty regarding uninterrupted, timely, secure or error-free service
  •  The service is provided 'as is' and to be used at the users' sole risk
  •  This services gives no guarantee regarding quality
  •  This service prohibits users sending chain letters, junk mail, spam or any unsolicited messages
  •  This service is only available to users of a certain age
  •  Users agree not to submit illegal content
  •  The service will not allow third parties to access your personal information without a legal basis
  •  The service promises to inform and/or notify users regarding government inquiries that may involve users' personal data
  •  Users agree to comply with the law of the service's country
  •  This service can use your content for all their existing and future services
  •  You maintain ownership of your data
  •  This service does not track you
  •  The service allows you to use pseudonyms
A

Priority Matrix

  •  You can request access and deletion of personal data
  •  The service provides a complete list of all cookies set by its website
A

JetBrains

  •  The service allows you to opt out of providing personal information to third parties
  •  Third parties may be involved in operating the service
  •  This service is only available to users over a certain age
  •  The service informs users that its privacy policy does not apply to third party websites
  •  There is a date of the last update of the privacy policy
  •  This service uses your personal information for many different purposes
  •  This service can share your personal information to third parties
  •  This service forces users into binding arbitration in the case of disputes
  •  Blocking cookies may limit your ability to use the service
  •  There is a date of the last update of the terms
  •  The service can delete your account without prior notice and without a reason
  •  User logs are deleted after a finite period of time
  •  You must provide your legal name, pseudonyms are not allowed
  •  The service may use tracking pixels, web beacons, browser fingerprinting, and/or device fingerprinting on users.
  •   Terms may be changed any time at their discretion, without notice to the user
  •  This service ignores the Do Not Track (DNT) header and tracks users anyway even if they set this header.
C

Recent changes:

Agnes de Lion: 2020-11-24 14:39:01 UTC
--- id: - - 11628 user_id: - - 20760 title: - - The service may use tracking pixels, web beacons, browser fingerprinting, and/or device fingerprinting on users. source: - - https://www.tiktok.com/en/privacy-policy-row status: - - pending analysis: - - Generated through the annotate view created_at: - - &1 2020-11-24 14:39:01.845488975 Z updated_at: - - *1 service_id: - - 1448 quoteText: - - |- We use cookies and other similar technologies (e.g. web beacons, flash cookies, etc.) (“Cookies”) to enhance your experience using the Platform, improve our services, and provide you with targeted advertising . case_id: - - 323 quoteStart: - - 10050 quoteEnd: - - 10260 document_id: - - 1089
Agnes de Lion: 2020-11-24 14:38:37 UTC
--- id: - - 11627 user_id: - - 20760 title: - - The service is provided 'as is' and to be used at the users' sole risk source: - - https://www.tiktok.com/en/terms-of-use-row status: - - pending analysis: - - Generated through the annotate view created_at: - - &1 2020-11-24 14:38:37.900856235 Z updated_at: - - *1 service_id: - - 1448 quoteText: - - THE SERVICES ARE PROVIDED “AS IS” AND WE MAKE NO WARRANTY OR REPRESENTATION TO YOU WITH RESPECT TO THEM. case_id: - - 286 quoteStart: - - 27104 quoteEnd: - - 27208 document_id: - - 1093
Agnes de Lion: 2020-11-24 12:12:14 UTC
--- id: - - 11626 user_id: - - 20760 title: - - The service provides two factor authentification for your account source: - - https://protonmail.com/support/knowledge-base/two-factor-authentication/ status: - - pending analysis: - - "The document proving 2FA is avalaible for all Protonmail user accounts is impossible to upload to ToS;DR.\r\nYou'll find the information here:\r\nhttps://protonmail.com/support/knowledge-base/two-factor-authentication/\r\n" created_at: - - &1 2020-11-24 12:12:14.307012127 Z updated_at: - - *1 service_id: - - 491 case_id: - - 312
Agnes de Lion: 2020-11-24 12:08:02 UTC
--- id: - 3157 - name: - About 2FA - url: - https://protonmail.com/support/knowledge-base/two-factor-authentication/ - xpath: - '' - text: - '' - created_at: - 2020-11-24 11:04:33.577318000 Z - updated_at: - 2020-11-24 11:05:09.335852000 Z - service_id: - 491 - reviewed: - - user_id: - 20760 -
Agnes de Lion: 2020-11-24 11:05:09 UTC
--- text: - - '' updated_at: - 2020-11-24 11:04:33.577318087 Z - 2020-11-24 11:05:09.335852566 Z
Agnes de Lion: 2020-11-24 11:04:33 UTC
--- id: - - 3157 name: - - About 2FA url: - - https://protonmail.com/support/knowledge-base/two-factor-authentication/ xpath: - - '' created_at: - - &1 2020-11-24 11:04:33.577318087 Z updated_at: - - *1 service_id: - - 491 user_id: - - 20760
Agnes de Lion: 2020-11-24 10:58:58 UTC
--- id: - 3156 - name: - Account Security - url: - https://protonmail.com/security-details - xpath: - '' - text: - " <i>\n</i> Limited-time offer: Black Friday sale, get up to 50% off.\nLimited-time offer: Cyber Monday sale, get up to 50% off.\nExtended Black Friday sale, get up to 50% off.\nSelect your deal now.\nSelect your deal now.\nExclusive Black Friday deals Exclusive Cyber Monday deals Extended Black Friday deals <i>\n</i>\n<i>\n</i>\n<i>\n</i>\n<i>\n</i> Mastodon <ul>\n<li>CA - Català</li>\n<li>CS - Čeština</li>\n<li>DA - Dansk</li>\n<li>DE - Deutsch</li>\n<li>EL - Ελληνικά</li>\n<li>EN - English</li>\n<li>ES - Español (España)</li>\n<li>FR - Français</li>\n<li>HR - Hrvatski</li>\n<li>HU - Magyar</li>\n<li>ID - Bahasa (Indonesia)</li>\n<li>IS - íslenska</li>\n<li>IT - Italiano</li>\n<li>JP - 日本語</li>\n<li>KAB - Taqbaylit</li>\n<li>NL - Dutch</li>\n<li>PL - Polski</li>\n<li>PT-BR - Português (Brasil)</li>\n<li>PT - Português (Portugal)</li>\n<li>RO - Română</li>\n<li>RU - Русский</li>\n<li>SV - Svenska</li>\n<li>TR - Türkçe</li>\n<li>UA - Українська</li>\n<li>ZH-Hans - 简体中文</li>\n<li>ZH-Hant - 繁體中文</li>\n<li> Help Translate </li>\n</ul> Toggle navigation <ul>\n<li> About </li>\n<li> Security </li>\n<li> Blog </li>\n<li> Careers </li>\n<li> Support </li>\n<li> Business </li>\n<li> VPN </li>\n<li> LOG IN </li>\n<li> SIGN UP </li>\n</ul> Language: CA - Català CS - Čeština DA - Dansk DE - Deutsch EL - Ελληνικά EN - English ES - Español (España) FR - Français HR - Hrvatski HU - Magyar ID - Bahasa (Indonesia) IS - íslenska IT - Italiano JP - 日本語 KAB - Taqbaylit NL - Dutch PL - Polski PT-BR - Português (Brasil) PT - Português (Portugal) RO - Română RU - Русский SV - Svenska TR - Türkçe UA - Українська ZH-Hans - 简体中文 ZH-Hant - 繁體中文 End-to-End Encryption Messages are encrypted at all times <p>Messages are stored on ProtonMail servers in encrypted format.\nThey are also transmitted in encrypted format between our servers and user devices.\nMessages between ProtonMail users are also transmitted in encrypted form within our secure server network.\nBecause data is encrypted at all steps, the risk of message interception is largely eliminated.</p>\n<p>&nbsp;</p> Zero Access to User Data Your encrypted data is not accessible to us <p>ProtonMail's zero access architecture means that your data is encrypted in a way that makes it inaccessible to us.\nData is encrypted on the client side using an encryption key that we do not have access to.\nThis means we don't have the technical ability to decrypt your messages, and as a result, we are unable to hand your data over to third parties.\nWith ProtonMail, privacy isn't just a promise, it is mathematically ensured.\nFor this reason, we are also unable to do data recovery.\nIf you forget your password, we cannot recover your data.</p>\n<em>End-to-end encryption means that no one but the intended recipient can read the message</em>\n<p>&nbsp;</p> Open Source Cryptography Time-tested and trusted encryption algorithms <p>We use only secure implementations of AES, RSA, along with OpenPGP.\nFurthermore, all of the cryptographic libraries we use are open source.\nBy using open source libraries, we can guarantee that the encryption algorithms we are using do not have clandestinely built in back doors.\nProtonMail's open source software has been thoroughly vetted by security experts from around the world to ensure the highest levels of protection.</p>\n<p>Learn about ProtonMail and Open Source</p>\n<p>\n</p>\n<em>By using open source encryption libraries, we can help guard against back doors designed to compromise your privacy.</em>\n<p>&nbsp;</p> Swiss Based Incorporated in Switzerland <p>All user data is protected by the Swiss Federal Data Protection Act (DPA) and the Swiss Federal Data Protection Ordinance (DPO) which offers some of the strongest privacy protection in the world for both individuals and corporations.\nAs ProtonMail is outside of US and EU jurisdiction, only a court order from the Cantonal Court of Geneva or the Swiss Federal Supreme Court can compel us to release the extremely limited user information we have.</p>\n<p>Learn more</p>\n<p>&nbsp;</p> Hardware Level Security Full disk encryption and storage in secured datacenters <p>We have invested heavily in owning and controlling our own server hardware at several locations within Switzerland <strong>so your data never goes to the cloud.</strong> Our primary datacenter is located under 1000 meters of granite rock in a heavily guarded bunker which can survive a nuclear attack.\nThis provides an extra layer of protection by ensuring your encrypted emails are not easily accessible to any third parties.\nOn a system level, our servers utilize fully encrypted hard disks with multiple password layers so data security is preserved even if our hardware is seized.</p>\n<p>&nbsp;</p>\n<em>All ProtonMail servers and network traffic are encrypted</em> Anonymous No tracking or logging of personally identifiable information <p>Unlike competing services, we do not save any tracking information.\nBy default, we do not record metadata such as the IP addresses used to log into accounts.\nAs we have no way to read encrypted emails, we do not serve targeted advertisements.\nTo protect user privacy, ProtonMail does not require any personally identifiable information to register.</p>\n<p>\n</p>\n<p>&nbsp;</p> Self Destructing Messages With ProtonMail, emails are no longer permanent <p>You can set an optional expiration time on ProtonMail’s encrypted emails, so they will be automatically deleted from the recipient’s inbox once they have expired.\nThis technology works for both emails sent to other ProtonMail users, and encrypted emails sent to non-ProtonMail email addresses.\nSimilar to SnapChat, we’ve added a way for you to have ephemeral communication.</p> SSL Secured Connections Swiss SSL to secure your connection! <p>We use SSL to secure communication between our server and your computer.\nMessage data between our server and your computer is already sent encrypted, but we use SSL to add another layer of protection and to ensure that the web page your browser loads is not tampered with by a third party intercepting your traffic in a MITM (Man in the Middle) attack.</p>\n<p>Our SSL certificate authority (CA) is QuoVadis Trustlink Schweiz AG, a leading Swiss SSL certificate issuer.\nUsing a Swiss based CA ensures that our CA's SSL infrastructure is not under the control of US or EU government agencies.\nTo allow extremely security conscious users to further verify that they are in fact connecting to our server, we have also released the SHA1 and SHA-256 hash for our SSL public key.</p> Securely communicate with other email providers Even your communication with non-ProtonMail users can be secure <p>We support sending encrypted communication to non-ProtonMail users via symmetric encryption.\nWhen you send an encrypted message to a non-ProtonMail user, they receive a link which loads the encrypted message onto their browser, which they can decrypt using a passphrase that you have shared with them.\nYou can also send unencrypted messages to Gmail, Yahoo, Outlook and others, just like regular email.</p> Easy to Use Comprehensive Security for Everyone <p>We created ProtonMail because we found that none of the existing secure email services available today are sufficiently secure.\nHowever, a secure service like ProtonMail cannot improve the security landscape if it is so difficult to use, nobody can use it.\nFrom the start, we designed ProtonMail with a strong emphasis on usability.\nAs a result, ProtonMail is very easy to use.\nThere is nothing to install, and no encryption keys to manage, if you can use Gmail, Thunderbird, or Outlook, you can use ProtonMail.</p>\n<p>&nbsp;</p>\n<p>&nbsp;</p> Learn More About ProtonMail <p> Why Switzerland Threat Model Transparency Report Bug Bounty Program Sign up </p> Get your secure email account Create Account <p>Proton Technologies AG</p>\n<p> Route de la Galaise 32,<br> 1228 Plan-les-Ouates<br> Geneva, Switzerland </p>\n<p>\n<i>\n</i> General: Show email<br>\n<i>\n</i> Media: media@protonmail.com<br>\n<i>\n</i> Legal: legal@protonmail.com<br>\n<i>\n</i> Partnership: partners@protonmail.com </p>\n<p>\n<i>\n</i> Security: security@protonmail.com <i>\n</i> &lt;p&gt;&lt;em&gt;Email us for our PGP public key if you want to send us a manually encrypted PGP email.\nOr enable JavaScript to view it.&lt;/em&gt;&lt;/p&gt.\n<br>\n<i>\n</i> Abuse: abuse@protonmail.com <br> For legal/police inquiries<br>click here </p>\n<p> For support inquiries, please visit<br>\n<i>\n</i> protonmail.com/support </p> × security@protonmail.com PGP Public Key If you don't know how to manually encrypt PGP emails and send them, this may not be for you.\nWe will let you know if we can't decrypt your message.\n-----BEGIN PGP PUBLIC KEY BLOCK-----\nVersion: OpenPGP.js v4.3.0\nComment: https://openpgpjs.org xsFNBFgXnNwBEADDvpflLPNrbYvxcNuCcGdTAjGmRLgZRhANvOuAqMd/vTID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\nVCcIf3clIQfiCfs76qEz9pW8LBANtuoBA8gxkRxNe1ia3Ljw\n=IoDL\n-----END PGP PUBLIC KEY BLOCK----- Close ProtonMail <ul>\n<li> Pricing </li>\n<li> Security </li>\n<li> Shop </li>\n<li> Press/Media Kit </li>\n<li> Onion Site </li>\n<li> ProtonMail Status </li>\n</ul> Features <ul>\n<li> iOS App </li>\n<li> Android App </li>\n<li> IMAP/SMTP Bridge </li>\n<li> ProtonVPN </li>\n<li> Business Email </li>\n<li> Encrypted Contacts </li>\n</ul> Legal <ul>\n<li> Imprint </li>\n<li> Privacy Policy </li>\n<li> Terms &amp.\nConditions </li>\n<li> Transparency Report </li>\n<li> Report Abuse </li>\n<li> GDPR Compliance </li>\n</ul> Company <ul>\n<li> Blog </li>\n<li> Team </li>\n<li> Careers </li>\n<li> Support </li>\n<li> Donate </li>\n<li> Open Source </li>\n</ul> Social <ul>\n<li>\n<i>\n</i>Facebook </li>\n<li>\n<i>\n</i>Twitter </li>\n<li>\n<i>\n</i>Reddit </li>\n<li>\n<i>\n</i>Instagram </li>\n<li> Mastodon </li>\n<li>\n<i>\n</i>Feedback Forum </li>\n</ul>\n<p>&nbsp;</p>\n<p>\n</p>\n<p>© $currentYear Proton Technologies AG.\nAll Rights Reserved.</p> Català |\nČeština |\nDansk |\nDeutsch |\nΕλληνικά |\nEnglish |\nEspañol (España) |\nFrançais |\nHrvatski |\nMagyar |\nBahasa (Indonesia) |\níslenska |\nItaliano |\n日本語 |\nTaqbaylit |\nDutch |\nPolski |\nPortuguês (Brasil) |\nPortuguês (Portugal) |\nRomână |\nРусский |\nSvenska |\nTürkçe |\nУкраїнська |\n简体中文 |\n繁體中文 × General Inquiries <p> For customer support inquiries, please submit the following form for the fastest response:<br> https://protonmail.com/support-form </p>\n<p> For all other inquiries:<br>contact@protonmail.com </p>\n<p> You can also Tweet to us:<br>twitter.com/protonmail </p> Close " - created_at: - 2020-11-24 10:56:09.936482000 Z - updated_at: - 2020-11-24 10:56:11.854347000 Z - service_id: - 491 - reviewed: - - user_id: - 20760 -
Agnes de Lion: 2020-11-24 10:56:11 UTC
--- text: - - " <i>\n</i> Limited-time offer: Black Friday sale, get up to 50% off.\nLimited-time offer: Cyber Monday sale, get up to 50% off.\nExtended Black Friday sale, get up to 50% off.\nSelect your deal now.\nSelect your deal now.\nExclusive Black Friday deals Exclusive Cyber Monday deals Extended Black Friday deals <i>\n</i>\n<i>\n</i>\n<i>\n</i>\n<i>\n</i> Mastodon <ul>\n<li>CA - Català</li>\n<li>CS - Čeština</li>\n<li>DA - Dansk</li>\n<li>DE - Deutsch</li>\n<li>EL - Ελληνικά</li>\n<li>EN - English</li>\n<li>ES - Español (España)</li>\n<li>FR - Français</li>\n<li>HR - Hrvatski</li>\n<li>HU - Magyar</li>\n<li>ID - Bahasa (Indonesia)</li>\n<li>IS - íslenska</li>\n<li>IT - Italiano</li>\n<li>JP - 日本語</li>\n<li>KAB - Taqbaylit</li>\n<li>NL - Dutch</li>\n<li>PL - Polski</li>\n<li>PT-BR - Português (Brasil)</li>\n<li>PT - Português (Portugal)</li>\n<li>RO - Română</li>\n<li>RU - Русский</li>\n<li>SV - Svenska</li>\n<li>TR - Türkçe</li>\n<li>UA - Українська</li>\n<li>ZH-Hans - 简体中文</li>\n<li>ZH-Hant - 繁體中文</li>\n<li> Help Translate </li>\n</ul> Toggle navigation <ul>\n<li> About </li>\n<li> Security </li>\n<li> Blog </li>\n<li> Careers </li>\n<li> Support </li>\n<li> Business </li>\n<li> VPN </li>\n<li> LOG IN </li>\n<li> SIGN UP </li>\n</ul> Language: CA - Català CS - Čeština DA - Dansk DE - Deutsch EL - Ελληνικά EN - English ES - Español (España) FR - Français HR - Hrvatski HU - Magyar ID - Bahasa (Indonesia) IS - íslenska IT - Italiano JP - 日本語 KAB - Taqbaylit NL - Dutch PL - Polski PT-BR - Português (Brasil) PT - Português (Portugal) RO - Română RU - Русский SV - Svenska TR - Türkçe UA - Українська ZH-Hans - 简体中文 ZH-Hant - 繁體中文 End-to-End Encryption Messages are encrypted at all times <p>Messages are stored on ProtonMail servers in encrypted format.\nThey are also transmitted in encrypted format between our servers and user devices.\nMessages between ProtonMail users are also transmitted in encrypted form within our secure server network.\nBecause data is encrypted at all steps, the risk of message interception is largely eliminated.</p>\n<p>&nbsp;</p> Zero Access to User Data Your encrypted data is not accessible to us <p>ProtonMail's zero access architecture means that your data is encrypted in a way that makes it inaccessible to us.\nData is encrypted on the client side using an encryption key that we do not have access to.\nThis means we don't have the technical ability to decrypt your messages, and as a result, we are unable to hand your data over to third parties.\nWith ProtonMail, privacy isn't just a promise, it is mathematically ensured.\nFor this reason, we are also unable to do data recovery.\nIf you forget your password, we cannot recover your data.</p>\n<em>End-to-end encryption means that no one but the intended recipient can read the message</em>\n<p>&nbsp;</p> Open Source Cryptography Time-tested and trusted encryption algorithms <p>We use only secure implementations of AES, RSA, along with OpenPGP.\nFurthermore, all of the cryptographic libraries we use are open source.\nBy using open source libraries, we can guarantee that the encryption algorithms we are using do not have clandestinely built in back doors.\nProtonMail's open source software has been thoroughly vetted by security experts from around the world to ensure the highest levels of protection.</p>\n<p>Learn about ProtonMail and Open Source</p>\n<p>\n</p>\n<em>By using open source encryption libraries, we can help guard against back doors designed to compromise your privacy.</em>\n<p>&nbsp;</p> Swiss Based Incorporated in Switzerland <p>All user data is protected by the Swiss Federal Data Protection Act (DPA) and the Swiss Federal Data Protection Ordinance (DPO) which offers some of the strongest privacy protection in the world for both individuals and corporations.\nAs ProtonMail is outside of US and EU jurisdiction, only a court order from the Cantonal Court of Geneva or the Swiss Federal Supreme Court can compel us to release the extremely limited user information we have.</p>\n<p>Learn more</p>\n<p>&nbsp;</p> Hardware Level Security Full disk encryption and storage in secured datacenters <p>We have invested heavily in owning and controlling our own server hardware at several locations within Switzerland <strong>so your data never goes to the cloud.</strong> Our primary datacenter is located under 1000 meters of granite rock in a heavily guarded bunker which can survive a nuclear attack.\nThis provides an extra layer of protection by ensuring your encrypted emails are not easily accessible to any third parties.\nOn a system level, our servers utilize fully encrypted hard disks with multiple password layers so data security is preserved even if our hardware is seized.</p>\n<p>&nbsp;</p>\n<em>All ProtonMail servers and network traffic are encrypted</em> Anonymous No tracking or logging of personally identifiable information <p>Unlike competing services, we do not save any tracking information.\nBy default, we do not record metadata such as the IP addresses used to log into accounts.\nAs we have no way to read encrypted emails, we do not serve targeted advertisements.\nTo protect user privacy, ProtonMail does not require any personally identifiable information to register.</p>\n<p>\n</p>\n<p>&nbsp;</p> Self Destructing Messages With ProtonMail, emails are no longer permanent <p>You can set an optional expiration time on ProtonMail’s encrypted emails, so they will be automatically deleted from the recipient’s inbox once they have expired.\nThis technology works for both emails sent to other ProtonMail users, and encrypted emails sent to non-ProtonMail email addresses.\nSimilar to SnapChat, we’ve added a way for you to have ephemeral communication.</p> SSL Secured Connections Swiss SSL to secure your connection! <p>We use SSL to secure communication between our server and your computer.\nMessage data between our server and your computer is already sent encrypted, but we use SSL to add another layer of protection and to ensure that the web page your browser loads is not tampered with by a third party intercepting your traffic in a MITM (Man in the Middle) attack.</p>\n<p>Our SSL certificate authority (CA) is QuoVadis Trustlink Schweiz AG, a leading Swiss SSL certificate issuer.\nUsing a Swiss based CA ensures that our CA's SSL infrastructure is not under the control of US or EU government agencies.\nTo allow extremely security conscious users to further verify that they are in fact connecting to our server, we have also released the SHA1 and SHA-256 hash for our SSL public key.</p> Securely communicate with other email providers Even your communication with non-ProtonMail users can be secure <p>We support sending encrypted communication to non-ProtonMail users via symmetric encryption.\nWhen you send an encrypted message to a non-ProtonMail user, they receive a link which loads the encrypted message onto their browser, which they can decrypt using a passphrase that you have shared with them.\nYou can also send unencrypted messages to Gmail, Yahoo, Outlook and others, just like regular email.</p> Easy to Use Comprehensive Security for Everyone <p>We created ProtonMail because we found that none of the existing secure email services available today are sufficiently secure.\nHowever, a secure service like ProtonMail cannot improve the security landscape if it is so difficult to use, nobody can use it.\nFrom the start, we designed ProtonMail with a strong emphasis on usability.\nAs a result, ProtonMail is very easy to use.\nThere is nothing to install, and no encryption keys to manage, if you can use Gmail, Thunderbird, or Outlook, you can use ProtonMail.</p>\n<p>&nbsp;</p>\n<p>&nbsp;</p> Learn More About ProtonMail <p> Why Switzerland Threat Model Transparency Report Bug Bounty Program Sign up </p> Get your secure email account Create Account <p>Proton Technologies AG</p>\n<p> Route de la Galaise 32,<br> 1228 Plan-les-Ouates<br> Geneva, Switzerland </p>\n<p>\n<i>\n</i> General: Show email<br>\n<i>\n</i> Media: media@protonmail.com<br>\n<i>\n</i> Legal: legal@protonmail.com<br>\n<i>\n</i> Partnership: partners@protonmail.com </p>\n<p>\n<i>\n</i> Security: security@protonmail.com <i>\n</i> &lt;p&gt;&lt;em&gt;Email us for our PGP public key if you want to send us a manually encrypted PGP email.\nOr enable JavaScript to view it.&lt;/em&gt;&lt;/p&gt.\n<br>\n<i>\n</i> Abuse: abuse@protonmail.com <br> For legal/police inquiries<br>click here </p>\n<p> For support inquiries, please visit<br>\n<i>\n</i> protonmail.com/support </p> × security@protonmail.com PGP Public Key If you don't know how to manually encrypt PGP emails and send them, this may not be for you.\nWe will let you know if we can't decrypt your message.\n-----BEGIN PGP PUBLIC KEY BLOCK-----\nVersion: OpenPGP.js v4.3.0\nComment: https://openpgpjs.org xsFNBFgXnNwBEADDvpflLPNrbYvxcNuCcGdTAjGmRLgZRhANvOuAqMd/vTID\nfrdnzDx+fGBxiZvK97hkRxRZh5+E5fAXgDjkb+bepVbFhzGKa5yXAJgSkAMR\n3EPozkFnWlFhd1+TrNkGkS4k1IvB60TBnm0ppDo7oIINREFrYDg5orubngzW\nLPy67KZa9kRElZteLukrkdrZJZl/zAp/wxWzdklafgKJ8W3VbINiyaj8Pvsk\nutX3+s2VrMsDg5YRFkb1xpSP8q/ed7qZrhaENC26+SxE/9b40G+Y/Jn9dOzg\n9QI/xGp5OfCWd2FZ5MYimjmp9cyz+Yam+mlxHFOCE4RnnKP/xB5n/IdsWH46\nE/DsC6Uec9rQM0MDtHQZGmS2EHo/JuDelhkgpOy6ZICL2BOgJW57vw3lQ6OO\nPuANpipHlpHRKa4B+iLpWbJdgr3B4S0oX0saARZkE61M48uRQM44ja7yDCza\nwQ3HmwC3xLDFKip9E+mn4dufooF4G7DWCs4HnLBMQsal5RKMo4bPd1mezh2l\nbdej/EXdBYF5lioqSTcHR4UTQzmje9fzJYTTW2z8o5wRrM8GqqcKOSnGF60k\nq1LjRVg1XL/BnR5j00OZhG23Qdl13Wmx70Ni+hPF0Pt0lpVYsqV6yL3Z3Ngl\njWU5NBrn3Cm7II7t0ek0JRw9U1aF45SjeNgZ1QARAQABzTFzZWN1cml0eUBw\ncm90b25tYWlsLmNvbSA8c2VjdXJpdHlAcHJvdG9ubWFpbC5jb20+wsF/BBAB\nCAApBQJYyt/tBgsJBwgDAgkQzddgteYNtPgEFQgKAgMWAgECGQECGwMCHgEA\nCgkQzddgteYNtPjDxw/6Akui3uN8IV8gafEbIr98P1FzTqWeLq+0sWZURlsp\nucC+Tj/FJHTqOXlVqocilsRLXgZo+axX7/9l0sE0pm/2Yiz1ToFHTS8x7dxH\nuUeUIaw8g91DYmqKikgFknf+XKFPg+qorEXUnzKWKkpgKJ9ymcXNMxwUlo+4\n7OsN3Wncmes3OdYdzEhhkt9LNt099G/OxuAymqQ/ojCJb3nb0yj8mLNbNzR+\nT97rpCLdUWIjejIPZN4VVrhMf6aQhN3Mvet/Beqw/kPx9u8iROw7Y65lq7CM\nZZXLYfVSOZCaQjMnX8RsIhy6Lwytf0QOK+4EsK/nJ6S3FECaF7nQg6m71xRW\nKJLAtCWJWrML2nyKsC5OLeseafMC3Vk81niltdEJKs8xPv66FhBJFJ4Antzp\nyeu/pvh6RhyElk9mLgs+IKe13u1zi4QerUgL7uf1sF9qUp8gZ6qFv1lY09t8\nJre5OtjYS/JRDoPNObejI2zQRnFXLRmCxSwbgsjj49hij1NjB355bZ+z0Epb\nOQAcL5nNdWjmFzvsIDnGsYohaCwPO21BoS430o6ULXG3A3XE09e3vbxlcsly\nk2w580irZ27UYGzJd8Z3cLUwPY4u8/+4kWDRGuH3G94iQf+JPmxWhvVK4QFI\nRsfEJ7ARU1yd3A6T9EOlzGIMMUko5irwsVcoYTPc6vbOwU0EWBec3AEQAMlh\nObI5oRLXlgXMKYA64nMVBZuG2pLedqpFB5ccybPYVBrPWKpV8x2rAgmuLrhC\n1Jyk2ftem0SVjCABrPWR92m11yzQirrWyWBZJeVINrZCuOrk0SD24ULpd+rR\n6k5DJ4atrsO2MJudjpSFwFO0Zf45n1uiHvvg5iX15IRX2G1wrjNkG+Y9nNnC\n3Z7h+Nqjfnlv8c9A9aYvfTn4c9tCc76DtMv7hMl46bBf06K7/1F8py+mQuGC\n2yP/GIePV5XGwe0/ZXncgWlt1OBdyYCwQzgvcgSKI0wSf4zcFmdVsBOiRhXZ\nahs9nGT8X/c8lvkdix0z+9qFW+/ryCNm9m2vD1t+NgvaUFgALpFwmqX2hAL6\n1btVMo5wL5z9P87Nc+9NDb2s5L8qcrzjBGZueviJd+z7YL8z3uQBLTPCXfJP\nvacO1+rRHnF0mmLdUKWjxBakoQndrgh7jd595cn+W5gWOetgacdWowG35fnO\nLGwCulzNsJPwChiPWFQXT6ZVllA/Wgp+Jh+z0IWTc+1Su2eSbivH/kfbqKLd\nFDflWq+cFxcNjVr+rex+Vvi1CTx1/eulqxs7Vm3dOQM9Utbww/1ZlMw8PfCy\nwP5uwojS1OoFkT+vsnMX8jvb5E5K5e2OLy8+dE7ggAi6K0dsxWLJ971MJyYB\nCeYQl63w1Q0I+eA8T3RpABEBAAHCwWkEGAEIABMFAljK3+8JEM3XYLXmDbT4\nAhsMAAoJEM3XYLXmDbT4AUoQALEr/H52Mn6JmqRItX0LGjFo1CaCKOU15Xtl\nnXkDu4sxJeO3tN5I79T4Rldfkv3rWH/BXdVKyuCDPQbOVDWdT9YJdghqt+XK\nu4BhOniiBHM45JrPzZAae9b8IRJ700ZTPe24Wzdr9aZRwv8jCsRuZ6YvXQjQ\nhYkCLltUQ7Q0kEXAEsLxzTXC7KxPi8cIgjMe5jv9yoFk97/nNnc1pHWqpoSy\ne9Q54sjPak0K5yXic9RSuyG1sDE3KPx1gZ9T3kTG3jPh5Cic09ncvFGMA3iN\nRm5dIvPnH+oOn71bbcducqOWyLCYwhDc0rE73t9QJZbN3vHGdvnv4Smoku3G\njw7BklRbPnH6ZBuVXHNaq0PglDVILIyWYv66NYyZvSN0BbIYN+POVYaAZm/R\nAQ/U+KaSLIJkOjAgxc6PQDvxgIDl/jaeZE7UjOi+83MDsoks5hZgGO99lBoz\n9pXlthFPXDbOGfwCYspKeJseTT+QD6cASu63BI0mDHv6/toF3qxgmH0vw5sA\n0t9R3ZaSlr/fCSp/Ykj7pZPzhNNnzgh1apTi8qr/G2dMgqV+wbmYrb/Ulzyw\n+gbKqyFRxmxIfyxUVc9gOF50JV8ALjFmjAvUsrChmnTQxiXWCKPlc6ecvJKn\nVCcIf3clIQfiCfs76qEz9pW8LBANtuoBA8gxkRxNe1ia3Ljw\n=IoDL\n-----END PGP PUBLIC KEY BLOCK----- Close ProtonMail <ul>\n<li> Pricing </li>\n<li> Security </li>\n<li> Shop </li>\n<li> Press/Media Kit </li>\n<li> Onion Site </li>\n<li> ProtonMail Status </li>\n</ul> Features <ul>\n<li> iOS App </li>\n<li> Android App </li>\n<li> IMAP/SMTP Bridge </li>\n<li> ProtonVPN </li>\n<li> Business Email </li>\n<li> Encrypted Contacts </li>\n</ul> Legal <ul>\n<li> Imprint </li>\n<li> Privacy Policy </li>\n<li> Terms &amp.\nConditions </li>\n<li> Transparency Report </li>\n<li> Report Abuse </li>\n<li> GDPR Compliance </li>\n</ul> Company <ul>\n<li> Blog </li>\n<li> Team </li>\n<li> Careers </li>\n<li> Support </li>\n<li> Donate </li>\n<li> Open Source </li>\n</ul> Social <ul>\n<li>\n<i>\n</i>Facebook </li>\n<li>\n<i>\n</i>Twitter </li>\n<li>\n<i>\n</i>Reddit </li>\n<li>\n<i>\n</i>Instagram </li>\n<li> Mastodon </li>\n<li>\n<i>\n</i>Feedback Forum </li>\n</ul>\n<p>&nbsp;</p>\n<p>\n</p>\n<p>© $currentYear Proton Technologies AG.\nAll Rights Reserved.</p> Català |\nČeština |\nDansk |\nDeutsch |\nΕλληνικά |\nEnglish |\nEspañol (España) |\nFrançais |\nHrvatski |\nMagyar |\nBahasa (Indonesia) |\níslenska |\nItaliano |\n日本語 |\nTaqbaylit |\nDutch |\nPolski |\nPortuguês (Brasil) |\nPortuguês (Portugal) |\nRomână |\nРусский |\nSvenska |\nTürkçe |\nУкраїнська |\n简体中文 |\n繁體中文 × General Inquiries <p> For customer support inquiries, please submit the following form for the fastest response:<br> https://protonmail.com/support-form </p>\n<p> For all other inquiries:<br>contact@protonmail.com </p>\n<p> You can also Tweet to us:<br>twitter.com/protonmail </p> Close " updated_at: - 2020-11-24 10:56:09.936482382 Z - 2020-11-24 10:56:11.854347418 Z
Agnes de Lion: 2020-11-24 10:56:09 UTC
--- id: - - 3156 name: - - Account Security url: - - https://protonmail.com/security-details xpath: - - '' created_at: - - &1 2020-11-24 10:56:09.936482382 Z updated_at: - - *1 service_id: - - 491 user_id: - - 20760
Agnes de Lion: 2020-11-24 10:55:30 UTC
--- text: - - " <i>\n</i> Limited-time offer: Black Friday sale, get up to 50% off.\nLimited-time offer: Cyber Monday sale, get up to 50% off.\nExtended Black Friday sale, get up to 50% off.\nSelect your deal now.\nSelect your deal now.\nExclusive Black Friday deals Exclusive Cyber Monday deals Extended Black Friday deals <i>\n</i>\n<i>\n</i>\n<i>\n</i>\n<i>\n</i> Mastodon <ul>\n<li>CA - Català</li>\n<li>CS - Čeština</li>\n<li>DA - Dansk</li>\n<li>DE - Deutsch</li>\n<li>EL - Ελληνικά</li>\n<li>EN - English</li>\n<li>ES - Español (España)</li>\n<li>FR - Français</li>\n<li>HR - Hrvatski</li>\n<li>HU - Magyar</li>\n<li>ID - Bahasa (Indonesia)</li>\n<li>IS - íslenska</li>\n<li>IT - Italiano</li>\n<li>JP - 日本語</li>\n<li>KAB - Taqbaylit</li>\n<li>NL - Dutch</li>\n<li>PL - Polski</li>\n<li>PT-BR - Português (Brasil)</li>\n<li>PT - Português (Portugal)</li>\n<li>RO - Română</li>\n<li>RU - Русский</li>\n<li>SV - Svenska</li>\n<li>TR - Türkçe</li>\n<li>UA - Українська</li>\n<li>ZH-Hans - 简体中文</li>\n<li>ZH-Hant - 繁體中文</li>\n<li> Help Translate </li>\n</ul> Toggle navigation <ul>\n<li> About </li>\n<li> Security </li>\n<li> Blog </li>\n<li> Careers </li>\n<li> Support </li>\n<li> Business </li>\n<li> VPN </li>\n<li> LOG IN </li>\n<li> SIGN UP </li>\n</ul> Language: CA - Català CS - Čeština DA - Dansk DE - Deutsch EL - Ελληνικά EN - English ES - Español (España) FR - Français HR - Hrvatski HU - Magyar ID - Bahasa (Indonesia) IS - íslenska IT - Italiano JP - 日本語 KAB - Taqbaylit NL - Dutch PL - Polski PT-BR - Português (Brasil) PT - Português (Portugal) RO - Română RU - Русский SV - Svenska TR - Türkçe UA - Українська ZH-Hans - 简体中文 ZH-Hant - 繁體中文 End-to-End Encryption Messages are encrypted at all times <p>Messages are stored on ProtonMail servers in encrypted format.\nThey are also transmitted in encrypted format between our servers and user devices.\nMessages between ProtonMail users are also transmitted in encrypted form within our secure server network.\nBecause data is encrypted at all steps, the risk of message interception is largely eliminated.</p>\n<p>&nbsp;</p> Zero Access to User Data Your encrypted data is not accessible to us <p>ProtonMail's zero access architecture means that your data is encrypted in a way that makes it inaccessible to us.\nData is encrypted on the client side using an encryption key that we do not have access to.\nThis means we don't have the technical ability to decrypt your messages, and as a result, we are unable to hand your data over to third parties.\nWith ProtonMail, privacy isn't just a promise, it is mathematically ensured.\nFor this reason, we are also unable to do data recovery.\nIf you forget your password, we cannot recover your data.</p>\n<em>End-to-end encryption means that no one but the intended recipient can read the message</em>\n<p>&nbsp;</p> Open Source Cryptography Time-tested and trusted encryption algorithms <p>We use only secure implementations of AES, RSA, along with OpenPGP.\nFurthermore, all of the cryptographic libraries we use are open source.\nBy using open source libraries, we can guarantee that the encryption algorithms we are using do not have clandestinely built in back doors.\nProtonMail's open source software has been thoroughly vetted by security experts from around the world to ensure the highest levels of protection.</p>\n<p>Learn about ProtonMail and Open Source</p>\n<p>\n</p>\n<em>By using open source encryption libraries, we can help guard against back doors designed to compromise your privacy.</em>\n<p>&nbsp;</p> Swiss Based Incorporated in Switzerland <p>All user data is protected by the Swiss Federal Data Protection Act (DPA) and the Swiss Federal Data Protection Ordinance (DPO) which offers some of the strongest privacy protection in the world for both individuals and corporations.\nAs ProtonMail is outside of US and EU jurisdiction, only a court order from the Cantonal Court of Geneva or the Swiss Federal Supreme Court can compel us to release the extremely limited user information we have.</p>\n<p>Learn more</p>\n<p>&nbsp;</p> Hardware Level Security Full disk encryption and storage in secured datacenters <p>We have invested heavily in owning and controlling our own server hardware at several locations within Switzerland <strong>so your data never goes to the cloud.</strong> Our primary datacenter is located under 1000 meters of granite rock in a heavily guarded bunker which can survive a nuclear attack.\nThis provides an extra layer of protection by ensuring your encrypted emails are not easily accessible to any third parties.\nOn a system level, our servers utilize fully encrypted hard disks with multiple password layers so data security is preserved even if our hardware is seized.</p>\n<p>&nbsp;</p>\n<em>All ProtonMail servers and network traffic are encrypted</em> Anonymous No tracking or logging of personally identifiable information <p>Unlike competing services, we do not save any tracking information.\nBy default, we do not record metadata such as the IP addresses used to log into accounts.\nAs we have no way to read encrypted emails, we do not serve targeted advertisements.\nTo protect user privacy, ProtonMail does not require any personally identifiable information to register.</p>\n<p>\n</p>\n<p>&nbsp;</p> Self Destructing Messages With ProtonMail, emails are no longer permanent <p>You can set an optional expiration time on ProtonMail’s encrypted emails, so they will be automatically deleted from the recipient’s inbox once they have expired.\nThis technology works for both emails sent to other ProtonMail users, and encrypted emails sent to non-ProtonMail email addresses.\nSimilar to SnapChat, we’ve added a way for you to have ephemeral communication.</p> SSL Secured Connections Swiss SSL to secure your connection! <p>We use SSL to secure communication between our server and your computer.\nMessage data between our server and your computer is already sent encrypted, but we use SSL to add another layer of protection and to ensure that the web page your browser loads is not tampered with by a third party intercepting your traffic in a MITM (Man in the Middle) attack.</p>\n<p>Our SSL certificate authority (CA) is QuoVadis Trustlink Schweiz AG, a leading Swiss SSL certificate issuer.\nUsing a Swiss based CA ensures that our CA's SSL infrastructure is not under the control of US or EU government agencies.\nTo allow extremely security conscious users to further verify that they are in fact connecting to our server, we have also released the SHA1 and SHA-256 hash for our SSL public key.</p> Securely communicate with other email providers Even your communication with non-ProtonMail users can be secure <p>We support sending encrypted communication to non-ProtonMail users via symmetric encryption.\nWhen you send an encrypted message to a non-ProtonMail user, they receive a link which loads the encrypted message onto their browser, which they can decrypt using a passphrase that you have shared with them.\nYou can also send unencrypted messages to Gmail, Yahoo, Outlook and others, just like regular email.</p> Easy to Use Comprehensive Security for Everyone <p>We created ProtonMail because we found that none of the existing secure email services available today are sufficiently secure.\nHowever, a secure service like ProtonMail cannot improve the security landscape if it is so difficult to use, nobody can use it.\nFrom the start, we designed ProtonMail with a strong emphasis on usability.\nAs a result, ProtonMail is very easy to use.\nThere is nothing to install, and no encryption keys to manage, if you can use Gmail, Thunderbird, or Outlook, you can use ProtonMail.</p>\n<p>&nbsp;</p>\n<p>&nbsp;</p> Learn More About ProtonMail <p> Why Switzerland Threat Model Transparency Report Bug Bounty Program Sign up </p> Get your secure email account Create Account <p>Proton Technologies AG</p>\n<p> Route de la Galaise 32,<br> 1228 Plan-les-Ouates<br> Geneva, Switzerland </p>\n<p>\n<i>\n</i> General: Show email<br>\n<i>\n</i> Media: media@protonmail.com<br>\n<i>\n</i> Legal: legal@protonmail.com<br>\n<i>\n</i> Partnership: partners@protonmail.com </p>\n<p>\n<i>\n</i> Security: security@protonmail.com <i>\n</i> &lt;p&gt;&lt;em&gt;Email us for our PGP public key if you want to send us a manually encrypted PGP email.\nOr enable JavaScript to view it.&lt;/em&gt;&lt;/p&gt.\n<br>\n<i>\n</i> Abuse: abuse@protonmail.com <br> For legal/police inquiries<br>click here </p>\n<p> For support inquiries, please visit<br>\n<i>\n</i> protonmail.com/support </p> × security@protonmail.com PGP Public Key If you don't know how to manually encrypt PGP emails and send them, this may not be for you.\nWe will let you know if we can't decrypt your message.\n-----BEGIN PGP PUBLIC KEY BLOCK-----\nVersion: OpenPGP.js v4.3.0\nComment: https://openpgpjs.org xsFNBFgXnNwBEADDvpflLPNrbYvxcNuCcGdTAjGmRLgZRhANvOuAqMd/vTID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\nVCcIf3clIQfiCfs76qEz9pW8LBANtuoBA8gxkRxNe1ia3Ljw\n=IoDL\n-----END PGP PUBLIC KEY BLOCK----- Close ProtonMail <ul>\n<li> Pricing </li>\n<li> Security </li>\n<li> Shop </li>\n<li> Press/Media Kit </li>\n<li> Onion Site </li>\n<li> ProtonMail Status </li>\n</ul> Features <ul>\n<li> iOS App </li>\n<li> Android App </li>\n<li> IMAP/SMTP Bridge </li>\n<li> ProtonVPN </li>\n<li> Business Email </li>\n<li> Encrypted Contacts </li>\n</ul> Legal <ul>\n<li> Imprint </li>\n<li> Privacy Policy </li>\n<li> Terms &amp.\nConditions </li>\n<li> Transparency Report </li>\n<li> Report Abuse </li>\n<li> GDPR Compliance </li>\n</ul> Company <ul>\n<li> Blog </li>\n<li> Team </li>\n<li> Careers </li>\n<li> Support </li>\n<li> Donate </li>\n<li> Open Source </li>\n</ul> Social <ul>\n<li>\n<i>\n</i>Facebook </li>\n<li>\n<i>\n</i>Twitter </li>\n<li>\n<i>\n</i>Reddit </li>\n<li>\n<i>\n</i>Instagram </li>\n<li> Mastodon </li>\n<li>\n<i>\n</i>Feedback Forum </li>\n</ul>\n<p>&nbsp;</p>\n<p>\n</p>\n<p>© $currentYear Proton Technologies AG.\nAll Rights Reserved.</p> Català |\nČeština |\nDansk |\nDeutsch |\nΕλληνικά |\nEnglish |\nEspañol (España) |\nFrançais |\nHrvatski |\nMagyar |\nBahasa (Indonesia) |\níslenska |\nItaliano |\n日本語 |\nTaqbaylit |\nDutch |\nPolski |\nPortuguês (Brasil) |\nPortuguês (Portugal) |\nRomână |\nРусский |\nSvenska |\nTürkçe |\nУкраїнська |\n简体中文 |\n繁體中文 × General Inquiries <p> For customer support inquiries, please submit the following form for the fastest response:<br> https://protonmail.com/support-form </p>\n<p> For all other inquiries:<br>contact@protonmail.com </p>\n<p> You can also Tweet to us:<br>twitter.com/protonmail </p> Close " updated_at: - 2020-11-24 10:54:36.093550911 Z - 2020-11-24 10:55:30.638430743 Z
Agnes de Lion: 2020-11-24 10:55:26 UTC
--- id: - 3155 - name: - Security Details - url: - https://protonmail.com/security-details - xpath: - '' - text: - - created_at: - 2020-11-24 10:54:36.093550000 Z - updated_at: - 2020-11-24 10:54:36.093550000 Z - service_id: - 491 - reviewed: - - user_id: - 20760 -
Agnes de Lion: 2020-11-24 10:54:36 UTC
--- id: - - 3155 name: - - Security Details url: - - https://protonmail.com/security-details xpath: - - '' created_at: - - &1 2020-11-24 10:54:36.093550911 Z updated_at: - - *1 service_id: - - 491 user_id: - - 20760
ArloJamesBarnes: 2020-11-24 09:34:26 UTC
--- id: - - 11625 user_id: - - 2390 title: - - The user is informed about security practices source: - - https://rightsstatements.org/en/privacy_policy.html status: - - pending analysis: - - Generated through the annotate view created_at: - - &1 2020-11-24 09:34:26.045195696 Z updated_at: - - *1 service_id: - - 2396 quoteText: - - We take all steps necessary to ensure that your data is stored securely and used only in accordance with the preferences you have requested. case_id: - - 226 quoteStart: - - 533 quoteEnd: - - 673 document_id: - - 3044
Agnes de Lion: 2020-11-24 09:29:07 UTC
--- id: - - 11624 user_id: - - 20760 title: - - This services gives no guarantee regarding quality source: - - https://about.qwant.com/legal/terms-of-service/qwant-search/ status: - - pending analysis: - - Generated through the annotate view created_at: - - &1 2020-11-24 09:29:07.873250571 Z updated_at: - - *1 service_id: - - 527 quoteText: - - However we can not guarantee that the results and the gathered information are free of any mistake or any defect case_id: - - 160 quoteStart: - - 3681 quoteEnd: - - 3793 document_id: - - 355
Agnes de Lion: 2020-11-24 09:11:58 UTC
--- text: - - '' updated_at: - 2020-11-24 09:11:20.769241534 Z - 2020-11-24 09:11:58.449711086 Z
Agnes de Lion: 2020-11-24 09:11:20 UTC
--- id: - - 3154 name: - - Terms of Service url: - - https://www.kairos.com/terms xpath: - - '' created_at: - - &1 2020-11-24 09:11:20.769241534 Z updated_at: - - *1 service_id: - - 2422 user_id: - - 20760
Agnes de Lion: 2020-11-24 08:51:26 UTC
--- id: - - 11623 user_id: - - 20760 title: - - The service can sell or otherwise transfer your personal data as part of a bankruptcy proceeding or other type of financial transaction. source: - - https://www.weasyl.com/policy/privacy status: - - pending analysis: - - Generated through the annotate view created_at: - - &1 2020-11-24 08:51:26.282521407 Z updated_at: - - *1 service_id: - - 2423 quoteText: - - Additionally, in the event of a reorganization, merger, or sale we may transfer any and all personal information we collect to the relevant third party. case_id: - - 243 quoteStart: - - 10407 quoteEnd: - - 10559 document_id: - - 3153
Agnes de Lion: 2020-11-24 08:47:01 UTC
--- id: - - 11622 user_id: - - 20760 title: - - You maintain ownership of your data source: - - https://www.weasyl.com/policy/tos status: - - pending analysis: - - Generated through the annotate view created_at: - - &1 2020-11-24 08:47:01.666694272 Z updated_at: - - *1 service_id: - - 2423 quoteText: - - 'Weasyl does not claim ownership rights in your works or other materials posted by you to Weasyl, hence forth known as Your Content. ' case_id: - - 183 quoteStart: - - 4712 quoteEnd: - - 4844 document_id: - - 3150
Agnes de Lion: 2020-11-24 08:41:33 UTC
--- id: - - 11621 user_id: - - 20760 title: - - The court of law governing the terms is in a jurisdiction that is less friendly to user privacy protection. source: - - https://www.weasyl.com/policy/tos status: - - pending analysis: - - Generated through the annotate view created_at: - - &1 2020-11-24 08:41:33.495956722 Z updated_at: - - *1 service_id: - - 2423 quoteText: - - |- These Terms will be construed in accordance with the laws of the State of Delaware, without regard to its conflict of laws rules. Any disputes arising hereunder will be adjudicated in the State of Delaware, USA, and by your use of the Site you submit to the personal of the federal and state courts located therein case_id: - - 242 quoteStart: - - 1750 quoteEnd: - - 2064 document_id: - - 3150
Agnes de Lion: 2020-11-24 08:37:46 UTC
--- title: - The service may change its terms at any time, but the user will receive notification of the changes. - " Terms may be changed any time at their discretion, without notice to the user " point_change: - - '' case_id: - 122 - 121 updated_at: - 2020-11-24 08:37:34.458604000 Z - 2020-11-24 08:37:46.821196755 Z
Agnes de Lion: 2020-11-24 08:37:34 UTC
--- quoteText: - |- We reserve the right at any time to impose, change, or modify our fees and billing methods, or other terms and conditions applicable to your use of the Subscription or to impose new terms and conditions. Such changes, modifications, additions or deletions will be effective immediately upon notice thereof, which may be given by means including, but not limited to, posting on the Site a revised version of these Terms or notification by electronic or conventional mail. - We reserve the right to change or amend these Terms at any time without notice. quoteStart: - 15859 - 1190 quoteEnd: - 16329 - 1269 updated_at: - 2020-11-24 08:30:05.411774000 Z - 2020-11-24 08:37:34.458604058 Z
Agnes de Lion: 2020-11-24 08:36:43 UTC
--- id: - - 11620 user_id: - - 20760 title: - - You can request access and deletion of personal data source: - - https://www.weasyl.com/policy/privacy status: - - pending analysis: - - Generated through the annotate view created_at: - - &1 2020-11-24 08:36:43.348854968 Z updated_at: - - *1 service_id: - - 2423 quoteText: - - "<p>For other personal information, we make good faith efforts to provide you with access so you can request that we correct the data if it is inaccurate or delete the data if Weasyl is not required to retain it by law or for legitimate business purposes" case_id: - - 195 quoteStart: - - 3006 quoteEnd: - - 3259 document_id: - - 3153
Agnes de Lion: 2020-11-24 08:35:59 UTC
--- id: - - 11619 user_id: - - 20760 title: - - Your data may be processed and stored anywhere in the world source: - - https://www.weasyl.com/policy/privacy status: - - pending analysis: - - Generated through the annotate view created_at: - - &1 2020-11-24 08:35:59.632385475 Z updated_at: - - *1 service_id: - - 2423 quoteText: - - International Users <p>Information you provide may be transferred or accessed by entities around the world as described in this Privacy Policy. case_id: - - 187 quoteStart: - - 10564 quoteEnd: - - 10707 document_id: - - 3153
Agnes de Lion: 2020-11-24 08:34:21 UTC
--- id: - - 11618 user_id: - - 20760 title: - - Third parties may be involved in operating the service source: - - https://www.weasyl.com/policy/privacy status: - - pending analysis: - - Generated through the annotate view created_at: - - &1 2020-11-24 08:34:21.284353918 Z updated_at: - - *1 service_id: - - 2423 quoteText: - - |- Disclosure to Third Parties <p>At times we may make certain personal information available to strategic partners that work with Weasyl to provide products and services, or that help Weasyl market to customers.</p> <p> <em>Service Providers</em> </p> <p>Weasyl shares personal information with companies who provide services such as information processing, fulfilling customer orders, delivering products to you, managing and enhancing customer data, providing customer service, assessing your interest in our products and services, and conducting customer research or satisfaction surveys. case_id: - - 207 quoteStart: - - 9100 quoteEnd: - - 9689 document_id: - - 3153
Agnes de Lion: 2020-11-24 08:33:12 UTC
--- id: - - 11617 user_id: - - 20760 title: - - This service may use your personal information for marketing purposes source: - - https://www.weasyl.com/policy/privacy status: - - pending analysis: - - Generated through the annotate view created_at: - - &1 2020-11-24 08:33:12.572932143 Z updated_at: - - *1 service_id: - - 2423 quoteText: - - We use Personally Identifiable Information that you provide to communicate with you, to process orders for products and services, to customize advertising and content available on Weasyl, to conduct research for internal purposes and to use such information to improve our services and Weasyl itself.</p> case_id: - - 336 quoteStart: - - 3633 quoteEnd: - - 3937 document_id: - - 3153
Agnes de Lion: 2020-11-24 08:31:52 UTC
--- id: - - 11616 user_id: - - 20760 title: - - Usernames can be rejected for any reason source: - - https://www.weasyl.com/policy/tos status: - - pending analysis: - - Generated through the annotate view created_at: - - &1 2020-11-24 08:31:52.286768087 Z updated_at: - - *1 service_id: - - 2423 quoteText: - - |- You may not (i) select or use a member name or e-mail address of another person with the intention of impersonating that person. (ii) use a member name or e-mail address of anyone else without authorization. (iii) use a member name in violation of the intellectual property rights of any person. or (iv) use a member name that we deem to be offensive, in our sole discretion. case_id: - - 328 quoteStart: - - 12301 quoteEnd: - - 12676 document_id: - - 3150
Agnes de Lion: 2020-11-24 08:30:05 UTC
--- id: - - 11615 user_id: - - 20760 title: - - The service may change its terms at any time, but the user will receive notification of the changes. source: - - https://www.weasyl.com/policy/tos status: - - pending analysis: - - Generated through the annotate view created_at: - - &1 2020-11-24 08:30:05.411774595 Z updated_at: - - *1 service_id: - - 2423 quoteText: - - |- We reserve the right at any time to impose, change, or modify our fees and billing methods, or other terms and conditions applicable to your use of the Subscription or to impose new terms and conditions. Such changes, modifications, additions or deletions will be effective immediately upon notice thereof, which may be given by means including, but not limited to, posting on the Site a revised version of these Terms or notification by electronic or conventional mail. case_id: - - 122 quoteStart: - - 15859 quoteEnd: - - 16329 document_id: - - 3150
Agnes de Lion: 2020-11-24 08:28:55 UTC
--- id: - - 11614 user_id: - - 20760 title: - - The service can delete your account without prior notice and without a reason source: - - https://www.weasyl.com/policy/tos status: - - pending analysis: - - Generated through the annotate view created_at: - - &1 2020-11-24 08:28:55.352751398 Z updated_at: - - *1 service_id: - - 2423 quoteText: - - Furthermore, you acknowledge that Weasyl reserves the right to terminate or suspend accounts that are inactive, in Weasyl's sole discretion, for an extended period of time (thus deleting or suspending access to your Content). case_id: - - 201 quoteStart: - - 10071 quoteEnd: - - 10296 document_id: - - 3150
Agnes de Lion: 2020-11-24 08:28:04 UTC
--- id: - - 11613 user_id: - - 20760 title: - - The service is provided 'as is' and to be used at the users' sole risk source: - - https://www.weasyl.com/policy/tos status: - - pending analysis: - - Generated through the annotate view created_at: - - &1 2020-11-24 08:28:04.629923422 Z updated_at: - - *1 service_id: - - 2423 quoteText: - - 'SITE PROVIDED AS IS <p>THE SITE IS PROVIDED ON AN "AS IS", "AS AVAILABLE" BASIS WITHOUT WARRANTIES OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO WARRANTIES OF TITLE OR IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, OTHER THAN THOSE WARRANTIES WHICH ARE IMPLIED BY AND INCAPABLE OF EXCLUSION, RESTRICTION OR MODIFICATION UNDER THE LAWS APPLICABLE TO THIS AGREEMENT.</p> ' case_id: - - 286 quoteStart: - - 18861 quoteEnd: - - 19281 document_id: - - 3150
Agnes de Lion: 2020-11-24 08:27:20 UTC
--- id: - - 11612 user_id: - - 20760 title: - - The service may use tracking pixels, web beacons, browser fingerprinting, and/or device fingerprinting on users. source: - - https://www.weasyl.com/policy/privacy status: - - pending analysis: - - Generated through the annotate view created_at: - - &1 2020-11-24 08:27:20.364006476 Z updated_at: - - *1 service_id: - - 2423 quoteText: - - "<p>The website, online services, interactive applications, email messages, advertisements may also use other technologies such as pixel tabs and web beacons" case_id: - - 323 quoteStart: - - 6999 quoteEnd: - - 7155 document_id: - - 3153
JustinBack: 2020-11-24 08:13:22 UTC
--- text: - - " Privacy Policy <p>Weasyl.com takes your privacy very seriously.\nTo make sure your personal information is secure, we communicate our privacy and security guidelines to Weasyl staff and employees and strictly enforce privacy safeguards within the company.\nThis Privacy Policy applies to our web site, Weasyl.com.\nThis Privacy Policy explains what information we collect through the Site, how we use that information, and what choices you have.</p>\n<p>Weasyl contains links to other web sites.\nThis Privacy Policy does not apply to the practices of any companies or individuals that Weasyl does not control, or any web sites that you link to from Weasyl.\nYou should use caution and review the privacy policies of any sites that you visit from ours to learn more about their information practices.</p>\n<p>Please take a few moments to read this agreement.\nBy accessing Weasyl, you agree to accept the terms and conditions of this Privacy Policy and are aware that our policies may evolve in the future as indicated below.</p> What we may collect: <p>In various places on Weasyl, we collect “Personally Identifiable Information,” such as your name, age, gender, postal address, telephone number, e-mail address, credit card information, or other information that can be used to contact you or identify you as an individual.\nFor example, we collect this information when you register for membership, subscribe for a paid account, sign up for e-mail newsletters and purchase products or services.\nFrom time to time in the future we may offer additional features, services, and promotional opportunities that would require you to submit Personally Identifiable Information to participate.</p>\n<p>When sending a gift to another user or non-user, you may also be required to supply their name, mailing address, e-mail address and phone number.</p>\n<p>We also collect “Anonymous Information” such as your IP address, the type of browser you use, the pages on our Sites that you have visited, and the advertisements that you have clicked on.\nYour Personally Identifiable Information is not linked to your Anonymous Information.</p>\n<p>We do not intend that children will use the site.\nWe do not solicit or knowingly collect information from children under 13 years of age, nor will we accept registration from them.\nIf we learn that we have inadvertently collected information from any individual(s) under 13 years of age, we will expunge the information from our records and databases as quickly as possible.</p> Access To and Retention of Personal Information <p>Weasyl makes it easy for you to keep your personal information accurate, complete, and up to date.\nWe will retain your personal information for the period necessary to fulfill the purposes outlined in this Privacy Policy unless a longer retention period is required or permitted by law.</p>\n<p>You can help ensure that your contact information and preferences are accurate, complete, and up to date by logging in to your account at www.weasyl.com.</p>\n<p>For other personal information, we make good faith efforts to provide you with access so you can request that we correct the data if it is inaccurate or delete the data if Weasyl is not required to retain it by law or for legitimate business purposes.\nWe may decline to process requests that are unreasonably repetitive, require disproportionate technical effort, jeopardize the privacy of others, are extremely impractical, or for which access is not otherwise required by local law.\nAccess, correction, or deletion requests can be made by contacting us at privacy@weasyl.com.</p> How your personal information is used: <p>We use Personally Identifiable Information that you provide to communicate with you, to process orders for products and services, to customize advertising and content available on Weasyl, to conduct research for internal purposes and to use such information to improve our services and Weasyl itself.</p>\n<p>If you so choose, we will also use it to send you information about products and services that may be of interest to you.\nLater on in this Privacy Policy, we provide you with more information on what choices you have.\nWe will also send you important notices regarding policy changes, purchases and conditions.</p>\n<p>We use information that is not personally identifiable to determine how people use our web site and its services.\nFor example this data tells us information including how often users click on our advertisements, which files are downloaded most frequently, and which areas of our site are the most popular.\nAnalyzing this data allows us to improve the offerings on and performance of our site(s).</p> Collection and Use of Non-Personal Information <p>Weasyl may collect Non-Personal Information about its users.\nNon-Personal Information is data in a form that does not permit direct association with any specific individual.\nExamples of this includes:</p>\n<ol>\n<li>Occupation</li>\n<li>Language</li>\n<li>Zip code</li>\n<li>Area code</li>\n<li>Unique device identifier</li>\n<li>Location</li>\n</ol>\n<p>If combined with Personal information, all the information will be treated as personal for as long as it remains combined.</p> Protection of Personal Information <p>Weasyl takes precautions — including administrative, technical, and physical measures — to safeguard your personal information against loss, theft, and misuse, as well as against unauthorized access, disclosure, alteration, and destruction.</p>\n<p>Weasyl online services use Secure Sockets Layer (SSL) encryption on all web pages where personal information is collected.\nTo make purchases from these services, you must use an SSL-enabled browser such as Safari, Firefox, Google Chrome, Opera and Internet Explorer.\nDoing so protects the confidentiality of your personal information while it is transmitted over the Internet.</p>\n<p>When you use some Weasyl products, services, or applications or post on a Weasyl forum, chat room, or social networking service, the personal information you share is visible to other users and can be read, collected, or used by them.\nYou are responsible for the personal information you choose to submit in these instances.\nFor example, if you list your name and email address in a forum posting, that information is public.\nPlease take care when using these features.</p> Cookies and Other Technologies <p>A browser cookie is a string of information that a website stores on a visitor's computer which may be read by the website each time the visitor returns.\nWe use cookies on our website in order to establish and maintain the session identity of signed in users, track the preferences of users with regards to the website interface, and otherwise operate our website and its features.</p>\n<p>Users who do not wish to have cookies placed on their computers should set their web browser to refuse cookies before accessing our website.\nhowever, doing so may prevent certain features of our website from functioning properly or as prescribed.</p>\n<p>The website, online services, interactive applications, email messages, advertisements may also use other technologies such as pixel tabs and web beacons.\nThese technologies help us better understand user behavior, tell us which parts of our website people have visited, and facilitate and measure the effectiveness of advertisements and web searches.\nWe treat information collected by cookies and other technologies as non-personal information.\nHowever, to the extent that Internet Protocol (IP) addresses or similar identifiers are considered personal information by local law, we also treat these identifiers as personal information.\nSimilarly, to the extent that non-personal information is combined with personal information, we treat the combined information as personal information for the purposes of this Privacy Policy.</p>\n<p>We gather some information automatically and store it in log files.\nThis information includes Internet Protocol (IP) addresses, browser type and language, Internet service provider (ISP), referring and exit pages, operating system, date/time stamp, and clickstream data.</p>\n<p>We use this information to understand and analyze trends, to administer the site, to learn about user behavior on the site, and to gather demographic information about our user base as a whole.\nWe may use this information in our marketing and advertising services.</p>\n<p>In some of our email messages, we may use a “click-through URL” linked to content on the Weasyl website.\nWhen customers click one of these URLs, they pass through a separate web server before arriving at the destination page on our website.\nWe track this click-through data to help us determine interest in particular topics and measure the effectiveness of our customer communications.\nIf you prefer not to be tracked in this way, you should not click text or graphic links in the email messages.</p>\n<p>Pixel tags enable us to send email messages in a format customers can read, and they tell us whether mail has been opened.\nWe may use this information to reduce or eliminate messages sent to customers.</p> Disclosure to Third Parties <p>At times we may make certain personal information available to strategic partners that work with Weasyl to provide products and services, or that help Weasyl market to customers.</p>\n<p>\n<em>Service Providers</em>\n</p>\n<p>Weasyl shares personal information with companies who provide services such as information processing, fulfilling customer orders, delivering products to you, managing and enhancing customer data, providing customer service, assessing your interest in our products and services, and conducting customer research or satisfaction surveys.\nThese companies are obligated to protect your information and may be located wherever Weasyl operates.</p>\n<p>\n<em>Others</em>\n</p>\n<p>It may be necessary − by law, legal process, litigation, and/or requests from public and governmental authorities within or outside your country of residence − for Weasyl to disclose your personal information.\nWe may also disclose information about you if we determine that for purposes of national security, law enforcement, or other issues of public importance, disclosure is necessary or appropriate.</p>\n<p>We may also disclose information about you if we determine that disclosure is reasonably necessary to enforce our terms and conditions or protect our operations or users.\nAdditionally, in the event of a reorganization, merger, or sale we may transfer any and all personal information we collect to the relevant third party.</p> International Users <p>Information you provide may be transferred or accessed by entities around the world as described in this Privacy Policy.\nWeasyl abides by the “safe harbor” frameworks set forth by the U.S.\nDepartment of Commerce regarding the collection, use, and retention of personal information collected by organizations in the European Economic Area and Switzerland.\nLearn more about the U.S.\nDepartment of Commerce Safe Harbor Program.</p> Privacy Questions <p>If you have any questions or concerns about Weasyl's Privacy Policy or data processing, please contact us at privacy@weasyl.com.</p>\n<p>Weasyl may update its Privacy Policy from time to time.\nWhen we change the policy in a material way, a notice will be posted on our website along with the updated Privacy Policy.\nWe will also notify registered users by sending a notification to their registered email.</p> " updated_at: - 2020-11-24 08:13:10.760688975 Z - 2020-11-24 08:13:22.327899459 Z
JustinBack: 2020-11-24 08:13:10 UTC
--- id: - - 3153 name: - - Privacy Policy url: - - https://www.weasyl.com/policy/privacy xpath: - - "/html/body/div/div[3]" created_at: - - &1 2020-11-24 08:13:10.760688975 Z updated_at: - - *1 service_id: - - 2423 user_id: - - 1764
JustinBack: 2020-11-24 08:12:37 UTC
--- text: - - " Staff Code of Conduct I.\nStaff-User Interaction <p>All staff members, regardless of rank, are expected to treat all members of the community with respect.\nIf a staff member is having difficulty dealing with any user to a point where they are unable to do their job effectively, it is suggested that the matter be brought to the attention of the Directors so that responsibility of the matter may be reassigned.\nThis may occur for a number of reasons, including:</p>\n<ul>\n<li>The staff member knows the user personally and cannot function as an unbiased mediator.</li>\n<li>The user is being overtly rude to the staff member.</li>\n<li>The staff member is unsure of how to handle the situation and desires input from the rest of the staff.</li>\n</ul>\n<p>Staff members are reminded to remain impartial in their positions.\nBribery, favoritism, coercion, and other such forms of biased and unbecoming conduct are strictly prohibited.\nIf a staff member feels their judgment may be clouded or otherwise impaired while working, they are expected to fully relinquish authority of the situation to another member of staff.</p>\n<p>All user information is confidential, and all interactions dealing with a user's account or personal information may only occur between the user in question and staff.\nStaff members will not give out information to third parties, including infraction information, ban reasons, IP addresses, or account activity details, without explicit permission from the user.\nHowever, any official requests sent from state or federal authorities will meet legal compliance from all staff.</p> II.\nInteraction Amongst Staff <p>All staff members are all encouraged to communicate with each other openly and fully, and to act with the utmost professionalism around their peers.\nStaff members may not reverse the decisions of other staff members without first discussing it with the staff member in question or the rest of the staff first.\nIf a conflict between any staff members arises, we urge those parties to bring that matter before the rest of the staff so the matter may be settled.\nIf the matter cannot be sorted out, all parties will be asked to take a temporary or permanent leave from the staff, depending on the nature of the dispute.</p>\n<p>In the event of a departmental dispute in which a department member disagrees with the actions or verdict of the department head, and the staff member feels the action may be detrimental to the site, the Directors may be called in to vote on the ruling.\nThe Directors' decision will be passed by a majority vote of greater than one-half of the Director team, and the Directors are free to choose to uphold the department head decision, or enact their own verdict.\nThe Directors may also act on their power to discipline staff members based on majority ruling if it is called for by the situation.</p>\n<p>If a staff member believes that they will not be around for an extended period of time, they are required to give the rest of the team an advance warning.\nFor security reasons, staff accounts found to be inactive for longer than two weeks will be temporarily removed from staff positions until the account owner returns and is ready to continue working.</p> III.\nRepresenting the Site <p>Staff are required to remain professional when dealing with issues publicly on the site as well as other sites.\nThis means that staff should not harass or defame other sites while being associated with Weasyl, as well as not deriding aspects of Weasyl itself.\nIf a staff member has issues with a policy or aspect of the site, they are asked to handle the issue privately in staff areas.</p>\n<p>Although staff are asked to remain professional while performing their duties, it is not required while they are using the site for their enjoyment.\nWe here at Weasyl wish for the site to be as open and fun as possible, and we want our staff to be able to enjoy the site themselves.\nAs long as the staff members follow the policies of this document and all other site policies, they are free to behave as they wish in regard to their own personal enjoyment of the site.</p> IV.\nSite Liability &amp.\nSecurity <p>Due to the nature of the content allowed on this site, we require all staff to be 18 years of age or older.\nWe recognize that age is not a reliable indicator of maturity.\nhowever, all staff must be able to legally view and respond to reports dealing with adult content.</p>\n<p>Any staff member partaking in illegal activities which put the site at risk will be immediately terminated.\nThis includes admitting to crimes in which the site must inform the police, as well as using site resources to provide or ask users to provide them with pirated copyrighted content.</p>\n<p>Staff members are forbidden from performing their duties while under the influence of any mind- altering substances.\nIf there is any indication that a staff member is operating under the influence, they will be temporarily locked out of their account.\nPrescription drugs are permissible, although we require that they seek approval from the rest of the staff before performing their duties if they affect a staff member's performance.</p>\n<p>All staff are expected to maintain proper account security.\nThis includes creating a secure password and making sure the email linked to their admin account is also secure.\nIf a staff member's account is compromised, they will be temporarily removed from staff and/or their account will be temporarily locked until the issue is resolved.\nIf the staff feels the affected member will continue to be a security risk, they may vote to have them removed from staff.</p>\n<p>In addition to user information, content from staff areas of the site are also confidential.\nThis includes staff forums, reports, site code, account information, and all other information privy to staff members only.\nStaff found leaking privileged information without proper authorization will be removed from their position, and possibly the site depending on the nature of the leak.</p> V.\nPromotions <p>Staff promotions will be initiated by the Directors when space becomes available for the appropriate positions or if a staff member has performed exceptionally in their duties.\nA user will be brought up for review and the voting members will be given time to state their reasons for or against the promotion.\nModerators will be promoted to admin status after the admin and Director staff vote.\nAdmins will be promoted to Director status after a vote from the Directors.</p>\n<p>Each member of the voting group will cast one vote.\nA decision will be passed with a majority vote of greater than two-thirds.\nIf the decision obtains between one-half and two-thirds of the possible votes, the topic will be discussed again and the staff will vote once more.\nAfter the second discussion and vote has taken place, a majority vote of of greater than one-half will pass the action.</p> VI.\nDisciplinary Action <p>Each infraction of site policy by a staff member will be treated on a case-by-case basis.\nIn the event that a staff member breaks any site rules, all relevant parties will be brought into a discussion with the Director team.\nAny staff member wishing to give input into a situation may contact the Director team privately so that their views may be taken into account.\nAfter considering all available relevant information, the Directors will determine a suitable punishment, including, but not limited to, demotion, temporary or permanent loss of status, or temporary or permanent removal from the site.\nA vote to enact the determined action must reach a majority of greater than one-half of the Directors.\nOwners may override any vote, but this will be reserved for only extreme circumstances related to the legal liability of the site.</p>\n<p>If a moderator is found to have broken site policy and requires demotion, they will be removed from staff.\nIf a Director requires disciplinary action, they may not take part in the vote concerning which actions will be taken.</p> " updated_at: - 2020-11-24 08:12:27.413149006 Z - 2020-11-24 08:12:37.479493185 Z
JustinBack: 2020-11-24 08:12:27 UTC
--- id: - - 3152 name: - - Staff Code of Conduct url: - - https://www.weasyl.com/policy/scoc xpath: - - "/html/body/div/div[3]" created_at: - - &1 2020-11-24 08:12:27.413149006 Z updated_at: - - *1 service_id: - - 2423 user_id: - - 1764
JustinBack: 2020-11-24 08:12:07 UTC
--- text: - - " Copyright Policy Copyright and Your Weasyl Experience <p>Weasyl respects the intellectual property and rights of all creative people across the world.\nWe require that our members do the same and ask that members help us in building an environment that facilitates members to create freely and without fear of copyright infringement.</p> Copyright Infringement <p>Simply put, copyright infringement occurs when you use someone else's creative work without first acquiring the proper permission to do so.\nFor example, these include (but are not limited to:</p>\n<ul>\n<li>Uploading to the internet content that is not yours without the original creator's permission</li>\n<li>Using a creative work commercially without express permission</li>\n<li>Copying a creative work in part or whole (this includes adapting a creative work across mediums)</li>\n<li>Incorporating a creative work into your own without sufficiently altering the work or providing original idea</li>\n</ul> Avoiding Copyright infringement <p>Creating in its entirety something on your own and through your own talents and imagination is the easiest way to avoid infringing on someone's copyright.\nSaid creation should be \"original\" in the sense that you yourself are responsible for the creative work without referencing or copying anyone else's work in part or whole.</p>\n<p>If you wish to use or have used the work of another person in your creation, be sure to acquire explicit permission and/or licensing prior to placing your work in a public medium.\nFailure to do so would result in Copyright Infringement.</p> Items Capable of Being Copyrighted <p>Nearly any and every creative work is considered copyright by default.\nThere does not need to be the presence of a copyright statement in order for something to be considered copyrighted.\nIf there is no written notice, you should assume the work is protected.</p>\n<p>Just because something is located in a public space or has been made publicly available does not mean that it falls under public domain or free for use.\nYou should only believe something to be public domain or free for use when it is explicitly stated as such.</p> Copyright Versus Trademarks <p>Copyrights and Trademarks are not the same thing.\nCopyrights apply to creations and creative works.\nTrademarks only apply to brand names, slogans, logos, and other monikers identifying a company, corporation, or entity.</p>\n<p>Copyrights offer protection to the owner against unauthorized use of their work.\nTrademarks offer protection to the owner against unauthorized use of their distinguishing items, specifically against things like false advertising, misrepresentation, and impersonation.</p>\n<p>Characters are considered an identifying item, much like a logo or name, and thus <em>cannot be copyrighted</em>.\nThey can only be trademarked.</p>\n<p>You do not need to officially register for a trademark or copyright in order to be given protection.\nhowever, officially registering a trademark or copyright grants the owner much greater legal protection.\nThis includes but is not limited to the right to sue in a federal court, presumed exclusivity of use, official notice to the public, and official public record.\nUnregistered trademarks and copyrights are subject to far greater burdens of evidence in order to be permissible in court.</p>\n<p>\n<sup>TM</sup> denotes an unregistered trademark.\n<sup>SM</sup> denotes an unregistered service mark (a trademark for items lacking a physical body, such as a sound byte).\n® denotes a registered trademark or service mark.\nPlease be aware that unauthorized use of ® can result in penalties.\nIn order to use the ® symbol, you must register your trademark with the appropriate regulating body (e.g., USPTO for the U.S.).</p>\n<p>© denotes a copyright, unregistered or otherwise.\n<em>A work need not possess this symbol in order to be protected by copyright</em>.</p> Precautions <p>When dealing with copyrights, there are some common misconceptions.\nPlease be aware of the following items:</p>\n<ol>\n<li>Regardless of how much or how little you use a particular work or material in your own creation, it is still considered to be copyrighted and thus requires the owner's permission to be used.\n</li>\n<li>Regardless of where you acquired the work, it again is considered copyrighted and requires permission.\n</li>\n<li>Crediting the proper owner does not absolve you of copyright infringement.\nPermission is still required.\nTo note, you should always credit the proper owner, even if you have obtained permission to use their work.\n</li>\n<li>Not using something commercially also does not make it free for use.\nPermission is still required.\n</li>\n<li>Even if others are using it without permission, it is still copyright infringement.\nPermission is still required.\n</li>\n<li>So long as the original work is recognizable, it is considered copyrighted, and thus permission is still required.\n</li>\n<li>While a character in a pose (as a whole) can be copyrighted, the character itself cannot.\nThe pose by itself cannot, unless it is referenced in such a way that it is immediately traceable to the original work from which is was derived.</li>\n<li>The original author of a piece of work retains all rights to the work unless these rights are explicitly sold, transfered, or otherwise relinquished.\nFor example, commissioning work from an artist does not give the commissioner rights to the art except in the instance where a prearranged and clearly defined agreement between the artist and commissioner has been established to the contrary or the artist decides to sell or surrender these rights after creation.</li>\n</ol> If You Commit Copyright Infringement <p>When Weasyl becomes cognizant of any submission that infringes upon the copyrights of another entity, we will immediately delete it.\nThis is a legal requirement that we willfully fulfill with all due haste.\nYou will not receive any warning nor will you receive any opportunity to rectify the situation.\nAny copyright owner following the procedures in this Copyright Policy can require Weasyl to remove his or her copyrighted content.\nIf your work has been removed for copyright infringement, you may still be liable for damages should the owner decide to sue.</p>\n<p>If you believe that a submission on Weasyl infringes upon your copyright you may either report the submission using our internal reporting system or send us a copyright notice via email.</p>\n<p>If you are found to repeatedly upload infringing content, your account will banned.\nIf you are found to be deliberately misrepresenting the copyright work of another as your own, you will be banned immediately.</p>\n<p>If you believe that one of your submissions was removed in error, you may contact Weasyl or file a Counter-Notice.</p> Fair Use <p>\"Fair Use\" is the idea that some public and private uses of copyrighted works should not require the permission of a copyright owner.\nSuch circumstances are rare, difficult to analyze under the law, and often require the help of expert legal advice.\nWe heavily recommend you talk to your own lawyer if you want to know more about fair use as it relates to your own work.\nIf it ends up that your use isn't considered fair use, you may be liable for very serious monetary damages.</p>\n<p>To learn more about fair use please go here, here, and here, or speak directly to your lawyer.</p> Claims Regarding Copyright Infringement <p>Pursuant to the Digital Millennium Copyright Act (17 U.S.C.\n§ 512), Weasyl has implemented procedures for receiving written notification of claimed infringements.\nWeasyl has also designated an agent to receive notices of claimed copyright infringements.\nTo file a copyright infringement notification with Weasyl, the copyright owner or an agent acting on his or her behalf will need to send a written communication that includes the following:</p>\n<ol>\n<li>A physical or electronic signature of a person authorized to act on behalf of the owner of an exclusive right that is allegedly infringed.</li>\n<li>Identification of the copyrighted work claimed to have been infringed, or, if multiple copyrighted works at a single online site are covered by a single notification, a representative list of such works at that site.</li>\n<li>Identification of the material that is claimed to be infringing or to be the subject of infringing activity and that is to be removed or access to which is to be disabled, and information reasonably sufficient to permit the service provider to locate the material.\nIn this regard, please provide URLs when you identify the location of the material.</li>\n<li>Information reasonably sufficient to permit the service provider to contact the complaining party, such as an address, telephone number, and, if available, an electronic mail address at which the complaining party may be contacted.</li>\n<li>A statement that the complaining party has a good faith belief that use of the material in the manner complained of is not authorized by the copyright owner, its agent, or the law.</li>\n<li>A statement that the information in the notification is accurate, and under penalty of perjury, that the complaining party is authorized to act on behalf of the owner of an exclusive right that is allegedly infringed.</li>\n</ol>\n<p>In some circumstances, in order to notify the subscriber, account holder or host who provided the allegedly infringing content to which Weasyl has disabled access, Weasyl may forward a copy of a valid Notice including name and email address to the subscriber or account holder, or may forward a copy of a valid Notice (with personally identifiable information removed) to Chilling Effects (https://www.chillingeffects.org) for publication.</p>\n<p>\n<strong>Under Section 512(f) of the DCMA, any person who knowingly materially misrepresents that material or activity is infringing may be subject to liability.\nConsult your legal counsel or see Section 512(c)(3) of 17 U.S.C.\nto clarify or confirm the requirements of the notice.</strong>\n</p> Counter-Notification <p>If you believe that a notice of copyright infringement has been improperly submitted against you, you may submit a Counter-Notice, pursuant to Sections 512(g)(2) and (3) of the Digital Millennium Copyright Act.\nYou may complete the Counter-Notice Regarding Claim of Copyright Infringement form, or otherwise provide a written communication which contains:</p>\n<ol>\n<li>Your physical or electronic signature </li>\n<li>Identification of the material removed or to which access has been disabled </li>\n<li>A statement under penalty of perjury that you have a good faith belief that removal or disablement of the material was a mistake or that the material was misidentified.\n</li>\n<li>Your name and telephone number, and a statement that you consent with the jurisdiction of the Federal District court (i) in the judicial district where your address is located if the address is in the United States, or (ii) for any judicial district for which Weasyl may be found, if your address is located outside the United States, and that you will accept service of process from the Complainant submitting the notice or his/her authorized agent.</li>\n</ol>\n<p>\n<strong>Under Section 512(f) of the Copyright Act, any person who knowingly materially misrepresents that material or activity was removed or disabled by mistake or misidentification may be subject to liability.</strong>\n</p> Designated Copyright Agent <p>Weasyl's Agent for Notice of claims of copyright or other intellectual property infringement can be reached at:</p>\n<p>Weasyl LLC<br> ATTN: Designated Copyright Agent<br> 113 Barksdale Professional Center<br> Newark, DE 19711<br> sysop@weasyl.com</p> " updated_at: - 2020-11-24 08:11:48.902442142 Z - 2020-11-24 08:12:07.063565627 Z
JustinBack: 2020-11-24 08:11:48 UTC
--- id: - - 3151 name: - - Copyright Policy url: - - https://www.weasyl.com/policy/copyright xpath: - - "/html/body/div/div[3]" created_at: - - &1 2020-11-24 08:11:48.902442142 Z updated_at: - - *1 service_id: - - 2423 user_id: - - 1764
JustinBack: 2020-11-24 08:11:21 UTC
--- text: - - " Terms of Service Applicable Terms <p>These Terms of Service, or <strong>Terms</strong>, sets forth the legal terms and conditions of your use of services provided to you by Weasyl through the <strong>Site</strong>, www.weasyl.com.\nThese <strong>Services</strong> include but are not limited to products and services provided through the Site as well as all elements, software, programs, and code forming or incorporated in to www.weasyl.com.\nThe Site contains Content that consists of copyrighted material, trademarks, and other proprietary information including text, software, photos, video, graphics, music, data, sound, and other materials .\nThe Site is owned and operated by Weasyl LLC (henceforth <strong>Weasyl</strong>), a Delaware company.\nWeasyl is also referred to in these Terms as \"we\", \"us\", and \"our\".\n<strong>Participatory Areas</strong> are any areas of the Site or other resources owned and operated by Weasyl in which a user may participate in discussions, exchanges, and other such activities.\nThese may included, but are not limited to, forums, IRC channels, and VoIP servers.</p>\n<p>By using digital content on the Site, you agree to these Terms as set forth herein.\nWe reserve the right to change or amend these Terms at any time without notice.\nYour continued use of the Site after such changes to these Terms will signify your acceptance of these changes.\nAny changes or amendments to these Terms will be posted on the Site.</p> 1.\nGeneral Terms General <p>These Terms, the Privacy Policy, Copyright Policy, and Community Guidelines constitute the entire agreement of the parties with respect to the subject matter hereof, superseding all previous written or oral agreements between the parties with respect in this regard.\nThese Terms will be construed in accordance with the laws of the State of Delaware, without regard to its conflict of laws rules.\nAny disputes arising hereunder will be adjudicated in the State of Delaware, USA, and by your use of the Site you submit to the personal of the federal and state courts located therein.\nNo waiver by either party of any instance of breach or default hereunder will be deemed to be a waiver of any other instance.\nThe section headings used herein are for convenience only and will not be given any legal import.\nIf any provision in these Terms is held invalid or unenforceable, that provision will be construed in a manner consistent with applicable law to reflect the original intent of the provision, and the remaining provisions of these Terms will remain in full force and effect.\nThe provisions of these Terms as it relates to the content of the Site are for the benefit of our company its affiliates, and its third-party content providers and licensors, and each will have the right to assert and enforce such provisions directly on its own behalf.\nSuch right will survive any termination of these Terms.\nYour right to use the Site is personal to you and cannot be transferred to any other person or entity.</p> Right to Modify <p>We reserve the right at any time to change or discontinue any aspect or feature of the Site including, without limitation, the content, pages, participatory areas, and equipment or formats needed for access or use.\nSuch changes, modifications, additions, deletions or other revisions will be effective immediately upon notice, which may be given any customary means, such as posting on the Site a revised version of these Terms or notification by electronic mail.\nAny use by you of the Site after such notice is given will conclusively constitute your acceptance of the revisions in question.\nYou agree to review the terms and conditions of these Terms periodically in order to be aware of such revisions.</p> Privacy <p>Any information that is obtained from you through your registration or your use of the Site will be subject to and handled in accordance with our Privacy Policy then in effect.\nWe will have the right to release user information about you if required by law or subpoena, or if the information is necessary or appropriate to release to address an unlawful or harmful activity.</p> Copyright <p>Weasyl is, unless otherwise stated, the owner of all copyright and data rights in the Service and its contents.\nIndividuals who have posted works to Weasyl are either the copyright owners of the component parts of that work or are posting the work under license from a copyright owner or his or her agent or otherwise as permitted by law.\nYou may not reproduce, distribute, publicly display or perform, or prepare derivative works based on any of the Content including any such works without the express, written consent of Weasyl or the appropriate owner of copyright in such works.\nWeasyl does not claim ownership rights in your works or other materials posted by you to Weasyl, hence forth known as Your Content.\nYou agree not to distribute any part of the Service other than <strong>Your Content</strong> in any medium other than as permitted in these Terms or by use of functions on the Service provided by us.\nYou agree not to alter or modify any part of the Service unless expressly permitted to do so by us or by use of functions on the Service provided by us.</p> Reporting Copyright Violations <p>Weasyl respects the intellectual property rights of others and expects users of the Service to do the same.\nAt Weasyl's discretion and in appropriate circumstances, Weasyl may remove Your Content submitted to the Site, terminate the accounts of users or prevent access to the Site by users who infringe the intellectual property rights of others.\nIf you believe the copyright in your work or in the work for which you act as an agent has been infringed through this Service, please contact Weasyl's Designated Agent.\nYou must provide our agent with substantially the following information, which Weasyl may then forward to the alleged infringer (see 17 U.S.C.\n512 (c)(3) for further details):</p>\n<ol>\n<li>A physical or electronic signature of a person authorized to act on behalf of the owner of an exclusive right that is allegedly infringed.</li>\n<li>Identification of the copyrighted work claimed to have been infringed, or, if multiple copyrighted works at a single online site are covered by a single notification, a representative list of such works at that site.</li>\n<li>Identification of the material that is claimed to be infringing or to be the subject of infringing activity and that is to be removed or access to which is to be disabled, and information reasonably sufficient to permit the service provider to locate the material.</li>\n<li>Information reasonably sufficient to permit the service provider to contact the complaining party, such as an address, telephone number, and, if available, an electronic mail address at which the complaining party may be contacted.</li>\n<li>A statement that the complaining party has a good faith belief that use of the material in the manner complained of is not authorized by the copyright owner.</li>\n<li>A statement that the information in the notification is accurate, and under penalty of perjury, that the complaining party is authorized to act on behalf of the owner of an exclusive right that is allegedly infringed.\nPlease see Weasyl's Copyright Policy for further information and details.</li>\n</ol> Trademarks <p>All brand, product and service names used in this Service which identify Weasyl or third parties and their products and services are proprietary marks of Weasyl and/or the relevant third parties.\nNothing in this Service shall be deemed to confer on any person any license or right on the part of Weasyl or any third party with respect to any such image, logo or name.</p> Conduct <p>You may only use the Site for lawful purposes.\nYou agree that you shall not interfere with or disrupt (or attempt to interfere with or disrupt) this Service or servers or networks connected to this Service, or to disobey any requirements, procedures, policies or regulations of networks connected to this Service.\nor provide any information to Weasyl that is false or misleading, that attempts to hide your identity or that you do not have the right to disclose.\nWeasyl does not endorse any content placed on the Service by third parties or any opinions or advice contained in such content.\nYou agree to defend, indemnify, and hold harmless Weasyl, its officers, directors, employees and agents, from and against any claims, liabilities, damages, losses, and expenses, including, without limitation, reasonable legal and expert fees, arising out of or in any way connected with your access to or use of the Services, or your violation of these Terms.</p> External Links <p>The Site contains links to other websites, resources and advertisers.\nWe are not responsible for the availability of these external sites, nor do we endorse or assume any responsibility for the content, information, advertising, products or other materials made available on or through such external sites.\nUnder no circumstances will we be held responsible or liable, directly or indirectly, for any loss or damage caused or alleged to have been caused to a user in connection with the use of or reliance on any content, goods, or services available on such external site.\nAny concerns regarding such content, goods, or services must be directed to the administrator or webmaster of the external site in question.\nWe reserve the right, in our sole discretion, to terminate links with any third parties or other websites that we deems inappropriate or inconsistent with the Site.</p> Storage Policy <p>At this time, Weasyl provides free online storage of Your Content to registered members of the Service.\nHowever, you acknowledge and agree that Weasyl may, at its option, establish limits concerning your use of the Service, including without limitation the maximum number of days that Your Content will be retained by the Service, the maximum size of any Content files that may be stored on the Service, the maximum disk space that will be allotted to you for the storage of Content on the Service.\nFurthermore, you acknowledge that Weasyl reserves the right to terminate or suspend accounts that are inactive, in Weasyl's sole discretion, for an extended period of time (thus deleting or suspending access to your Content).\nWithout limiting the generality of Section 4, Weasyl shall have no responsibility or liability for the deletion or failure to store any Content maintained on the Service and you are solely responsible for creating back-ups of Your Content.\nYou further acknowledge that Weasyl reserves the right to modify its storage policies from time to time, with or without notice to you.</p> Monitoring Content <p>Weasyl has no ability to control the Content you may upload, post or otherwise transmit using the Service and does not have any obligation to monitor such Content for any purpose.\nYou acknowledge that you are solely responsible for all Content and material you upload, post, or otherwise transmit using the Service.</p> Commercial Activities <p>Commercial Activities mean the offering, solicitation, or sale of goods or services by anyone other than Weasyl.\nCommercial activities with respect to the arts are permitted for registered members acting as individuals, for small corporations or partnerships engaged primarily in art-related activities in which one or more of the principals is a registered member or for those seeking to retain the services or works of a registered member.\nCommercial activities in the form of paid advertising on the Service are subject to the terms and conditions relating to the purchase of such advertising.\nNo other commercial activities are permitted on or through the Service without Weasyl's written approval.\nAny interactions with members of the Service with respect to commercial activities including payment for and delivery of goods and/or services and any terms related to the commercial activities including conditions, warranties, or representations and so forth are solely between you and the other member.\nSection 4, below, of these Terms specifically applies with respect to commercial activities.</p> 2.\nAdditional Terms Member Names &amp.\nPasswords <p>You may be required to select a member name and a password in order register as member of the Site.\nYou may not (i) select or use a member name or e-mail address of another person with the intention of impersonating that person.\n(ii) use a member name or e-mail address of anyone else without authorization.\n(iii) use a member name in violation of the intellectual property rights of any person.\nor (iv) use a member name that we deem to be offensive, in our sole discretion.\nYou are responsible for maintaining the confidentiality of your password and your registration information.\nYou agree to immediately notify us of any unauthorized use of your password or your other registration information, and you will indemnify and hold us and our affiliates, subsidiaries, officers, directors, employees, contractors, operational providers, and partners harmless against any improper or illegal use of your password.</p> Registration Information <p>All information provided by you to us in connection with your registration must be accurate, complete, and up to date at the time it is submitted.\nYou may update your registration information from time to time in conformance with our standard procedures and policies for such updating.\nIf your e-mail address is canceled, becomes inactive, or inaccessible for an extended period of time, we will have the right to cancel your registration and delete all or part of your registration information, to the extent allowed by law and in accordance with our security measures.</p> Suspension and Termination of Access and Membership <p>We will have the right to immediately terminate these Terms and block your access to the Site if we determine, in our sole discretion, that you have breached these Terms or are otherwise not an appropriate user of the Site.\nYou agree that monetary damages may not provide injunctive relief for any such violation without the necessity of posting a bond, in addition to any other remedy available to us under this agreement, at law, or in equity.\nWe are not required to provide any refund to you if you are terminated as a user because you have violated the terms of this agreement.</p> 3.\nPurchase and Payments All Sales Final <p>Except where expressly set forth in these Terms and other policies, all sales are final, and no returns, replacements, or refunds are permitted.\nIf a replacement, refund, or return is granted for any transaction, the transaction may be reversed, and you may no longer be able to access the product that you acquired through that transaction.</p> Membership Subscription Services <p>We make available to users certain online subscription services, and other paid services and products.\nThe following terms and conditions will apply in the event that you subscribe to any subscription service or services we offer on the Site (the \"<strong>Subscription</strong>\"):</p>\n<p>(i) The Subscription will continue until the designated term has ended as per the purchase of the Subscription or, if as explicitly specified by you, until we receive notification of termination from you as described herein below.\nYou authorize us to charge to the credit card account designated during the registration process the current fees and charges for each term according to the subscription plan chosen by you.\nIf you accept an offer that includes a free trial period, your credit card account will not be charged until after the end of the free trial period.\nIf you ordered in response to a free trial period offer, you may cancel the subscription process and avoid a charge to your credit card account by complying with our procedures, as posted on the Site.</p>\n<p>(ii) We reserve the right at any time to impose, change, or modify our fees and billing methods, or other terms and conditions applicable to your use of the Subscription or to impose new terms and conditions.\nSuch changes, modifications, additions or deletions will be effective immediately upon notice thereof, which may be given by means including, but not limited to, posting on the Site a revised version of these Terms or notification by electronic or conventional mail.\nIf any such change is unacceptable to you, you may terminate your Subscription, as provided herein below.\nAny use of the Subscription by you after such notice will conclusively be deemed to constitute acceptance by you of such changes, modifications, additions or deletions.\nYou agree to review the terms and conditions periodically to be aware of such revisions.\nYou may also be subject to additional terms and conditions imposed by third party content providers in connection with third party content, software or services.</p>\n<p>(iii) Either you or we may terminate these Terms at any time.\nYour only right with respect to any dissatisfaction with any terms and conditions of these Terms or our policies or practices in operating the Site and/or the Service, or any content available through the Subscription or change therein, or any amount or type of fees or billing methods, or change therein, is to terminate these Terms by sending notice to us or online on the Site by following the directions stated therein.\nNotice of termination will be effective upon receipt.\nWithout limiting the foregoing, we will have the right to immediately terminate these Terms on the basis set forth herein.\nIf your account is terminated or canceled, no refund of any fees, including monthly membership fee, will be granted.\nFees paid for any Subscription are paid in advance and are not refundable in whole or in part, provided, however, that if we terminate for any reason other than your breach of this Agreement or if you terminate as the result of revised terms, as set forth above, we will make a pro-rata refund to you.</p> Products and Other Services <p>With respect to products and services offered for sale through the Site, you will be informed, on the screen(s) where you make the purchase, of all terms of the offer, including but not limited to pricing, methods of payment, shipping and handling, credit card information, sales tax, return, and refund policies and applicable privacy policies.</p> 4.\nDisclaimer of Warrantee.\nLimitation of Liability USE AT OWN RISK <p>YOU EXPRESSLY AGREE THAT USE OF THE SITE IS AT YOUR OWN SOLE RISK.\nNEITHER WE, OUR AFFILIATES, NOR ANY OF THEIR RESPECTIVE EMPLOYEES, AGENTS, THIRD PARTY CONTENT PROVIDERS, OR LICENSORS WARRANT THAT THE SITE WILL BE UNINTERRUPTED OR ERROR FREE, NOR DO THEY MAKE ANY WARRANTY AS TO THE RESULTS THAT MAY BE OBTAINED FROM USE OF THE SITE OR AS TO THE ACCURACY, RELIABILITY, OR CONTENT OF ANY INFORMATION, SERVICE, OR PRODUCTS PROVIDED ON OR THROUGH THE SITE.</p> SITE PROVIDED AS IS <p>THE SITE IS PROVIDED ON AN \"AS IS\", \"AS AVAILABLE\" BASIS WITHOUT WARRANTIES OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO WARRANTIES OF TITLE OR IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, OTHER THAN THOSE WARRANTIES WHICH ARE IMPLIED BY AND INCAPABLE OF EXCLUSION, RESTRICTION OR MODIFICATION UNDER THE LAWS APPLICABLE TO THIS AGREEMENT.</p> DISCLAIMERS <p>THE FOREGOING DISCLAIMERS OF LIABILITY APPLY TO ANY DAMAGES OR INJURY CAUSED BY ANY FAILURE OF PERFORMANCE, ERROR, OMISSION, INTERRUPTION, DELETION, DEFECT, DELAY IN OPERATION OR TRANSMISSION, COMPUTER VIRUS, COMMUNICATION LINE FAILURE, THEFT OR DESTRUCTION OR UNAUTHORIZED ACCESS TO, ALTERATION OF, OR USE OF RECORD, WHETHER FOR BREACH OF CONTRACT, TORTIOUS BEHAVIOR, NEGLIGENCE, OR UNDER ANY OTHER CAUSE OF ACTION.\nYOU SPECIFICALLY ACKNOWLEDGE THAT WE ARE NOT LIABLE FOR THE DEFAMATORY, OFFENSIVE, OR ILLEGAL CONDUCT OF OTHER USERS OR THIRD PARTIES AND THAT THE RISK OF INJURY FROM THE FOREGOING RESTS ENTIRELY WITH YOU.</p> NO CONSEQUENTIAL DAMAGES <p>IN NO EVENT WILL WE OR ANY PERSON OR ENTITY INVOLVED IN CREATING, PRODUCING OR DISTRIBUTING THE SITE BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OF OR INABILITY TO USE THE SITE, OR OUT OF THE BREACH OF ANY WARRANTY.</p> NO LIABILITY FOR INACCURACIES <p>WE NEITHER ENDORSE NOR ARE RESPONSIBLE FOR THE ACCURACY OR RELIABILITY OF ANY OPINION, ADVICE, OR STATEMENT ON THE SITE, NOR FOR ANY OFFENSIVE, DEFAMATORY, OR OBSCENE POSTING MADE IN THE PARTICIPATORY AREAS BY ANYONE OTHER THAN OUR AUTHORIZED EMPLOYEE SPOKESPERSONS WHILE ACTING IN THEIR OFFICIAL CAPACITIES.\nUNDER NO CIRCUMSTANCES WILL WE BE LIABLE FOR ANY LOSS OR DAMAGE CAUSED BY YOUR RELIANCE ON INFORMATION OBTAINED THROUGH EITHER THE CONTENT ON THE SITE (INCLUDING WITHOUT LIMITATION ANY POSTINGS IN THE PARTICIPATORY AREAS).\nIT IS YOUR RESPONSIBILITY TO EVALUATE THE ACCURACY, COMPLETENESS, OR USEFULNESS OF ANY INFORMATION, OPINION, ADVICE, OR OTHER CONTENT AVAILABLE THROUGH THE SITE.\nYOU SHOULD SEEK THE ADVICE OF PROFESSIONALS, AS APPROPRIATE, REGARDING THE EVALUATION OF ANY SPECIFIC INFORMATION, OPINION, ADVICE OR OTHER CONTENT, INCLUDING (WITHOUT LIMITATION) FINANCIAL, HEALTH, OR LIFESTYLE INFORMATION.</p> NO WARRANTY OF ANY PRODUCT OR SERVICE <p>WE DO NOT ENDORSE, WARRANT, OR GUARANTEE ANY PRODUCTS OR SERVICES OFFERED THROUGH THE SITE AND WILL NOT BE A PARTY TO OR IN ANY WAY MONITOR ANY TRANSACTION BETWEEN USERS AND THIRD PARTY PROVIDERS OF PRODUCTS OR SERVICES.\nAS WITH THE PURCHASE OF A PRODUCT OR SERVICE THROUGH ANY MEDIUM OR IN ANY ENVIRONMENT, YOU SHOULD USE YOUR BEST JUDGMENT AND EXERCISE CAUTION, AS APPROPRIATE.\nWE MAKE PRODUCTS OR SERVICES AVAILABLE ON THE SITE WITHOUT WARRANTIES OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO WARRANTIES OF TITLE OR IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, OTHER THAN THOSE WARRANTIES WHICH ARE IMPLIED BY AND INCAPABLE OF EXCLUSION, RESTRICTION OR MODIFICATION UNDER APPLICABLE LAWS.</p> SURVIVAL <p>THE PROVISIONS OF THIS SECTION WILL SURVIVE ANY TERMINATION OF THIS AGREEMENT.</p>\n<p>Effective: September 30th, 2012</p> " updated_at: - 2020-11-24 08:11:11.449731679 Z - 2020-11-24 08:11:21.264937551 Z
JustinBack: 2020-11-24 08:11:11 UTC
--- id: - - 3150 name: - - Terms of Service url: - - https://www.weasyl.com/policy/tos xpath: - - "/html/body/div/div[3]" created_at: - - &1 2020-11-24 08:11:11.449731679 Z updated_at: - - *1 service_id: - - 2423 user_id: - - 1764
JustinBack: 2020-11-24 08:10:14 UTC
--- xpath: - "/html/body/div/div[3]" - "/html/body/div/div[3]/div" updated_at: - 2020-11-24 08:09:56.730187000 Z - 2020-11-24 08:10:14.154569328 Z
JustinBack: 2020-11-24 08:09:56 UTC
--- text: - - '' updated_at: - 2020-11-24 08:09:37.978955578 Z - 2020-11-24 08:09:56.730187296 Z
JustinBack: 2020-11-24 08:09:37 UTC
--- id: - - 3149 name: - - Content Ratings url: - - https://www.weasyl.com/policy/ratings xpath: - - "/html/body/div/div[3]" created_at: - - &1 2020-11-24 08:09:37.978955578 Z updated_at: - - *1 service_id: - - 2423 user_id: - - 1764
JustinBack: 2020-11-24 08:08:47 UTC
--- text: - - " I.\nGeneral Upload Rules A.\nRight to Submit <p>Weasyl respects the rights of artists with regard to the distribution of their original works.\nas such, there are two types of artwork that you may upload: artwork that you have created, and artwork that has been created by others for you.</p>\n<ol>\n<li>\n<strong>Original Content Submissions:</strong> If you are a creator of a particular work, whether you created it individually or in collaboration with others, you automatically hold the rights to its distribution.\nContent of this type belongs in your submissions gallery.</li>\n<li>\n<strong>Weasyl Collections Feature:</strong> Weasyl has a collections feature.\nThe feature makes it possible for the original creator of a work to offer a submission to another Weasyl user, so that that work will appear in both galleries.\nThe use of the collections feature <em>is optional!</em> If you have permission from the original creator and you do not wish to use the Weasyl collections feature, you are welcome to upload it to your own gallery, providing: the work has been created by someone else for you.\nor features you, your character(s), or intellectual property.</li>\n<li>\n<strong>Tracing and Plagiarism:</strong> You may incorporate the work of others into new works.\nhowever, the use of borrowed content must either abide by fair use or you must obtain permission from the copyright holder.\nThe submission will be removed if it meets neither of these requirements.\nIf it does meet these requirements, you must still cite the content’s source in the submission description.</li>\n<li>\n<strong>Proper Citation:</strong> If you are uploading a submission that was made for you by another person, you must cite the name of the original creator in the submission’s description.\nIf the creator was an anonymous contributor, please state so in the description.</li>\n<li>\n<strong>Copyright and Trademark:</strong> The creator of the content of a submission holds the copyright and rights to its distribution.\nunless the content is trademarked by someone else, is considered harassment, or is otherwise a violation of Weasyl policy, the submission will not be removed.\nFor further information, see our Copyright Policy.</li>\n</ol> B.\nAccurately Describing Content <ol>\n<li>\n<strong>Ratings</strong>\n<p>Content ratings should be made based on the context of your submission and its intended audience, as well as on the content of descriptions, tags, and comments supplied by the uploader.\nWe ask that you please rate your content appropriately.\nFor more information on rating your content, please see our Ratings Guidelines.</p>\n<ul>\n<li>\n<strong>General</strong>\n<p>Content categorized as General is appropriate for all audiences of all ages.\nIt may contain at most very mild themes.</p>\n</li>\n<li>\n<strong>Mature (18+.\nNO sexually explicit content)</strong>\n<p>Content categorized as Mature may contain imagery, themes, or material that is not suitable for minors.\nHowever, such content must not contain graphic depictions of sexual content, sexual acts, or sexual arousal.</p>\n</li>\n<li>\n<strong>Explicit (18+.\nwith sexually explicit content)</strong>\n<p>An extension of the Mature rating for content containing graphic depictions of sexual content or sexual acts.\nThis may contain overt sexual acts or signs of sexual arousal.</p>\n</li>\n</ul>\n</li>\n<li>\n<strong>Tagging</strong>\n<p>Weasyl’s tag system is an essential tool for users to find what they’re looking for, making it important for uploaders to add relevant tags to their work.\nWhen submitting artwork, we ask that you supply at least two tags that describe the submission.\nProper tagging also benefits you as an uploader by helping to increase exposure to your work.</p>\n<p>Because it’s possible that an uploader might miss something, users have the ability to add additional tags to others’ works.\nUsers found to be abusing this ability (e.g.\nadding harassing or irrelevant tags) may have their right to tag others’ works revoked.\nLikewise, uploaders removing relevant tags without good reason may be subject to moderation.</p>\n</li>\n<li>\n<strong>Custom Thumbnails</strong>\n<p>While using a portion of the actual submission is not required when creating its thumbnail, tricking users into viewing sexually explicit or otherwise unanticipated content by applying a misleading thumbnail is prohibited.</p>\n</li>\n<li>\n<strong>Streaming</strong>\n<ul>\n<li>Videos and streams that utilize the Streaming Now feature must represent a creative effort from the broadcaster.</li>\n<li>Only the artist who is streaming may promote the stream via the Streaming Now feature.</li>\n<li>Streams featuring movies, television shows, or other copyrighted content are prohibited from use of the Streaming Now feature.</li>\n</ul>\n</li>\n<li>\n<strong>Critique</strong>\n<p>The critique feature is for artists who are actively seeking artistic critique of their work.\nUsers may utilize the Critique feature only for content created in part or in whole by them.\nFurthermore, the critique feature should only be used when the creator is actively seeking critique and improvement on the content flagged for critique.\nItems flagged for critique that the uploader did not create will have the flag removed.</p>\n<p>Abuse of this feature (e.g.\nusing it for advertising purposes, on items made for you, or to otherwise keep items on the front page) will result in the removal of certain site privileges.</p>\n</li>\n</ol> C.\nProhibited Upload Material <ol>\n<li>\n<strong>Offensive Content:</strong> Submissions should avoid expressing bigoted or hateful material (e.g.\nracist, sexist, homophobic, etc.) to the extent possible without compromising the artistic integrity of the piece.\nMaterial that appears intended for the sole purpose of provoking hostile responses is not permitted.</li>\n<li>\n<strong>Minors in Sexual/Mature Situations:</strong> Submissions and other uploaded content must not contain characters who are or are depicted as being under the age of eighteen present in sexual situations, whether or not they are directly involved.\nAdditionally, minors may not be depicted with unacceptable nudity.\n\"Depicted as being under the age of eighteen\" can mean one of two things: <ul>\n<li>The character is referred to or implied as being under 18, whether in a visual or written piece, or;</li>\n<li>The character in question has small child- or infant-like proportions (excepting stylized depictions of adults that incorporate childlike proportions, e.g.\n“chibi”).\nCanon is taken into consideration.\nhowever, if the character has the appearance of being under 18 or is not depicted “aged up”, the submission may still be removed.</li>\n</ul>\n<br>Unacceptable nudity for the purposes of this article entails both of the following: <ul>\n<li>Genitals, buttocks, and/or mammaries with nipples are viewable.</li>\n<li>Not depicted using non-detailed nudity or cartoon nudity.</li>\n</ul>\n<br>Furthermore, photographs must not contain any improperly clothed minors regardless of the situation depicted.\n</li>\n<li>\n<strong>Seizure-Inducing Images:</strong> Do not upload any avatars, banners, profile images, or submissions that feature rapidly flashing lights, colors, or rapid movement, as this may induce seizures in some users.</li>\n<li>\n<strong>Avatars, Banners, and Profile Pictures:</strong> Do not upload an avatar, banner, or profile picture that is not suitable for all audiences, as such content is accessible to everyone.</li>\n<li>\n<strong>Duplicates/Similar Content Posting:</strong> It is prohibited to upload any exact duplicates or over three (3) submissions of considerable similarity, with no discernible or apparent difference between them.\nSimilar submissions should be posted in collage format to save bandwidth and avoid flooding users’ inboxes with large amounts of similar submissions.\nThis rule applies to character submissions and journals as well.</li>\n<li>\n<strong>Character Generator Submissions:</strong> Content in a user’s \"Submissions\" gallery created using a generator program for most or all of the content in a submission is not permissible.\nHowever, the use of a generator to create content in a user’s \"Characters\" gallery is permissible, so long as the content complies with the rest of the Weasyl Guidelines.</li>\n<li>\n<strong>Adoptables, Auction, and Raffle Reminders:</strong> It is acceptable to post reminder submissions, however any reminder may only be posted one time every 24 hours.\nThere is no limit on the amount of individual auctions a user can have open at one time.\nUploading a reminder, deleting it, and re-uploading it multiple times in 24 hours or less is considered a violation.\nIn addition, any submission that falls under this rule must be tagged with \"reminder\".</li>\n</ol> II.\nCategory Specific Rules A.\nVisual Art <ol>\n<li>Must not be improperly rotated, blurry, or show a portion of the scanner bed.</li>\n<li>Using pre-existing images and sprites for the purposes of a comic is allowed only with the use of stock images or with permission from the image creator.</li>\n<li>Art memes (such as questionnaires or \"draw in the blank\" submissions) are acceptable as long as the user completing them does so using original content that they created.\nImage macros (existing images to which a textual caption has been added) and (de)motivational posters are not permitted as submission uploads unless they contain imagery that was created by the user submitting them.</li>\n<li>Submissions that have been heavily referenced or contain material that does not belong to the submission's author (e.g free-to-use items such as stock images, or material for which permission has been granted for use) are permitted so long as the original sources are cited.\nHowever, stock images by themselves, with little or no original content, are not permitted.</li>\n<li>Submissions comprised primarily of words written in an image file are prohibited from visual art submissions, unless the arrangement of the text is important to the artistry of the piece.\nThese items should be composed as literary submissions or journal entries.</li>\n</ol> B.\nPhotography <ol>\n<li>Must not be excessively blurry, grainy, under- or overexposed (too dark or bright to discern anything), or rotated improperly, unless important to the artistry of the piece.</li>\n<li>Must not depict the use of illegal drugs, child abuse, animal abuse, human or animal injury or gore, bodily waste or fluids, or illegal acts or items.\n<ul>\n<li>Stage makeup depicting blood and gore is permitted as long as it is stated as thus in the submission's description.</li>\n<li>Photographic art made with blood is permissible provided it is rated in the Mature or Explicit categories (exact category depends on the content, as per the Ratings Guidelines).</li>\n</ul>\n</li>\n<li>Must not contain pornographic depictions of any sex acts.</li>\n<li>Must not feature exposed or clearly defined genitalia, or exposed mammaries with nipples or areolae, even if the image has been altered so as to obscure them.</li>\n<li>The presence of animal genitalia in photographs is permissible only if it is an incidental appearance and not related to the main focus of the image.</li>\n<li>Must not feature sex paraphernalia such as sex toys or gear.</li>\n<li>Must not be for the purpose of simply showing yourself, something that you own, or something you have stumbled across unless effort has been taken to render the subject in an artistic or educational manner.</li>\n<li>Must not focus on an electronic display in which the content could otherwise be captured with a screenshot.</li>\n</ol> C.\n3D Modeling <ol>\n<li>Submissions that are wholly comprised of content you made yourself are permissible, so long as the submissions also meet the rest of the criteria of the Community Guidelines and Ratings Guidelines.</li>\n<li>If a submission contains pre-existing 3D models or objects, at least one of the following conditions must be met: <ul>\n<li>The user must obtain permission from the original creator(s), unless the copyright has been waived.</li>\n<li>The user must have altered the model in some way as to be significantly different from the original, such as through reskinning or modelling the mesh further.</li>\n</ul> Regardless, the source of those items must be cited somewhere in the submission itself or its description, including stating which pre-existing materials have been added or modified.</li>\n</ol> D.\nScreenshots <ol>\n<li>Screenshots can be uploaded for one or more of the following three purposes: <ol>\n<li>Showing off a user interface for a shell, website, or program that you created.</li>\n<li>Displaying a 3D model or scene that you created or modified, as long as it complies with the rules laid out in II.C.\nabove.</li>\n<li>Showcasing a drawn-on screenshot from a creation of your own or another website, so long as the illustrations are for the purpose of criticism, commentary, news reporting, teaching, scholarship, or research, and so long as they meet the visual art standard.</li>\n</ol>\n<p>Screenshots uploaded for the purpose of view-acquiring contests are not permitted.</p>\n</li>\n<li>Screenshots that are largely/completely comprised of content from a video game are not permissible as submissions in main galleries.\nSuch images are permissible in character galleries, provided only one screenshot is used per character.\nThis rule applies to images made with character generators as well.</li>\n</ol> E.\nWriting <ol>\n<li>Writing must not contain excessive typographical or formatting errors, and submissions should be reviewed for spelling and grammatical errors before they are posted.\nAny submission where technical errors impede the work as a whole will be removed.</li>\n<li>Quotations from poetry, song lyrics, or other works are permitted only if the user has obtained permission from the original creator(s), unless copyright has been waived, or the usage complies with current U.S.\nfair use laws.</li>\n<li>The Literature section is exclusively for creative works, including nonfiction works such as essays.\nAnnouncements and journal entries should be posted using the Journal feature.</li>\n<li>In-depth reviews may be posted as literature submissions.</li>\n<li>Opinion pieces (e.g.\n“stamps”) may be posted as literature submissions.</li>\n</ol> F.\nAudio <ol>\n<li>Sound files must not be incredibly distorted, be of low quality, or suffer from enough static so as to impede the work as a whole.\nSubmissions in the lo-fi, noise, or similar genres will be considered with the intent of the genre in mind.</li>\n<li>Must not sample clips longer than 30 seconds.\nThe full length of the clip is considered, rather than the length of time it is looped for.</li>\n<li>Audio clips may not focus on the sounds of sexual activity, bodily waste or functions as the main component of the submission.</li>\n</ol> G.\nVideo <ol>\n<li>Video submissions must not be incredibly blurry, misaligned, overexposed, or so unsteady so as to impede the work as a whole, unless important to the artistic style of the work.</li>\n<li>Videos should not be used to display items that are owned or casually encountered by the user.</li>\n<li>Video game walkthroughs are not allowed.\n“Let’s Plays” and other similar videos must show creative effort on the part of the user submitting or on the part of the subjects of the video, for example as in an in-depth review.</li>\n</ol> H.\nJournals <ol>\n<li>Journals may not feature or solicit information to request or inform illegal activity according to U.S.\nDelaware Law.</li>\n<li>Journals may not be used to slander, defame, or otherwise call out anyone, regardless of whether or not they are a Weasyl user.</li>\n<li>Journals may not feature contests or raffles which require monetary buy-ins or may otherwise be categorized as gambling.</li>\n<li>Journals must be appropriately rated according to the Rating Guidelines and must feature the following tags when relevant: “raffle”, “contest”, “commissions”, and “adoptable(s)”.</li>\n</ol> III.\nBehavior Guidelines <p>Here at Weasyl, it is important that all our users behave in a courteous manner when interacting with one another.\nAs such, do not engage in the following practices or encourage others to do so:</p> A.\nGeneral Conduct <ol>\n<li>Slandering any users, whether verbally, through a submission, a journal, or by impersonating them.</li>\n<li>Threatening or harassing another user (remember to use the block tool if necessary).</li>\n<li>Spamming a user's private messages, shouts, submissions, or journals.</li>\n<li>Linking to or otherwise making available materials which are illegal in the U.S.</li>\n<li>Linking to or otherwise making available materials which can harm one’s computer.</li>\n<li>Linking to or otherwise making available items otherwise prohibited by Weasyl Terms of Service or prohibited elsewhere within the Community Guidelines.</li>\n<li>Exploiting site bugs (if you find a bug, report it.\ndon't abuse it).</li>\n<li>Creating additional accounts for the purpose of ban or block evasion, impersonating another person, changing your username for aesthetic purposes, or other abuse of Weasyl features.</li>\n</ol> B.\nIllegal Activity <ol>\n<li>Using the website to distribute pirated works.</li>\n<li>Selling works that contain plagiarized, traced, or copyrighted content.</li>\n<li>Admittance of illegal activity, unless previously convicted or acquitted.</li>\n<li>Using the site to coordinate an illegal act (murder, abuse, theft, etc.).</li>\n</ol> C.\nWeasyl Account(s) <p>Users are permitted to have multiple accounts under the following guidelines:</p>\n<p>User accounts are meant for the purposes of uploading, viewing, or otherwise engaging with the Weasyl community.\nThey are not, in and of themselves, meant to be used as a form of currency.\nAs such, “reserving” or “hoarding” usernames is not acceptable.\nAccounts that are inactive are subject to being released if they meet one or more of the following criteria:</p>\n<ol>\n<li>If an account has been created but has not been logged into or has not shown any activity since the day of registration, it will be released after three months.</li>\n<li>If an account is logged into within a two-week warning period, yet there is no other activity on the account, it will still be released.</li>\n</ol>\n<p>Account activity is determined at moderator discretion.\nA released account will be open to the public for registration.</p> IV.\nConsequences A.\nPunishment <p>When it comes to breaking the rules, every case is unique.\nSome instances will result in a warning or a suspension depending on the severity of the offense and prior violations.\nPermanent bans, or bans longer than a month, will only ever be handed out if the majority of staff agrees to do so.\nThe exceptions to this are users found to be bots and those who are caught ban evading.</p> B.\nAppeal <p>If a user feels that any submission removal by staff is in error, or they feel they have been unfairly punished, they may submit an appeal to support@weasyl.dev, fully explaining the situation and reasons why they feel the actions of the staff were in error.\nWe ask that users be selective in the use of the appeal process and to read the site rules carefully before submitting an appeal.\nThird parties may not appeal on behalf of another user.</p> " updated_at: - 2020-11-24 08:08:17.312620426 Z - 2020-11-24 08:08:47.040357098 Z
JustinBack: 2020-11-24 08:08:17 UTC
--- id: - - 3148 name: - - Community Guidelines url: - - https://www.weasyl.com/policy/community xpath: - - "/html/body/div/div[3]/div" created_at: - - &1 2020-11-24 08:08:17.312620426 Z updated_at: - - *1 service_id: - - 2423 user_id: - - 1764
JustinBack: 2020-11-24 08:07:24 UTC
--- id: - - 2423 name: - - Weasyl url: - - weasyl.com created_at: - - &1 2020-11-24 08:07:24.602432441 Z updated_at: - - *1 wikipedia: - - '' user_id: - - 1764
Dr_Jeff: 2020-11-24 04:37:46 UTC
--- text: - - |2 Privacy Policy for Kairos Software LLC and King James Bible App <p>At King James Bible App, accessible from https://www.kingjamesbibleapp.org and at Kairos Software LLC, accessible from https://www.kairos-software.net, one of our main priorities is the privacy of our visitors. This Privacy Policy document contains types of information that is collected and recorded by King James Bible App and Kairos Software LLC and how we use it.</p> <p>If you have additional questions or require more information about our Privacy Policy, do not hesitate to contact us.</p> <p>This Privacy Policy applies only to our online activities and is valid for visitors to our website with regards to the information that they shared and/or collect in King James Bible App. This policy is not applicable to any information collected offline or via channels other than this website. </p>Consent <p>By using our website, you hereby consent to our Privacy Policy and agree to its terms.</p> Information we collect <p>The personal information that you are asked to provide, and the reasons why you are asked to provide it, will be made clear to you at the point we ask you to provide your personal information.</p> <p>If you contact us directly, we may receive additional information about you such as your name, email address, phone number, the contents of the message and/or attachments you may send us, and any other information you may choose to provide.</p> <p>When you register for an Account, we may ask for your contact information, including items such as name, company name, address, email address, and telephone number.</p> How we use your information <p>We use the information we collect in various ways, including to:</p> <ul> <li>Provide, operate, and maintain our webste</li> <li>Improve, personalize, and expand our webste</li> <li>Understand and analyze how you use our webste</li> <li>Develop new products, services, features, and functionality</li> <li>Communicate with you, either directly or through one of our partners, including for customer service, to provide you with updates and other information relating to the webste, and for marketing and promotional purposes</li> <li>Send you emails</li> <li>Find and prevent fraud</li> </ul> Log Files <p>King James Bible App and Kairos Software LLC follows a standard procedure of using log files. These files log visitors when they visit websites. All hosting companies do this and a part of hosting services' analytics. The information collected by log files include internet protocol (IP) addresses, browser type, Internet Service Provider (ISP), date and time stamp, referring/exit pages, and possibly the number of clicks. These are not linked to any information that is personally identifiable. The purpose of the information is for analyzing trends, administering the site, tracking users' movement on the website, and gathering demographic information.</p> Advertising Partners Privacy Policies <p>We never sell your information to any third party advertiser.</p> <p>You can choose to disable cookies through your individual browser options. To know more detailed information about cookie management with specific web browsers, it can be found at the browsers' respective websites.</p> CCPA Privacy Rights (Do Not Sell My Personal Information) <p>Under the CCPA, among other rights, California consumers have the right to:</p> <p>Request that a business that collects a consumer's personal data disclose the categories and specific pieces of personal data that a business has collected about consumers.</p> <p>Request that a business delete any personal data about the consumer that a business has collected.</p> <p>Request that a business that sells a consumer's personal data, not sell the consumer's personal data.</p> <p>If you make a request, we have one month to respond to you. If you would like to exercise any of these rights, please contact us.</p> GDPR Data Protection Rights <p>We would like to make sure you are fully aware of all of your data protection rights. Every user is entitled to the following:</p> <p>The right to access – You have the right to request copies of your personal data. We may charge you a small fee for this service.</p> <p>The right to rectification – You have the right to request that we correct any information you believe is inaccurate. You also have the right to request that we complete the information you believe is incomplete.</p> <p>The right to erasure – You have the right to request that we erase your personal data, under certain conditions.</p> <p>The right to restrict processing – You have the right to request that we restrict the processing of your personal data, under certain conditions.</p> <p>The right to object to processing – You have the right to object to our processing of your personal data, under certain conditions.</p> <p>The right to data portability – You have the right to request that we transfer the data that we have collected to another organization, or directly to you, under certain conditions.</p> <p>If you make a request, we have one month to respond to you. If you would like to exercise any of these rights, please contact us.</p> Children's Information <p>Another part of our priority is adding protection for children while using the internet. We encourage parents and guardians to observe, participate in, and/or monitor and guide their online activity.</p> <p>King James Bible App and Kairos Software LLC does not knowingly collect any Personal Identifiable Information from children under the age of 13. If you think that your child provided this kind of information on our website, we strongly encourage you to contact us immediately and we will do our best efforts to promptly remove such information from our records.</p> updated_at: - 2020-11-24 04:37:43.172034070 Z - 2020-11-24 04:37:46.777048104 Z
Dr_Jeff: 2020-11-24 04:37:43 UTC
--- id: - - 3147 name: - - Privacy Policy url: - - https://kairos-software.net/privacy-policy/ xpath: - - "/html/body/div[1]/div/div/main/article/div/div/div/div/div/div/div/div/div/div/div" created_at: - - &1 2020-11-24 04:37:43.172034070 Z updated_at: - - *1 service_id: - - 2422 user_id: - - 20149
Dr_Jeff: 2020-11-24 04:36:03 UTC
--- id: - - 2422 name: - - Kairos Software url: - - kairos-software.net created_at: - - &1 2020-11-24 04:36:03.523918084 Z updated_at: - - *1 wikipedia: - - '' user_id: - - 20149
Dr_Jeff: 2020-11-24 04:01:06 UTC
--- status: - pending - approved updated_at: - 2020-11-23 07:41:11.485025000 Z - 2020-11-24 04:01:06.260733770 Z
Dr_Jeff: 2020-11-24 04:00:33 UTC
--- status: - pending - approved updated_at: - 2020-11-23 07:42:45.172809000 Z - 2020-11-24 04:00:33.931066633 Z
Dr_Jeff: 2020-11-24 04:00:22 UTC
--- status: - pending - approved updated_at: - 2020-11-23 07:43:27.576858000 Z - 2020-11-24 04:00:22.801250615 Z