8. USER OBLIGATIONS

8.1 To access and use the Services, the User is required to have a device that corresponds to the current state of technology. It is therefore necessary that the User keeps the device with which the Platform is accessed up to date. Furthermore, in order to use the Services, the User must have an internet connection that offers a sufficient data transfer rate and there must be sufficient storage space available on the User's device.

8.2 Except as permitted by Applicable Law or express written agreement of Doge Labs, the User will not, directly or indirectly,

(a) reverse engineer, decompile, disassemble or otherwise attempt to discover any source code, object code or underlying structures, ideas, know-how or algorithms relevant to the Services, or data associated with the Services, disassemble or otherwise attempt to discover any of its components;

(b) make any modifications to the Digital Assets and/or the Services, create any translations of the Digital Assets and/or the Services, or create any derivative works based on the Digital Assets and/or the Services;

(c) distribute, copy, rent, lease, sublicense, assign, transmit, sell or otherwise transfer the Services, or any of the User's or Doge Labs' rights therein,

(d) interfere or attempt to interfere with the integrity or proper working of the Services,

(e) use the Digital Assets and/or the Services for the benefit of any third party in violation of the Agreement;

(f) upload any data to the Services that violates Applicable Law or the rights of third parties or contains viruses or other harmful components;

(g) take any measures aimed at circumventing technical protection measures of the Digital Assets and/or the Services and to refrain from any form of unauthorized use of the Digital Assets and/or the Services, in particular attempts to overcome or circumvent the security mechanisms of the Digital Assets and/or the Services or to disable them in any other way, to use computer programs that enable the automatic reading of data, as well as to use/implement and/or disseminate viruses, scripts, trojan horses, worms, malware, timebombs, brute force attacks, spam, or other harmful components, programs or procedures that are suitable to harm Doge Labs, the Digital Assets, the Services and/or other Users of the Services;

(h) engage in or promote or use Digital Assets and/or the Services for illegal activities, in particular money laundering or other fraudulent activities;

(i) use the Digital Assets and/or the Services improperly or against Applicable Law; or

(j) use, employ or operate bots or other forms of automation when using the Digital Assets and/or the Services

(k) access the Site or Services for web crawling, data mining, scraping, or similar activities without our written consent.

(all a "Prohibited Use"). Unauthorized engagement in these activities constitutes a breach of these Terms and may lead to legal liability.

8.3 Any breach of section 8.2 may result in immediate exclusion from access and use of the Services, termination of the Agreement without notice and the initiation of civil and criminal proceedings as well as the assertion of claims for damages by Doge Labs against the User.

8.4 The User shall take all necessary and reasonable steps to prevent or limit any damage caused by the use of the Services. The User shall, in particular, but not limited to

(a) ensure that the use of the Digital Assets and/or the Services is fit for the intended purpose;

(b) check Transaction details, in particular PSDTs, for accuracy and completeness;

(c) check applicable Transaction Fees before executing Transactions;

(d) check Transaction details and other computer code used by it in connection with the Services as well as the Digital Assets for viruses or other harmful components and bugs and carry out sufficient tests for proper functioning.

8.5 The User shall only list Digital Assets via the Services, that fulfil the following criteria:

· the value of the Digital Asset is connected to its individual attributes and specific utilities (e.g. access to exclusive events or benefits) it confers to its holder;

· the characteristics of and/or the rights and utilities connected with the Digital Asset distinguish it from other Digital Assets issued by the same or any other issuer;

· if the Digital Asset is part of series or collection, its numbering has an impact on its value and uniqueness within such series or collection;

· the Digital Asset is not readily interchangeable with other Digital Assets, meaning that it does not have comparable attributes to other Digital Assets, that make them interchangeable; and

· the technical features of the Digital Asset provide for a unique identifier.

8.6 The Wallet is protected by a PIN, which is stored in the local storage of your device. If individuals with malicious intent gain access to your device, they may also gain access to your PIN. Therefore, it is the User's responsibility to ensure that no one else gains access to the device used for the Wallet. The User acknowledges and accepts this risk and agrees to take all necessary precautions to safeguard their device and PIN.

Last updated