- PLEASE READ THIS POLICY CAREFULLY BEFORE USING OUR WEBSITE AND CONTENT. IF THE USER DOES NOT AGREE WITH ANY PART OF THIS POLICY, HE/SHE CANNOT AND WILL NOT USE THIS WEBSITE AND CONTENT.
- This Website Acceptable Use Policy outlines the rules, guidelines, principles and standards we expect all users to adhere to when interacting with our website, products and content, including prohibited conduct and the consequences for breaching the rules specified in this Policy.
- By accessing and using this website, products and our content, all users acknowledge that they have read, understood and agree to be bound by this Policy.
- The purpose of this Policy is to:
- Prevent users from using our website or service for illegal and/or harmful purposes;
- Protect our website, products, services, content and other users’ interests;
- Provide us with a basis to terminate our relationship with the user, who violates this Policy;
- Provide us with a basis to defend our website or service against a legal claim resulting from the misuse of it.
Privacy and data security
- We value our user’s privacy and take all measures to ensure the security of our user’s data.
- Users are responsible for protecting their personal and sensitive data.
- We employ advanced cybersecurity measures to protect user data and the integrity of our platform. This includes encryption, firewalls, and intrusion detection systems
- Users are allowed to access our website and platform and use them in accordance with the terms of this Policy.
- Users can access our content on a variety of devices, including computers, smartphones, tablets and so on.
- Users may use our website only for lawful purposes.
- Users are expected to engage with our website, platform and content in a respectful and responsible manner.
- Users must not engage in any prohibited activity, specified in this Policy.
4.1 Users are strictly prohibited from engaging in the following activities:
- Engaging in illegal activities involving virtual assets, such as money laundering, fraud, or financing of terrorism.
- Unauthorized access or attempts to access our systems or data.
- Distribution of malware or engaging in any hacking or cyber-attacks.
- Attempting to gain or gaining unauthorized access to our website, servers, content or databases;
- Posting or sharing defamatory and/or obscene content, as well as such a content that violates the rights of others;
- Engaging in any form of harassment, hate speech, defamation or offensive behaviour;
- Uploading or transmitting malicious software, viruses, or harmful code;
- Sending, receiving, uploading, downloading, using or re-using any material or content which does not comply with this Policy standards;
- Transmitting or procuring the sending of any unsolicited or unauthorised advertising or promotional material or any other form of similar solicitation (spam);
- Transmitting any data, as well as sending or uploading any material or content that contains viruses, Trojan horses, worms, time-bombs, keystroke loggers, spyware, adware or any other harmful programs or similar computer code designed to adversely affect the operation of any computer software or hardware;
- Violating any applicable laws or regulations while using this website;
- Using the website and its content in unlawful or fraudulent purposes in any way;
- Harming or attempting to harm our interests or other users in any way;
- Any activities that violate any applicable local, national, or international laws and regulations
4.2 Users must not engage in any activity that violates applicable laws or regulations, including but not limited to copyright infringement, defamation, harassment, or illegal distribution of content.
4.3 Users must not attempt to gain unauthorized access to our website, servers, or any related systems.
4.4 If any activity on our website and platform is believed to be in violation of applicable laws or regulations, we will promptly report it to the relevant authorities as required by law.
4.5 Users must promptly report any suspected violations noticed on our website and content to email@example.com
4.6 OUR USERS HEREBY ACKNOWLEDGE AND UNDERSTAND THAT VIOLATIONS OF THIS POLICY MAY RESULT IN SUSPENSION OR TERMINATION OF PROVISION OF OUR SERVICES AND PRODUCTS, AND THE DISCLOSURE OF INFORMATION TO LAW ENFORCEMENT AUTHORITIES WHERE REQUIRED.
Monitoring of suspicious behaviour and activity
- We actively monitor user activities on our website and platform to detect any suspicious behavior. This includes the analysis of transaction patterns, user profiles, and other relevant data.
- All transactions are subject to automated and manual monitoring to identify unusual or suspicious activity. Transactions that raise red flags will be subject to further review and will be promptly notified to the relevant authorities in accordance with applicable AML/CFT laws.
- All users are required to undergo identity verification processes, including KYC procedures, to ensure the legitimacy of their operations and activities.
- We maintain strict compliance with AML/CFT regulations and take measures to prevent illicit financial and other related activities.
- Users may be required to provide additional information or documentation to support AML/CFT efforts.
- In the event of suspected suspicious activities, we reserve the right to terminate or limit the provision of our services and products to such users.
- If any activity on our website is believed to be in violation of applicable laws or regulations, we will promptly report it to the relevant authorities as required by law.
- Our staff is trained to recognize and report suspicious activities on our website and platform in accordance with the applicable AML/CFT laws and is also aware of the importance of AML/CFT and compliance measures.
Copyright and Intellectual Property
- All materials and content on our website are protected by copyright.
- Copyright infringement will be prosecuted by law. Users are prohibited from illegal use of our intellectual property.
- All intellectual property, including but not limited to trademarks, logos, images, videos, written content, displayed on our website, is legally used by Munzen and is protected by intellectual property laws.
- While Users may interact with and view the content on our website, they do not acquire any ownership rights over it. All content remains the property of Munzen or its respective content creators.
- The content on our website is provided "as is" and we make no warranties or guarantees regarding its accuracy, reliability, or suitability for any purpose
- We reserve the right to take appropriate actions against users who violate this Policy.
Using the Company's IP addresses
- IP addresses belonging to us are part of our infrastructure and are protected by law. Their use is prohibited without our permission.
- In case of need to use our IP addresses, please contact us at: firstname.lastname@example.org
- Our website may contain links to third-party websites.
- We are not responsible for the content or practices of these external websites.
- Users should review the policies of these websites before engaging with them.
Consequences of violation of this Policy
- We will determine, in our discretion, whether there has been a breach of this Policy through use of our website.
- We reserve the right to terminate or suspend provision of our services and products for users who violates this Policy.
- We exclude liability for actions taken in response to breaches of this Policy.
- The responses described in this Policy are not limited, and we may take any other action we reasonably deem appropriate.
- In case of any questions or suggestions regarding our Policy, please contact us at the following e-mail address: email@example.com
- If any content on our website violates our Policy or infringes on the rights of others, please inform us at: firstname.lastname@example.org
Policy changes and updates
- We reserve the right to make changes to this Policy.
- All changes will be published on this website, and we recommend to periodically check this Policy for the latest updates.
- For any other questions, concerns, or reports related to this Policy, please contact email@example.com