diff --git a/.cspell.json b/.cspell.json index ae97a06..df453ba 100644 --- a/.cspell.json +++ b/.cspell.json @@ -73,6 +73,17 @@ "Serenya", "bannable", "Caelia", - "Umbrelle" + "Umbrelle", + "zirs", + "faer", + "faers", + "escalatory", + "ITAR", + "OFAC", + "incentivising", + "excludable", + "CFAA", + "equivalencies", + "recuse" ] } diff --git a/astro.config.mjs b/astro.config.mjs index ad46aa9..54fb40c 100644 --- a/astro.config.mjs +++ b/astro.config.mjs @@ -3,6 +3,7 @@ import starlight from "@astrojs/starlight"; import { ExpressiveCodeTheme } from "@astrojs/starlight/expressive-code"; import themeJson from "./src/styles/theme.json"; import darkThemeJson from "./src/styles/theme-dark.json"; +import mermaid from "astro-mermaid"; import { navigation } from "./src/components/navigation.ts"; @@ -16,6 +17,7 @@ const sakuraDreamsDark = ExpressiveCodeTheme.fromJSONString( export default defineConfig({ site: "https://docs.nhcarrigan.com", integrations: [ + mermaid(), starlight({ components: { Footer: "./src/components/Footer.astro", diff --git a/package.json b/package.json index 5b53f61..b3c47da 100644 --- a/package.json +++ b/package.json @@ -9,13 +9,15 @@ "build": "astro build", "preview": "astro preview", "astro": "astro", - "scan": "SONAR_TOKEN='op://Environment Variables - Development/SonarCloud/docs' op run -- sonar-scanner -Dsonar.organization=nhcarrigan -Dsonar.projectKey=nhcarrigan_docs -Dsonar.sources=. -Dsonar.host.url=https://sonarcloud.io", - "test": "echo 'No tests yet!' && exit 0" + "scan": "SONAR_TOKEN='op://Environment Variables - Development/SonarCloud/docs' op run -- sonar-scanner -Dsonar.organization=nhcarrigan -Dsonar.projectKey=nhcarrigan_docs -Dsonar.sources=. -Dsonar.host.url=https://sonarcloud.io", + "test": "echo 'No tests yet!' && exit 0" }, "dependencies": { "@astrojs/check": "^0.9.4", "@astrojs/starlight": "^0.32.0", "astro": "^5.3.0", + "astro-mermaid": "1.0.4", + "mermaid": "11.11.0", "typescript": "^5.7.3" }, "devDependencies": { diff --git a/pnpm-lock.yaml b/pnpm-lock.yaml index c647dd4..6275788 100644 --- a/pnpm-lock.yaml +++ b/pnpm-lock.yaml @@ -17,6 +17,12 @@ importers: astro: specifier: ^5.3.0 version: 5.3.0(rollup@4.34.7)(typescript@5.7.3)(yaml@2.7.0) + astro-mermaid: + specifier: 1.0.4 + version: 1.0.4(astro@5.3.0(rollup@4.34.7)(typescript@5.7.3)(yaml@2.7.0))(mermaid@11.11.0) + mermaid: + specifier: 11.11.0 + version: 11.11.0 typescript: specifier: ^5.7.3 version: 5.7.3 @@ -27,6 +33,12 @@ importers: packages: + '@antfu/install-pkg@1.1.0': + resolution: {integrity: sha512-MGQsmw10ZyI+EJo45CdSER4zEb+p31LpDAFp2Z3gkSd1yqVZGi0Ebx++YTEMonJy4oChEMLsxZ64j8FH6sSqtQ==} + + '@antfu/utils@9.2.0': + resolution: {integrity: sha512-Oq1d9BGZakE/FyoEtcNeSwM7MpDO2vUBi11RWBZXf75zPsbUVWmUs03EqkRFrcgbXyKTas0BdZWC1wcuSoqSAw==} + '@astrojs/check@0.9.4': resolution: {integrity: sha512-IOheHwCtpUfvogHHsvu0AbeRZEnjJg3MopdLddkJE70mULItS/Vh37BHcI00mcOJcH1vhD3odbpvWokpxam7xA==} hasBin: true @@ -100,6 +112,24 @@ packages: resolution: {integrity: sha512-zQ1ijeeCXVEh+aNL0RlmkPkG8HUiDcU2pzQQFjtbntgAczRASFzj4H+6+bV+dy1ntKR14I/DypeuRG1uma98iQ==} engines: {node: '>=6.9.0'} + '@braintree/sanitize-url@7.1.1': + resolution: {integrity: sha512-i1L7noDNxtFyL5DmZafWy1wRVhGehQmzZaz1HiN5e7iylJMSZR7ekOV7NsIqa5qBldlLrsKv4HbgFUVlQrz8Mw==} + + '@chevrotain/cst-dts-gen@11.0.3': + resolution: {integrity: sha512-BvIKpRLeS/8UbfxXxgC33xOumsacaeCKAjAeLyOn7Pcp95HiRbrpl14S+9vaZLolnbssPIUuiUd8IvgkRyt6NQ==} + + '@chevrotain/gast@11.0.3': + resolution: {integrity: sha512-+qNfcoNk70PyS/uxmj3li5NiECO+2YKZZQMbmjTqRI3Qchu8Hig/Q9vgkHpI3alNjr7M+a2St5pw5w5F6NL5/Q==} + + '@chevrotain/regexp-to-ast@11.0.3': + resolution: {integrity: sha512-1fMHaBZxLFvWI067AVbGJav1eRY7N8DDvYCTwGBiE/ytKBgP8azTdgyrKyWZ9Mfh09eHWb5PgTSO8wi7U824RA==} + + '@chevrotain/types@11.0.3': + resolution: {integrity: sha512-gsiM3G8b58kZC2HaWR50gu6Y1440cHiJ+i3JUvcp/35JchYejb2+5MVeJK0iKThYpAa/P2PYFV4hoi44HD+aHQ==} + + '@chevrotain/utils@11.0.3': + resolution: {integrity: sha512-YslZMgtJUyuMbZ+aKvfF3x1f5liK4mWNxghFRv7jqRR9C3R3fAOGTTKvxXDa2Y1s9zSbcpuO0cAxDYsc9SrXoQ==} + '@cspell/cspell-bundled-dicts@8.17.3': resolution: {integrity: sha512-6uOF726o3JnExAUKM20OJJXZo+Qf9Jt64nkVwnVXx7Upqr5I9Pb1npYPEAIpUA03SnWYmKwUIqhAmkwrN+bLPA==} engines: {node: '>=18'} @@ -509,6 +539,12 @@ packages: '@expressive-code/plugin-text-markers@0.40.2': resolution: {integrity: sha512-/XoLjD67K9nfM4TgDlXAExzMJp6ewFKxNpfUw4F7q5Ecy+IU3/9zQQG/O70Zy+RxYTwKGw2MA9kd7yelsxnSmw==} + '@iconify/types@2.0.0': + resolution: {integrity: sha512-+wluvCrRhXrhyOmRDJ3q8mux9JkKy5SJ/v8ol2tu4FVjyYvtEzkc/3pK15ET6RKg4b4w4BmTk1+gsCUhf21Ykg==} + + '@iconify/utils@3.0.2': + resolution: {integrity: sha512-EfJS0rLfVuRuJRn4psJHtK2A9TqVnkxPpHY6lYHiB9+8eSuudsxbwMiavocG45ujOo6FJ+CIRlRnlOGinzkaGQ==} + '@img/sharp-darwin-arm64@0.33.5': resolution: {integrity: sha512-UT4p+iz/2H4twwAoLCqfA9UH5pI6DggwKEGuaPy7nCVQ8ZsiY5PIcrRvD1DzuY3qYL07NtIQcWnBSY/heikIFQ==} engines: {node: ^18.17.0 || ^20.3.0 || >=21.0.0} @@ -620,6 +656,9 @@ packages: '@mdx-js/mdx@3.1.0': resolution: {integrity: sha512-/QxEhPAvGwbQmy1Px8F899L5Uc2KZ6JtXwlCgJmjSTBedwOZkByYcBG4GceIGPXRDsmfxhHazuS+hlOShRLeDw==} + '@mermaid-js/parser@0.6.2': + resolution: {integrity: sha512-+PO02uGF6L6Cs0Bw8RpGhikVvMWEysfAyl27qTlroUB8jSWr1lL0Sf6zi78ZxlSnmgSY2AMMKVgghnN9jTtwkQ==} + '@nodelib/fs.scandir@2.1.5': resolution: {integrity: sha512-vq24Bq3ym5HEQm2NKCr3yXDwjc7vTsEThRDnkp2DK9p1uqLR+DHurm/NOTo0KG7HYHU7eppKZj3MyqYuMBf62g==} engines: {node: '>= 8'} @@ -794,6 +833,99 @@ packages: '@types/cookie@0.6.0': resolution: {integrity: sha512-4Kh9a6B2bQciAhf7FSuMRRkUWecJgJu9nPnx3yzpsfXX/c50REIqpHY4C82bXP90qrLtXtkDxTZosYO3UpOwlA==} + '@types/d3-array@3.2.2': + resolution: {integrity: sha512-hOLWVbm7uRza0BYXpIIW5pxfrKe0W+D5lrFiAEYR+pb6w3N2SwSMaJbXdUfSEv+dT4MfHBLtn5js0LAWaO6otw==} + + '@types/d3-axis@3.0.6': + resolution: {integrity: sha512-pYeijfZuBd87T0hGn0FO1vQ/cgLk6E1ALJjfkC0oJ8cbwkZl3TpgS8bVBLZN+2jjGgg38epgxb2zmoGtSfvgMw==} + + '@types/d3-brush@3.0.6': + resolution: {integrity: sha512-nH60IZNNxEcrh6L1ZSMNA28rj27ut/2ZmI3r96Zd+1jrZD++zD3LsMIjWlvg4AYrHn/Pqz4CF3veCxGjtbqt7A==} + + '@types/d3-chord@3.0.6': + resolution: {integrity: sha512-LFYWWd8nwfwEmTZG9PfQxd17HbNPksHBiJHaKuY1XeqscXacsS2tyoo6OdRsjf+NQYeB6XrNL3a25E3gH69lcg==} + + '@types/d3-color@3.1.3': + resolution: {integrity: sha512-iO90scth9WAbmgv7ogoq57O9YpKmFBbmoEoCHDB2xMBY0+/KVrqAaCDyCE16dUspeOvIxFFRI+0sEtqDqy2b4A==} + + '@types/d3-contour@3.0.6': + resolution: {integrity: sha512-BjzLgXGnCWjUSYGfH1cpdo41/hgdWETu4YxpezoztawmqsvCeep+8QGfiY6YbDvfgHz/DkjeIkkZVJavB4a3rg==} + + '@types/d3-delaunay@6.0.4': + resolution: {integrity: sha512-ZMaSKu4THYCU6sV64Lhg6qjf1orxBthaC161plr5KuPHo3CNm8DTHiLw/5Eq2b6TsNP0W0iJrUOFscY6Q450Hw==} + + '@types/d3-dispatch@3.0.7': + resolution: {integrity: sha512-5o9OIAdKkhN1QItV2oqaE5KMIiXAvDWBDPrD85e58Qlz1c1kI/J0NcqbEG88CoTwJrYe7ntUCVfeUl2UJKbWgA==} + + '@types/d3-drag@3.0.7': + resolution: {integrity: sha512-HE3jVKlzU9AaMazNufooRJ5ZpWmLIoc90A37WU2JMmeq28w1FQqCZswHZ3xR+SuxYftzHq6WU6KJHvqxKzTxxQ==} + + '@types/d3-dsv@3.0.7': + resolution: {integrity: sha512-n6QBF9/+XASqcKK6waudgL0pf/S5XHPPI8APyMLLUHd8NqouBGLsU8MgtO7NINGtPBtk9Kko/W4ea0oAspwh9g==} + + '@types/d3-ease@3.0.2': + resolution: {integrity: sha512-NcV1JjO5oDzoK26oMzbILE6HW7uVXOHLQvHshBUW4UMdZGfiY6v5BeQwh9a9tCzv+CeefZQHJt5SRgK154RtiA==} + + '@types/d3-fetch@3.0.7': + resolution: {integrity: sha512-fTAfNmxSb9SOWNB9IoG5c8Hg6R+AzUHDRlsXsDZsNp6sxAEOP0tkP3gKkNSO/qmHPoBFTxNrjDprVHDQDvo5aA==} + + '@types/d3-force@3.0.10': + resolution: {integrity: sha512-ZYeSaCF3p73RdOKcjj+swRlZfnYpK1EbaDiYICEEp5Q6sUiqFaFQ9qgoshp5CzIyyb/yD09kD9o2zEltCexlgw==} + + '@types/d3-format@3.0.4': + resolution: {integrity: sha512-fALi2aI6shfg7vM5KiR1wNJnZ7r6UuggVqtDA+xiEdPZQwy/trcQaHnwShLuLdta2rTymCNpxYTiMZX/e09F4g==} + + '@types/d3-geo@3.1.0': + resolution: {integrity: sha512-856sckF0oP/diXtS4jNsiQw/UuK5fQG8l/a9VVLeSouf1/PPbBE1i1W852zVwKwYCBkFJJB7nCFTbk6UMEXBOQ==} + + '@types/d3-hierarchy@3.1.7': + resolution: {integrity: sha512-tJFtNoYBtRtkNysX1Xq4sxtjK8YgoWUNpIiUee0/jHGRwqvzYxkq0hGVbbOGSz+JgFxxRu4K8nb3YpG3CMARtg==} + + '@types/d3-interpolate@3.0.4': + resolution: {integrity: sha512-mgLPETlrpVV1YRJIglr4Ez47g7Yxjl1lj7YKsiMCb27VJH9W8NVM6Bb9d8kkpG/uAQS5AmbA48q2IAolKKo1MA==} + + '@types/d3-path@3.1.1': + resolution: {integrity: sha512-VMZBYyQvbGmWyWVea0EHs/BwLgxc+MKi1zLDCONksozI4YJMcTt8ZEuIR4Sb1MMTE8MMW49v0IwI5+b7RmfWlg==} + + '@types/d3-polygon@3.0.2': + resolution: {integrity: sha512-ZuWOtMaHCkN9xoeEMr1ubW2nGWsp4nIql+OPQRstu4ypeZ+zk3YKqQT0CXVe/PYqrKpZAi+J9mTs05TKwjXSRA==} + + '@types/d3-quadtree@3.0.6': + resolution: {integrity: sha512-oUzyO1/Zm6rsxKRHA1vH0NEDG58HrT5icx/azi9MF1TWdtttWl0UIUsjEQBBh+SIkrpd21ZjEv7ptxWys1ncsg==} + + '@types/d3-random@3.0.3': + resolution: {integrity: sha512-Imagg1vJ3y76Y2ea0871wpabqp613+8/r0mCLEBfdtqC7xMSfj9idOnmBYyMoULfHePJyxMAw3nWhJxzc+LFwQ==} + + '@types/d3-scale-chromatic@3.1.0': + resolution: {integrity: sha512-iWMJgwkK7yTRmWqRB5plb1kadXyQ5Sj8V/zYlFGMUBbIPKQScw+Dku9cAAMgJG+z5GYDoMjWGLVOvjghDEFnKQ==} + + '@types/d3-scale@4.0.9': + resolution: {integrity: sha512-dLmtwB8zkAeO/juAMfnV+sItKjlsw2lKdZVVy6LRr0cBmegxSABiLEpGVmSJJ8O08i4+sGR6qQtb6WtuwJdvVw==} + + '@types/d3-selection@3.0.11': + resolution: {integrity: sha512-bhAXu23DJWsrI45xafYpkQ4NtcKMwWnAC/vKrd2l+nxMFuvOT3XMYTIj2opv8vq8AO5Yh7Qac/nSeP/3zjTK0w==} + + '@types/d3-shape@3.1.7': + resolution: {integrity: sha512-VLvUQ33C+3J+8p+Daf+nYSOsjB4GXp19/S/aGo60m9h1v6XaxjiT82lKVWJCfzhtuZ3yD7i/TPeC/fuKLLOSmg==} + + '@types/d3-time-format@4.0.3': + resolution: {integrity: sha512-5xg9rC+wWL8kdDj153qZcsJ0FWiFt0J5RB6LYUNZjwSnesfblqrI/bJ1wBdJ8OQfncgbJG5+2F+qfqnqyzYxyg==} + + '@types/d3-time@3.0.4': + resolution: {integrity: sha512-yuzZug1nkAAaBlBBikKZTgzCeA+k1uy4ZFwWANOfKw5z5LRhV0gNA7gNkKm7HoK+HRN0wX3EkxGk0fpbWhmB7g==} + + '@types/d3-timer@3.0.2': + resolution: {integrity: sha512-Ps3T8E8dZDam6fUyNiMkekK3XUsaUEik+idO9/YjPtfj2qruF8tFBXS7XhtE4iIXBLxhmLjP3SXpLhVf21I9Lw==} + + '@types/d3-transition@3.0.9': + resolution: {integrity: sha512-uZS5shfxzO3rGlu0cC3bjmMFKsXv+SmZZcgp0KD22ts4uGXp5EVYGzu/0YdwZeKmddhcAccYtREJKkPfXkZuCg==} + + '@types/d3-zoom@3.0.8': + resolution: {integrity: sha512-iqMC4/YlFCSlO8+2Ii1GGGliCAY4XdeG748w5vQUbevlbDu0zSjH/+jojorQVBK/se0j6DUFNPBGSqD3YWYnDw==} + + '@types/d3@7.4.3': + resolution: {integrity: sha512-lZXZ9ckh5R8uiFVt8ogUNf+pIrK4EsWrx2Np75WvF/eTpJ0FMHNhjXk8CKEx/+gpHbNQyJWehbFaTvqmHWB3ww==} + '@types/debug@4.1.12': resolution: {integrity: sha512-vIChWdVG3LG1SMxEvI/AK+FWJthlrqlTu7fbrlywTkkaONwk/UAGaULXRlf8vkzFBLVm0zkMdCquhL5aOjhXPQ==} @@ -806,6 +938,9 @@ packages: '@types/estree@1.0.6': resolution: {integrity: sha512-AYnb1nQyY49te+VRAVgmzfcgjYS91mY5P0TKUDCLEM+gNnA+3T6rWITXRLYCpahpqSQbN5cE+gHpnPyXjHWxcw==} + '@types/geojson@7946.0.16': + resolution: {integrity: sha512-6C8nqWur3j98U6+lXDfTUWIfgvZU+EumvpHKcYjujKH7woYyLj2sUmff0tRhrqM7BohUw7Pz3ZB1jj2gW9Fvmg==} + '@types/hast@3.0.4': resolution: {integrity: sha512-WPs+bbQw5aCj+x6laNGWLH3wviHtoCv/P3+otBhbOhJgG8qtpdAMlTCxLtsTWA7LH1Oh/bFCHsBn0TPS5m30EQ==} @@ -830,6 +965,9 @@ packages: '@types/sax@1.2.7': resolution: {integrity: sha512-rO73L89PJxeYM3s3pPPjiPgVVcymqU490g0YO5n5By0k2Erzj6tay/4lr1CHAAU4JyOWd1rpQ8bCf6cZfHU96A==} + '@types/trusted-types@2.0.7': + resolution: {integrity: sha512-ScaPdn1dQczgbl0QFTeTOmVHFULt394XJgOQNoyVhZ6r2vLnMLJfBPd53SB52T/3G36VI1/g2MZaX0cwDuXsfw==} + '@types/unist@2.0.11': resolution: {integrity: sha512-CmBKiL6NNo/OqgmMn95Fk9Whlp2mtvIv+KNpQKN2F4SjvrEesubTRWGYSg+BnWZOnlCaSTU1sMpsBOzgbYhnsA==} @@ -875,6 +1013,11 @@ packages: engines: {node: '>=0.4.0'} hasBin: true + acorn@8.15.0: + resolution: {integrity: sha512-NZyJarBfL7nWwIq+FDL6Zp/yHEhePMNnnJ0y3qfieCrmNvYct8uvtiV41UvlSe6apAfk0fY1FbWx+NwfmpvtTg==} + engines: {node: '>=0.4.0'} + hasBin: true + ajv@8.17.1: resolution: {integrity: sha512-B/gBuNg5SiMTrPkC+A2+cW0RszwxYmn6VYxB/inlBStS5nx6xHIt/ehKRhIMhqusl7a8LjQoZnjCs5vhwxOQ1g==} @@ -929,6 +1072,12 @@ packages: peerDependencies: astro: ^4.0.0-beta || ^5.0.0-beta || ^3.3.0 + astro-mermaid@1.0.4: + resolution: {integrity: sha512-2M4bVjqLpDB2EZ4EfD6Utzs7VEEORmlt5hNZcMK54IcKWzflohKvowCzg79RHoAdu30W8a4aECAExH8mF7wG4w==} + peerDependencies: + astro: ^4.0.0 || ^5.0.0 + mermaid: ^10.0.0 || ^11.0.0 + astro@5.3.0: resolution: {integrity: sha512-e88l/Yk/6enR/ZDddLbqtM+oblBFk5mneNSmNesyVYGL/6Dj4UA67GPAZOk79VxT5dbLlclZSyyw/wlxN1aj3A==} engines: {node: ^18.17.1 || ^20.3.0 || >=22.0.0, npm: '>=9.6.5', pnpm: '>=7.1.0'} @@ -1000,6 +1149,14 @@ packages: character-reference-invalid@2.0.1: resolution: {integrity: sha512-iBZ4F4wRbyORVsu0jPV7gXkOsGYjGHPmAyv+HiHG8gi5PtC9KI2j1+v8/tlibRvjoWX027ypmG/n0HtO5t7unw==} + chevrotain-allstar@0.3.1: + resolution: {integrity: sha512-b7g+y9A0v4mxCW1qUhf3BSVPg+/NvGErk/dOkrDaHA0nQIQGAtrOjlX//9OQtRlSCy+x9rfB5N8yC71lH1nvMw==} + peerDependencies: + chevrotain: ^11.0.0 + + chevrotain@11.0.3: + resolution: {integrity: sha512-ci2iJH6LeIkvP9eJW6gpueU8cnZhv85ELY8w8WiFtNjMHA5ad6pQLaJo9mEly/9qUyCpvqX8/POVUTf18/HFdw==} + chokidar@3.6.0: resolution: {integrity: sha512-7VT13fmjotKpGipCW9JEQAusEPE+Ei8nl6/g4FBAmIm0GOOLMua9NDDo/DWp0ZAxCr3cPq5ZpBqmPAQgDda2Pw==} engines: {node: '>= 8.10.0'} @@ -1052,6 +1209,14 @@ packages: resolution: {integrity: sha512-/rFeCpNJQbhSZjGVwO9RFV3xPqbnERS8MmIQzCtD/zl6gpJuV/bMLuN92oG3F7d8oDEHHRrujSXNUr8fpjntKw==} engines: {node: '>=18'} + commander@7.2.0: + resolution: {integrity: sha512-QrWXB+ZQSVPmIWIhtEO9H+gwHaMGYiF5ChvoJ+K9ZGHG/sVsa6yiesAD1GC/x46sET00Xlwo1u49RVVVzvcSkw==} + engines: {node: '>= 10'} + + commander@8.3.0: + resolution: {integrity: sha512-OkTL9umf+He2DZkUq8f8J9of7yL6RJKI24dVITBmNfZBmri9zYZQrKkuXiKhyfPSu8tUhnVBB1iKXevvnlR4Ww==} + engines: {node: '>= 12'} + comment-json@4.2.5: resolution: {integrity: sha512-bKw/r35jR3HGt5PEPm1ljsQQGyCrR8sFGNiN5L+ykDHdpO8Smxkrkla9Yi6NkQyUrb8V54PGhfMs6NrIwtxtdw==} engines: {node: '>= 6'} @@ -1059,6 +1224,12 @@ packages: common-ancestor-path@1.0.1: resolution: {integrity: sha512-L3sHRo1pXXEqX8VU28kfgUY+YGsk09hPqZiZmLacNib6XNTCM8ubYeT7ryXQw8asB1sKgcU5lkB7ONug08aB8w==} + confbox@0.1.8: + resolution: {integrity: sha512-RMtmw0iFkeR4YV+fUOSucriAQNb9g8zFR52MWCtl+cCZOFRNL6zeB395vPzFhEjjn4fMxXudmELnl/KF/WrK6w==} + + confbox@0.2.2: + resolution: {integrity: sha512-1NB+BKqhtNipMsov4xI/NnhCKp9XG9NamYp5PVm9klAT0fsrNPjaFICsCFhNhwZJKNh7zB/3q8qXz0E9oaMNtQ==} + cookie-es@1.2.2: resolution: {integrity: sha512-+W7VmiVINB+ywl1HGXJXmrqkOhpKrIiVZV6tQuV54ZyQC7MMuBt81Vc336GMLoHBq5hV/F9eXgt5Mnx0Rha5Fg==} @@ -1069,6 +1240,12 @@ packages: core-util-is@1.0.3: resolution: {integrity: sha512-ZQBvi1DcpJ4GDqanjucZ2Hj3wEO5pZDS89BWbkcrvdxksJorwUDDZamX9ldFkp9aw2lmBDLgkObEA4DWNJ9FYQ==} + cose-base@1.0.3: + resolution: {integrity: sha512-s9whTXInMSgAp/NVXVNuVxVKzGH2qck3aQlVHxDCdAEPgtMKwc4Wq6/QKhgdEdgbLSi9rBTAcPoRa6JpiG4ksg==} + + cose-base@2.2.0: + resolution: {integrity: sha512-AzlgcsCbUMymkADOJtQm3wO9S3ltPfYOFD5033keQn9NJzIbtnZj+UdBJe7DYml/8TdbtHJW3j58SOnKhWY/5g==} + crossws@0.3.4: resolution: {integrity: sha512-uj0O1ETYX1Bh6uSgktfPvwDiPYGQ3aI4qVsaC/LWpkIzGj1nUYm5FK3K+t11oOlpN01lGbprFCH4wBlKdJjVgw==} @@ -1119,6 +1296,165 @@ packages: engines: {node: '>=4'} hasBin: true + cytoscape-cose-bilkent@4.1.0: + resolution: {integrity: sha512-wgQlVIUJF13Quxiv5e1gstZ08rnZj2XaLHGoFMYXz7SkNfCDOOteKBE6SYRfA9WxxI/iBc3ajfDoc6hb/MRAHQ==} + peerDependencies: + cytoscape: ^3.2.0 + + cytoscape-fcose@2.2.0: + resolution: {integrity: sha512-ki1/VuRIHFCzxWNrsshHYPs6L7TvLu3DL+TyIGEsRcvVERmxokbf5Gdk7mFxZnTdiGtnA4cfSmjZJMviqSuZrQ==} + peerDependencies: + cytoscape: ^3.2.0 + + cytoscape@3.33.1: + resolution: {integrity: sha512-iJc4TwyANnOGR1OmWhsS9ayRS3s+XQ185FmuHObThD+5AeJCakAAbWv8KimMTt08xCCLNgneQwFp+JRJOr9qGQ==} + engines: {node: '>=0.10'} + + d3-array@2.12.1: + resolution: {integrity: sha512-B0ErZK/66mHtEsR1TkPEEkwdy+WDesimkM5gpZr5Dsg54BiTA5RXtYW5qTLIAcekaS9xfZrzBLF/OAkB3Qn1YQ==} + + d3-array@3.2.4: + resolution: {integrity: sha512-tdQAmyA18i4J7wprpYq8ClcxZy3SC31QMeByyCFyRt7BVHdREQZ5lpzoe5mFEYZUWe+oq8HBvk9JjpibyEV4Jg==} + engines: {node: '>=12'} + + d3-axis@3.0.0: + resolution: {integrity: sha512-IH5tgjV4jE/GhHkRV0HiVYPDtvfjHQlQfJHs0usq7M30XcSBvOotpmH1IgkcXsO/5gEQZD43B//fc7SRT5S+xw==} + engines: {node: '>=12'} + + d3-brush@3.0.0: + resolution: {integrity: sha512-ALnjWlVYkXsVIGlOsuWH1+3udkYFI48Ljihfnh8FZPF2QS9o+PzGLBslO0PjzVoHLZ2KCVgAM8NVkXPJB2aNnQ==} + engines: {node: '>=12'} + + d3-chord@3.0.1: + resolution: {integrity: sha512-VE5S6TNa+j8msksl7HwjxMHDM2yNK3XCkusIlpX5kwauBfXuyLAtNg9jCp/iHH61tgI4sb6R/EIMWCqEIdjT/g==} + engines: {node: '>=12'} + + d3-color@3.1.0: + resolution: {integrity: sha512-zg/chbXyeBtMQ1LbD/WSoW2DpC3I0mpmPdW+ynRTj/x2DAWYrIY7qeZIHidozwV24m4iavr15lNwIwLxRmOxhA==} + engines: {node: '>=12'} + + d3-contour@4.0.2: + resolution: {integrity: sha512-4EzFTRIikzs47RGmdxbeUvLWtGedDUNkTcmzoeyg4sP/dvCexO47AaQL7VKy/gul85TOxw+IBgA8US2xwbToNA==} + engines: {node: '>=12'} + + d3-delaunay@6.0.4: + resolution: {integrity: sha512-mdjtIZ1XLAM8bm/hx3WwjfHt6Sggek7qH043O8KEjDXN40xi3vx/6pYSVTwLjEgiXQTbvaouWKynLBiUZ6SK6A==} + engines: {node: '>=12'} + + d3-dispatch@3.0.1: + resolution: {integrity: sha512-rzUyPU/S7rwUflMyLc1ETDeBj0NRuHKKAcvukozwhshr6g6c5d8zh4c2gQjY2bZ0dXeGLWc1PF174P2tVvKhfg==} + engines: {node: '>=12'} + + d3-drag@3.0.0: + resolution: {integrity: sha512-pWbUJLdETVA8lQNJecMxoXfH6x+mO2UQo8rSmZ+QqxcbyA3hfeprFgIT//HW2nlHChWeIIMwS2Fq+gEARkhTkg==} + engines: {node: '>=12'} + + d3-dsv@3.0.1: + resolution: {integrity: sha512-UG6OvdI5afDIFP9w4G0mNq50dSOsXHJaRE8arAS5o9ApWnIElp8GZw1Dun8vP8OyHOZ/QJUKUJwxiiCCnUwm+Q==} + engines: {node: '>=12'} + hasBin: true + + d3-ease@3.0.1: + resolution: {integrity: sha512-wR/XK3D3XcLIZwpbvQwQ5fK+8Ykds1ip7A2Txe0yxncXSdq1L9skcG7blcedkOX+ZcgxGAmLX1FrRGbADwzi0w==} + engines: {node: '>=12'} + + d3-fetch@3.0.1: + resolution: {integrity: sha512-kpkQIM20n3oLVBKGg6oHrUchHM3xODkTzjMoj7aWQFq5QEM+R6E4WkzT5+tojDY7yjez8KgCBRoj4aEr99Fdqw==} + engines: {node: '>=12'} + + d3-force@3.0.0: + resolution: {integrity: sha512-zxV/SsA+U4yte8051P4ECydjD/S+qeYtnaIyAs9tgHCqfguma/aAQDjo85A9Z6EKhBirHRJHXIgJUlffT4wdLg==} + engines: {node: '>=12'} + + d3-format@3.1.0: + resolution: {integrity: sha512-YyUI6AEuY/Wpt8KWLgZHsIU86atmikuoOmCfommt0LYHiQSPjvX2AcFc38PX0CBpr2RCyZhjex+NS/LPOv6YqA==} + engines: {node: '>=12'} + + d3-geo@3.1.1: + resolution: {integrity: sha512-637ln3gXKXOwhalDzinUgY83KzNWZRKbYubaG+fGVuc/dxO64RRljtCTnf5ecMyE1RIdtqpkVcq0IbtU2S8j2Q==} + engines: {node: '>=12'} + + d3-hierarchy@3.1.2: + resolution: {integrity: sha512-FX/9frcub54beBdugHjDCdikxThEqjnR93Qt7PvQTOHxyiNCAlvMrHhclk3cD5VeAaq9fxmfRp+CnWw9rEMBuA==} + engines: {node: '>=12'} + + d3-interpolate@3.0.1: + resolution: {integrity: sha512-3bYs1rOD33uo8aqJfKP3JWPAibgw8Zm2+L9vBKEHJ2Rg+viTR7o5Mmv5mZcieN+FRYaAOWX5SJATX6k1PWz72g==} + engines: {node: '>=12'} + + d3-path@1.0.9: + resolution: {integrity: sha512-VLaYcn81dtHVTjEHd8B+pbe9yHWpXKZUC87PzoFmsFrJqgFwDe/qxfp5MlfsfM1V5E/iVt0MmEbWQ7FVIXh/bg==} + + d3-path@3.1.0: + resolution: {integrity: sha512-p3KP5HCf/bvjBSSKuXid6Zqijx7wIfNW+J/maPs+iwR35at5JCbLUT0LzF1cnjbCHWhqzQTIN2Jpe8pRebIEFQ==} + engines: {node: '>=12'} + + d3-polygon@3.0.1: + resolution: {integrity: sha512-3vbA7vXYwfe1SYhED++fPUQlWSYTTGmFmQiany/gdbiWgU/iEyQzyymwL9SkJjFFuCS4902BSzewVGsHHmHtXg==} + engines: {node: '>=12'} + + d3-quadtree@3.0.1: + resolution: {integrity: sha512-04xDrxQTDTCFwP5H6hRhsRcb9xxv2RzkcsygFzmkSIOJy3PeRJP7sNk3VRIbKXcog561P9oU0/rVH6vDROAgUw==} + engines: {node: '>=12'} + + d3-random@3.0.1: + resolution: {integrity: sha512-FXMe9GfxTxqd5D6jFsQ+DJ8BJS4E/fT5mqqdjovykEB2oFbTMDVdg1MGFxfQW+FBOGoB++k8swBrgwSHT1cUXQ==} + engines: {node: '>=12'} + + d3-sankey@0.12.3: + resolution: {integrity: sha512-nQhsBRmM19Ax5xEIPLMY9ZmJ/cDvd1BG3UVvt5h3WRxKg5zGRbvnteTyWAbzeSvlh3tW7ZEmq4VwR5mB3tutmQ==} + + d3-scale-chromatic@3.1.0: + resolution: {integrity: sha512-A3s5PWiZ9YCXFye1o246KoscMWqf8BsD9eRiJ3He7C9OBaxKhAd5TFCdEx/7VbKtxxTsu//1mMJFrEt572cEyQ==} + engines: {node: '>=12'} + + d3-scale@4.0.2: + resolution: {integrity: sha512-GZW464g1SH7ag3Y7hXjf8RoUuAFIqklOAq3MRl4OaWabTFJY9PN/E1YklhXLh+OQ3fM9yS2nOkCoS+WLZ6kvxQ==} + engines: {node: '>=12'} + + d3-selection@3.0.0: + resolution: {integrity: sha512-fmTRWbNMmsmWq6xJV8D19U/gw/bwrHfNXxrIN+HfZgnzqTHp9jOmKMhsTUjXOJnZOdZY9Q28y4yebKzqDKlxlQ==} + engines: {node: '>=12'} + + d3-shape@1.3.7: + resolution: {integrity: sha512-EUkvKjqPFUAZyOlhY5gzCxCeI0Aep04LwIRpsZ/mLFelJiUfnK56jo5JMDSE7yyP2kLSb6LtF+S5chMk7uqPqw==} + + d3-shape@3.2.0: + resolution: {integrity: sha512-SaLBuwGm3MOViRq2ABk3eLoxwZELpH6zhl3FbAoJ7Vm1gofKx6El1Ib5z23NUEhF9AsGl7y+dzLe5Cw2AArGTA==} + engines: {node: '>=12'} + + d3-time-format@4.1.0: + resolution: {integrity: sha512-dJxPBlzC7NugB2PDLwo9Q8JiTR3M3e4/XANkreKSUxF8vvXKqm1Yfq4Q5dl8budlunRVlUUaDUgFt7eA8D6NLg==} + engines: {node: '>=12'} + + d3-time@3.1.0: + resolution: {integrity: sha512-VqKjzBLejbSMT4IgbmVgDjpkYrNWUYJnbCGo874u7MMKIWsILRX+OpX/gTk8MqjpT1A/c6HY2dCA77ZN0lkQ2Q==} + engines: {node: '>=12'} + + d3-timer@3.0.1: + resolution: {integrity: sha512-ndfJ/JxxMd3nw31uyKoY2naivF+r29V+Lc0svZxe1JvvIRmi8hUsrMvdOwgS1o6uBHmiz91geQ0ylPP0aj1VUA==} + engines: {node: '>=12'} + + d3-transition@3.0.1: + resolution: {integrity: sha512-ApKvfjsSR6tg06xrL434C0WydLr7JewBB3V+/39RMHsaXTOG0zmt/OAXeng5M5LBm0ojmxJrpomQVZ1aPvBL4w==} + engines: {node: '>=12'} + peerDependencies: + d3-selection: 2 - 3 + + d3-zoom@3.0.0: + resolution: {integrity: sha512-b8AmV3kfQaqWAuacbPuNbL6vahnOJflOhexLzMMNLga62+/nh0JzvJ0aO/5a5MVgUFGS7Hu1P9P03o3fJkDCyw==} + engines: {node: '>=12'} + + d3@7.9.0: + resolution: {integrity: sha512-e1U46jVP+w7Iut8Jt8ri1YsPOvFpg46k+K8TpCb0P+zjCkjkPnV7WzfDJzMHy1LnA+wj5pLT1wjO901gLXeEhA==} + engines: {node: '>=12'} + + dagre-d3-es@7.0.11: + resolution: {integrity: sha512-tvlJLyQf834SylNKax8Wkzco/1ias1OPw8DcUMDE7oUIoSEW25riQVuiu/0OWEFqT0cxHT3Pa9/D82Jr47IONw==} + + dayjs@1.11.18: + resolution: {integrity: sha512-zFBQ7WFRvVRhKcWoUh+ZA1g2HVgUbsZm9sbddh8EC5iv93sui8DVVz1Npvz+r6meo9VKfa8NyLWBsQK1VvIKPA==} + debug@4.3.6: resolution: {integrity: sha512-O/09Bd4Z1fBrU4VzkhFqVgpPzaGbw6Sm9FEkBT1A/YBXQFGuuSxa1dN2nxgxS34JmKXqYx8CZAwEVoJFImUXIg==} engines: {node: '>=6.0'} @@ -1137,12 +1473,24 @@ packages: supports-color: optional: true + debug@4.4.3: + resolution: {integrity: sha512-RGwwWnwQvkVfavKVt22FGLw+xYSdzARwm0ru6DhTVA3umU5hZc28V3kO4stgYryrTlLpuvgI9GiijltAjNbcqA==} + engines: {node: '>=6.0'} + peerDependencies: + supports-color: '*' + peerDependenciesMeta: + supports-color: + optional: true + decode-named-character-reference@1.0.2: resolution: {integrity: sha512-O8x12RzrUF8xyVcY0KJowWsmaJxQbmy0/EtnNtHRpsOcT7dFk5W598coHqBVpmWo1oQQfsCqfCmkZN5DJrZVdg==} defu@6.1.4: resolution: {integrity: sha512-mEQCMmwJu317oSz8CwdIOdwf3xMif1ttiM8LTufzc3g6kR+9Pe236twL8j3IYT1F7GfRgGcW6MWxzZjLIkuHIg==} + delaunator@5.0.1: + resolution: {integrity: sha512-8nvh+XBe96aCESrGOqMp/84b13H9cdKbG5P2ejQCh4d4sK9RL4371qou9drQjMhvnPmhWl5hnmqbEE0fXr9Xnw==} + dequal@2.0.3: resolution: {integrity: sha512-0je+qPKHEMohvfRTCEo3CrPG6cAzAYgmzKyxRiYSSDkS6eGJdyVJm7WaYA5ECaAD9wLB2T4EEeymA5aFVcYXCA==} engines: {node: '>=6'} @@ -1175,6 +1523,9 @@ packages: dlv@1.1.3: resolution: {integrity: sha512-+HlytyjlPKnIG8XuRG8WvmBP8xs8P71y+SKKS6ZXWoEgLuePxtDoUEiH7WkdePWrQ5JBpE6aoVqfZfJUQkjXwA==} + dompurify@3.2.6: + resolution: {integrity: sha512-/2GogDQlohXPZe6D6NOgQvXLPSYBqIWMnZ8zzOhn09REE4eyAzb+Hed3jhoM9OkuaJ8P6ZGTTVWQKAi8ieIzfQ==} + dset@3.1.4: resolution: {integrity: sha512-2QF/g9/zTaPDc3BjNcVTGoBbXBgYfMTTceLaYcFJ/W9kggFUkhxD/hMEeuLKbugyef9SqAx8cpgwlIP/jinUTA==} engines: {node: '>=4'} @@ -1256,6 +1607,9 @@ packages: expressive-code@0.40.2: resolution: {integrity: sha512-1zIda2rB0qiDZACawzw2rbdBQiWHBT56uBctS+ezFe5XMAaFaHLnnSYND/Kd+dVzO9HfCXRDpzH3d+3fvOWRcw==} + exsolve@1.0.7: + resolution: {integrity: sha512-VO5fQUzZtI6C+vx4w/4BWJpg3s/5l+6pRQEHzFRM8WFi4XffSP1Z+4qi7GbjWbvRQEbdIco5mIMq+zX4rPuLrw==} + extend@3.0.2: resolution: {integrity: sha512-fjquC59cD7CyW6urNXK0FBufkZcoiGG80wTuPujX590cB5Ttln20E2UB4S/WARVqhXffZl2LNgS+gQdPIIim/g==} @@ -1353,12 +1707,19 @@ packages: resolution: {integrity: sha512-wHTUcDUoZ1H5/0iVqEudYW4/kAlN5cZ3j/bXn0Dpbizl9iaUVeWSHqiOjsgk6OW2bkLclbBjzewBz6weQ1zA2Q==} engines: {node: '>=18'} + globals@15.15.0: + resolution: {integrity: sha512-7ACyT3wmyp3I61S4fG682L0VA2RGD9otkqGJIwNUMF1SWUombIIk+af1unuDYgMm082aHYwD+mzJvv9Iu8dsgg==} + engines: {node: '>=18'} + graceful-fs@4.2.11: resolution: {integrity: sha512-RbJ5/jmFcNNCcDV5o9eTnBLJ/HszWV0P73bc+Ff4nS/rJj+YaS6IGyiOL0VoBYX+l1Wrl3k63h/KrH+nhJ0XvQ==} h3@1.15.0: resolution: {integrity: sha512-OsjX4JW8J4XGgCgEcad20pepFQWnuKH+OwkCJjogF3C+9AZ1iYdtB4hX6vAb5DskBiu5ljEXqApINjR8CqoCMQ==} + hachure-fill@0.5.2: + resolution: {integrity: sha512-3GKBOn+m2LX9iq+JC1064cSFprJY4jL1jCXTcpnfER5HYE2l/4EfWSGzkPa/ZDBmYI0ZOEj5VHV/eKnPGkHuOg==} + has-own-prop@2.0.0: resolution: {integrity: sha512-Pq0h+hvsVm6dDEa8x82GnLSYHOzNDt7f0ddFa3FqcQlgzEiptPqL+XrOJNavjOzSYiYWIrgeVYYgGlLmnxwilQ==} engines: {node: '>=8'} @@ -1441,6 +1802,10 @@ packages: i18next@23.16.8: resolution: {integrity: sha512-06r/TitrM88Mg5FdUXAKL96dJMzgqLE5dv3ryBAra4KCwD9mJ4ndOTS95ZuymIGoE+2hzfdaMak2X11/es7ZWg==} + iconv-lite@0.6.3: + resolution: {integrity: sha512-4fCk79wshMdzMp2rH06qWrJE4iolqLhCUH+OiuIgU++RB0+94NlDL81atO7GX55uUKueo0txHNtvEyI6D7WdMw==} + engines: {node: '>=0.10.0'} + import-fresh@3.3.0: resolution: {integrity: sha512-veYYhQa+D1QBKznvhUHxb8faxlrwUnxseDAbAp457E0wLNio2bOSKnjYDhMj+YiAq61xrMGhQk9iXVk5FzgQMw==} engines: {node: '>=6'} @@ -1458,6 +1823,13 @@ packages: inline-style-parser@0.2.3: resolution: {integrity: sha512-qlD8YNDqyTKTyuITrDOffsl6Tdhv+UC4hcdAVuQsK4IMQ99nSgd1MIA/Q+jQYoh9r3hVUXhYh7urSRmXPkW04g==} + internmap@1.0.1: + resolution: {integrity: sha512-lDB5YccMydFBtasVtxnZ3MRBHuaoE8GKsppq+EchKL2U4nK/DmEpPHNH8MZe5HkMtpSiTSOZwfN0tzYjO/lJEw==} + + internmap@2.0.3: + resolution: {integrity: sha512-5Hh7Y1wQbvY5ooGgPbDaL5iYLAPzMTUrjMulskHLH6wnv/A+1q5rgEaiuqEjB+oxGXIVZs1FF+R/KPN3ZSQYYg==} + engines: {node: '>=12'} + iron-webcrypto@1.2.1: resolution: {integrity: sha512-feOM6FaSr6rEABp/eDfVseKyTMDt+KGpeB35SkVn9Tyn0CqvVsY3EwI0v5i8nMHyJnzCIQf7nsy3p41TPkJZhg==} @@ -1534,9 +1906,16 @@ packages: jsonc-parser@3.3.1: resolution: {integrity: sha512-HUgH65KyejrUFPvHFPbqOY0rsFip3Bo5wb4ngvdi1EpCYWUQDC5V+Y7mZws+DLkr4M//zQJoanu1SP+87Dv1oQ==} + katex@0.16.22: + resolution: {integrity: sha512-XCHRdUw4lf3SKBaJe4EvgqIuWwkPSo9XoeO8GjQW94Bp7TWv9hNhzZjZ+OH9yf1UmLygb7DIT5GSFQiyt16zYg==} + hasBin: true + keyv@4.5.4: resolution: {integrity: sha512-oxVHkHR/EJf2CNXnWxRLW6mg7JyCCUcG0DtEGmL2ctUo1PNTin1PUil+r/+4r5MpVgC/fn1kjsx7mjSujKqIpw==} + khroma@2.1.0: + resolution: {integrity: sha512-Ls993zuzfayK269Svk9hzpeGUKob/sIgZzyHYdjQoAdQetRKpOLj+k/QQQ/6Qi0Yz65mlROrfd+Ev+1+7dz9Kw==} + kleur@3.0.3: resolution: {integrity: sha512-eTIzlVOSUR+JxdDFepEYcBMtZ9Qqdef+rnzWdRZuMbOywu5tO2w2N7rqjoANZ5k9vywhL6Br1VRjUIgTQx4E8w==} engines: {node: '>=6'} @@ -1549,14 +1928,34 @@ packages: resolution: {integrity: sha512-dhG34DXATL5hSxJbIexCft8FChFXtmskoZYnoPWjXQuebWYCNkVeV3KkGegCK9CP1oswI/vQibS2GY7Em/sJJA==} engines: {node: '>= 8'} + kolorist@1.8.0: + resolution: {integrity: sha512-Y+60/zizpJ3HRH8DCss+q95yr6145JXZo46OTpFvDZWLfRCE4qChOyk1b26nMaNpfHHgxagk9dXT5OP0Tfe+dQ==} + + langium@3.3.1: + resolution: {integrity: sha512-QJv/h939gDpvT+9SiLVlY7tZC3xB2qK57v0J04Sh9wpMb6MP1q8gB21L3WIo8T5P1MSMg3Ep14L7KkDCFG3y4w==} + engines: {node: '>=16.0.0'} + + layout-base@1.0.2: + resolution: {integrity: sha512-8h2oVEZNktL4BH2JCOI90iD1yXwL6iNW7KcCKT2QZgQJR2vbqDsldCTPRU9NifTCqHZci57XvQQ15YTu+sTYPg==} + + layout-base@2.0.1: + resolution: {integrity: sha512-dp3s92+uNI1hWIpPGH3jK2kxE2lMjdXdr+DH8ynZHpd6PUlH6x6cbuXnoMmiNumznqaNO31xu9e79F0uuZ0JFg==} + load-yaml-file@0.2.0: resolution: {integrity: sha512-OfCBkGEw4nN6JLtgRidPX6QxjBQGQf72q3si2uvqyFEMbycSFFHwAZeXx6cJgFM9wmLrf9zBwCP3Ivqa+LLZPw==} engines: {node: '>=6'} + local-pkg@1.1.2: + resolution: {integrity: sha512-arhlxbFRmoQHl33a0Zkle/YWlmNwoyt6QNZEIJcqNbdrsix5Lvc4HyyI3EnwxTYlZYc32EbYrQ8SzEZ7dqgg9A==} + engines: {node: '>=14'} + locate-path@5.0.0: resolution: {integrity: sha512-t7hw9pI+WvuwNJXwk5zVHpyhIqzg2qTlklJOf0mVxGSbe3Fp2VieZcduNYjaLDoy6p9uGpQEGWG87WpMKlNq8g==} engines: {node: '>=8'} + lodash-es@4.17.21: + resolution: {integrity: sha512-mKnC+QJ9pWVzv+C4/U3rRsHapFfHvQFoFB92e52xeyGMcX6/OlIl78je1u8vePzYZSkkogMPJ2yjxxsb89cxyw==} + lodash@4.17.21: resolution: {integrity: sha512-v2kDEe57lecTulaDIuNTPy3Ry4gLGJ6Z1O3vE1krgXZNrsQ+LFTGHVxVjcXPs17LhbZVGedAJv8XZ1tvj5FvSg==} @@ -1579,6 +1978,11 @@ packages: markdown-table@3.0.3: resolution: {integrity: sha512-Z1NL3Tb1M9wH4XESsCDEksWoKTdlUafKc4pt0GRwjUyXaCFZ+dc3g2erqB6zm3szA2IUSi7VnPI+o/9jnxh9hw==} + marked@15.0.12: + resolution: {integrity: sha512-8dD6FusOQSrpv9Z1rdNMdlSgQOIP880DHqnohobOmYLElGEqAL/JvxvuxZO16r4HtjTlfPRDC1hbvxC9dPN2nA==} + engines: {node: '>= 18'} + hasBin: true + mdast-util-definitions@6.0.0: resolution: {integrity: sha512-scTllyX6pnYNZH/AIp/0ePz6s4cZtARxImwoPJ7kS42n+MnVsI4XbnG6d4ibehRIldYMWM2LD7ImQblVhUejVQ==} @@ -1637,6 +2041,9 @@ packages: resolution: {integrity: sha512-8q7VEgMJW4J8tcfVPy8g09NcQwZdbwFEqhe/WZkoIzjn/3TGDwtOCYtXGxA3O8tPzpczCCDgv+P2P5y00ZJOOg==} engines: {node: '>= 8'} + mermaid@11.11.0: + resolution: {integrity: sha512-9lb/VNkZqWTRjVgCV+l1N+t4kyi94y+l5xrmBmbbxZYkfRl5hEDaTPMOcaWKCl1McG8nBEaMlWwkcAEEgjhBgg==} + micromark-core-commonmark@2.0.1: resolution: {integrity: sha512-CUQyKr1e///ZODyD1U3xit6zXwy1a8q2a1S1HKtIlmgvurrEpaw/Y9y6KSIbF8P59cn/NjzHyO+Q2fAyYLQrAA==} @@ -1749,6 +2156,9 @@ packages: resolution: {integrity: sha512-PXwfBhYu0hBCPw8Dn0E+WDYb7af3dSLVWKi3HGv84IdF4TyFoC0ysxFd0Goxw7nSv4T/PzEJQxsYsEiFCKo2BA==} engines: {node: '>=8.6'} + mlly@1.8.0: + resolution: {integrity: sha512-l8D9ODSRWLe2KHJSifWGwBqpTZXIXTeo8mlKjY+E2HAakaTeNpqAyBZ8GSqLzHgw4XmHmC8whvpjJNMbFZN7/g==} + mrmime@2.0.0: resolution: {integrity: sha512-eu38+hdgojoyq63s+yTpN4XMBdt5l8HhMhc4VKLO9KM5caLIBvUm4thi7fFaxyTmCKeNnXZ5pAlBwCUnhA09uw==} engines: {node: '>=10'} @@ -1828,6 +2238,9 @@ packages: resolution: {integrity: sha512-R4nPAVTAU0B9D35/Gk3uJf/7XYbQcyohSKdvAxIRSNghFl4e71hVoGnBNQz9cWaXxO2I10KTC+3jMdvvoKw6dQ==} engines: {node: '>=6'} + package-manager-detector@1.3.0: + resolution: {integrity: sha512-ZsEbbZORsyHuO00lY1kV3/t72yp6Ysay6Pd17ZAlNGuGwmWDLCJxFpRs0IzfXfj1o4icJOkUEioexFHzyPurSQ==} + pagefind@1.3.0: resolution: {integrity: sha512-8KPLGT5g9s+olKMRTU9LFekLizkVIu9tes90O1/aigJ0T5LmyPqTzGJrETnSw3meSYg58YH7JTzhTTW/3z6VAw==} hasBin: true @@ -1852,10 +2265,16 @@ packages: path-browserify@1.0.1: resolution: {integrity: sha512-b7uo2UCUOYZcnF/3ID0lulOJi/bafxa1xPe7ZPsammBSpjSWQkjNxlt635YGS2MiR9GjvuXCtz2emr3jbsz98g==} + path-data-parser@0.1.0: + resolution: {integrity: sha512-NOnmBpt5Y2RWbuv0LMzsayp3lVylAHLPUTut412ZA3l+C4uw4ZVkQbjShYCQ8TCpUMdPapr4YjUqLYD6v68j+w==} + path-exists@4.0.0: resolution: {integrity: sha512-ak9Qy5Q7jYb2Wwcey5Fpvg2KoAc/ZIhLSLOSBmRmygPsGwkVVt0fZa0qrtMz+m6tJTAHfZQ8FnmB4MG4LWy7/w==} engines: {node: '>=8'} + pathe@2.0.3: + resolution: {integrity: sha512-WUjGcAqP1gQacoQe+OBJsFA7Ld4DyXuUIjZ5cc75cLHvJ7dtNsTugphxIADwspS+AraAUePCKrSVtPLFj/F88w==} + picocolors@1.0.1: resolution: {integrity: sha512-anP1Z8qwhkbmu7MFP5iTt+wQKXgwzf7zTyGlcdzabySa9vd0Xt392U0rVmz9poOaBj0uHJKyyo9/upk0HrEQew==} @@ -1878,6 +2297,18 @@ packages: resolution: {integrity: sha512-HRDzbaKjC+AOWVXxAU/x54COGeIv9eb+6CkDSQoNTt4XyWoIJvuPsXizxu/Fr23EiekbtZwmh1IcIG/l/a10GQ==} engines: {node: '>=8'} + pkg-types@1.3.1: + resolution: {integrity: sha512-/Jm5M4RvtBFVkKWRu2BLUTNP8/M2a+UwuAX+ae4770q1qVGtfjG+WTCupoZixokjmHiry8uI+dlY8KXYV5HVVQ==} + + pkg-types@2.3.0: + resolution: {integrity: sha512-SIqCzDRg0s9npO5XQ3tNZioRY1uK06lA41ynBC1YmFTmnY6FjUjVt6s4LoADmwoig1qqD0oK8h1p/8mlMx8Oig==} + + points-on-curve@0.2.0: + resolution: {integrity: sha512-0mYKnYYe9ZcqMCWhUjItv/oHjvgEsfKvnUTg8sAtnHr3GVy7rGkXCb6d5cSyqrWqL4k81b9CPg3urd+T7aop3A==} + + points-on-path@0.2.1: + resolution: {integrity: sha512-25ClnWWuw7JbWZcgqY/gJ4FQWadKxGWk+3kR/7kD0tCaDtPPMj7oHu2ToLaVhfpnHrZzYby2w6tUA0eOIuUg8g==} + postcss-nested@6.2.0: resolution: {integrity: sha512-HQbt28KulC5AJzG+cZtj9kvKB93CFCdLvog1WFLf1D+xmMvPGlBstkpTEZfK5+AN9hfJocyBFCNiqyS48bpgzQ==} engines: {node: '>=12.0'} @@ -1916,6 +2347,9 @@ packages: property-information@6.5.0: resolution: {integrity: sha512-PgTgs/BlvHxOu8QuEN7wi5A0OmXaBcHpmCSTehcs6Uuu9IkDIEo13Hy7n898RHfrQ49vKCoGeWZSaAK01nwVig==} + quansync@0.2.11: + resolution: {integrity: sha512-AifT7QEbW9Nri4tAwR5M/uzpBuqfZf+zwaEM/QkzEjj7NBuFD2rBuy0K3dE+8wltbezDV7JMA0WfnCPYRSYbXA==} + queue-microtask@1.2.3: resolution: {integrity: sha512-NuaNSa6flKT5JaSYQzJok04JzTL1CA6aGhv5rfLW3PgqA+M2ChpZQnAC8h8i4ZFkBS8X5RqkDBHA7r4hej3K9A==} @@ -2051,14 +2485,26 @@ packages: resolution: {integrity: sha512-U9nH88a3fc/ekCF1l0/UP1IosiuIjyTh7hBvXVMHYgVcfGvt897Xguj2UOLDeI5BG2m7/uwyaLVT6fbtCwTyzw==} engines: {iojs: '>=1.0.0', node: '>=0.10.0'} + robust-predicates@3.0.2: + resolution: {integrity: sha512-IXgzBWvWQwE6PrDI05OvmXUIruQTcoMDzRsOd5CDvHCVLcLHMTSYvOK5Cm46kWqlV3yAbuSpBZdJ5oP5OUoStg==} + rollup@4.34.7: resolution: {integrity: sha512-8qhyN0oZ4x0H6wmBgfKxJtxM7qS98YJ0k0kNh5ECVtuchIJ7z9IVVvzpmtQyT10PXKMtBxYr1wQ5Apg8RS8kXQ==} engines: {node: '>=18.0.0', npm: '>=8.0.0'} hasBin: true + roughjs@4.6.6: + resolution: {integrity: sha512-ZUz/69+SYpFN/g/lUlo2FXcIjRkSu3nDarreVdGGndHEBJ6cXPdKguS8JGxwj5HA5xIbVKSmLgr5b3AWxtRfvQ==} + run-parallel@1.2.0: resolution: {integrity: sha512-5l4VyZR86LZ/lDxZTR6jqL8AFE2S0IFLMP26AbjsLVADxHdhB/c0GUsH+y39UfCi3dzz8OlQuPmnaJOMoDHQBA==} + rw@1.3.3: + resolution: {integrity: sha512-PdhdWy89SiZogBLaw42zdeqtRJ//zFd2PgQavcICDUgJT5oW10QCRKbJ6bg4r0/UY2M6BWd5tkxuGFRvCkgfHQ==} + + safer-buffer@2.1.2: + resolution: {integrity: sha512-YZo3K82SD7Riyi0E1EQPojLz7kpepnSQI9IyPbHHg1XXXevb5dJI7tpyN2ADxGcQbHG7vcyRHk0cbwqcQriUtg==} + sax@1.4.1: resolution: {integrity: sha512-+aWOz7yVScEGoKNd4PA10LZ8sk0A/z5+nXQG5giUO5rprX9jgYsTdov9qCchZiPIZezbZH+jRut8nPodFAX4Jg==} @@ -2144,9 +2590,15 @@ packages: style-to-object@1.0.6: resolution: {integrity: sha512-khxq+Qm3xEyZfKd/y9L3oIWQimxuc4STrQKtQn8aSDRHb8mFgpukgX1hdzfrMEW6JCjyJ8p89x+IUMVnCBI1PA==} + stylis@4.3.6: + resolution: {integrity: sha512-yQ3rwFWRfwNUY7H5vpU0wfdkNSnvnJinhF9830Swlaxl03zsOjCfmX0ugac+3LtK0lYSgwL/KXc8oYL3mG4YFQ==} + tinyexec@0.3.2: resolution: {integrity: sha512-KQQR9yN7R5+OSwaK0XQoj22pwHoTlgYqmUscPYoknOoWCWfj/5/ABTMRi69FrKU5ffPVh5QcFikpWJI/P1ocHA==} + tinyexec@1.0.1: + resolution: {integrity: sha512-5uC6DDlmeqiOwCPmK9jMSdOuZTh8bU39Ys6yidB+UTt5hfZUPGAypSgFRiEp+jbi9qH40BLDvy85jIU88wKSqw==} + tinyglobby@0.2.10: resolution: {integrity: sha512-Zc+8eJlFMvgatPZTl6A9L/yht8QqdmUNtURHaKZLmKBE12hNPSrqNkUp2cs3M/UKmNVVAMFQYSjYIVHDjW5zew==} engines: {node: '>=12.0.0'} @@ -2165,6 +2617,10 @@ packages: trough@2.2.0: resolution: {integrity: sha512-tmMpK00BjZiUyVyvrBK7knerNgmgvcV/KLVyuma/SC+TQN167GrMRciANTz09+k3zW8L8t60jWO1GpfkZdjTaw==} + ts-dedent@2.2.0: + resolution: {integrity: sha512-q5W7tVM71e2xjHZTlgfTDoPF/SmqKG5hddq9SzR49CH2hayqRKJtQ4mtRlSxKaJlR/+9rEM+mnBHf7I2/BQcpQ==} + engines: {node: '>=6.10'} + tsconfck@3.1.5: resolution: {integrity: sha512-CLDfGgUp7XPswWnezWwsCRxNmgQjhYq3VXHM0/XIRxhVrKw0M1if9agzryh1QS3nxjCROvV+xWxoJO1YctzzWg==} engines: {node: ^18 || >=20} @@ -2196,6 +2652,9 @@ packages: ufo@1.5.4: resolution: {integrity: sha512-UsUk3byDzKd04EyoZ7U4DOlxQaD14JUKQl6/P7wiX4FNvUfm3XL246n9W5AmqwW5RSFJ27NAuM0iLscAOYUiGQ==} + ufo@1.6.1: + resolution: {integrity: sha512-9a4/uxlTWJ4+a5i0ooc1rU7C7YOw3wT+UGqdeNNHWnOF9qcMBgLRS+4IYUqbczewFx4mLEig6gawh7X6mFlEkA==} + ultrahtml@1.5.3: resolution: {integrity: sha512-GykOvZwgDWZlTQMtp5jrD4BVL+gNn2NVlVafjcFUJ7taY20tqYdwdoWBFy6GBJsNTZe1GkGPkSl5knQAjtgceg==} @@ -2297,6 +2756,10 @@ packages: util-deprecate@1.0.2: resolution: {integrity: sha512-EPD5q1uXyFxJpCrLnCc1nHnq3gOa6DZBocAIiI2TaSCA7VCJ1UJDMagCzIkXNsUYfD1daK//LTEQ8xiIbrHtcw==} + uuid@11.1.0: + resolution: {integrity: sha512-0/A9rDy9P7cJ+8w1c9WD9V//9Wj15Ce2MPz8Ri6032usz+NfePxx5AcN3bN+r6ZL6jEo066/yNYB3tn4pQEx+A==} + hasBin: true + vfile-location@5.0.3: resolution: {integrity: sha512-5yXvWDEgqeiYiBe1lbxYF7UMAIm/IcopxMHrMQDq3nvKcjPKIhZklUKL+AE7J7uApI4kwe2snsK+eI6UTj9EHg==} @@ -2560,6 +3023,13 @@ packages: snapshots: + '@antfu/install-pkg@1.1.0': + dependencies: + package-manager-detector: 1.3.0 + tinyexec: 1.0.1 + + '@antfu/utils@9.2.0': {} + '@astrojs/check@0.9.4(typescript@5.7.3)': dependencies: '@astrojs/language-server': 2.15.4(typescript@5.7.3) @@ -2717,6 +3187,25 @@ snapshots: '@babel/helper-validator-identifier': 7.24.7 to-fast-properties: 2.0.0 + '@braintree/sanitize-url@7.1.1': {} + + '@chevrotain/cst-dts-gen@11.0.3': + dependencies: + '@chevrotain/gast': 11.0.3 + '@chevrotain/types': 11.0.3 + lodash-es: 4.17.21 + + '@chevrotain/gast@11.0.3': + dependencies: + '@chevrotain/types': 11.0.3 + lodash-es: 4.17.21 + + '@chevrotain/regexp-to-ast@11.0.3': {} + + '@chevrotain/types@11.0.3': {} + + '@chevrotain/utils@11.0.3': {} + '@cspell/cspell-bundled-dicts@8.17.3': dependencies: '@cspell/dict-ada': 4.1.0 @@ -3058,6 +3547,21 @@ snapshots: dependencies: '@expressive-code/core': 0.40.2 + '@iconify/types@2.0.0': {} + + '@iconify/utils@3.0.2': + dependencies: + '@antfu/install-pkg': 1.1.0 + '@antfu/utils': 9.2.0 + '@iconify/types': 2.0.0 + debug: 4.4.3 + globals: 15.15.0 + kolorist: 1.8.0 + local-pkg: 1.1.2 + mlly: 1.8.0 + transitivePeerDependencies: + - supports-color + '@img/sharp-darwin-arm64@0.33.5': optionalDependencies: '@img/sharp-libvips-darwin-arm64': 1.0.4 @@ -3165,6 +3669,10 @@ snapshots: - acorn - supports-color + '@mermaid-js/parser@0.6.2': + dependencies: + langium: 3.3.1 + '@nodelib/fs.scandir@2.1.5': dependencies: '@nodelib/fs.stat': 2.0.5 @@ -3302,6 +3810,123 @@ snapshots: '@types/cookie@0.6.0': {} + '@types/d3-array@3.2.2': {} + + '@types/d3-axis@3.0.6': + dependencies: + '@types/d3-selection': 3.0.11 + + '@types/d3-brush@3.0.6': + dependencies: + '@types/d3-selection': 3.0.11 + + '@types/d3-chord@3.0.6': {} + + '@types/d3-color@3.1.3': {} + + '@types/d3-contour@3.0.6': + dependencies: + '@types/d3-array': 3.2.2 + '@types/geojson': 7946.0.16 + + '@types/d3-delaunay@6.0.4': {} + + '@types/d3-dispatch@3.0.7': {} + + '@types/d3-drag@3.0.7': + dependencies: + '@types/d3-selection': 3.0.11 + + '@types/d3-dsv@3.0.7': {} + + '@types/d3-ease@3.0.2': {} + + '@types/d3-fetch@3.0.7': + dependencies: + '@types/d3-dsv': 3.0.7 + + '@types/d3-force@3.0.10': {} + + '@types/d3-format@3.0.4': {} + + '@types/d3-geo@3.1.0': + dependencies: + '@types/geojson': 7946.0.16 + + '@types/d3-hierarchy@3.1.7': {} + + '@types/d3-interpolate@3.0.4': + dependencies: + '@types/d3-color': 3.1.3 + + '@types/d3-path@3.1.1': {} + + '@types/d3-polygon@3.0.2': {} + + '@types/d3-quadtree@3.0.6': {} + + '@types/d3-random@3.0.3': {} + + '@types/d3-scale-chromatic@3.1.0': {} + + '@types/d3-scale@4.0.9': + dependencies: + '@types/d3-time': 3.0.4 + + '@types/d3-selection@3.0.11': {} + + '@types/d3-shape@3.1.7': + dependencies: + '@types/d3-path': 3.1.1 + + '@types/d3-time-format@4.0.3': {} + + '@types/d3-time@3.0.4': {} + + '@types/d3-timer@3.0.2': {} + + '@types/d3-transition@3.0.9': + dependencies: + '@types/d3-selection': 3.0.11 + + '@types/d3-zoom@3.0.8': + dependencies: + '@types/d3-interpolate': 3.0.4 + '@types/d3-selection': 3.0.11 + + '@types/d3@7.4.3': + dependencies: + '@types/d3-array': 3.2.2 + '@types/d3-axis': 3.0.6 + '@types/d3-brush': 3.0.6 + '@types/d3-chord': 3.0.6 + '@types/d3-color': 3.1.3 + '@types/d3-contour': 3.0.6 + '@types/d3-delaunay': 6.0.4 + '@types/d3-dispatch': 3.0.7 + '@types/d3-drag': 3.0.7 + '@types/d3-dsv': 3.0.7 + '@types/d3-ease': 3.0.2 + '@types/d3-fetch': 3.0.7 + '@types/d3-force': 3.0.10 + '@types/d3-format': 3.0.4 + '@types/d3-geo': 3.1.0 + '@types/d3-hierarchy': 3.1.7 + '@types/d3-interpolate': 3.0.4 + '@types/d3-path': 3.1.1 + '@types/d3-polygon': 3.0.2 + '@types/d3-quadtree': 3.0.6 + '@types/d3-random': 3.0.3 + '@types/d3-scale': 4.0.9 + '@types/d3-scale-chromatic': 3.1.0 + '@types/d3-selection': 3.0.11 + '@types/d3-shape': 3.1.7 + '@types/d3-time': 3.0.4 + '@types/d3-time-format': 4.0.3 + '@types/d3-timer': 3.0.2 + '@types/d3-transition': 3.0.9 + '@types/d3-zoom': 3.0.8 + '@types/debug@4.1.12': dependencies: '@types/ms': 0.7.34 @@ -3314,6 +3939,8 @@ snapshots: '@types/estree@1.0.6': {} + '@types/geojson@7946.0.16': {} + '@types/hast@3.0.4': dependencies: '@types/unist': 3.0.3 @@ -3338,6 +3965,9 @@ snapshots: dependencies: '@types/node': 17.0.45 + '@types/trusted-types@2.0.7': + optional: true + '@types/unist@2.0.11': {} '@types/unist@3.0.3': {} @@ -3400,6 +4030,8 @@ snapshots: acorn@8.14.0: {} + acorn@8.15.0: {} + ajv@8.17.1: dependencies: fast-deep-equal: 3.1.3 @@ -3447,6 +4079,13 @@ snapshots: astro: 5.3.0(rollup@4.34.7)(typescript@5.7.3)(yaml@2.7.0) rehype-expressive-code: 0.40.2 + astro-mermaid@1.0.4(astro@5.3.0(rollup@4.34.7)(typescript@5.7.3)(yaml@2.7.0))(mermaid@11.11.0): + dependencies: + astro: 5.3.0(rollup@4.34.7)(typescript@5.7.3)(yaml@2.7.0) + mdast-util-to-string: 4.0.0 + mermaid: 11.11.0 + unist-util-visit: 5.0.0 + astro@5.3.0(rollup@4.34.7)(typescript@5.7.3)(yaml@2.7.0): dependencies: '@astrojs/compiler': 2.10.3 @@ -3599,6 +4238,20 @@ snapshots: character-reference-invalid@2.0.1: {} + chevrotain-allstar@0.3.1(chevrotain@11.0.3): + dependencies: + chevrotain: 11.0.3 + lodash-es: 4.17.21 + + chevrotain@11.0.3: + dependencies: + '@chevrotain/cst-dts-gen': 11.0.3 + '@chevrotain/gast': 11.0.3 + '@chevrotain/regexp-to-ast': 11.0.3 + '@chevrotain/types': 11.0.3 + '@chevrotain/utils': 11.0.3 + lodash-es: 4.17.21 + chokidar@3.6.0: dependencies: anymatch: 3.1.3 @@ -3656,6 +4309,10 @@ snapshots: commander@13.1.0: {} + commander@7.2.0: {} + + commander@8.3.0: {} + comment-json@4.2.5: dependencies: array-timsort: 1.0.3 @@ -3666,12 +4323,24 @@ snapshots: common-ancestor-path@1.0.1: {} + confbox@0.1.8: {} + + confbox@0.2.2: {} + cookie-es@1.2.2: {} cookie@0.7.2: {} core-util-is@1.0.3: {} + cose-base@1.0.3: + dependencies: + layout-base: 1.0.2 + + cose-base@2.2.0: + dependencies: + layout-base: 2.0.1 + crossws@0.3.4: dependencies: uncrypto: 0.1.3 @@ -3769,6 +4438,192 @@ snapshots: cssesc@3.0.0: {} + cytoscape-cose-bilkent@4.1.0(cytoscape@3.33.1): + dependencies: + cose-base: 1.0.3 + cytoscape: 3.33.1 + + cytoscape-fcose@2.2.0(cytoscape@3.33.1): + dependencies: + cose-base: 2.2.0 + cytoscape: 3.33.1 + + cytoscape@3.33.1: {} + + d3-array@2.12.1: + dependencies: + internmap: 1.0.1 + + d3-array@3.2.4: + dependencies: + internmap: 2.0.3 + + d3-axis@3.0.0: {} + + d3-brush@3.0.0: + dependencies: + d3-dispatch: 3.0.1 + d3-drag: 3.0.0 + d3-interpolate: 3.0.1 + d3-selection: 3.0.0 + d3-transition: 3.0.1(d3-selection@3.0.0) + + d3-chord@3.0.1: + dependencies: + d3-path: 3.1.0 + + d3-color@3.1.0: {} + + d3-contour@4.0.2: + dependencies: + d3-array: 3.2.4 + + d3-delaunay@6.0.4: + dependencies: + delaunator: 5.0.1 + + d3-dispatch@3.0.1: {} + + d3-drag@3.0.0: + dependencies: + d3-dispatch: 3.0.1 + d3-selection: 3.0.0 + + d3-dsv@3.0.1: + dependencies: + commander: 7.2.0 + iconv-lite: 0.6.3 + rw: 1.3.3 + + d3-ease@3.0.1: {} + + d3-fetch@3.0.1: + dependencies: + d3-dsv: 3.0.1 + + d3-force@3.0.0: + dependencies: + d3-dispatch: 3.0.1 + d3-quadtree: 3.0.1 + d3-timer: 3.0.1 + + d3-format@3.1.0: {} + + d3-geo@3.1.1: + dependencies: + d3-array: 3.2.4 + + d3-hierarchy@3.1.2: {} + + d3-interpolate@3.0.1: + dependencies: + d3-color: 3.1.0 + + d3-path@1.0.9: {} + + d3-path@3.1.0: {} + + d3-polygon@3.0.1: {} + + d3-quadtree@3.0.1: {} + + d3-random@3.0.1: {} + + d3-sankey@0.12.3: + dependencies: + d3-array: 2.12.1 + d3-shape: 1.3.7 + + d3-scale-chromatic@3.1.0: + dependencies: + d3-color: 3.1.0 + d3-interpolate: 3.0.1 + + d3-scale@4.0.2: + dependencies: + d3-array: 3.2.4 + d3-format: 3.1.0 + d3-interpolate: 3.0.1 + d3-time: 3.1.0 + d3-time-format: 4.1.0 + + d3-selection@3.0.0: {} + + d3-shape@1.3.7: + dependencies: + d3-path: 1.0.9 + + d3-shape@3.2.0: + dependencies: + d3-path: 3.1.0 + + d3-time-format@4.1.0: + dependencies: + d3-time: 3.1.0 + + d3-time@3.1.0: + dependencies: + d3-array: 3.2.4 + + d3-timer@3.0.1: {} + + d3-transition@3.0.1(d3-selection@3.0.0): + dependencies: + d3-color: 3.1.0 + d3-dispatch: 3.0.1 + d3-ease: 3.0.1 + d3-interpolate: 3.0.1 + d3-selection: 3.0.0 + d3-timer: 3.0.1 + + d3-zoom@3.0.0: + dependencies: + d3-dispatch: 3.0.1 + d3-drag: 3.0.0 + d3-interpolate: 3.0.1 + d3-selection: 3.0.0 + d3-transition: 3.0.1(d3-selection@3.0.0) + + d3@7.9.0: + dependencies: + d3-array: 3.2.4 + d3-axis: 3.0.0 + d3-brush: 3.0.0 + d3-chord: 3.0.1 + d3-color: 3.1.0 + d3-contour: 4.0.2 + d3-delaunay: 6.0.4 + d3-dispatch: 3.0.1 + d3-drag: 3.0.0 + d3-dsv: 3.0.1 + d3-ease: 3.0.1 + d3-fetch: 3.0.1 + d3-force: 3.0.0 + d3-format: 3.1.0 + d3-geo: 3.1.1 + d3-hierarchy: 3.1.2 + d3-interpolate: 3.0.1 + d3-path: 3.1.0 + d3-polygon: 3.0.1 + d3-quadtree: 3.0.1 + d3-random: 3.0.1 + d3-scale: 4.0.2 + d3-scale-chromatic: 3.1.0 + d3-selection: 3.0.0 + d3-shape: 3.2.0 + d3-time: 3.1.0 + d3-time-format: 4.1.0 + d3-timer: 3.0.1 + d3-transition: 3.0.1(d3-selection@3.0.0) + d3-zoom: 3.0.0 + + dagre-d3-es@7.0.11: + dependencies: + d3: 7.9.0 + lodash-es: 4.17.21 + + dayjs@1.11.18: {} + debug@4.3.6: dependencies: ms: 2.1.2 @@ -3777,12 +4632,20 @@ snapshots: dependencies: ms: 2.1.3 + debug@4.4.3: + dependencies: + ms: 2.1.3 + decode-named-character-reference@1.0.2: dependencies: character-entities: 2.0.2 defu@6.1.4: {} + delaunator@5.0.1: + dependencies: + robust-predicates: 3.0.2 + dequal@2.0.3: {} destr@2.0.3: {} @@ -3806,6 +4669,10 @@ snapshots: dlv@1.1.3: {} + dompurify@3.2.6: + optionalDependencies: + '@types/trusted-types': 2.0.7 + dset@3.1.4: {} emmet@2.4.7: @@ -3917,6 +4784,8 @@ snapshots: '@expressive-code/plugin-shiki': 0.40.2 '@expressive-code/plugin-text-markers': 0.40.2 + exsolve@1.0.7: {} + extend@3.0.2: {} fast-deep-equal@3.1.3: {} @@ -4001,6 +4870,8 @@ snapshots: dependencies: ini: 4.1.1 + globals@15.15.0: {} + graceful-fs@4.2.11: {} h3@1.15.0: @@ -4016,6 +4887,8 @@ snapshots: ufo: 1.5.4 uncrypto: 0.1.3 + hachure-fill@0.5.2: {} + has-own-prop@2.0.0: {} hast-util-embedded@3.0.0: @@ -4234,6 +5107,10 @@ snapshots: dependencies: '@babel/runtime': 7.26.9 + iconv-lite@0.6.3: + dependencies: + safer-buffer: 2.1.2 + import-fresh@3.3.0: dependencies: parent-module: 1.0.1 @@ -4247,6 +5124,10 @@ snapshots: inline-style-parser@0.2.3: {} + internmap@1.0.1: {} + + internmap@2.0.3: {} + iron-webcrypto@1.2.1: {} is-alphabetical@2.0.1: {} @@ -4306,16 +5187,36 @@ snapshots: jsonc-parser@3.3.1: {} + katex@0.16.22: + dependencies: + commander: 8.3.0 + keyv@4.5.4: dependencies: json-buffer: 3.0.1 + khroma@2.1.0: {} + kleur@3.0.3: {} kleur@4.1.5: {} klona@2.0.6: {} + kolorist@1.8.0: {} + + langium@3.3.1: + dependencies: + chevrotain: 11.0.3 + chevrotain-allstar: 0.3.1(chevrotain@11.0.3) + vscode-languageserver: 9.0.1 + vscode-languageserver-textdocument: 1.0.12 + vscode-uri: 3.0.8 + + layout-base@1.0.2: {} + + layout-base@2.0.1: {} + load-yaml-file@0.2.0: dependencies: graceful-fs: 4.2.11 @@ -4323,10 +5224,18 @@ snapshots: pify: 4.0.1 strip-bom: 3.0.0 + local-pkg@1.1.2: + dependencies: + mlly: 1.8.0 + pkg-types: 2.3.0 + quansync: 0.2.11 + locate-path@5.0.0: dependencies: p-locate: 4.1.0 + lodash-es@4.17.21: {} + lodash@4.17.21: {} longest-streak@3.1.0: {} @@ -4347,6 +5256,8 @@ snapshots: markdown-table@3.0.3: {} + marked@15.0.12: {} + mdast-util-definitions@6.0.0: dependencies: '@types/mdast': 4.0.4 @@ -4531,6 +5442,31 @@ snapshots: merge2@1.4.1: {} + mermaid@11.11.0: + dependencies: + '@braintree/sanitize-url': 7.1.1 + '@iconify/utils': 3.0.2 + '@mermaid-js/parser': 0.6.2 + '@types/d3': 7.4.3 + cytoscape: 3.33.1 + cytoscape-cose-bilkent: 4.1.0(cytoscape@3.33.1) + cytoscape-fcose: 2.2.0(cytoscape@3.33.1) + d3: 7.9.0 + d3-sankey: 0.12.3 + dagre-d3-es: 7.0.11 + dayjs: 1.11.18 + dompurify: 3.2.6 + katex: 0.16.22 + khroma: 2.1.0 + lodash-es: 4.17.21 + marked: 15.0.12 + roughjs: 4.6.6 + stylis: 4.3.6 + ts-dedent: 2.2.0 + uuid: 11.1.0 + transitivePeerDependencies: + - supports-color + micromark-core-commonmark@2.0.1: dependencies: decode-named-character-reference: 1.0.2 @@ -4810,6 +5746,13 @@ snapshots: braces: 3.0.3 picomatch: 2.3.1 + mlly@1.8.0: + dependencies: + acorn: 8.15.0 + pathe: 2.0.3 + pkg-types: 1.3.1 + ufo: 1.6.1 + mrmime@2.0.0: {} ms@2.1.2: {} @@ -4875,6 +5818,8 @@ snapshots: p-try@2.2.0: {} + package-manager-detector@1.3.0: {} + pagefind@1.3.0: optionalDependencies: '@pagefind/darwin-arm64': 1.3.0 @@ -4917,8 +5862,12 @@ snapshots: path-browserify@1.0.1: {} + path-data-parser@0.1.0: {} + path-exists@4.0.0: {} + pathe@2.0.3: {} + picocolors@1.0.1: {} picocolors@1.1.1: {} @@ -4933,6 +5882,25 @@ snapshots: dependencies: find-up: 4.1.0 + pkg-types@1.3.1: + dependencies: + confbox: 0.1.8 + mlly: 1.8.0 + pathe: 2.0.3 + + pkg-types@2.3.0: + dependencies: + confbox: 0.2.2 + exsolve: 1.0.7 + pathe: 2.0.3 + + points-on-curve@0.2.0: {} + + points-on-path@0.2.1: + dependencies: + path-data-parser: 0.1.0 + points-on-curve: 0.2.0 + postcss-nested@6.2.0(postcss@8.4.41): dependencies: postcss: 8.4.41 @@ -4973,6 +5941,8 @@ snapshots: property-information@6.5.0: {} + quansync@0.2.11: {} + queue-microtask@1.2.3: {} radix3@1.1.2: {} @@ -5201,6 +6171,8 @@ snapshots: reusify@1.0.4: {} + robust-predicates@3.0.2: {} + rollup@4.34.7: dependencies: '@types/estree': 1.0.6 @@ -5226,10 +6198,21 @@ snapshots: '@rollup/rollup-win32-x64-msvc': 4.34.7 fsevents: 2.3.3 + roughjs@4.6.6: + dependencies: + hachure-fill: 0.5.2 + path-data-parser: 0.1.0 + points-on-curve: 0.2.0 + points-on-path: 0.2.1 + run-parallel@1.2.0: dependencies: queue-microtask: 1.2.3 + rw@1.3.3: {} + + safer-buffer@2.1.2: {} + sax@1.4.1: {} semver@7.6.3: {} @@ -5337,8 +6320,12 @@ snapshots: dependencies: inline-style-parser: 0.2.3 + stylis@4.3.6: {} + tinyexec@0.3.2: {} + tinyexec@1.0.1: {} + tinyglobby@0.2.10: dependencies: fdir: 6.4.2(picomatch@4.0.2) @@ -5354,6 +6341,8 @@ snapshots: trough@2.2.0: {} + ts-dedent@2.2.0: {} + tsconfck@3.1.5(typescript@5.7.3): optionalDependencies: typescript: 5.7.3 @@ -5373,6 +6362,8 @@ snapshots: ufo@1.5.4: {} + ufo@1.6.1: {} + ultrahtml@1.5.3: {} uncrypto@0.1.3: {} @@ -5446,6 +6437,8 @@ snapshots: util-deprecate@1.0.2: {} + uuid@11.1.0: {} + vfile-location@5.0.3: dependencies: '@types/unist': 3.0.3 diff --git a/src/components/navigation.ts b/src/components/navigation.ts index 8eb2d8d..921b02b 100644 --- a/src/components/navigation.ts +++ b/src/components/navigation.ts @@ -7,7 +7,7 @@ export const navigation = [ link: "/about/mission", }, { - label: "Sustainability", + label: "Environmental Impact Commitment", link: "/about/sustainability", }, { @@ -19,11 +19,11 @@ export const navigation = [ link: "/about/donate", }, { - label: "Contact", + label: "Contact Policy", link: "/about/contact", }, { - label: "Mentorship", + label: "Mentorship Programme Terms and Conditions", link: "/about/mentorship", }, ], @@ -31,6 +31,10 @@ export const navigation = [ { label: "Legal Information", items: [ + { + label: "Limitation of Liability and Indemnification Policy", + link: "/legal/liability", + }, { label: "Terms of Service", link: "/legal/terms", @@ -40,23 +44,39 @@ export const navigation = [ link: "/legal/privacy", }, { - label: "Software License", + label: "Naomi's Public License", link: "/legal/license", }, + { + label: "Acceptable Use Policy", + link: "/legal/aup", + }, { label: "Security Policy", link: "/legal/security", }, { - label: "DMCA and Copyright", + label: "Service Level Agreement and Warranty Disclaimer", + link: "/legal/sla", + }, + { + label: "Content and Moderation Policy", + link: "/legal/content-moderation", + }, + { + label: "DMCA and Intellectual Property Compliance Policy", link: "/legal/dmca", }, { - label: "Subprocessors List", + label: "Data Subprocessors", link: "/legal/subprocessors", }, { - label: "Government Actions", + label: "Export Control and Sanctions Compliance Policy", + link: "/legal/export-control", + }, + { + label: "Government Actions and Compliance", link: "/legal/government", }, ], @@ -65,17 +85,29 @@ export const navigation = [ label: "Community Policies", items: [ { - label: "Code of Conduct", + label: "Community Code of Conduct", link: "/community/coc", }, { - label: "Community Guidelines", + label: "Community Guidelines and Best Practices", link: "/community/guide", }, { - label: "Appeal a Sanction", + label: "Community Leadership and Governance Policy", + link: "/community/leadership", + }, + { + label: "Community Recognition and Appreciation Policy", + link: "/community/recognition", + }, + { + label: "Community Disciplinary Appeals Policy", link: "/community/appeal", }, + { + label: "Community Feedback and Participation Policy", + link: "/community/feedback", + }, ], }, { @@ -254,7 +286,15 @@ export const navigation = [ link: "/staff/handbook", }, { - label: "Join our Team", + label: "Volunteer Roles and Opportunities", + link: "/staff/roles", + }, + { + label: "Position Hierarchy", + link: "/staff/hierarchy", + }, + { + label: "Join Our Volunteer Team", link: "/staff/apply", }, ], diff --git a/src/content/docs/about/contact.md b/src/content/docs/about/contact.md index f43f302..7f4f8d2 100644 --- a/src/content/docs/about/contact.md +++ b/src/content/docs/about/contact.md @@ -2,6 +2,14 @@ title: Contact Policy --- +## Introduction and Legal Framework + +This Contact Policy establishes our communication standards, channels, and expectations for all interactions with our organisation. This Policy operates within our comprehensive legal and policy framework, incorporating our Terms of Service, Privacy Policy, Community Code of Conduct, and all applicable legal protections by reference. + +**IMPORTANT: All communications are subject to our Limitation of Liability and Indemnification Policy, Community Code of Conduct, and applicable legal frameworks. By engaging in communication with us, you acknowledge and agree to comply with all relevant policies.** + +--- + :::tip We maintain a full list of all officially-owned social media accounts. You can view those accounts at https://cdn.nhcarrigan.com/socials.txt. @@ -27,17 +35,17 @@ sf5ea0XB23JqTDU2e7AusUzTwc4coUGPrrOBTVJI2NSJSS/eUEiGUMhUBYOTtcbnJEnHQb Nw0sDi+8gqFLdJU6pl7NFWt8HrRKCU4g86DGO9Ym5j2MJNw3looFPjr4eNqbd0Xvnh3Hes bXTcDO+fT9vceJx/fT4ulE23GLiT5B0Pir8uVGaytKXTRLjBx9op7NrsvxYABQ2Z8Kp4Ck nTpTU75OikmKTNPltPk5sfIN5SAd0HWPAAAAB3NvY2lhbHMAAAAAAAAABnNoYTUxMgAAAh -QAAAAMcnNhLXNoYTItNTEyAAACAHLoLzpT0ArzK3eLg3bA921wrf3Pcoxye3735O7zbOOK -jRoGgdprpXg5S5IkxEW/FARGlFX4G9nr+OTduNhBLRWwxcvRCYgGk2iRMydHzaslK0tAtN -tz+uT5kxn+7Iky0oGvYhgXXYtbjV4QSyu6Og5VpDCluEj8c9mZx/y3/FEBfIdFSok9IqY1 -FyD7o20/pe/ZUnC90gR610F6uN67pp5NIuyFb1efnKVip99Ti3+zJ8QV/2YIyvcn+olRMj -CoLARgxf+VMg0B+KVnT2rbSnxarG46ttl2YUPAPMgS8/P1RlrTk9bVvx6XD08R5xEcnv7o -wS9iKxaBCHan8Wm7C5DpDmHYupQ/fj10b4ZIddf28JCPuCciHD4fvITa/ImMKTN+UqPWgO -rBNk92TAE/ByaWcfhJDmvH4wi7HWaaumrFktN7CH1XKcYcKPlzALExAj6BtHCMWyQpgiiu -VmS5IF/Q5nIDJ1ZOcUNlM3/joYcxXbMa5ZutRvJMnj08wLDweI6I6Q3S8gqY/nTRSwFfjV -93VEI5Yso5mCZp16+vCegn90NlQ6jCPxc1HdytQFpcjPuQbMLdzxQpZ1WE62SoVhzVuLTn -YpQLFsegssSDM/A1z54dgN9HI8lRNW8cxXXLKSIjDTYnk3W5dUaqW/JCttPmDcUd16YT8r -JPPjuDt7Fb +QAAAAMcnNhLXNoYTItNTEyAAACAMFX4E0UKi1FsLzX02G7hgs/nuShGl5Le57bTZSb9IPM +HgdwNsSr5LPq08jlMElt1DNRq6U2CLBa6tHkxRATzOE1qlKcfjzJqKddLpRBwkLLq+iGO1 +cPyp+TNrNBURrzslOxwpphTSrF/ehhQ0vc+IXYytqDD7cZnLD3NjGhYfvwWGmvkVI4fS6P +VycaE4+1/8XxviwCPb+q44HPUUzOvCUtQBb0Y6w/7WCIfQWjpetkpGQrLdUFFWTnb5kq/9 +nSNUH/0qQfjHMV+wz9MO9yY1oskvJ8P9cCKZ4/6sJK/d5NPZ76KO4eOwiFvGKNBFmZ0SwF +hNVMgZf9Sem3HtylOFsYFIwD6caRz8uRZ3VqiqQhpvCcrEdG9Ezna9362EJsVE1GUwiIMG +nZMY6gjdQeezJpC3BGsCMCI6dF3pq6XlQ0Qrmmo9dTHW+ACdUBnBicG9Qpi+6ctBYGSHVx +EUcT6R+7JzdsFisMFdDztLEfSoECnxmqDOVia6yg9KkRPio2DISkaBU0ZGBBsKTNeWHY2U +NP9XfAtfiGVe60t9ojoZiY8w9mAX//l+7L6EYgivm0MJWstSsilb/+3hqD3pywhrd/zF6b +LK7eSS34bl3DiFPQq0IBtzK4vAgpnRRg3OzzUWYKwV5OeF9WP9kyC4ZoPFVWYMEqbGXYcK +lSoyLtKhg+ -----END SSH SIGNATURE----- ``` @@ -125,7 +133,7 @@ Our code repositories are all self-hosted. You will need to request an account v ### 3.1 Announcements Page -We have a dedicated forum category where we post all of our organisational updates. +We have a dedicated page where we post all of our organisational updates. - URL: https://hikari.nhcarrigan.com/announcements - Nature: You can reply to announcement threads to discuss the announcement. @@ -196,75 +204,11 @@ If you're interested in having us speak at your event or contribute to your publ We regularly update our professional profiles with new projects, skills, and achievements. Follow us on these platforms to stay informed about our professional journey and potential opportunities for collaboration. -## 5. One-on-One Sessions - -We offer personalized, one-on-one sessions to cater to various needs, from casual conversations to in-depth consultations. Book your session through our Topmate profile. - -### 5.1 Coffee Chat - $50 - -A casual, informal conversation to connect and share ideas. - -- Duration: 15 minutes -- Purpose: - - Get to know Naomi - - Discuss general topics in tech - - Share experiences and insights -- Best for: - - Students looking for career advice - - Professionals seeking to expand their network - - Anyone interested in a friendly chat about tech and open source - -### 5.2 Consulting Session - $100 - -A focused, one-on-one session to discuss potential new projects and align our services with your needs. - -- Duration: 30 minutes -- Purpose: - - Explore your project requirements in detail - - Discuss how our services can meet your needs - - Provide estimated quotes for the proposed work -- Best for: - - Developers stuck on a particular problem - - Project managers seeking technical guidance - - Startups needing expert input on their tech stack - -### 5.3 Mentorship Session - $200 - -An in-depth, personalized session focused on long-term professional growth and skill development. - -- Duration: 1 hour -- Purpose: - - Provide career guidance and development strategies - - Offer personalized learning plans and resources - - Review and provide feedback on code or projects -- Best for: - - Early-career developers seeking guidance - - Professionals looking to transition into tech - - Anyone seeking structured, long-term professional development - -### 5.4 How to Book a Session: - -- Complete the [meeting request form](https://forms.nhcarrigan.com/form/uUKZiJSDm6847iDOlpZkD5QF7cAjoTbTm0F4T0EdW0I) -- Wait for an email to schedule a time - -### 5.5 Preparing for Your Session: - -- Coffee Chat: Come with topics you'd like to discuss or questions about the industry -- Consulting: Prepare a clear description of your problem or project, and any relevant code or documentation -- Mentorship: Outline your career goals and areas where you'd like to improve - -### 5.6 Additional Information: - -- All sessions are conducted virtually via a video call in our Discord server. -- Rescheduling is possible with at least 24 hours notice - -For any questions about these sessions or to discuss a different type of engagement, please reach out through our preferred contact methods listed in previous sections. - -## 6. Email Communication +## 5. Email Communication We offer several email addresses for specific types of inquiries. Please use the appropriate email address to ensure your message reaches the right team and receives the most efficient response. -### 6.1 General Inquiries +### 5.1 General Inquiries - Email: contact@nhcarrigan.com - Use for: @@ -273,7 +217,7 @@ We offer several email addresses for specific types of inquiries. Please use the - Media or press inquiries - Any queries that don't fit other categories -### 6.2 Billing and Financial Matters +### 5.2 Billing and Financial Matters - Email: billing@nhcarrigan.com - Use for: @@ -282,7 +226,7 @@ We offer several email addresses for specific types of inquiries. Please use the - Refund requests - Updating billing information -### 6.3 Technical Support +### 5.3 Technical Support - Email: support@nhcarrigan.com - Use for: @@ -290,7 +234,7 @@ We offer several email addresses for specific types of inquiries. Please use the - Reporting bugs or technical issues - Documentation clarifications -### 6.4 Privacy Concerns +### 5.4 Privacy Concerns - Email: privacy@nhcarrigan.com - Use for: @@ -299,7 +243,7 @@ We offer several email addresses for specific types of inquiries. Please use the - Reporting potential privacy breaches - Opting out of data collection (where applicable) -### 6.5 Security Matters +### 5.5 Security Matters - Email: security@nhcarrigan.com - Use for: @@ -307,7 +251,7 @@ We offer several email addresses for specific types of inquiries. Please use the - Questions about our security practices - Concerns about potential security breaches -### 6.6 Legal Inquiries +### 5.6 Legal Inquiries - Email: legal@nhcarrigan.com - Use for: @@ -316,7 +260,7 @@ We offer several email addresses for specific types of inquiries. Please use the - Requests for legal documentation - Formal notices or communications -### 6.7 Feedback and Suggestions +### 5.7 Feedback and Suggestions - Email: feedback@nhcarrigan.com - Use for: @@ -325,7 +269,7 @@ We offer several email addresses for specific types of inquiries. Please use the - Sharing your experience with our services - Offering ideas for future developments -### 6.8 Press/Media Inquiries +### 5.8 Press/Media Inquiries - Email: press@nhcarrigan.com - Use for: @@ -333,7 +277,7 @@ We offer several email addresses for specific types of inquiries. Please use the - Scheduling interviews for your media outlet - Attribution requests in academic articles -### 6.9 Event Requests +### 5.9 Event Requests - Email: events@nhcarrigan.com - Use for: @@ -342,7 +286,7 @@ We offer several email addresses for specific types of inquiries. Please use the - Workshop or training session requests - Event sponsorship inquiries -### 6.10 Marketing Inquiries +### 5.10 Marketing Inquiries - Email: marketing@nhcarrigan.com - Use for: @@ -351,7 +295,7 @@ We offer several email addresses for specific types of inquiries. Please use the - Advertising inquiries - Content licensing requests -### 6.11 Career Information +### 5.11 Career Information - Email: careers@nhcarrigan.com - Use for: @@ -360,7 +304,7 @@ We offer several email addresses for specific types of inquiries. Please use the - Inquiries - Following up on job applications -### 6.12 Partnerships +### 5.12 Partnerships - Email: partners@nhcarrigan.com - Use for: @@ -369,7 +313,7 @@ We offer several email addresses for specific types of inquiries. Please use the - Brand ambassador programmes - Product placement or sponsored content inquiries -### 6.13 Email Communication Guidelines +### 5.13 Email Communication Guidelines - Subject Line: Please use a clear, concise subject line that summarizes your inquiry. - Content: Provide all relevant details in your initial email to expedite the response process. @@ -377,22 +321,25 @@ We offer several email addresses for specific types of inquiries. Please use the - Response Time: We aim to respond to all emails within 2 business days. Complex inquiries may require additional time. - Follow-ups: If you haven't received a response after 3 business days, feel free to send a polite follow-up. -### 6.14 Email Privacy and Security +### 5.14 Email Privacy and Security -All email communications are treated as confidential. +**Reference to Comprehensive Privacy Framework**: Detailed privacy protections, data handling procedures, and security measures are set forth in our Privacy Policy, which is incorporated herein by reference. -We do not share your email address or the content of your messages with third parties unless: +All email communications are treated as confidential and subject to our comprehensive privacy protections. -- Required by law; OR -- As part of a public warning related to a violation of our Code of Conduct +We do not share your email address or the content of your messages with third parties except as outlined in our Privacy Policy, including: -### 6.15 Spam and Unsolicited Emails +- When required by law or legal process +- As part of public safety measures related to Code of Conduct violations +- As necessary for service provision and technical operations + +### 5.15 Spam and Unsolicited Emails We have a strict no-spam policy. If you receive any unsolicited emails claiming to be from us, please report them to security@nhcarrigan.com. By using the appropriate email address for your inquiry, you help us provide you with the most efficient and accurate response possible. If you're unsure which email to use, feel free to send your inquiry to contact@nhcarrigan.com, and we'll direct it to the appropriate team. -### 6.16 Acceptable Use and Consequences +### 5.16 Acceptable Use and Consequences We are committed to maintaining a respectful and productive communication environment. To ensure this: @@ -411,13 +358,13 @@ We reserve the right to report serious abuses to relevant authorities if necessa By communicating with us via email, you agree to adhere to these guidelines and understand the consequences of misuse. -## 7. Direct Messages +## 6. Direct Messages -### 7.1 Direct Message Policy +### 6.1 Direct Message Policy We offer direct messaging as a private, personalized communication channel. However, to manage our time effectively and ensure the highest quality of service, direct messages are the lowest priority of communication. Instead, we strongly encourage you to reach out via our Discord community. -### 7.2 Purpose and Use +### 6.2 Purpose and Use Direct messages should be used for: @@ -425,17 +372,17 @@ Direct messages should be used for: - Sensitive information that shouldn't be shared publicly - Personalized support or consultation requests -### 7.4 Response Time +### 6.3 Response Time - We aim to respond to direct messages within 5-7 business days. - Complex inquiries may require additional time, which will be communicated to you. -### 7.5 Appropriate Use +### 6.4 Appropriate Use - Direct messages should be used responsibly and for legitimate purposes only. - Abusive, harassing, or spam messages will not be tolerated and may result in blocking or reporting to the platform. -### 7.6 Alternatives +### 6.5 Alternatives We encourage users to consider the following alternatives before sending a direct message: @@ -443,7 +390,7 @@ We encourage users to consider the following alternatives before sending a direc - Check our FAQ or documentation for commonly asked questions - Post in our community forums for non-urgent matters -### 7.8 Consent and Acknowledgment +### 6.7 Consent and Acknowledgment By sending a direct message, you acknowledge that you have read and agreed to this policy. diff --git a/src/content/docs/about/mentorship.md b/src/content/docs/about/mentorship.md index 9ed1407..914465a 100644 --- a/src/content/docs/about/mentorship.md +++ b/src/content/docs/about/mentorship.md @@ -2,7 +2,7 @@ title: Mentorship Programme Terms and Conditions --- -Here at NHCarrigan, we are dedicated to lowering the barriers of entry into tech and helping underprivileged/under-represented classes reach their goals. As part of this mission, we offer a mentorship programme ("Programme"). +Here at NHCarrigan, we are dedicated to lowering the barriers of entry into tech and helping underprivileged/under-represented classes reach their goals. As part of this mission, we offer a mentorship programme ("Programme"). This Programme operates within our comprehensive legal and policy framework, incorporating our Terms of Service, Community Policies, and all applicable legal protections by reference. ## 1. Introduction @@ -18,7 +18,7 @@ Upon successful enrolment, the Mentee receives the following benefits: ### 2.1 Dedicated Discord Channels -Participants will have access to private Discord channels exclusively for Mentees. These channels get priority response times from the NHCarrigan team. All participants must adhere to our [Code of Conduct](https://docs.nhcarrigan.com/community/coc/). +Participants will have access to private Discord channels exclusively for Mentees. These channels get priority response times from the NHCarrigan team. All participants must adhere to our [Code of Conduct](/community/coc). ### 2.3 Group Meetings @@ -38,7 +38,7 @@ Mentees will receive continuous resume reviews, personalized learning roadmaps, ## 3. Code of Conduct -Participants agree to uphold the Company’s Code of Conduct and other policies, as outlined in the [NHCarrigan Documentation](https://docs.nhcarrigan.com/commnuity/coc.md). +Participants agree to uphold the Company's Code of Conduct and other policies, as outlined in the [NHCarrigan Documentation](https://docs.nhcarrigan.com/community/coc). ## 4 Programme Modifications @@ -46,8 +46,8 @@ NHCarrigan reserves the right to modify Programme features, benefits, and terms ## 5. Termination and Cancellation -Participants may cancel their membership at any time, by providing written notice to our team indicating their desire to drop-out and the reason for leaving.. +Participants may cancel their membership at any time, by providing written notice to our team indicating their desire to drop-out and the reason for leaving. ## 6. Contact Information -For questions or further information, please contact the NHCarrigan team through the official support channels listed in the [documentation](https://docs.nhcarrigan.com/about/contact). +For questions or further information, please contact the NHCarrigan team through the official support channels listed in the [documentation](/about/contact). diff --git a/src/content/docs/about/mission.md b/src/content/docs/about/mission.md index a61af42..91a8904 100644 --- a/src/content/docs/about/mission.md +++ b/src/content/docs/about/mission.md @@ -2,7 +2,7 @@ title: Mission Statement --- -This Mission Statement ("Statement") articulates the core values and guiding principles of NHCarrigan ("The Company") in its efforts to build inclusive, ethical, and sustainable technology solutions. +This Mission Statement ("Statement") articulates the core values and guiding principles of NHCarrigan ("The Company") in its efforts to build inclusive, ethical, and sustainable technology solutions and foster welcoming online communities. This Statement operates within our comprehensive legal and policy framework, incorporating our Terms of Service, Community Policies, and all applicable legal protections by reference. ## 1. Core Values @@ -22,9 +22,9 @@ The Company adheres to a strict ethical code that guides our technological devel We are dedicated to maintaining transparency with our stakeholders, whether clients, users, or community members. Clear communication and honesty are at the forefront of our interactions and decision-making. -### 1.5. Community-Driven Innovation +### 1.5. Community-Driven Innovation and Democratic Governance -Our projects are community-centric, encouraging collaboration and input from diverse voices. We believe in technology as a tool to uplift, empower, and serve communities through innovative solutions that address real-world challenges. +Our projects are community-centric, encouraging collaboration and input from diverse voices through democratic participation and transparent governance structures. We believe in technology as a tool to uplift, empower, and serve communities through innovative solutions that address real-world challenges, supported by comprehensive community leadership frameworks and participatory decision-making processes. ### 1.6. Breaking Down Barriers in Tech @@ -34,9 +34,9 @@ The Company is committed to tearing down the systemic and social barriers that e We recognize that toxic behaviors and exclusionary practices harm communities. The Company shall take a proactive stance in challenging these behaviors within our industry and within the tech communities we interact with, fostering spaces where collaboration, respect, and growth thrive. -### 1.8. Mentorship and Support for New Developers +### 1.8. Comprehensive Community Support and Member Welfare -The Company is dedicated to providing mentorship and support to new developers, particularly those from underrepresented groups. Through guided mentorship, educational resources, and hands-on support, we help individuals break into the industry, equipping them with the skills and confidence to succeed. +The Company is dedicated to providing comprehensive support systems for community members, including mentorship for new developers, recognition and appreciation programs, and robust member welfare frameworks. Through guided mentorship, educational resources, crisis response systems, and hands-on support, we help individuals thrive within our communities and succeed in the tech industry, particularly focusing on support for underrepresented groups. ## 2. Strategic Goals diff --git a/src/content/docs/about/sustainability.md b/src/content/docs/about/sustainability.md index e66141b..4d16379 100644 --- a/src/content/docs/about/sustainability.md +++ b/src/content/docs/about/sustainability.md @@ -2,7 +2,7 @@ title: Environmental Impact Commitment --- -This Environmental Impact Commitment ("Commitment") outlines the principles and obligations that [Company Name] upholds to minimize its environmental impact and contribute to global sustainability efforts. +This Environmental Impact Commitment ("Commitment") outlines the principles and obligations that NHCarrigan ("The Company") upholds to minimize its environmental impact and contribute to global sustainability efforts. This Commitment operates within our comprehensive legal and policy framework, incorporating our Terms of Service, Mission Statement, and all applicable legal protections by reference. ## 1. Definitions @@ -74,12 +74,16 @@ The Company shall ensure that all its operations, projects, and partnerships com Beyond legal compliance, the Company acknowledges its ethical responsibility to proactively mitigate environmental harm and contribute to a sustainable future. -## 6. Amendments and Updates +## 6. Legal Framework Integration and Amendments -### 6.1. Right to Amend +### 6.1. Policy Integration -The Company reserves the right to amend this Commitment as necessary to reflect evolving best practices and environmental standards. +**IMPORTANT: This Environmental Impact Commitment is integrated with and subject to our comprehensive legal and policy framework, including warranty disclaimers and liability limitations set forth in our Limitation of Liability and Indemnification Policy, which is incorporated herein by reference.** -### 6.2. Notification of Changes +### 6.2. Right to Amend -Significant amendments to this Commitment will be communicated through the Company’s official channels. +The Company reserves the right to amend this Commitment as necessary to reflect evolving best practices, environmental standards, and legal requirements. + +### 6.3. Notification of Changes + +Significant amendments to this Commitment will be communicated through the Company's official channels in accordance with our standard policy update procedures. diff --git a/src/content/docs/community/appeal.md b/src/content/docs/community/appeal.md index ce601c5..8cd95cc 100644 --- a/src/content/docs/community/appeal.md +++ b/src/content/docs/community/appeal.md @@ -1,38 +1,202 @@ --- -title: Appealing a Sanction +title: Community Disciplinary Appeals Policy --- -Our moderators exercise careful discretion when implementing disciplinary measures (including but not limited to temporary suspensions, permanent bans, or other access restrictions). However, we acknowledge that misunderstandings or errors may occasionally occur. +## 1. Preamble and Purpose -If you believe you have been unjustly restricted from participating in our community, you may initiate our formal appeal process as outlined below. +### 1.1 Introduction -:::caution[Warning!] -Submitting multiple appeals for the same sanction will result in our appeals team automatically denying your request. +This Community Disciplinary Appeals Policy (hereinafter referred to as "the Policy") establishes the formal procedures and requirements for appealing disciplinary sanctions imposed by our moderation team. Whilst our Community Leaders exercise careful discretion and professional judgement when implementing disciplinary measures, we acknowledge that human error or misunderstandings may occasionally occur within any moderation system. + +### 1.2 Purpose and Scope + +This Policy serves to: +- Provide a fair and transparent mechanism for reviewing disciplinary decisions +- Ensure adherence to principles of natural justice and procedural fairness +- Maintain the integrity of our community standards whilst protecting individual rights +- Establish clear procedures for both appellants and review panels + +### 1.3 Right of Appeal + +Every community member who receives a disciplinary sanction has the fundamental right to appeal such decision through the procedures outlined herein, subject to the conditions and limitations specified in this Policy. + +## 2. Definitions and Interpretation + +### 2.1 Key Definitions + +For the purposes of this Policy: +- **"Appellant"** means any individual seeking to appeal a disciplinary sanction +- **"Disciplinary Sanction"** means any punitive measure imposed, including but not limited to warnings, temporary suspensions, permanent bans, or access restrictions +- **"Appeals Panel"** means the designated authority responsible for reviewing appeals +- **"Original Decision"** means the initial disciplinary action being appealed +- **"Community Leaders"** means moderators, administrators, and other authorised personnel + +### 2.2 Interpretation + +This Policy shall be interpreted in accordance with principles of fairness, natural justice, and the overarching objectives of maintaining community safety and standards. + +## 3. Grounds for Appeal + +### 3.1 Acceptable Grounds + +Appeals may be submitted on the following grounds: +1. **Procedural Irregularity**: The disciplinary process was not followed correctly +2. **Disproportionate Sanction**: The penalty imposed was excessive relative to the violation +3. **Factual Error**: Material facts were incorrectly assessed or considered +4. **New Evidence**: Relevant evidence has become available that was not considered in the original decision +5. **Misinterpretation of Policy**: The community guidelines or terms of service were incorrectly applied + +### 3.2 Inadmissible Appeals + +Appeals will not be considered on the following grounds: +1. General disagreement with community policies or guidelines +2. Claims that rules are unfair or unreasonable +3. Arguments that other members engaged in similar conduct without sanction +4. Emotional distress or inconvenience caused by the sanction + +## 4. Pre-Appeal Requirements + +### 4.1 Mandatory Preparation + +Prior to submitting an appeal, appellants must complete the following preparatory steps: + +1. **Policy Review**: Conduct a thorough review and demonstrate understanding of: + - Community Guidelines and Code of Conduct + - Terms of Service + - This Appeals Policy + +2. **Sanction Verification**: Access and review the specific details of the imposed sanction via our [sanctions database](https://hikari.nhcarrigan.com/sanctions) + +3. **Self-Assessment**: Complete a comprehensive self-assessment of the circumstances leading to the sanction + +### 4.2 Required Documentation + +Appeals must include the following information: +1. **Identity Verification**: Full account details and contact information +2. **Sanction Details**: Complete description of the disciplinary action being appealed +3. **Grounds Statement**: Clear identification of the specific grounds for appeal as outlined in Section 3.1 +4. **Evidence Portfolio**: All relevant documentation, screenshots, or other evidence supporting the appeal +5. **Commitment Declaration**: Written commitment to adhere to all community standards and policies +6. **Contribution Statement**: Detailed explanation of intended positive contributions to the community upon reinstatement + +## 5. Appeal Submission Procedures + +### 5.1 Formal Submission Process + +Appeals must be submitted through our official appeals portal: [Community Appeals Form](https://forms.nhcarrigan.com/form/l3PC15yalSWjdZASTQvGo22q_uj_7OtXAhZdcW35ev8) + +### 5.2 Submission Requirements + +All appeals must: +- Be submitted within thirty (30) days of the original sanction +- Include all required documentation as specified in Section 4.2 +- Be written in clear, professional language +- Demonstrate good faith engagement with the appeals process + +### 5.3 Multiple Appeal Prohibition + +:::caution[Critical Warning] +Submitting multiple appeals for the same disciplinary sanction will result in automatic dismissal of all subsequent appeals and may constitute abuse of process, potentially leading to additional sanctions. ::: -## 1. Preparing Your Appeal +## 6. Review Process and Procedures -Prior to submitting an appeal, please ensure you have the following information ready: +### 6.1 Initial Review -1. Confirmation that you have thoroughly reviewed and understood our Community Guidelines and Terms of Service. -2. An explicit statement of your commitment to adhere to all applicable rules and policies. -3. Your understanding of the specific sanction levied against you and the alleged violation(s) cited. -4. A clear and concise explanation of why you believe the moderation decision was erroneous or disproportionate. -5. A statement detailing your motivations for seeking reinstatement and the potential positive contributions you intend to make to our community. +Upon receipt, all appeals undergo an initial administrative review to ensure: +- Compliance with submission requirements +- Timeliness of submission +- Completeness of documentation +- Identification of appropriate grounds for appeal -Please note that incomplete or inadequately prepared appeals may be summarily dismissed. You can [find your sanction](https://hikari.nhcarrigan.com/sanctions) to review. +### 6.2 Substantive Review -## 2. Appeal Submission Process +Appeals meeting initial requirements proceed to substantive review, wherein the Appeals Panel shall: +1. Examine all evidence and documentation +2. Review the original decision and its rationale +3. Consider the appellant's submissions and arguments +4. Assess whether the appeal has merit under the established grounds -To submit your appeal, please complete the form available at the following link: +### 6.3 Review Timeline -[Submit a Sanction Appeal](https://forms.nhcarrigan.com/form/l3PC15yalSWjdZASTQvGo22q_uj_7OtXAhZdcW35ev8) +The Appeals Panel endeavours to complete reviews within fourteen (14) business days of receipt, though complex cases may require additional time. -## 3. Important Disclaimers +## 7. Possible Outcomes and Decisions -- Submission of an appeal does not guarantee its approval. -- The decision of the appeals review panel is final and binding. -- We reserve the right to deny or revoke access to our services at any time, for any reason, at our sole discretion. -- Repeated violations or abuse of the appeals process may result in permanent ineligibility for reinstatement. +### 7.1 Appeal Outcomes -By submitting an appeal, you acknowledge that you have read, understood, and agree to abide by the terms outlined in this document. +Following review, the Appeals Panel may: +1. **Uphold the Appeal**: Overturn the original sanction entirely +2. **Partially Uphold the Appeal**: Reduce the severity of the original sanction +3. **Dismiss the Appeal**: Confirm the original sanction remains in full effect +4. **Remit for Reconsideration**: Return the matter for fresh consideration with specific directions + +### 7.2 Decision Communication + +All appeal decisions shall be communicated in writing to the appellant, including: +- The outcome of the appeal +- Detailed reasoning for the decision +- Any conditions or requirements for reinstatement +- Information regarding the finality of the decision + +## 8. Finality and Limitations + +### 8.1 Decision Finality + +Decisions of the Appeals Panel are final and binding. No further appeals or reviews are available through our internal processes. + +### 8.2 Discretionary Rights Reserved + +Notwithstanding this appeals process, we reserve the absolute right to: +- Deny or revoke access to our services at any time +- Modify community standards and policies +- Take additional action based on new information or circumstances +- Refuse service to any individual at our sole discretion + +### 8.3 Abuse of Process + +Repeated abuse of the appeals process, including but not limited to: +- Submitting frivolous or vexatious appeals +- Providing false or misleading information +- Harassment of Appeals Panel members +- Multiple appeals for the same sanction + +May result in permanent ineligibility for future appeals and additional disciplinary sanctions. + +## 9. Compliance and Acknowledgement + +### 9.1 Terms Acceptance + +By submitting an appeal through this process, appellants explicitly acknowledge that they have: +- Read and understood this Appeals Policy in its entirety +- Reviewed and understand all applicable community standards and policies +- Agreed to accept the decision of the Appeals Panel as final and binding +- Committed to full compliance with all community standards upon any reinstatement + +### 9.2 Legal Framework Integration + +This appeals process operates within our comprehensive legal and policy framework, including: + +**(a)** **Terms of Service**: Fundamental legal relationship and user obligations; + +**(b)** **Limitation of Liability and Indemnification Policy**: Legal protections and risk allocation; + +**(c)** **Content and Moderation Policy**: Enforcement procedures and standards; + +**(d)** **All applicable policies**: Privacy, acceptable use, and specialized policies incorporated by reference. + +**IMPORTANT**: This appeals process is provided as an internal community service and does not create any legal rights or obligations beyond those established in our comprehensive legal policies. The availability of this process does not limit our right to take any action deemed necessary for community safety and integrity. + +## 10. Policy Updates and Amendments + +### 10.1 Amendment Rights + +This Policy may be updated, modified, or amended at any time without prior notice. Appellants are responsible for ensuring familiarity with the current version of this Policy. + +### 10.2 Effective Date + +This Policy is effective immediately upon publication and applies to all appeals submitted after its implementation. + +--- + +*This Community Disciplinary Appeals Policy was last updated on 15 September 2025 and supersedes all previous versions.* diff --git a/src/content/docs/community/coc.md b/src/content/docs/community/coc.md index dc31140..9471853 100644 --- a/src/content/docs/community/coc.md +++ b/src/content/docs/community/coc.md @@ -1,495 +1,654 @@ --- -title: Code of Conduct +title: Community Code of Conduct --- -## 1. Definitions +## 1. Preamble and Foundational Principles -### 1.1. "Our Community" +### 1.1 Introduction and Purpose -Encompasses all platforms and spaces, both digital and physical, where members interact under our organization's auspices. This includes, but is not limited to: +This Community Code of Conduct (hereinafter referred to as "the Code") establishes the fundamental standards of behaviour and conduct expected from all individuals participating in our community ecosystem. This Code serves as the cornerstone of our commitment to fostering an inclusive, safe, and productive environment wherein all members can participate meaningfully and contribute positively to our collective objectives. -- Our official Discord server -- Our code repositories and associated accounts -- Our official social media accounts and pages -- Any other online forums or platforms we officially endorse or manage -- In-person events organized or sponsored by our organization +### 1.2 Fundamental Values -### 1.2. "Community Members" +Our community is built upon the following core principles: +- **Respect and Dignity**: Every individual deserves to be treated with courtesy, respect, and human dignity +- **Inclusivity and Diversity**: We celebrate and actively promote diversity in all its forms whilst ensuring equal participation opportunities +- **Safety and Well-being**: The physical, emotional, and psychological safety of our community members is paramount +- **Constructive Collaboration**: We encourage productive dialogue, constructive criticism, and collaborative problem-solving +- **Transparency and Accountability**: We operate with openness, honesty, and accept responsibility for our actions and decisions -Refers to all individuals who participate in Our Community, regardless of their role or level of engagement. This includes casual users, regular contributors, and community leaders. +### 1.3 Legal Framework and Policy Integration -### 1.3. "Community Leaders" +This Code operates within and supplements our comprehensive legal and policy framework, including: -Refers to individuals with official responsibilities within Our Community, including but not limited to: +**(a)** **Terms of Service**: Fundamental legal relationship and user obligations; -- Moderators -- Developers -- Support staff -- Administrators -- Project managers -- Event organizers +**(b)** **Acceptable Use Policy**: Detailed prohibited activities and usage restrictions; -### 1.4. "Code of Conduct" or "CoC" +**(c)** **Content and Moderation Policy**: Comprehensive content standards and moderation procedures; -Refers to this document in its entirety, including all sections, subsections, and any future amendments. +**(d)** **Privacy Policy**: Data protection and privacy rights; -### 1.5. "Violating the Code of Conduct" +**(e)** **Limitation of Liability and Indemnification Policy**: Legal protections and risk allocation; -Means engaging in behavior that contradicts the guidelines, rules, and principles outlined in this document. +**(f)** **All other applicable legal policies**: Export control, service level agreements, and specialized policies. -### 1.6. "Reporting" +**IMPORTANT**: Where this Code overlaps with our comprehensive legal policies, users are subject to both sets of requirements. For detailed enforcement procedures, content moderation standards, and legal protections, refer to the applicable specialized policies incorporated by reference. -Refers to the act of bringing a potential Code of Conduct violation to the attention of Community Leaders through officially designated channels. +## 2. Definitions and Scope of Application -### 1.7. "Sanctions" +### 2.1 Comprehensive Definitions -Refers to the consequences imposed on community members who violate the Code of Conduct, as determined by Community Leaders. +For the purposes of this Code, the following definitions shall apply: -### 1.8. "Platforms" +#### 2.1.1 Community Ecosystem +**"Our Community"** encompasses all platforms, spaces, and environments, whether digital, physical, or hybrid, where members interact under our organisation's auspices, including but not limited to: +- Official Discord servers and communication platforms +- Code repositories, version control systems, and development platforms +- Official social media accounts, pages, and associated digital properties +- Community forums, discussion boards, and interactive platforms +- Documentation sites, wikis, and knowledge-sharing platforms +- In-person events, conferences, meetups, and organised gatherings +- Virtual events, webinars, and online presentations +- Any other platform officially endorsed, managed, or sponsored by our organisation -Refers to any digital or physical space where Our Community interacts, as listed in section 1.1. +#### 2.1.2 Community Participants +**"Community Members"** refers to all individuals who participate in Our Community, regardless of their role, level of engagement, or duration of participation, including: +- Casual users and occasional participants +- Regular contributors and active members +- Volunteer moderators and community leaders +- Development team members and technical contributors +- Administrative staff and organisational representatives +- Guest speakers, invited participants, and temporary contributors -## 2. Scope +#### 2.1.3 Leadership and Authority +**"Community Leaders"** refers to individuals vested with official responsibilities, authority, and trust within Our Community, including: +- Community moderators and content moderators +- Technical administrators and system administrators +- Developer team members and project maintainers +- Support staff and customer service representatives +- Event organisers and programme coordinators +- Senior administrators and executive leadership -### 2.1. Applicability +#### 2.1.4 Conduct and Violations +**"Code of Conduct Violation"** means any behaviour, action, or communication that contravenes the guidelines, standards, and principles outlined in this Code or its associated policies. -This Code of Conduct applies to all interactions within Our Community, including but not limited to: +**"Reporting"** refers to the formal process of bringing potential Code of Conduct violations to the attention of Community Leaders through officially designated channels and procedures. -- Public channels and forums -- Private channels and direct messages -- Online and offline community spaces -- Community-organized events and meetups -- Any form of communication using our official platforms or branding +**"Disciplinary Sanctions"** means the consequences, penalties, or corrective measures imposed upon community members who violate this Code, as determined by Community Leaders in accordance with established procedures. -### 2.2. Extended Scope +### 2.2 Territorial and Temporal Scope -The Code of Conduct may also apply to interactions outside Our Community when: +#### 2.2.1 Primary Application +This Code applies directly and immediately to all interactions, communications, and behaviours occurring within Our Community spaces, including: +- Public channels, forums, and discussion areas +- Private channels, direct messages, and personal communications conducted through community platforms +- Online and offline community-organised events and activities +- Any communication using official community branding, accounts, or platforms -- A Community Member is involved in an incident affecting another Community Member -- The incident has a substantial impact on the well-being or participation of Community Members -- The behavior significantly affects the reputation or integrity of Our Community +#### 2.2.2 Extended Application +This Code may also extend to interactions and behaviours occurring outside Our Community spaces when such conduct: +- Involves multiple Community Members in a manner that affects community relationships or dynamics +- Has a substantial, demonstrable impact on the well-being, safety, or participation of Community Members +- Significantly affects the reputation, integrity, or safety of Our Community or its members +- Constitutes harassment, threats, or other harmful behaviour directed at Community Members -### 2.3. Temporal Scope +#### 2.2.3 Temporal Considerations +This Code applies to: +- All current and ongoing interactions within Our Community +- Past behaviour and conduct of Community Members, including actions that occurred prior to joining Our Community +- Patterns of behaviour that may have commenced before participation in Our Community but continue to affect community dynamics -This Code of Conduct applies to: +### 2.3 Reporting Framework -- Current interactions within Our Community -- Past behavior of Community Members, including actions prior to joining Our Community -- Ongoing patterns of behavior that may have started before joining Our Community +#### 2.3.1 Reporting Obligations and Encouragement +We strongly encourage the reporting of any violations of this Code, including but not limited to: +- Harassment, discrimination, or threats directed at Community Members +- Violations committed by Community Leaders or individuals in positions of authority +- Incidents occurring outside Our Community spaces that affect community members +- Historical incidents, regardless of when they occurred +- Patterns of concerning behaviour that may not constitute individual violations but collectively create problems -### 2.4. Reporting +#### 2.3.2 Community Leader Responsibilities +Community Leaders commit to the following standards in handling reports: +- Treat all good-faith reports with seriousness, confidentiality, and respect +- Protect the privacy, safety, and security of all report submitters +- Conduct thorough, fair, and impartial investigations of reported incidents +- Take appropriate and proportionate action based on investigation findings +- Maintain transparency in processes whilst respecting individual privacy +- Document actions taken to ensure consistency and accountability -We encourage reporting of any violations of this Code of Conduct, including: +## 3. Standards of Acceptable Conduct -- Harassment by Community Members, especially Community Leaders -- Incidents that occur outside Our Community spaces -- Past incidents, regardless of when they took place +### 3.1 Positive Behaviours and Expectations -### 2.5. Commitment to Action +Community Members are expected to demonstrate the following positive behaviours: -Community Leaders commit to: +#### 3.1.1 Respectful Communication +- Use welcoming, inclusive, and professional language in all interactions +- Listen actively and engage constructively with diverse perspectives and viewpoints +- Provide constructive feedback that focuses on ideas and contributions rather than individuals +- Acknowledge mistakes promptly, apologise sincerely when appropriate, and learn from errors -- Take all good-faith reports seriously -- Respect the privacy and security of reporters -- Conduct fair and thorough investigations of reported incidents -- Take appropriate action based on the findings of investigations +#### 3.1.2 Collaborative Engagement +- Contribute positively to discussions and community activities +- Support and mentor newcomers and less experienced community members +- Share knowledge generously whilst respecting intellectual property rights +- Participate in good faith and assume positive intent from others unless proven otherwise -### 2.6. Exclusion Rights +#### 3.1.3 Professional Conduct +- Maintain appropriate boundaries between personal and professional interactions +- Respect the time, effort, and contributions of all community members +- Comply with all applicable laws, regulations, and platform-specific terms of service +- Represent Our Community positively when acting in any official or semi-official capacity -Community Leaders reserve the right to exclude individuals from Our Community based on: +### 3.2 Prohibited Conduct and Behaviours -- Violations of this Code of Conduct -- Past behavior, including actions outside Our Community spaces -- Behavior towards individuals who are not members of Our Community -- Any conduct deemed detrimental to the safety, well-being, or positive environment of Our Community +**Reference to Comprehensive Usage Policies**: Detailed prohibited activities, content restrictions, and usage guidelines are comprehensively covered in our Acceptable Use Policy and Content and Moderation Policy, which are incorporated herein by reference. -### 2.7. Scope of Authority +#### 3.2.1 Community-Specific Prohibited Conduct -While this Code of Conduct primarily governs behavior within Our Community, we recognize that actions outside our spaces can significantly impact our environment. Therefore, Community Leaders may consider external behaviors when making decisions about community participation. +In addition to all prohibitions in our comprehensive policies, the following behaviors are specifically prohibited in community interactions: -### 2.8. Amendments +**Identity and Discrimination:** +- Deliberate misgendering, deadnaming, or use of rejected names or pronouns +- Questioning, challenging, or invalidating someone's stated identity or self-identification +- Use of "reverse discrimination" concepts against marginalised community members +- Debating the fundamental rights or validity of marginalised individuals or groups -The scope of this Code of Conduct may be amended as necessary to address emerging concerns or changing circumstances within Our Community. Any changes will be clearly communicated to all Community Members. +**Community-Specific Harassment:** +- Targeted harassment or bullying specific to community participation +- Deliberate disruption of community discussions, events, or activities +- Pattern of inappropriate social contact within community spaces +- Advocating for removal of community members except through proper channels -## 3. Rules and Prohibited Conduct +**Community Standards Violations:** +- Behaviour that violates the spirit of community values even if not explicitly prohibited +- Actions that demonstrate disregard for community safety and member well-being +- Attempts to circumvent community guidelines or enforcement measures -### 3.1. General Conduct +## 4. Community Standards and Specific Policies -- No trolling, insulting, or derogatory comments. -- No harassment, whether public or private (see section 3.2 for detailed definition). -- No incitement of violence towards any individual, including encouraging suicide or self-harm. -- No deliberate "outing" of any aspect of a person's identity without their consent, except to protect vulnerable individuals from intentional abuse. -- No publication of non-harassing private communication without explicit consent from all parties involved. -- No advocating for members to be banned, except in direct messages to or private discussions with community leaders. -- No spam or excessive self-promotion. +### 4.1 Neutrality and Social Justice -### 3.2. Harassment +#### 4.1.1 Position on Oppression -Harassment includes, but is not limited to: - -- Deliberate misgendering or use of rejected names -- Unwanted physical contact or simulated physical contact without consent -- Threats of violence or intimidation -- Stalking or following -- Unwanted photography or recording, including logging online activity for harassment purposes -- Unwelcome sexual attention -- Pattern of inappropriate social contact, such as requesting/assuming inappropriate levels of intimacy -- Continued one-on-one communication after requests to cease -- Targeted and deliberate aggression -- Sustained disruption of discussion or community events - -### 3.3. Respect for Identity and Diversity - -- No questioning or challenging someone's stated self-identity or chosen labels. -- No unwelcome comments regarding a person's lifestyle choices and practices, including those related to food, health, parenting, relationships, drugs, and employment. -- No offensive comments related to gender, gender identity and expression, sexual orientation, disability, mental illness, neurodiversity, physical appearance, body size, age, race, national origin, ethnic origin, nationality, immigration status, language, religion or lack thereof, or other identity markers. -- No use or promotion of "reverse"-isms, including "reverse racism," "reverse sexism," and "cisphobia" against marginalized members. -- No debating the rights and lived experiences of marginalized people in the community. -- No racist, sexist, cissexist, ableist, or otherwise oppressive behavior, whether casual or explicit. - -### 3.4. Oppression and Neutrality - -:::caution -Neutrality in the face of oppression is to choose the side of the oppressor. +:::caution[Community Position] +Our Community explicitly rejects neutrality in the face of oppression. Remaining neutral when marginalised individuals share their experiences with discrimination, oppression, or harmful legislation constitutes support for oppressive systems and structures. ::: -We understand that not everyone may be aware of the struggles that underprivileged classes face. Asking questions to inform yourself is good. +#### 4.1.2 Educational Approach +We recognise that not all community members may be fully aware of the challenges faced by marginalised communities. We encourage: +- Asking respectful questions to educate oneself about social justice issues +- Listening to the experiences of marginalised community members +- Engaging constructively with discussions about equality and human rights +- Taking responsibility for one's own education on social justice matters + +#### 4.1.3 Prohibited Responses +The following responses to discussions of oppression and marginalisation are considered violations of this Code: +- Attempting to remain "neutral" or "bow out" of discussions about oppression +- Claiming that discussions of discrimination or social justice are inappropriate or divisive +- Dismissing or minimising the experiences of marginalised community members +- Engaging in "whataboutism" or false equivalencies regarding discrimination + +### 4.2 Intellectual Property and Privacy Rights + +#### 4.2.1 Copyright and Attribution +Community Members must: +- Respect all copyright and intellectual property rights +- Provide appropriate attribution when sharing or referencing others' work +- Obtain permission before sharing copyrighted material +- Comply with fair use principles and applicable copyright laws + +#### 4.2.2 Privacy Protection +Community Members must: +- Respect the privacy of all community members +- Obtain explicit consent before sharing personal information about others +- Protect confidential information shared within community contexts +- Report privacy violations to Community Leaders promptly + +### 4.3 Content Standards and Community Guidelines + +#### 4.3.1 Appropriate Content +All content shared within Our Community must: +- Be relevant to community discussions and purposes +- Comply with platform-specific content policies +- Include appropriate content warnings when discussing potentially triggering topics +- Respect community standards regarding language, imagery, and subject matter + +#### 4.3.2 Content Warnings and Accessibility +Community Members are required to: +- Use content warnings when discussing potentially distressing topics +- Provide alternative text for images and visual content when possible +- Use clear, accessible language and formatting +- Consider the diverse needs of community members when sharing content + +## 5. Reporting Procedures and Incident Response + +### 5.1 Reporting Mechanisms + +#### 5.1.1 Available Reporting Methods +Community Members can report Code of Conduct violations through the following channels: +- **Discord Reporting**: Type `@Moderator` in any channel to alert Community Leaders +- **Direct Communication**: Contact any Community Leader through private messages +- **Email Contact**: Submit reports to contact@nhcarrigan.com +- **Anonymous Reporting**: Use designated anonymous reporting forms where available + +#### 5.1.2 Information to Include in Reports +Effective reports should include: +- Contact information (unless reporting anonymously) +- Names, usernames, or identifiable information for all individuals involved +- Detailed description of the incident, including date, time, and location (online or physical) +- Screenshots, chat logs, or other relevant evidence +- Context information that may be relevant to understanding the situation +- Any previous related incidents or patterns of behaviour +- Impact statement describing how the incident has affected you or others + +### 5.2 Report Handling and Investigation Procedures + +#### 5.2.1 Initial Response Protocol +Upon receiving a report, Community Leaders will: +- Acknowledge receipt within 24 hours when possible +- Conduct an initial assessment of the report's severity and scope +- Take immediate protective measures if necessary to ensure community safety +- Recuse any Community Leaders who have conflicts of interest in the matter +- Begin formal investigation procedures within 72 hours + +#### 5.2.2 Investigation Standards +All investigations will adhere to the following standards: +- **Thoroughness**: Complete examination of all evidence and witness statements +- **Impartiality**: Fair consideration of all perspectives and evidence +- **Confidentiality**: Protection of all parties' privacy to the extent possible +- **Timeliness**: Completion of investigations in a reasonable timeframe +- **Documentation**: Proper record-keeping for accountability and consistency + +#### 5.2.3 Confidentiality and Privacy Protection +Community Leaders commit to: +- Respecting confidentiality requests from reporters and witnesses +- Limiting information sharing to those with legitimate need-to-know +- Protecting the identity of anonymous reporters +- Balancing transparency with privacy protection +- Never revealing harassment victims' identities without explicit, affirmative consent + +### 5.3 Response and Resolution Options + +#### 5.3.1 Protective Measures +Community Leaders may implement immediate protective measures including: +- Temporary suspension of accused individuals pending investigation +- Modification of access permissions or privileges +- Implementation of no-contact orders between parties +- Enhanced monitoring of specific community areas or interactions + +#### 5.3.2 Public Statements and Warnings +At Community Leaders' discretion, we may: +- Issue public statements regarding individuals who pose community safety risks +- Provide private warnings to third parties when necessary for community protection +- Publish aggregate data about Code of Conduct violations for transparency +- Name individuals in public warnings when community safety requires such disclosure + +## 6. Disciplinary Framework and Enforcement + +### 6.1 Reference to Comprehensive Enforcement Framework + +**IMPORTANT: Comprehensive enforcement procedures, moderation standards, appeals processes, and disciplinary frameworks are set forth in our Content and Moderation Policy, which is incorporated herein by reference and governs all community enforcement matters.** + +### 6.2 Community-Specific Enforcement Principles + +In addition to the comprehensive framework in our Moderation Policy, community enforcement emphasizes: + +**(a)** **Restorative Justice**: Focus on repairing harm and restoring community relationships when possible; + +**(b)** **Community Safety**: Ultimate priority on protecting community members from harm and discrimination; + +**(c)** **Educational Approach**: Emphasis on learning and behavior modification where appropriate; + +**(d)** **Community Values**: Enforcement that upholds our specific community values of inclusivity and respect. + +### 6.2 Violation Assessment Criteria + +#### 6.2.1 Sanctionable Conduct +Disciplinary sanctions may be imposed for: +- Direct violations of this Code of Conduct or associated community policies +- Behaviour that violates the spirit of community standards even if not explicitly prohibited +- Repeated conduct that has been previously addressed through warnings or lesser sanctions +- Attempts to circumvent or evade existing sanctions +- Behaviour that demonstrates disregard for community values and member safety + +#### 6.2.2 Aggravating and Mitigating Factors +When determining appropriate sanctions, Community Leaders consider: + +**Aggravating Factors:** +- Repeat violations or patterns of problematic behaviour +- Targeting of vulnerable or marginalised community members +- Abuse of position, authority, or trust +- Refusal to acknowledge wrongdoing or engage constructively with the disciplinary process +- Violations that cause significant harm to individuals or the community + +**Mitigating Factors:** +- First-time violations with demonstration of understanding and remorse +- Voluntary disclosure of violations or cooperation with investigations +- Evidence of genuine efforts to modify behaviour +- Acknowledgement of wrongdoing and commitment to improvement +- Circumstances that may have contributed to the violation + +### 6.3 Progressive Disciplinary System + +#### 6.3.1 Level 1: Formal Reminder and Education +**Typical Application:** +- First-time violations of community standards +- Use of inappropriate language or unprofessional behaviour +- Minor violations that appear to stem from misunderstanding of community standards + +**Standard Consequences:** +- Public or private formal reminder about appropriate conduct +- Clear explanation of the violated standard and expected behaviour +- Educational resources provided to prevent future violations +- Request for public apology when appropriate +- Documentation of the incident for future reference + +**Behavioural Examples:** +- Using language that may be exclusionary or unwelcoming +- Making comments that inadvertently marginalise community members +- Engaging in behaviour that disrupts community discussions +- Sharing content without appropriate warnings or context + +#### 6.3.2 Level 2: Formal Warning and Monitoring +**Typical Application:** +- Violations following previous reminders or educational interventions +- Moderate violations of community standards +- Behaviour that demonstrates disregard for previous feedback + +**Standard Consequences:** +- Formal written warning with clear documentation +- Specific behavioural expectations and requirements outlined +- Enhanced monitoring of community participation +- Potential restrictions on certain community privileges +- Clear communication of consequences for continued violations + +**Behavioural Examples:** +- Continued use of exclusionary language after previous correction +- Minor harassment or targeted negative behaviour +- Repeated disruption of community discussions despite warnings +- Failure to respect others' boundaries after being asked to stop + +#### 6.3.3 Level 3: Temporary Suspension and Mandatory Education +**Typical Application:** +- Serious violations of community standards +- Repeated violations despite previous warnings +- Behaviour that creates an unsafe environment for community members + +**Standard Consequences:** +- Temporary removal from all community platforms (typically 7-30 days) +- Mandatory completion of educational requirements before reinstatement +- Written agreement to adhere to community standards upon return +- Probationary period with enhanced monitoring following reinstatement +- Clear conditions for continued participation in the community + +**Behavioural Examples:** +- Harassment or discriminatory behaviour towards community members +- Sustained inappropriate behaviour despite multiple warnings +- Violations that significantly disrupt community activities or discussions +- Behaviour that makes other community members feel unsafe + +#### 6.3.4 Level 4: Permanent Exclusion +**Typical Application:** +- Severe violations that pose significant risk to community safety +- Patterns of repeated violations with no demonstrated improvement +- Behaviour that fundamentally conflicts with community values + +**Standard Consequences:** +- Permanent ban from all community platforms and activities +- Public statement regarding the exclusion when necessary for community safety +- Reporting to relevant authorities when violations involve illegal activity +- No opportunity for reinstatement or appeal in most cases + +**Behavioural Examples:** +- Serious harassment, threats, or doxxing of community members +- Sustained patterns of discriminatory or oppressive behaviour +- Sexual harassment or other forms of serious misconduct +- Attempts to harm the community or its members through any means + +### 6.4 Special Considerations and Additional Measures + +#### 6.4.1 Enhanced Sanctions +Community Leaders may impose additional requirements or restrictions including: +- Public acknowledgement of wrongdoing and apology to affected parties +- Completion of specific educational programmes or training +- Community service contributions as conditions for reinstatement +- Ongoing behavioural monitoring and reporting requirements +- Restrictions on specific community privileges or leadership opportunities + +#### 6.4.2 Immediate Protection Measures +In cases where immediate action is necessary to protect community safety: +- Temporary suspension may be implemented immediately pending investigation +- Emergency removal from specific platforms or activities may occur +- No-contact orders may be established between involved parties +- Enhanced security measures may be implemented for affected individuals + +## 7. Transparency and Accountability Systems + +### 7.1 Documentation and Record-Keeping + +#### 7.1.1 Comprehensive Logging System +All disciplinary actions are recorded in our public transparency system available at [https://hikari.nhcarrigan.com/sanctions](https://hikari.nhcarrigan.com/sanctions), including: +- Date and time of each disciplinary action +- Type and severity of sanction imposed +- General description of the violation (with privacy protections) +- Platform or community space where the violation occurred +- Anonymised identifier for the sanctioned individual +- Community Leader responsible for implementing the sanction +- Relevant evidence or documentation (with appropriate redaction) + +#### 7.1.2 Privacy Protection in Documentation +While maintaining transparency, we protect individual privacy by: +- Anonymising personally identifiable information in public logs +- Redacting sensitive details that could enable identification of victims +- Balancing transparency with confidentiality requirements +- Providing more detailed information only to authorised personnel + +### 7.2 Appeals and Review Process + +#### 7.2.1 Right to Appeal +Individuals subject to disciplinary sanctions have the right to appeal such decisions through our [formal appeals process](/community/appeal), which includes: +- Review by Community Leaders not involved in the original decision +- Consideration of new evidence or mitigating circumstances +- Opportunity to present alternative perspectives or explanations +- Fair and impartial review of the original decision and its basis + +#### 7.2.2 Appeals Process Integrity +During the appeals process: +- Original sanctions remain in effect pending review +- Appeals are reviewed by impartial Community Leaders +- Decisions are based on evidence and established community standards +- Final appeal decisions are communicated with detailed reasoning + +### 7.3 Community Oversight and Continuous Improvement + +#### 7.3.1 Regular Review and Assessment +Our disciplinary system undergoes regular review including: +- Annual assessment of consistency in sanction application +- Community feedback collection on disciplinary processes +- Review of appeals outcomes to identify systemic issues +- Updates to policies and procedures based on community evolution + +#### 7.3.2 Community Leader Accountability +Community Leaders are held accountable through: +- Regular training on community standards and disciplinary procedures +- Peer review of disciplinary decisions for consistency +- Performance evaluation including community feedback +- Consequences for Community Leaders who fail to uphold community standards + +## 8. Advertising, Promotion, and Commercial Activity + +### 8.1 General Prohibition on Commercial Activity + +#### 8.1.1 Scope of Prohibition +Commercial advertising and self-promotion are generally prohibited within Our Community spaces, including: +- Unsolicited promotion of products, services, websites, or social media accounts +- Commercial advertising or marketing communications +- Promotion of competing communities, platforms, or services +- Affiliate marketing or referral link sharing +- Solicitation for commercial purposes or business development + +#### 8.1.2 Rationale for Restrictions +These restrictions exist to: +- Maintain focus on community purposes and objectives +- Prevent exploitation of community relationships for commercial gain +- Ensure equal participation opportunities for all members +- Protect community members from unwanted commercial solicitation + +### 8.2 Authorised Exceptions and Permitted Activities + +#### 8.2.1 Approved Commercial Activities +The following activities are permitted when explicitly authorised: +- Official announcements or promotions approved by Community Leaders +- Sharing of resources directly relevant to ongoing discussions when done in good faith +- Links or information specifically requested by Community Leaders for support or moderation purposes +- Educational resources that provide value to the community without primary commercial purpose + +#### 8.2.2 Context-Appropriate Sharing +Limited sharing may be acceptable when: +- Content is directly relevant to current discussions or community needs +- Sharing is done transparently without hidden commercial motives +- The primary purpose is education or community benefit rather than promotion +- Appropriate disclosure of any commercial relationships or affiliations is provided + +### 8.3 Compliance and Enforcement + +#### 8.3.1 Disclosure Requirements +When sharing any content with potential commercial implications, Community Members must: +- Clearly disclose any personal, professional, or financial relationships with promoted entities +- Identify themselves when sharing content from projects or organisations with which they are affiliated +- Be transparent about any potential benefits they may receive from community members' engagement + +#### 8.3.2 Violation Consequences +Violations of advertising and promotion restrictions will be addressed through: +- Content removal and community member education for minor violations +- Formal warnings for repeated or more serious promotional activities +- Temporary or permanent sanctions for egregious commercial exploitation +- Referral to relevant authorities for violations that may constitute spam or fraud + +## 9. Language Requirements and Communication Standards + +### 9.1 Official Language Policy + +#### 9.1.1 English as Primary Language +The official language of Our Community is English, and all community interactions, discussions, and contributions should be conducted in English to ensure: +- Clear communication among all community members +- Effective moderation and community management +- Consistency across all community platforms and activities +- Accessibility for the broadest range of community members + +#### 9.1.2 Scope of Application +The English language requirement applies to: +- All public discussions and communications within community spaces +- Documentation, contributions, and community-generated content +- Official communications and announcements +- Support requests and community assistance interactions +- Disciplinary and administrative communications + +### 9.2 Support for Non-Native English Speakers + +#### 9.2.1 Inclusive Approach +We actively support non-native English speakers by: +- Encouraging patience and understanding from all community members +- Providing assistance with language barriers when appropriate +- Focusing on the substance of contributions rather than perfect grammar or syntax +- Offering clarification and rephrasing when communication difficulties arise + +#### 9.2.2 Accommodation Measures +Community Members are encouraged to: +- Help clarify or rephrase messages when language barriers exist +- Provide gentle correction or assistance when requested +- Use clear, simple language to facilitate understanding +- Be patient with translation delays or communication difficulties + +### 9.3 Limited Exceptions and Special Circumstances + +#### 9.3.1 Permitted Exceptions +Limited use of languages other than English may be acceptable for: +- Brief translations provided to assist community members, when immediately accompanied by English translation +- Cultural sharing or educational content when clearly contextualised and explained in English +- Emergency situations where immediate communication is necessary +- Specific community events or activities explicitly designated as multilingual + +#### 9.3.2 Translation and Accessibility Tools +Community Members may: +- Use translation tools to assist with participation, provided English content is also included +- Request assistance with translation when needed for full participation +- Offer translation assistance to other community members when appropriate + +## 10. Implementation, Amendment, and Enforcement + +### 10.1 Code Implementation and Effective Date + +#### 10.1.1 Immediate Effect +This Code of Conduct takes effect immediately upon publication and applies to all community interactions occurring after its implementation. Community Members are responsible for familiarising themselves with these standards and ensuring compliance in all community activities. + +#### 10.1.2 Retroactive Considerations +While this Code primarily governs future conduct, Community Leaders reserve the right to consider past behaviour patterns when assessing current community participation and determining appropriate responses to new violations. + +### 10.2 Amendment and Update Procedures + +#### 10.2.1 Amendment Authority +This Code may be amended, updated, or modified at any time by Community Leaders to: +- Address emerging community issues or challenges +- Incorporate lessons learned from community experiences +- Reflect changes in legal requirements or best practices +- Respond to community feedback and suggestions for improvement + +#### 10.2.2 Change Communication +Significant amendments to this Code will be communicated to the community through: +- Announcements in primary community channels +- Updates to community documentation and resources +- Direct notification to Community Leaders and active participants +- Clear indication of changes in publicly accessible versions + +### 10.3 Enforcement Authority and Discretion + +#### 10.3.1 Community Leader Authority +Community Leaders possess both the authority and obligation to: +- Interpret and apply this Code consistently and fairly +- Take any action deemed necessary to protect community safety and integrity +- Modify or expand enforcement procedures as community needs evolve +- Collaborate with external authorities when violations involve illegal activity + +#### 10.3.2 Discretionary Enforcement +While this Code provides comprehensive guidance, Community Leaders retain discretion to: +- Address situations not explicitly covered by written policies +- Apply contextual judgment in complex or unusual circumstances +- Implement innovative solutions to emerging community challenges +- Prioritise community safety and well-being over rigid rule application + +### 10.4 Legal and Operational Integration + +#### 10.4.1 Relationship to Other Policies +This Code operates in conjunction with and supplements: +- Terms of Service and User Agreements +- Privacy Policies and Data Protection Measures +- Platform-specific Terms of Use and Community Guidelines +- Applicable laws and regulations governing online communities + +#### 10.4.2 Conflict Resolution +In the event of conflicts between this Code and other policies: +- The provision that provides greater protection for community members shall take precedence +- Community Leaders will interpret policies to maximise safety and inclusivity +- Ambiguities will be resolved in favour of community protection and welfare + +--- + +## Acknowledgement and Compliance Declaration + +By participating in Our Community, all Community Members explicitly acknowledge that they have: + +1. **Read and Understood** this Code of Conduct in its entirety +2. **Agreed to Comply** with all provisions, standards, and requirements outlined herein +3. **Accepted Responsibility** for their conduct and its impact on other community members +4. **Committed to Upholding** the values and principles that define our community +5. **Recognised the Authority** of Community Leaders to enforce these standards -But attempting to "bow out" of a discussion, or to claim you are remaining neutral when an under-represented person shares their experiences with oppression and anti-* legislation, is just as bad as siding against those underprivileged classes. - -As such, behaviour like this is considered a violation of our Code of Conduct and will be actioned accordingly. - -### 3.5. Content and Communication - -- No explicit sexual images or behavior. -- No use of slurs or hateful terminology. -- Content warnings should be used when discussing potentially triggering topics. - -### 3.6. Intellectual Property and Privacy - -- Respect copyright and intellectual property rights. -- Do not share personal information of others without their explicit consent. - -### 3.7. Community Discussions and Debates - -- Engage in respectful and constructive dialogue. -- Be open to learning from others' perspectives. -- Avoid derailing discussions or intentionally inflaming tensions. - -### 3.8. Reporting and Enforcement - -- Report violations of this Code of Conduct to community leaders promptly. -- Cooperate with community leaders during investigations of reported incidents. -- Respect the privacy of individuals involved in reports and investigations. - -### 3.9. Compliance with Platform-Specific Rules - -- Adhere to the terms of service and community guidelines of any platforms used by Our Community. -- Be aware that certain behaviors may violate platform rules even if not explicitly mentioned in this Code of Conduct. - -### 3.10. Amendments and Interpretations - -- These rules may be amended or expanded as necessary to address emerging issues. -- Community leaders reserve the right to interpret these rules and make decisions in cases where the application of rules may be unclear. - -## 4. Reporting and Response Procedures - -### 4.1. Reporting Methods - -- In Discord: Type @Moderator in any channel to alert community leaders. -- Direct Message: Contact a community leader directly via private message. -- Email: contact@nhcarrigan.com - -### 4.2. Information to Include in Reports - -- Your contact information (unless reporting anonymously) -- Names or descriptions of individuals involved -- Description of the incident, including date, time, and location (online or physical) -- Any relevant screenshots, chat logs, or other evidence -- Any additional context you believe is important - -### 4.3. Handling of Reports - -- We will respond to all reports as promptly as possible. -- If a reported violator is on our staff team, they will be immediately recused from handling the incident. -- All reports will be handled with discretion and confidentiality to the extent possible. - -### 4.4. Confidentiality and Privacy - -- We will respect confidentiality requests, especially to protect victims of abuse. -- Anonymous reporting options are available, though they may limit our ability to investigate. - -### 4.5. Public Statements and Warnings - -- At our discretion, we may publicly name a person about whom we've received harassment complaints. -- We may privately warn third parties about individuals if we believe it will increase community safety. -- We will not name harassment victims without their explicit, affirmative consent. - -### 4.6. False Reports and Abuse of Process - -- We reserve the right to reject reports we believe to have been made in bad faith. -- Reports intended to silence legitimate criticism may be dismissed without response. -- Deliberately false reporting is a violation of this Code of Conduct and may result in sanctions. - -### 4.7. Protection of Reporters and Victims - -- We will take all reasonable steps to protect reporters and victims from retaliation. -- Retaliation against reporters or victims is a serious violation of this Code of Conduct. - -### 4.8. Investigation Process - -- We will conduct a thorough and impartial investigation of all reports. -- Investigations will be conducted as quickly as possible while ensuring thoroughness. -- All parties involved will be given an opportunity to present their perspective. - -### 4.9. Outcomes and Appeals - -- After investigation, we will determine appropriate actions based on the evidence. -- We will communicate outcomes to involved parties as appropriate, respecting privacy concerns. -- An appeals process will be available for individuals who believe a decision was made in error. - -### 4.10. Continuous Improvement - -- We will regularly review our reporting and response procedures to ensure their effectiveness. -- Feedback on these procedures is welcome and will be considered for future improvements. - -### 4.11. Support for Community Leaders - -- We recognize the potential for burnout among our volunteer moderators and leaders. -- We will provide support and resources to our community leaders to help them manage their responsibilities effectively. - -## 5. Sanctions and Enforcement - -### 5.1. General Principles - -- Participants must immediately comply when asked to stop any harmful behavior. -- Community leaders may take any appropriate action in response to harmful behavior. -- All sanctions will be applied fairly, consistently, and proportionally to the violation. - -### 5.2. Authority of Community Leaders - -- Community leaders have the right and responsibility to remove, edit, or reject contributions not aligned with this Code of Conduct. -- Leaders commit to applying these principles fairly and consistently in all aspects of community management. -- Leaders who fail to follow or enforce the Code of Conduct may be permanently removed from their position. - -### 5.3 Sanction Criteria - -The following list outlines the criteria used when determining if a sanction should be issued. - -- Behaviour which violates this Code of Conduct, our Community Guidelines, or our other public policies. -- Behaviour which our staff feel is not in the spirit of the policy, even if it is not violating the letter of the policy. -- Repeated behaviour that has been previously sanctioned, as outlined in our escalation policy. -- Attempts to circumvent sanctions, such as ban evasion. - -### 5.4. Privacy and Security - -- All community leaders are obligated to respect the privacy and security of incident reporters. -- Information about sanctions will be shared on a need-to-know basis. - -### 5.5. Gradated Sanction System - -Community leaders will follow these Community Impact Guidelines in determining consequences: - -#### 5.5.1. Level 1: Reminder - -- Example Behavior: Use of inappropriate language or other behavior deemed unprofessional or unwelcome. -- Consequences: - - A public, written reminder from community leaders - - Clarification of the violation and why the behavior was inappropriate - - A public apology may be requested - -#### 5.5.2. Level 2: Warning - -- Example Behavior: A violation through a single incident or series of actions. -- Consequences: - - A formal warning - - Clear communication of consequences for continued behavior - - Incident is logged for future reference - -#### 5.5.3. Level 3: Temporary Removal - -- Example Behavior: A serious violation of community standards or sustained inappropriate behavior. -- Consequences: - - Temporary removal from community platforms (e.g., Discord kick) - - Clear conditions for return, including a cooling-off period - - Requirement to re-read and acknowledge the Code of Conduct before rejoining - -#### 5.5.4. Level 4: Permanent Ban - -- Example Behavior: Pattern of violations, sustained inappropriate behavior, harassment, or aggression towards individuals or groups. -- Consequences: - - Permanent ban from all community platforms - - Public statement may be made, if deemed necessary for community safety - -### 5.6. Additional Sanction Considerations - -- Repeated violations will generally result in escalating sanctions. -- The severity of the violation may warrant skipping levels in the sanction system. -- Community leaders may impose additional requirements, such as public apologies or community service, as conditions for continued participation. - -### 5.7. Appeals Process - -- Individuals may appeal sanctions by [completing the form](/community/appeal) -- Appeals will be reviewed by leaders not involved in the original decision. -- During the appeal, the original sanction remains in effect. - -### 5.8. Documentation and Transparency - -- All formal sanctions will be publicised for review and consistency. Sanctions can be viewed at https://logs.nhcarrigan.com. -- Aggregate data on Code of Conduct violations and sanctions may be published periodically to ensure transparency. - -### 5.9. Rehabilitation and Education - -- Where appropriate, we will provide resources and support for individuals to learn from their mistakes and improve their behavior. -- For less severe violations, completion of educational programs may be offered as an alternative or supplement to other sanctions. - -### 5.10. Legal Implications - -- In cases of illegal activity, appropriate legal authorities may be notified. -- Our sanctions do not preclude or replace any legal action that may be warranted. - -### 5.11. Regular Review - -- This sanction system will be reviewed periodically to ensure its effectiveness and fairness. -- Community feedback on the sanction system is welcome and will be considered in reviews. - -## 6. Moderation Logs and Transparency - -### 6.1. Purpose of Moderation Logs - -- To ensure transparency in moderation sanctions -- To maintain accountability of the moderation team to community members -- To provide a clear record of enforcement of the Code of Conduct - -### 6.2. Scope of Logged Actions - -- All moderation sanctions across all community platforms will be logged -- This includes, but is not limited to: - - Warnings issued - - Temporary removals or suspensions - - Permanent bans - - Appeals and their outcomes - -### 6.3. Location of Moderation Logs - -- All moderation sanctions will be publicly logged at https://logs.nhcarrigan.com -- The log will be accessible to all community members - -### 6.4. Information Included in Logs - -- Date and time of the action -- Type of action taken -- Reason for the action -- Platform where the violation occurred -- Identifier of the user who received the action -- Identifier of the leader who performed the action -- Any relevant evidence - -### 6.5. Privacy Considerations - -- In cases where privacy is crucial (e.g., harassment reports), certain details may be omitted or generalized - -### 6.6. Accessibility of Logs - -- The moderation log channel will be read-only for regular community members -- Community members can request clarification on logged sanctions through appropriate channels - -### 6.7. Retention of Logs - -- Moderation logs will be retained for a period of no less than 1 year. - - After this period, logs may be archived or summarized for long-term record-keeping - -### 6.8. Audit and Review - -- Moderation logs will be periodically reviewed by community leadership to ensure consistency and fairness in enforcement -- Annual reports summarizing moderation actions may be published to the community - -### 6.9. Dispute Resolution - -- If a community member believes a moderation action was taken in error, they can refer to the logs and follow the appeals process outlined in the Sanctions section - -### 6.10. Moderator Accountability - -- Patterns of biased or inconsistent moderation will be addressed by community leadership -- Moderators who consistently fail to log their actions may have their privileges revoked - -### 6.11. Feedback and Improvement - -- Community members are encouraged to provide feedback on the moderation log system -- The logging process will be reviewed periodically and may be adjusted to better serve the community's needs - -## 7. Advertising and Promotion - -### 7.1. General Prohibition - -- Advertising and self-promotion are generally not permitted within our community spaces. -- This includes, but is not limited to, unsolicited promotion of products, services, websites, social media accounts, or other communities. - -### 7.2. Exceptions - -- Links or information expressly requested by our team for support or moderation purposes. -- Sharing of resources directly relevant to ongoing discussions, when done in good faith and not for commercial gain. -- Official announcements or promotions approved by community leadership. - -### 7.3. Support and Moderation Contexts - -- Community members may be asked to provide links or information to assist with support inquiries or moderation investigations. -- In these cases, sharing such information is permitted and encouraged. - -### 7.4. Relevance and Context - -- Any shared links or information must be directly relevant to the current discussion or inquiry. -- The relevance and appropriateness of shared content will be at the discretion of community leaders. - -### 7.5. Disclosure of Affiliations - -- If sharing information about a product or service with which you have a personal or professional affiliation, this affiliation must be clearly disclosed. - -### 7.6. Consequences of Violation - -- Violations of this policy will be treated as a breach of the Code of Conduct. -- Consequences may range from content removal to temporary or permanent bans, depending on the severity and frequency of violations. - -### 7.7. Appeals and Clarifications - -- If you are unsure whether specific content would be considered advertising, consult with a community leader before posting. -- If your content is removed under this policy, you may appeal the decision through the established channels outlined in the Sanctions section. - -## 8. Languages - -### 8.1. Official Language - -- The official language of our community is English. -- All community interactions, discussions, and contributions should be in English. - -### 8.2. Scope of English-Only Policy - -- This policy applies to all community spaces, including but not limited to: - - Discord channels - - GitHub discussions and issues - - Documentation - - Official communication channels - -### 8.3. Multilingual Applications - -- Even if our applications or services are offered in multiple languages, community discussions about them must be conducted in English. - -### 8.4. Rationale - -- To ensure clear communication among all community members. -- To facilitate effective moderation and support. -- To maintain consistency across all community platforms. - -### 8.5. Exceptions - -- Specific channels or sections designated for other languages, if explicitly created and approved by community leadership. -- Brief translations to assist non-native English speakers, when immediately followed by an English translation. - -### 8.6. Support for Non-Native Speakers - -- We encourage patience and understanding towards non-native English speakers. -- Community members are encouraged to help clarify or rephrase messages if there's a language barrier, while maintaining English as the primary language. - -### 8.7. Translation Tools - -- While automatic translation tools may be used personally, the original English content should be included in all community interactions. +This Code represents our collective commitment to building and maintaining a community that serves as a model for inclusive, respectful, and productive online collaboration. + +--- + +*This Community Code of Conduct was last updated on 15 September 2025 and supersedes all previous versions. For questions regarding this Code or to report violations, please contact our Community Leaders through the designated reporting channels outlined above.* diff --git a/src/content/docs/community/feedback.md b/src/content/docs/community/feedback.md new file mode 100644 index 0000000..e0cf300 --- /dev/null +++ b/src/content/docs/community/feedback.md @@ -0,0 +1,401 @@ +--- +title: Community Feedback and Participation Policy +--- + +## 1. Foundation and Democratic Principles + +### 1.1 Introduction and Purpose + +This Community Feedback and Participation Policy (hereinafter referred to as "the Policy") establishes our comprehensive framework for meaningful community member engagement in governance, policy development, and community improvement processes. This Policy embodies our commitment to participatory governance, ensuring that community members have multiple accessible pathways to influence decisions that affect their community experience and contribute to the continuous improvement of our shared environment. + +### 1.2 Core Democratic Principles + +Our community feedback and participation approach is founded upon: + +**(a)** **Participatory Governance**: Community members have meaningful opportunities to influence decisions affecting them; + +**(b)** **Transparent Decision-Making**: Clear communication about how community input influences policy and governance decisions; + +**(c)** **Inclusive Participation**: Multiple accessible pathways for engagement that accommodate diverse needs and preferences; + +**(d)** **Responsive Leadership**: Leadership commitment to actively seeking, considering, and responding to community input; + +**(e)** **Continuous Improvement**: Regular assessment and enhancement of community feedback systems and participation opportunities; + +**(f)** **Democratic Accountability**: Mechanisms ensuring leadership remains accountable to the community they serve. + +### 1.3 Participation Philosophy + +We believe that community members are the ultimate experts on their own experience and needs, and our governance systems should reflect this expertise by: +- Actively seeking diverse community perspectives on policies and decisions +- Creating multiple pathways for participation that accommodate different preferences and circumstances +- Ensuring that community input meaningfully influences policy development and implementation +- Building community ownership and investment in shared governance and improvement processes +- Fostering a culture of collaborative decision-making and mutual responsibility + +### 1.4 Legal Framework Integration + +This Policy operates within our comprehensive legal and policy framework, including our Terms of Service, Privacy Policy, Community Code of Conduct, and Community Leadership and Governance Policy, all of which are incorporated herein by reference. + +## 2. Feedback Channels and Communication Systems + +### 2.1 Regular Feedback Opportunities + +#### 2.1.1 Daily and Ongoing Feedback Channels + +**Open Communication Channels:** +- Dedicated feedback channels accessible to all community members for ongoing input and suggestions + - Community: `#community-suggestions-and-feedback` on Discord + - Products: `#product-feedback-and-suggestions` on Discord +- Direct feedback systems protecting member privacy whilst enabling honest communication + - Community: https://forms.nhcarrigan.com/form/IDdo5e4OJS44QYFm9_aRJ36lY3Ox-BBTAM9zfnkhfoo + - Products: https://forms.nhcarrigan.com/form/jkcGg0hMIa4U0hDL2OMip5pMX2UujN5W5n4Qn8HReJ8 +- Direct messaging opportunities with community leadership for individual concerns and suggestions +- Public discussion forums for community-wide conversation about policies and improvements + +**Structured Feedback Systems:** +- Regular feedback forms targeting specific community areas and improvement opportunities +- Suggestion box systems for ongoing community enhancement ideas and proposals +- Incident reporting systems for policy effectiveness assessment and improvement identification +- Accessibility feedback channels specifically designed to identify and address inclusion barriers + - `#accessibility` on Discord. + +#### 2.1.2 Scheduled Feedback Collection + +**Monthly Community Input Sessions:** +- Structured community meetings focused on specific policy areas or community improvements +- Rotating focus areas ensuring comprehensive coverage of community operations and policies +- Multiple participation formats (live discussion, written input, asynchronous participation) to accommodate diverse preferences +- Clear agendas and preparation materials enabling meaningful community participation + +**Quarterly Community Assessments:** +- Comprehensive community satisfaction surveys covering all aspects of community experience +- Policy effectiveness assessments gathering detailed feedback on existing policies and procedures +- Community needs assessments identifying emerging priorities and improvement opportunities +- Leadership performance evaluations providing community input on governance effectiveness + +### 2.2 Accessible Participation Methods + +#### 2.2.1 Universal Design in Feedback Systems + +**Multiple Communication Formats:** +- Written feedback forms available in multiple languages and accessible formats +- Audio and video feedback submission options for members with different communication preferences +- Visual feedback tools including graphics, diagrams, and interactive elements for diverse learning styles +- Real-time and asynchronous participation options accommodating different time zones and availability patterns + +**Accessibility Accommodations:** +- Screen reader compatible feedback systems for members using assistive technology +- Large print and high contrast options for members with visual accessibility needs +- Simple language versions of feedback requests and policy summaries for improved comprehension +- Alternative format materials and documentation available upon request + +#### 2.2.2 Cultural and Linguistic Inclusion + +**Culturally Responsive Feedback Collection:** +- Feedback systems designed with cultural sensitivity and diverse communication style accommodation +- Translation services available for feedback submission in languages other than English +- Cultural liaison positions to facilitate feedback collection from diverse community groups +- Recognition and accommodation of cultural differences in feedback expression and participation preferences + +**Inclusive Participation Support:** +- Mentorship and support systems helping new or less experienced community members engage in feedback processes +- Education about feedback systems and participation opportunities for members unfamiliar with democratic participation +- Peer support networks connecting members interested in collaborative participation and governance engagement +- Special outreach to ensure participation from underrepresented community groups and perspectives + +## 3. Policy Development and Change Processes + +### 3.1 Community Consultation Requirements + +#### 3.1.1 Mandatory Consultation Procedures + +**Significant Policy Changes:** +All significant policy changes must include: +- **Minimum 30-day public comment period** with multiple opportunities for community input and feedback +- **Community impact assessment** analysing how proposed changes will affect different community groups and members +- **Alternative proposal consideration** including community-suggested modifications and improvements +- **Transparent rationale communication** explaining the need for changes and how community input influenced final decisions + +**New Policy Development:** +- **Community needs assessment** identifying the necessity and community support for new policies +- **Draft policy review period** allowing community input on proposed policy language and implementation plans +- **Stakeholder consultation** ensuring input from community members who would be most affected by new policies +- **Implementation planning** involving community input on effective policy rollout and communication strategies + +#### 3.1.2 Community Input Integration Process + +**Systematic Input Analysis:** +- **Comprehensive review** of all community feedback and input received during consultation periods +- **Thematic analysis** identifying common concerns, suggestions, and priorities expressed by community members +- **Response development** addressing each significant concern or suggestion raised during consultation processes +- **Policy modification** incorporating feasible community suggestions and addressing identified concerns + +**Transparent Decision Communication:** +- **Detailed summaries** of community input received and how it influenced policy decisions +- **Clear explanations** of why certain community suggestions were or were not incorporated into final policies +- **Implementation timelines** and community preparation information for policy changes +- **Ongoing evaluation commitments** outlining how policy effectiveness will be assessed with community input + +### 3.2 Emergency and Urgent Change Procedures + +#### 3.2.1 Emergency Policy Modifications + +**Crisis Response Policy Changes:** +When immediate policy changes are necessary for community safety: +- **Immediate implementation** with clear communication about emergency nature of changes +- **Retroactive community consultation** conducted as soon as practically possible after emergency implementation +- **Community input integration** for permanent policy changes following emergency measures +- **Transparent review process** evaluating emergency decisions and incorporating community feedback for future improvements + +#### 3.2.2 Urgent Community Need Response + +**Expedited Change Procedures:** +- **Accelerated consultation timelines** with intensive community outreach and input collection +- **Community priority assessment** ensuring urgent changes address genuine community needs and priorities +- **Rapid response implementation** with continuous community feedback collection and policy adjustment +- **Follow-up evaluation** assessing urgent change effectiveness and incorporating lessons learned + +## 4. Transparency and Decision-Making Communication + +### 4.1 Open Governance Practices + +#### 4.1.1 Decision-Making Transparency + +**Public Decision Records:** +- **Meeting minutes and records** available to all community members for transparency and accountability +- **Decision rationales** clearly documented and communicated to explain leadership reasoning and community input consideration +- **Policy change logs** tracking all modifications and their justifications for comprehensive transparency +- **Community impact tracking** documenting how decisions affect different community groups and members + +**Leadership Accessibility:** +- **Regular office hours** where community members can directly engage with leadership about governance and policy matters +- **Public Q&A sessions** addressing community concerns and providing transparent answers about decision-making processes +- **Leadership communication channels** accessible to all community members for ongoing dialogue and feedback +- **Community liaison programs** facilitating communication between leadership and diverse community groups + +#### 4.1.2 Information Accessibility and Sharing + +**Comprehensive Information Access:** +- **Policy documentation** available in multiple formats and accessible language for broad community understanding +- **Decision-making process guides** helping community members understand how to participate effectively in governance +- **Historical records** of community decisions and their outcomes available for transparency and learning +- **Resource libraries** providing educational materials about community governance and participation opportunities + +**Proactive Communication:** +- **Regular community updates** about governance activities, policy development, and decision-making processes +- **Advance notice** of upcoming decisions, consultation opportunities, and participation deadlines +- **Multiple communication channels** ensuring information reaches community members through their preferred methods +- **Follow-up communication** about decision outcomes and implementation progress + +### 4.2 Community Accountability Mechanisms + +#### 4.2.1 Leadership Accountability Systems + +**Performance Monitoring and Evaluation:** +- **Regular community confidence surveys** assessing leadership effectiveness and community satisfaction +- **360-degree feedback systems** incorporating input from community members, peers, and external partners +- **Public performance reporting** sharing leadership evaluation outcomes and improvement commitments with the community +- **Community review processes** enabling community members to formally evaluate leadership performance and effectiveness + +**Response and Improvement Commitments:** +- **Public commitments** to address community concerns and feedback identified through accountability processes +- **Improvement timelines** with specific milestones and progress reporting to demonstrate leadership responsiveness +- **Community follow-up** ensuring leadership commitments are fulfilled and community concerns are adequately addressed +- **Continuous improvement integration** incorporating accountability feedback into leadership development and governance enhancement + +#### 4.2.2 Policy Effectiveness Assessment + +**Community-Centred Evaluation:** +- **Regular policy effectiveness surveys** gathering community input on how well policies are meeting their intended objectives +- **Community impact assessment** evaluating policy effects on different community groups and addressing unintended consequences +- **Policy modification processes** incorporating community feedback and assessment results into ongoing policy improvement +- **Community success metrics** developed collaboratively to measure progress toward shared community goals and values + +## 5. Special Consultation and Participation Programs + +### 5.1 Demographic and Identity-Based Consultation + +#### 5.1.1 Targeted Community Outreach + +**Underrepresented Group Engagement:** +- **Specific consultation programs** ensuring input from community members who may not participate in general feedback processes +- **Identity-affirming participation opportunities** creating safe spaces for marginalized community members to provide honest feedback +- **Cultural competency** in consultation design and facilitation to encourage authentic participation from diverse community members +- **Language and accessibility support** removing barriers to participation for community members with diverse needs + +**Specialized Advisory Groups:** +- **Rotating advisory panels** including community members from diverse backgrounds and experience levels +- **Issue-specific consultation groups** bringing together community members with relevant expertise or lived experience +- **Accessibility advisory groups** providing ongoing input on inclusion and accommodation needs and improvements +- **Community youth and senior advisory panels** ensuring intergenerational perspectives in community governance + +#### 5.1.2 Community-Driven Initiative Support + +**Grassroots Proposal Development:** +- **Community member proposal processes** enabling members to suggest and develop new community initiatives and improvements +- **Collaborative development support** providing resources and assistance for community members developing improvement proposals +- **Peer review and community refinement** processes helping improve community-driven proposals through collaborative development +- **Implementation support** for community-approved initiatives including resource allocation and ongoing assistance + +**Community Organizing and Advocacy:** +- **Community organizing support** for members who want to advocate for specific changes or improvements +- **Coalition building assistance** helping community members with shared interests collaborate effectively on improvement initiatives +- **Advocacy training and resources** empowering community members to effectively participate in governance and change processes +- **Community campaign support** for democratic initiatives that build broad community support for positive changes + +### 5.2 Crisis and Emergency Community Consultation + +#### 5.2.1 Emergency Response Input + +**Crisis Communication and Consultation:** +- **Emergency communication protocols** ensuring community members receive timely information about crisis decisions affecting them +- **Rapid consultation processes** gathering essential community input even during emergency situations +- **Community safety prioritization** balancing community input with immediate safety and security requirements +- **Post-crisis evaluation** involving comprehensive community consultation on emergency response effectiveness and improvements + +#### 5.2.2 Community Healing and Recovery Participation + +**Collective Recovery Planning:** +- **Community-wide healing initiatives** developed with broad community input and participation +- **Recovery goal setting** involving community members in establishing priorities and metrics for post-crisis improvement +- **Community resilience building** through collaborative planning and resource development +- **Trauma-informed consultation** ensuring crisis consultation processes are sensitive to community member well-being and recovery needs + +## 6. Feedback Response and Follow-Up Systems + +### 6.1 Comprehensive Response Protocols + +#### 6.1.1 Individual Feedback Acknowledgment + +**Personal Response Commitments:** +- **Acknowledgment within 48 hours** for all individual feedback submissions and policy input +- **Detailed responses within 14 days** addressing specific concerns, suggestions, and questions raised by community members +- **Follow-up communication** ensuring community members feel heard and providing updates on how their input is being considered +- **Personal consultation opportunities** for community members who need additional discussion or clarification about their feedback + +**Resolution and Implementation Tracking:** +- **Issue tracking systems** following feedback items from submission through resolution and implementation +- **Progress updates** provided to feedback submitters about how their input is being addressed and implemented +- **Outcome communication** sharing results and impacts of changes made in response to community feedback +- **Satisfaction follow-up** ensuring community members are satisfied with how their feedback was handled and addressed + +#### 6.1.2 Community-Wide Response Communication + +**Public Feedback Summaries:** +- **Monthly summary reports** highlighting community feedback themes, concerns, and suggestions received +- **Response action reports** detailing how community feedback has influenced policies, decisions, and community improvements +- **Implementation progress updates** showing community members how their collective input is creating positive changes +- **Appreciation and recognition** of community members who provide valuable feedback and participate in governance processes + +**Community Learning and Improvement:** +- **Best practice sharing** about effective feedback integration and community input utilization +- **Process improvement updates** showing how community feedback systems themselves are being enhanced based on member input +- **Success story communication** celebrating positive changes that resulted from community feedback and participation +- **Challenge identification** and collaborative problem-solving when feedback systems need improvement or enhancement + +### 6.2 Continuous Feedback System Enhancement + +#### 6.2.1 Meta-Feedback and System Improvement + +**Feedback System Effectiveness Assessment:** +- **Annual evaluation** of community feedback systems and their effectiveness in enabling meaningful participation +- **Community satisfaction surveys** specifically assessing feedback and participation system accessibility and responsiveness +- **Process improvement recommendations** developed collaboratively with community members who use feedback systems regularly +- **Innovation and enhancement implementation** continuously improving feedback systems based on community needs and technological advances + +**Community Participation Analytics:** +- **Participation pattern analysis** identifying barriers to engagement and opportunities for increased community involvement +- **Demographic participation assessment** ensuring feedback systems are effectively reaching and engaging diverse community members +- **Response quality evaluation** assessing whether community input is receiving appropriate attention and consideration +- **Impact measurement** documenting how community feedback creates positive changes in community policies and experience + +## 7. Training and Support for Community Participation + +### 7.1 Civic Engagement Education + +#### 7.1.1 Participation Skills Development + +**Democratic Participation Training:** +- **Civic engagement workshops** teaching community members effective advocacy, communication, and participation skills +- **Policy analysis training** helping community members understand policy implications and provide more informed feedback +- **Meeting facilitation and participation skills** empowering community members to lead and contribute effectively to governance processes +- **Conflict resolution and collaborative decision-making** training supporting constructive participation in community debates and discussions + +**Communication and Advocacy Skills:** +- **Public speaking and presentation training** for community members interested in more active governance participation +- **Written communication skills** development for effective policy feedback and proposal development +- **Research and analysis training** helping community members gather information and develop evidence-based suggestions +- **Coalition building and organizing skills** for community members interested in leading community improvement initiatives + +#### 7.1.2 Community Governance Education + +**Governance Literacy Programs:** +- **Community governance orientation** for new members explaining how community decision-making works and how to participate +- **Policy development process education** teaching community members how policies are created, modified, and implemented +- **Leadership and governance roles education** explaining different governance positions and how community members can become involved +- **Community history and values education** helping members understand the context and principles guiding community governance + +### 7.2 Participation Support and Mentorship + +#### 7.2.1 New Member Integration + +**Participation Mentorship Programs:** +- **Governance mentorship** pairing experienced community members with newcomers interested in participation and feedback +- **Peer support networks** connecting community members with similar interests in governance and community improvement +- **Guided participation experiences** providing supported opportunities for new members to engage in feedback and governance processes +- **Community leadership pipeline development** identifying and supporting community members interested in greater governance involvement + +#### 7.2.2 Ongoing Participation Support + +**Sustained Engagement Assistance:** +- **Resource libraries** providing ongoing access to materials, tools, and information supporting effective community participation +- **Consultation and guidance services** offering individualized support for community members developing proposals or providing complex feedback +- **Peer collaboration platforms** facilitating community member connections and collaborative work on governance and improvement initiatives +- **Recognition and appreciation systems** acknowledging and celebrating community members who contribute consistently to governance and feedback processes + +## 8. Policy Implementation and Continuous Improvement + +### 8.1 Policy Effectiveness Evaluation + +#### 8.1.1 Regular Assessment and Enhancement + +**Quarterly System Review:** +- **Participation metrics assessment** analysing community engagement levels and identifying areas for improvement +- **Feedback quality evaluation** ensuring community input is meaningful, comprehensive, and effectively integrated into decision-making +- **Response effectiveness assessment** measuring how well feedback systems serve community needs and promote positive change +- **Accessibility and inclusion evaluation** ensuring feedback systems effectively reach and engage all community members + +**Annual Comprehensive Evaluation:** +- **Community satisfaction with governance** assessment including feedback system effectiveness and responsiveness +- **Democratic participation impact** measuring how community feedback creates positive changes in policies and community experience +- **Community capacity building** evaluation assessing how participation systems support community member skill development and engagement +- **System innovation and improvement** planning for enhanced feedback systems and participation opportunities + +### 8.2 Community-Driven Policy Evolution + +#### 8.2.1 Responsive Policy Development + +**Community-Initiated Policy Changes:** +- **Community proposal processes** enabling members to suggest policy modifications and improvements through structured democratic processes +- **Community prioritization systems** allowing members to identify which policy areas most need attention and improvement +- **Collaborative policy development** involving community members in drafting, reviewing, and refining policy changes +- **Democratic approval processes** ensuring community input and consent for significant policy modifications and new policy development + +**Continuous Improvement Integration:** +- **Policy effectiveness monitoring** with regular community feedback integration and responsive improvement implementation +- **Best practice adoption** incorporating lessons learned from community governance experience and external research +- **Innovation in participation** continuously developing new and improved methods for community engagement and democratic participation +- **Community ownership development** building community members' sense of agency and investment in shared governance and community improvement + +--- + +## Democratic Commitment to Community Voice + +This Community Feedback and Participation Policy represents our fundamental commitment to democratic governance and community self-determination. We believe that community members are the ultimate authorities on their own needs and experiences, and our governance systems must reflect this reality through meaningful participation opportunities and responsive leadership. + +Through this Policy, we pledge to maintain transparent, accessible, and effective systems for community input, ensure that community feedback meaningfully influences decision-making, and continuously improve our democratic processes to better serve our community's evolving needs and priorities. + +--- + +*This Community Feedback and Participation Policy was created on 15 September 2025. For questions about community participation opportunities or to provide feedback on this Policy, please contact our Community Leaders through the designated channels outlined in our Community Code of Conduct.* diff --git a/src/content/docs/community/guide.md b/src/content/docs/community/guide.md index 59a5f3e..cb772c3 100644 --- a/src/content/docs/community/guide.md +++ b/src/content/docs/community/guide.md @@ -1,497 +1,1111 @@ --- -title: Community Guidelines +title: Community Guidelines and Best Practices --- -## 1. Introduction +## 1. Introduction and Framework -Welcome to our community. These guidelines are designed to foster a safe, respectful, and productive environment for all members. While not exhaustive or legally binding, adherence to these principles is strongly encouraged to maintain the integrity and value of our community. +### 1.1 Purpose and Scope -### 1.1. Purpose +These Community Guidelines (hereinafter referred to as "the Guidelines") serve as a comprehensive framework for fostering positive, productive, and meaningful interactions within our community ecosystem. Whilst these Guidelines represent recommended best practices rather than mandatory requirements, adherence to these principles is strongly encouraged and contributes significantly to maintaining the high standards, integrity, and collaborative spirit that define our community. -The purpose of these Community Guidelines is to: +### 1.2 Relationship to Mandatory Policies -1. Promote positive interactions and meaningful discussions -1. Protect the well-being and rights of all community members -1. Maintain a welcoming atmosphere for diverse perspectives and backgrounds +These Guidelines operate in conjunction with and supplement our mandatory Community Code of Conduct. Where any provision of these Guidelines conflicts with our Code of Conduct, the Code of Conduct shall take precedence as the binding standard. Nothing contained within these Guidelines shall supersede, modify, or diminish the requirements established by our Code of Conduct. -### 1.2 Scope +### 1.3 Community Objectives -These guidelines apply to all forms of interaction within our community, including but not limited to: +The primary objectives of these Guidelines are to: +1. **Promote Excellence**: Encourage high-quality contributions and meaningful dialogue +2. **Foster Inclusion**: Create welcoming environments for individuals from diverse backgrounds and experience levels +3. **Facilitate Growth**: Support both individual learning and collective community development +4. **Maintain Standards**: Preserve the professional and collaborative atmosphere that characterises our community +5. **Encourage Participation**: Provide clear guidance for constructive engagement at all levels -- Forum discussions -- Comment sections -- Direct messaging -- Live events or webinars -- Social media interactions associated with our community +### 1.4 Voluntary Nature and Benefits -### 1.3 Encouragement to Participate +Whilst compliance with these Guidelines is voluntary, community members who consistently demonstrate these behaviours typically experience: +- Enhanced reputation and standing within the community +- Improved collaborative relationships with fellow members +- Greater opportunities for meaningful contribution and leadership +- Increased satisfaction and fulfilment from community participation -We highly value your contributions and encourage you to: +## 2. Staff Interaction and Professional Relationships -1. Actively engage in discussions and share your knowledge -2. Provide constructive feedback and support to fellow members -3. Report any concerns or violations to the community moderators -4. Suggest improvements to enhance the community experience +### 2.1 Recognition of Voluntary Service -### 1.4 Code of Conduct +Our community staff members, including moderators, administrators, and support personnel, generously volunteer their time, expertise, and energy to maintain safe, welcoming, and productive community environments. These individuals dedicate significant personal resources to ensure that our community remains accessible, secure, and beneficial for all participants. -While many aspects of our Community Guidelines are recommendations, our Code of Conduct establishes non-negotiable standards that ALL community members MUST adhere to in ALL interactions within our community spaces. +### 2.2 Professional Courtesy and Respect -Nothing in this guide may supercede or overwrite the Code of Conduct. +#### 2.2.1 Fundamental Principles +Community members are encouraged to demonstrate professional courtesy and respect in all interactions with staff by: +- Acknowledging the challenges inherent in moderating online communities +- Recognising that staff members are volunteers balancing community service with personal commitments +- Approaching staff interactions with patience, understanding, and constructive intent +- Expressing gratitude for staff efforts and contributions when appropriate -## 2. Interacting with Staff +#### 2.2.2 Communication Standards +Effective communication with staff members should demonstrate: +- Clear, respectful, and professional language +- Specific descriptions of issues or concerns rather than general complaints +- Constructive suggestions for improvement when raising concerns +- Recognition of resource constraints and competing priorities -Please remember that our staff members generously volunteer their time to help our community remain safe and welcoming. Above all else, be kind to them - moderating online spaces is *hard*, and we don't need to make it harder on them! +### 2.3 Staff Authority and Decision-Making Process -### 2.1 Respect for Authority +#### 2.3.1 Scope of Authority +Staff members are vested with authority to make decisions necessary for maintaining community safety, order, and positive atmosphere. This authority includes, but is not limited to: +- Interpreting and applying community policies and guidelines +- Managing community resources and access permissions +- Addressing conflicts and disciplinary matters +- Implementing changes to improve community operations -Our staff team consists of trusted members empowered with tools to maintain community safety and harmony. While they strive for fairness and consistency, it's important to recognize their human nature and the potential for occasional errors. +#### 2.3.2 Recognition of Human Limitations +Community members should recognise that staff members, being human, may occasionally: +- Make decisions that appear inconsistent or questionable +- Experience variations in judgement due to personal circumstances +- Require additional information to make fully informed decisions +- Benefit from constructive feedback and alternative perspectives -### 2.2 Dispute Resolution Process +### 2.4 Dispute Resolution and Appeals Process -If you believe a staff decision was made in error or in bad faith, we encourage you to follow these steps: +#### 2.4.1 Constructive Approach to Disagreements +When community members disagree with staff decisions, the recommended approach includes: -1. Refrain from direct argumentation or confrontation with staff members. -2. Document the incident, including relevant details and any supporting evidence. -3. Submit an appeal through our official [appeal form](/community/appeal). +1. **Pause and Reflect**: Allow time for emotional responses to subside before responding +2. **Gather Information**: Collect relevant facts, documentation, and context +3. **Consider Alternative Perspectives**: Attempt to understand the rationale behind staff decisions +4. **Document Concerns**: Prepare clear, factual descriptions of specific issues -### 2.3 Appeal Process +#### 2.4.2 Inappropriate Response Patterns +Community members should avoid the following counterproductive behaviours: +- Direct confrontation or argumentative challenges to staff authority +- Public criticism or undermining of staff decisions +- Emotional outbursts or personal attacks directed at staff members +- Demands for immediate resolution without allowing adequate consideration time + +#### 2.4.3 Formal Appeals Process Reference + +**IMPORTANT: Comprehensive appeals procedures, including confidential review processes, impartial assessment protocols, and accessibility standards, are set forth in our dedicated [Appeals Process](/community/appeal) document.** -- Appeals are reviewed by Naomi, who has exclusive access to the submission form. -- All appeals will be treated confidentially and impartially. -- Information from submissions will only be shared on a need-to-know basis to investigate and resolve the issue. -- Your identity will be protected; any revealed submission information will not be associated with your name. +For situations where informal resolution is insufficient, our formal appeals process provides independent, confidential review with fair consideration of all perspectives and transparent communication of outcomes. + +### 2.6 Post-Sanction Conduct and Improvement + +#### 2.6.1 Constructive Response to Disciplinary Actions +Community members who receive disciplinary sanctions are encouraged to: + +**Positive Actions:** +- Discontinue the behaviour that resulted in sanction immediately +- Reflect thoughtfully on the circumstances that led to the disciplinary action +- Engage with educational resources or guidance provided by staff +- Demonstrate genuine commitment to behaviour modification and improvement +- Maintain respectful, professional demeanour in all subsequent interactions +- Focus on contributing positively to community discussions and activities -### 2.4 Staff Accountability +#### 2.6.2 Counterproductive Response Patterns +Community members should avoid the following behaviours following disciplinary actions: +- Continuing the sanctioned behaviour in modified or disguised forms +- Attempting to circumvent policies through technical loopholes or creative interpretations +- Making passive-aggressive comments about community policies, staff decisions, or disciplinary actions +- Engaging in comparative arguments about other members' conduct or perceived inconsistencies +- Displaying resentment, hostility, or non-cooperation with staff or community standards + +#### 2.6.3 Growth and Learning Opportunities +Disciplinary situations, whilst challenging, offer opportunities for: +- Personal growth and improved self-awareness +- Enhanced understanding of community standards and expectations +- Development of better communication and interaction skills +- Demonstration of resilience and commitment to community values + +## 3. Plural Systems Support and Inclusivity + +### 3.1 Understanding and Recognition + +#### 3.1.1 Definitions and Concepts +Plural systems refer to individuals who experience multiple distinct identities, personality states, or conscious entities sharing a single physical body. These identities, commonly referred to as "alters," "headmates," or "system members," may have different names, preferences, communication styles, and roles within the system's functioning. + +#### 3.1.2 Community Commitment to Inclusion +Our community explicitly recognises, values, and supports plural systems as full and equal members. We are committed to: +- Creating safe, welcoming environments for all system members +- Respecting the autonomy and validity of plural experiences +- Supporting system members' right to self-identification and expression +- Promoting understanding and acceptance throughout our community + +### 3.2 Respectful Interaction Guidelines + +#### 3.2.1 Privacy and Boundaries +Community members should demonstrate respect for plural systems by: +- **Respecting Privacy**: Never pressuring systems to disclose information about their plurality, individual alters, or system dynamics +- **Honouring Boundaries**: Accepting the level of information systems choose to share without requesting additional details +- **Avoiding Assumptions**: Not making judgements about system validity, formation, or functioning based on limited information +- **Supporting Autonomy**: Recognising systems' right to manage their own disclosure and participation decisions + +#### 3.2.2 Prohibited Behaviours +**Reference to Comprehensive Policies**: Detailed harassment definitions, prohibited behaviors, and enforcement procedures are comprehensively covered in our Acceptable Use Policy and Content and Moderation Policy, which are incorporated herein by reference. + +Additional community-specific inappropriate behaviours include: +- Attempting to identify which alter is "fronting" (actively controlling the body) without permission +- Using plural-related proxying services to impersonate or mock plural experiences +- Questioning the legitimacy or validity of someone's plural identity +- Making unsolicited comments about the causes or origins of plurality +- Offering unwanted advice about system management or integration + +### 3.3 Communication Best Practices + +#### 3.3.1 Appropriate Addressing and Recognition +When interacting with plural systems: +- **Use Preferred Names and Pronouns**: Address individual alters by their chosen names and pronouns when known +- **Ask for Clarification Respectfully**: If uncertain about how to address someone, politely request guidance +- **Adapt to Communication Styles**: Recognise that different alters may have distinct communication preferences and styles +- **Maintain Consistency**: Remember and apply individual preferences across interactions when possible + +#### 3.3.2 Switching and Communication Changes +Community members should understand that: +- Different alters may participate in conversations at different times (switching) +- Communication styles, interests, or responses may change when different alters are active +- Systems may need time to communicate internally or may experience communication delays +- Patience and flexibility enhance positive interactions with plural community members + +### 3.4 Educational Approach and Community Development + +#### 3.4.1 Promoting Understanding +Our community encourages education about plurality through: +- Sharing of appropriate educational resources and information +- Respectful dialogue about plural experiences when welcomed by system members +- Community-wide initiatives to increase awareness and acceptance +- Training for staff members on inclusive practices for plural individuals + +#### 3.4.2 Resource Direction and Support +Rather than placing educational burdens on individual systems: +- Direct general questions about plurality to appropriate educational resources +- Consult established literature, organisations, or informational websites +- Participate in community educational initiatives when available +- Seek information from systems only when they have explicitly welcomed such inquiries + +## 4. Tone Tags and Communication Enhancement + +### 4.1 Understanding Tone Tags and Their Purpose + +#### 4.1.1 Communication Challenges in Text-Based Environments +Text-based communication inherently lacks many contextual cues available in face-to-face interaction, including: +- Vocal tone, inflection, and emphasis +- Facial expressions and body language +- Timing, pacing, and conversational rhythm +- Environmental context and situational awareness + +These limitations frequently lead to misunderstandings, misinterpretations, and unnecessary conflicts within online communities. + +#### 4.1.2 Solution: Tone Tags as Communication Tools +Tone tags represent a systematic approach to addressing these communication challenges by providing explicit contextual information about the intended tone, purpose, or emotional content of messages. These brief, standardised indicators help clarify intent and reduce misunderstandings. + +### 4.2 Strategic Application of Tone Tags + +#### 4.2.1 Optimal Usage Scenarios +Consider implementing tone tags in the following circumstances: +- **Ambiguous Content**: Messages that could reasonably be interpreted in multiple ways +- **Humour and Sarcasm**: Content intended as humorous, sarcastic, or ironic that might not be immediately apparent +- **Sensitive Topics**: Discussions involving potentially controversial, emotional, or triggering subject matter +- **Cross-Cultural Communication**: Interactions with individuals from different cultural or linguistic backgrounds +- **Accessibility Needs**: Communication with individuals who have expressed difficulty interpreting textual tone + +#### 4.2.2 Preventive Communication Strategy +Proactive use of tone tags can prevent: +- Escalation of minor misunderstandings into significant conflicts +- Emotional distress caused by misinterpretation of intent +- Time-consuming clarification discussions +- Damage to relationships and community trust + +### 4.3 Implementation Guidelines and Best Practices + +#### 4.3.1 Formatting and Placement Standards +Effective tone tag implementation involves: +- **Location**: Place tone tags at the end of the relevant message or section +- **Format**: Enclose tags in forward slashes, e.g., `/j` for joking +- **Multiple Tags**: Use multiple tags when appropriate, e.g., `/s /lh` for sarcastic but lighthearted +- **Consistency**: Apply tags consistently across similar communication contexts + +#### 4.3.2 Comprehensive Tone Tag Reference + +| Tag | Meaning | Usage Context | +|------------------------|--------------------------------------|--------------------------------------------------| +| `/aff` | Affectionate | Expressing care, warmth, or fondness | +| `/apa` | Apathetic | Indicating disinterest or emotional neutrality | +| `/b` | Bitter | Conveying resentment or cynical perspective | +| `/cel` | Celebratory | Expressing joy, excitement, or congratulation | +| `/ci` | Caring Intent | Showing concern or supportive intention | +| `/cj` | Coping Joke | Humour used to manage difficult situations | +| `/co` or `/cf` | Comforting | Offering support, reassurance, or consolation | +| `/ex` | Exaggeration | Indicating deliberate overstatement | +| `/f` | Fake | Marking content as fabricated or fictional | +| `/fam` | Familial | Expressing family-like affection or connection | +| `/fex` | For Example | Introducing illustrative examples | +| `/gen` or `/g` | Genuine | Indicating sincere, authentic communication | +| `/genq` or `/gq` | Genuine Question | Marking questions as sincere inquiries | +| `/gens` or `/gs` | Genuine Suggestion | Offering authentic, helpful recommendations | +| `/hj` | Half Joking | Partially humorous, partially serious content | +| `/hyp` | Hyperbole | Indicating deliberate dramatic exaggeration | +| `/ij` | Inside Joke | Referencing shared humour or experiences | +| `/info` | Information | Providing factual or educational content | +| `/j` | Joking | Indicating humorous intent | +| `/jov` | Jokingly Overreacting | Humorous exaggeration of emotional response | +| `/l`, `/ly` or `/lyr` | Lyrics | Quoting or referencing song lyrics | +| `/lh` | Lighthearted | Maintaining casual, non-serious tone | +| `/li` or `/lit` | Literally | Indicating literal rather than figurative meaning | +| `/lu` | Little Upset | Expressing mild disappointment or frustration | +| `/m` | Metaphorically | Using figurative or symbolic language | +| `/md` | Melodramatic | Indicating theatrical or exaggerated emotion | +| `/nav` | Not A Vent | Clarifying content is not emotional venting | +| `/nay` | Not At You | Directing comments away from specific individuals | +| `/nbh` | Nobody Here | Vague venting not directed at present individuals | +| `/nbr` | Not Being Rude | Clarifying intent to avoid perceived hostility | +| `/nc` or `/neg` | Negative Connotation | Indicating critical or disapproving tone | +| `/ncm` | Not Comparing | Avoiding comparative judgements | +| `/neu` | Neutral Connotation | Maintaining emotionally neutral tone | +| `/nf` | Not Forced | Indicating voluntary rather than pressured action | +| `/nm` | Not Mad | Clarifying absence of anger or upset | +| `/np` | No Pressure | Removing obligation or expectation | +| `/npa` | Not Passive Aggressive | Clarifying direct rather than indirect communication | +| `/nsx` or `/nx` | Non Sexual Intent | Clarifying platonic rather than romantic meaning | +| `/ny` | Not Yelling | Indicating emphasis rather than anger | +| `/op` | Optional | Marking suggestions as non-mandatory | +| `/ot` | Off Topic | Acknowledging deviation from main discussion | +| `/p` or `/plat` | Platonic | Indicating friendship rather than romantic interest | +| `/pc` or `/pos` | Positive Connotation | Expressing approval or supportive perspective | +| `/q` | Quote | Referencing external sources or statements | +| `/ref` | Reference | Alluding to shared cultural or contextual knowledge | +| `/rh`, `/rt` or `/rhq` | Rhetorical Question | Posing questions for effect rather than answers | +| `/s` or `/sar` | Sarcastic | Employing ironic or mocking humour | +| `/srs` | Serious | Indicating sincere, non-humorous intent | +| `/sym` | Sympathetic | Expressing understanding and emotional support | +| `/t` | Teasing | Engaging in playful, non-malicious mockery | +| `/tc`, `/ti` or `/tic` | Typing a Tic | Indicating involuntary typing behaviour | + +### 4.4 Community Etiquette and Respect + +#### 4.4.1 Respectful Response to Tone Tags +Community members should demonstrate respect for tone tag usage by: +- **Interpreting Appropriately**: Adjust message interpretation based on provided tone tags +- **Seeking Clarification**: Politely request explanation for unfamiliar or unclear tags +- **Avoiding Mockery**: Never belittle, mock, or criticise others for using tone tags +- **Supporting Usage**: Encourage tone tag adoption when it would enhance communication + +#### 4.4.2 Accessibility and Inclusion Benefits +Tone tags particularly benefit: +- **Neurodivergent Individuals**: People who may experience difficulty interpreting social cues or implied meanings +- **Non-Native Speakers**: Individuals for whom English cultural and linguistic nuances may be challenging +- **Screen Reader Users**: People using assistive technology who can access tone tag information +- **Anxiety-Prone Communicators**: Individuals who benefit from explicit clarification of intent + +### 4.5 Limitations and Complementary Practices + +#### 4.5.1 Recognising Tool Limitations +Whilst tone tags enhance communication, they should not replace: +- Clear, well-structured writing +- Thoughtful consideration of audience and context +- Direct communication when clarity is essential +- Professional writing standards in formal contexts + +#### 4.5.2 Community-Specific Adaptations +Our community may develop additional tone tags to address specific needs: +- **Community Consensus**: New tags adopted through collective agreement and usage +- **Documentation Updates**: Regular updates to tone tag references and guidelines +- **Cultural Evolution**: Adaptation to emerging communication patterns and community needs + +## 5. Pronoun Usage and Gender Inclusivity + +### 5.1 Importance of Accurate Pronoun Usage + +#### 5.1.1 Fundamental Principle of Respect +Pronouns represent a fundamental aspect of personal identity and self-expression. Using individuals' correct pronouns demonstrates basic respect for their identity and contributes to creating inclusive environments where all community members can participate authentically and comfortably. + +#### 5.1.2 Community Values and Commitment +Our community is committed to: +- **Universal Respect**: Treating all gender identities with equal dignity and consideration +- **Inclusive Practices**: Implementing systems and practices that accommodate diverse pronoun preferences +- **Educational Support**: Providing resources and guidance to help community members learn inclusive practices +- **Safe Expression**: Creating environments where individuals feel secure expressing their authentic identities + +### 5.2 Pronoun Sharing and Display + +#### 5.2.1 Encouraging Universal Participation +We strongly encourage all community members to display their pronouns regardless of gender identity through: +- **Profile Information**: Including pronouns in bio sections and profile descriptions +- **Platform Features**: Utilising designated pronoun roles, badges, or comparable features when available +- **Display Names**: Incorporating pronouns into usernames or display names when desired +- **Signature Lines**: Adding pronouns to forum signatures or communication templates + +#### 5.2.2 Benefits of Universal Pronoun Sharing +Universal pronoun sharing creates numerous community benefits: + +**Individual Benefits:** +- **Clear Communication**: Eliminates guesswork and potential misgendering +- **Personal Comfort**: Reduces anxiety about gender assumptions and corrections +- **Authentic Expression**: Enables individuals to present their true identities confidently + +**Community Benefits:** +- **Normalisation**: Makes pronoun sharing routine rather than exceptional +- **Inclusivity**: Creates welcoming environments for transgender and non-binary individuals +- **Education**: Raises awareness about gender diversity and respectful practices +- **Safety**: Reduces the risk of inadvertent outing or identity disclosure + +### 5.3 Respectful Pronoun Practices + +#### 5.3.1 Consistent Usage Standards +Community members should consistently: +- **Use Specified Pronouns**: Always employ the pronouns individuals have indicated for themselves +- **Ask When Uncertain**: Politely request pronoun information when it is not readily available +- **Correct Mistakes Promptly**: Acknowledge errors briefly, correct usage, and continue conversations +- **Avoid Assumptions**: Never assume pronouns based on appearance, name, or other characteristics + +#### 5.3.2 Error Correction Protocol +When pronoun mistakes occur: + +**For the Person Making the Error:** +1. **Acknowledge Briefly**: A simple "sorry" or "my mistake" is sufficient +2. **Correct Immediately**: Use the correct pronoun in your next reference +3. **Move Forward**: Don't over-apologise or create unnecessary attention +4. **Learn for Future**: Remember the correct pronouns for ongoing interactions + +**For the Person Witnessing Errors:** +1. **Gentle Correction**: Provide quiet, non-confrontational correction when appropriate +2. **Support the Individual**: Check privately with misgendered individuals if they need support +3. **Avoid Public Scenes**: Don't create dramatic confrontations over honest mistakes + +### 5.4 Diverse Pronoun Options and Recognition + +#### 5.4.1 Comprehensive Pronoun Spectrum +Community members may use various pronoun sets including: + +**Traditional Pronouns:** +- She/her/hers: Commonly used by individuals who identify as female +- He/him/his: Commonly used by individuals who identify as male +- They/them/theirs: Singular usage for individuals who identify as non-binary or prefer gender-neutral language + +**Neopronouns:** +- Xe/xem/xyr: Alternative gender-neutral pronouns +- Ze/zir/zirs: Additional neo-pronoun options +- Fae/faer/faers: Nature-inspired pronoun alternatives +- Custom pronouns: Individually created or preferred alternatives + +**Special Considerations:** +- Any pronouns: Individuals comfortable with any pronoun usage +- Name only: People who prefer their name used instead of pronouns +- Multiple sets: Individuals who use different pronouns in different contexts + +#### 5.4.2 Evolving and Changing Pronouns +Community members should understand that: +- **Pronouns May Change**: Individuals have the right to modify their pronouns at any time +- **Historical Accuracy**: Always use current pronouns, even when discussing past events +- **No Explanation Required**: Pronoun changes do not require justification or detailed explanation +- **Immediate Implementation**: Begin using new pronouns as soon as you become aware of changes + +### 5.5 Community Support and Education + +#### 5.5.1 Creating Learning Opportunities +Our community supports pronoun education through: +- **Resource Sharing**: Providing educational materials about gender identity and pronoun usage +- **Community Discussion**: Facilitating respectful conversations about inclusive practices +- **Mentorship Programs**: Connecting experienced community members with newcomers learning inclusive practices +- **Regular Updates**: Sharing information about evolving best practices and community standards + +#### 5.5.2 Addressing Challenges and Resistance +When community members experience difficulty with pronoun usage: +- **Educational Approach**: Provide patient education and resources rather than immediate punishment +- **Cultural Sensitivity**: Acknowledge different cultural backgrounds whilst maintaining community standards +- **Progressive Improvement**: Recognise that learning takes time and celebrate progress over perfection +- **Clear Boundaries**: Maintain firm standards whilst providing supportive learning environments + +### 5.6 Privacy and Consent Considerations + +#### 5.6.1 Voluntary Disclosure +Whilst pronoun sharing is strongly encouraged, community members should understand that: +- **Personal Choice**: Pronoun sharing remains ultimately voluntary and personal +- **No Pressure**: Never pressure individuals to disclose pronouns if they are uncomfortable doing so +- **Privacy Respect**: Some individuals may have complex reasons for not sharing pronouns publicly +- **Alternative Solutions**: Find respectful ways to communicate without pronouns when necessary + +#### 5.6.2 Confidentiality and Safety +In certain circumstances, pronoun information may require confidential handling: +- **Safety Concerns**: Some individuals may face risk if their gender identity becomes widely known +- **Professional Contexts**: Workplace or academic situations may require careful navigation +- **Family Situations**: Not all individuals have supportive family environments for identity expression +- **Geographic Considerations**: Legal and cultural climates vary significantly across regions + +## 6. Accessibility and Universal Design + +### 6.1 Commitment to Accessibility + +#### 6.1.1 Foundational Principles +Our community is committed to ensuring that all members, regardless of disability status or access needs, can participate fully and meaningfully in all community activities, discussions, and opportunities. This commitment reflects our core values of inclusion, equality, and universal respect for human dignity. + +#### 6.1.2 Universal Design Philosophy +We embrace universal design principles that recognise accessibility benefits extend beyond individuals with specific disabilities: +- **Broader Benefits**: Accessible content is easier for everyone to consume and understand +- **Future-Proofing**: Accessible practices accommodate evolving technology and changing needs +- **Inclusive Culture**: Accessibility awareness creates more thoughtful, inclusive community culture +- **Innovation Driver**: Accessibility requirements often lead to creative solutions that benefit all users + +### 6.2 Visual Content and Alternative Text + +#### 6.2.1 Alternative Text Requirements and Best Practices +All visual content shared within our community should include descriptive alternative text to ensure accessibility for screen reader users and individuals who cannot view images directly. + +**Comprehensive Alt Text Guidelines:** + +**Descriptive Content:** +- Describe the essential visual elements that convey meaning or context +- Include relevant details about setting, characters, objects, or activities depicted +- Mention colours, spatial relationships, and visual composition when relevant to understanding + +**Text Content:** +- Transcribe any text visible within images completely and accurately +- Include text from signs, captions, labels, or written materials +- Describe text formatting (bold, italic, etc.) when it conveys additional meaning + +**Emotional and Artistic Content:** +- Describe mood, atmosphere, or emotional tone when relevant +- Include artistic style, composition, or aesthetic elements that contribute to meaning +- Mention facial expressions, body language, or other emotion-conveying elements + +**Examples of Effective Alt Text:** +- Instead of: "meme" or "funny picture" +- Use: "A photograph of a golden retriever wearing sunglasses sitting at a computer desk, with text reading 'When you finally understand the assignment' in bold white letters" + +#### 6.2.2 Context-Appropriate Description +Effective alternative text considers: +- **Audience Needs**: What information do viewers need to understand the content's purpose? +- **Context Relevance**: How does the image relate to the surrounding discussion or content? +- **Essential Information**: Which visual elements are crucial for comprehension versus decorative? + +### 6.3 Content Structure and Navigation + +#### 6.3.1 Hierarchical Organisation +Well-structured content enhances accessibility and usability for all community members: + +**Heading Structure:** +- Use proper heading hierarchy (H1, H2, H3, etc.) to create logical content organisation +- Ensure headings accurately describe the content that follows +- Avoid skipping heading levels or using headings purely for visual formatting -We are committed to maintaining high standards of conduct for our staff. Any substantiated claims of misconduct or abuse of power will be addressed promptly and appropriately. +**Content Organisation:** +- Break lengthy text into digestible paragraphs and sections +- Use bullet points, numbered lists, or other organisational tools for complex information +- Group related information together under appropriate headings -### 2.5 Continuous Improvement +#### 6.3.2 Link and Navigation Standards +Accessible navigation requires: + +**Descriptive Link Text:** +- Use link text that clearly indicates the destination or purpose +- Avoid generic phrases like "click here," "read more," or "this link" +- Include context that helps users understand what they'll find at the destination + +**Examples:** +- Instead of: "Click here for more information" +- Use: "View our upcoming community events and registration details" + +### 6.4 Multimedia Content Accessibility + +#### 6.4.1 Video Content Requirements +Video content shared within our community should include: + +**Captions and Subtitles:** +- Accurate transcription of all spoken content +- Description of relevant sound effects, music, or audio cues +- Speaker identification when multiple people are present +- Timing synchronisation between audio and text -We value your feedback on our moderation processes. If you have suggestions for improving our systems or policies, please submit them through the appropriate channels. +**Audio Descriptions:** +- Narration of visual content not conveyed through dialogue +- Description of actions, settings, facial expressions, and visual information +- Integration that doesn't interfere with original audio content + +#### 6.4.2 Audio Content Support +Audio-only content benefits from: +- **Complete Transcripts**: Full text versions of audio content +- **Chapter Markers**: Time-stamped section indicators for easy navigation +- **Content Summaries**: Brief descriptions of audio content for quick reference -### 2.6 Responding to Sanctions +### 6.5 Sensitive Content and Seizure Prevention -If you receive a sanction, here are tips on how to avoid further moderation action: +#### 6.5.1 Flashing and Moving Content +To protect individuals with photosensitive epilepsy and other conditions: +- **Avoid Rapid Flashing**: Never share content that flashes more than three times per second +- **Provide Warnings**: Include clear warnings before sharing potentially problematic content +- **Alternative Formats**: Offer still images or descriptions as alternatives when possible -- Do not continue the behaviour -- Do not attempt to continue the behaviour in a slightly modified way, such as to avoid a specific component of our policies -- Do not make passive-aggressive comments about our policies, staff, or your sanction -- Do not try to justify your behaviour by comparing it to another user's that was not sanctioned -- Do try to learn from the sanction and improve your interactions -- Do keep an open mind and try to learn -- Do be the kindest you can be +#### 6.5.2 Content Warnings and Preparation +Comprehensive content warnings help individuals prepare for or avoid potentially harmful content: +- **Specific Descriptions**: Provide clear, specific information about content nature +- **Placement**: Position warnings before the potentially problematic content +- **Multiple Formats**: Use both text warnings and visual indicators when appropriate -## 3. Plural Systems +### 6.6 Community Support and Continuous Improvement -### 3.1 Understanding Plurality +#### 6.6.1 Feedback and Enhancement +Our commitment to accessibility includes: +- **Community Input**: Welcoming feedback on accessibility barriers and improvement opportunities +- **Regular Assessment**: Periodic review of accessibility practices and their effectiveness +- **Resource Sharing**: Providing tools, guides, and educational materials about accessibility +- **Collaborative Improvement**: Working together to identify and address accessibility challenges -Plural systems refer to individuals who experience the presence of two or more distinct identities or personality states, often called alters. Our community recognizes and respects the existence of plural systems. +#### 6.6.2 Education and Awareness +Building accessibility awareness throughout our community involves: +- **Training Opportunities**: Offering education about disability awareness and inclusive practices +- **Resource Development**: Creating guides and tools to support accessible content creation +- **Cultural Change**: Fostering community norms that prioritise accessibility and inclusion +- **Recognition Programs**: Celebrating community members who demonstrate exceptional commitment to accessibility -### 3.2 Inclusivity and Respect +## 7. Content Warnings and Trauma-Informed Practices + +### 7.1 Trauma-Informed Community Approach -1. Plural systems are fully welcome and valued members of our community. -2. We are committed to providing a safe and supportive environment for all system members. -3. Discrimination or harassment based on plurality is strictly prohibited. +#### 7.1.1 Understanding Trauma Impact +Our community recognises that many individuals have experienced various forms of trauma, and exposure to related content can cause significant distress, trigger harmful memories, or impact mental health. Content warnings represent our commitment to trauma-informed practices that prioritise community member safety and well-being. + +#### 7.1.2 Community Safety Framework +Content warnings contribute to community safety by: +- **Informed Consent**: Enabling individuals to make educated decisions about content engagement +- **Risk Reduction**: Minimising unintentional exposure to potentially harmful content +- **Control and Agency**: Providing individuals with control over their content consumption +- **Inclusive Environment**: Creating spaces where trauma survivors can participate safely + +### 7.2 Content Warning Requirements Reference + +**IMPORTANT: Comprehensive content warning requirements, including mandatory categories, enforcement procedures, and compliance standards, are set forth in our Content and Moderation Policy, which is incorporated herein by reference.** -### 3.3 Privacy and Boundaries +#### 7.2.1 Community-Specific Guidance -1. Respect the privacy of plural systems and their individual alters. -2. Do not pressure or attempt to coerce any system or alter to reveal information they are not comfortable sharing. -3. Refrain from trying to identify which alter is fronting or using a platform's plural proxying service. +Content warnings are **mandatory** across all community spaces. Key community-specific considerations include: -### 3.4 Self-Disclosure +- **Universal Application**: All community members must comply with content warning requirements as detailed in our Content and Moderation Policy +- **Community Context**: Apply content warning standards thoughtfully within the context of community discussions and interactions +- **Educational Support**: Community members are encouraged to support one another in learning and applying content warning practices + +### 7.4 Effective Warning Implementation + +#### 7.4.1 Warning Format and Placement +Effective content warnings should: + +**Placement and Visibility:** +- Appear at the beginning of posts, messages, or content +- Use clear, prominent formatting that draws attention +- Be placed before any potentially triggering content appears + +**Language and Specificity:** +- Use specific, descriptive language rather than vague warnings +- Clearly indicate the nature and intensity of content +- Provide enough detail for informed decision-making without being triggering themselves + +**Format Examples:** +- "Content Warning: Detailed discussion of eating disorder behaviours" +- "CW: Graphic descriptions of physical violence" +- "Trigger Warning: References to sexual assault and trauma recovery" + +#### 7.4.2 Spoiler Tags and Content Hiding +When platform features allow: +- Use spoiler tags, content hiding, or "read more" cuts to conceal potentially triggering content +- Combine warnings with hiding mechanisms for maximum protection +- Ensure warnings remain visible even when content is hidden + +### 7.5 Community Response and Support + +#### 7.5.1 Respectful Responses to Warnings +Community members should demonstrate respect for content warning practices by: +- **Taking Warnings Seriously**: Never mock, dismiss, or minimise the importance of content warnings +- **Individual Needs Recognition**: Understanding that warning needs vary among individuals +- **Gracious Compliance**: Accepting requests for additional warnings without defensiveness +- **Supportive Behaviour**: Encouraging and normalising content warning usage + +#### 7.5.2 Appropriate Challenge and Discussion +While respecting content warnings, community members may: +- **Request Clarification**: Ask for more specific warnings when needed +- **Suggest Improvements**: Offer constructive feedback about warning effectiveness +- **Share Resources**: Provide educational materials about trauma-informed practices +- **Model Best Practices**: Demonstrate excellent content warning usage for others to follow + +### 7.6 Enforcement Reference + +**IMPORTANT: Comprehensive enforcement procedures for content warning violations, including response protocols, disciplinary measures, and appeals processes, are set forth in our Content and Moderation Policy, which is incorporated herein by reference.** + +#### 7.6.1 Community Education and Support +Our community commitment to content warning compliance includes: +- **Peer Support**: Community members helping one another learn and apply content warning practices +- **Educational Approach**: Emphasis on learning and improvement rather than punishment when possible +- **Resource Sharing**: Collaborative development of tools and guides for effective content warning usage + +## 8. Conflict Resolution and Mediation + +### 8.1 Philosophy of Constructive Conflict Management + +#### 8.1.1 Conflict as Natural Community Element +Conflicts, disagreements, and differences of opinion represent natural and inevitable aspects of any vibrant, diverse community. Rather than viewing conflict as inherently negative or destructive, our community approaches disagreements as opportunities for growth, learning, and strengthened relationships when handled constructively. + +#### 8.1.2 Restorative Justice Principles +Our conflict resolution approach emphasises: +- **Relationship Repair**: Focus on healing and strengthening community relationships +- **Mutual Understanding**: Encouraging empathy and perspective-taking among conflicting parties +- **Learning Opportunities**: Using conflicts as chances for personal and community growth +- **Collaborative Solutions**: Seeking win-win outcomes that address underlying needs and concerns +- **Community Strengthening**: Leveraging conflict resolution to build more resilient community bonds + +### 8.2 Foundational Principles for Constructive Engagement + +#### 8.2.1 Core Engagement Standards +All community members engaged in conflict resolution should demonstrate: + +**Respect and Human Dignity:** +- Treat all parties with courtesy and respect, even during disagreement +- Separate individual worth from specific behaviours or positions +- Acknowledge the humanity and valid experiences of all involved parties +- Maintain professional, civil communication throughout the process + +**Good Faith Participation:** +- Assume positive intent unless clearly demonstrated otherwise +- Approach conflicts with genuine desire for resolution rather than victory +- Remain open to new information, perspectives, and potential compromise +- Engage with honest self-reflection and willingness to accept responsibility + +**Focus and Constructiveness:** +- Address specific behaviours, actions, or policies rather than personal character attacks +- Concentrate on issues within the scope of community standards and values +- Offer constructive suggestions and alternative approaches when raising concerns +- Avoid inflammatory language, generalizations, or escalatory rhetoric + +### 8.3 Self-Directed Resolution Process + +#### 8.3.1 Direct Communication Framework +The preferred first step in conflict resolution involves direct communication between affected parties: + +**Preparation Phase:** +1. **Emotional Regulation**: Ensure emotional readiness for productive conversation +2. **Issue Identification**: Clearly identify specific concerns and desired outcomes +3. **Perspective Consideration**: Attempt to understand potential alternative viewpoints +4. **Communication Planning**: Prepare clear, respectful language for expressing concerns + +**Communication Execution:** +1. **Private Setting**: Initiate conversations through private messages or appropriate channels +2. **Respectful Language**: Use "I" statements and focus on specific behaviours or impacts +3. **Active Listening**: Listen genuinely to responses and alternative perspectives +4. **Solution Orientation**: Focus on finding mutually acceptable solutions + +**Example Framework:** +- "I felt uncomfortable when [specific behaviour] occurred because [specific impact]" +- "I understand you might have intended [acknowledged intent], but the impact was [specific effect]" +- "I would appreciate if we could [specific request for change] in future interactions" + +#### 8.3.2 Cooling-Down Period Management +When emotions run high or productive communication becomes difficult: + +**Recognition Signs:** +- Increasing emotional intensity or defensive responses +- Circular arguments without progress toward resolution +- Personal attacks or escalatory language +- Diminishing ability to listen or consider alternative perspectives + +**Cooling-Down Strategies:** +- **Temporary Pause**: Agree to pause the conversation and return when emotions have settled +- **Reflection Time**: Use break periods for self-reflection on personal contributions to the conflict +- **Perspective-Taking**: Consider the situation from other parties' viewpoints during the pause +- **Solution Focus**: Return to discussions with renewed focus on collaborative problem-solving + +### 8.4 Community-Supported Mediation + +#### 8.4.1 Third-Party Mediation Process +When direct communication fails to resolve conflicts, community-supported mediation offers structured assistance: + +**Mediator Selection:** +- Choose neutral community members acceptable to all parties +- Select individuals with demonstrated fairness, discretion, and conflict resolution skills +- Ensure mediators have no direct stake in the conflict outcome +- Confirm all parties agree to accept the chosen mediator + +**Mediation Structure:** +- **Preparation**: Mediator meets with each party separately to understand perspectives +- **Joint Discussion**: Facilitated conversation with all parties present +- **Issue Clarification**: Systematic identification and exploration of core concerns +- **Solution Development**: Collaborative generation of potential solutions +- **Agreement Formation**: Development of specific, actionable resolution agreements + +#### 8.4.2 Mediator Responsibilities and Guidelines +Community members serving as mediators should: +- **Maintain Neutrality**: Avoid taking sides or advocating for specific outcomes +- **Facilitate Communication**: Help parties express themselves clearly and listen effectively +- **Encourage Understanding**: Promote empathy and perspective-taking among parties +- **Focus on Solutions**: Guide discussions toward constructive problem-solving +- **Respect Confidentiality**: Maintain privacy about mediation discussions unless agreed otherwise + +### 8.5 Staff Intervention and Escalation + +#### 8.5.1 Appropriate Escalation Triggers +Community members should involve staff moderators when conflicts involve: + +**Safety and Harassment Concerns:** +- Any behaviour that makes individuals feel unsafe or threatened +- Harassment, discrimination, or targeted negative behaviour +- Violations of community Code of Conduct or established policies +- Situations where power imbalances prevent fair resolution + +**Community Impact Issues:** +- Conflicts that significantly disrupt broader community discussions or activities +- Public disputes that create uncomfortable atmospheres for other members +- Repeated patterns of conflict involving the same individuals +- Issues that affect community reputation or integrity + +**Resolution Process Failures:** +- Direct communication attempts that have been unsuccessful or counterproductive +- Mediation efforts that have failed to produce acceptable outcomes +- Situations where parties refuse to engage constructively in resolution attempts +- Complex issues requiring specialised knowledge or authority to resolve + +#### 8.5.2 Staff Intervention Protocols +When staff intervention becomes necessary: + +**Assessment and Planning:** +- **Situation Evaluation**: Comprehensive assessment of conflict nature, scope, and impact +- **Stakeholder Identification**: Determination of all affected parties and their perspectives +- **Intervention Strategy**: Development of appropriate response strategy based on conflict characteristics +- **Resource Allocation**: Assignment of appropriate staff members and community resources + +**Resolution Implementation:** +- **Immediate Protection**: Implementation of protective measures when safety concerns exist +- **Investigation Process**: Thorough, impartial examination of facts and circumstances +- **Stakeholder Communication**: Clear, respectful communication with all involved parties +- **Solution Development**: Collaborative development of sustainable, fair resolution approaches + +### 8.6 Appeal and Review Processes + +#### 8.6.1 Dispute Resolution Appeals Reference + +**IMPORTANT: Comprehensive appeals procedures, including appeal grounds, submission processes, and review standards, are set forth in our dedicated [Appeals Process](/community/appeal) document.** + +Community members who disagree with conflict resolution outcomes may access our formal appeals process, which provides independent review of procedural concerns, new evidence, and resolution appropriateness. + +#### 8.6.2 Learning and Improvement Integration +Our conflict resolution system includes mechanisms for continuous improvement: +- **Process Evaluation**: Regular assessment of resolution effectiveness and fairness +- **Community Feedback**: Collection of input from parties who have used resolution processes +- **Best Practice Development**: Evolution of resolution approaches based on experience and outcomes +- **Training Enhancement**: Ongoing education for mediators and community members about effective resolution techniques + +## 9. Community Enjoyment and Well-being + +### 9.1 Fundamental Philosophy: Community as Enjoyable Experience + +#### 9.1.1 Central Principle +Participation in our community should fundamentally be an enjoyable, fulfilling, and positive experience for all members. This principle underlies all other community policies, guidelines, and practices, serving as the ultimate measure of our community's success and health. + +#### 9.1.2 Signs of Healthy Community Engagement +Community members who are having positive experiences typically demonstrate: +- **Enthusiasm**: Genuine excitement about participating in discussions and activities +- **Curiosity**: Interest in learning from others and exploring new ideas or perspectives +- **Generosity**: Willingness to help others and contribute positively to community culture +- **Relaxation**: Ability to engage naturally without excessive stress or anxiety about community interactions +- **Growth**: Development of new skills, knowledge, or relationships through community participation + +### 9.2 Self-Care and Boundary Management + +#### 9.2.1 Recognising the Need for Breaks +Community members are encouraged to recognise when they need distance from community activities: + +**Warning Signs for Break Consideration:** +- Feeling consistently stressed, anxious, or frustrated during community interactions +- Experiencing community participation as obligation rather than choice +- Finding oneself in frequent conflicts or negative interactions with other members +- Losing interest in previously enjoyable community activities or discussions +- Noticing that community participation negatively impacts other areas of life + +#### 9.2.2 Taking Healthy Breaks +When breaks become necessary: + +**Permission and Encouragement:** +- Community members have complete permission to step away for any duration needed +- No explanation or justification is required for taking breaks from community participation +- The community will remain welcoming and accessible upon members' return +- Breaks are viewed as healthy self-care rather than abandonment or failure + +**Effective Break Strategies:** +- **Complete Disconnection**: Fully stepping away from community platforms and discussions +- **Reduced Engagement**: Limiting participation to specific activities or timeframes that feel manageable +- **Read-Only Mode**: Consuming community content without feeling pressure to contribute actively +- **Selective Participation**: Engaging only with specific community areas or topics that remain enjoyable + +#### 9.2.3 Return and Re-engagement +When community members feel ready to return: +- **Gradual Re-engagement**: No pressure to immediately return to previous participation levels +- **Continued Boundary Management**: Ongoing permission to adjust participation as needed +- **Community Support**: Assistance from other members in finding comfortable re-engagement approaches +- **Learning Integration**: Application of insights gained during breaks to enhance future community experience + +### 9.3 Engagement Style Assessment and Adjustment + +#### 9.3.1 Self-Reflection on Interaction Patterns +Community members experiencing consistent dissatisfaction should consider: + +**Interaction Style Evaluation:** +- Are your contributions generally constructive and solution-oriented? +- Do you approach discussions with curiosity and openness to other perspectives? +- Are you contributing to the positive, collaborative atmosphere the community aims to maintain? +- Do your interactions align with the community's values of respect, inclusion, and mutual support? + +**Community Fit Assessment:** +- Does the community's culture and pace match your communication preferences and needs? +- Are you using community spaces in ways that align with their intended purposes? +- Are your expectations for community interaction realistic and appropriate? +- Do you find meaning and satisfaction in the types of activities and discussions the community offers? + +#### 9.3.2 Adjustment and Improvement Strategies +When reflection reveals opportunities for improvement: + +**Communication Style Modifications:** +- Experiment with more collaborative, less adversarial communication approaches +- Practice active listening and genuine engagement with others' perspectives +- Focus contributions on community building and mutual support +- Seek opportunities to help and mentor other community members + +**Expectation Management:** +- Adjust expectations to align with community culture and available resources +- Focus on what you can contribute rather than what you hope to receive +- Appreciate the volunteer nature of community leadership and support systems +- Celebrate small positive interactions rather than expecting dramatic community changes + +### 9.4 Staff-Supported Temporary Restrictions + +#### 9.4.1 Voluntary Temporary Exclusion +For community members who struggle with self-regulated breaks, our staff team offers supportive temporary restrictions: + +**Service Description:** +- Voluntary temporary bans to help members who find themselves unable to step away independently +- Staff-implemented access restrictions that remove the temptation to check or participate +- Predetermined duration or condition-based restoration of access +- Supportive, non-punitive approach focused on member well-being + +**Appropriate Usage Scenarios:** +- Compulsive checking or participation despite wanting to take breaks +- Difficulty maintaining healthy boundaries around community engagement +- Need for external structure to support personal well-being goals +- Temporary life circumstances that require reduced digital engagement + +#### 9.4.2 Request Process and Implementation +Members seeking voluntary temporary restrictions can: + +**Request Procedure:** +- Contact staff members directly through private messages or designated channels +- Specify desired duration or conditions for restriction lifting +- Discuss any special considerations or communication needs during the restriction period +- Provide consent for staff to implement access limitations + +**Staff Response:** +- Respectful, supportive response that treats requests as legitimate self-care +- Implementation of appropriate technical restrictions based on member needs +- Check-in communications at agreed intervals to assess continued need +- Collaborative planning for gradual re-engagement when restrictions end + +### 9.5 Community Culture and Atmosphere Maintenance + +#### 9.5.1 Collective Responsibility for Positive Environment +Creating and maintaining an enjoyable community experience requires collective effort from all members: + +**Individual Contributions:** +- Approach interactions with kindness, patience, and good humour +- Share enthusiasm for community topics and activities +- Support other members' learning and growth +- Celebrate community successes and positive developments +- Contribute to problem-solving rather than problem amplification + +**Community-Wide Practices:** +- Regular celebration of member achievements and contributions +- Inclusive activities that welcome participants at all experience levels +- Constructive handling of challenges and conflicts that arise +- Ongoing evolution of community practices to better serve member needs + +#### 9.5.2 Identifying and Addressing Systemic Issues +When community enjoyment becomes consistently problematic: + +**Issue Recognition:** +- Multiple members reporting similar negative experiences +- Consistent patterns of conflict or dissatisfaction +- Declining participation or enthusiasm among established members +- Feedback indicating community culture issues + +**Systemic Solutions:** +- Community-wide discussions about culture and atmosphere +- Policy reviews and adjustments based on member needs and feedback +- Leadership evaluation and potential changes in approach +- Structural modifications to community organisation or activities + +## 10. Mini-Moderation and Peer Support + +### 10.1 Understanding Mini-Moderation + +#### 10.1.1 Definition and Scope +"Mini-moderation" refers to activities where non-staff community members provide guidance, correction, or support to other members regarding community standards, practices, or norms. This behaviour occupies a middle ground between passive observation and formal moderation authority. + +#### 10.1.2 Community Position on Mini-Moderation +Our community adopts a permissive approach to mini-moderation, recognising its value in creating self-regulating, mutually supportive community environments. However, this permission comes with specific guidelines and limitations to prevent abuse or overreach. + +### 10.2 Acceptable Mini-Moderation Practices + +#### 10.2.1 Constructive Guidance and Support +Appropriate mini-moderation includes: + +**Welcoming and Integration Support:** +- Gently guiding new members toward understanding community norms and expectations +- Providing helpful information about community resources, channels, or practices +- Offering assistance with platform-specific features or navigation +- Sharing educational resources about community policies or inclusive practices + +**Positive Reinforcement and Modelling:** +- Acknowledging and celebrating positive contributions and behaviours +- Demonstrating excellent community practices through personal example +- Encouraging others to engage constructively and inclusively +- Supporting community members who are learning or improving their participation + +**Gentle Correction and Education:** +- Politely suggesting alternative approaches when community members make minor errors +- Providing information about community standards when relevant +- Offering constructive feedback on content or communication style +- Sharing resources that help community members understand expectations + +#### 10.2.2 Appropriate Communication Methods +Effective mini-moderation employs: + +**Respectful Language and Tone:** +- Use encouraging, supportive language rather than authoritative commands +- Offer suggestions ("you might consider...") rather than demands ("you must...") +- Acknowledge positive intent while addressing problematic behaviour +- Express appreciation for willingness to learn and improve + +**Educational Approach:** +- Provide context and reasoning for suggestions rather than bare rules +- Share relevant resources or examples that illustrate better practices +- Encourage questions and discussion rather than demanding compliance +- Focus on community benefit rather than personal authority + +### 10.3 Prohibited Mini-Moderation Behaviours + +#### 10.3.1 Authority Misrepresentation +Community members engaged in mini-moderation must never: + +**False Authority Claims:** +- Represent themselves as official staff members or moderators +- Speak with claimed authority from the NHCarrigan team or leadership +- Issue ultimatums or threats of disciplinary action +- Present personal opinions as official community policy + +**Impersonation and Deception:** +- Use staff-like language or formatting to suggest official status +- Create false impression of special authority or access to staff decisions +- Claim to speak on behalf of the community leadership +- Misrepresent the scope or nature of their community role + +#### 10.3.2 Harmful or Counterproductive Approaches +Inappropriate mini-moderation includes: + +**Public Confrontation and Embarrassment:** +- Calling out community members publicly for policy violations +- Creating scenes or dramatic confrontations about rule infractions +- Embarrassing or shaming individuals for mistakes or misunderstandings +- Engaging in public arguments about community standards or enforcement + +**Aggressive or Hostile Behaviour:** +- Belittling, insulting, or demeaning community members who make mistakes +- Using sarcasm, mockery, or condescending language in corrections +- Escalating situations through argumentative or confrontational responses +- Demonstrating impatience or frustration with members who are learning + +### 10.4 Effective Mini-Moderation Strategies + +#### 10.4.1 Leading by Example +The most effective mini-moderation approach involves: + +**Consistent Positive Behaviour:** +- Demonstrate excellent community practices in your own participation +- Model inclusive, respectful, and constructive communication +- Show how to handle disagreements or conflicts constructively +- Exhibit patience and understanding with community members at all experience levels + +**Proactive Contribution:** +- Contribute positively to discussions and community activities +- Share knowledge and resources generously with other members +- Create welcoming environments for newcomers and less experienced participants +- Celebrate community successes and positive developments + +#### 10.4.2 Supportive Intervention Techniques +When mini-moderation becomes necessary: -1. Systems have the right to disclose information about their alters at their own discretion. -2. Members are encouraged to respect the level of disclosure each system or alter chooses. -3. Unsolicited advice or attempts to "help" without consent are not appropriate. +**Private Communication:** +- Address concerns through direct messages rather than public correction when possible +- Approach individuals with respect and assumption of positive intent +- Provide specific, actionable suggestions for improvement +- Offer ongoing support and encouragement for positive changes + +**Indirect Redirection:** +- Model appropriate behaviour without explicitly correcting others +- Redirect conversations toward constructive directions through your own contributions +- Ask clarifying questions that encourage reflection rather than making direct accusations +- Provide positive alternatives that naturally guide discussions in better directions + +### 10.5 Escalation and Staff Involvement + +#### 10.5.1 Recognising Limits of Mini-Moderation +Community members should recognise when situations require professional staff intervention: + +**Escalation Triggers:** +- Repeated violations despite gentle correction and education +- Behaviour that appears deliberately harmful or disruptive +- Situations involving harassment, discrimination, or safety concerns +- Complex conflicts that require formal mediation or resolution processes +- Issues beyond the scope of peer education and support + +#### 10.5.2 Appropriate Escalation Procedures +When mini-moderation reaches its limits: + +**Discontinue Personal Intervention:** +- Stop attempting to address the situation through peer-to-peer communication +- Avoid escalating conflicts through continued confrontation or argument +- Resist the temptation to "win" arguments or prove points about community standards +- Step back from situations that have become emotionally charged or unproductive + +**Professional Staff Involvement:** +- Report concerning behaviour to community staff through appropriate channels +- Provide factual, objective information about observed issues +- Offer to provide additional information or context if staff request it +- Trust staff to handle situations according to their training and authority + +### 10.6 Community Benefits and Culture Building + +#### 10.6.1 Positive Impact of Effective Mini-Moderation +When conducted appropriately, mini-moderation contributes to: + +**Self-Regulating Community Culture:** +- Reduced burden on volunteer staff members +- Faster response to minor issues and learning opportunities +- Stronger sense of collective responsibility for community health +- More resilient community systems that can handle growth and change + +**Enhanced Learning Environment:** +- Peer-to-peer education that feels more accessible than official correction +- Multiple perspectives and approaches to community participation +- Continuous improvement in community knowledge and practices +- Stronger relationships between community members + +#### 10.6.2 Cultural Reinforcement and Development +Effective mini-moderation helps establish: +- **Norm Reinforcement**: Clear, consistent messaging about community expectations +- **Inclusive Practices**: Support for members learning to participate effectively +- **Collective Ownership**: Shared responsibility for maintaining positive community culture +- **Resilient Systems**: Community ability to maintain standards even during staff absence or transitions + +--- -### 3.5 Communication Guidelines +## Conclusion and Community Commitment + +These Community Guidelines represent our collective commitment to building and maintaining an exceptional online community that serves as a model for inclusive, respectful, and productive collaboration. By following these guidelines, community members contribute to an environment where everyone can learn, grow, and contribute meaningfully to our shared objectives. + +Our community's strength lies not in rigid rule enforcement, but in the voluntary commitment of each member to uphold these standards and support one another in creating positive experiences for all participants. Through consistent application of these principles, we build a community that genuinely benefits all who choose to participate. + +--- -1. Address alters by their preferred names and pronouns when known. -2. If unsure about how to address a system or alter, it's acceptable to politely ask for clarification. -3. Be mindful that switching between alters may result in a difference of communication styles or preferences. - -### 3.6 Education and Awareness - -1. We encourage community-wide education about plurality to foster understanding and inclusivity. -2. Questions about plurality should be directed to appropriate educational resources rather than to individual systems, unless they have explicitly welcomed such inquiries. - -## 4. Tone Tags - -### 4.1 Purpose of Tone Tags - -In text-based communication, the nuances of tone and intention can often be lost, leading to potential misunderstandings. To address this limitation, we encourage the use of tone tags. These tags provide additional context to messages, helping to clarify the intended tone and reduce misinterpretations. - -### 4.2 When to Use Tone Tags - -Consider using tone tags in the following situations: - -- When your message could be interpreted in multiple ways -- If you're using sarcasm, humour, or other tones that might not be immediately apparent -- When discussing sensitive topics where clarity of intention is crucial -- If you're communicating with someone who has expressed difficulty interpreting tone in text - -### 4.3 How to Use Tone Tags - -- Place the tone tag at the end of your message or the relevant section -- Use forward slashes to enclose the tag, e.g., `/j` for joking -- You can use multiple tags if needed, e.g., `/s /b` for sarcastic and bitter -- If you're unsure about a tag's meaning, refer to our community glossary or ask for clarification - -### 4.4 Commonly Used Tone Tags - -| Tag | Meaning | -| ---------------------- | ------------------------------------ | -| `/aff` | Affectionate | -| `/apa` | Apathetic | -| `/b` | Bitter | -| `/cel` | Celebratory | -| `/ci` | Caring Intent | -| `/cj` | Coping Joke | -| `/co` or `/cf` | Comforting | -| `/ex` | Exaggeration | -| `/f` | fake | -| `/fam` | Familial | -| `/fex` | for example | -| `/gen` or `/g` | Genuine | -| `/genq` or `/gq` | Genuine Question | -| `/gens` or `/gs` | Genuine Suggestion | -| `/hj` | Half Joking | -| `/hyp` | Hyperbole | -| `/ij` | Inside Joke | -| `/info` | Information | -| `/j` | Joking | -| `/jov` | Jokingly Overreacting | -| `/l`, `/ly` or `/lyr` | Lyrics | -| `/lh` | Lighthearted | -| `/li` or `/lit` | Literally | -| `/lu` | Little Upset | -| `/m` | Metaphorically | -| `/md` | Melodramatic | -| `/nav` | Not A Vent | -| `/nay` | Not At You | -| `/nbh` | Nobody Here (for vague venting only) | -| `/nbr` | Not Being Rude | -| `/nc` or `/neg` | Negative connotation | -| `/ncm` | Not Comparing | -| `/neu` | Neutral connotation | -| `/nf` | Not Forced | -| `/nm` | Not Mad (or upset) | -| `/np` | No Pressure | -| `/npa` | Not Passive Aggressive | -| `/nsx` or `/nx` | Non Sexual Intent | -| `/ny` | Not Yelling | -| `/op` | Optional | -| `/ot` | Off Topic | -| `/p` or `/plat` | Platonic | -| `/pc` or `/pos` | Positive connotation | -| `/q` | Quote | -| `/ref` | Reference | -| `/rh`, `/rt` or `/rhq` | Rhetorical Question | -| `/s` or `/sar` | Sarcastic | -| `/srs` | Serious | -| `/sym` | Sympathetic | -| `/t` | Teasing | -| `/tc`, `/ti` or `/tic` | Typing a tic | - -### 4.5 Respecting Tone Tags - -- When someone uses a tone tag, interpret their message accordingly -- If you're unsure about the meaning of a tag, ask politely for clarification -- Do not mock or belittle others for using tone tags - -### 4.6 Accessibility Considerations - -- Tone tags can be particularly helpful for neurodivergent individuals who may have difficulty interpreting tone in text -- Screen readers can often interpret tone tags, making them a useful tool for visually impaired users - -### 4.7 Limitations of Tone Tags - -- While helpful, tone tags are not a perfect solution and may not convey all nuances of communication -- They should be used as a supplement to clear writing, not a replacement for it - -### 4.8 Community-Specific Tags - -- Our community may develop additional tags specific to our discussions -- New tags will be added to our glossary after community consensus - -## 5. Pronouns - -### 5.1 Importance of Pronouns - -Pronouns are an essential aspect of personal identity and respectful communication. Our community values and respects each individual's right to self-identify and be addressed correctly. - -### 5.2 Displaying Pronouns - -We strongly encourage all community members to display their pronouns: - -- In your platform bio -- Using designated pronoun roles in our Discord community, or comparable feature on other platforms -- As part of your username or display name, if desired - -### 5.3 Benefits of Sharing Pronouns - -1. Clarity: Helps others address you correctly -2. Inclusivity: Creates a welcoming environment for all gender identities -3. Normalization: Reduces stigma around pronoun sharing -4. Education: Raises awareness about gender diversity - -### 5.4 Normalizing Pronoun Sharing - -By encouraging all members to share pronouns, regardless of gender identity or expression, we: - -- Challenge the assumption that only transgender individuals share pronouns -- Create a safer space for transgender and non-binary individuals to share their pronouns without implicitly outing themselves -- Promote a culture of respect and understanding - -### 5.5 Respecting Others' Pronouns - -- Always use the pronouns a person has specified for themselves -- If you're unsure about someone's pronouns, it's appropriate to politely ask -- If you make a mistake, apologize briefly, correct yourself, and move on - -### 5.6 Pronoun Options - -While not exhaustive, common pronoun options include: - -- She/her/hers -- He/him/his -- They/them/theirs - -- Neopronouns (e.g., xe/xem/xyr, ze/zir/zirs) -- Any pronouns -- No pronouns (use name only) - -### 5.7 Changing Pronouns - -- Members are welcome to update their pronouns at any time -- Respect and use a person's current pronouns, even if you knew them by different pronouns previously - -### 5.8 Pronoun Misuse - -- Intentional misuse of pronouns (misgendering) is a form of harassment and violates our community guidelines -- Repeated accidental misuse, despite correction, may be addressed by moderation - -### 5.9 Privacy Considerations - -- While we encourage pronoun sharing, it is ultimately a personal choice -- Do not pressure others to share their pronouns if they are not comfortable doing so - -## 6. Accessibility - -Our community is committed to ensuring that all members, regardless of their needs, can fully participate and engage with our content. We encourage everyone to follow these accessibility guidelines to create a more inclusive environment. - -### 6.1 Alt Text for Images - -Alt text (alternative text) provides a textual description of images for those who use screen readers or cannot view images. - -- Always include alt text when posting images. -- Describe the key elements of the image concisely. -- If the image contains text, include that text in the alt description. - Example: Instead of alt="meme", use alt="A cat wearing sunglasses with the text 'Deal with it' below" - -### 6.2 Creating Accessible Content - -#### 6.2.1 Descriptive Link Text - -- Use descriptive link text that indicates where the link leads. -- Avoid using "click here" or "read more" as standalone link text. - -Example: Instead of "Click here to read about our events", use "View our upcoming community events" - -#### 6.2.2 Avoiding Flashing Content - -- Do not post content that flashes more than three times per second. -- If you must share such content, provide a clear warning beforehand. - -#### 6.2.3 Structuring Content - -- Use headings to organize content hierarchically (H1, H2, H3, etc.). -- Break long paragraphs into shorter, more digestible sections. -- Use bullet points or numbered lists for easy scanning. - -#### 6.2.4 Multimedia Content - -- Provide captions for videos. -- Offer transcripts for audio content when possible. - -### 6.3 Continuous Improvement - -- We welcome feedback on how to improve our community's accessibility. -- Report any accessibility issues to the moderation team. - -## 7. Content and Trigger Warnings - -Our community is committed to creating a safe and respectful environment for all members. Content and trigger warnings play a crucial role in this effort by allowing individuals to make informed decisions about engaging with potentially distressing content. - -### 7.1 Purpose of Content/Trigger Warnings - -- To give members advance notice of potentially sensitive or disturbing content -- To allow individuals to prepare themselves emotionally or choose to avoid the content -- To promote a culture of empathy and consideration within our community - -### 7.2 When to Use Warnings - -:::caution[Warning!] -Content/Trigger warnings are **mandatory** in all of our community spaces. Repeated patterns of failure to properly label your content will result in sanctions. "I forgot" is not an acceptable excuse. -::: - -Use content or trigger warnings when posting about: - -- Graphic violence or gore -- Sexual content or explicit discussions of sexuality (except within our clearly-indicated adult-only areas) -- Abuse (physical, emotional, sexual) -- Self-harm or suicide -- Eating disorders or body image issues -- Substance abuse or addiction -- Mental health issues -- Phobias (e.g., spiders, heights, confined spaces) -- Political extremism or hate speech -- Natural disasters or traumatic events -- Flashing images or loud noises (for photosensitive epilepsy) - -Remember, this list is not exhaustive. If you're unsure whether content needs a warning, err on the side of caution and provide one. - -### 7.3 How to Use Content/Trigger Warnings - -- Place the warning at the beginning of your post or message -- Use clear, specific language -- If possible, use spoiler tags or a "read more" cut to hide the sensitive content - -Example formats: - -"CW: Discussion of eating disorders" -"TW: Graphic description of violence" -"Content Warning: This post contains references to suicide" - -### 7.4 Respecting Warnings - -- Do not mock or belittle others for using or needing content warnings -- If someone asks for a warning on a specific topic, respect their request in future interactions - -### 7.5 False Alarms and Overuse - -While we encourage the use of content warnings, try to avoid overuse for mundane topics. This helps maintain their effectiveness for truly sensitive content. - -### 7.6 Moderator Intervention - -Moderators may add content warnings to posts if they deem it necessary. Repeated failure to use appropriate warnings may result in moderation action. - -## 8. Conflict Resolution - -Disagreements and conflicts can arise in any community. Our goal is to foster an environment where conflicts can be resolved respectfully and constructively. This section outlines the steps for resolving conflicts and when to involve moderators. - -### 8.1 General Principles - -- Treat all parties with respect, even in disagreement -- Assume good faith unless proven otherwise -- Focus on the issue, not personal attacks -- Be open to different perspectives and willing to compromise - -### 8.2 Steps for Resolving Conflicts - -#### 8.2.1 Direct Communication - -- If you have an issue with another member, try to address it directly with them first. -- Use private messages to avoid public confrontations. -- Clearly and calmly explain your concerns, using "I" statements. -- Listen to their perspective without interrupting. -- Look for common ground and potential solutions. - -#### 8.2.2 Cool-Down Period - -If emotions are running high: - -- Take a break from the discussion. -- Reflect on the issue and your role in the conflict. -- Return to the conversation when you can discuss it calmly. - -#### 8.2.3 Seeking Mediation - -If direct communication doesn't resolve the issue: - -- Ask a neutral third party from the community to mediate. -- Both parties should agree on the mediator. -- The mediator should facilitate discussion, not take sides. - -### 8.3 When to Involve Moderators - -Involve moderators if: - -- The conflict violates our Code of Conduct -- You feel unsafe or harassed -- The conflict is disrupting the broader community -- Previous attempts at resolution have failed -- You're unsure how to handle the situation - -### 8.4 How to Involve Moderators - -- Use the designated reporting system on the platform. -- Provide a clear, factual account of the issue. -- Include relevant screenshots or links if applicable. -- Explain steps you've already taken to resolve the conflict. - -### 8.5 Moderator Actions - -Moderators may: - -- Facilitate discussion between parties -- Issue warnings or reminders about community guidelines -- Temporarily mute or suspend accounts -- Remove inflammatory content -- In severe cases, ban members who consistently create conflicts - -### 8.6 Appealing Moderator Decisions - -If you disagree with a moderator's decision: - -- Wait 24 hours to ensure you can discuss it calmly -- Contact the moderation team through the appropriate channels -- Clearly explain why you think the decision should be reconsidered -- Be prepared to provide additional context or evidence - -### 8.7 Conflict Prevention - -To minimize conflicts: - -- Re-read your posts before sending to ensure they're not unintentionally inflammatory -- Use tone indicators when your intent might be unclear -- Ask for clarification before assuming negative intent -- Be willing to apologize and correct mistakes - -### 8.8 Learning from Conflicts - -After a conflict is resolved: - -- Reflect on what led to the disagreement -- Consider how it could have been prevented or handled better -- Apply these lessons in future interactions - -## 9. This Should Be Fun! - -It is important to remember that engaging with our community should be a fun process. If you aren't enjoying your time, please consider some of these options: - -### 9.1. Take a Break - -It's okay if you need some time away from our community! We'll be here when you get back, so don't hesitate to step away for a while and decompress. Let yourself come back refreshed so you have the best experience possible. - -### 9.2. Evaluate Your Engagement - -Our community spaces are intended to be fun, relaxed, and wholesome environments. If you find that you aren't meshing with our vibe in the way that you want, consider taking a look at the type of interactions you are creating. It may be that you aren't using our community in the best way. - -### 9.3. Temporary Bans - -If you need a break and you find yourself unable to step away, or you keep coming back to check on things when you really do not want to, please reach out to our staff. We are more than willing to issue temporary bans to help you preserve the space you need. - -## 10. Mini-modding - -"Mini-modding" is a term often used to describe behaviour in which a non-staff user instructs another user to amend their behaviour as if they were a member of staff. - -Our community does not prohibit mini-modding, provided: - -- You gently encourage and support members in properly integrating with our community -- You do not represent yourself as a member of NHCarrigan's team -- You do not belittle, call out, or antagonise a user who is violating our policies - -Remember that the best way to correct someone's behaviour is to lead by example. If that fails, do not escalate - instead, report the behaviour to our team. +*These Community Guidelines were last updated on 15 September 2025 and represent the collective wisdom and values of our community. For questions about these guidelines or suggestions for improvement, please contact our community staff through the designated channels outlined in our Community Code of Conduct.* diff --git a/src/content/docs/community/leadership.md b/src/content/docs/community/leadership.md new file mode 100644 index 0000000..fffacb2 --- /dev/null +++ b/src/content/docs/community/leadership.md @@ -0,0 +1,437 @@ +--- +title: Community Leadership and Governance Policy +--- + +## 1. Foundation and Purpose + +### 1.1 Introduction + +This Community Leadership and Governance Policy (hereinafter referred to as "the Policy") establishes the framework for transparent, accountable, and effective leadership within our community ecosystem. This Policy ensures that community leadership operates with integrity, serves the best interests of all community members, and maintains the highest standards of conduct whilst fostering a safe, welcoming, and inclusive environment. + +### 1.2 Core Principles + +Our community leadership operates on the following foundational principles: + +**(a)** **Servant Leadership**: Leaders serve the community rather than wielding authority for personal benefit; + +**(b)** **Transparency**: Decision-making processes and rationales are clearly communicated to the community; + +**(c)** **Accountability**: Leaders are answerable for their actions and decisions to the community they serve; + +**(d)** **Inclusivity**: Leadership reflects and promotes the diversity of our community; + +**(e)** **Collaborative Governance**: Community input is actively sought and valued in decision-making processes. + +### 1.3 Legal Framework Integration + +This Policy operates within our comprehensive legal and policy framework, including our Terms of Service, Community Code of Conduct, Content and Moderation Policy, and Limitation of Liability and Indemnification Policy, all of which are incorporated herein by reference. + +## 2. Leadership Structure and Roles + +### 2.1 Leadership Hierarchy + +Our community leadership operates through a structured hierarchy designed to ensure effective governance whilst maintaining accessibility and accountability: + +#### 2.1.1 Executive Leadership +- **Community Director**: Overall strategic direction and final decision-making authority +- **Deputy Director**: Support for Community Director and succession planning +- **Legal and Policy Advisor**: Oversight of legal compliance and policy development + +#### 2.1.2 Operational Leadership +- **Head Moderator**: Oversight of moderation team and enforcement consistency +- **Community Managers**: Day-to-day community operations and member engagement +- **Technical Manager**: Day-to-day technical operations, code reviews, and technical contributor coordination +- **Technical Administrators**: Platform infrastructure management and strategic technical planning + +#### 2.1.3 Specialist Leadership +- **Accessibility Coordinator**: Ensuring inclusive design and accommodation +- **Crisis Response Coordinator**: Mental health and emergency situation management +- **Events Coordinator**: Community activities and engagement programmes + +#### 2.1.4 Volunteer Leadership +- **Moderators**: Front-line community moderation and member support +- **Mentors**: New member guidance and peer support programmes +- **Subject Matter Experts**: Specialized knowledge and educational support +- **Technical Contributors**: Development support and technical expertise for community platforms and tools + +### 2.2 Role Responsibilities + +#### 2.2.1 Executive Leadership Responsibilities + +**Community Director:** +- Establish overall community vision and strategic objectives +- Make final decisions on significant policy changes and disciplinary matters +- Represent the community in external relationships and partnerships +- Ensure leadership team accountability and performance +- Oversee crisis management and emergency response coordination + +**Deputy Director:** +- Support Community Director in strategic planning and implementation +- Lead specific initiatives and projects as assigned +- Serve as primary succession candidate for Community Director role +- Coordinate cross-functional leadership team activities + +#### 2.2.2 Operational Leadership Responsibilities + +**Head Moderator:** +- Ensure consistent application of community standards across all platforms +- Train, support, and evaluate moderation team performance +- Develop and refine moderation procedures and best practices +- Handle escalated disciplinary matters and appeals coordination +- Maintain moderation transparency and accountability systems + +**Community Managers:** +- Foster positive community culture and engagement +- Coordinate community activities, discussions, and initiatives +- Serve as primary liaison between community members and leadership +- Monitor community health and member satisfaction +- Implement community feedback and suggestion programmes + +**Technical Manager:** +- Oversee daily technical operations including code reviews and issue triage +- Coordinate Technical Contributor team activities and project management +- Provide technical guidance and mentorship to Technical Contributors +- Serve as liaison between Technical Administrators and Technical Contributors +- Monitor technical project progress and ensure timely task completion +- Facilitate technical discussions and decision-making for community projects + +#### 2.2.3 Specialist Leadership Responsibilities + +**Accessibility Coordinator:** +- Develop and maintain accessibility standards and guidelines +- Provide consultation on inclusive design and accommodation needs +- Coordinate assistive technology support and resources +- Evaluate platform accessibility and recommend improvements +- Serve as primary contact for accessibility-related concerns and requests + +## 3. Selection and Appointment Processes + +### 3.1 Leadership Selection Criteria + +All community leaders must demonstrate: + +#### 3.1.1 Essential Qualifications +- **Community Standing**: Minimum six (6) months of positive community participation +- **Conduct Record**: Clean disciplinary record with no serious violations +- **Skills Demonstration**: Relevant competencies for the specific leadership role +- **Commitment Availability**: Adequate time and energy to fulfil role responsibilities +- **Values Alignment**: Strong commitment to community principles and inclusive practices + +#### 3.1.2 Preferred Qualifications +- **Prior Leadership Experience**: Previous volunteer or professional leadership roles +- **Specialised Knowledge**: Relevant expertise in moderation, community management, or technical areas +- **Mentorship Capability**: Demonstrated ability to guide and support other community members +- **Crisis Management Experience**: Skills in conflict resolution and emergency response + +### 3.2 Selection Processes + +#### 3.2.1 Application and Nomination Process + +**Open Applications:** +- Leadership positions are posted publicly with clear role descriptions and requirements +- Applications are evergreen and may be found at https://forms.nhcarrigan.com/form/PEpB3gA79gxP8wmfEf4zou96opkpUTjssTcaeYjhoi8 +- Community members may self-nominate or nominate others with consent +- Applications include personal statements, relevant experience, and community references + +**Community Input Phase:** +- Public comment periods allow community feedback on candidates +- Anonymous feedback mechanisms protect community members from potential retaliation +- Existing leadership team provides assessments of candidate suitability +- Transparent scoring rubrics ensure fair and consistent evaluation + +#### 3.2.2 Interview and Assessment Process + +**Structured Interviews:** +- All candidates participate in structured interviews with existing leadership +- Scenario-based questions assess decision-making capabilities and values alignment +- Technical competency assessments for roles requiring specialized skills +- Cultural fit evaluation ensures compatibility with community values and practices + +**Community Engagement Assessment:** +- Candidates demonstrate understanding of community needs and priorities +- Problem-solving scenarios test practical leadership capabilities +- Ethical decision-making assessments ensure integrity and sound judgement +- Commitment verification confirms availability and dedication to the role + +### 3.3 Appointment and Transition + +#### 3.3.1 Final Selection and Announcement + +**Decision Making:** +- Selection committees include diverse representation from existing leadership +- Decisions are made through consensus-building processes when possible +- Final appointments require approval from Executive Leadership +- Community announcement includes rationale for selection and role expectations + +**Transition Planning:** +- New leaders receive comprehensive orientation and training programmes +- Mentorship partnerships with experienced leaders provide ongoing support +- Progressive responsibility increases ensure successful role adaptation +- Regular check-ins during transition period assess progress and provide assistance + +## 4. Leadership Accountability and Oversight + +### 4.1 Performance Standards and Expectations + +#### 4.1.1 Ongoing Performance Metrics + +All community leaders are evaluated on: + +**Community Impact Measures:** +- Member satisfaction with leadership support and responsiveness +- Community health indicators including participation rates and member retention +- Conflict resolution effectiveness and community harmony metrics +- Accessibility and inclusivity improvements and implementation + +**Individual Performance Standards:** +- Adherence to community values and ethical standards +- Responsiveness to community needs and concerns +- Professional development and skills enhancement +- Collaboration effectiveness with other leadership team members + +#### 4.1.2 Regular Review Processes + +**Quarterly Performance Reviews:** +- Structured feedback sessions with direct supervisors or peer review panels +- Community feedback collection through anonymous surveys and input forms +- Goal-setting for upcoming quarter with specific, measurable objectives +- Professional development planning and resource allocation + +**Annual Comprehensive Assessments:** +- 360-degree feedback including community members, peers, and supervisors +- Achievement evaluation against annual goals and community impact metrics +- Leadership development planning and career progression discussions +- Reappointment decisions based on performance and community needs + +### 4.2 Community Feedback and Input Mechanisms + +#### 4.2.1 Regular Feedback Channels + +**Monthly Community Forums:** +- Open forums where community members can directly engage with leadership +- Structured question and answer sessions on community concerns and priorities +- Anonymous submission options for sensitive feedback or concerns +- Public response commitments with timeline expectations for issue resolution + +**Leadership Accessibility Programs:** +- Regular "office hours" where leaders are available for individual community member concerns +- Dedicated communication channels for leadership feedback and suggestions +- Community liaison positions to facilitate communication between members and leadership +- Transparent communication about leadership decisions and their rationales + +#### 4.2.2 Formal Accountability Processes + +**Community Confidence Measures:** +- Annual community confidence surveys to assess leadership effectiveness +- No-confidence vote procedures for community members to request leadership changes +- Transparent reporting of community feedback themes and leadership responses +- Regular town hall meetings for community-wide discussion of governance issues + +### 4.3 Leadership Standards Enforcement + +#### 4.3.1 Misconduct Investigation Procedures + +When concerns about leadership conduct arise: + +**Initial Assessment:** +- Formal complaint procedures with clear submission guidelines and protection for complainants +- Independent investigation teams to avoid conflicts of interest +- Transparent timelines and process communication to maintain community trust +- Interim protective measures when necessary to ensure community safety + +**Investigation Process:** +- Comprehensive evidence collection including witness statements and documentation +- Fair hearing procedures with opportunity for accused leaders to respond +- Independent review panels including community member representation +- Clear standards of evidence and burden of proof requirements + +#### 4.3.2 Disciplinary Measures and Consequences + +**Progressive Disciplinary System:** +- Formal warnings with clear performance improvement expectations +- Temporary suspension from leadership duties pending improvement demonstration +- Role restriction or reassignment to positions with appropriate oversight +- Removal from leadership positions with detailed rationale provided to community + +**Community Protection Measures:** +- Immediate removal authority for leaders who pose risks to community safety +- Public disclosure requirements for serious misconduct to maintain community trust +- Appeals processes for leaders facing disciplinary action +- Community healing and repair processes following leadership misconduct incidents + +## 5. Leadership Development and Support + +### 5.1 Training and Professional Development + +#### 5.1.1 Mandatory Training Programs + +All community leaders must complete: + +**Foundation Training:** +- Community values, mission, and strategic objectives orientation +- Legal and policy framework comprehensive training +- Conflict resolution and mediation skills development +- Accessibility and inclusive practices certification + +**Role-Specific Training:** +- Moderation techniques and tools for moderation team members +- Crisis intervention and mental health first aid for support roles +- Technical administration and security for technical leadership +- Event planning and community engagement for activities coordinators + +#### 5.1.2 Ongoing Development Opportunities + +**Skill Enhancement Programs:** +- Leadership coaching and mentorship opportunities +- External training and conference attendance support +- Cross-functional experience and role shadowing programs +- Community management and governance best practices workshops + +**Personal Development Support:** +- Stress management and burnout prevention resources +- Communication skills development and public speaking training +- Cultural competency and diversity, equity, inclusion education +- Technology skills and platform administration training + +### 5.2 Leadership Support Systems + +#### 5.2.1 Peer Support Networks + +**Leadership Team Collaboration:** +- Regular leadership team meetings for coordination and mutual support +- Peer mentoring partnerships for experience sharing and guidance +- Cross-training programs to ensure coverage and capability development +- Team-building activities and relationship-strengthening initiatives + +**External Professional Networks:** +- Participation in community management professional organisations +- Networking opportunities with other community leadership teams +- Industry conference attendance and professional development events +- Access to external coaching and consultation resources + +#### 5.2.2 Wellness and Burnout Prevention + +**Workload Management:** +- Clear role boundaries and expectation setting to prevent overextension +- Regular workload assessment and redistribution when necessary +- Mandatory rest periods and vacation time for volunteer leaders +- Recognition and appreciation programs to maintain motivation and satisfaction + +**Mental Health Support:** +- Peer support groups for leadership stress and challenge management +- Regular wellness check-ins and proactive intervention when needed +- Flexible role arrangements to accommodate personal circumstances + +## 6. Succession Planning and Continuity + +### 6.1 Leadership Succession Framework + +#### 6.1.1 Planned Succession Processes + +**Leadership Pipeline Development:** +- Identification and mentorship of potential future leaders +- Progressive responsibility assignments to prepare succession candidates +- Cross-training programs to ensure multiple qualified candidates for key roles +- Regular succession planning reviews and candidate development assessment + +**Transition Management:** +- Comprehensive handover procedures for departing leaders +- Knowledge transfer protocols to maintain institutional memory +- Interim leadership arrangements during transition periods +- Community communication strategies for leadership changes + +#### 6.1.2 Emergency Succession Procedures + +**Crisis Leadership Arrangements:** +- Predefined emergency succession chains for critical leadership roles +- Emergency decision-making authority delegation procedures +- Rapid response team formation for crisis management +- Community communication protocols for emergency leadership changes + +### 6.2 Knowledge Management and Institutional Memory + +#### 6.2.1 Documentation and Record-Keeping + +**Leadership Knowledge Base:** +- Comprehensive documentation of policies, procedures, and decision-making rationales +- Historical record-keeping of significant community events and leadership decisions +- Best practices documentation and lessons learned compilation +- Regular updates and maintenance of institutional knowledge resources + +**Training Materials and Resources:** +- Standardised training curricula for new leaders +- Decision-making frameworks and guidance documents +- Community history and cultural context documentation +- Technical procedures and platform administration guides + +## 7. Community Transparency and Communication + +### 7.1 Transparency Requirements + +#### 7.1.1 Public Reporting and Disclosure + +**Regular Community Updates:** +- Monthly leadership reports on community health, activities, and initiatives +- Quarterly transparency reports including disciplinary action summaries and community metrics +- Annual comprehensive reviews of community progress and leadership effectiveness +- Public disclosure of significant policy changes and their rationales + +**Decision-Making Transparency:** +- Public documentation of major leadership decisions and their reasoning +- Community consultation processes for significant changes affecting members +- Open meeting minutes and records for community leadership discussions +- Clear communication of appeals processes and outcomes + +#### 7.1.2 Community Engagement and Input + +**Participatory Governance:** +- Regular community surveys to assess satisfaction and gather input on priorities +- Public comment periods for proposed policy changes and community initiatives +- Community advisory panels with rotating membership +- Open forums for community concerns and suggestions + +## 8. Policy Implementation and Review + +### 8.2 Regular Review and Updates + +#### 8.2.1 Policy Review Schedule + +**Annual Reviews:** +- Comprehensive policy effectiveness assessment +- Community feedback integration and policy refinement +- Best practices research and external benchmarking +- Leadership team input and improvement recommendations + +**Continuous Improvement:** +- Quarterly review of policy implementation and effectiveness +- Community feedback integration and responsive policy adjustments +- Regular benchmarking against community management best practices +- Ongoing legal and regulatory compliance verification + +### 8.2 Amendment Procedures + +#### 8.2.1 Policy Change Process + +**Community Input Requirements:** +- Minimum thirty (30) day public comment period for significant policy changes +- Community advisory panel review and recommendation processes +- Leadership team consensus-building and impact assessment +- Legal and policy compliance verification before implementation + +**Implementation and Communication:** +- Clear communication of policy changes and effective dates +- Training updates for all leadership team members +- Community education and awareness programs for new requirements +- Regular monitoring of policy effectiveness and community impact + +--- + +## Acknowledgement and Compliance + +By accepting leadership roles within our community, all leaders explicitly acknowledge that they have read, understood, and agreed to comply with this Community Leadership and Governance Policy in its entirety. This commitment includes ongoing adherence to all accountability measures, transparency requirements, and community service obligations outlined herein. + +This Policy represents our collective commitment to maintaining excellent leadership standards that serve our community's mission of fostering a safe, welcoming, and inclusive environment for all members. + +--- + +*This Community Leadership and Governance Policy was created on 15 September 2025. For questions about this Policy or to provide feedback on leadership performance, please contact our Community Leaders through the designated channels outlined in our Community Code of Conduct.* diff --git a/src/content/docs/community/recognition.md b/src/content/docs/community/recognition.md new file mode 100644 index 0000000..2a18b44 --- /dev/null +++ b/src/content/docs/community/recognition.md @@ -0,0 +1,425 @@ +--- +title: Community Recognition and Appreciation Policy +--- + +## 1. Foundation and Philosophy + +### 1.1 Introduction and Purpose + +This Community Recognition and Appreciation Policy (hereinafter referred to as "the Policy") establishes our comprehensive framework for acknowledging, celebrating, and appreciating the diverse contributions of community members. This Policy recognises that fostering a truly welcoming and inclusive environment requires intentional appreciation of member efforts, celebration of diverse talents and contributions, and creation of meaningful recognition systems that motivate continued positive engagement. + +### 1.2 Core Principles + +Our recognition and appreciation approach is founded upon: + +**(a)** **Inclusive Recognition**: Celebrating diverse types of contributions and varying levels of participation; + +**(b)** **Authentic Appreciation**: Genuine, specific, and meaningful acknowledgement of member efforts; + +**(c)** **Equitable Access**: Recognition opportunities available to all community members regardless of background or status; + +**(d)** **Cultural Sensitivity**: Recognition practices that respect diverse cultural approaches to appreciation and celebration; + +**(e)** **Sustainable Systems**: Long-term recognition programs that maintain motivation and community engagement; + +**(f)** **Community-Driven Values**: Recognition that reinforces positive community culture and shared values. + +### 1.3 Recognition Philosophy + +We believe that every community member contributes value in unique ways, and our recognition systems are designed to: +- Acknowledge contributions both large and small +- Celebrate effort and growth as well as achievement +- Promote inclusive participation and diverse engagement styles +- Build community connections and mutual appreciation +- Encourage continued positive contribution and community involvement + +### 1.4 Legal Framework Integration + +This Policy operates within our comprehensive legal and policy framework, including our Terms of Service, Privacy Policy, Community Code of Conduct, and Community Leadership and Governance Policy, all of which are incorporated herein by reference. + +## 2. Recognition Categories and Programs + +### 2.1 Regular Recognition Programs + +#### 2.1.1 Daily Appreciation Initiatives + +**Community Gratitude Practices:** +- Daily appreciation messages highlighting specific member contributions +- "Spotlight Saturday" featuring different community members and their positive impact +- Peer appreciation systems allowing members to acknowledge each other's contributions +- Weekly gratitude threads celebrating community achievements and member efforts + +**Micro-Recognition Systems:** +- Thank-you reactions and appreciation emojis for helpful contributions +- Positive feedback highlighting specific instances of community support +- Recognition of members who provide assistance, answer questions, or offer guidance +- Acknowledgement of members who demonstrate inclusive and welcoming behaviour + +#### 2.1.2 Monthly Recognition Programs + +**Member of the Month Awards:** +- Recognition for outstanding community contribution and positive impact +- Rotating focus on different types of contributions (helping others, creative contributions, community building) +- Nominated by community members and selected by leadership team +- Featured spotlight with member interview and contribution celebration + +**Contribution Category Awards:** +- **Helper of the Month**: Members who consistently provide support and assistance to others +- **Mentor of the Month**: Members who guide and support newcomers or less experienced community members +- **Innovator of the Month**: Members who bring creative ideas, solutions, or new perspectives +- **Inclusivity Champion**: Members who actively promote inclusive practices and welcoming environments + +### 2.2 Special Recognition Programs + +#### 2.2.1 Annual Achievement Awards + +**Excellence in Community Building:** +- Outstanding Community Leader Award for members who demonstrate exceptional leadership qualities +- Community Catalyst Award for members who inspire positive change and growth +- Diversity and Inclusion Champion Award for members who actively promote inclusive practices +- Lifetime Achievement Award for long-term contributors who have significantly shaped community culture + +**Special Category Recognition:** +- **Rising Star Award**: Newer members who have made significant positive impact +- **Comeback Achievement**: Members who have overcome challenges and returned to positive participation +- **Behind-the-Scenes Hero**: Members who contribute significantly in less visible but essential ways +- **Community Bridge Builder**: Members who facilitate connections and resolve conflicts constructively + +#### 2.2.2 Milestone Celebration Programs + +**Participation Milestone Recognition:** +- Anniversary celebrations for community membership milestones (1 year, 2 years, 5 years) +- Growth milestone celebrations acknowledging member development and learning +- Community service milestone recognition for volunteer contributions and leadership + +**Community Achievement Celebrations:** +- Community growth milestones (membership numbers, activity levels, positive outcomes) +- Collective achievement celebrations (successful events, community projects, positive changes) +- Anniversary celebrations of significant community moments and developments +- Recognition of community resilience and positive responses to challenges + +## 3. Nomination and Selection Processes + +### 3.1 Community-Driven Nomination Systems + +#### 3.1.1 Peer Nomination Processes + +**Open Nomination Periods:** +- Monthly nomination windows allowing any community member to nominate others +- Anonymous nomination options to encourage participation without social pressure +- Self-nomination opportunities for members to highlight their own contributions +- Group nomination options for collaborative projects and team achievements + +**Nomination Criteria and Guidelines:** +- Specific, detailed descriptions of contributions and positive impact +- Examples of how nominees demonstrate community values and inclusive practices +- Focus on effort, growth, and positive community impact rather than just results +- Consideration of diverse contribution types and varying participation styles + +#### 3.1.2 Selection and Review Processes + +**Diverse Selection Committees:** +- Rotating committee membership ensuring diverse perspectives and fair evaluation +- Include community members from different backgrounds, experience levels, and community areas +- Balance of leadership team members and community volunteers in selection processes +- Training for selection committee members on bias awareness and inclusive evaluation + +**Fair and Transparent Evaluation:** +- Clear evaluation criteria shared publicly and applied consistently +- Anonymous evaluation processes to reduce bias and ensure fair consideration +- Multiple reviewer assessment system for important recognition decisions +- Regular review of selection processes to ensure equity and effectiveness + +### 3.2 Recognition Frequency and Distribution + +#### 3.2.1 Balanced Recognition Distribution + +**Inclusive Recognition Practices:** +- Ensure recognition reaches members from all community areas and participation styles +- Actively seek out and acknowledge contributions from less visible community members +- Balance recognition between new members and long-term contributors +- Promote recognition of diverse types of contributions and community involvement + +**Geographic and Cultural Inclusion:** +- Recognition that considers different time zones and participation patterns +- Cultural sensitivity in recognition practices and celebration methods +- Accessibility considerations in recognition events and appreciation activities +- Language and communication accessibility in recognition announcements and celebrations + +## 4. Types of Contributions Valued + +### 4.1 Direct Community Contributions + +#### 4.1.1 Active Participation and Engagement + +**Discussion and Content Contributions:** +- Thoughtful questions that promote community learning and engagement +- Helpful responses and information sharing that assists other community members +- Creative contributions including original content, resources, and educational materials +- Constructive feedback and suggestions that improve community experience + +**Community Support Activities:** +- Welcoming new members and helping them integrate into community culture +- Providing technical assistance and platform navigation support +- Mentoring and guidance for less experienced community members +- Conflict resolution assistance and constructive mediation efforts + +#### 4.1.2 Leadership and Initiative + +**Volunteer Leadership Roles:** +- Moderation activities and community standards enforcement +- Event planning and community activity organisation +- Educational initiative development and implementation +- Policy development input and community improvement suggestions + +**Innovation and Problem-Solving:** +- Creative solutions to community challenges and improvement opportunities +- New program or initiative development and implementation +- Technology improvements and platform enhancement contributions +- Process improvements that enhance community experience and accessibility + +### 4.2 Indirect and Supporting Contributions + +#### 4.2.1 Community Culture Building + +**Positive Environment Creation:** +- Consistent demonstration of inclusive and welcoming behaviour +- Cultural bridge-building between different community groups and perspectives +- Emotional support and encouragement for community members during difficult times +- Celebration of other members' achievements and positive contribution acknowledgement + +**Values Demonstration and Modeling:** +- Exemplary adherence to community standards and positive behaviour modeling +- Advocacy for inclusive practices and accessibility improvements +- Support for marginalised community members and inclusive representation +- Constructive engagement with community policies and improvement processes + +#### 4.2.2 Behind-the-Scenes Contributions + +**Administrative and Organisational Support:** +- Documentation improvement and resource organisation activities +- Research and information gathering for community benefit +- Quality assurance and error reporting for community resources and platforms +- Accessibility testing and improvement suggestions for community tools + +**Community Maintenance Activities:** +- Content curation and organisation for community resources +- Link checking, information updates, and resource maintenance +- Translation services and language accessibility improvements +- Community data collection and analysis for improvement purposes + +## 5. Recognition Methods and Formats + +### 5.1 Public Recognition and Celebration + +#### 5.1.1 Community Announcements and Features + +**Regular Recognition Announcements:** +- Weekly appreciation announcements highlighting specific member contributions +- Monthly feature articles celebrating member achievements and community impact +- Annual recognition ceremony events with community-wide celebration +- Special milestone announcements for significant member achievements + +**Profile and Achievement Highlighting:** +- Member spotlight features with interviews and contribution celebration +- Achievement badges and recognition symbols displayed on member profiles +- "Wall of Fame" or recognition gallery featuring outstanding contributors +- Newsletter features and external communication highlighting member achievements + +#### 5.1.2 Community Events and Celebrations + +**Recognition Ceremony Events:** +- Annual awards ceremony with community-wide attendance and celebration +- Monthly appreciation events featuring award presentations and community gathering +- Special milestone celebration events for significant community achievements +- Recognition reception events providing networking and appreciation opportunities + +**Interactive Celebration Activities:** +- Community appreciation events with member participation and engagement +- Recognition games and activities that celebrate diverse contributions +- Peer appreciation sessions where members can acknowledge each other's contributions +- Storytelling events where members share impact stories and appreciation experiences + +### 5.2 Private and Personal Recognition + +#### 5.2.1 Individual Appreciation Communications + +**Personal Recognition Messages:** +- Direct appreciation messages from community leadership acknowledging specific contributions +- Personalized thank-you notes for exceptional community service and positive impact +- One-on-one appreciation conversations recognizing member efforts and growth +- Private acknowledgement of sensitive contributions that require confidential appreciation + +**Tailored Recognition Approaches:** +- Recognition methods adapted to individual preferences and comfort levels +- Cultural considerations in recognition style and appreciation expressions +- Accessibility accommodations in recognition delivery and participation +- Personal achievement celebration that respects individual privacy preferences + +## 6. Accessibility and Inclusion in Recognition + +### 6.1 Universal Design Recognition Systems + +#### 6.1.1 Accessible Recognition Participation + +**Inclusive Nomination Processes:** +- Multiple nomination methods accommodating different communication preferences and abilities +- Anonymous nomination options for members who prefer not to be publicly associated with nominations +- Alternative format nominations including audio, video, or alternative text submissions +- Language translation support for nominations submitted in languages other than English + +**Accessible Recognition Events:** +- Recognition events planned with accessibility considerations including mobility, sensory, and cognitive accessibility +- Multiple participation formats (in-person, virtual, asynchronous) to accommodate different needs and preferences +- Clear communication about accessibility features and accommodation availability +- Alternative participation methods for members unable to attend live recognition events + +#### 6.1.2 Diverse Recognition Styles + +**Cultural Sensitivity in Recognition:** +- Recognition practices that respect diverse cultural approaches to appreciation and celebration +- Multiple celebration styles accommodating different comfort levels with public recognition +- Individual preference accommodation for recognition style and publicity level +- Culturally appropriate celebration methods that honour diverse community member backgrounds + +**Neurodiversity Considerations:** +- Recognition systems that accommodate different social and sensory preferences +- Alternative recognition methods for members who may find traditional recognition formats challenging +- Clear communication about recognition expectations and optional participation levels +- Flexible recognition formats that allow members to engage in ways that work best for them + +### 6.2 Equity in Recognition Distribution + +#### 6.2.1 Bias Awareness and Prevention + +**Systematic Bias Prevention:** +- Regular analysis of recognition distribution patterns to identify and address potential bias +- Training for recognition committee members on unconscious bias recognition and prevention +- Diverse perspectives inclusion in recognition decision-making processes +- Transparent recognition criteria that promote equity and inclusive evaluation + +**Inclusive Recognition Criteria:** +- Recognition criteria that value diverse types of contributions and participation styles +- Appreciation for growth and effort rather than only final achievements or outcomes +- Recognition of contributions that may be less visible but equally valuable to community health +- Consideration of different life circumstances and availability levels in recognition evaluation + +#### 6.2.2 Representative Recognition Outcomes + +**Demographic Equity Monitoring:** +- Regular assessment of recognition distribution across different community demographic groups +- Proactive outreach to ensure recognition opportunities reach all community segments +- Special recognition categories that highlight contributions from underrepresented community members +- Community feedback collection on recognition equity and inclusive representation + +## 7. Volunteer Appreciation and Support + +### 7.1 Leadership and Staff Recognition + +#### 7.1.1 Volunteer Appreciation Programs + +**Regular Volunteer Recognition:** +- Monthly volunteer appreciation events with special recognition for leadership contributions +- Annual volunteer appreciation celebrations acknowledging the significant time and effort invested +- Volunteer milestone recognition for length of service and depth of contribution +- Public acknowledgement of volunteer efforts and their positive impact on community experience + +**Professional Development and Growth Support:** +- Training and skill development opportunities for volunteers as appreciation for their service +- Leadership development programs and advancement opportunities within community structure +- Professional reference and recommendation support for volunteers seeking career opportunities +- Networking opportunities and community connections that benefit volunteer development + +#### 7.1.2 Volunteer Wellness and Burnout Prevention + +**Volunteer Support Systems:** +- Regular check-ins with volunteers to assess satisfaction, challenges, and support needs +- Burnout prevention resources and workload management support +- Flexible volunteer arrangements accommodating changing life circumstances and availability +- Peer support networks connecting volunteers for mutual encouragement and assistance + +**Recognition of Volunteer Limits and Boundaries:** +- Appreciation for volunteer contributions without creating pressure for continued overextension +- Support for volunteers who need to reduce involvement or take breaks from community service +- Recognition that volunteer contributions are gifts to the community rather than obligations +- Celebration of volunteers' other life priorities and achievements outside of community service + +## 8. Community Feedback and Recognition Evolution + +### 8.1 Community Input on Recognition Programs + +#### 8.1.1 Regular Feedback Collection + +**Recognition Program Evaluation:** +- Annual surveys collecting community feedback on recognition program effectiveness and satisfaction +- Focus groups with community members who have received recognition to assess program impact +- Input collection from community members who have not received recognition to identify barriers and improvements +- Regular assessment of recognition program accessibility and inclusive representation + +**Continuous Improvement Integration:** +- Community suggestion processes for recognition program enhancement and new recognition categories +- Responsive program modification based on community feedback and changing needs +- Transparent communication about recognition program changes and improvement rationales +- Community involvement in recognition program planning and development processes + +### 8.2 Recognition Program Evolution and Innovation + +#### 8.2.1 Adaptive Recognition Systems + +**Emerging Recognition Opportunities:** +- Regular evaluation of community needs and new types of contributions that merit recognition +- Innovation in recognition methods and celebration formats to maintain engagement and relevance +- Technology integration to enhance recognition accessibility and community participation +- Partnership development with external organisations to expand recognition opportunities and resources + +**Long-Term Program Sustainability:** +- Planning for recognition program continuity during leadership transitions and community growth +- Resource allocation and volunteer development to support ongoing recognition activities +- Documentation and knowledge preservation to maintain recognition program quality and consistency +- Strategic planning for recognition program expansion and enhancement as community evolves + +## 9. Policy Implementation and Review + +### 9.1 Regular Review and Enhancement + +#### 9.1.1 Continuous Improvement Process + +**Monthly Program Assessment:** +- Recognition program effectiveness evaluation and participant satisfaction assessment +- Recognition distribution analysis to ensure equity and inclusive representation +- Community feedback integration and program adjustment based on member input +- Volunteer appreciation program evaluation and enhancement planning + +**Annual Comprehensive Review:** +- Community-wide recognition program impact assessment and satisfaction evaluation +- Recognition criteria and selection process review for effectiveness and fairness +- Accessibility and inclusion evaluation with improvement planning and implementation +- Strategic planning for recognition program expansion and innovation + +### 9.2 Community Celebration and Recognition Culture + +#### 9.2.1 Culture Development and Reinforcement + +**Recognition Culture Promotion:** +- Community education about the importance and impact of appreciation and recognition +- Peer-to-peer recognition encouragement and facilitation +- Leadership modeling of appreciation and recognition practices +- Integration of recognition and appreciation into regular community activities and interactions + +**Long-Term Community Impact:** +- Recognition program contribution to overall community health and member satisfaction +- Appreciation culture development and maintenance as community grows and evolves +- Recognition program role in member retention and continued positive community engagement +- Community reputation enhancement through recognition of excellence and positive contribution + +--- + +## Community Commitment to Appreciation + +This Community Recognition and Appreciation Policy represents our deep commitment to acknowledging, celebrating, and appreciating every community member's unique contributions and positive impact. We believe that genuine appreciation and meaningful recognition are essential components of creating truly welcoming and inclusive environments where all members can thrive. + +Through this Policy, we pledge to maintain systems that celebrate diverse contributions, provide equitable recognition opportunities, and foster a culture of mutual appreciation that strengthens our community bonds and encourages continued positive engagement. + +--- + +*This Community Recognition and Appreciation Policy was created on 15 September 2025. For questions about recognition programs or to nominate community members for appreciation, please contact our Community Leaders through the designated channels outlined in our Community Code of Conduct.* diff --git a/src/content/docs/dev/contributing.md b/src/content/docs/dev/contributing.md index e5ff8e3..4d19d84 100644 --- a/src/content/docs/dev/contributing.md +++ b/src/content/docs/dev/contributing.md @@ -42,7 +42,7 @@ All contributors are expected to adhere to our Contributor Covenant. The full te All contributions to our projects, including but not limited to code, documentation, artwork, and other materials, will be licensed under our global software license. By submitting a contribution, you are agreeing to license your work under the terms of this license. - Our global software license: Naomi's Public License -- Full text of the license: https://docs.nhcarrigan.com/#/license +- Full text of the license: [License Page](/legal/license) ### 1.6 Intellectual Property diff --git a/src/content/docs/legal/aup.md b/src/content/docs/legal/aup.md new file mode 100644 index 0000000..8771eb6 --- /dev/null +++ b/src/content/docs/legal/aup.md @@ -0,0 +1,715 @@ +--- +title: Acceptable Use Policy +--- + +**DEFINING ACCEPTABLE AND PROHIBITED USAGE OF OUR SERVICES AND PLATFORMS** + +## 1. INTRODUCTION AND SCOPE + +### 1.1 Policy Purpose + +This Acceptable Use Policy ("AUP") establishes comprehensive guidelines for the appropriate use of all services, applications, and platforms provided by nhcarrigan ("we," "us," "our," or "the Company"). This AUP supplements our Terms of Service and other applicable policies to provide detailed guidance on acceptable and prohibited usage patterns. + +### 1.2 Scope of Application + +This AUP applies to all users of our Services, including: + +**(a)** All websites, web applications, and online platforms operated by nhcarrigan; + +**(b)** Application Programming Interfaces (APIs) and related development tools; + +**(c)** Community forums, chat platforms, and interactive services; + +**(d)** Mobile applications and desktop software; + +**(e)** Support services, documentation, and auxiliary platforms; + +**(f)** Any other services, platforms, or tools provided by nhcarrigan. + +### 1.3 Integration with Other Policies + +This AUP operates in conjunction with our comprehensive policy framework: + +**(a)** Our Terms of Service, which establish the fundamental legal relationship; + +**(b)** Our Community Code of Conduct, which governs community interactions; + +**(c)** Our Privacy Policy, which governs data collection and processing; + +**(d)** Our Service Level Agreement and Warranty Disclaimer, which define service expectations and warranties; + +**(e)** Our Content and Moderation Policy, which establishes detailed content standards and moderation procedures; + +**(f)** Our Limitation of Liability and Indemnification Policy, which governs all liability and risk allocation matters; + +**(g)** Our Export Control and Sanctions Compliance Policy, which governs international trade compliance; + +**(h)** Our API Terms and Conditions, which govern developer and API services; + +**(i)** Any additional service-specific terms or conditions that may apply. + +Where conflicts arise between policies, the most restrictive terms shall apply to ensure maximum protection for all users and our organisation. + +### 1.4 Acceptance and Compliance + +By accessing or using any of our Services, you acknowledge that you have read, understood, and agree to comply with this AUP. Continued use of the Services constitutes ongoing acceptance of these terms and any modifications we may make. + +## 2. GENERAL ACCEPTABLE USE PRINCIPLES + +### 2.1 Fundamental Usage Principles + +All use of our Services must be consistent with the following principles: + +**(a)** **Lawful Purpose**: Services may only be used for lawful purposes in accordance with all applicable laws and regulations; + +**(b)** **Good Faith**: Users must engage with Services and other users in good faith and with honest intent; + +**(c)** **Respectful Interaction**: All interactions must demonstrate respect for other users, our staff, and the broader community; + +**(d)** **Resource Responsibility**: Users must use system resources responsibly and not engage in activities that degrade performance for other users; + +**(e)** **Security Awareness**: Users must take reasonable precautions to maintain security and report potential security issues. + +### 2.2 Community Standards + +Our Services are designed to foster positive, inclusive communities. All usage must: + +**(a)** **Promote Inclusivity**: Support welcoming environments for users from diverse backgrounds; + +**(b)** **Encourage Learning**: Facilitate educational experiences and knowledge sharing; + +**(c)** **Support Collaboration**: Enable productive collaboration and constructive dialogue; + +**(d)** **Maintain Quality**: Contribute to high-quality discussions and content; + +**(e)** **Respect Boundaries**: Acknowledge and respect other users' boundaries and preferences. + +### 2.3 Ethical Usage Requirements + +Users are expected to: + +**(a)** **Act with Integrity**: Conduct themselves honestly and transparently in all interactions; + +**(b)** **Respect Privacy**: Protect the privacy and personal information of other users; + +**(c)** **Honour Intellectual Property**: Respect copyright, trademark, and other intellectual property rights; + +**(d)** **Avoid Harm**: Refrain from activities that could cause harm to individuals or organisations; + +**(e)** **Take Responsibility**: Accept responsibility for the consequences of their actions and usage. + +## 3. PROHIBITED ACTIVITIES AND CONTENT + +### 3.1 Illegal Activities + +Users are strictly prohibited from using our Services for: + +**(a)** **Criminal Activity**: Any activity that violates criminal laws in any applicable jurisdiction; + +**(b)** **Fraud and Deception**: Fraudulent schemes, identity theft, impersonation, or deceptive practices; + +**(c)** **Money Laundering**: Any activity designed to obscure the source of illegally obtained funds; + +**(d)** **Tax Evasion**: Activities designed to evade tax obligations or facilitate tax fraud; + +**(e)** **Regulatory Violations**: Activities that violate financial, securities, or other regulatory requirements; + +**(f)** **Export Control and Sanctions Violations**: Activities that violate export control laws or sanctions programmes as detailed in our Export Control and Sanctions Compliance Policy; + +**(g)** **Drug-Related Crimes**: Sale, distribution, or promotion of illegal drugs or controlled substances; + +**(h)** **Human Trafficking**: Any form of human trafficking or exploitation. + +### 3.2 Abuse and Harassment + +Our Services may not be used for: + +**(a)** **Personal Harassment**: Targeting individuals with repeated unwanted contact or attention; + +**(b)** **Cyberbullying**: Deliberate and repeated hostile behaviour intended to harm others; + +**(c)** **Doxxing**: Publishing private personal information without consent; + +**(d)** **Stalking**: Following or tracking individuals without their consent; + +**(e)** **Threats**: Making threats of violence or other harmful actions; + +**(f)** **Intimidation**: Using our Services to intimidate or coerce others; + +**(g)** **Hate Speech**: Content that promotes violence or hatred based on protected characteristics; + +**(h)** **Discrimination**: Content or behaviour that discriminates against individuals or groups. + +### 3.3 Spam and Unsolicited Communications + +Prohibited spam and unsolicited communication activities include: + +**(a)** **Mass Messaging**: Sending unsolicited bulk messages or communications; + +**(b)** **Commercial Spam**: Unsolicited advertising or promotional materials; + +**(c)** **Phishing**: Attempts to obtain sensitive information through deceptive means; + +**(d)** **Chain Letters**: Pyramid schemes, chain letters, or similar viral content; + +**(e)** **Bot Networks**: Operating networks of automated accounts for spam or manipulation; + +**(f)** **Content Flooding**: Overwhelming channels or forums with repetitive or irrelevant content; + +**(g)** **Harvesting**: Collecting user information for unsolicited marketing or communication; + +**(h)** **Referral Abuse**: Manipulating referral or affiliate programmes through deceptive means. + +### 3.4 Technical Abuse and Security Violations + +Users may not engage in: + +**(a)** **Unauthorised Access**: Attempting to access systems, accounts, or data without proper authorisation; + +**(b)** **System Disruption**: Activities designed to disrupt, disable, or overload our Services; + +**(c)** **Malware Distribution**: Uploading, transmitting, or distributing malicious software; + +**(d)** **Vulnerability Exploitation**: Exploiting security vulnerabilities for unauthorised purposes; + +**(e)** **Denial of Service**: Launching attacks designed to make services unavailable; + +**(f)** **Traffic Manipulation**: Artificially inflating metrics or manipulating usage statistics; + +**(g)** **Reverse Engineering**: Unauthorised reverse engineering of our software or systems; + +**(h)** **Circumvention**: Bypassing security measures, access controls, or usage limitations. + +### 3.5 Intellectual Property Violations + +Prohibited intellectual property violations include: + +**(a)** **Copyright Infringement**: Unauthorised use, reproduction, or distribution of copyrighted material; + +**(b)** **Trademark Misuse**: Unauthorised use of trademarks or service marks; + +**(c)** **Patent Infringement**: Use of patented inventions without proper licensing; + +**(d)** **Trade Secret Theft**: Misappropriation of confidential business information; + +**(e)** **Plagiarism**: Presenting others' work as your own without proper attribution; + +**(f)** **Licence Violations**: Using software or content in violation of licensing terms; + +**(g)** **Counterfeit Goods**: Promotion or distribution of counterfeit products; + +**(h)** **False Attribution**: Misrepresenting the source or ownership of intellectual property. + +### 3.6 Harmful Content + +**Reference to Content and Moderation Policy**: Detailed standards for prohibited content, including violent, adult, exploitative, and harmful content, are comprehensively covered in our Content and Moderation Policy, which is incorporated herein by reference. + +Users may not upload, share, or distribute any content that violates the standards set forth in our Content and Moderation Policy. + +## 4. SPECIFIC PLATFORM USAGE GUIDELINES + +### 4.1 Community Platform Usage + +When using our community forums, chat services, and interactive platforms: + +**(a)** **Stay On Topic**: Keep discussions relevant to designated channels or forums; + +**(b)** **Use Appropriate Channels**: Post content in appropriate sections or categories; + +**(c)** **Respect Moderation**: Follow moderator instructions and respect community decisions; + +**(d)** **Quality Contributions**: Contribute meaningfully to discussions rather than posting low-quality content; + +**(e)** **Search Before Posting**: Check for existing discussions before creating new topics; + +**(f)** **Constructive Criticism**: Provide helpful, constructive feedback rather than destructive criticism; + +**(g)** **Citation and Attribution**: Properly cite sources and give credit when sharing others' work; + +**(h)** **Language Standards**: Use clear, respectful language appropriate for the community context. + +### 4.2 API and Development Tool Usage + +When using our APIs and development tools: + +**(a)** **Rate Limit Compliance**: Respect all rate limits and usage quotas; + +**(b)** **Authentication**: Properly authenticate all requests and protect API credentials; + +**(c)** **Error Handling**: Implement proper error handling and retry logic; + +**(d)** **Caching**: Use appropriate caching to reduce unnecessary API calls; + +**(e)** **Documentation**: Follow published API documentation and best practices; + +**(f)** **Testing**: Use appropriate testing environments rather than production systems; + +**(g)** **Monitoring**: Monitor usage patterns to ensure compliance with limits; + +**(h)** **Updates**: Stay informed about API changes and update implementations accordingly. + +### 4.3 Content Submission and Sharing + +When submitting or sharing content through our Services: + +**(a)** **Original Work**: Ensure you have the right to share any content you submit; + +**(b)** **Accurate Information**: Provide accurate and truthful information; + +**(c)** **Appropriate Categorisation**: Categorise and tag content appropriately; + +**(d)** **Content Warnings**: Provide appropriate warnings for potentially sensitive content; + +**(e)** **Copyright Compliance**: Ensure all shared content complies with copyright law; + +**(f)** **Privacy Respect**: Do not share others' private information without consent; + +**(g)** **Quality Standards**: Maintain reasonable quality standards for shared content; + +**(h)** **Community Guidelines**: Follow any specific guidelines for content types or categories. + +## 5. COMMERCIAL AND BUSINESS USE + +### 5.1 Permitted Commercial Activities + +The following commercial activities are generally permitted when conducted in accordance with applicable terms: + +**(a)** **Educational Services**: Providing educational content, training, or consulting services; + +**(b)** **Open Source Development**: Contributing to or maintaining open source projects; + +**(c)** **Community Building**: Building communities around products or services; + +**(d)** **Content Creation**: Creating educational or informational content related to our services; + +**(e)** **Legitimate Promotion**: Reasonable promotion of products or services relevant to community interests; + +**(f)** **Professional Services**: Offering professional services related to our platforms or community; + +**(g)** **Event Organisation**: Organising educational or community events; + +**(h)** **Research Activities**: Conducting legitimate research or academic studies. + +### 5.2 Prohibited Commercial Activities + +The following commercial activities are prohibited: + +**(a)** **Unauthorised Reselling**: Reselling or redistributing our services without authorisation; + +**(b)** **Competitive Services**: Using our services to develop competing products or services; + +**(c)** **Data Harvesting**: Collecting user data for commercial exploitation; + +**(d)** **Spam Marketing**: Using our services for unsolicited marketing or advertising; + +**(e)** **Fraudulent Schemes**: Operating fraudulent business schemes or scams; + +**(f)** **Pyramid Schemes**: Promoting pyramid schemes or multi-level marketing scams; + +**(g)** **Unauthorised Monetisation**: Monetising our services without proper authorisation; + +**(h)** **Brand Confusion**: Using our brand or trademarks in ways that create confusion. + +### 5.3 Commercial Use Authorisation + +For commercial activities that may require special authorisation: + +**(a)** **Written Permission**: Obtain written permission for activities not clearly covered by standard terms; + +**(b)** **Licensing Agreements**: Enter into appropriate licensing agreements when required; + +**(c)** **Revenue Sharing**: Comply with any revenue sharing requirements; + +**(d)** **Brand Guidelines**: Follow brand usage guidelines for any use of our trademarks or logos; + +**(e)** **Commercial Terms**: Agree to any additional commercial terms that may apply; + +**(f)** **Regular Review**: Submit to regular review of commercial usage patterns; + +**(g)** **Reporting Requirements**: Comply with any reporting requirements for commercial usage; + +**(h)** **Termination Rights**: Acknowledge our right to terminate commercial arrangements. + +## 6. RESOURCE USAGE AND PERFORMANCE + +### 6.1 Fair Use of System Resources + +Users must: + +**(a)** **Reasonable Usage**: Use system resources reasonably and not excessively; + +**(b)** **Efficient Operations**: Design applications and usage patterns for efficiency; + +**(c)** **Resource Monitoring**: Monitor resource usage to avoid exceeding reasonable limits; + +**(d)** **Optimisation**: Optimise code and queries for performance and resource efficiency; + +**(e)** **Caching**: Implement appropriate caching to reduce server load; + +**(f)** **Batch Operations**: Use batch operations rather than individual requests where appropriate; + +**(g)** **Off-Peak Usage**: Schedule resource-intensive operations during off-peak hours when possible; + +**(h)** **Graceful Degradation**: Implement graceful degradation when resources are limited. + +### 6.2 Prohibited Resource Usage + +The following resource usage patterns are prohibited: + +**(a)** **Excessive Consumption**: Using disproportionate amounts of bandwidth, storage, or processing power; + +**(b)** **Resource Hoarding**: Claiming or reserving resources not actively being used; + +**(c)** **Intentional Overload**: Deliberately overloading systems or services; + +**(d)** **Mining Activities**: Using our systems for cryptocurrency mining or similar activities; + +**(e)** **Proxy Services**: Using our services as proxies or VPNs without authorisation; + +**(f)** **Load Testing**: Conducting load testing or stress testing without prior approval; + +**(g)** **Automated Scraping**: Automated scraping or crawling beyond reasonable limits; + +**(h)** **Storage Abuse**: Using storage services for inappropriate content or excessive backup purposes. + +### 6.3 Performance Impact Mitigation + +To minimise performance impact on other users: + +**(a)** **Rate Limiting**: Implement client-side rate limiting to avoid overwhelming services; + +**(b)** **Error Handling**: Implement proper error handling to avoid retry storms; + +**(c)** **Connection Management**: Properly manage connections and avoid connection leaks; + +**(d)** **Data Compression**: Use appropriate data compression for network transfers; + +**(e)** **Lazy Loading**: Implement lazy loading for non-critical resources; + +**(f)** **Progress Monitoring**: Monitor long-running operations for completion and errors; + +**(g)** **Timeout Handling**: Implement appropriate timeouts for all operations; + +**(h)** **Resource Cleanup**: Properly clean up resources after use. + +## 7. DATA HANDLING AND PRIVACY + +### 7.1 Personal Data Protection + +Users must: + +**(a)** **Consent Requirements**: Obtain proper consent before collecting or processing personal data; + +**(b)** **Data Minimisation**: Collect only the minimum data necessary for stated purposes; + +**(c)** **Purpose Limitation**: Use personal data only for the purposes for which it was collected; + +**(d)** **Security Measures**: Implement appropriate security measures to protect personal data; + +**(e)** **Retention Limits**: Retain personal data only for as long as necessary; + +**(f)** **Access Rights**: Respect individuals' rights to access, correct, and delete their data; + +**(g)** **Breach Notification**: Promptly report any suspected data breaches or security incidents; + +**(h)** **Legal Compliance**: Comply with all applicable data protection laws and regulations. + +### 7.2 Prohibited Data Practices + +Users may not: + +**(a)** **Unauthorised Collection**: Collect personal data without proper legal basis; + +**(b)** **Data Scraping**: Scrape or harvest user data from our services; + +**(c)** **Profile Building**: Build user profiles without explicit consent; + +**(d)** **Data Sale**: Sell or monetise personal data obtained through our services; + +**(e)** **Cross-Platform Tracking**: Track users across multiple platforms without consent; + +**(f)** **Sensitive Data**: Process sensitive personal data without explicit consent and proper safeguards; + +**(g)** **Data Sharing**: Share personal data with third parties without proper consent; + +**(h)** **Retention Abuse**: Retain personal data longer than necessary or permitted. + +### 7.3 Data Security Requirements + +When handling data through our services: + +**(a)** **Encryption**: Use appropriate encryption for data in transit and at rest; + +**(b)** **Access Controls**: Implement proper access controls and authentication; + +**(c)** **Audit Logging**: Maintain audit logs of data access and processing activities; + +**(d)** **Backup Security**: Ensure backups are properly secured and encrypted; + +**(e)** **Incident Response**: Have appropriate incident response procedures in place; + +**(f)** **Regular Updates**: Keep systems updated with security patches; + +**(g)** **Vulnerability Management**: Regularly assess and address security vulnerabilities; + +**(h)** **Staff Training**: Ensure staff are trained on data security best practices. + +## 8. ENFORCEMENT AND COMPLIANCE + +### 8.1 Monitoring and Detection + +We employ various methods to monitor compliance with this AUP: + +**(a)** **Automated Monitoring**: Automated systems to detect prohibited activities; + +**(b)** **User Reporting**: Community reporting mechanisms for policy violations; + +**(c)** **Manual Review**: Human review of reported content and activities; + +**(d)** **Pattern Analysis**: Analysis of usage patterns to identify potential violations; + +**(e)** **Security Scanning**: Regular security scans to identify malicious activities; + +**(f)** **Performance Monitoring**: Monitoring for unusual resource usage patterns; + +**(g)** **Content Analysis**: Analysis of submitted content for policy compliance; + +**(h)** **Behavioural Analysis**: Monitoring for suspicious or harmful behavioural patterns. + +### 8.2 Violation Response Procedures + +When violations are identified, we may take the following actions: + +**(a)** **Warning**: Issue formal warnings about policy violations; + +**(b)** **Content Removal**: Remove violating content from our services; + +**(c)** **Account Suspension**: Temporarily suspend user accounts; + +**(d)** **Feature Restrictions**: Restrict access to specific features or services; + +**(e)** **Rate Limiting**: Implement additional rate limits for abusive usage; + +**(f)** **Account Termination**: Permanently terminate user accounts for serious violations; + +**(g)** **Legal Action**: Pursue legal remedies for serious violations or continued non-compliance; + +**(h)** **Law Enforcement**: Report criminal activities to appropriate law enforcement agencies. + +### 8.3 Progressive Enforcement + +Our enforcement approach generally follows a progressive model: + +**(a)** **First Violation**: Education and warning about policy requirements; + +**(b)** **Second Violation**: Formal warning with specific corrective actions required; + +**(c)** **Third Violation**: Temporary suspension with mandatory policy review; + +**(d)** **Continued Violations**: Permanent account termination and service exclusion; + +**(e)** **Serious Violations**: Immediate severe penalties for violations that pose significant risk; + +**(f)** **Criminal Activity**: Immediate termination and law enforcement referral; + +**(g)** **Security Threats**: Immediate protective measures and account restrictions; + +**(h)** **Repeated Offenders**: Enhanced penalties for users with previous violation history. + +### 8.4 Appeals and Review + +Users may appeal enforcement actions through: + +**(a)** **Appeals Process**: Formal appeals process as outlined in our Community Appeals Policy; + +**(b)** **Evidence Submission**: Opportunity to provide evidence and explanations; + +**(c)** **Independent Review**: Review by staff members not involved in the original decision; + +**(d)** **Corrective Actions**: Opportunity to take corrective actions to address violations; + +**(e)** **Account Restoration**: Possible account restoration for successfully appealed actions; + +**(f)** **Policy Clarification**: Clarification of policy requirements and expectations; + +**(g)** **Education Opportunities**: Additional education about policy compliance; + +**(h)** **Ongoing Monitoring**: Enhanced monitoring for users with violation history. + +## 9. REPORTING VIOLATIONS + +### 9.1 Community Reporting + +We encourage users to report policy violations through: + +**(a)** **Report Features**: Built-in reporting features within our applications and platforms; + +**(b)** **Email Reporting**: Direct email reports to abuse@nhcarrigan.com; + +**(c)** **Community Moderators**: Reports to designated community moderators; + +**(d)** **Support Channels**: Reports through general support channels with appropriate categorisation; + +**(e)** **Anonymous Reporting**: Anonymous reporting options where technically feasible; + +**(f)** **Urgent Reports**: Expedited reporting for urgent safety or security issues; + +**(g)** **Documentation**: Detailed documentation of violations with supporting evidence; + +**(h)** **Follow-up**: Follow-up communication about report status and outcomes. + +### 9.2 What to Include in Reports + +Effective violation reports should include: + +**(a)** **Specific Details**: Clear description of the violating behaviour or content; + +**(b)** **Policy Reference**: Reference to specific policy provisions that were violated; + +**(c)** **Evidence**: Screenshots, logs, or other evidence supporting the report; + +**(d)** **Context**: Relevant context that helps understand the violation; + +**(e)** **Impact**: Description of harm or potential harm caused by the violation; + +**(f)** **User Information**: Information about the violating user or account; + +**(g)** **Time and Date**: When the violation occurred; + +**(h)** **Contact Information**: Your contact information for follow-up questions. + +### 9.3 Reporter Protection + +We are committed to protecting users who report violations: + +**(a)** **Confidentiality**: Reporter information is kept confidential to the extent possible; + +**(b)** **No Retaliation**: We prohibit retaliation against users who make good-faith reports; + +**(c)** **Anonymous Options**: Anonymous reporting options where technically feasible; + +**(d)** **Privacy Protection**: Reporter identity is not disclosed to alleged violators; + +**(e)** **Support Services**: Support for users who experience harassment for reporting violations; + +**(f)** **Legal Protection**: Legal support for reporters facing retaliation; + +**(g)** **Community Support**: Community support for users who report serious violations; + +**(h)** **Safe Environment**: Commitment to maintaining safe environments for reporting violations. + +## 10. POLICY UPDATES AND MODIFICATIONS + +### 10.1 Right to Modify + +We reserve the right to modify this AUP at any time to: + +**(a)** **Address New Risks**: Respond to emerging security threats or abuse patterns; + +**(b)** **Legal Compliance**: Ensure compliance with changing laws and regulations; + +**(c)** **Service Evolution**: Reflect changes in our services and technology; + +**(d)** **Community Feedback**: Incorporate feedback from users and community members; + +**(e)** **Best Practices**: Align with evolving industry best practices; + +**(f)** **Clarification**: Clarify ambiguous provisions based on enforcement experience; + +**(g)** **Coverage Expansion**: Expand coverage to address previously unaddressed issues; + +**(h)** **Effectiveness**: Improve the effectiveness of policy enforcement. + +### 10.2 Notification of Changes + +Material changes to this AUP will be communicated through: + +**(a)** **Website Notice**: Prominent notice on our primary website; + +**(b)** **Email Notification**: Direct notification to registered users where contact information is available; + +**(c)** **In-Service Notifications**: Notifications within our applications and platforms; + +**(d)** **Community Announcements**: Announcements in community forums and channels; + +**(e)** **Policy Updates Page**: Dedicated page documenting policy changes and their rationale; + +**(f)** **Version History**: Maintained version history of policy changes; + +**(g)** **Effective Date Notice**: Clear indication of when changes become effective; + +**(h)** **Transition Periods**: Reasonable transition periods for compliance with new requirements. + +### 10.3 User Response to Changes + +Following notification of policy changes: + +**(a)** **Review Period**: Users have reasonable time to review changes before they take effect; + +**(b)** **Continued Use**: Continued use of services constitutes acceptance of modified terms; + +**(c)** **Opt-Out Rights**: Users may discontinue service use if they disagree with changes; + +**(d)** **Feedback Opportunities**: Opportunities to provide feedback about proposed changes; + +**(e)** **Clarification Requests**: Users may request clarification about policy changes; + +**(f)** **Compliance Timeline**: Reasonable timeline for bringing existing usage into compliance; + +**(g)** **Support Resources**: Additional support resources to help understand and comply with changes; + +**(h)** **Grandfathering**: Consideration of grandfathering provisions for existing legitimate usage. + +## 11. CONTACT INFORMATION AND SUPPORT + +### 11.1 Policy Questions and Clarifications + +For questions about this AUP: + +**Email:** aup@nhcarrigan.com + +**Subject Line:** AUP Inquiry - [Brief Description] + +**Response Time:** Within 3 business days for policy clarification requests + +### 11.2 Violation Reporting + +To report policy violations: + +**Email:** abuse@nhcarrigan.com + +**Subject Line:** Policy Violation Report - [Service/Platform] + +**Response Time:** Within 24 hours for urgent safety issues, 48 hours for standard reports + +### 11.3 Appeals and Disputes + +For appeals related to AUP enforcement: + +**Email:** appeals@nhcarrigan.com + +**Subject Line:** AUP Appeal - [Account/Case Reference] + +**Process:** Follow our Community Appeals Policy procedures + +### 11.4 Technical Support + +For technical issues related to policy compliance: + +**Email:** support@nhcarrigan.com + +**Community Forum:** https://forum.nhcarrigan.com + +**Response Time:** Within 48 hours for technical support requests + +**Document Version:** 1.0 + +**Last Updated:** 15 September 2025 + +**Effective Date:** 15 September 2025 + +**Next Review Date:** 15 September 2026 + +--- + +*This Acceptable Use Policy establishes comprehensive guidelines for appropriate use of our services. By using our Services, you agree to comply with these usage standards and acknowledge that violations may result in service restrictions or termination. For questions about acceptable use or to report violations, please contact us at aup@nhcarrigan.com.* diff --git a/src/content/docs/legal/content-moderation.md b/src/content/docs/legal/content-moderation.md new file mode 100644 index 0000000..babfbf4 --- /dev/null +++ b/src/content/docs/legal/content-moderation.md @@ -0,0 +1,979 @@ +--- +title: Content and Moderation Policy +--- + +**ESTABLISHING STANDARDS FOR CONTENT AND MODERATION PRACTICES ACROSS ALL PLATFORMS** + +## 1. INTRODUCTION AND SCOPE + +### 1.1 Policy Purpose and Objectives + +This Content and Moderation Policy ("Policy") establishes comprehensive standards for content creation, sharing, and moderation across all services, platforms, and applications operated by nhcarrigan ("we," "us," "our," or "the Company"). This Policy aims to maintain safe, inclusive, and productive environments whilst balancing free expression with community safety and legal compliance. + +### 1.2 Scope of Application + +This Policy applies to all content and user interactions across: + +**(a)** Community forums, discussion boards, and chat platforms; + +**(b)** User-generated content features in applications and websites; + +**(c)** Comment systems, feedback mechanisms, and review platforms; + +**(d)** Social media integrations and sharing features; + +**(e)** Developer communities, documentation wikis, and collaboration tools; + +**(f)** Support channels, help desks, and customer service interactions; + +**(g)** Event platforms, livestreams, and interactive presentations; + +**(h)** Any other platforms or services that facilitate user content or communication. + +### 1.3 Integration with Other Policies + +This Policy operates in conjunction with our comprehensive policy framework: + +**(a)** Our Terms of Service, which establish the fundamental legal relationship; + +**(b)** Our Community Code of Conduct, which establishes behavioural expectations; + +**(c)** Our Acceptable Use Policy, which defines prohibited activities and usage patterns; + +**(d)** Our Privacy Policy, which governs data collection and processing in moderation activities; + +**(e)** Our Limitation of Liability and Indemnification Policy, which governs all liability and risk allocation matters; + +**(f)** Our Service Level Agreement and Warranty Disclaimer, which define service expectations; + +**(g)** Our Export Control and Sanctions Compliance Policy, which governs international compliance; + +**(h)** Our API Terms and Conditions, which govern developer services; + +**(i)** Our Appeals Policy, which provides procedures for challenging moderation decisions; + +**(j)** Platform-specific community guidelines and rules where applicable. + +### 1.4 Definitions and Terminology + +For the purposes of this Policy: + +**(a)** "Content" includes text, images, videos, audio, code, links, and any other user-submitted material; + +**(b)** "Moderation" encompasses all activities related to reviewing, approving, removing, or restricting content; + +**(c)** "Community Standards" refer to the collective expectations and norms for acceptable behaviour; + +**(d)** "Harmful Content" means content that violates our policies or applicable laws; + +**(e)** "Moderators" include staff members, volunteers, and automated systems involved in content review; + +**(f)** "Users" include all individuals who create, share, or interact with content on our platforms. + +## 2. CONTENT STANDARDS AND GUIDELINES + +### 2.1 Acceptable Content Principles + +All content on our platforms must adhere to the following principles: + +**(a)** **Lawful Content**: Content must comply with all applicable laws and regulations in relevant jurisdictions; + +**(b)** **Respectful Communication**: Content should demonstrate respect for other users and promote constructive dialogue; + +**(c)** **Truthful Information**: Content should be accurate and not deliberately misleading or deceptive; + +**(d)** **Contextual Appropriateness**: Content should be appropriate for the platform, audience, and community context; + +**(e)** **Constructive Purpose**: Content should contribute positively to discussions and community objectives; + +**(f)** **Intellectual Property Respect**: Content must respect copyright, trademark, and other intellectual property rights; + +**(g)** **Privacy Protection**: Content should not violate others' privacy or share personal information without consent; + +**(h)** **Community Benefit**: Content should benefit the broader community and support our platform objectives. + +### 2.2 Encouraged Content Types + +We particularly welcome and encourage: + +**(a)** **Educational Content**: Tutorials, guides, explanations, and learning resources; + +**(b)** **Constructive Feedback**: Helpful feedback, suggestions, and collaborative improvements; + +**(c)** **Technical Discussions**: Professional discussions about technology, development, and best practices; + +**(d)** **Community Support**: Content that helps other users solve problems or learn new skills; + +**(e)** **Original Contributions**: Original research, insights, and creative contributions; + +**(f)** **Inclusive Content**: Content that welcomes and includes users from diverse backgrounds; + +**(g)** **Solution-Oriented**: Content focused on solving problems and providing practical solutions; + +**(h)** **Well-Documented**: Content that provides clear documentation, examples, and references. + +### 2.3 Content Quality Standards + +Quality content on our platforms should demonstrate: + +**(a)** **Clarity and Coherence**: Clear, well-structured communication that is easy to understand; + +**(b)** **Relevance**: Content that is relevant to the platform, community, or discussion topic; + +**(c)** **Completeness**: Sufficient detail and information to be useful and actionable; + +**(d)** **Accuracy**: Factually correct information with appropriate sources and citations; + +**(e)** **Professional Tone**: Appropriate tone and language for the platform and audience; + +**(f)** **Proper Attribution**: Proper citation and attribution of sources, references, and borrowed content; + +**(g)** **Updated Information**: Current and up-to-date information, with updates when circumstances change; + +**(h)** **Accessible Format**: Content formatted for accessibility and ease of consumption. + +### 2.4 Platform-Specific Guidelines + +Different platforms may have additional specific guidelines: + +**(a)** **Technical Forums**: Focus on technical accuracy, code quality, and professional discourse; + +**(b)** **Community Spaces**: Emphasis on inclusive communication and community building; + +**(c)** **Support Channels**: Priority on helpful, solution-oriented responses; + +**(d)** **Educational Platforms**: Focus on pedagogical value and learning outcomes; + +**(e)** **Collaboration Tools**: Emphasis on productive collaboration and professional communication; + +**(f)** **Social Features**: Balance between personal expression and community standards; + +**(g)** **Developer Resources**: Technical accuracy, completeness, and practical applicability; + +**(h)** **Public-Facing Content**: Higher standards for content that represents our community publicly. + +## 3. PROHIBITED CONTENT CATEGORIES + +### 3.1 Illegal and Harmful Content + +The following types of content are strictly prohibited: + +**(a)** **Illegal Activities**: Content promoting, facilitating, or describing illegal activities; + +**(b)** **Violence and Threats**: Content containing threats, promoting violence, or glorifying harmful acts; + +**(c)** **Hate Speech**: Content that promotes hatred or discrimination based on protected characteristics; + +**(d)** **Harassment and Bullying**: Content designed to harass, intimidate, or bully individuals or groups; + +**(e)** **Self-Harm**: Content that promotes, encourages, or provides instructions for self-harm or suicide; + +**(f)** **Exploitation**: Content involving the exploitation of individuals, particularly minors; + +**(g)** **Terrorism**: Content that promotes, supports, or facilitates terrorist activities; + +**(h)** **Human Trafficking**: Content related to human trafficking or modern slavery. + +### 3.2 Inappropriate and Offensive Content + +Content that violates community standards includes: + +**(a)** **Adult Content**: Sexually explicit material, nudity, or adult content inappropriate for general audiences; + +**(b)** **Graphic Violence**: Excessively graphic or disturbing violent content; + +**(c)** **Offensive Language**: Excessive profanity, slurs, or offensive language targeting individuals or groups; + +**(d)** **Disturbing Content**: Content designed to shock, disturb, or cause distress to viewers; + +**(e)** **Inappropriate Imagery**: Images that violate community standards or platform guidelines; + +**(f)** **Cultural Insensitivity**: Content that demonstrates insensitivity to cultural, religious, or ethnic differences; + +**(g)** **Discriminatory Content**: Content that discriminates against individuals or groups; + +**(h)** **Degrading Content**: Content that degrades or dehumanises individuals or groups. + +### 3.3 Spam and Low-Quality Content + +Prohibited spam and low-quality content includes: + +**(a)** **Repetitive Posting**: Excessive repetition of the same or similar content across platforms; + +**(b)** **Off-Topic Content**: Content that is irrelevant to the platform, community, or discussion; + +**(c)** **Commercial Spam**: Unsolicited advertising, promotional content, or commercial messages; + +**(d)** **Link Spam**: Excessive or inappropriate sharing of links, especially to unrelated content; + +**(e)** **Copy-Paste Content**: Wholesale copying of content without attribution or added value; + +**(f)** **Clickbait**: Misleading headlines or descriptions designed primarily to generate clicks; + +**(g)** **Empty Content**: Posts with little or no substantive content or value; + +**(h)** **Bot-Generated Content**: Automated content that doesn't add value to discussions. + +### 3.4 Intellectual Property Violations + +Content that violates intellectual property rights includes: + +**(a)** **Copyright Infringement**: Unauthorised use, reproduction, or distribution of copyrighted material; + +**(b)** **Trademark Violations**: Unauthorised use of trademarks, service marks, or brand identities; + +**(c)** **Patent Infringement**: Sharing of content that infringes on patent rights; + +**(d)** **Trade Secret Disclosure**: Unauthorised disclosure of confidential business information; + +**(e)** **Plagiarism**: Presenting others' work as one's own without proper attribution; + +**(f)** **Licence Violations**: Using content in ways that violate licensing terms; + +**(g)** **Counterfeiting**: Promoting or distributing counterfeit goods or services; + +**(h)** **False Attribution**: Misrepresenting the ownership or source of intellectual property. + +### 3.5 Misinformation and Deceptive Content + +Prohibited misinformation and deceptive practices include: + +**(a)** **Deliberate Misinformation**: Intentionally false or misleading information; + +**(b)** **Conspiracy Theories**: Harmful conspiracy theories that could cause real-world harm; + +**(c)** **Medical Misinformation**: False medical advice or information that could endanger health; + +**(d)** **Financial Scams**: Fraudulent financial advice, investment schemes, or get-rich-quick scams; + +**(e)** **Identity Deception**: Impersonating others or creating false identities; + +**(f)** **Fake Reviews**: False reviews, testimonials, or ratings; + +**(g)** **Manipulated Media**: Deepfakes, doctored images, or manipulated audio/video content; + +**(h)** **Phishing Content**: Content designed to steal personal information or credentials. + +## 4. MODERATION APPROACH AND METHODOLOGY + +### 4.1 Multi-Layered Moderation System + +Our moderation approach employs multiple layers: + +**(a)** **Automated Detection**: AI and machine learning systems for initial content screening; + +**(b)** **Community Reporting**: User reporting mechanisms for identifying problematic content; + +**(c)** **Human Review**: Human moderators for nuanced content assessment; + +**(d)** **Expert Review**: Subject matter experts for specialised or complex content; + +**(e)** **Appeal Process**: Structured appeals process for moderation decisions; + +**(f)** **Continuous Improvement**: Regular assessment and improvement of moderation processes; + +**(g)** **Training and Development**: Ongoing training for moderation staff and systems; + +**(h)** **Quality Assurance**: Quality assurance processes for moderation consistency and accuracy. + +### 4.2 Proactive and Reactive Moderation + +We employ both proactive and reactive moderation strategies: + +**Proactive Moderation:** + +**(a)** **Pre-Publication Review**: Review of content before it becomes publicly visible; + +**(b)** **Automated Screening**: Automated systems that flag potentially problematic content; + +**(c)** **Pattern Recognition**: Identification of emerging harmful trends or behaviours; + +**(d)** **Risk Assessment**: Assessment of content that may pose risks to community safety; + +**Reactive Moderation:** + +**(a)** **User Reports**: Response to user reports of problematic content; + +**(b)** **Post-Publication Review**: Review of content after it has been published; + +**(c)** **Escalation Handling**: Management of escalated moderation cases; + +**(d)** **Incident Response**: Response to significant content-related incidents. + +### 4.3 Context-Sensitive Moderation + +Our moderation decisions consider: + +**(a)** **Platform Context**: Different standards for different types of platforms and communities; + +**(b)** **Audience Considerations**: Age appropriateness and audience expectations; + +**(c)** **Cultural Context**: Cultural sensitivity and regional considerations; + +**(d)** **Historical Context**: Historical context and evolving social norms; + +**(e)** **Intent Assessment**: Evaluation of user intent behind content creation; + +**(f)** **Impact Evaluation**: Assessment of potential harm or community impact; + +**(g)** **Precedent Consideration**: Consistency with previous moderation decisions; + +**(h)** **Legal Requirements**: Compliance with applicable legal requirements in different jurisdictions. + +### 4.4 Moderation Decision Framework + +Moderation decisions follow a structured framework: + +**(a)** **Policy Review**: Assessment against all applicable policies and guidelines; + +**(b)** **Context Analysis**: Consideration of context, intent, and potential impact; + +**(c)** **Severity Assessment**: Evaluation of the severity of policy violations; + +**(d)** **Proportionate Response**: Selection of appropriate and proportionate enforcement actions; + +**(e)** **Consistency Check**: Verification of consistency with similar cases; + +**(f)** **Documentation**: Comprehensive documentation of decisions and rationale; + +**(g)** **Review Process**: Internal review process for significant decisions; + +**(h)** **Communication**: Clear communication of decisions and expectations to users. + +## 5. ENFORCEMENT ACTIONS AND CONSEQUENCES + +### 5.1 Range of Enforcement Actions + +We may take the following enforcement actions for policy violations: + +**(a)** **Content Warning**: Adding warning labels to content that may be sensitive or controversial; + +**(b)** **Content Removal**: Removing content that violates our policies; + +**(c)** **Visibility Reduction**: Reducing the visibility or reach of problematic content; + +**(d)** **Edit Requirements**: Requiring users to edit content to bring it into compliance; + +**(e)** **User Warning**: Issuing formal warnings to users about policy violations; + +**(f)** **Temporary Restrictions**: Temporarily restricting user privileges or access to features; + +**(g)** **Account Suspension**: Temporarily suspending user accounts; + +**(h)** **Account Termination**: Permanently terminating user accounts for serious or repeated violations. + +### 5.2 Progressive Enforcement Approach + +Our enforcement generally follows a progressive approach: + +**First Violation:** +**(a)** Educational response with policy clarification; +**(b)** Content removal or editing requirements; +**(c)** Informal guidance on community expectations; + +**Second Violation:** +**(a)** Formal warning with specific improvement expectations; +**(b)** Temporary restrictions on posting or participation; +**(c)** Required acknowledgement of policy understanding; + +**Subsequent Violations:** +**(a)** Escalating temporary suspensions; +**(b)** Loss of specific privileges or features; +**(c)** Enhanced monitoring of future content; + +**Serious or Repeated Violations:** +**(a)** Permanent account suspension or termination; +**(b)** Removal from community platforms; +**(c)** Potential legal action for serious violations. + +### 5.3 Immediate Action Circumstances + +Immediate severe enforcement may be applied for: + +**(a)** **Safety Threats**: Content that poses immediate threats to user safety; + +**(b)** **Legal Violations**: Content that clearly violates applicable laws; + +**(c)** **Severe Harassment**: Serious harassment or abuse of other users; + +**(d)** **Doxxing**: Sharing of private personal information without consent; + +**(e)** **Impersonation**: Impersonating others or creating deceptive identities; + +**(f)** **Security Threats**: Content that poses security risks to our platforms or users; + +**(g)** **Criminal Activity**: Content related to criminal activity or illegal behaviour; + +**(h)** **Terms of Service Violations**: Serious violations of fundamental terms of service. + +### 5.4 Account Status and Restrictions + +Account restrictions may include: + +**(a)** **Posting Limitations**: Restrictions on frequency or type of content posting; + +**(b)** **Feature Access**: Limited access to specific platform features or capabilities; + +**(c)** **Visibility Restrictions**: Reduced visibility of user content or profile; + +**(d)** **Community Participation**: Restrictions on participation in community features; + +**(e)** **Moderation Queue**: Requirement for content pre-approval before publication; + +**(f)** **Enhanced Monitoring**: Increased scrutiny of user content and behaviour; + +**(g)** **Probationary Status**: Temporary probationary status with enhanced oversight; + +**(h)** **Appeal Restrictions**: Limitations on the number or frequency of appeals. + +## 6. COMMUNITY REPORTING AND PARTICIPATION + +### 6.1 Community Reporting Mechanisms + +We provide multiple ways for community members to report problematic content: + +**(a)** **Built-in Report Features**: Report buttons and forms integrated into all content areas; + +**(b)** **Email Reporting**: Dedicated email addresses for reporting different types of violations; + +**(c)** **Community Moderators**: Designated community moderators for specific platforms or topics; + +**(d)** **Anonymous Reporting**: Options for anonymous reporting where technically feasible; + +**(e)** **Urgent Reports**: Express reporting channels for urgent safety concerns; + +**(f)** **Detailed Reports**: Comprehensive reporting forms for complex violations; + +**(g)** **Follow-up Systems**: Systems for following up on report status and outcomes; + +**(h)** **Batch Reporting**: Mechanisms for reporting multiple related violations efficiently. + +### 6.2 What to Include in Reports + +Effective reports should include: + +**(a)** **Specific Content**: Clear identification of the problematic content or behaviour; + +**(b)** **Policy Violation**: Explanation of which policies or guidelines are being violated; + +**(c)** **Evidence**: Screenshots, links, or other evidence supporting the report; + +**(d)** **Context**: Relevant context that helps understand the situation; + +**(e)** **Impact Description**: Explanation of how the content affects you or the community; + +**(f)** **User Information**: Information about the user(s) involved in the violation; + +**(g)** **Timestamp**: When the violation occurred or was discovered; + +**(h)** **Contact Information**: Your contact information for follow-up questions (where desired). + +### 6.3 Community Moderation Programme + +We may establish community moderation programmes that include: + +**(a)** **Volunteer Moderators**: Community volunteers who help with content moderation; + +**(b)** **Trusted Users**: Experienced users with enhanced reporting or flagging capabilities; + +**(c)** **Subject Matter Experts**: Experts in specific domains who assist with technical content review; + +**(d)** **Community Leaders**: Recognised community leaders who help set standards and resolve disputes; + +**(e)** **Moderation Training**: Training programmes for community moderators; + +**(f)** **Recognition Systems**: Recognition and appreciation systems for community moderators; + +**(g)** **Support Resources**: Resources and support for community moderation activities; + +**(h)** **Feedback Mechanisms**: Regular feedback and improvement processes for community moderation. + +### 6.4 Reporter Protection and Support + +We are committed to protecting community members who report violations: + +**(a)** **Confidentiality**: Reporter information is kept confidential to the extent possible; + +**(b)** **Anti-Retaliation**: Strict prohibition against retaliation for good-faith reports; + +**(c)** **Anonymous Options**: Anonymous reporting capabilities where technically feasible; + +**(d)** **Identity Protection**: Reporter identity is not disclosed to reported users; + +**(e)** **Support Services**: Support for users who face consequences for reporting violations; + +**(f)** **Legal Protection**: Legal support for reporters facing retaliation or harassment; + +**(g)** **Community Support**: Community support systems for users who report serious violations; + +**(h)** **Safe Environment**: Commitment to maintaining safe environments for reporting activities. + +## 7. APPEALS AND REVIEW PROCESS + +### 7.1 Right to Appeal + +Users have the right to appeal moderation decisions including: + +**(a)** **Content Removal**: Appeals for removed or restricted content; + +**(b)** **Account Actions**: Appeals for account suspensions, restrictions, or terminations; + +**(c)** **Warning Actions**: Appeals for formal warnings or policy violation notices; + +**(d)** **Feature Restrictions**: Appeals for restrictions on specific platform features; + +**(e)** **Community Actions**: Appeals for community-specific moderation decisions; + +**(f)** **Automated Decisions**: Appeals for decisions made by automated moderation systems; + +**(g)** **Reporting Decisions**: Appeals for decisions not to take action on reports; + +**(h)** **Policy Interpretations**: Appeals regarding interpretation of policy provisions. + +### 7.2 Appeals Process + +The appeals process includes the following steps: + +**(a)** **Initial Submission**: Submit appeal through designated channels with supporting information; + +**(b)** **Acknowledgement**: Receive acknowledgement of appeal receipt within specified timeframe; + +**(c)** **Review Assignment**: Assignment of appeal to appropriate review team or individual; + +**(d)** **Evidence Review**: Comprehensive review of original decision and new evidence; + +**(e)** **Independent Assessment**: Assessment by reviewers not involved in original decision; + +**(f)** **Decision Communication**: Clear communication of appeal decision and rationale; + +**(g)** **Implementation**: Implementation of any changes resulting from successful appeals; + +**(h)** **Follow-up**: Follow-up to ensure proper implementation and user satisfaction. + +### 7.3 Appeal Requirements and Information + +Effective appeals should include: + +**(a)** **Original Decision**: Reference to the original moderation decision being appealed; + +**(b)** **Grounds for Appeal**: Clear explanation of why the decision should be reconsidered; + +**(c)** **New Evidence**: Any new evidence or information relevant to the appeal; + +**(d)** **Policy Interpretation**: Explanation of how policies should be interpreted differently; + +**(e)** **Context Clarification**: Additional context that may not have been considered initially; + +**(f)** **Impact Statement**: Explanation of how the decision affects the user or community; + +**(g)** **Requested Outcome**: Clear statement of what outcome the user is seeking; + +**(h)** **Supporting Documentation**: Any supporting documentation, screenshots, or references. + +### 7.4 Appeal Outcomes and Implementation + +Appeal decisions may result in: + +**(a)** **Decision Upheld**: Original decision is confirmed as correct and proportionate; + +**(b)** **Decision Reversed**: Original decision is overturned and actions are reversed; + +**(c)** **Modified Action**: Original action is modified to be more appropriate or proportionate; + +**(d)** **Alternative Resolution**: Alternative resolution that addresses concerns while maintaining standards; + +**(e)** **Policy Clarification**: Clarification of policy interpretation for future application; + +**(f)** **Additional Review**: Assignment for additional review by higher-level reviewers; + +**(g)** **Mediation**: Referral to mediation or alternative dispute resolution processes; + +**(h)** **Systemic Changes**: Implementation of systemic changes to prevent similar issues. + +## 8. TRANSPARENCY AND ACCOUNTABILITY + +### 8.1 Transparency Reporting + +We are committed to transparency in our moderation practices through: + +**(a)** **Moderation Reports**: Regular reports on moderation activities and statistics; + +**(b)** **Policy Enforcement Data**: Data on policy violations and enforcement actions; + +**(c)** **Appeal Statistics**: Information about appeals processes and outcomes; + +**(d)** **Trend Analysis**: Analysis of content trends and emerging moderation challenges; + +**(e)** **Process Documentation**: Public documentation of our moderation processes and procedures; + +**(f)** **Decision Examples**: Anonymised examples of moderation decisions and rationale; + +**(g)** **Policy Updates**: Regular updates about changes to content policies and standards; + +**(h)** **Community Feedback**: Reports on community feedback and input on moderation practices. + +### 8.2 Accountability Mechanisms + +We maintain accountability through: + +**(a)** **Internal Audits**: Regular internal audits of moderation decisions and processes; + +**(b)** **External Review**: Periodic external review of moderation practices and policies; + +**(c)** **Quality Assurance**: Quality assurance programmes for moderation consistency; + +**(d)** **Training Programmes**: Regular training and development for moderation staff; + +**(e)** **Feedback Systems**: Systems for collecting and acting on feedback about moderation; + +**(f)** **Performance Metrics**: Key performance indicators for moderation quality and consistency; + +**(g)** **Continuous Improvement**: Ongoing improvement processes based on data and feedback; + +**(h)** **Stakeholder Engagement**: Engagement with community stakeholders on moderation practices. + +### 8.3 Community Input and Participation + +We seek community input through: + +**(a)** **Policy Consultations**: Community consultations on significant policy changes; + +**(b)** **Feedback Mechanisms**: Regular feedback collection on moderation practices; + +**(c)** **Community Surveys**: Surveys to understand community perspectives on content standards; + +**(d)** **Focus Groups**: Focus groups with diverse community representatives; + +**(e)** **Public Discussions**: Public discussions about moderation challenges and solutions; + +**(f)** **Advisory Groups**: Community advisory groups for content and moderation policy; + +**(g)** **User Research**: Research to understand user experiences with moderation; + +**(h)** **Co-Creation Processes**: Collaborative development of community standards and guidelines. + +### 8.4 External Accountability + +We engage in external accountability through: + +**(a)** **Industry Standards**: Adherence to industry standards for content moderation; + +**(b)** **Best Practice Sharing**: Participation in industry initiatives to share best practices; + +**(c)** **Academic Collaboration**: Collaboration with academic researchers on moderation effectiveness; + +**(d)** **Regulatory Compliance**: Compliance with applicable regulatory requirements; + +**(e)** **Third-Party Audits**: Periodic third-party audits of moderation practices; + +**(f)** **Certification Programmes**: Participation in relevant certification programmes; + +**(g)** **Professional Standards**: Adherence to professional standards for content moderation; + +**(h)** **Stakeholder Engagement**: Engagement with external stakeholders and advocacy groups. + +## 9. SPECIAL CONSIDERATIONS AND CONTEXTS + +### 9.1 Cultural and Regional Sensitivity + +Our moderation practices consider: + +**(a)** **Cultural Differences**: Recognition of cultural differences in communication styles and norms; + +**(b)** **Regional Variations**: Adaptation to regional legal and social requirements; + +**(c)** **Language Considerations**: Understanding of language nuances and translation challenges; + +**(d)** **Religious Sensitivity**: Respect for diverse religious perspectives and practices; + +**(e)** **Historical Context**: Consideration of historical contexts that may affect interpretation; + +**(f)** **Local Laws**: Compliance with local laws and regulations in different jurisdictions; + +**(g)** **Community Norms**: Recognition of established community norms and traditions; + +**(h)** **Inclusive Practices**: Promotion of inclusive practices that welcome diverse perspectives. + +### 9.2 Vulnerable Populations + +We provide enhanced protections for: + +**(a)** **Minors**: Additional safeguards for content involving or targeting minors; + +**(b)** **Marginalised Groups**: Enhanced protection for marginalised and vulnerable communities; + +**(c)** **Mental Health**: Consideration of mental health impacts in moderation decisions; + +**(d)** **Crisis Situations**: Special procedures for users in crisis or distress; + +**(e)** **Harassment Targets**: Additional support for users who are frequent targets of harassment; + +**(f)** **New Users**: Extra guidance and support for new users learning community norms; + +**(g)** **Language Barriers**: Accommodation for users with language barriers or disabilities; + +**(h)** **Digital Literacy**: Support for users with varying levels of digital literacy. + +### 9.3 Crisis and Emergency Response + +During crises or emergencies, we may: + +**(a)** **Expedited Review**: Implement expedited review processes for urgent content; + +**(b)** **Enhanced Monitoring**: Increase monitoring for harmful or dangerous content; + +**(c)** **Crisis Resources**: Provide links to crisis resources and support services; + +**(d)** **Emergency Contacts**: Facilitate contact with emergency services when appropriate; + +**(e)** **Misinformation Control**: Take enhanced action against harmful misinformation during crises; + +**(f)** **Coordinated Response**: Coordinate with relevant authorities and organisations; + +**(g)** **Resource Allocation**: Reallocate moderation resources to address crisis-related content; + +**(h)** **Post-Crisis Review**: Conduct post-crisis reviews to improve future emergency responses. + +### 9.4 Emerging Technologies and Trends + +We adapt our moderation practices to address: + +**(a)** **New Content Types**: Evolution of policies to address new types of content and media; + +**(b)** **Emerging Platforms**: Adaptation of standards for new platforms and technologies; + +**(c)** **AI-Generated Content**: Special considerations for AI-generated text, images, and media; + +**(d)** **Deepfakes and Manipulation**: Enhanced detection and response to manipulated media; + +**(e)** **Virtual Reality**: Moderation considerations for immersive and virtual environments; + +**(f)** **Blockchain Content**: Considerations for content stored on blockchain platforms; + +**(g)** **IoT Communications**: Moderation of communications through Internet of Things devices; + +**(h)** **Augmented Reality**: Content moderation in augmented reality applications and overlays. + +## 10. TRAINING AND DEVELOPMENT + +### 10.1 Moderator Training Programmes + +Our moderation training includes: + +**(a)** **Policy Education**: Comprehensive training on all content policies and guidelines; + +**(b)** **Decision-Making Skills**: Training on consistent and fair decision-making processes; + +**(c)** **Cultural Competency**: Training on cultural sensitivity and diverse perspectives; + +**(d)** **Mental Health Awareness**: Training on recognising and responding to mental health issues; + +**(e)** **Legal Requirements**: Education on relevant legal requirements and compliance; + +**(f)** **Technology Tools**: Training on moderation tools and systems; + +**(g)** **Communication Skills**: Training on effective communication with users about moderation decisions; + +**(h)** **Continuous Education**: Ongoing education and professional development opportunities. + +### 10.2 Quality Assurance and Consistency + +We maintain quality through: + +**(a)** **Calibration Sessions**: Regular calibration sessions to ensure consistent decision-making; + +**(b)** **Performance Monitoring**: Monitoring of moderator performance and decision quality; + +**(c)** **Feedback Systems**: Systems for providing feedback to moderators on their decisions; + +**(d)** **Peer Review**: Peer review processes for complex or sensitive moderation decisions; + +**(e)** **Case Studies**: Development and use of case studies for training and calibration; + +**(f)** **Best Practices Documentation**: Documentation and sharing of best practices; + +**(g)** **Regular Assessment**: Regular assessment of moderation quality and consistency; + +**(h)** **Improvement Planning**: Systematic planning for continuous improvement in moderation quality. + +### 10.3 Technology and Tools Training + +Training on moderation technology includes: + +**(a)** **Automated Systems**: Understanding and working with automated moderation systems; + +**(b)** **Detection Tools**: Use of tools for detecting prohibited content and behaviours; + +**(c)** **Analytics Platforms**: Understanding analytics and data for moderation insights; + +**(d)** **Reporting Systems**: Effective use of reporting and case management systems; + +**(e)** **Communication Tools**: Use of tools for communicating with users about moderation decisions; + +**(f)** **Appeal Systems**: Understanding and managing appeals processes and systems; + +**(g)** **Documentation Systems**: Proper documentation of moderation decisions and rationale; + +**(h)** **Integration Tools**: Understanding integration between different moderation tools and platforms. + +### 10.4 Wellbeing and Support + +We provide support for moderation staff including: + +**(a)** **Mental Health Resources**: Access to mental health resources and counselling services; + +**(b)** **Workload Management**: Appropriate workload management and rotation schedules; + +**(c)** **Peer Support**: Peer support networks and discussion groups for moderation staff; + +**(d)** **Professional Development**: Opportunities for professional development and career advancement; + +**(e)** **Work-Life Balance**: Support for maintaining healthy work-life balance; + +**(f)** **Trauma-Informed Care**: Training and support for dealing with traumatic content; + +**(g)** **Regular Check-ins**: Regular check-ins and support meetings with management; + +**(h)** **Recognition Programmes**: Recognition and appreciation programmes for moderation staff. + +## 11. POLICY EVOLUTION AND UPDATES + +### 11.1 Continuous Policy Development + +Our content policies evolve through: + +**(a)** **Community Feedback**: Regular incorporation of community feedback and suggestions; + +**(b)** **Data Analysis**: Analysis of moderation data and trends to identify policy gaps; + +**(c)** **Legal Developments**: Updates in response to changing legal requirements; + +**(d)** **Industry Standards**: Alignment with evolving industry standards and best practices; + +**(e)** **Research Insights**: Incorporation of academic and industry research on content moderation; + +**(f)** **Case Law**: Consideration of relevant legal precedents and decisions; + +**(g)** **Technology Changes**: Adaptation to new technologies and platforms; + +**(h)** **Social Evolution**: Response to changing social norms and expectations. + +### 11.2 Policy Update Process + +Policy updates follow a structured process: + +**(a)** **Issue Identification**: Identification of areas needing policy clarification or development; + +**(b)** **Research and Analysis**: Comprehensive research and analysis of proposed changes; + +**(c)** **Stakeholder Consultation**: Consultation with relevant stakeholders and community members; + +**(d)** **Draft Development**: Development of draft policy language and implementation plans; + +**(e)** **Public Comment**: Public comment periods for significant policy changes; + +**(f)** **Review and Revision**: Review and revision based on feedback and consultation; + +**(g)** **Implementation Planning**: Planning for policy implementation and training; + +**(h)** **Monitoring and Evaluation**: Ongoing monitoring and evaluation of policy effectiveness. + +### 11.3 Communication of Changes + +Policy changes are communicated through: + +**(a)** **Advance Notice**: Advance notice of significant policy changes with implementation timelines; + +**(b)** **Change Documentation**: Detailed documentation of what changes and why; + +**(c)** **Impact Assessment**: Assessment of how changes will affect different user groups; + +**(d)** **Training Materials**: Updated training materials for moderators and community leaders; + +**(e)** **Community Education**: Educational materials to help users understand new policies; + +**(f)** **FAQ Updates**: Updates to frequently asked questions and help resources; + +**(g)** **Version Control**: Clear version control and historical tracking of policy changes; + +**(h)** **Feedback Channels**: Channels for feedback on policy changes and implementation. + +### 11.4 Emergency Policy Updates + +In emergency situations, we may: + +**(a)** **Immediate Implementation**: Implement policy changes immediately to address urgent risks; + +**(b)** **Temporary Measures**: Implement temporary policy measures pending full review; + +**(c)** **Crisis Communication**: Provide immediate communication about emergency policy changes; + +**(d)** **Expedited Review**: Use expedited review processes for emergency policy development; + +**(e)** **Post-Implementation Review**: Conduct thorough reviews of emergency policy changes; + +**(f)** **Stakeholder Notification**: Notify key stakeholders of emergency policy implementations; + +**(g)** **Adjustment Procedures**: Procedures for adjusting emergency policies based on outcomes; + +**(h)** **Documentation**: Comprehensive documentation of emergency policy decisions and rationale. + +## 12. CONTACT INFORMATION AND SUPPORT + +### 12.1 Content Policy Questions + +For questions about our content policies: + +**Email:** content-policy@nhcarrigan.com + +**Subject Line:** Content Policy Inquiry - [Brief Description] + +**Response Time:** Within 3 business days for policy clarification requests + +### 12.2 Content Reporting + +To report problematic content: + +**Email:** moderation@nhcarrigan.com + +**Subject Line:** Content Report - [Platform/Type] + +**Emergency Reports:** For urgent safety concerns, use subject line "URGENT - Content Report" + +**Response Time:** Within 24 hours for urgent reports, 48 hours for standard reports + +### 12.3 Moderation Appeals + +For appeals of moderation decisions: + +**Email:** appeals@nhcarrigan.com + +**Subject Line:** Moderation Appeal - [Account/Case Reference] + +**Process:** Follow detailed appeals process outlined in our Community Appeals Policy + +**Response Time:** Within 5 business days for appeal reviews + +### 12.4 Community Support + +For general community support and guidance: + +**Email:** community@nhcarrigan.com + +**Community Forum:** https://forum.nhcarrigan.com/community-support + +**Response Time:** Within 48 hours for community support requests + +**Live Chat:** Available during business hours for immediate assistance + +**Document Version:** 1.0 + +**Last Updated:** 15 September 2025 + +**Effective Date:** 15 September 2025 + +**Next Review Date:** 15 March 2026 + +--- + +*This Content and Moderation Policy establishes our commitment to maintaining safe, inclusive, and productive communities. By participating in our platforms, you agree to abide by these content standards and acknowledge our moderation practices. For questions about content policies or to report violations, please contact us at moderation@nhcarrigan.com.* diff --git a/src/content/docs/legal/dmca.md b/src/content/docs/legal/dmca.md index e095bf6..31993c5 100644 --- a/src/content/docs/legal/dmca.md +++ b/src/content/docs/legal/dmca.md @@ -2,120 +2,716 @@ title: DMCA and Intellectual Property Compliance Policy --- -## 1. General Principles +**PROTECTING CREATIVE RIGHTS WHILST FOSTERING INNOVATION** -- Respect for intellectual property rights is fundamental to our community's ethos and operations. -- All community members, including users, contributors, and administrators, are expected to comply with applicable copyright laws, trademark regulations, and licensing terms. -- This policy aims to protect the rights of content creators while fostering an environment of innovation and knowledge sharing. -- Ignorance of the law or this policy is not considered a valid excuse for non-compliance. +## 1. POLICY OVERVIEW AND PRINCIPLES -## 2. Sharing Copyrighted Material +### 1.1 Fundamental Principles -- Do not share copyrighted material without explicit permission from the copyright holder or a valid license. -- When sharing is permitted, always include proper attribution and adhere to any specified terms of use. -- Linking to legitimately published content is generally acceptable, but copying and pasting substantial portions is discouraged unless explicitly allowed by the copyright holder. -- Be aware that even user-generated content on social media platforms may be copyrighted. -- When in doubt about the copyright status of material, err on the side of caution and seek permission or clarification. +This Digital Millennium Copyright Act and Intellectual Property Compliance Policy ("Policy") is founded upon the following core principles: -## 3. Fair Use and Educational Purposes +**(a)** Respect for intellectual property rights is essential to our community's values and operations; -- Limited use of copyrighted material for commentary, criticism, news reporting, teaching, scholarship, or research may be permissible under fair use doctrines. -- When relying on fair use, clearly indicate the source and purpose of the use. -- Fair use is determined on a case-by-case basis, considering factors such as: - - The purpose and character of the use (commercial vs. non-profit educational) - - The nature of the copyrighted work - - The amount and substantiality of the portion used - - The effect of the use upon the potential market for the copyrighted work -- Educational use does not automatically qualify as fair use; consider all factors carefully. +**(b)** All community members, including users, contributors, administrators, and staff, must comply with applicable copyright laws, trademark regulations, and licensing requirements; -## 4. Proper Attribution +**(c)** We are committed to fostering an environment that encourages innovation and knowledge sharing whilst protecting creators' rights; -- When using or referencing others' work, always provide clear and comprehensive attribution. -- Attribution should include: - - The name of the creator or author - - The title of the work - - The source (e.g., website URL, book title, journal name) - - The date of publication or creation (if available) - - Any applicable license terms -- For digital content, consider using hyperlinks to the original source when possible. -- Follow citation guidelines appropriate to your field or the context of use (e.g., APA, Chicago). +**(d)** Ignorance of applicable law or this Policy does not constitute a valid defence for non-compliance. -## 5. Original Content Creation and Sharing +### 1.2 Scope of Application -- Community members are encouraged to create and share original content. -- By sharing original content in our community spaces, you grant the community a non-exclusive, worldwide, royalty-free right to use, reproduce, modify, adapt, publish, translate, distribute, and display the content within the community. -- You retain copyright of your original work unless explicitly stated otherwise. -- Consider adding a clear copyright notice to your original works. -- Be mindful of using third-party content (e.g., images, music) in your original creations, ensuring you have the right to incorporate such elements. +This Policy applies to: -## 6. Open Source and Creative Commons +**(a)** All users of our Services, platforms, and applications; -- We encourage the use of open source licenses and Creative Commons for shared content where appropriate. -- When using open source or Creative Commons licensed material, adhere strictly to the terms of the license. -- Familiarize yourself with different types of open source and Creative Commons licenses and their requirements (e.g., attribution, share-alike, non-commercial use). -- Provide clear license information when sharing your own content under open source or Creative Commons terms. +**(b)** All content uploaded, shared, or transmitted through our Services; -## 7. Code Snippets and Examples +**(c)** All community interactions, including forums, chat platforms, and collaborative spaces; -- Short code snippets shared for educational or troubleshooting purposes are generally acceptable under fair use. -- For larger code samples, include license information and attribution if taken from other sources. -- When sharing your own code, consider using an appropriate open source license. -- Be aware that copying entire programs or substantial portions of code may infringe copyright, even if source attribution is provided. +**(d)** All third-party integrations and linked content. -## 8. Plagiarism +### 1.3 Legal Framework -- Presenting others' work as your own is strictly prohibited and considered a serious offence. -- This includes code, text, images, ideas, and any other form of content. -- Plagiarism can have serious consequences, including loss of community privileges, academic penalties, or legal action. -- Always cite your sources and use quotation marks for direct quotes. +This Policy is designed to comply with: -## 9. Trademark Usage +**(a)** The Digital Millennium Copyright Act (DMCA) of the United States; -- Respect trademark rights when referencing products, services, or organizations. -- Use trademark symbols (™, ®) appropriately when referring to trademarked names. -- Avoid using trademarks in a way that suggests endorsement or affiliation without permission. +**(b)** International copyright treaties and conventions; -## 10. Digital Millennium Copyright Act (DMCA) Compliance +**(c)** Applicable national and regional intellectual property laws; -- We comply with the DMCA and maintain a policy for addressing claims of copyright infringement. -- If you believe your copyrighted work has been improperly used within our community, submit a DMCA takedown notice to DMCA@nhcarrigan.com. -- DMCA takedown notices must include: - - Identification of the copyrighted work claimed to have been infringed - - Identification of the allegedly infringing material - - Contact information for the complainant - - A statement of good faith belief that the use is not authorized - - A statement, under penalty of perjury, that the information in the notice is accurate and that the complainant is authorized to act on behalf of the copyright owner -- We will promptly investigate all legitimate DMCA takedown notices and take appropriate action, which may include content removal or account suspension. +**(d)** Platform-specific terms of service and licensing requirements. -## 11. Counter-Notifications +## 2. COPYRIGHT PROTECTION AND COMPLIANCE -- If you believe your content was wrongly removed due to a DMCA takedown notice, you may submit a counter-notification. -- Counter-notifications must include: - - Identification of the removed material and its location before removal - - A statement under penalty of perjury that you have a good faith belief the material was removed by mistake or misidentification - - Your name, address, and telephone number - - A statement that you consent to the jurisdiction of the federal district court for the judicial district in which you reside +### 2.1 Prohibition on Unauthorised Sharing -## 12. Repeat Infringer Policy +You must not share copyrighted material through our Services unless you have: -- We maintain a repeat infringer policy to ensure ongoing DMCA compliance. -- Users who repeatedly infringe copyrights may have their accounts terminated. -- We keep records of DMCA notices and counter-notifications to identify repeat infringers. +**(a)** Explicit written permission from the copyright holder; -## 13. Education and Awareness +**(b)** A valid licence that permits such sharing; -- We are committed to educating our community about intellectual property rights and responsibilities. -- Regular updates and resources on copyright law and best practices will be provided. -- Members are encouraged to seek clarification on any aspect of this policy they find unclear. +**(c)** Legal basis for the sharing under applicable copyright exceptions or limitations. -## 14. Policy Updates +### 2.2 Proper Attribution Requirements -- This policy may be updated periodically to reflect changes in law, technology, or community needs. -- Continued use of our community platforms constitutes acceptance of the current policy. +When sharing material is permitted, you must: -## 15. Disclaimer +**(a)** Provide complete and accurate attribution to the original creator; -- This policy is not exhaustive and does not constitute legal advice. -- Users are encouraged to seek independent legal counsel for specific intellectual property matters. +**(b)** Include all required copyright notices and licensing information; -By participating in our community, you agree to abide by this DMCA and Intellectual Property Compliance Policy. Failure to comply may result in content removal, account suspension, or other appropriate actions as determined by community administrators. +**(c)** Comply with any specific attribution requirements set forth in applicable licences; + +**(d)** Clearly indicate any modifications made to the original material. + +### 2.3 Linking vs. Copying + +**(a)** **Permitted Practice:** Linking to legitimately published content is generally acceptable and encouraged; + +**(b)** **Restricted Practice:** Copying and redistributing substantial portions of copyrighted material is prohibited unless explicitly permitted; + +**(c)** **User-Generated Content:** Be aware that content posted on social media platforms and similar services may be subject to copyright protection. + +### 2.4 Due Diligence Requirements + +When uncertain about the copyright status of material: + +**(a)** Conduct reasonable research to determine copyright ownership; + +**(b)** Err on the side of caution and seek permission or clarification; + +**(c)** Consult with legal professionals when necessary; + +**(d)** Document your efforts to comply with copyright requirements. + +## 3. FAIR USE AND EDUCATIONAL PURPOSES + +### 3.1 Fair Use Principles + +Limited use of copyrighted material may be permissible under fair use doctrines for: + +**(a)** Commentary, criticism, or parody; + +**(b)** News reporting and journalism; + +**(c)** Teaching, scholarship, and academic research; + +**(d)** Other purposes recognised under applicable fair use provisions. + +### 3.2 Fair Use Assessment Factors + +When claiming fair use, you must consider: + +**(a)** **Purpose and Character:** Whether the use is commercial or non-profit educational, and whether it transforms the original work; + +**(b)** **Nature of the Work:** Whether the copyrighted work is factual or creative in nature; + +**(c)** **Amount Used:** The proportion and substantiality of the portion used in relation to the whole; + +**(d)** **Market Impact:** The effect of your use on the potential market for the original work. + +### 3.3 Educational Use Clarification + +**(a)** Educational context does not automatically qualify as fair use; + +**(b)** All four factors must be considered in each specific case; + +**(c)** Systematic copying for educational purposes may not qualify for fair use protection; + +**(d)** Commercial educational uses face higher scrutiny than non-profit educational activities. + +### 3.4 Documentation and Source Citation + +When relying on fair use: + +**(a)** Clearly indicate the source and purpose of your use; + +**(b)** Provide proper attribution to the original creator; + +**(c)** Document your fair use analysis and reasoning; + +**(d)** Be prepared to defend your fair use claim if challenged. + +## 4. ATTRIBUTION AND CITATION STANDARDS + +### 4.1 Mandatory Attribution Elements + +When using or referencing others' work, you must provide: + +**(a)** The full name of the creator or author; + +**(b)** The complete title of the work; + +**(c)** The source (website URL, publication details, repository location); + +**(d)** The date of publication or creation (where available); + +**(e)** Any applicable licence terms and requirements; + +**(f)** A clear indication of any modifications made to the original. + +### 4.2 Digital Citation Best Practices + +For digital content: + +**(a)** Use hyperlinks to original sources whenever possible; + +**(b)** Ensure links are functional and lead directly to the referenced content; + +**(c)** Include archived versions of links where content may be ephemeral; + +**(d)** Follow established citation standards appropriate to your field or context. + +### 4.3 Academic and Professional Citations + +When creating academic or professional content: + +**(a)** Follow recognised citation styles (APA, MLA, Chicago, etc.); + +**(b)** Maintain consistency in citation format throughout your work; + +**(c)** Include complete bibliographies or reference lists; + +**(d)** Distinguish between different types of sources and references. + +## 5. ORIGINAL CONTENT CREATION AND LICENSING + +### 5.1 Original Content Rights + +When creating and sharing original content through our Services: + +**(a)** You retain copyright ownership of your original works; + +**(b)** You grant our community certain usage rights as specified in our Terms of Service; + +**(c)** You may specify additional licensing terms for your content; + +**(d)** Copyright notices may be added to clarify ownership and rights. + +### 5.2 Third-Party Content in Original Works + +When incorporating third-party elements into your original creations: + +**(a)** Ensure you have appropriate rights to use all incorporated elements; + +**(b)** Provide proper attribution for all third-party contributions; + +**(c)** Comply with licensing requirements of incorporated elements; + +**(d)** Consider the impact on your ability to license the resulting work. + +### 5.3 Community Usage Rights + +By sharing content in our community spaces, you grant: + +**(a)** A non-exclusive, worldwide, royalty-free right to use, reproduce, and display the content within community contexts; + +**(b)** The right to modify content for technical compatibility and presentation purposes; + +**(c)** The right to archive content for community preservation purposes; + +**(d)** Such other rights as may be specified in our Terms of Service. + +### 5.4 Licensing Recommendations + +We encourage content creators to: + +**(a)** Consider using Creative Commons licences for broader sharing; + +**(b)** Clearly specify the terms under which others may use their content; + +**(c)** Understand the implications of different licensing choices; + +**(d)** Seek legal advice for complex licensing scenarios. + +## 6. OPEN SOURCE AND CREATIVE COMMONS COMPLIANCE + +### 6.1 Open Source Software + +When using open source software: + +**(a)** Carefully review and comply with all licence requirements; + +**(b)** Include required copyright notices and licence texts; + +**(c)** Understand obligations regarding source code availability; + +**(d)** Be aware of licence compatibility issues when combining multiple open source components. + +### 6.2 Creative Commons Materials + +When using Creative Commons licensed content: + +**(a)** Identify the specific licence version and requirements; + +**(b)** Provide appropriate attribution as specified in the licence; + +**(c)** Comply with share-alike requirements where applicable; + +**(d)** Respect non-commercial use restrictions where specified; + +**(e)** Understand the implications of no-derivatives restrictions. + +### 6.3 Licence Verification + +**(a)** Verify licence information from authoritative sources; + +**(b)** Be cautious of incorrect or outdated licence information; + +**(c)** Contact creators directly when licence terms are unclear; + +**(d)** Maintain records of your licence compliance efforts. + +### 6.4 Contributing to Open Projects + +When contributing to open source or Creative Commons projects: + +**(a)** Understand the licensing implications of your contributions; + +**(b)** Ensure you have the right to license your contributions under project terms; + +**(c)** Follow project-specific contribution guidelines and requirements; + +**(d)** Be aware that contributions may be difficult to retract once accepted. + +## 7. CODE SHARING AND TECHNICAL CONTENT + +### 7.1 Code Snippets and Examples + +**(a)** **Short Code Snippets:** Generally acceptable under fair use for educational or troubleshooting purposes; + +**(b)** **Substantial Code Blocks:** Require proper licensing and attribution; + +**(c)** **Complete Programs:** Must comply with applicable software licences; + +**(d)** **Modified Code:** Must respect original licence requirements and indicate modifications. + +### 7.2 Educational Code Sharing + +When sharing code for educational purposes: + +**(a)** Provide context and explanation for the code's purpose; + +**(b)** Include appropriate licensing information and attribution; + +**(c)** Consider the educational value versus the amount of code shared; + +**(d)** Respect any restrictions on commercial use or redistribution. + +### 7.3 Technical Documentation + +**(a)** Original technical documentation is encouraged and valued; + +**(b)** When referencing existing documentation, provide proper attribution; + +**(c)** Distinguish between your original explanations and quoted material; + +**(d)** Consider creating transformative content rather than copying existing documentation. + +### 7.4 Open Source Best Practices + +When sharing your own code: + +**(a)** Choose an appropriate open source licence; + +**(b)** Include clear licence files and copyright notices; + +**(c)** Provide adequate documentation and attribution for dependencies; + +**(d)** Consider the long-term implications of your licensing choices. + +## 8. PLAGIARISM PREVENTION AND ACADEMIC INTEGRITY + +### 8.1 Definition and Prohibition + +Plagiarism, defined as presenting others' work as your own, is strictly prohibited and includes: + +**(a)** Copying text, code, images, or other content without attribution; + +**(b)** Paraphrasing others' ideas without acknowledgement; + +**(c)** Using others' unique ideas, methodologies, or approaches without credit; + +**(d)** Self-plagiarism (reusing your own previously published work without disclosure). + +### 8.2 Consequences of Plagiarism + +Plagiarism may result in: + +**(a)** Immediate removal of infringing content; + +**(b)** Suspension or termination of community privileges; + +**(c)** Notification to relevant academic or professional institutions; + +**(d)** Legal action in cases of commercial infringement; + +**(e)** Permanent record of violation affecting future community participation. + +### 8.3 Prevention Measures + +To avoid plagiarism: + +**(a)** Always cite your sources and provide proper attribution; + +**(b)** Use quotation marks for direct quotes and indicate the source; + +**(c)** Paraphrase in your own words whilst still providing attribution; + +**(d)** Maintain detailed notes on your sources during research; + +**(e)** When in doubt, provide attribution rather than risk infringement. + +### 8.4 Academic and Professional Standards + +**(a)** Follow the citation standards appropriate to your field or institution; + +**(b)** Understand that different disciplines may have different expectations; + +**(c)** Seek guidance from supervisors or colleagues when uncertain; + +**(d)** Consider using plagiarism detection tools to verify your own work. + +## 9. TRADEMARK COMPLIANCE + +### 9.1 Trademark Recognition and Respect + +When referencing trademarked products, services, or organisations: + +**(a)** Use appropriate trademark symbols (™ for common law trademarks, ® for registered trademarks); + +**(b)** Capitalise trademark names correctly; + +**(c)** Avoid using trademarks in a way that suggests endorsement or affiliation without permission; + +**(d)** Respect trademark guidelines published by trademark owners. + +### 9.2 Nominative Fair Use + +You may use trademarks for: + +**(a)** Identifying and discussing the trademarked products or services; + +**(b)** Comparative analysis and commentary; + +**(c)** News reporting and factual discussion; + +**(d)** Parody and criticism (with careful consideration of other legal restrictions). + +### 9.3 Prohibited Trademark Uses + +You must not: + +**(a)** Use trademarks in a way that causes confusion about source or affiliation; + +**(b)** Use trademarks as part of your own product or service names without permission; + +**(c)** Modify or alter trademark logos or designs; + +**(d)** Use trademarks in a way that dilutes their distinctiveness or harms their reputation. + +### 9.4 Community Brand Protection + +**(a)** Respect our own trademarks and brand elements; + +**(b)** Do not use our logos or brand names without permission; + +**(c)** Avoid creating confusion about official versus unofficial community content; + +**(d)** Contact us for guidance on appropriate use of our brand elements. + +## 10. DMCA COMPLIANCE AND TAKEDOWN PROCEDURES + +### 10.1 DMCA Policy Statement + +We comply with the Digital Millennium Copyright Act and maintain procedures for addressing claims of copyright infringement. We respect the rights of copyright owners whilst protecting the legitimate interests of our users. + +### 10.2 Submitting DMCA Takedown Notices + +To submit a valid DMCA takedown notice, contact **dmca@nhcarrigan.com** with the following information: + +**(a)** **Identification of Copyrighted Work:** A clear description of the copyrighted work claimed to have been infringed, including registration numbers if applicable; + +**(b)** **Identification of Infringing Material:** Specific identification of the allegedly infringing material and its location on our Services; + +**(c)** **Contact Information:** Your complete contact information, including name, address, telephone number, and email address; + +**(d)** **Good Faith Statement:** A statement that you have a good faith belief that the disputed use is not authorised by the copyright owner, its agent, or the law; + +**(e)** **Accuracy Statement:** A statement, under penalty of perjury, that the information in the notice is accurate and that you are authorised to act on behalf of the copyright owner; + +**(f)** **Physical or Electronic Signature:** Your physical or electronic signature. + +### 10.3 Processing DMCA Notices + +Upon receipt of a valid DMCA takedown notice: + +**(a)** We will promptly investigate the claim; + +**(b)** If the claim appears valid, we will remove or disable access to the allegedly infringing material; + +**(c)** We will notify the affected user of the takedown and provide information about the counter-notification process; + +**(d)** We will document the takedown for our records and potential future reference. + +### 10.4 Response Timeline + +We endeavour to process DMCA takedown notices within: + +**(a)** **Initial Review:** Twenty-four (24) hours for urgent matters; + +**(b)** **Investigation and Action:** Seventy-two (72) hours for standard cases; + +**(c)** **Complex Cases:** Up to seven (7) business days with notification to relevant parties. + +## 11. DMCA COUNTER-NOTIFICATION PROCESS + +### 11.1 Right to Counter-Notification + +If you believe your content was removed in error or misidentification, you may submit a counter-notification to **dmca@nhcarrigan.com**. + +### 11.2 Counter-Notification Requirements + +A valid counter-notification must include: + +**(a)** **Identification of Removed Material:** Specific identification of the material that was removed and its previous location; + +**(b)** **Good Faith Statement:** A statement under penalty of perjury that you have a good faith belief the material was removed due to mistake or misidentification; + +**(c)** **Personal Information:** Your complete name, address, and telephone number; + +**(d)** **Jurisdiction Consent:** A statement that you consent to the jurisdiction of the federal district court for your district (or the judicial district where you reside if outside the United States); + +**(e)** **Service of Process:** A statement that you will accept service of process from the party who submitted the takedown notice; + +**(f)** **Physical or Electronic Signature:** Your physical or electronic signature. + +### 11.3 Counter-Notification Processing + +Upon receipt of a valid counter-notification: + +**(a)** We will provide a copy to the original complainant; + +**(b)** We will inform the complainant that the material will be restored in 10-14 business days unless they file a court action; + +**(c)** If no court action is filed, we will restore the material according to the statutory timeline; + +**(d)** We will document the counter-notification and restoration for our records. + +### 11.4 Legal Consequences + +Both takedown notices and counter-notifications are made under penalty of perjury. False claims may result in liability for damages, attorney's fees, and other legal consequences under applicable law. + +## 12. REPEAT INFRINGER POLICY + +### 12.1 Policy Statement + +We maintain a policy for addressing repeat copyright infringers to ensure ongoing DMCA compliance and protect the rights of copyright holders. + +### 12.2 Tracking and Documentation + +We maintain records of: + +**(a)** All DMCA takedown notices received; + +**(b)** Counter-notifications submitted; + +**(c)** Actions taken in response to notices; + +**(d)** User violation history and patterns. + +### 12.3 Consequences for Repeat Infringement + +Users who repeatedly infringe copyright may face: + +**(a)** **First Offence:** Warning and education about copyright compliance; + +**(b)** **Second Offence:** Temporary suspension of account privileges; + +**(c)** **Subsequent Offences:** Progressive disciplinary measures up to and including permanent account termination; + +**(d)** **Severe Cases:** Immediate termination for egregious or commercial infringement. + +### 12.4 Appeals Process + +Users subject to repeat infringer sanctions may: + +**(a)** Request review of their case within thirty (30) days of sanction; + +**(b)** Provide evidence of good faith efforts to comply with copyright law; + +**(c)** Demonstrate that previous notices were invalid or withdrawn; + +**(d)** Participate in educational programmes to reinstate privileges. + +## 13. EDUCATION AND AWARENESS + +### 13.1 Community Education Commitment + +We are committed to educating our community about intellectual property rights and responsibilities through: + +**(a)** Regular updates to this Policy and related guidance materials; + +**(b)** Educational resources on copyright, fair use, and licensing; + +**(c)** Community workshops and training sessions; + +**(d)** Clear examples of acceptable and unacceptable practices. + +### 13.2 Resources and Guidance + +We provide access to: + +**(a)** Links to authoritative sources on copyright law and fair use; + +**(b)** Guides to common licensing terms and requirements; + +**(c)** Templates and examples for proper attribution; + +**(d)** Contact information for additional support and guidance. + +### 13.3 Seeking Clarification + +Community members are encouraged to: + +**(a)** Ask questions about unclear aspects of this Policy; + +**(b)** Seek guidance before sharing potentially problematic content; + +**(c)** Report suspected violations or concerns; + +**(d)** Participate in educational activities and discussions. + +### 13.4 Professional Development + +We encourage community members to: + +**(a)** Stay informed about changes in intellectual property law; + +**(b)** Participate in relevant professional development opportunities; + +**(c)** Share knowledge and best practices with other community members; + +**(d)** Contribute to the development of community guidelines and resources. + +## 14. POLICY UPDATES AND COMPLIANCE + +### 14.1 Regular Policy Review + +This Policy is reviewed regularly to ensure: + +**(a)** Compliance with current legal requirements; + +**(b)** Alignment with technological developments; + +**(c)** Responsiveness to community needs and feedback; + +**(d)** Consistency with best practices in the field. + +### 14.2 Update Notifications + +Changes to this Policy will be communicated through: + +**(a)** Prominent notices on our Services and websites; + +**(b)** Email notifications to registered users; + +**(c)** Community forum announcements and discussions; + +**(d)** Documentation updates with clear change logs. + +### 14.3 Continued Use and Acceptance + +Continued participation in our community following Policy updates constitutes acceptance of the revised terms. If you do not agree to the updated Policy, you must cease using our Services. + +### 14.4 Feedback and Suggestions + +We welcome feedback on this Policy and suggestions for improvement. Please contact us at **dmca@nhcarrigan.com** with your comments and recommendations. + +## 15. CONTACT INFORMATION AND SUPPORT + +### 15.1 Primary Contact + +For all matters related to this Policy, including DMCA notices, questions, and reports of violations: + +**Email:** dmca@nhcarrigan.com + +### 15.2 Additional Resources + +**General Support:** privacy@nhcarrigan.com + +**Community Forum:** https://forum.nhcarrigan.com + +**Legal Inquiries:** legal@nhcarrigan.com + +### 15.3 Response Commitments + +We commit to: + +**(a)** Acknowledging receipt of all communications within forty-eight (48) hours; + +**(b)** Providing substantive responses within the timeframes specified in this Policy; + +**(c)** Treating all inquiries with professionalism and confidentiality; + +**(d)** Maintaining accurate records of all communications and actions taken. + +### 15.4 Emergency Procedures + +For urgent copyright infringement matters that pose immediate legal risk: + +**(a)** Contact us immediately at dmca@nhcarrigan.com with "URGENT" in the subject line; + +**(b)** Provide all required information for expedited processing; + +**(c)** Be prepared to provide additional documentation or clarification promptly; + +**(d)** Understand that expedited processing may require additional verification steps. + +## 16. LEGAL DISCLAIMER + +### 16.1 Policy Limitations + +This Policy: + +**(a)** Is not exhaustive and does not cover every possible scenario; + +**(b)** Does not constitute legal advice or create an attorney-client relationship; + +**(c)** Should be supplemented with independent legal counsel for specific situations; + +**(d)** May not address all applicable laws in every jurisdiction. + +### 16.2 Professional Consultation + +Users are encouraged to: + +**(a)** Seek independent legal counsel for complex intellectual property matters; + +**(b)** Consult with qualified professionals before making significant licensing decisions; + +**(c)** Obtain professional advice when facing potential infringement claims; + +**(d)** Understand that our guidance cannot replace professional legal advice. + +### 16.3 Limitation of Liability + +**IMPORTANT: Comprehensive liability limitations and warranty disclaimers applicable to this Policy and all our services are set forth in our Limitation of Liability and Indemnification Policy, which is incorporated herein by reference.** + +In addition to those comprehensive protections: + +**(a)** This Policy and related guidance are provided on an "as is" basis; + +**(b)** Users assume responsibility for their own compliance with intellectual property laws; + +**(c)** Professional legal advice should be sought for significant legal decisions. + +**Last Updated:** [Date to be inserted] + +**Effective Date:** [Date to be inserted] + +--- + +*By participating in our community, you agree to abide by this DMCA and Intellectual Property Compliance Policy. This Policy is designed to protect the rights of creators whilst fostering an environment of innovation and knowledge sharing. For questions or concerns, please contact us at dmca@nhcarrigan.com.* diff --git a/src/content/docs/legal/export-control.md b/src/content/docs/legal/export-control.md new file mode 100644 index 0000000..2985fbd --- /dev/null +++ b/src/content/docs/legal/export-control.md @@ -0,0 +1,871 @@ +--- +title: Export Control and Sanctions Compliance Policy +--- + +**ENSURING COMPLIANCE WITH INTERNATIONAL TRADE REGULATIONS AND SANCTIONS PROGRAMMES** + +## 1. INTRODUCTION AND SCOPE + +### 1.1 Policy Purpose and Objectives + +This Export Control and Sanctions Compliance Policy ("Policy") establishes comprehensive procedures and requirements for compliance with export control laws, economic sanctions programmes, and international trade regulations applicable to nhcarrigan ("we," "us," "our," or "the Company") and users of our services, applications, and platforms (collectively, the "Services"). This Policy ensures lawful international distribution and use of our technology and services whilst preventing unauthorised access by restricted parties. + +### 1.2 Regulatory Framework + +This Policy addresses compliance with multiple regulatory regimes including: + +**(a)** **United States**: Export Administration Regulations (EAR), International Traffic in Arms Regulations (ITAR), and Office of Foreign Assets Control (OFAC) sanctions; + +**(b)** **United Kingdom**: Export Control Order 2008, Trade Sanctions Regulations, and HM Treasury sanctions programmes; + +**(c)** **European Union**: EU Dual-Use Export Control Regulation, Common Foreign and Security Policy sanctions, and member state export control laws; + +**(d)** **Canada**: Export and Import Controls Act, Special Economic Measures Act, and Freezing Assets of Corrupt Foreign Officials Act; + +**(e)** **Australia**: Defence Trade Controls Act, Autonomous Sanctions Act, and Export Control Act; + +**(f)** **International**: United Nations Security Council sanctions, multilateral export control regimes, and international treaties; + +**(g)** **Other Jurisdictions**: Export control and sanctions laws of other countries where we operate or provide services; + +**(h)** **Emerging Regulations**: New and evolving export control and sanctions regulations worldwide. + +### 1.3 Application and Scope + +This Policy applies to: + +**(a)** **Technology Services**: All software, applications, cloud services, and digital technologies provided by nhcarrigan; + +**(b)** **Data and Information**: Technical data, source code, algorithms, and proprietary information; + +**(c)** **User Interactions**: All user registrations, service provision, and technical support activities; + +**(d)** **Business Relationships**: Commercial partnerships, licensing agreements, and business development activities; + +**(e)** **International Operations**: Cross-border service provision, data transfers, and international business activities; + +**(f)** **Third-Party Relationships**: Relationships with vendors, contractors, distributors, and integration partners; + +**(g)** **Employee Activities**: Employee travel, training, and international business activities; + +**(h)** **Research and Development**: Research collaborations, technical exchanges, and development partnerships. + +### 1.4 Compliance Commitment + +nhcarrigan is committed to: + +**(a)** **Legal Compliance**: Full compliance with all applicable export control and sanctions laws; + +**(b)** **Risk Management**: Implementing robust risk management and compliance procedures; + +**(c)** **Due Diligence**: Conducting thorough due diligence on all international activities; + +**(d)** **Training and Education**: Providing comprehensive training on export control and sanctions compliance; + +**(e)** **Monitoring and Auditing**: Regular monitoring and auditing of compliance activities; + +**(f)** **Continuous Improvement**: Continuously improving compliance procedures and controls; + +**(g)** **Cooperation**: Cooperating fully with government authorities and regulatory agencies; + +**(h)** **Transparency**: Maintaining transparency in our compliance efforts and reporting. + +## 2. CLASSIFICATION AND CONTROL DETERMINATIONS + +### 2.1 Technology Classification + +We have classified our technology and services according to applicable export control regulations: + +**(a)** **Software Classification**: Our software applications are classified under relevant Export Control Classification Numbers (ECCNs) or equivalent classifications; + +**(b)** **Encryption Technology**: Software containing encryption capabilities is subject to special classification and licensing requirements; + +**(c)** **Dual-Use Technology**: Technology with both civilian and military applications receives appropriate dual-use classifications; + +**(d)** **Mass Market Software**: Consumer software that qualifies for mass market exceptions under applicable regulations; + +**(e)** **Cloud Services**: Cloud-based services are classified according to their underlying technology and functionality; + +**(f)** **Technical Data**: Technical documentation, source code, and proprietary information receive appropriate classifications; + +**(g)** **Emerging Technologies**: New technologies are evaluated and classified upon development or deployment; + +**(h)** **Third-Party Components**: Third-party software components and dependencies are evaluated for their export control implications. + +### 2.2 Control Determinations + +Based on classification analysis, our services are subject to the following control determinations: + +**(a)** **General Software**: Most of our general-purpose software applications are not subject to export licensing requirements under applicable mass market and de minimis provisions; + +**(b)** **Encryption Software**: Software containing encryption functionality may be subject to notification requirements and certain geographic restrictions; + +**(c)** **Technical Support**: Technical support and training services may be subject to restrictions when provided to certain countries or entities; + +**(d)** **Source Code**: Source code access and distribution may be subject to additional licensing requirements; + +**(e)** **Customisation Services**: Custom development and integration services may require export licences depending on the end user and end use; + +**(f)** **Research Collaboration**: Research and development collaborations may be subject to licensing requirements; + +**(g)** **Data Processing**: Data processing services may be subject to restrictions based on the nature of data and end users; + +**(h)** **Artificial Intelligence**: AI and machine learning capabilities may be subject to emerging export control regulations. + +### 2.3 License Requirements and Exceptions + +We utilise the following licensing approaches: + +**(a)** **No Licence Required (NLR)**: Many of our services qualify for NLR status under applicable regulations; + +**(b)** **License Exceptions**: We utilise available license exceptions such as mass market software exceptions and technology and software under restriction (TSR); + +**(c)** **General Licences**: We operate under general licences where available and applicable; + +**(d)** **Specific Licences**: We obtain specific export licences when required for particular transactions or relationships; + +**(e)** **Encryption Registrations**: We maintain appropriate encryption registrations and notifications; + +**(f)** **Deemed Export Licences**: We obtain deemed export licences for technology transfers to foreign nationals; + +**(g)** **Re-export Licences**: We obtain re-export licences when required for downstream distribution; + +**(h)** **Transit Licences**: We obtain transit licences when required for temporary presence in controlled jurisdictions. + +### 2.4 Ongoing Classification Reviews + +We maintain ongoing classification reviews through: + +**(a)** **Regular Reviews**: Annual reviews of all technology classifications and determinations; + +**(b)** **Change Management**: Evaluation of export control implications for all product changes and updates; + +**(c)** **Legal Consultation**: Regular consultation with export control counsel and specialists; + +**(d)** **Regulatory Updates**: Monitoring and incorporation of regulatory changes and updates; + +**(e)** **Industry Guidance**: Participation in industry working groups and guidance development; + +**(f)** **Government Engagement**: Engagement with government agencies for classification guidance; + +**(g)** **Third-Party Assessments**: Periodic third-party assessments of classification determinations; + +**(h)** **Documentation Maintenance**: Comprehensive documentation of all classification decisions and rationale. + +## 3. SANCTIONS COMPLIANCE PROGRAMME + +### 3.1 Sanctions Screening and Monitoring + +We implement comprehensive sanctions screening including: + +**(a)** **Customer Screening**: All customers and users are screened against applicable sanctions lists before service provision; + +**(b)** **Real-Time Monitoring**: Real-time monitoring of sanctions list updates and automated re-screening of existing users; + +**(c)** **Enhanced Due Diligence**: Enhanced due diligence for users and transactions from high-risk jurisdictions; + +**(d)** **Ongoing Monitoring**: Continuous monitoring of user activities for potential sanctions violations; + +**(e)** **Transaction Screening**: Screening of financial transactions and commercial activities for sanctions compliance; + +**(f)** **Supply Chain Screening**: Screening of vendors, partners, and supply chain participants; + +**(g)** **Employee Screening**: Background screening of employees for sanctions and security concerns; + +**(h)** **Third-Party Screening**: Screening of all third-party service providers and business partners. + +### 3.2 Prohibited Parties and Jurisdictions + +We maintain comprehensive restrictions on: + +**(a)** **Specially Designated Nationals (SDNs)**: Individuals and entities designated by OFAC and other sanctions authorities; + +**(b)** **Denied Persons**: Entities and individuals on denied persons lists maintained by various governments; + +**(c)** **Entity Lists**: Companies and organisations on entity lists requiring special licensing; + +**(d)** **Restricted Countries**: Countries subject to comprehensive or sectoral sanctions programmes; + +**(e)** **Sectoral Sanctions**: Entities subject to sectoral sanctions in specific industries; + +**(f)** **Military End Users**: Military end users in certain countries subject to specific restrictions; + +**(g)** **Government Entities**: Government entities in restricted countries or engaged in prohibited activities; + +**(h)** **Shell Companies**: Shell companies or entities designed to circumvent sanctions restrictions. + +### 3.3 Geographic Restrictions + +Our services are subject to geographic restrictions including: + +**(a)** **Embargoed Countries**: Complete prohibition on service provision to comprehensively embargoed countries; + +**(b)** **Restricted Regions**: Limited service provision to regions subject to sectoral or targeted sanctions; + +**(c)** **Contested Territories**: Special procedures for contested territories and regions with disputed sovereignty; + +**(d)** **High-Risk Jurisdictions**: Enhanced due diligence and monitoring for high-risk jurisdictions; + +**(e)** **Transit Restrictions**: Restrictions on services transiting through certain countries; + +**(f)** **IP Address Blocking**: Technical measures to prevent access from restricted IP address ranges; + +**(g)** **Shipping Restrictions**: Restrictions on physical shipments to certain destinations; + +**(h)** **Payment Restrictions**: Restrictions on payment processing for certain jurisdictions. + +### 3.4 Sanctions Violation Response + +When potential sanctions violations are identified: + +**(a)** **Immediate Action**: Immediate suspension of services and freezing of relevant accounts or transactions; + +**(b)** **Investigation**: Comprehensive investigation of the circumstances and scope of potential violations; + +**(c)** **Legal Consultation**: Immediate consultation with sanctions counsel and legal advisors; + +**(d)** **Government Notification**: Prompt notification to relevant government authorities as required; + +**(e)** **Remedial Measures**: Implementation of remedial measures to address violations and prevent recurrence; + +**(f)** **Compliance Review**: Comprehensive review of compliance procedures to identify and address weaknesses; + +**(g)** **Training Enhancement**: Enhanced training and awareness programmes following violations; + +**(h)** **Documentation**: Comprehensive documentation of all violation response activities and remedial measures. + +## 4. USER AND CUSTOMER COMPLIANCE + +### 4.1 User Registration and Verification + +All users must comply with our registration and verification procedures: + +**(a)** **Identity Verification**: Verification of user identity through government-issued identification; + +**(b)** **Address Verification**: Verification of physical address and business location; + +**(c)** **Business Information**: Provision of complete business information including ownership structure; + +**(d)** **End Use Certification**: Certification of intended end use of services and technology; + +**(e)** **Compliance Representations**: Representations regarding compliance with applicable export control and sanctions laws; + +**(f)** **Screening Results**: Successful completion of sanctions and export control screening; + +**(g)** **Documentation Requirements**: Provision of required documentation for enhanced due diligence; + +**(h)** **Ongoing Obligations**: Acceptance of ongoing compliance obligations and monitoring requirements. + +### 4.2 Prohibited End Uses and End Users + +Users are prohibited from: + +**(a)** **Weapons Development**: Using services for development, production, or use of weapons of mass destruction; + +**(b)** **Military Applications**: Military end uses in countries subject to arms embargoes or military restrictions; + +**(c)** **Proliferation Activities**: Activities related to proliferation of weapons of mass destruction or delivery systems; + +**(d)** **Terrorism Support**: Any activities supporting terrorism or terrorist organisations; + +**(e)** **Human Rights Violations**: Activities supporting serious human rights violations or abuses; + +**(f)** **Cybercrime**: Criminal cyber activities including hacking, fraud, or other illegal online activities; + +**(g)** **Sanctions Evasion**: Activities designed to evade or circumvent sanctions or export control restrictions; + +**(h)** **Unauthorised Transfers**: Transfers to prohibited parties or for prohibited end uses. + +### 4.3 User Compliance Obligations + +All users agree to: + +**(a)** **Legal Compliance**: Comply with all applicable export control and sanctions laws in their jurisdiction; + +**(b)** **Accurate Information**: Provide accurate and complete information regarding their identity, location, and intended use; + +**(c)** **Use Restrictions**: Use services only for authorised purposes and in compliance with applicable restrictions; + +**(d)** **Transfer Restrictions**: Not transfer, re-export, or provide access to services to prohibited parties or for prohibited uses; + +**(e)** **Notification Obligations**: Promptly notify us of any changes in circumstances that may affect compliance; + +**(f)** **Cooperation**: Cooperate fully with our compliance monitoring and verification activities; + +**(g)** **Record Keeping**: Maintain appropriate records of service usage and compliance activities; + +**(h)** **Audit Rights**: Accept our right to audit compliance with export control and sanctions obligations. + +### 4.4 Enhanced Due Diligence Requirements + +For certain users and transactions, we implement enhanced due diligence including: + +**(a)** **Background Investigations**: Comprehensive background investigations of key personnel and ownership; + +**(b)** **Site Visits**: Physical site visits to verify business operations and end use; + +**(c)** **Reference Checks**: Verification of business references and commercial relationships; + +**(d)** **Financial Verification**: Verification of funding sources and financial stability; + +**(e)** **Technical Assessments**: Technical assessments of intended use and system integration; + +**(f)** **Legal Opinions**: Legal opinions regarding compliance with local laws and regulations; + +**(g)** **Ongoing Monitoring**: Enhanced ongoing monitoring of activities and transactions; + +**(h)** **Periodic Reviews**: Regular reviews and updates of due diligence information. + +## 5. TECHNOLOGY TRANSFER CONTROLS + +### 5.1 Technical Data and Source Code + +Transfer of technical data and source code is subject to: + +**(a)** **Classification Requirements**: Proper classification of all technical data according to export control regulations; + +**(b)** **Licensing Determinations**: Determination of licensing requirements for specific transfers; + +**(c)** **End User Verification**: Verification of end users and intended use of technical data; + +**(d)** **Access Controls**: Implementation of appropriate access controls for sensitive technical information; + +**(e)** **Transfer Documentation**: Comprehensive documentation of all technical data transfers; + +**(f)** **Encryption Requirements**: Use of appropriate encryption for transmission of controlled technical data; + +**(g)** **Audit Trails**: Maintenance of complete audit trails for technical data access and transfer; + +**(h)** **Retention Policies**: Implementation of appropriate retention and deletion policies for technical data. + +### 5.2 Foreign National Employee Controls + +For foreign national employees and contractors: + +**(a)** **Deemed Export Licensing**: Obtaining appropriate deemed export licences for foreign national access to controlled technology; + +**(b)** **Background Screening**: Comprehensive background screening and security clearance procedures; + +**(c)** **Access Restrictions**: Implementation of appropriate access restrictions based on nationality and security clearance; + +**(d)** **Training Requirements**: Specialised training on export control obligations and restrictions; + +**(e)** **Monitoring Procedures**: Enhanced monitoring of foreign national access to controlled technology; + +**(f)** **Documentation Requirements**: Comprehensive documentation of foreign national employment and access; + +**(g)** **Reporting Obligations**: Compliance with reporting requirements for foreign national employment; + +**(h)** **Termination Procedures**: Appropriate procedures for termination and technology access revocation. + +### 5.3 Research and Development Collaborations + +For research and development activities: + +**(a)** **Collaboration Screening**: Screening of all research collaborators and institutional partners; + +**(b)** **Fundamental Research**: Determination of fundamental research exceptions and applicability; + +**(c)** **Publication Review**: Review of research publications for export control implications; + +**(d)** **Conference Participation**: Compliance procedures for international conference participation; + +**(e)** **Student Exchange**: Special procedures for student exchange and visiting researcher programmes; + +**(f)** **Joint Development**: Compliance procedures for joint technology development projects; + +**(g)** **Intellectual Property**: Management of intellectual property rights in international collaborations; + +**(h)** **Government Funding**: Compliance with government funding requirements and restrictions. + +### 5.4 Cloud and Remote Services + +For cloud and remote service provision: + +**(a)** **Data Location**: Understanding and controlling the geographic location of data processing and storage; + +**(b)** **Remote Access**: Implementing appropriate controls for remote access by foreign nationals; + +**(c)** **Service Architecture**: Designing service architecture to comply with export control requirements; + +**(d)** **User Authentication**: Implementing robust user authentication and access control systems; + +**(e)** **Audit Capabilities**: Maintaining comprehensive audit capabilities for cloud service usage; + +**(f)** **Data Sovereignty**: Compliance with data sovereignty and localisation requirements; + +**(g)** **Third-Party Infrastructure**: Managing export control risks in third-party cloud infrastructure; + +**(h)** **Cross-Border Data Flows**: Controlling cross-border data flows in compliance with export control laws. + +## 6. COMPLIANCE MONITORING AND ENFORCEMENT + +### 6.1 Automated Monitoring Systems + +We employ automated systems for compliance monitoring including: + +**(a)** **Real-Time Screening**: Real-time screening of all user registrations and transactions against sanctions lists; + +**(b)** **Pattern Recognition**: Advanced pattern recognition to identify potential sanctions evasion activities; + +**(c)** **Geographic Monitoring**: Continuous monitoring of user geographic location and access patterns; + +**(d)** **Transaction Analysis**: Automated analysis of transactions for compliance red flags; + +**(e)** **Alert Systems**: Automated alert systems for potential compliance violations or concerns; + +**(f)** **Data Analytics**: Advanced data analytics for identification of compliance risks and trends; + +**(g)** **Machine Learning**: Machine learning systems for improved detection of violations and risks; + +**(h)** **Integration Systems**: Integration with government databases and sanctions list feeds. + +### 6.2 Manual Review Procedures + +Supplementing automated systems, we maintain manual review procedures including: + +**(a)** **High-Risk Transactions**: Manual review of all high-risk transactions and relationships; + +**(b)** **Complex Cases**: Human review of complex compliance cases requiring judgment and analysis; + +**(c)** **Exception Handling**: Manual processing of cases requiring special consideration or exceptions; + +**(d)** **Escalation Procedures**: Clear escalation procedures for complex or uncertain compliance matters; + +**(e)** **Expert Consultation**: Access to export control and sanctions experts for difficult cases; + +**(f)** **Quality Assurance**: Quality assurance procedures for compliance screening and monitoring; + +**(g)** **Regular Audits**: Regular audits of compliance procedures and decision-making; + +**(h)** **Continuous Improvement**: Continuous improvement of manual review processes and procedures. + +### 6.3 Violation Detection and Response + +When potential violations are detected: + +**(a)** **Immediate Containment**: Immediate action to contain potential violations and prevent escalation; + +**(b)** **Investigation Launch**: Launch of comprehensive investigation into the scope and nature of violations; + +**(c)** **Legal Consultation**: Immediate consultation with export control and sanctions counsel; + +**(d)** **Documentation Preservation**: Preservation of all relevant documentation and electronic records; + +**(e)** **Risk Assessment**: Assessment of legal, financial, and reputational risks associated with violations; + +**(f)** **Corrective Action**: Implementation of immediate corrective actions to address violations; + +**(g)** **Government Coordination**: Coordination with government authorities as required by law; + +**(h)** **Stakeholder Communication**: Appropriate communication with stakeholders regarding violations and response. + +### 6.4 Enforcement Actions + +Compliance violations may result in: + +**(a)** **Service Suspension**: Immediate suspension of services to violating users or entities; + +**(b)** **Account Termination**: Permanent termination of user accounts and access to services; + +**(c)** **Asset Freezing**: Freezing of assets and funds as required by sanctions regulations; + +**(d)** **Data Deletion**: Deletion of data and information belonging to sanctioned parties; + +**(e)** **Access Blocking**: Technical blocking of access from restricted IP addresses or locations; + +**(f)** **Contract Termination**: Termination of commercial contracts and business relationships; + +**(g)** **Legal Action**: Initiation of legal action to recover damages and prevent future violations; + +**(h)** **Regulatory Reporting**: Reporting of violations to appropriate regulatory authorities. + +## 7. TRAINING AND AWARENESS + +### 7.1 Employee Training Programmes + +All employees receive comprehensive export control and sanctions training including: + +**(a)** **General Awareness**: Basic awareness training on export control and sanctions laws and regulations; + +**(b)** **Role-Specific Training**: Specialised training based on job responsibilities and risk exposure; + +**(c)** **New Employee Orientation**: Mandatory export control training for all new employees; + +**(d)** **Annual Refresher**: Annual refresher training on updated laws, regulations, and procedures; + +**(e)** **Specialised Workshops**: Specialised workshops for high-risk roles and functions; + +**(f)** **Case Study Analysis**: Analysis of real-world cases and scenarios relevant to our business; + +**(g)** **Regulatory Updates**: Training on new regulations and changes in export control and sanctions laws; + +**(h)** **Certification Programmes**: Support for professional certification in export control and sanctions compliance. + +### 7.2 Management and Leadership Training + +Management and leadership receive enhanced training including: + +**(a)** **Strategic Overview**: Strategic overview of export control and sanctions compliance in business operations; + +**(b)** **Risk Management**: Risk management principles and strategies for export control and sanctions compliance; + +**(c)** **Decision-Making**: Training on compliance decision-making and escalation procedures; + +**(d)** **Legal Implications**: Understanding of legal implications and potential penalties for violations; + +**(e)** **Business Integration**: Integration of compliance considerations into business planning and operations; + +**(f)** **Crisis Management**: Crisis management and response procedures for compliance violations; + +**(g)** **Stakeholder Communication**: Communication strategies for compliance matters with stakeholders; + +**(h)** **Continuous Improvement**: Leadership in continuous improvement of compliance programmes. + +### 7.3 Customer and Partner Education + +We provide education and resources for customers and partners including: + +**(a)** **Compliance Guidance**: General guidance on export control and sanctions compliance obligations; + +**(b)** **Best Practices**: Sharing of best practices for compliance with export control and sanctions laws; + +**(c)** **Resource Materials**: Provision of resource materials and references for compliance education; + +**(d)** **Webinar Series**: Regular webinars on export control and sanctions compliance topics; + +**(e)** **Industry Updates**: Updates on regulatory changes and industry developments; + +**(f)** **Consultation Services**: Consultation services for complex compliance questions and issues; + +**(g)** **Training Partnerships**: Partnerships with industry organisations for compliance training; + +**(h)** **Documentation Support**: Support in developing compliance documentation and procedures. + +### 7.4 Awareness and Communication + +We maintain ongoing awareness and communication through: + +**(a)** **Regular Communications**: Regular communications on compliance matters and regulatory updates; + +**(b)** **Policy Updates**: Communication of policy updates and procedural changes; + +**(c)** **Success Stories**: Sharing of compliance success stories and positive outcomes; + +**(d)** **Lessons Learned**: Communication of lessons learned from compliance challenges and violations; + +**(e)** **Industry Participation**: Active participation in industry compliance initiatives and working groups; + +**(f)** **Regulatory Engagement**: Engagement with regulatory authorities on compliance matters; + +**(g)** **Public Awareness**: Public communication of our commitment to export control and sanctions compliance; + +**(h)** **Stakeholder Reporting**: Regular reporting to stakeholders on compliance programme effectiveness. + +## 8. RECORD KEEPING AND DOCUMENTATION + +### 8.1 Documentation Requirements + +We maintain comprehensive documentation including: + +**(a)** **Classification Records**: Complete records of technology classifications and determinations; + +**(b)** **Screening Records**: Records of all sanctions and export control screening activities; + +**(c)** **License Documentation**: All export licenses, registrations, and government approvals; + +**(d)** **Due Diligence Files**: Comprehensive due diligence files for customers, partners, and transactions; + +**(e)** **Transaction Records**: Detailed records of all international transactions and service provision; + +**(f)** **Training Records**: Records of all training activities and compliance education; + +**(g)** **Audit Documentation**: Documentation of internal and external compliance audits; + +**(h)** **Violation Records**: Complete records of any violations and remedial actions taken. + +### 8.2 Retention Periods + +Documentation is retained according to the following schedule: + +**(a)** **Export Transactions**: Export transaction records retained for minimum 5 years or as required by applicable law; + +**(b)** **Sanctions Screening**: Sanctions screening records retained for minimum 5 years from last screening; + +**(c)** **License Records**: License and government approval records retained permanently; + +**(d)** **Due Diligence**: Due diligence files retained for minimum 5 years after relationship termination; + +**(e)** **Training Records**: Training records retained for minimum 3 years or duration of employment; + +**(f)** **Audit Records**: Audit documentation retained for minimum 7 years or as required by regulation; + +**(g)** **Violation Records**: Violation records retained permanently or as required by law; + +**(h)** **Classification Records**: Classification determinations retained for life of technology or product. + +### 8.3 Data Security and Access Controls + +Compliance documentation is protected through: + +**(a)** **Access Controls**: Strict access controls limiting access to authorised personnel only; + +**(b)** **Encryption**: Encryption of sensitive compliance documentation and data; + +**(c)** **Backup Procedures**: Regular backup of compliance documentation with secure storage; + +**(d)** **Audit Trails**: Complete audit trails of access to and modification of compliance records; + +**(e)** **Physical Security**: Appropriate physical security for paper records and storage facilities; + +**(f)** **Digital Rights Management**: Digital rights management for electronic compliance documentation; + +**(g)** **Disposal Procedures**: Secure disposal procedures for expired or unnecessary documentation; + +**(h)** **Breach Response**: Incident response procedures for security breaches affecting compliance records. + +### 8.4 Government Access and Cooperation + +We cooperate fully with government access requests through: + +**(a)** **Regulatory Inspections**: Full cooperation with regulatory inspections and examinations; + +**(b)** **Information Requests**: Prompt response to government information requests and subpoenas; + +**(c)** **Investigation Support**: Support for government investigations of potential violations; + +**(d)** **Voluntary Disclosure**: Voluntary disclosure of potential violations and compliance concerns; + +**(e)** **Expert Testimony**: Provision of expert testimony and technical assistance as requested; + +**(f)** **Documentation Production**: Production of required documentation in appropriate formats; + +**(g)** **Interview Cooperation**: Cooperation with government interviews and depositions; + +**(h)** **Ongoing Assistance**: Ongoing assistance with government compliance monitoring and oversight. + +## 9. INTERNATIONAL OPERATIONS AND SUBSIDIARIES + +### 9.1 Global Compliance Framework + +Our international operations follow a unified compliance framework including: + +**(a)** **Consistent Standards**: Application of consistent compliance standards across all international operations; + +**(b)** **Local Adaptation**: Adaptation of procedures to comply with local laws and regulations; + +**(c)** **Subsidiary Oversight**: Comprehensive oversight of subsidiary compliance programmes; + +**(d)** **Cross-Border Coordination**: Coordination of compliance activities across borders and jurisdictions; + +**(e)** **Centralised Reporting**: Centralised reporting of compliance activities and violations; + +**(f)** **Shared Resources**: Shared compliance resources and expertise across international operations; + +**(g)** **Unified Training**: Unified training programmes adapted for local requirements; + +**(h)** **Regular Auditing**: Regular auditing of international compliance programmes and activities. + +### 9.2 Regional Compliance Programmes + +We maintain regional compliance programmes including: + +**(a)** **Americas Programme**: Compliance programme for operations in North, Central, and South America; + +**(b)** **European Programme**: Compliance programme for operations in the European Union and associated countries; + +**(c)** **Asia-Pacific Programme**: Compliance programme for operations in the Asia-Pacific region; + +**(d)** **Middle East and Africa Programme**: Compliance programme for operations in the Middle East and Africa; + +**(e)** **Regional Expertise**: Regional compliance experts with local knowledge and experience; + +**(f)** **Local Partnerships**: Partnerships with local legal and compliance experts; + +**(g)** **Government Relations**: Established relationships with regional government authorities; + +**(h)** **Cultural Adaptation**: Adaptation of compliance programmes to local cultural and business practices. + +### 9.3 Cross-Border Data Flows + +Management of cross-border data flows includes: + +**(a)** **Data Classification**: Classification of data according to export control and privacy regulations; + +**(b)** **Transfer Restrictions**: Implementation of appropriate restrictions on cross-border data transfers; + +**(c)** **Encryption Requirements**: Use of appropriate encryption for international data transfers; + +**(d)** **Access Controls**: Implementation of access controls for international data access; + +**(e)** **Audit Capabilities**: Maintenance of audit capabilities for cross-border data flows; + +**(f)** **Regulatory Compliance**: Compliance with data localisation and sovereignty requirements; + +**(g)** **Cloud Architecture**: Design of cloud architecture to support compliant cross-border operations; + +**(h)** **Incident Response**: Incident response procedures for cross-border data incidents. + +### 9.4 Joint Ventures and Partnerships + +For international joint ventures and partnerships: + +**(a)** **Due Diligence**: Comprehensive due diligence on all international partners and joint venture participants; + +**(b)** **Compliance Requirements**: Contractual requirements for export control and sanctions compliance; + +**(c)** **Monitoring Procedures**: Ongoing monitoring of partner and joint venture compliance; + +**(d)** **Training Requirements**: Training requirements for partner personnel and joint venture staff; + +**(e)** **Audit Rights**: Contractual audit rights for compliance monitoring and verification; + +**(f)** **Termination Rights**: Rights to terminate relationships for compliance violations; + +**(g)** **Information Sharing**: Procedures for compliant information sharing in partnerships; + +**(h)** **Dispute Resolution**: Dispute resolution procedures for compliance-related conflicts. + +## 10. EMERGING TECHNOLOGIES AND FUTURE COMPLIANCE + +### 10.1 Emerging Technology Assessment + +We proactively assess emerging technologies including: + +**(a)** **Artificial Intelligence**: Export control implications of AI and machine learning technologies; + +**(b)** **Quantum Computing**: Assessment of quantum computing and cryptography technologies; + +**(c)** **Biotechnology**: Evaluation of biotechnology and life sciences applications; + +**(d)** **Advanced Materials**: Assessment of advanced materials and nanotechnology; + +**(e)** **Autonomous Systems**: Export control implications of autonomous and robotic systems; + +**(f)** **Blockchain Technologies**: Evaluation of blockchain and distributed ledger technologies; + +**(g)** **Advanced Manufacturing**: Assessment of 3D printing and advanced manufacturing technologies; + +**(h)** **Space Technologies**: Export control implications of space and satellite technologies. + +### 10.2 Regulatory Monitoring and Anticipation + +We actively monitor regulatory developments including: + +**(a)** **Regulatory Proposals**: Monitoring of proposed changes to export control and sanctions regulations; + +**(b)** **Industry Consultations**: Participation in government consultations on regulatory changes; + +**(c)** **International Coordination**: Monitoring of international coordination on export control matters; + +**(d)** **Technology Trends**: Analysis of technology trends and their potential regulatory implications; + +**(e)** **Geopolitical Developments**: Assessment of geopolitical developments affecting export control; + +**(f)** **Academic Research**: Monitoring of academic research on export control and sanctions compliance; + +**(g)** **Industry Intelligence**: Gathering and analysis of industry intelligence on regulatory trends; + +**(h)** **Government Engagement**: Active engagement with government authorities on regulatory development. + +### 10.3 Adaptive Compliance Framework + +Our compliance framework adapts to changes through: + +**(a)** **Flexible Procedures**: Development of flexible procedures that can adapt to regulatory changes; + +**(b)** **Rapid Response**: Rapid response capabilities for urgent compliance changes; + +**(c)** **Technology Integration**: Integration of new technologies into compliance monitoring and enforcement; + +**(d)** **Stakeholder Communication**: Effective communication of changes to stakeholders and users; + +**(e)** **Training Updates**: Rapid updates to training programmes for regulatory changes; + +**(f)** **System Modifications**: Quick modification of systems and procedures for compliance changes; + +**(g)** **Risk Assessment**: Regular risk assessment and updating for emerging threats and challenges; + +**(h)** **Continuous Learning**: Continuous learning and improvement of compliance capabilities. + +### 10.4 Innovation and Compliance Balance + +We balance innovation with compliance through: + +**(a)** **Compliance by Design**: Integration of compliance considerations into product and service design; + +**(b)** **Risk-Based Approach**: Risk-based approach to compliance that enables innovation while managing risks; + +**(c)** **Stakeholder Engagement**: Engagement with stakeholders on balancing innovation and compliance; + +**(d)** **Regulatory Advocacy**: Advocacy for reasonable and effective export control and sanctions regulations; + +**(e)** **Industry Leadership**: Leadership in developing industry best practices for compliance and innovation; + +**(f)** **Public-Private Partnership**: Partnership with government authorities on compliance and innovation; + +**(g)** **Research and Development**: Investment in research and development of compliance technologies; + +**(h)** **Future Planning**: Long-term planning for compliance in emerging technology areas. + +## 11. CONTACT INFORMATION AND SUPPORT + +### 11.1 Export Control and Sanctions Compliance + +For export control and sanctions compliance matters: + +**Email:** export-compliance@nhcarrigan.com + +**Subject Line:** Export Control Compliance - [Brief Description] + +**Response Time:** Within 24 hours for compliance inquiries + +**Emergency Contact:** Available for urgent compliance matters + +### 11.2 License Applications and Government Relations + +For license applications and government relations: + +**Email:** export-licensing@nhcarrigan.com + +**Subject Line:** Export License Matter - [License Type] + +**Response Time:** Within 2 business days for licensing matters + +**Government Relations:** Dedicated team for government agency coordination + +### 11.3 Sanctions Screening and Verification + +For sanctions screening and verification requests: + +**Email:** sanctions-screening@nhcarrigan.com + +**Subject Line:** Sanctions Verification Request - [Entity Name] + +**Response Time:** Within 4 hours during business days for screening requests + +**Automated Systems:** Real-time automated screening available through our systems + +### 11.4 Training and Education + +For export control and sanctions training: + +**Email:** export-training@nhcarrigan.com + +**Subject Line:** Export Control Training Request + +**Training Portal:** Access to online training modules and resources + +**Response Time:** Within 3 business days for training requests + +**Document Version:** 1.0 + +**Last Updated:** 15 September 2025 + +**Effective Date:** 15 September 2025 + +**Next Review Date:** 15 March 2026 + +--- + +*This Export Control and Sanctions Compliance Policy ensures our full compliance with international trade regulations whilst enabling lawful global service provision. By using our Services, you acknowledge understanding of these requirements and agree to comply with all applicable export control and sanctions laws. For compliance questions or assistance, please contact us at export-compliance@nhcarrigan.com.* diff --git a/src/content/docs/legal/government.md b/src/content/docs/legal/government.md index 6780b30..b9a94d7 100644 --- a/src/content/docs/legal/government.md +++ b/src/content/docs/legal/government.md @@ -2,33 +2,424 @@ title: Government Actions and Compliance --- -## 1. Introduction +**MAINTAINING TRANSPARENCY IN GOVERNMENT AND LEGAL AUTHORITY INTERACTIONS** -The purpose of this document is to maintain transparency regarding any government or legal authority's actions against our organisation that result in a release of your data to those authorities. +## 1. INTRODUCTION AND POLICY STATEMENT -### 1.1. Disclaimers +### 1.1 Transparency Commitment -- We do not provide any sort of proactive information to regulatory agencies. -- We do not, and will never, set up "backdoors" or other direct access routes for regulatory agencies to surveil or access your data. -- All data in this document cover the entirety of NHCarrigan's lifetime, from our inception in +This transparency report is published to maintain complete transparency regarding any actions taken by government agencies, law enforcement authorities, or other legal entities that may result in the disclosure of user data or information stored by nhcarrigan ("we," "us," "our," or "the Company"). -## 2. Requests for Information +### 1.2 Scope and Coverage -We have received 0 requests for information/data from authoritative agencies. +This report covers: -| Agency | Data Requested | Result | -| ------ | -------------- | ------ | +**(a)** All formal requests for information or data from governmental or regulatory authorities; -## 3. Warrants and Subpoenas +**(b)** All warrants, subpoenas, court orders, or similar legal instruments served upon our organisation; -We have been the subject of 0 warrants or subpoenas for our information/data. +**(c)** Any asset seizures, data searches, or investigative actions affecting our systems or data; -| Agency | Date of Action | Result | -| ------ | -------------- | ------ | +**(d)** All time periods from the inception of nhcarrigan operations to the date of this report. -## 4. Asset Seizures +### 1.3 Reporting Principles -We have had our data/information searched or seized 0 times. +Our transparency reporting is guided by the following principles: -| Agency | Scope of Search | Result | -| ------ | --------------- | ------ | +**(a)** **Comprehensive Coverage:** All relevant actions and requests are documented without exception; + +**(b)** **Regular Updates:** This report is updated promptly following any new developments; + +**(c)** **Legal Compliance:** All disclosures comply with applicable laws and court-imposed restrictions; + +**(d)** **User Protection:** We prioritise transparency whilst respecting ongoing legal proceedings and user privacy. + +## 2. POLICY DECLARATIONS + +### 2.1 Proactive Information Sharing + +We explicitly declare that: + +**(a)** We do not provide any proactive information to regulatory agencies, law enforcement, or government entities without legal compulsion; + +**(b)** We do not engage in voluntary information sharing programmes with government agencies; + +**(c)** We do not participate in mass surveillance or data collection programmes; + +**(d)** All government data requests must follow proper legal channels and procedures. + +### 2.2 System Integrity and Access + +We firmly commit that: + +**(a)** We do not, and will never, create "backdoors" or direct access routes for regulatory agencies to access user data or systems; + +**(b)** We do not implement any covert monitoring or surveillance capabilities at the request of government entities; + +**(c)** We do not provide real-time access to user communications or data without proper legal process; + +**(d)** Any access to user data by authorities must be pursuant to valid legal process and within the bounds of applicable law. + +### 2.3 Legal Process Requirements + +For any disclosure of user information, we require: + +**(a)** Valid legal process appropriate to the type of information requested; + +**(b)** Proper jurisdictional authority over the matter in question; + +**(c)** Specificity in the request regarding the information sought and the legal basis; + +**(d)** Compliance with applicable data protection and privacy laws. + +### 2.4 User Notification Policy + +Subject to legal restrictions and court orders: + +**(a)** We endeavour to notify affected users of government requests for their information; + +**(b)** We provide reasonable advance notice where legally permissible; + +**(c)** We challenge overly broad or inappropriate requests through legal channels; + +**(d)** We advocate for the narrowest possible scope of any required disclosures. + +## 3. INFORMATION REQUESTS + +### 3.1 Summary Statistics + +**Total Requests Received:** 0 (Zero) + +**Time Period Covered:** From inception of nhcarrigan operations through the date of this report + +### 3.2 Types of Information Requests + +We categorise information requests as follows: + +**(a)** **Emergency Requests:** Involving immediate threats to life or safety; + +**(b)** **Criminal Investigations:** Related to suspected criminal activity; + +**(c)** **Civil Matters:** Arising from civil litigation or administrative proceedings; + +**(d)** **Regulatory Inquiries:** From regulatory bodies regarding compliance or oversight. + +### 3.3 Detailed Request Log + +| Request Date | Agency/Authority | Type of Request | Information Requested | Legal Basis | Response Date | Result/Action Taken | User Notification | +|--------------|------------------|-----------------|----------------------|-------------|---------------|---------------------|-------------------| +| No requests received to date | | | | | | | | + +### 3.4 Response Procedures + +When we receive information requests, our standard procedure includes: + +**(a)** **Legal Review:** Assessment by qualified legal counsel of the validity and scope of the request; + +**(b)** **Minimal Disclosure:** Limiting any disclosure to the minimum information required by law; + +**(c)** **Documentation:** Maintaining detailed records of all requests and responses; + +**(d)** **Transparency Reporting:** Including appropriate information in this public transparency report. + +## 4. WARRANTS AND SUBPOENAS + +### 4.1 Summary Statistics + +**Total Warrants Received:** 0 (Zero) + +**Total Subpoenas Received:** 0 (Zero) + +**Time Period Covered:** From inception of nhcarrigan operations through the date of this report + +### 4.2 Types of Legal Process + +We track the following types of legal process: + +**(a)** **Search Warrants:** Authorising search and seizure of specific information or systems; + +**(b)** **Subpoenas:** Compelling production of documents or testimony; + +**(c)** **Court Orders:** Directing specific actions or disclosures; + +**(d)** **National Security Letters:** Administrative subpoenas related to national security investigations (where applicable). + +### 4.3 Detailed Process Log + +| Service Date | Court/Agency | Type of Process | Scope of Request | Response Required | Response Date | Compliance Action | Challenge Filed | User Notification | +|--------------|--------------|-----------------|------------------|-------------------|---------------|-------------------|-----------------|-------------------| +| No legal process served to date | | | | | | | | | + +### 4.4 Legal Challenge Policy + +Our policy regarding legal challenges includes: + +**(a)** **Threshold Review:** Automatic legal review of all process for validity and scope; + +**(b)** **Challenge Criteria:** Filing challenges when process is overbroad, invalid, or inappropriate; + +**(c)** **User Advocacy:** Advocating for user privacy rights within legal constraints; + +**(d)** **Procedural Compliance:** Ensuring all responses comply with applicable legal requirements. + +## 5. ASSET SEIZURES AND SEARCHES + +### 5.1 Summary Statistics + +**Total Seizures/Searches:** 0 (Zero) + +**Time Period Covered:** From inception of nhcarrigan operations through the date of this report + +### 5.2 Types of Seizures and Searches + +We categorise enforcement actions as follows: + +**(a)** **Physical Seizures:** Seizure of physical hardware, servers, or storage media; + +**(b)** **Digital Searches:** Direct access to or copying of digital information; + +**(c)** **Account Freezes:** Temporary or permanent restriction of access to accounts or systems; + +**(d)** **Data Preservation:** Requirements to preserve specific data pending legal proceedings. + +### 5.3 Detailed Action Log + +| Action Date | Agency | Type of Action | Scope of Search/Seizure | Legal Authority | Property/Data Affected | Recovery/Return | Impact Assessment | +|-------------|--------|----------------|-------------------------|-----------------|------------------------|-----------------|-------------------| +| No seizures or searches to date | | | | | | | | + +### 5.4 Response and Mitigation Procedures + +In the event of asset seizures or searches, our procedures include: + +**(a)** **Immediate Assessment:** Rapid evaluation of the scope and impact of the action; + +**(b)** **Legal Representation:** Immediate engagement of qualified legal counsel; + +**(c)** **User Protection:** Implementation of measures to protect user data and privacy; + +**(d)** **Service Continuity:** Actions to maintain service availability where legally permissible. + +## 6. DATA PROTECTION AND PRIVACY SAFEGUARDS + +### 6.1 Technical Safeguards + +We implement technical measures to protect user data: + +**(a)** **Encryption:** All user data is encrypted both in transit and at rest; + +**(b)** **Access Controls:** Strict access controls limit personnel who can access user data; + +**(c)** **Audit Logging:** Comprehensive logging of all access to user data; + +**(d)** **Data Minimisation:** Collection and retention of only necessary user information. + +### 6.2 Legal Safeguards + +Our legal protections include: + +**(a)** **Qualified Legal Review:** All government requests reviewed by qualified legal counsel; + +**(b)** **Narrow Interpretation:** Interpreting all legal process as narrowly as legally permissible; + +**(c)** **Challenge Preparation:** Maintaining resources to challenge inappropriate or overbroad requests; + +**(d)** **Jurisdictional Analysis:** Careful analysis of jurisdictional issues in cross-border requests. + +### 6.3 Operational Safeguards + +Our operational procedures include: + +**(a)** **Incident Response:** Established procedures for responding to government actions; + +**(b)** **Communication Plans:** Clear communication protocols with users and stakeholders; + +**(c)** **Documentation Standards:** Comprehensive documentation of all interactions with authorities; + +**(d)** **Recovery Procedures:** Plans for service recovery following any enforcement actions. + +### 6.4 International Considerations + +For cross-border requests, we consider: + +**(a)** **Treaty Obligations:** Applicable mutual legal assistance treaties and agreements; + +**(b)** **Local Law Compliance:** Requirements under local data protection and privacy laws; + +**(c)** **Diplomatic Channels:** Appropriate use of diplomatic channels for sensitive matters; + +**(d)** **Conflict Resolution:** Procedures for resolving conflicts between different legal systems. + +## 7. REPORTING METHODOLOGY AND LIMITATIONS + +### 7.1 Data Collection + +This transparency report is compiled using: + +**(a)** **Legal Records:** Comprehensive records of all legal process received; + +**(b)** **Communication Logs:** Documentation of all communications with government agencies; + +**(c)** **Internal Reports:** Regular internal assessments of government interaction; + +**(d)** **Legal Review:** Quarterly review by qualified legal counsel for completeness and accuracy. + +### 7.2 Reporting Limitations + +This report is subject to the following limitations: + +**(a)** **Legal Restrictions:** Some information may be withheld due to court orders or legal restrictions; + +**(b)** **Classification Issues:** Certain national security matters may not be reportable; + +**(c)** **Ongoing Proceedings:** Active legal matters may limit the detail that can be disclosed; + +**(d)** **Aggregation Requirements:** Some jurisdictions may require statistical aggregation rather than detailed reporting. + +### 7.3 Update Schedule + +This report is updated according to the following schedule: + +**(a)** **Quarterly Updates:** Regular updates published every three months; + +**(b)** **Event-Driven Updates:** Additional updates following significant developments; + +**(c)** **Annual Review:** Comprehensive annual review and analysis; + +**(d)** **Legal Milestone Updates:** Updates following resolution of significant legal matters. + +### 7.4 Verification and Accuracy + +We ensure report accuracy through: + +**(a)** **Multi-Source Verification:** Cross-referencing multiple internal sources; + +**(b)** **Legal Review:** Review by qualified legal counsel before publication; + +**(c)** **External Audit:** Periodic external audit of transparency reporting procedures; + +**(d)** **Correction Procedures:** Clear procedures for correcting any errors or omissions. + +## 8. CONTACT INFORMATION AND SUPPORT + +### 8.1 Legal Process Service + +For service of legal process: + +**Email:** legal@nhcarrigan.com + +**Physical Address:** [To be provided when applicable] + +**Business Hours:** Monday through Friday, 9:00 AM to 5:00 PM Pacific Standard Time + +### 8.2 General Inquiries + +For questions about this transparency report: + +**Email:** transparency@nhcarrigan.com + +**Subject Line:** Government Transparency Report Inquiry + +### 8.3 Media and Press Inquiries + +For media inquiries regarding government actions: + +**Email:** press@nhcarrigan.com + +**Response Time:** Within 24 hours for urgent matters + +### 8.4 User Support + +For users concerned about government access to their data: + +**Email:** privacy@nhcarrigan.com + +**Forum:** https://forum.nhcarrigan.com + +**Response Time:** Within 48 hours for privacy-related inquiries + +## 9. FUTURE DEVELOPMENTS + +### 9.1 Policy Evolution + +We continuously review and improve our government transparency policies based on: + +**(a)** **Legal Developments:** Changes in applicable laws and regulations; + +**(b)** **Industry Standards:** Evolving best practices in transparency reporting; + +**(c)** **Stakeholder Feedback:** Input from users, legal experts, and privacy advocates; + +**(d)** **Operational Experience:** Lessons learned from any government interactions. + +### 9.2 Enhanced Reporting + +We are committed to enhancing this transparency report through: + +**(a)** **Additional Metrics:** Expanding the types of statistics and information reported; + +**(b)** **Improved Analysis:** Providing more detailed analysis of trends and implications; + +**(c)** **Interactive Features:** Developing interactive tools for exploring transparency data; + +**(d)** **International Perspective:** Expanding coverage to include international legal developments. + +### 9.3 Stakeholder Engagement + +We engage with stakeholders through: + +**(a)** **Public Consultation:** Regular opportunities for public input on transparency policies; + +**(b)** **Expert Advisory:** Consultation with legal and privacy experts; + +**(c)** **Industry Collaboration:** Participation in industry transparency initiatives; + +**(d)** **Academic Partnership:** Collaboration with academic researchers on transparency issues. + +## 10. LEGAL DISCLAIMER + +### 10.1 Report Limitations + +This transparency report: + +**(a)** Is provided for informational purposes and public accountability; + +**(b)** Does not constitute legal advice or create attorney-client privilege; + +**(c)** May be subject to legal restrictions on disclosure in some jurisdictions; + +**(d)** Represents our good faith effort to provide accurate and complete information. + +### 10.2 Legal Compliance + +This report is prepared in compliance with: + +**(a)** All applicable transparency reporting requirements; + +**(b)** Court orders and legal restrictions on disclosure; + +**(c)** Data protection and privacy laws; + +**(d)** National security and law enforcement confidentiality requirements. + +### 10.3 No Warranties + +**IMPORTANT: Comprehensive warranty disclaimers and liability limitations applicable to this report and all our services are set forth in our Limitation of Liability and Indemnification Policy, which is incorporated herein by reference.** + +In addition to those comprehensive protections, this transparency report is provided without warranties regarding: + +**(a)** Accuracy of information subject to legal reporting restrictions; + +**(b)** Completeness where disclosure is legally prohibited; + +**(c)** Changes in circumstances after publication date. + +**Report Period:** From inception of nhcarrigan operations through [Date to be inserted] + +**Publication Date:** [Date to be inserted] + +**Next Scheduled Update:** [Date to be inserted] + +--- + +*This transparency report demonstrates our commitment to user privacy and government accountability. We will continue to update this report regularly and advocate for user rights within the bounds of applicable law. For questions about this report, please contact us at transparency@nhcarrigan.com.* diff --git a/src/content/docs/legal/liability.md b/src/content/docs/legal/liability.md new file mode 100644 index 0000000..59f0855 --- /dev/null +++ b/src/content/docs/legal/liability.md @@ -0,0 +1,751 @@ +--- +title: Limitation of Liability and Indemnification Policy +--- + +**COMPREHENSIVE PROTECTION THROUGH LIABILITY LIMITATIONS AND INDEMNIFICATION PROVISIONS** + +## 1. INTRODUCTION AND SCOPE + +### 1.1 Policy Purpose and Importance + +This Limitation of Liability and Indemnification Policy ("Policy") establishes comprehensive protections for nhcarrigan ("we," "us," "our," or "the Company") and clarifies the allocation of risk and responsibility between the Company and users of our services, applications, and platforms (collectively, the "Services"). This Policy is fundamental to our ability to provide innovative services whilst managing legal and financial risks. + +### 1.2 Integration with Other Legal Documents + +This Policy operates in conjunction with and supplements: + +**(a)** Our Terms of Service, which establish the fundamental user relationship; + +**(b)** Our Service Level Agreement, which defines service expectations and remedies; + +**(c)** Our Acceptable Use Policy, which defines prohibited activities; + +**(d)** Our Privacy Policy, which governs data collection and processing; + +**(e)** Our API Terms and Conditions, which govern developer services; + +**(f)** Any additional service-specific terms or agreements. + +Where conflicts exist between documents, the most restrictive liability limitation shall apply to ensure maximum protection for the Company. + +### 1.3 Scope of Application + +This Policy applies to: + +**(a)** All users, customers, developers, and third parties interacting with our Services; + +**(b)** All services, applications, platforms, and tools provided by nhcarrigan; + +**(c)** All content, data, and information processed through our Services; + +**(d)** All commercial and non-commercial usage of our Services; + +**(e)** All direct and indirect consequences of Service usage; + +**(f)** All claims arising before, during, or after the use of our Services; + +**(g)** All legal theories and causes of action, whether known or unknown; + +**(h)** All jurisdictions where our Services are accessed or used. + +### 1.4 Legal Framework and Enforceability + +This Policy is designed to: + +**(a)** Comply with applicable laws whilst maximising legal protection; + +**(b)** Ensure enforceability across multiple jurisdictions; + +**(c)** Provide clear guidance on risk allocation and responsibility; + +**(d)** Establish predictable legal frameworks for business relationships; + +**(e)** Balance user rights with Company protection needs; + +**(f)** Support sustainable business operations through risk management; + +**(g)** Align with industry standards and best practices; + +**(h)** Facilitate insurance coverage and risk transfer arrangements. + +## 2. COMPREHENSIVE LIABILITY DISCLAIMERS + +### 2.1 General Service Disclaimers + +**IMPORTANT NOTICE: THE FOLLOWING DISCLAIMERS ARE FUNDAMENTAL TO OUR SERVICE RELATIONSHIP AND CONSTITUTE ESSENTIAL TERMS OF YOUR AGREEMENT WITH US.** + +**AS IS" AND "AS AVAILABLE" BASIS:** + +All Services are provided strictly on an "AS IS" and "AS AVAILABLE" basis without warranties, representations, or conditions of any kind, whether express, implied, statutory, or otherwise. + +**EXPRESS DISCLAIMER OF WARRANTIES:** + +We expressly disclaim and exclude all warranties including, but not limited to: + +**(a)** **Merchantability**: No warranty that Services are suitable for commercial use or will meet commercial requirements; + +**(b)** **Fitness for Particular Purpose**: No warranty that Services will meet your specific needs, requirements, or expectations; + +**(c)** **Non-Infringement**: No warranty that Services do not infringe third-party intellectual property or other rights; + +**(d)** **Quality and Performance**: No warranty regarding the quality, performance, or reliability of Services; + +**(e)** **Accuracy and Completeness**: No warranty regarding the accuracy, completeness, or currency of information or data; + +**(f)** **Uninterrupted Service**: No warranty that Services will be available, accessible, or operate without interruption; + +**(g)** **Error-Free Operation**: No warranty that Services will be free from errors, bugs, viruses, or other harmful components; + +**(h)** **Security**: No warranty that Services will be secure or that data will be protected from unauthorised access. + +### 2.2 Technology and Software Disclaimers + +Regarding our technology, software, and digital services: + +**(a)** **Compatibility**: No warranty of compatibility with all devices, browsers, operating systems, or third-party software; + +**(b)** **Performance Standards**: No guarantee of specific performance benchmarks, speed, or efficiency levels; + +**(c)** **Data Integrity**: No warranty regarding data integrity, accuracy, or prevention of data loss or corruption; + +**(d)** **Backup and Recovery**: No warranty regarding backup services or data recovery capabilities; + +**(e)** **Version Control**: No warranty regarding backward compatibility or version stability; + +**(f)** **Third-Party Integration**: No warranty regarding the performance or availability of third-party integrations; + +**(g)** **Customisation**: No warranty that Services can be customised to meet specific requirements; + +**(h)** **Scalability**: No warranty regarding scalability or ability to handle increased usage demands. + +### 2.3 Content and Information Disclaimers + +Regarding content and information provided through our Services: + +**(a)** **Accuracy**: No warranty regarding the accuracy, truthfulness, or reliability of any content or information; + +**(b)** **Completeness**: No warranty that information is complete, current, or comprehensive; + +**(c)** **Professional Advice**: No warranty that content constitutes professional, legal, financial, or medical advice; + +**(d)** **Suitability**: No warranty that information is suitable for any particular purpose or decision-making; + +**(e)** **User-Generated Content**: No warranty regarding user-generated content or its appropriateness; + +**(f)** **Third-Party Content**: No warranty regarding content from third-party sources or contributors; + +**(g)** **Currency**: No warranty that information is up-to-date or reflects current circumstances; + +**(h)** **Verification**: No obligation to verify the accuracy or completeness of any content or information. + +### 2.4 Business and Commercial Disclaimers + +For business and commercial use of our Services: + +**(a)** **Business Outcomes**: No warranty regarding specific business outcomes, results, or success; + +**(b)** **Revenue Generation**: No warranty that Services will generate revenue, profits, or business value; + +**(c)** **Market Performance**: No warranty regarding market performance or competitive advantages; + +**(d)** **Regulatory Compliance**: No warranty that Services ensure compliance with industry regulations; + +**(e)** **Business Continuity**: No warranty regarding business continuity or uninterrupted operations; + +**(f)** **Cost Savings**: No warranty regarding cost savings or operational efficiencies; + +**(g)** **Return on Investment**: No warranty regarding return on investment or financial benefits; + +**(h)** **Strategic Objectives**: No warranty that Services will help achieve strategic business objectives. + +## 3. COMPREHENSIVE LIMITATION OF LIABILITY + +### 3.1 Exclusion of Consequential and Indirect Damages + +**TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, NHCARRIGAN SHALL NOT BE LIABLE FOR ANY INDIRECT, INCIDENTAL, SPECIAL, CONSEQUENTIAL, PUNITIVE, OR EXEMPLARY DAMAGES, INCLUDING BUT NOT LIMITED TO:** + +**(a)** **Lost Profits**: Loss of actual or anticipated profits, revenue, or business opportunities; + +**(b)** **Business Interruption**: Interruption of business operations, production, or services; + +**(c)** **Lost Savings**: Loss of anticipated savings, cost reductions, or efficiency gains; + +**(d)** **Data Loss**: Loss, corruption, or unauthorised access to data, information, or content; + +**(e)** **Reputation Damage**: Damage to reputation, goodwill, or business relationships; + +**(f)** **Opportunity Costs**: Lost business opportunities or competitive disadvantages; + +**(g)** **Third-Party Claims**: Claims, damages, or losses imposed by third parties; + +**(h)** **Personal Injury**: Personal injury, emotional distress, or mental anguish (except where prohibited by law). + +### 3.2 Exclusion of Direct Damages + +**TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, WE ALSO DISCLAIM LIABILITY FOR DIRECT DAMAGES INCLUDING:** + +**(a)** **Service Failures**: Damages arising from service outages, failures, or unavailability; + +**(b)** **Performance Issues**: Damages from poor performance, slow response times, or system limitations; + +**(c)** **Data Issues**: Damages from data inaccuracies, incompleteness, or processing errors; + +**(d)** **Security Breaches**: Damages from security incidents, unauthorised access, or data breaches; + +**(e)** **Integration Problems**: Damages from integration failures or compatibility issues; + +**(f)** **Content Issues**: Damages from inappropriate, harmful, or inaccurate content; + +**(g)** **User Errors**: Damages from user errors, misuse, or misunderstanding of Services; + +**(h)** **Force Majeure**: Damages from events beyond our reasonable control. + +### 3.3 Maximum Liability Cap + +**IN JURISDICTIONS THAT DO NOT PERMIT COMPLETE EXCLUSION OF LIABILITY:** + +**(a)** **Aggregate Liability Limit**: Our total aggregate liability for all claims shall not exceed the lesser of $100 or the amounts actually paid by you for the specific Services giving rise to liability in the 12 months immediately preceding the first claim; + +**(b)** **Per-Incident Limit**: Our liability for any single incident or related series of incidents shall not exceed £50 or the monthly fee for the affected Service, whichever is greater; + +**(c)** **Free Services**: For free Services, our maximum liability is limited to $100 in aggregate for all claims; + +**(d)** **Time Limitation**: Liability is limited to damages incurred in the 12-month period immediately preceding the claim; + +**(e)** **Proportionate Liability**: Where liability is shared, our liability is limited to our proportionate share of fault; + +**(f)** **Mitigation Requirement**: Liability is contingent upon reasonable efforts to mitigate damages; + +**(g)** **Insurance Coordination**: Liability limitations coordinate with available insurance coverage; + +**(h)** **Currency Conversion**: All monetary limits are stated in United States Dollars with conversion at current exchange rates. + +### 3.4 Liability Limitation Scope + +**These liability limitations apply regardless of:** + +**(a)** **Legal Theory**: Whether claims are based in contract, tort, negligence, strict liability, or any other legal theory; + +**(b)** **Foreseeability**: Whether damages were foreseeable or we had knowledge of their possibility; + +**(c)** **Remedy Failure**: Whether limited remedies provided elsewhere fail of their essential purpose; + +**(d)** **Fault Distribution**: The degree of fault attributable to different parties; + +**(e)** **Claim Multiplicity**: The number of claims or legal theories asserted; + +**(f)** **Time of Occurrence**: Whether damages occurred before, during, or after Service usage; + +**(g)** **Geographic Location**: The jurisdiction where damages occur or claims are brought; + +**(h)** **User Classification**: Whether users are individuals, businesses, or other entities. + +## 4. COMPREHENSIVE INDEMNIFICATION PROVISIONS + +### 4.1 User Indemnification Obligations + +**Users agree to indemnify, defend, and hold harmless nhcarrigan, its parent companies, subsidiaries, affiliates, officers, directors, employees, agents, contractors, licensors, and service providers (collectively, the "Indemnified Parties") from and against any and all claims, demands, actions, damages, losses, costs, liabilities, and expenses (including reasonable attorneys' fees and court costs) arising from or relating to:** + +**(a)** **Service Usage**: Your use, misuse, or inability to use the Services in any manner; + +**(b)** **Policy Violations**: Your violation of these terms or any other applicable policies, rules, or guidelines; + +**(c)** **Legal Violations**: Your violation of any applicable laws, regulations, or third-party rights; + +**(d)** **Content Liability**: Any content you submit, post, transmit, or make available through the Services; + +**(e)** **Intellectual Property**: Claims that your content or usage infringes intellectual property rights; + +**(f)** **Privacy Violations**: Claims arising from your collection, use, or disclosure of personal information; + +**(g)** **Third-Party Interactions**: Your interactions with other users or third parties through the Services; + +**(h)** **Downstream Usage**: Any use of Services by third parties through your account or authorisation. + +### 4.2 Commercial and Business Indemnification + +**For commercial and business users, indemnification extends to:** + +**(a)** **Business Operations**: Claims arising from integration of Services into business operations; + +**(b)** **Customer Interactions**: Claims from your customers or clients related to Service usage; + +**(c)** **Employee Actions**: Claims arising from your employees' or contractors' use of Services; + +**(d)** **Regulatory Violations**: Claims from violation of industry regulations or professional standards; + +**(e)** **Data Processing**: Claims related to data processing activities conducted through Services; + +**(f)** **Commercial Content**: Claims related to commercial content, advertising, or promotional materials; + +**(g)** **Competitive Activities**: Claims arising from competitive or business development activities; + +**(h)** **Licensing Violations**: Claims from violation of software licences or intellectual property rights. + +### 4.3 Developer and API Indemnification + +**Developers and API users agree to additional indemnification for:** + +**(a)** **Application Development**: Claims arising from applications built using our APIs or services; + +**(b)** **End User Claims**: Claims from end users of applications or integrations; + +**(c)** **Data Integration**: Claims related to data integration, processing, or storage activities; + +**(d)** **Security Incidents**: Claims arising from security vulnerabilities in integrated applications; + +**(e)** **Performance Issues**: Claims related to performance, availability, or functionality of integrated services; + +**(f)** **Third-Party Services**: Claims arising from integration with third-party services or platforms; + +**(g)** **Commercial Distribution**: Claims related to commercial distribution or monetisation of applications; + +**(h)** **Compliance Failures**: Claims from failure to comply with API terms or usage restrictions. + +### 4.4 Indemnification Process and Procedures + +**The indemnification process includes:** + +**(a)** **Notice Requirement**: We will provide prompt written notice of any claim subject to indemnification; + +**(b)** **Defence Control**: We reserve the right to assume the exclusive defence and control of any matter subject to indemnification; + +**(c)** **Legal Counsel**: We may select legal counsel of our choice, with costs covered by the indemnifying party; + +**(d)** **Cooperation Requirement**: You agree to cooperate fully with the defence of any indemnified claim; + +**(e)** **Settlement Authority**: We may settle claims with your consent, which shall not be unreasonably withheld; + +**(f)** **Information Access**: You will provide all necessary information and assistance for claim defence; + +**(g)** **Cost Advancement**: You may be required to advance costs and expenses for claim defence; + +**(h)** **Recovery Rights**: We retain all rights to recover costs and damages from responsible parties. + +## 5. RISK ALLOCATION AND USER RESPONSIBILITY + +### 5.1 User Assumption of Risk + +**By using our Services, users expressly acknowledge and assume the following risks:** + +**(a)** **Technology Risks**: Inherent risks in using internet-based and cloud-based technologies; + +**(b)** **Data Risks**: Risks of data loss, corruption, or unauthorised access inherent in digital systems; + +**(c)** **Business Risks**: Risks of business interruption, competitive disadvantage, or operational challenges; + +**(d)** **Security Risks**: Risks of security vulnerabilities, cyberattacks, or malicious activities; + +**(e)** **Performance Risks**: Risks of performance degradation, service limitations, or capacity constraints; + +**(f)** **Integration Risks**: Risks associated with integrating Services with existing systems or workflows; + +**(g)** **Compliance Risks**: Risks of regulatory non-compliance or changes in legal requirements; + +**(h)** **Market Risks**: Risks of market changes, competitive pressures, or business model evolution. + +### 5.2 User Responsibility for Risk Management + +**Users are solely responsible for:** + +**(a)** **Risk Assessment**: Conducting their own risk assessment before using Services; + +**(b)** **Risk Mitigation**: Implementing appropriate risk mitigation measures and controls; + +**(c)** **Insurance Coverage**: Obtaining adequate insurance coverage for their activities and risks; + +**(d)** **Backup and Recovery**: Implementing independent backup and disaster recovery procedures; + +**(e)** **Security Measures**: Implementing appropriate security measures for their systems and data; + +**(f)** **Compliance Monitoring**: Monitoring compliance with applicable laws and regulations; + +**(g)** **Professional Advice**: Seeking professional advice regarding legal, technical, and business matters; + +**(h)** **Contingency Planning**: Developing contingency plans for service interruptions or failures. + +### 5.3 Company Risk Management Limitations + +**Our risk management efforts are limited to:** + +**(a)** **Reasonable Care**: Exercising reasonable care in providing Services according to industry standards; + +**(b)** **Security Measures**: Implementing reasonable security measures for our systems and infrastructure; + +**(c)** **Policy Compliance**: Enforcing our policies and terms to maintain service quality and security; + +**(d)** **Legal Compliance**: Complying with applicable laws and regulations in our operations; + +**(e)** **Insurance Maintenance**: Maintaining appropriate insurance coverage for our business operations; + +**(f)** **Incident Response**: Maintaining incident response capabilities for security and operational issues; + +**(g)** **Vendor Management**: Managing third-party vendors and service providers appropriately; + +**(h)** **Continuous Improvement**: Continuously improving our services and risk management practices. + +### 5.4 Shared Responsibility Model + +**Our service relationship operates under a shared responsibility model:** + +**Company Responsibilities:** +- Infrastructure security and maintenance +- Service availability and performance (subject to SLA terms) +- Data security measures for systems under our control +- Compliance with applicable laws in our operations + +**User Responsibilities:** +- Appropriate use of Services according to terms and policies +- Security of user accounts, credentials, and access controls +- Compliance with applicable laws in user's jurisdiction and industry +- Risk management and mitigation for user's business operations + +## 6. FORCE MAJEURE AND EXTERNAL FACTORS + +### 6.1 Force Majeure Events + +**We shall not be liable for any failure to perform or delay in performance due to force majeure events, including but not limited to:** + +**(a)** **Natural Disasters**: Earthquakes, floods, hurricanes, volcanic eruptions, wildfires, or other natural catastrophes; + +**(b)** **Human Conflicts**: Wars, terrorism, civil unrest, riots, strikes, labour disputes, or other human conflicts; + +**(c)** **Government Actions**: Government orders, regulations, sanctions, trade restrictions, or other official actions; + +**(d)** **Infrastructure Failures**: Power grid failures, internet backbone disruptions, telecommunications outages, or critical infrastructure failures; + +**(e)** **Pandemics**: Public health emergencies, pandemics, or government-mandated closures; + +**(f)** **Cyber Attacks**: Large-scale cyber attacks, distributed denial of service attacks, or other malicious activities beyond our control; + +**(g)** **Third-Party Failures**: Failures of critical third-party services, suppliers, or infrastructure providers; + +**(h)** **Regulatory Changes**: Sudden regulatory changes that materially affect our ability to provide Services. + +### 6.2 Third-Party Dependencies + +**Our Services rely on various third-party providers and dependencies, and we disclaim liability for:** + +**(a)** **Cloud Providers**: Outages, performance issues, or failures of underlying cloud infrastructure providers; + +**(b)** **Internet Service Providers**: Connectivity issues, routing problems, or service degradation by ISPs; + +**(c)** **Payment Processors**: Payment processing failures, delays, or security incidents; + +**(d)** **Content Delivery Networks**: CDN performance issues, geographical restrictions, or service limitations; + +**(e)** **DNS Services**: Domain name resolution failures or DNS-related service interruptions; + +**(f)** **Certificate Authorities**: SSL certificate issues, validation failures, or certificate authority problems; + +**(g)** **Integration Partners**: Failures or changes in third-party services that integrate with our platforms; + +**(h)** **Regulatory Authorities**: Actions by regulatory authorities that affect third-party service provision. + +### 6.3 Technology Limitations + +**We disclaim liability for limitations inherent in technology:** + +**(a)** **Internet Architecture**: Limitations and vulnerabilities inherent in internet architecture and protocols; + +**(b)** **Software Complexity**: Bugs, vulnerabilities, or limitations inherent in complex software systems; + +**(c)** **Hardware Failures**: Hardware failures, capacity limitations, or performance degradation; + +**(d)** **Network Congestion**: Network congestion, bandwidth limitations, or routing inefficiencies; + +**(e)** **Browser Compatibility**: Variations in browser behaviour, compatibility issues, or rendering differences; + +**(f)** **Device Limitations**: Limitations of user devices, operating systems, or hardware capabilities; + +**(g)** **Protocol Limitations**: Limitations or vulnerabilities in communication protocols and standards; + +**(h)** **Scalability Constraints**: Technical constraints that limit scalability or performance under high loads. + +## 7. JURISDICTIONAL VARIATIONS AND ENFORCEABILITY + +### 7.1 Jurisdictional Adaptation + +**These liability limitations are designed to be enforceable across jurisdictions:** + +**(a)** **Maximum Enforceability**: Limitations apply to the maximum extent permitted by applicable law in each jurisdiction; + +**(b)** **Severability**: If any provision is unenforceable, the remainder shall remain in full force and effect; + +**(c)** **Modification**: Limitations shall be modified as necessary to ensure enforceability while preserving intent; + +**(d)** **Local Law Compliance**: Limitations comply with mandatory local law requirements while maximising protection; + +**(e)** **Consumer Protection**: Special considerations for jurisdictions with strong consumer protection laws; + +**(f)** **Business-to-Business**: Enhanced enforceability for business-to-business relationships; + +**(g)** **International Treaties**: Compliance with international treaties and conventions affecting liability; + +**(h)** **Conflict of Laws**: Clear conflict of law provisions to determine applicable liability rules. + +### 7.2 Consumer Protection Considerations + +**In jurisdictions with consumer protection laws:** + +**(a)** **Statutory Rights**: These limitations do not affect statutory consumer rights that cannot be excluded by agreement; + +**(b)** **Unfair Terms**: Limitations are drafted to avoid classification as unfair or unconscionable terms; + +**(c)** **Good Faith**: All limitations are imposed in good faith and with reasonable commercial justification; + +**(d)** **Transparency**: Clear and prominent disclosure of all liability limitations; + +**(e)** **Proportionality**: Limitations are proportionate to the nature of Services provided; + +**(f)** **Alternative Remedies**: Provision of alternative remedies where complete exclusion is not permitted; + +**(g)** **Consumer Education**: Educational materials to help consumers understand limitation implications; + +**(h)** **Regulatory Compliance**: Compliance with consumer protection regulations and guidance. + +### 7.3 Business and Commercial Enforceability + +**For business and commercial relationships:** + +**(a)** **Commercial Reasonableness**: All limitations are commercially reasonable and industry-standard; + +**(b)** **Negotiated Terms**: Limitations reflect negotiated risk allocation between commercial parties; + +**(c)** **Insurance Coordination**: Limitations coordinate with standard commercial insurance coverage; + +**(d)** **Industry Practice**: Limitations align with standard industry practices and norms; + +**(e)** **Risk-Benefit Analysis**: Limitations reflect appropriate risk-benefit allocation for service provision; + +**(f)** **Competitive Market**: Limitations are consistent with competitive market conditions; + +**(g)** **Business Justification**: Clear business justification for all liability limitations; + +**(h)** **Professional Standards**: Compliance with professional standards and best practices. + +### 7.4 International Enforcement + +**For international service provision:** + +**(a)** **Treaty Compliance**: Compliance with international treaties affecting liability and jurisdiction; + +**(b)** **Cross-Border Recognition**: Structure to facilitate cross-border recognition and enforcement; + +**(c)** **Choice of Law**: Clear choice of law provisions to govern liability questions; + +**(d)** **Forum Selection**: Appropriate forum selection clauses for dispute resolution; + +**(e)** **Enforcement Mechanisms**: Practical mechanisms for international enforcement of limitations; + +**(f)** **Diplomatic Immunity**: Considerations for diplomatic immunity and sovereign immunity issues; + +**(g)** **International Standards**: Alignment with international standards for liability limitation; + +**(h)** **Reciprocity**: Reciprocal recognition of liability limitations across jurisdictions. + +## 8. INSURANCE AND RISK TRANSFER + +### 8.1 User Insurance Recommendations + +**We strongly recommend that users maintain:** + +**(a)** **Business Liability**: General business liability insurance appropriate for their operations; + +**(b)** **Technology Insurance**: Technology errors and omissions insurance for IT-related risks; + +**(c)** **Cyber Insurance**: Cyber liability insurance for data security and privacy risks; + +**(d)** **Professional Indemnity**: Professional indemnity insurance for professional service providers; + +**(e)** **Business Interruption**: Business interruption insurance for operational continuity; + +**(f)** **Data Breach**: Specific data breach response insurance coverage; + +**(g)** **International Coverage**: International insurance coverage for global business operations; + +**(h)** **Industry-Specific**: Industry-specific insurance coverage for regulated sectors. + +### 8.2 Risk Transfer Mechanisms + +**Our liability limitations facilitate risk transfer through:** + +**(a)** **Insurance Markets**: Enabling users to obtain appropriate insurance coverage for transferred risks; + +**(b)** **Risk Pricing**: Allowing market-based pricing of risks through insurance mechanisms; + +**(c)** **Loss Prevention**: Incentivising loss prevention and risk management measures; + +**(d)** **Claims Handling**: Facilitating efficient claims handling and dispute resolution; + +**(e)** **Risk Pooling**: Enabling risk pooling through insurance and other financial mechanisms; + +**(f)** **Capital Markets**: Facilitating access to capital markets for risk financing; + +**(g)** **Self-Insurance**: Supporting self-insurance and captive insurance arrangements; + +**(h)** **Risk Sharing**: Enabling risk sharing arrangements between commercial parties. + +### 8.3 Insurance Coordination + +**These liability limitations coordinate with insurance coverage through:** + +**(a)** **Coverage Gaps**: Identifying and addressing potential coverage gaps; + +**(b)** **Deductible Management**: Coordinating with insurance deductibles and self-insured retentions; + +**(c)** **Claims Coordination**: Facilitating coordination between multiple insurance policies; + +**(d)** **Subrogation Rights**: Preserving subrogation rights for insurance carriers; + +**(e)** **Additional Insured**: Provisions for additional insured status where appropriate; + +**(f)** **Waiver of Subrogation**: Coordinated waivers of subrogation between parties and insurers; + +**(g)** **Primary and Excess**: Coordination between primary and excess insurance coverage; + +**(h)** **International Coverage**: Coordination of coverage across multiple jurisdictions and policies. + +## 9. SURVIVAL AND ENFORCEMENT + +### 9.1 Survival of Provisions + +**The following provisions survive termination of any agreement or relationship:** + +**(a)** **Liability Limitations**: All liability limitations and disclaimers remain in effect permanently; + +**(b)** **Indemnification**: All indemnification obligations continue for events occurring before termination; + +**(c)** **Warranty Disclaimers**: All warranty disclaimers remain effective for all prior service provision; + +**(d)** **Risk Allocation**: Risk allocation provisions continue to apply to pre-termination activities; + +**(e)** **Force Majeure**: Force majeure protections apply to events before, during, and after termination; + +**(f)** **Insurance Provisions**: Insurance-related provisions continue as necessary for coverage coordination; + +**(g)** **Dispute Resolution**: Dispute resolution procedures continue for all claims and disputes; + +**(h)** **Governing Law**: Governing law and jurisdiction provisions continue to apply to all matters. + +### 9.2 Enforcement Mechanisms + +**These limitations are enforceable through:** + +**(a)** **Contractual Terms**: Express contractual terms in all user agreements and terms of service; + +**(b)** **Click-Through Acceptance**: Click-through acceptance mechanisms for online services; + +**(c)** **Notice Provisions**: Prominent notice and disclosure of all liability limitations; + +**(d)** **Separate Agreement**: Separate acknowledgement agreements for high-risk activities; + +**(e)** **Professional Advice**: Requirements for professional legal advice in certain circumstances; + +**(f)** **Renewal Confirmations**: Periodic renewal and confirmation of limitation acceptance; + +**(g)** **Legal Documentation**: Comprehensive legal documentation supporting enforceability; + +**(h)** **Compliance Monitoring**: Ongoing monitoring of compliance with limitation requirements. + +### 9.3 Amendment and Modification + +**These liability limitations may be amended only through:** + +**(a)** **Written Agreement**: Express written agreement signed by authorised representatives; + +**(b)** **Formal Process**: Formal amendment process with appropriate notice and acceptance; + +**(c)** **Legal Review**: Review by qualified legal counsel before any modifications; + +**(d)** **Insurance Consultation**: Consultation with insurance providers regarding coverage impacts; + +**(e)** **Risk Assessment**: Comprehensive risk assessment of proposed modifications; + +**(f)** **Board Approval**: Board approval for significant changes to fundamental risk allocation; + +**(g)** **Documentation**: Comprehensive documentation of all changes and their rationale; + +**(h)** **User Notice**: Appropriate notice to users of any changes affecting their obligations or rights. + +### 9.4 Integration and Interpretation + +**These provisions shall be interpreted and applied as follows:** + +**(a)** **Broad Construction**: Liability limitations shall be construed broadly to maximise protection; + +**(b)** **Cumulative Effect**: All limitations are cumulative and mutually reinforcing; + +**(c)** **Consistent Interpretation**: Consistent interpretation across all related agreements and policies; + +**(d)** **Good Faith**: All provisions are made and shall be interpreted in good faith; + +**(e)** **Commercial Reasonableness**: Interpretation consistent with commercial reasonableness; + +**(f)** **Industry Standards**: Interpretation consistent with industry standards and best practices; + +**(g)** **Legal Precedent**: Consideration of relevant legal precedent and case law; + +**(h)** **Regulatory Guidance**: Consideration of applicable regulatory guidance and interpretation. + +## 10. CONTACT INFORMATION AND LEGAL SUPPORT + +### 10.1 Legal and Liability Questions + +For questions about liability limitations and legal matters: + +**Email:** legal@nhcarrigan.com + +**Subject Line:** Liability and Legal Inquiry - [Brief Description] + +**Response Time:** Within 5 business days for legal inquiries + +**Legal Counsel:** All complex legal matters are reviewed by qualified legal counsel + +### 10.2 Claims and Disputes + +For claims potentially subject to liability limitations: + +**Email:** claims@nhcarrigan.com + +**Subject Line:** Legal Claim - [Claim Type] + +**Notice Requirement:** Formal notice required for all claims seeking damages + +**Response Time:** Within 10 business days for claim acknowledgement + +### 10.3 Insurance and Risk Management + +For insurance and risk management coordination: + +**Email:** risk@nhcarrigan.com + +**Subject Line:** Insurance and Risk Matter + +**Coverage Questions:** Questions about insurance coverage and risk transfer + +**Response Time:** Within 7 business days for insurance-related inquiries + +### 10.4 Emergency Legal Matters + +For urgent legal matters requiring immediate attention: + +**Email:** legal-emergency@nhcarrigan.com + +**Subject Line:** URGENT LEGAL MATTER - [Brief Description] + +**Phone:** Emergency contact information available to qualified legal representatives + +**Response Time:** Within 24 hours for emergency legal matters + +**Document Version:** 1.0 + +**Last Updated:** 15 September 2025 + +**Effective Date:** 15 September 2025 + +**Next Review Date:** 15 March 2026 + +--- + +*This Limitation of Liability and Indemnification Policy provides comprehensive legal protection through risk allocation, liability limitations, and indemnification provisions. By using our Services, you acknowledge and agree to these terms and understand their legal implications. For questions about liability matters, please contact us at legal@nhcarrigan.com.* diff --git a/src/content/docs/legal/license.md b/src/content/docs/legal/license.md index 920a7ff..6075957 100644 --- a/src/content/docs/legal/license.md +++ b/src/content/docs/legal/license.md @@ -1,1360 +1,2296 @@ --- -title: Naomi's Public License +title: Naomi's Public Licence --- -All of Our Open Source Software are licensed under these terms. +**A COMPREHENSIVE SOFTWARE LICENCE FOR ETHICAL AND COLLABORATIVE DEVELOPMENT** -## 1. Definitions +All of our Open Source Software is licensed under these terms. -### 1.1. Software +--- -The code, documentation text, and other related materials licensed under this License. +## 1. DEFINITIONS AND INTERPRETATION + +### 1.1 Software + +"Software" means the code, documentation text, and other related materials licensed under this Licence. This includes, but is not limited to: -- Source code files -- Compiled binaries -- Configuration files -- User manuals and documentation -- Development tools and scripts directly related to the software +**(a)** Source code files written in any programming language; -### 1.2. Assets +**(b)** Compiled binaries and executable files; -The non-Software copyrighted materials, such as images, logos, and names. +**(c)** Configuration files and build scripts; + +**(d)** User manuals, technical documentation, and instructional materials; + +**(e)** Development tools and scripts directly related to the Software; + +**(f)** Any other materials necessary for the proper functioning, compilation, or use of the Software. + +### 1.2 Assets + +"Assets" means the non-Software copyrighted materials, such as images, logos, and names, that may accompany or be associated with the Software. This may include: -- Graphical elements (icons, backgrounds, etc.) -- Audio files -- Video content -- Trademarks and brand elements -- Any other creative works associated with the Software but not part of its functional code +**(a)** Graphical elements including icons, backgrounds, user interface elements, and artistic works; -### 1.3. Package +**(b)** Audio files, sound effects, and musical compositions; -Software specifically bundled to be used in other Works. +**(c)** Video content, animations, and multimedia materials; + +**(d)** Trademarks, service marks, and brand elements; + +**(e)** Fonts, typefaces, and typographical designs; + +**(f)** Any other creative works associated with the Software but not forming part of its functional code. + +### 1.3 Package + +"Package" means Software specifically bundled and prepared to be used as a component or dependency in other Works. This refers to: -- Libraries or modules designed for integration -- APIs or SDKs -- Any component of the Software intended for use within larger systems or applications +**(a)** Libraries or modules designed for integration into larger applications; -### 1.4. We, Us, and Our +**(b)** Application Programming Interfaces (APIs) and Software Development Kits (SDKs); -Naomi Carrigan, and her software consulting firm nhcarrigan. +**(c)** Any component of the Software specifically intended for use within larger systems or applications; + +**(d)** Distributable units of Software designed to provide specific functionality to other programmes. + +### 1.4 We, Us, and Our + +"We," "Us," and "Our" refer to Naomi Carrigan and her software consulting firm nhcarrigan. This includes: -- Naomi Carrigan in her individual capacity -- All employees, contractors, and representatives of nhcarrigan -- Any successors or assigns of nhcarrigan +**(a)** Naomi Carrigan acting in her individual capacity as the original author and copyright holder; -### 1.5. You and Your +**(b)** All employees, contractors, agents, and representatives of nhcarrigan; -The individual or entity exercising the rights granted under this License. +**(c)** Any successors in interest or assigns of nhcarrigan; + +**(d)** Any other entities or persons authorised to act on behalf of nhcarrigan. + +### 1.5 You and Your + +"You" and "Your" refer to the individual or entity exercising the rights granted under this Licence. This may refer to: -- Individual users -- Organizations or companies -- Government entities -- Any other legal entity using or modifying the Software +**(a)** Individual users or developers; -### 1.6. Contributor(s) +**(b)** Organisations, companies, or corporations; -An individual or entity who contributes to the Software. +**(c)** Government entities or agencies; + +**(d)** Educational institutions; + +**(e)** Any other legal entity using, modifying, or distributing the Software. + +### 1.6 Contributor(s) + +"Contributor" means any individual or entity who contributes to the Software by submitting Contributions. This includes anyone who: -- Submits code changes or additions -- Provides documentation improvements -- Offers bug fixes or feature enhancements -- Contributes in any other substantive way to the development of the Software +**(a)** Submits code changes, additions, or deletions; -### 1.7. Contribution(s) +**(b)** Provides documentation improvements or corrections; -Any work submitted by a Contributor to the Software, such as Source Code or Assets. +**(c)** Offers bug fixes or feature enhancements; + +**(d)** Contributes Assets or other creative works; + +**(e)** Participates in any other substantive way in the development or improvement of the Software. + +### 1.7 Contribution(s) + +"Contribution" means any work of authorship submitted by a Contributor to the Software, including Source Code, Assets, documentation, or other materials. This encompasses: -- Code submissions (additions, modifications, or deletions) -- Documentation updates -- Asset contributions (e.g., new icons or graphics) -- Bug reports with proposed fixes -- Feature suggestions with implementation details +**(a)** Code submissions including additions, modifications, or deletions to existing code; -### 1.8. Source Code +**(b)** Documentation updates, corrections, or new documentation; -The code in its original form, as written by the author(s). +**(c)** Asset contributions such as new icons, graphics, or multimedia content; + +**(d)** Bug reports accompanied by proposed fixes or solutions; + +**(e)** Feature suggestions with detailed implementation proposals; + +**(f)** Translations, localisation efforts, or accessibility improvements. + +### 1.8 Source Code + +"Source Code" means the human-readable form of the Software, as originally written by the author(s), including all files necessary to understand, compile, and modify the Software. This refers to: -- Human-readable programming language files -- Configuration and build scripts -- Any other files necessary to compile or run the Software +**(a)** Human-readable programming language files in their original form; -### 1.9. Open Source +**(b)** Configuration files, build scripts, and deployment specifications; -Software where the Source Code has been made publicly available under this License. +**(c)** Documentation files that are integral to the Software's functionality; + +**(d)** Any other files necessary to compile, build, install, or run the Software; + +**(e)** Version control metadata and development history where applicable. + +### 1.9 Open Source + +"Open Source" means Software where the Source Code has been made publicly available under the terms of this Licence, adhering to the principles of transparency and collaborative development. This implies: -- The code can be viewed by anyone -- Users have the right to modify and distribute the code under the terms of this License -- The software adheres to open source principles of transparency and collaboration +**(a)** The Source Code can be viewed, studied, and examined by anyone; -### 1.10. License +**(b)** Users have the right to modify and distribute the code under the terms of this Licence; -This document. +**(c)** The Software adheres to open source principles of transparency, collaboration, and community development; + +**(d)** No restrictions are placed on the fields of endeavour in which the Software may be used, subject to the terms of this Licence. + +### 1.10 Licence + +"Licence" means this legal document, including all of its terms, conditions, and provisions. Specifically: -- The entire text of this agreement -- Any referenced attachments or appendices -- The most current version as indicated in the document +**(a)** The entire text of this agreement as it appears in its most current version; -### 1.11. Works +**(b)** Any referenced attachments, appendices, or supplementary documents; -Any works derived from the Software, such as modifications, distributions, and incorporations. +**(c)** The version of this Licence as indicated by the version control system or date stamps; + +**(d)** All amendments and modifications that may be made to this Licence in accordance with its terms. + +### 1.11 Works + +"Works" means any works derived from, incorporating, or based upon the Software, including modifications, distributions, and adaptations. This includes: -- Modified versions of the Software -- Applications or systems that incorporate the Software -- Distributions of the Software, whether modified or not -- Any product that significantly relies on or extends the functionality of the Software +**(a)** Modified versions of the Software, whether they involve minor changes or substantial alterations; -## 2. Use of Software +**(b)** Applications or systems that incorporate the Software or parts thereof; -This license grants You the right to use Our Open Source software under the following terms. +**(c)** Distributions of the Software, whether modified or in their original form; -### 2.1. Do No Harm +**(d)** Any product that significantly relies upon, extends, or builds upon the functionality of the Software; -You may not use Our Software in any way that may cause harm to Us, Our Software, or Our Assets. Additionally, You may not use Our Software in any way that may cause harm to other individuals or entities. +**(e)** Derivative works created using the Software as a foundation or component. -#### 2.1.1. Definition of Harm +## 2. PERMITTED USES OF SOFTWARE -For the purposes of this License, "harm" includes, but is not limited to: +This Licence grants You the right to use Our Open Source Software under the following terms and conditions. -- Financial loss or damage -- Violation of privacy or data protection laws -- Engagement in or facilitation of illegal activities -- Promotion or encouragement of hate speech or discrimination -- Reputational damage -- Intellectual property infringement -- Compromise of system security or integrity -- Physical or emotional harm to individuals +### 2.1 Principle of "Do No Harm" -#### 2.1.2. Specific Prohibitions +You may not use Our Software in any manner that may cause harm to Us, Our Software, Our Assets, or to other individuals, entities, or the broader community. -Without limiting the generality of the above, You are explicitly prohibited from using Our Software: +#### 2.1.1 Definition of Harm -- To conduct or facilitate fraudulent activities -- To distribute malware or engage in cyber attacks -- To harvest or collect personal data without proper consent -- To impersonate others or engage in identity theft -- To violate the terms of service of any platform or service -- To interfere with the operation of other software or networks -- To create or distribute content that is defamatory, obscene, or otherwise illegal +For the purposes of this Licence, "harm" includes, but is not limited to: -#### 2.1.3. Responsibility for Downstream Usage +**(a)** Financial loss, damage, or detriment to any party; -If You distribute or make available Our Software to others, You are responsible for ensuring that those users also adhere to the "Do No Harm" principle outlined in this License. +**(b)** Violation of privacy rights or data protection laws; -#### 2.1.4. Reporting Harmful Usage +**(c)** Engagement in, facilitation of, or promotion of illegal activities; -If You become aware of any use of Our Software that violates this "Do No Harm" principle, You are encouraged to report it to Us immediately through our forums: https://forum.nhcarrigan.com +**(d)** Promotion, encouragement, or facilitation of hate speech, discrimination, or harassment; -#### 2.1.5. Consequences of Violation +**(e)** Reputational damage or defamation; -Violation of this "Do No Harm" principle may result in immediate termination of Your rights under this License, and may subject You to legal action where applicable. +**(f)** Infringement of intellectual property rights; -#### 2.1.6. Indemnification +**(g)** Compromise of system security, integrity, or availability; -You agree to indemnify and hold Us harmless from any claims, damages, or legal actions arising from Your use of Our Software in violation of this "Do No Harm" principle. +**(h)** Physical, emotional, or psychological harm to individuals; -### 2.2. Code of Conduct +**(i)** Environmental damage or degradation; -Use of Our Software must not be in violation of Our Code of Conduct. This requirement extends to all aspects of interaction with Our Software, including but not limited to: +**(j)** Any action that undermines the principles of ethical software development and use. -#### 2.2.1. User Behavior +#### 2.1.2 Specific Prohibitions -All users of Our Software must adhere to the principles outlined in Our Code of Conduct when interacting with other users, contributors, or maintainers in any forum related to Our Software. +Without limiting the generality of the "Do No Harm" principle, You are explicitly prohibited from using Our Software: -#### 2.2.2. Content Creation +**(a)** To conduct, facilitate, or promote fraudulent activities of any kind; -Any content created using Our Software must comply with the standards set forth in Our Code of Conduct, including but not limited to avoiding hate speech, discrimination, and harassment. +**(b)** To distribute malware, viruses, or engage in cyber attacks or unauthorised intrusions; -#### 2.2.3. Project Atmosphere +**(c)** To harvest, collect, or process personal data without proper consent and legal basis; -Users who maintain projects that incorporate Our Software are responsible for fostering an inclusive and respectful environment in line with Our Code of Conduct. +**(d)** To impersonate others, engage in identity theft, or misrepresent Your identity; -#### 2.2.4. Reporting Violations +**(e)** To violate the terms of service of any platform, service, or system; -Users are encouraged to report any violations of the Code of Conduct they observe in relation to Our Software. Reports can be made through license@nhcarrigan.com +**(f)** To interfere with, disrupt, or compromise the operation of other software, networks, or systems; -#### 2.2.5. Consequences of Violation +**(g)** To create, distribute, or promote content that is defamatory, obscene, threatening, or otherwise illegal; + +**(h)** To facilitate or engage in any form of discrimination based on race, gender, religion, nationality, disability, sexual orientation, or other protected characteristics; + +**(i)** To support or promote activities that violate human rights or fundamental freedoms. + +#### 2.1.3 Responsibility for Downstream Usage + +If You distribute or make available Our Software to others, You bear responsibility for ensuring that those users are made aware of and comply with the "Do No Harm" principle outlined in this Licence. + +This responsibility includes: + +**(a)** Providing clear information about the ethical use requirements; + +**(b)** Taking reasonable measures to monitor compliance; + +**(c)** Reporting violations to Us when they become known; + +**(d)** Taking corrective action when violations are identified. + +#### 2.1.4 Reporting Harmful Usage + +If You become aware of any use of Our Software that violates the "Do No Harm" principle, You are strongly encouraged to report such usage to Us immediately through our community forums at https://forum.nhcarrigan.com or via email to legal@nhcarrigan.com. + +#### 2.1.5 Consequences of Violation + +Violation of the "Do No Harm" principle may result in: + +**(a)** Immediate termination of Your rights under this Licence; + +**(b)** Legal action seeking damages and injunctive relief where applicable; + +**(c)** Notification to relevant authorities or affected parties; + +**(d)** Public disclosure of the violation to protect the community; + +**(e)** Exclusion from future versions or distributions of the Software. + +#### 2.1.6 Indemnification + +You agree to indemnify, defend, and hold Us harmless from and against any claims, damages, losses, costs, or legal actions arising from Your use of Our Software in violation of the "Do No Harm" principle. + +### 2.2 Code of Conduct Compliance + +Your use of Our Software must comply with Our Code of Conduct at all times. This requirement extends comprehensively to all aspects of interaction with Our Software, including but not limited to: + +#### 2.2.1 User Behaviour Standards + +All users of Our Software must adhere to the principles and standards outlined in Our Code of Conduct when: + +**(a)** Interacting with other users, Contributors, or maintainers in any forum related to Our Software; + +**(b)** Participating in discussions, providing feedback, or seeking support; + +**(c)** Contributing to the development or improvement of the Software; + +**(d)** Representing themselves as users of Our Software in professional or community contexts. + +#### 2.2.2 Content Creation Standards + +Any content created using Our Software must comply with the standards set forth in Our Code of Conduct, including: + +**(a)** Avoiding hate speech, discrimination, harassment, or threatening language; + +**(b)** Respecting the dignity and rights of all individuals; + +**(c)** Promoting inclusive and respectful communication; + +**(d)** Adhering to professional and ethical standards appropriate to the context. + +#### 2.2.3 Project Atmosphere Responsibility + +Users who maintain projects that incorporate Our Software are responsible for: + +**(a)** Fostering an inclusive and respectful environment in line with Our Code of Conduct; + +**(b)** Implementing and enforcing appropriate community guidelines; + +**(c)** Addressing violations promptly and fairly; + +**(d)** Setting a positive example for community interaction. + +#### 2.2.4 Reporting Violations + +Users are encouraged to report any violations of the Code of Conduct they observe in relation to Our Software. Reports should be made through: + +**(a)** Our primary contact: conduct@nhcarrigan.com; + +**(b)** Our community reporting mechanisms; + +**(c)** Direct communication with appropriate moderators or administrators. + +#### 2.2.5 Consequences of Code of Conduct Violations Violations of Our Code of Conduct may result in: -- Warnings -- Temporary suspension of access to Our Software or related communities -- Permanent ban from using Our Software or participating in related communities -- Revocation of this License +**(a)** Formal warnings and educational guidance; -#### 2.2.6. Enforcement +**(b)** Temporary suspension of access to Our Software or related communities; -We reserve the right to enforce the Code of Conduct at Our discretion. Enforcement actions will be proportional to the severity and frequency of the violations. +**(c)** Permanent exclusion from using Our Software or participating in related communities; -#### 2.2.7. Updates to Code of Conduct +**(d)** Revocation of this Licence; -Users are responsible for staying informed about any updates to Our Code of Conduct. +**(e)** Reporting to relevant authorities where violations involve illegal activity. -### 2.3. Source Control +#### 2.2.6 Enforcement -Custom instances of Our Software must remain Open Source under this License. This requirement ensures transparency, promotes collaboration, and maintains the integrity of Our Software ecosystem. +We reserve the right to enforce the Code of Conduct at Our sole discretion. Enforcement actions will be: -#### 2.3.1. Definition of Custom Instances +**(a)** Proportional to the severity and frequency of violations; -For the purposes of this License, "custom instances" refer to any modified, adapted, or derivative versions of Our Software created by You or any third party. +**(b)** Consistent with Our published enforcement guidelines; -#### 2.3.2. Open Source Requirement +**(c)** Applied fairly and without discrimination; + +**(d)** Subject to appeal through Our established processes. + +#### 2.2.7 Updates to Code of Conduct + +You are responsible for staying informed about any updates to Our Code of Conduct. Continued use of the Software after updates constitutes acceptance of the revised standards. + +### 2.3 Source Control Requirements + +All custom instances of Our Software must remain Open Source under the terms of this Licence. This requirement ensures transparency, promotes collaboration, and maintains the integrity of Our Software ecosystem. + +#### 2.3.1 Definition of Custom Instances + +"Custom instances" refer to any modified, adapted, derivative, or customised versions of Our Software created by You or any third party, including: + +**(a)** Modified versions with altered functionality or features; + +**(b)** Adaptations for specific platforms, environments, or use cases; + +**(c)** Integrations with other software systems or frameworks; + +**(d)** Localised or translated versions of the Software. + +#### 2.3.2 Open Source Requirement All custom instances of Our Software must: -- Be made available to the public in source code form -- Be licensed under the terms of this License -- Include a copy of this License with the source code +**(a)** Be made publicly available in source code form; -#### 2.3.3. Source Code Availability +**(b)** Be licensed under the terms of this Licence or a compatible licence; + +**(c)** Include a complete copy of this Licence with the source code; + +**(d)** Maintain all original copyright notices and attributions. + +#### 2.3.3 Source Code Availability The source code for custom instances must be: -- Hosted in a publicly accessible repository (e.g., GitHub, GitLab, CodeBerg) -- Made available free of charge -- Kept up-to-date with any changes or modifications +**(a)** Hosted in a publicly accessible repository (such as GitHub, GitLab, or Codeberg); -#### 2.3.4. Documentation of Changes +**(b)** Made available free of charge to any interested party; + +**(c)** Kept current and up-to-date with any changes or modifications; + +**(d)** Accessible without requiring registration, payment, or special permissions. + +#### 2.3.4 Documentation of Modifications For any custom instance, You must: -- Clearly document all modifications made to Our Software -- Provide a changelog detailing the nature and date of each significant change -- Identify the original source of Our Software and acknowledge Our copyright +**(a)** Clearly document all modifications made to Our original Software; -#### 2.3.5. Forking and Branching +**(b)** Provide a comprehensive changelog detailing the nature and date of each significant change; + +**(c)** Identify the original source of Our Software and acknowledge Our copyright; + +**(d)** Distinguish Your modifications from the original Software. + +#### 2.3.5 Forking and Branching When creating custom instances through forking or branching: -- The fork or branch must be public and accessible -- The relationship to Our original Software must be clearly stated -- Any significant divergence from Our Software should be clearly communicated +**(a)** The fork or branch must be publicly accessible; -#### 2.3.6. Contributions Back to Original Software +**(b)** The relationship to Our original Software must be clearly stated and prominently displayed; -While not required, You are encouraged to contribute improvements and bug fixes back to Our original Software through pull requests or other appropriate means. +**(c)** Any significant divergence from Our Software should be clearly communicated to users; -#### 2.3.7. Exceptions +**(d)** Attribution to the original Software must be maintained. -Any exceptions to these Source Control requirements must be explicitly granted by Us in writing. +#### 2.3.6 Contributions to Original Software -#### 2.3.8. Compliance Verification +Whilst not required, You are strongly encouraged to contribute improvements and bug fixes back to Our original Software through: -We reserve the right to verify compliance with these Source Control requirements at any time. Upon request, You must provide Us with access to the source code and documentation for any custom instance of Our Software. +**(a)** Pull requests or merge requests to Our official repository; -#### 2.3.9. Consequences of Non-Compliance +**(b)** Submission of patches or code contributions; -Failure to comply with these Source Control requirements may result in: +**(c)** Sharing of improvements with the broader community; -- Termination of Your rights under this License -- A requirement to immediately cease distribution of the non-compliant custom instance -- Legal action to enforce compliance +**(d)** Participation in collaborative development processes. -## 3. Modification of Software +#### 2.3.7 Exceptions -Modifications of Our Software are permitted under the following terms. +Any exceptions to these Source Control requirements must be: -### 3.1. Licensing +**(a)** Explicitly requested in writing; -All modifications of Our Software must be licensed under this License. This ensures consistency in the licensing terms across all versions and derivatives of Our Software. +**(b)** Granted by Us in a formal written agreement; -#### 3.1.1. Definition of Modifications +**(c)** Limited in scope and duration; -For the purposes of this License, "modifications" include, but are not limited to: +**(d)** Subject to periodic review and renewal. -- Any changes to the source code of Our Software -- Additions to or deletions from Our Software's functionality -- Alterations to Our Software's user interface -- Translations of Our Software into other languages -- Adaptations of Our Software for different platforms or environments +#### 2.3.8 Compliance Verification -#### 3.1.2. Scope of Licensing Requirement +We reserve the right to verify compliance with these Source Control requirements at any time by: -The requirement to license modifications under this License applies to: +**(a)** Requesting access to source code and documentation; -- All modified components of Our Software -- Any new components that are integral to the functioning of the modified version -- Documentation related to the modifications +**(b)** Conducting audits of publicly available repositories; -#### 3.1.3. Inclusion of License +**(c)** Investigating reports of non-compliance; + +**(d)** Requiring certification of compliance. + +#### 2.3.9 Consequences of Non-Compliance + +Failure to comply with Source Control requirements may result in: + +**(a)** Immediate termination of Your rights under this Licence; + +**(b)** A legal requirement to cease distribution of the non-compliant custom instance; + +**(c)** Legal action to enforce compliance and seek damages; + +**(d)** Public notice of non-compliance to protect the community. + +## 3. MODIFICATION OF SOFTWARE + +Modifications of Our Software are permitted under the following terms and conditions. + +### 3.1 Licensing Requirements + +All modifications of Our Software must be licensed under this Licence to ensure consistency in licensing terms across all versions and derivatives of Our Software. + +#### 3.1.1 Definition of Modifications + +"Modifications" include, but are not limited to: + +**(a)** Any changes to the source code of Our Software, including additions, deletions, or alterations; + +**(b)** Enhancements or extensions to the Software's functionality; + +**(c)** Alterations to the Software's user interface or user experience; + +**(d)** Translations of the Software into other languages; + +**(e)** Adaptations of the Software for different platforms, operating systems, or environments; + +**(f)** Integration of the Software with other systems or applications; + +**(g)** Performance optimisations or bug fixes. + +#### 3.1.2 Scope of Licensing Requirement + +The requirement to license modifications under this Licence applies to: + +**(a)** All modified components of Our original Software; + +**(b)** Any new components that are integral to the functioning of the modified version; + +**(c)** Documentation related to the modifications; + +**(d)** Configuration files and build scripts for the modified version. + +#### 3.1.3 Licence Inclusion When distributing modifications of Our Software, You must: -- Include a complete copy of this License with the distribution -- Retain all copyright, patent, trademark, and attribution notices from the original Software -- State clearly that the Software has been modified and provide a brief description of the modifications +**(a)** Include a complete and unaltered copy of this Licence with every distribution; -#### 3.1.4. Nomenclature and Branding +**(b)** Retain all copyright, patent, trademark, and attribution notices from the original Software; + +**(c)** Clearly state that the Software has been modified and provide a summary of the modifications; + +**(d)** Include information about how to obtain the original, unmodified version of the Software. + +#### 3.1.4 Nomenclature and Branding Modified versions of Our Software: -- Must be clearly distinguished from the original Software in name and branding -- May not use Our trademarks or logos without Our explicit permission -- Should include a statement that they are derived from Our Software, with a link to the original Software's repository +**(a)** Must be clearly distinguished from the original Software in name and branding; -#### 3.1.5. Compatibility with Original License +**(b)** May not use Our trademarks, logos, or service marks without Our explicit written permission; + +**(c)** Should include a clear statement that they are derived from Our Software; + +**(d)** Must provide a link to the original Software's repository or official website. + +#### 3.1.5 Compatibility with Original Licence Any additional terms You wish to apply to Your modifications: -- Must not conflict with the terms of this License -- Must be clearly stated as applying only to Your modifications -- May not alter or restrict the terms of this License as they apply to the original Software +**(a)** Must not conflict with or override the terms of this Licence; -#### 3.1.6. Contributions and Sublicensing +**(b)** Must be clearly stated as applying only to Your specific modifications; -By applying this License to modifications of Our Software: +**(c)** May not alter or restrict the terms of this Licence as they apply to the original Software; -- You grant Us and all recipients of the modified Software the same rights and obligations as outlined in this License -- You may not sublicense the modifications under any other terms +**(d)** Must be legally compatible with the terms of this Licence. -#### 3.1.7. Notification of Significant Modifications +#### 3.1.6 Grant of Rights -For significant modifications that substantially alter the functionality or purpose of Our Software, You are encouraged to: +By applying this Licence to modifications of Our Software: -- Notify Us of the nature and extent of the modifications -- Consider submitting the modifications as contributions to the original Software +**(a)** You grant Us and all recipients of the modified Software the same rights and obligations as outlined in this Licence; -#### 3.1.8. Compliance and Enforcement +**(b)** You may not sublicense the modifications under any other terms; + +**(c)** You agree to the same obligations and restrictions as apply to the original Software. + +#### 3.1.7 Notification of Significant Modifications + +For significant modifications that substantially alter the functionality, purpose, or architecture of Our Software, You are encouraged to: + +**(a)** Notify Us of the nature and extent of the modifications; + +**(b)** Consider submitting the modifications as Contributions to the original Software; + +**(c)** Engage with the community to discuss the implications of the modifications; + +**(d)** Provide comprehensive documentation of the changes. + +#### 3.1.8 Compliance and Enforcement We reserve the right to: -- Verify compliance with these licensing requirements -- Request access to the source code of any modified versions of Our Software -- Take appropriate action, including legal measures, to enforce these licensing terms +**(a)** Verify compliance with these licensing requirements at any time; -## 4. Incorporation of Software +**(b)** Request access to the source code of any modified versions of Our Software; -Elements of Our Software, such as code snippets, may be incorporated into other Works under the following terms. +**(c)** Take appropriate legal action to enforce these licensing terms; -### 4.1. Licensing +**(d)** Revoke the Licence for non-compliant modifications. -The specific elements of Our Software used in another Work must be made available under this License. The portions of the project that are not incorporated from Our Software may be licensed under any terms. This approach allows for flexibility in incorporating Our Software into larger projects while maintaining the integrity of Our licensing terms. +## 4. INCORPORATION OF SOFTWARE -#### 4.1.1. Definition of Incorporation +Elements of Our Software, such as code snippets, modules, or components, may be incorporated into other Works under the following terms. -For the purposes of this License, "incorporation" refers to: +### 4.1 Licensing Requirements for Incorporation -- Direct inclusion of Our Software's code in another Work -- Adaptation of Our Software's code for use in another Work +The specific elements of Our Software incorporated into another Work must be made available under this Licence. The portions of the project that do not incorporate elements from Our Software may be licensed under any terms of Your choosing, provided they do not conflict with this Licence. -#### 4.1.2. Scope of License Application +#### 4.1.1 Definition of Incorporation -The terms of this License apply specifically to: +"Incorporation" refers to: -- Any code, functions, or modules directly copied from Our Software -- Any derivatives or modifications of Our Software's code -- Any part of Our Software that is essential to the functioning of the incorporated elements +**(a)** Direct inclusion of Our Software's code, functions, or modules in another Work; -#### 4.1.3. Dual Licensing +**(b)** Adaptation or modification of Our Software's code for use in another Work; + +**(c)** Integration of Our Software's functionality into a larger application or system; + +**(d)** Use of Our Software's algorithms, designs, or architectural patterns in another Work. + +#### 4.1.2 Scope of Licence Application + +The terms of this Licence apply specifically to: + +**(a)** Any code, functions, modules, or components directly copied from Our Software; + +**(b)** Any derivatives, adaptations, or modifications of Our Software's code; + +**(c)** Any interfaces or APIs that directly interact with incorporated elements; + +**(d)** Documentation specifically related to the incorporated elements. + +#### 4.1.3 Dual Licensing Framework In cases where Our Software is incorporated into a larger Work: -- The incorporated elements must be clearly identified -- These elements must be made available under the terms of this License -- The remainder of the Work may be licensed under different terms, provided they do not conflict with this License +**(a)** The incorporated elements must be clearly identified and documented; -#### 4.1.4. License Compatibility +**(b)** These elements must be made available under the terms of this Licence; -When incorporating Our Software into a Work with a different license: +**(c)** The remainder of the Work may be licensed under different terms, provided they do not restrict or interfere with the rights granted by this Licence; -- You must ensure that the terms of the other license do not restrict or interfere with the terms of this License as it applies to Our Software -- If conflicts arise, the terms of this License take precedence for the incorporated elements +**(d)** Users must be clearly informed about which portions are subject to different licensing terms. -#### 4.1.5. Notification of Incorporation +#### 4.1.4 Licence Compatibility -When incorporating Our Software into another Work, You should: +When incorporating Our Software into a Work with a different licence: -- Clearly indicate which parts of the Work are derived from or incorporate Our Software -- Provide a copy of this License or a link to it -- Explain how users can obtain the source code for the incorporated elements under the terms of this License +**(a)** You must ensure that the terms of the other licence do not restrict, contradict, or interfere with the terms of this Licence as they apply to Our Software; -#### 4.1.6. Distribution of Incorporated Elements +**(b)** If conflicts arise between licensing terms, the terms of this Licence shall take precedence for the incorporated elements; + +**(c)** You must clearly document any potential conflicts and how they are resolved; + +**(d)** Users must be informed of their rights and obligations under both licensing regimes. + +#### 4.1.5 Notification and Attribution for Incorporation + +When incorporating Our Software into another Work, You must: + +**(a)** Clearly indicate which parts of the Work are derived from or incorporate Our Software; + +**(b)** Provide a copy of this Licence or a direct link to the current version; + +**(c)** Explain how users can obtain the source code for the incorporated elements; + +**(d)** Provide appropriate attribution as specified in Section 7 of this Licence. + +#### 4.1.6 Distribution Requirements When distributing a Work that incorporates Our Software: -- You must make the source code of the incorporated elements available under this License -- You may choose how to make the rest of the Work's source code available, if at all +**(a)** You must make the source code of the incorporated elements available under this Licence; -#### 4.1.7. Attribution for Incorporated Elements +**(b)** The source code must be easily accessible and prominently linked; -You must provide proper attribution for the incorporated elements as outlined in section 7 of this License. +**(c)** You may distribute the remainder of the Work's source code under different terms or not at all; -#### 4.1.8. Modifications to Incorporated Elements +**(d)** All distribution must comply with the requirements of this Licence regarding the incorporated elements. -Any modifications to the elements incorporated from Our Software: +#### 4.1.7 Modifications to Incorporated Elements -- Must also be made available under this License -- Should be clearly documented and distinguished from the original incorporated elements +Any modifications made to the elements incorporated from Our Software: -#### 4.1.9. Responsibility for License Compliance +**(a)** Must also be made available under the terms of this Licence; -You are responsible for ensuring that the incorporation of Our Software and the licensing of the resulting Work comply with all applicable license terms, including this License. +**(b)** Should be clearly documented and distinguished from the original incorporated elements; -## 5. Use of Packages +**(c)** Must maintain all original copyright notices and attributions; -Certain Software may be packaged and distributed specifically for use in other Works. Software that We distribute in such a manner may be used in other Works under the following terms. +**(d)** Must be made available in source code form with the same accessibility as the original elements. -### 5.1. Source Code +#### 4.1.8 Ongoing Compliance Responsibility -Works that solely use Our Packages, and do not incorporate any other elements of Our Software, are not required to provide a link to the Source Code of Our Software. This provision aims to simplify the use of Our Packages in other projects. +You remain responsible for ensuring that: -#### 5.1.1. Definition of "Solely Using Our Packages" +**(a)** The incorporation of Our Software and the licensing of the resulting Work comply with all applicable licence terms; -For the purposes of this License, "solely using Our Packages" means: +**(b)** Updates or modifications to the incorporated elements maintain compliance; -- Utilizing Our Packages as dependencies or modules in Your Work -- Not modifying the internal code of Our Packages -- Not incorporating any other parts of Our Software beyond the Packages +**(c)** Users of the Work understand their rights and obligations; -#### 5.1.2. Scope of Exemption +**(d)** Any conflicts between different licence terms are properly resolved and documented. + +## 5. USE OF PACKAGES + +Certain Software may be packaged and distributed specifically for use as dependencies or components in other Works. Such Packages may be used under the following terms. + +### 5.1 Source Code Requirements + +Works that solely use Our Packages as dependencies, without incorporating any other elements of Our Software, are not required to provide a link to Our Software's Source Code. This provision aims to simplify the use of Our Packages in other projects whilst maintaining the essential protections of this Licence. + +#### 5.1.1 Definition of "Solely Using Our Packages" + +"Solely using Our Packages" means: + +**(a)** Utilising Our Packages as dependencies, modules, or libraries in Your Work through standard package management or import mechanisms; + +**(b)** Not modifying the internal code or functionality of Our Packages; + +**(c)** Not incorporating any other parts of Our Software beyond the specific Packages; + +**(d)** Using the Packages only through their intended public interfaces and APIs. + +#### 5.1.2 Scope of Source Code Exemption This exemption from providing a link to Our Source Code: -- Applies only to Works that use Our Packages as-is -- Does not extend to any modifications or derivatives of Our Packages +**(a)** Applies only to Works that use Our Packages in their unmodified form; -#### 5.1.3. Recommended Practice +**(b)** Does not extend to any modifications, derivatives, or customisations of Our Packages; -While not required, We encourage You to: +**(c)** Does not exempt You from other obligations under this Licence; -- Mention the use of Our Packages in Your documentation -- Provide a link to Our Packages' documentation or repository for reference +**(d)** May be revoked if the Packages are used in ways not contemplated by this section. -#### 5.1.4. Responsibility for Updates +#### 5.1.3 Recommended Best Practices -You are responsible for: +Whilst not required, We encourage You to: -- Keeping Our Packages updated in Your Work -- Addressing any security issues that may arise from using Our Packages +**(a)** Acknowledge the use of Our Packages in Your documentation or credits; -#### 5.1.5. No Implication of Endorsement +**(b)** Provide a link to Our Packages' documentation or repository for reference; -The use of Our Packages does not imply Our endorsement of Your Work. You must not claim or imply such endorsement without Our explicit permission. +**(c)** Keep the Packages updated to the latest stable versions; -## 6. Distribution +**(d)** Report any bugs or issues You encounter to help improve the Packages. -Our Software, as well as any Works derived from Our Software, may be distributed under the following terms. +#### 5.1.4 Responsibility for Package Management -### 6.1. Source Code +When using Our Packages, You are responsible for: -Any Works that are publicly hosted must link to: +**(a)** Ensuring compatibility with Your Work and other dependencies; -- The Source Code for the Work, if the Work falls under Section 2. -- The Source Code for incorporations of or modifications to Our Software, if the Work falls under Sections 3 or 4. +**(b)** Managing updates and version control for the Packages; -#### 6.1.1. Definition of "Publicly Hosted" +**(c)** Addressing any security issues that may arise from using outdated versions; -For the purposes of this License, "publicly hosted" means: +**(d)** Complying with any additional requirements specific to individual Packages. -- Available for use, download, or access by the general public -- Distributed through any public platform, including but not limited to websites, app stores, or code repositories -- Shared with any third parties outside of Your organization +#### 5.1.5 No Implied Endorsement -#### 6.1.2. Source Code Availability Requirements +The use of Our Packages in Your Work does not imply Our endorsement, approval, or recommendation of Your Work. You must not claim or suggest such endorsement without Our explicit written permission. + +## 6. DISTRIBUTION REQUIREMENTS + +Our Software, as well as any Works derived from Our Software, may be distributed under the following terms and conditions. + +### 6.1 Source Code Availability Requirements + +Any Works that are publicly hosted or distributed must provide appropriate access to Source Code as specified below. + +#### 6.1.1 Definition of "Publicly Hosted" + +"Publicly hosted" means: + +**(a)** Available for use, download, or access by members of the general public; + +**(b)** Distributed through any public platform, including but not limited to websites, application stores, software repositories, or distribution networks; + +**(c)** Shared with any third parties outside of Your immediate organisation or development team; + +**(d)** Made available through any means that allows access by persons other than the original developers. + +#### 6.1.2 Source Code Requirements by Category + +The Source Code availability requirements depend on the category of Work: + +**(a)** **Works under Section 2 (Custom Instances):** Must link to the complete Source Code for the entire Work; + +**(b)** **Works under Section 3 (Modifications):** Must link to the Source Code for all modifications and the original Software; + +**(c)** **Works under Section 4 (Incorporations):** Must link to the Source Code for incorporated elements and any modifications thereof; + +**(d)** **Works under Section 5 (Package Usage):** No Source Code linking requirement for the Work itself, but Package source must remain available. + +#### 6.1.3 Source Code Accessibility Standards The Source Code must be: -- Easily accessible through a prominent link -- Available without requiring payment or registration -- Complete and sufficient to build and run the Work -- Provided in a format commonly used for software development +**(a)** Easily accessible through a prominent, clearly labelled link or reference; -#### 6.1.3. Linking Requirements +**(b)** Available without requiring payment, registration, or special permissions; -The link to the Source Code must be: +**(c)** Complete and sufficient to understand, build, and run the relevant portions of the Work; -- Clearly visible and easily discoverable -- Included in the Work's documentation, README file, or equivalent -- Present on any website or platform where the Work is distributed -- Functional and directly leading to the Source Code +**(d)** Provided in a format commonly used for software development and collaboration; -#### 6.1.4. Version Correspondence +**(e)** Hosted on a reliable platform with reasonable uptime guarantees. + +#### 6.1.4 Linking and Reference Requirements + +The link or reference to the Source Code must be: + +**(a)** Prominently displayed and easily discoverable by users; + +**(b)** Included in the Work's primary documentation, README file, or equivalent; + +**(c)** Present on any website, platform, or location where the Work is distributed or promoted; + +**(d)** Functional and leading directly to the complete Source Code; + +**(e)** Maintained and updated to reflect the current version of the Work. + +#### 6.1.5 Version Correspondence The linked Source Code must: -- Correspond exactly to the distributed version of the Work -- Be updated promptly with each new release or significant update +**(a)** Correspond exactly to the distributed version of the Work; -#### 6.1.5. Hosting and Maintenance +**(b)** Be updated promptly and synchronously with each new release or significant update; + +**(c)** Include appropriate version tags, branches, or commit references; + +**(d)** Provide clear documentation of which Source Code version corresponds to which distributed version. + +#### 6.1.6 Hosting and Maintenance Responsibilities You are responsible for: -- Ensuring the continuous availability of the linked Source Code -- Maintaining the integrity and security of the hosting platform -- Providing an alternative means of accessing the Source Code if the primary link becomes unavailable +**(a)** Ensuring the continuous availability and accessibility of the linked Source Code; -#### 6.1.6. License Inclusion +**(b)** Maintaining the integrity, security, and reliability of the hosting platform; -The Source Code repository must include: +**(c)** Providing alternative means of accessing the Source Code if the primary link becomes unavailable; -- A copy of this License -- Clear instructions on how to obtain and use the Source Code +**(d)** Responding promptly to reports of inaccessible or broken links. -#### 6.1.7. Modifications and Incorporations +#### 6.1.7 Licence and Documentation Inclusion + +The Source Code repository or location must include: + +**(a)** A complete copy of this Licence in its most current version; + +**(b)** Clear instructions on how to obtain, build, and use the Source Code; + +**(c)** Appropriate attribution and copyright notices; + +**(d)** Documentation of any dependencies, requirements, or special build instructions. + +#### 6.1.8 Modifications and Incorporations Documentation For Works falling under Sections 3 or 4: -- Clearly indicate which parts are derived from or incorporate Our Software -- Provide separate links to the Source Code of Our original Software and Your modifications, if applicable +**(a)** Clearly indicate and document which parts are derived from or incorporate Our Software; -#### 6.1.8. Exceptions +**(b)** Provide separate links or clear references to the Source Code of Our original Software; + +**(c)** Document the nature and extent of any modifications made; + +**(d)** Explain the relationship between the modified Work and the original Software. + +#### 6.1.9 Exceptions and Special Circumstances Exemptions from these Source Code linking requirements: -- Must be explicitly granted by Us in writing -- Will be considered on a case-by-case basis -- Do not exempt You from other terms of this License +**(a)** Must be explicitly requested in writing with detailed justification; -#### 6.1.9. Consequences of Non-Compliance +**(b)** Will be considered on a case-by-case basis at Our sole discretion; -Failure to comply with these Source Code linking requirements may result in: +**(c)** Do not exempt You from other terms and obligations of this Licence; -- Revocation of Your rights under this License -- A requirement to immediately cease distribution of the Work -- Legal action to enforce compliance +**(d)** May be subject to alternative arrangements or additional conditions. -## 7. Attribution +#### 6.1.10 Consequences of Non-Compliance -All modifications of Our Software must be attributed to the original author(s) of the Software. This requirement ensures proper recognition of the original creators and maintains transparency about the software's lineage. +Failure to comply with Source Code availability requirements may result in: + +**(a)** Immediate revocation of Your rights under this Licence; + +**(b)** A legal requirement to cease distribution of the non-compliant Work; + +**(c)** Legal action to enforce compliance and seek appropriate remedies; + +**(d)** Public notice of non-compliance to inform the community and protect Our rights. + +## 7. ATTRIBUTION REQUIREMENTS + +All modifications and derivative works of Our Software must provide appropriate attribution to the original author(s) of the Software. This requirement ensures proper recognition of creators and maintains transparency about the Software's lineage and development history. ### 7.1 Required Attribution Elements -When distributing modifications of Our Software, You must include the following attribution elements: +When distributing modifications or derivative works of Our Software, You must include the following attribution elements: -- The name(s) of the original author(s) or organization(s) -- The title of the original Software -- A link to the original Software's repository or website -- The copyright notice associated with the original Software +**(a)** The full name(s) of the original author(s) or organisation(s); -### 7.2. Placement of Attribution +**(b)** The complete title of the original Software; -The attribution must be prominently displayed in: +**(c)** A direct link to the original Software's repository, website, or official distribution location; -- The source code of the modified Software -- Any documentation accompanying the modified Software -- The user interface, if applicable and reasonable +**(d)** The copyright notice associated with the original Software; -### 7.3. Format of Attribution +**(e)** A clear statement that the Work is derived from or incorporates Our Software. -The attribution should be presented in a clear and readable format. For example: +### 7.2 Placement and Visibility of Attribution -```md -This software is a modification of [Original Software Name] by Naomi Carrigan. +The attribution must be prominently displayed and easily accessible in: + +**(a)** The source code of the modified or derivative Software; + +**(b)** All documentation accompanying the modified Software; + +**(c)** The user interface of the Software, where applicable and reasonable to do so; + +**(d)** Any promotional materials, websites, or descriptions of the derivative Work; + +**(e)** Distribution packages, installation files, and software repositories. + +### 7.3 Format and Presentation of Attribution + +The attribution should be presented in a clear, readable, and professional format. A recommended format is: + +``` +This software is based upon [Original Software Name] by Naomi Carrigan. Original software: [Link to original repository] -Copyright (c) 2024 Naomi Carrigan +Copyright © [Year] NHCarrigan + +Modifications made by [Your Name/Organisation]: +- [Brief description of modifications] +- [Additional modifications as applicable] ``` -### 7.4. Attribution in Derivative Works +### 7.4 Attribution in Derivative Works -If Your modifications result in a substantially different Work: +When Your modifications result in a substantially different Work: -- You must still provide attribution to the original Software -- You may add Your own copyright notice alongside the original attribution -- You should clearly indicate which parts are Your modifications +**(a)** You must still provide complete attribution to the original Software; -### 7.5. Prohibition on Misattribution +**(b)** You may add Your own copyright notice alongside, but not in place of, the original attribution; -You must not: +**(c)** You should clearly indicate which parts represent Your modifications or additions; -- Misrepresent the origin of the Software -- Imply endorsement by the original authors without explicit permission -- Remove or alter any existing attribution in the original Software +**(d)** The relationship to the original Software must remain clear and unambiguous. -### 7.6. Attribution in Binary Distributions +### 7.5 Prohibition on Misattribution -If You distribute only binary versions of the modified Software: +You must not engage in any form of misattribution, including: -- The attribution must be included in accompanying documentation -- You must provide a means for users to view the full attribution and license +**(a)** Misrepresenting or obscuring the origin or authorship of the original Software; -### 7.7 Attribution in Larger Works +**(b)** Implying endorsement, approval, or sponsorship by the original authors without explicit permission; -If You include the modified Software as part of a larger work: +**(c)** Removing, altering, or obscuring any existing attribution in the original Software; -- The attribution for Our Software must be clearly distinguishable -- You must not imply that the entire work is governed by this License +**(d)** Claiming original authorship of code or content that derives from Our Software. -### 7.8. Updates to Attribution +### 7.6 Attribution in Binary Distributions -You are responsible for keeping the attribution up-to-date if: +When You distribute only compiled binaries or executable versions of modified Software: -- The original Software updates its attribution requirements -- You incorporate additional third-party components that require attribution +**(a)** The attribution must be included in all accompanying documentation and materials; -### 7.9. Waiver of Attribution +**(b)** You must provide a readily accessible means for users to view the complete attribution and licence information; -Any waiver of these attribution requirements must be explicitly granted by Us in writing. +**(c)** Attribution information should be accessible through standard software information dialogues or help systems; -## 8. Downstream Behaviour +**(d)** Installation packages must include attribution information in a prominent location. -Works that use or modify our Software or Packages are still required to follow our Code of Conduct. This ensures that all projects associated with Our Software maintain ethical standards and foster a positive community. +### 7.7 Attribution in Larger Works and Collections -### 8.1. Scope of Code of Conduct Application +When You include modified Software as part of a larger work or software collection: -The Code of Conduct applies to: +**(a)** The attribution for Our Software must be clearly distinguishable from attributions for other components; -- The development process of Works using Our Packages -- Any community interactions related to the use of Our Packages -- Support forums, issue trackers, or other platforms where Our Packages are discussed in relation to Your Work +**(b)** You must not imply that the entire work or collection is governed solely by this Licence; -### 8.2. Responsibility for Enforcement +**(c)** Each component's attribution and licensing information must be clearly separated and identified; + +**(d)** Users must be able to easily identify which parts are subject to this Licence. + +### 7.8 Updates and Maintenance of Attribution You are responsible for: -- Ensuring that contributors to Your Work are aware of and adhere to Our Code of Conduct -- Enforcing the Code of Conduct in Your project's community spaces -- Addressing violations of the Code of Conduct promptly and appropriately +**(a)** Keeping attribution information current and accurate; -### 8.3. Reporting Violations +**(b)** Updating attribution if the original Software changes its attribution requirements; -If You encounter violations of the Code of Conduct related to the use of Our Packages: +**(c)** Adding appropriate attribution when incorporating additional third-party components; -- You should address them within Your project's scope if they occur in Your community spaces -- You may report serious or persistent violations to Us for further action +**(d)** Correcting any errors in attribution information when they are identified. -### 8.4. Consequences of Non-Compliance +### 7.9 Waiver and Modification of Attribution -Failure to adhere to the Code of Conduct may result in: +Any waiver or modification of these attribution requirements: -- Revocation of Your right to use Our Packages -- Disassociation of Your Work from Our Software ecosystem -- Public notice of non-compliance, if deemed necessary +**(a)** Must be explicitly granted by Us in writing; -### 8.5. Modifications to the Code of Conduct +**(b)** Will be considered on a case-by-case basis; -We reserve the right to update Our Code of Conduct. You are responsible for: +**(c)** Does not affect other obligations under this Licence; -- Staying informed about any changes to the Code of Conduct -- Implementing updated versions of the Code of Conduct in a timely manner +**(d)** May be subject to specific conditions or limitations. -### 8.6. Extending the Code of Conduct +## 8. DOWNSTREAM BEHAVIOUR AND CONDUCT -You may extend or adapt the Code of Conduct for Your specific project needs, provided that: +All Works that use or modify Our Software or Packages must adhere to Our Code of Conduct. This requirement ensures that all projects associated with Our Software maintain ethical standards and foster positive, inclusive communities. -- Your modifications do not weaken or contradict Our original Code of Conduct -- You clearly indicate which parts are Your extensions +### 8.1 Scope of Code of Conduct Application -## 9. Assets +Our Code of Conduct applies to: -Any non-Software Asset, unless specifically provided with the Source Code of Our Software, may not be used in any Modifications, Incorporations, or Distributions of Our Software. +**(a)** The development process and community interactions for Works using Our Software or Packages; -Assets specifically belong to Us, and the License does not grant any rights to reuse, modification, or distribution of Assets. -Prior versions of Our Software may have included Assets which were removed in a later version. The removal of an Asset from Our Source Code constitutes a revocation of the rights to use said Asset. +**(b)** Any community forums, discussions, or platforms where Our Software is discussed in relation to Your Work; -### 9.1 Definition of Assets +**(c)** Support channels, issue trackers, or communication platforms related to derivative works; -For the purposes of this License, "Assets" include, but are not limited to: +**(d)** Professional representation and conduct when publicly associated with Our Software. -- Images, icons, and graphics -- Audio files and sound effects -- Video content -- Fonts and typefaces -- Logos and branding materials -- Text content and documentation not integral to the Software's functionality -- Data files and databases +### 8.2 Responsibility for Enforcement -### 9.2 Ownership and Rights +As a user of Our Software, You are responsible for: -- We retain full ownership and all rights to all Assets associated with Our Software. -- The License granted for the Software does not extend to any Assets unless explicitly stated. +**(a)** Ensuring that all contributors to Your Work are aware of and agree to adhere to Our Code of Conduct; -### 9.3 Prohibited Uses +**(b)** Actively enforcing the Code of Conduct within Your project's community spaces and interactions; -You may not: +**(c)** Addressing violations promptly, fairly, and in accordance with established procedures; -- Use Our Assets in any Modifications of Our Software -- Incorporate Our Assets into other Works -- Distribute Our Assets separately from or alongside Our Software -- Alter, manipulate, or create derivative works of Our Assets +**(d)** Creating and maintaining a positive, inclusive environment that reflects the values of Our Code of Conduct. -### 9.4 Exceptions +### 8.3 Reporting and Addressing Violations -- Assets that are explicitly marked as freely usable or provided under a separate license within Our Source Code may be used according to the terms specified for those specific Assets. -- Any exceptions must be granted by Us in writing and will be considered on a case-by-case basis. +When You encounter violations of the Code of Conduct: -### 9.5 Removal and Revocation +**(a)** Address them appropriately within Your project's scope if they occur in spaces You control; -- We reserve the right to remove any Asset from Our Software at any time. -- The removal of an Asset from Our Source Code immediately revokes any previous rights or permissions to use that Asset, even if it was present in earlier versions of the Software. +**(b)** Report serious, persistent, or egregious violations to Us for investigation and potential action; -### 9.5.3 Upon removal of an Asset, You must: +**(c)** Cooperate with Our investigations and enforcement efforts; -- Cease all use of the removed Asset -- Remove the Asset from any Modifications or Distributions of Our Software -- Ensure that the Asset is not used in any future versions or forks of Our Software under Your control +**(d)** Take corrective measures to prevent recurrence of violations. -### 9.6 Responsibility +### 8.4 Consequences of Non-Compliance -- You are responsible for ensuring that You do not use, modify, or distribute Our Assets in violation of these terms. -- You agree to indemnify and hold Us harmless from any claims arising from Your unauthorized use of Our Assets. +Failure to adhere to Our Code of Conduct may result in: -### 9.7 Reporting Violations +**(a)** Revocation of Your right to use Our Software or Packages; -If You become aware of any unauthorized use of Our Assets, You are encouraged to report this to Us immediately. +**(b)** Exclusion of Your Work from Our Software ecosystem and community; -### 9.8 No Implied Rights +**(c)** Public notice of non-compliance to protect the community; -The presence of an Asset in Our Software does not imply any right to use that Asset outside the scope of this License. +**(d)** Legal action where violations involve illegal conduct or cause significant harm. -### 9.9 Separate Agreements +### 8.5 Updates and Evolution of Code of Conduct -For any use of Our Assets not covered by this License, a separate agreement must be negotiated and obtained from Us. +We reserve the right to update and evolve Our Code of Conduct. You are responsible for: -## 10. Contributions +**(a)** Staying informed about changes to the Code of Conduct; -By making contributions to the software, whether in the form of code, documentation, or any other material, You agree to the following: +**(b)** Implementing updated versions in a timely manner; -### 10.1 Grant of Copyright +**(c)** Communicating changes to Your community and contributors; -You hereby grant Us and Our successors a perpetual, worldwide, non-exclusive, royalty-free, irrevocable license to use, reproduce, modify, distribute, sublicense, and otherwise exploit Your Contributions, including any intellectual property rights therein, in any manner and for any purpose, without any obligation to provide attribution or compensation. +**(d)** Ensuring ongoing compliance with the most current version. -You retain all copyright over Your individual Contributions, and may use Your Contributions in Works outside of this License. Contributing to Our Software does not grant any copyright over the Software, with or without your Contributions. +### 8.6 Extension and Customisation -#### 10.1.1 Scope of License +You may extend or customise the Code of Conduct for Your specific project needs, provided that: -This license grant covers: +**(a)** Your modifications do not weaken, contradict, or undermine Our original Code of Conduct; -- All forms of Your Contributions, including but not limited to source code, documentation, designs, and ideas -- Any patents You own or control that are necessarily infringed by Your Contributions +**(b)** You clearly indicate which parts are Your extensions or modifications; -#### 10.1.2 Our Rights +**(c)** The core principles and values of Our Code of Conduct are preserved and respected; -We may: +**(d)** Your extensions promote the same inclusive and respectful community standards. -- Incorporate Your Contributions into the Software at Our discretion -- Modify or adapt Your Contributions as We see fit -- Remove Your Contributions from the Software at any time +## 9. ASSETS AND PROPRIETARY MATERIALS -#### 10.1.3 Your Retained Rights +Any non-Software Assets, unless specifically provided with and integrated into the Source Code of Our Software, may not be used in any Modifications, Incorporations, or Distributions of Our Software. -You retain the right to: +### 9.1 Comprehensive Definition of Assets -- Use Your Contributions in other projects -- License Your Contributions to others under different terms +For the purposes of this Licence, "Assets" include, but are not limited to: -#### 10.1.4 No Obligation for Inclusion +**(a)** Images, photographs, illustrations, and graphical elements; -We are under no obligation to include Your Contributions in the Software. +**(b)** Icons, logos, and user interface design elements; -### 10.2 Licensing of Contributions +**(c)** Audio files, sound effects, and musical compositions; -All contributions You make to the Software will be licensed under the same terms and conditions as the original Software, subject to the terms of this License. You understand and acknowledge that Your Contributions will become an integral part of the software and will be subject to the same rights and obligations as the original codebase. +**(d)** Video content, animations, and multimedia presentations; -#### 10.2.1 Integration with Existing License +**(e)** Fonts, typefaces, and typographical designs; -Your Contributions will be subject to: +**(f)** Logos, trademarks, service marks, and branding materials; -- All terms and conditions of this License -- Any future modifications to the License that We may make +**(g)** Text content and documentation not integral to the Software's functionality; -#### 10.2.2 No Special Rights +**(h)** Data files, databases, and content repositories; -Contributing does not grant You: +**(i)** Design templates, layouts, and aesthetic elements. -- Any special rights or privileges within the project -- The ability to dictate how Your Contributions are used or modified +### 9.2 Ownership and Rights Reservation -#### 10.2.3 Future License Changes +**(a)** We retain complete and exclusive ownership of all rights, title, and interest in and to all Assets associated with Our Software; -You agree that We may: +**(b)** The Licence granted for the Software does not extend to any Assets unless explicitly stated otherwise; -- Change the license of the entire Software, including Your Contributions, in the future -- Dual-license the Software, including Your Contributions, under additional licenses +**(c)** All intellectual property rights in Assets remain reserved to Us; -### 10.3 Representation +**(d)** No rights to Assets are granted by implication, estoppel, or otherwise. -You represent and warrant that You have the necessary rights to grant the above License and that Your Contributions do not infringe upon the intellectual property rights or other legal rights of any third party. +### 9.3 Comprehensive Prohibition on Asset Use -#### 10.3.1 Originality +You are expressly prohibited from: -You confirm that Your Contributions are: +**(a)** Using Our Assets in any Modifications or derivative works of Our Software; -- Your original work, or -- Derived from sources that You have the right to use and contribute under these terms +**(b)** Incorporating Our Assets into other Works, projects, or applications; -#### 10.3.2 Third-Party Content +**(c)** Distributing Our Assets separately from or alongside Our Software; -If Your Contributions include or are based on third-party content, You warrant that: +**(d)** Altering, manipulating, editing, or creating derivative works based on Our Assets; -- You have obtained all necessary permissions to include such content -- You have clearly identified any third-party content and its source +**(e)** Using Our Assets for commercial purposes or in connection with commercial activities; -#### 10.3.3 Employment and Contractual Obligations +**(f)** Sublicensing, selling, or otherwise transferring rights in Our Assets to third parties. -You warrant that: +### 9.4 Limited Exceptions and Permissions -- Your Contributions do not violate any employment or contractual obligations You may have -- You have obtained any necessary permissions from Your employer or clients to make these Contributions +**(a)** Assets that are explicitly designated as freely usable or provided under a separate licence within Our Source Code may be used according to the specific terms designated for those Assets; -#### 10.3.4 Intellectual Property Claims +**(b)** Any use of Assets beyond these limited exceptions requires Our explicit written permission; -You agree to: +**(c)** Requests for permission to use Assets will be considered on a case-by-case basis at Our sole discretion; -- Promptly notify Us of any third-party intellectual property claims related to Your Contributions -- Cooperate with Us in addressing any such claims +**(d)** Granted permissions may be subject to specific conditions, limitations, or requirements. -#### 10.3.5 Accuracy of Information +### 9.5 Asset Removal and Revocation of Rights -You confirm that any information You provide about Your Contributions is accurate and complete to the best of Your knowledge. +**(a)** We reserve the absolute right to remove any Asset from Our Software at any time and for any reason; -## 11. Warranty +**(b)** The removal of an Asset from Our Source Code immediately and automatically revokes any previous rights or permissions to use that Asset; -The Software provided under this license is provided "as is," without warranty of any kind, express or implied, including but not limited to the warranties of merchantability, fitness for a particular purpose, and non-infringement. The entire risk as to the quality and performance of the software is with You. Should the software prove defective, You assume the cost of all necessary servicing, repair, or correction. +**(c)** Such revocation applies retroactively, including to Assets present in earlier versions of the Software; -### 11.1 Disclaimer of Warranties +**(d)** No compensation or consideration is owed for revoked Asset rights. -We explicitly disclaim all warranties, whether express, implied, or statutory, including but not limited to: +### 9.6 Obligations Upon Asset Removal -- Any warranty of merchantability -- Fitness for a particular purpose -- Non-infringement of third-party rights -- Absence of latent or other defects -- Accuracy or completeness of the Software +Upon removal of an Asset from Our Software, You must immediately: -We make no warranties or representations regarding the use of the Software in terms of: +**(a)** Cease all use of the removed Asset in any context; -- Correctness -- Accuracy -- Reliability -- Current-ness -- Or otherwise +**(b)** Remove the Asset from any Modifications, derivative works, or distributions under Your control; -### 11.2 "As Is" Basis +**(c)** Ensure that the Asset is not used in any current or future versions of Works derived from Our Software; -You expressly understand and agree that your use of the Software is at your sole risk and that the Software is provided "as is" and "as available." +**(d)** Take reasonable measures to notify any downstream users or distributors of the requirement to remove the Asset. -Any material downloaded or otherwise obtained through the use of the Software is done at your own discretion and risk, and you will be solely responsible for any damage to your computer system or other device or loss of data that results from the download of any such material. - -### 11.3 No Guarantee of Performance or Results - -We do not warrant that: - -- The Software will meet your requirements -- The Software will be uninterrupted, timely, secure, or error-free -- The results that may be obtained from the use of the Software will be accurate or reliable -- Any errors in the Software will be corrected - -### 11.4 Third-Party Content and Services - -We make no warranties regarding any third-party content or services that may be accessible through the Software. - -Your interactions with such third-party content or services are solely between you and the third party. - -### 11.5 Security - -While we strive to use commercially acceptable means to protect your information, we cannot guarantee its absolute security. - -### 11.6 Modifications and Updates - -We reserve the right to modify, suspend, or discontinue the Software at any time without notice. - -We shall not be liable to you or to any third party for any modification, suspension, or discontinuance of the Software. - -### 11.7 Your Responsibility - -You acknowledge that: - -- The software may contain errors, bugs, or inaccuracies -- It may not function as intended or expected -- You use it at your own risk and discretion - -You are solely responsible for determining whether the software is suitable for your intended use. - -### 11.8 Limitation of Remedies - -Your exclusive remedy and our entire liability for any breach of this warranty shall be, at our option: - -- Return of the price paid for the software (if any) -- Repair or replacement of the software - -## 12. Limitation of Liability - -In no event unless required by applicable law or agreed to in writing will We or Our Contributors be liable to You for damages, including any general, special, incidental, or consequential damages arising out of the use or inability to use the software (including but not limited to loss of data or data being rendered inaccurate or losses sustained by You or third parties), even if We or Our Contributors have been advised of the possibility of such damages. - -Absolutely no liability will be held for Modifications or Incorporations of the Software. You are solely responsible for any damages caused by Your Modifications or Incorporations. - -### 12.1 Scope of Limitation - -This limitation of liability applies to: - -- Us (the software providers) -- Our Contributors -- Any affiliated entities, directors, officers, employees, or agents - -This limitation covers all forms of legal action, whether in contract, tort (including negligence), strict liability, or otherwise. - -### 12.2 Types of Damages Excluded - -We shall not be liable for any: - -- Direct damages -- Indirect damages -- Incidental damages -- Special damages -- Consequential damages -- Punitive damages - -This includes, but is not limited to, damages for: - -- Loss of profits -- Loss of business -- Business interruption -- Loss of business opportunity -- Loss of goodwill -- Loss of use -- Loss or corruption of data -- Cost of procurement of substitute goods or services - -### 12.3 Use of Software - -We shall not be liable for any damages arising from: - -- The use of the software -- The inability to use the software -- Any defect in the software -- Any error or omission in the software - -This applies even if We or Our Contributors have been advised of the possibility of such damages. - -### 12.4 Modifications and Incorporations - -We explicitly disclaim all liability for any Modifications or Incorporations of the Software. - -You assume full responsibility and risk for: - -- Any modifications You make to the Software -- Any incorporations of the Software into other works - -You agree to indemnify and hold Us harmless from any claims arising from Your Modifications or Incorporations. - -### 12.5 Third-Party Claims - -We shall not be liable for any claims or damages arising from third-party use of the Software, including use of any Modifications or Incorporations You create. - -### 12.6 Limitation Amount - -In jurisdictions that do not allow the exclusion or limitation of liability for certain damages, Our liability shall be limited to the maximum extent permitted by law. - -In no event shall Our total liability to You for all damages exceed the amount paid by You for the Software, if any. - -### 12.7 Essential Purpose - -You acknowledge that this limitation of liability is an essential part of the bargain between You and Us and shall apply even if any remedy fails of its essential purpose. - -### 12.8 Severability - -If any portion of this limitation of liability is found to be invalid or unenforceable, the remaining portions shall remain in full force and effect. - -## 13. Your Responsibility - -You acknowledge and agree that Your use of the Software is at Your sole risk and discretion, and You are solely responsible for any loss or damage to Your computer system or other device, or loss of data that results from such use. You are also responsible for ensuring that Your use of the Software complies with all applicable laws and regulations. - -### 13.1 Assumption of Risk - -You expressly understand and agree that: - -- Your use of the Software is at Your own risk -- You are solely responsible for any consequences resulting from Your use of the Software - -This assumption of risk includes, but is not limited to: - -- Any damage to Your computer systems or devices -- Loss of data -- Any other adverse effects resulting from the use or misuse of the Software - -### 13.2 System Requirements and Compatibility - -You are responsible for: - -- Ensuring Your systems meet the minimum requirements for running the Software -- Verifying the compatibility of the Software with Your existing hardware and software - -We do not guarantee that the Software will be compatible with all systems or configurations. - -### 13.3 Data Management +### 9.7 User Responsibility and Compliance You are solely responsible for: -- Backing up Your data before using the Software -- Implementing appropriate data management and protection measures +**(a)** Ensuring that You do not use, modify, or distribute Our Assets in violation of these terms; -We are not responsible for any data loss or corruption that may occur as a result of using the Software. +**(b)** Monitoring Your use of Our Software to identify any Assets that may be subject to these restrictions; -### 13.4 Legal Compliance +**(c)** Implementing appropriate measures to prevent unauthorised use of Our Assets; -You are responsible for ensuring that Your use of the Software complies with: +**(d)** Training any team members or collaborators about these Asset restrictions. -- All applicable local, state, national, and international laws and regulations -- Any specific regulations pertaining to Your industry or field of use +### 9.8 Indemnification for Asset Violations + +You agree to indemnify, defend, and hold Us harmless from and against any and all claims, damages, losses, costs, expenses, or legal actions arising from Your unauthorised use, modification, or distribution of Our Assets. + +### 9.9 Reporting Asset Violations + +If You become aware of any unauthorised use of Our Assets, whether by Yourself or others, You are strongly encouraged to report such use to Us immediately through Our established reporting channels. + +### 9.10 No Implied Rights or Permissions + +**(a)** The mere presence of an Asset in Our Software does not imply any right to use that Asset outside the scope explicitly permitted by this Licence; + +**(b)** No rights in Assets arise by implication, course of dealing, or otherwise; + +**(c)** Any uncertainty regarding Asset rights should be resolved through direct communication with Us. + +### 9.11 Separate Agreements for Asset Use + +For any use of Our Assets not covered by this Licence or the limited exceptions noted herein, a separate written agreement must be negotiated and executed with Us prior to any such use. + +## 10. CONTRIBUTIONS TO OUR SOFTWARE + +By making Contributions to Our Software, whether in the form of code, documentation, Assets, or any other materials, You agree to the following terms and grant the rights specified below. + +### 10.1 Grant of Copyright Licence + +You hereby grant to Us and Our successors a perpetual, worldwide, non-exclusive, royalty-free, irrevocable licence to: + +**(a)** Use, reproduce, modify, adapt, and create derivative works from Your Contributions; + +**(b)** Distribute, sublicense, and otherwise exploit Your Contributions in any manner and for any purpose; + +**(c)** Incorporate Your Contributions into Our Software and related projects; + +**(d)** Exercise all intellectual property rights in Your Contributions, including but not limited to copyright and patent rights. + +#### 10.1.1 Scope of Rights Granted + +This licence grant encompasses: + +**(a)** All forms of Your Contributions, including source code, documentation, designs, ideas, and any other materials; + +**(b)** Any patents You own or control that are necessarily infringed by Your Contributions or their incorporation into Our Software; + +**(c)** All current and future intellectual property rights in Your Contributions; + +**(d)** The right to use Your Contributions in ways that may differ from their original intended purpose. + +#### 10.1.2 Our Rights and Discretion + +We retain complete discretion to: + +**(a)** Accept or reject any Contributions at Our sole discretion; + +**(b)** Incorporate Your Contributions into Our Software in whole or in part; + +**(c)** Modify, adapt, or combine Your Contributions with other materials; + +**(d)** Remove Your Contributions from Our Software at any time without notice or explanation. + +#### 10.1.3 Your Retained Rights + +Notwithstanding the licence grant above, You retain: + +**(a)** Copyright ownership in Your original Contributions; + +**(b)** The right to use Your Contributions in other projects under different licensing terms; + +**(c)** The right to licence Your Contributions to others independently of this grant; + +**(d)** All moral rights in Your Contributions to the extent recognised by applicable law. + +#### 10.1.4 No Obligation for Attribution or Compensation + +**(a)** We are under no obligation to provide attribution, credit, or recognition for Your Contributions; + +**(b)** No compensation, royalty, or other payment is owed for Your Contributions; + +**(c)** We may use Your Contributions without any ongoing obligations to You; + +**(d)** Your Contributions become part of Our Software without creating any special relationship or ongoing rights. + +### 10.2 Licensing of Contributions + +All Contributions You make to Our Software will be subject to the same licence terms and conditions as Our original Software, governed by this Licence. + +#### 10.2.1 Integration with Existing Licence + +Your Contributions will be: + +**(a)** Subject to all current terms and conditions of this Licence; + +**(b)** Bound by any future modifications to this Licence that We may implement; + +**(c)** Treated as integral parts of Our Software for all licensing purposes; + +**(d)** Available to all users under the same terms as Our original Software. + +#### 10.2.2 No Special Rights or Status + +Contributing to Our Software does not grant You: + +**(a)** Any special rights, privileges, or status within Our project; + +**(b)** The ability to influence how Your Contributions are used, modified, or distributed; + +**(c)** Veto power over decisions regarding Your Contributions; + +**(d)** Any ongoing involvement in the direction or management of Our Software. + +#### 10.2.3 Future Licence Changes + +You acknowledge and agree that: + +**(a)** We may change the licence of Our Software, including Your Contributions, at any time; + +**(b)** We may dual-licence or multi-licence Our Software under additional licences; + +**(c)** Such licence changes will apply to Your Contributions without requiring Your separate consent; + +**(d)** You waive any right to object to reasonable licence changes. + +### 10.3 Representations and Warranties + +You represent and warrant that You have all necessary rights to grant the above licences and that Your Contributions do not infringe upon any intellectual property rights or other legal rights of any third party. + +#### 10.3.1 Originality and Ownership + +You confirm that Your Contributions are: + +**(a)** Your original work product created independently by You; + +**(b)** Derived from sources for which You have all necessary rights to contribute under these terms; + +**(c)** Free from any encumbrances, restrictions, or claims by third parties; + +**(d)** Not subject to any conflicting obligations or agreements. + +#### 10.3.2 Third-Party Content and Dependencies + +If Your Contributions include or are based upon third-party content, You warrant that: + +**(a)** You have obtained all necessary permissions, licences, and rights to include such content; + +**(b)** You have clearly identified any third-party content and disclosed its source and licensing terms; + +**(c)** The inclusion of such third-party content is legally permissible and does not create liability for Us; + +**(d)** Such third-party content is compatible with the terms of this Licence. + +#### 10.3.3 Employment and Contractual Compliance + +You warrant that: + +**(a)** Your Contributions do not violate any employment agreement, contract, or other obligation You may have; + +**(b)** You have obtained any necessary permissions from Your employer, clients, or other relevant parties; + +**(c)** You are legally authorised to make these Contributions; + +**(d)** No third party has any claim or right that would limit Our use of Your Contributions. + +#### 10.3.4 Ongoing Obligations + +You agree to: + +**(a)** Promptly notify Us of any third-party claims or disputes related to Your Contributions; + +**(b)** Cooperate fully with Us in addressing any such claims or disputes; + +**(c)** Provide any additional documentation or information We may reasonably request; + +**(d)** Update Us if any of Your representations or warranties become untrue or inaccurate. + +#### 10.3.5 Accuracy and Completeness + +You confirm that: + +**(a)** All information You provide about Your Contributions is accurate and complete; + +**(b)** You have disclosed all relevant facts that might affect Our decision to accept Your Contributions; + +**(c)** You will promptly correct any errors or omissions in the information provided; + +**(d)** You understand the legal implications of the representations and warranties You are making. + +## 11. WARRANTIES AND DISCLAIMERS + +### 11.1 Reference to Comprehensive Warranty Disclaimers + +**IMPORTANT: Comprehensive warranty disclaimers applicable to all our software and services, including this Software, are set forth in our Limitation of Liability and Indemnification Policy, which is incorporated herein by reference.** + +### 11.2 Software-Specific Disclaimers + +In addition to the comprehensive disclaimers in our Liability Policy, this Software is provided on an "as is" and "as available" basis with specific disclaimers regarding: + +**(a)** **Open Source Nature**: This is open source software provided without commercial support guarantees; + +**(b)** **Community Development**: Software may include contributions from multiple parties with varying quality levels; + +**(c)** **Version Stability**: Different versions may have different levels of stability and functionality. + +### 11.2 "As Is" and "As Available" Basis + +You expressly understand and acknowledge that: + +**(a)** Your use of the Software is entirely at Your own risk and discretion; + +**(b)** The Software is provided in its current state without any promise of improvement, support, or maintenance; + +**(c)** We make no guarantees regarding the availability, uptime, or continued operation of any services related to the Software; + +**(d)** Any reliance upon the Software or any results obtained through its use is solely Your responsibility. + +### 11.3 No Guarantee of Performance or Results + +We do not warrant or guarantee that: + +**(a)** The Software will operate without interruption, errors, or defects; + +**(b)** The Software will be compatible with Your systems, hardware, or other software; + +**(c)** Any defects or errors in the Software will be corrected; + +**(d)** The Software will produce accurate, reliable, or expected results; + +**(e)** The Software will be secure against all possible threats or vulnerabilities; + +**(f)** Any data processed by the Software will be preserved, protected, or recoverable. + +### 11.4 Third-Party Content and Integrations + +We make no warranties or representations regarding: + +**(a)** Any third-party content, services, or applications that may be accessible through or integrated with the Software; + +**(b)** The accuracy, legality, or appropriateness of third-party materials; + +**(c)** The continued availability or functionality of third-party services; + +**(d)** Your interactions or transactions with third-party providers. + +### 11.5 Security and Data Protection + +Whilst We endeavour to implement reasonable security measures: + +**(a)** We cannot guarantee absolute security or protection against all possible threats; + +**(b)** You acknowledge that no software or system is completely secure; + +**(c)** You assume all risks related to data security, privacy, and protection when using the Software; + +**(d)** You are responsible for implementing additional security measures appropriate to Your use case. + +### 11.6 Modifications and Updates + +We reserve the right to: + +**(a)** Modify, update, suspend, or discontinue the Software at any time without notice; + +**(b)** Change the features, functionality, or interface of the Software; + +**(c)** Alter the terms under which the Software is made available; + +**(d)** We shall not be liable for any consequences resulting from such changes. + +### 11.7 Your Acknowledgment of Risk + +You acknowledge and accept that: + +**(a)** Software development inherently involves risks and uncertainties; + +**(b)** The Software may contain bugs, errors, inaccuracies, or incomplete features; + +**(c)** Use of the Software may result in unexpected behaviour, data loss, or system issues; + +**(d)** You bear sole responsibility for evaluating the suitability of the Software for Your intended purposes. + +### 11.8 Limitation of Remedies + +In the event of any breach of warranty (if any were provided), Your exclusive remedy would be, at Our sole option: + +**(a)** Return of any fees paid for the Software (which in most cases would be zero); + +**(b)** Reasonable efforts to repair or replace the defective Software; + +**(c)** Such remedies would constitute Your sole and exclusive remedy for any breach of warranty. + +## 12. LIMITATION OF LIABILITY + +### 12.1 Reference to Comprehensive Liability Framework + +**IMPORTANT: Comprehensive liability limitations, damage exclusions, maximum liability caps, and all related legal protections applicable to this Software and our services are set forth in our Limitation of Liability and Indemnification Policy, which is incorporated herein by reference.** + +### 12.2 Software License-Specific Liability Clarifications + +In addition to the comprehensive protections in our Liability Policy, the following clarifications apply specifically to this Software: + +**(a)** **Open Source License**: This Software is provided under an open source license with no commercial warranties or support obligations; + +**(b)** **Community Contributions**: Contributors to this Software are also protected by the liability limitations in our Liability Policy; + +**(c)** **Zero Cost Basis**: As this Software is provided at no cost, maximum liability (where not excludable) is limited as specified in our Liability Policy; + +**(d)** **User Risk Assumption**: Users assume all risks associated with using, modifying, or distributing this Software. + + +## 13. USER RESPONSIBILITY AND ASSUMPTION OF RISK + +You acknowledge and expressly agree that Your use of Our Software is entirely at Your sole risk, discretion, and responsibility. + +### 13.1 Comprehensive Assumption of Risk + +You expressly understand, acknowledge, and agree that: + +**(a)** You assume all risks associated with downloading, installing, using, or modifying Our Software; + +**(b)** You are solely responsible for any and all consequences, damages, or losses resulting from Your use of Our Software; + +**(c)** This assumption of risk extends to all direct, indirect, consequential, and incidental effects of Your use; + +**(d)** No representations or warranties have been made to You regarding the safety, reliability, or suitability of Our Software. + +### 13.2 System Compatibility and Technical Requirements + +You are solely responsible for: + +**(a)** Determining whether Our Software is compatible with Your existing systems, hardware, and software configurations; + +**(b)** Ensuring that Your systems meet any minimum technical requirements for running Our Software; + +**(c)** Verifying compatibility before installation or use to prevent system conflicts or damage; + +**(d)** Understanding and accepting any risks associated with installing or running Our Software on Your systems. + +### 13.3 Data Management and Protection + +You bear complete responsibility for: + +**(a)** Creating complete and reliable backups of all important data before using Our Software; + +**(b)** Implementing appropriate data protection, security, and recovery measures; + +**(c)** Establishing data retention and management policies suitable for Your needs; + +**(d)** Any data loss, corruption, unauthorised access, or breach that may occur in connection with Your use of Our Software. + +### 13.4 Legal and Regulatory Compliance + +You are solely responsible for ensuring that Your use of Our Software complies with: + +**(a)** All applicable local, regional, national, and international laws and regulations; + +**(b)** Industry-specific regulations and standards that may apply to Your field of work or business; + +**(c)** Organisational policies, procedures, and compliance requirements; + +**(d)** Contractual obligations You may have with third parties. This includes, but is not limited to: -- Data protection and privacy laws -- Intellectual property laws -- Export control regulations +**(i)** Data protection and privacy laws (such as GDPR, CCPA, or similar regulations); -### 13.5 Ethical Use +**(ii)** Intellectual property laws and licensing requirements; -You agree to use the Software in an ethical manner, including: +**(iii)** Export control and trade restriction regulations; -- Respecting the rights and privacy of others -- Not using the Software for any illegal or malicious purposes +**(iv)** Professional licensing and regulatory requirements; -### 13.6 Security Measures +**(v)** Employment and labour law compliance; -You are responsible for implementing appropriate security measures, including: +**(vi)** Financial and securities regulations where applicable. -- Protecting Your login credentials -- Securing Your systems against unauthorized access -- Promptly applying any security updates or patches we may provide +### 13.5 Ethical Use and Conduct -### 13.7 Modifications and Integrations +You agree to use Our Software in an ethical and responsible manner, including: -If You modify the Software or integrate it with other systems: +**(a)** Respecting the rights, privacy, and dignity of all individuals who may be affected by Your use; -- You are solely responsible for any resulting issues or damages -- You must ensure these modifications or integrations comply with this License +**(b)** Refraining from using Our Software for any illegal, harmful, or malicious purposes; -### 13.8 Reporting Issues +**(c)** Following industry best practices and professional standards relevant to Your use case; -You agree to promptly report any bugs, security vulnerabilities, or other issues You discover in the Software. +**(d)** Taking reasonable measures to prevent misuse of Our Software by others. -### 13.9 Indemnification +### 13.6 Security Implementation and Maintenance -You agree to indemnify and hold Us harmless from any claims, damages, or expenses arising from: +You are responsible for: -- Your use of the Software -- Your violation of this License or any applicable laws +**(a)** Implementing appropriate security measures to protect Your systems, data, and networks; -## 14. Enforcement +**(b)** Maintaining the confidentiality and security of any login credentials, access tokens, or authentication information; -Enforcement of this License will be done at Our discretion. A decision not to enforce a License violation will not preclude Us from enforcing that violation or any other violation of this License in the future. +**(c)** Promptly applying any security updates, patches, or recommendations We may provide; -### 14.1 Discretionary Enforcement +**(d)** Monitoring Your systems for security threats and responding appropriately to any incidents; -We reserve the right to enforce the terms of this License at Our sole discretion. +**(e)** Securing Your installations against unauthorised access, modification, or misuse. + +### 13.7 Modifications and Customisations + +If You modify Our Software or integrate it with other systems: + +**(a)** You assume complete responsibility for any resulting issues, conflicts, or damages; + +**(b)** You must ensure that all modifications comply with the terms of this Licence; + +**(c)** You are responsible for testing and validating the functionality and security of modified versions; + +**(d)** You bear sole responsibility for supporting and maintaining any modifications You make. + +### 13.8 Monitoring and Reporting Obligations + +You agree to: + +**(a)** Monitor Your use of Our Software for compliance with this Licence and applicable laws; + +**(b)** Promptly report any bugs, security vulnerabilities, or other significant issues You discover; + +**(c)** Cooperate with any reasonable requests for information regarding Your use of Our Software; + +**(d)** Notify Us immediately of any potential violations of this Licence that You become aware of. + +### 13.9 Indemnification Obligations + +You agree to indemnify, defend, and hold harmless Us and Our Contributors from and against any and all: + +**(a)** Claims, demands, or legal actions arising from Your use, modification, or distribution of Our Software; + +**(b)** Damages, losses, costs, expenses (including reasonable legal fees), or liabilities resulting from Your breach of this Licence; + +**(c)** Violations of applicable laws or regulations in connection with Your use of Our Software; + +**(d)** Third-party claims related to Your modifications or derivative works based on Our Software. + +### 13.10 Limitation of Our Obligations + +You acknowledge and agree that: + +**(a)** We have no obligation to provide support, maintenance, updates, or assistance regarding Our Software; + +**(b)** We are not responsible for training You or Your personnel in the proper use of Our Software; + +**(c)** Any assistance, guidance, or information We may voluntarily provide does not create any warranty or support obligation; + +**(d)** You may not rely on Our continued availability or willingness to provide voluntary assistance. + +## 14. ENFORCEMENT DISCRETION AND PROCEDURES + +Enforcement of this Licence shall be conducted at Our sole discretion. Our decision not to enforce any particular violation shall not constitute a waiver of Our right to enforce that violation or any other violation in the future. + +### 14.1 Discretionary Enforcement Authority + +We reserve the complete and unqualified right to: + +**(a)** Enforce the terms of this Licence at Our sole and absolute discretion; + +**(b)** Determine what constitutes a violation of this Licence; + +**(c)** Choose the appropriate response to any violation, including no response at all; + +**(d)** Prioritise enforcement actions based on Our assessment of severity, impact, and available resources. + +### 14.2 Range of Enforcement Actions Our enforcement actions may include, but are not limited to: -- Issuing warnings -- Requesting compliance within a specified timeframe -- Terminating the License for the violating party -- Taking legal action +**(a)** **Educational measures:** Providing information, guidance, or warnings about compliance requirements; -Factors We may consider in deciding whether to enforce include: +**(b)** **Corrective requests:** Requesting specific actions to bring conduct into compliance within specified timeframes; -- The severity of the violation -- The impact on other users or the broader community -- The violator's history of compliance or non-compliance -- The violator's willingness to rectify the violation +**(c)** **Licence termination:** Revoking the violating party's rights under this Licence permanently or temporarily; -### 14.2 Non-Waiver +**(d)** **Legal action:** Pursuing civil remedies, injunctive relief, or other legal remedies available under applicable law; + +**(e)** **Public disclosure:** Making violations and enforcement actions public to protect the community and inform stakeholders. + +### 14.3 Factors Considered in Enforcement Decisions + +In deciding whether and how to enforce this Licence, We may consider: + +**(a)** The severity and scope of the violation; + +**(b)** The actual or potential impact on Us, Our Software, other users, or the broader community; + +**(c)** The violator's history of compliance or previous violations; + +**(d)** The violator's willingness to acknowledge the violation and take corrective action; + +**(e)** The resources required for enforcement and the likelihood of successful resolution; + +**(f)** Whether enforcement would serve the broader interests of Our Software community. + +### 14.4 Non-Waiver Principle Our decision not to enforce a particular violation: -- Does not constitute a waiver of Our right to enforce that violation in the future -- Does not prevent Us from enforcing other violations of the License -- Does not imply approval or acceptance of the violating behavior +**(a)** Does not constitute a waiver of Our right to enforce that same violation in the future; -Each instance of a violation will be considered separately, regardless of past enforcement decisions. +**(b)** Does not prevent Us from enforcing other provisions of this Licence against the same or different parties; -### 14.3 Reporting Violations +**(c)** Does not imply approval, acceptance, or authorisation of the violating behaviour; -Users are encouraged to report suspected License violations to Us. +**(d)** Does not establish any precedent limiting Our future enforcement discretion. -Reports should include: +Each instance of violation will be evaluated independently, regardless of Our past enforcement decisions or apparent tolerance of similar conduct. -- A description of the suspected violation -- Any evidence supporting the claim -- The reporter's contact information (optional) +### 14.5 Reporting Violations -### 14.4 Investigation of Violations +We encourage community members and stakeholders to report suspected violations of this Licence. Effective reports should include: -We reserve the right to investigate any suspected violations of this License. +**(a)** A clear and detailed description of the suspected violation; -During an investigation, We may: +**(b)** Specific evidence supporting the allegation, such as links, documentation, or screenshots; -- Request additional information from involved parties -- Examine any relevant code, documentation, or other materials -- Temporarily suspend access to the Software for the party under investigation +**(c)** Information about the impact or potential harm caused by the violation; -### 14.5 Enforcement Actions +**(d)** The reporter's contact information (which may be kept confidential upon request). -If We determine that a violation has occurred, We may take one or more of the following actions: +Reports should be submitted to: legal@nhcarrigan.com -- Issue a warning to the violating party -- Require the violating party to remedy the violation within a specified timeframe -- Revoke the violating party's rights under this License -- Publicly disclose the violation and Our response to it -- Pursue legal remedies +### 14.6 Investigation Procedures -### 14.6 Appeals Process +When investigating suspected violations, We reserve the right to: -A party subject to enforcement action may appeal Our decision. +**(a)** Request additional information, documentation, or evidence from all relevant parties; -Appeals must be submitted in writing within 30 days of the enforcement action. +**(b)** Examine any publicly available code, documentation, or other materials; -We will review appeals and make a final decision at Our discretion. +**(c)** Consult with legal counsel, technical experts, or community advisors; -### 14.7 Cooperation with Authorities +**(d)** Temporarily suspend access to Our Software or related services during the investigation; -We reserve the right to cooperate with any law enforcement or regulatory authority investigating potential violations of applicable laws related to the use of Our Software. +**(e)** Take interim protective measures to prevent ongoing harm while the investigation is pending. -### 14.8 Modifications to Enforcement Policy +### 14.7 Due Process and Fairness -We may modify Our enforcement policies at any time without notice. +Whilst We retain complete enforcement discretion, We strive to: -Any changes to enforcement policies will apply to all existing and future violations. +**(a)** Conduct investigations fairly and objectively; -## 15. Termination +**(b)** Provide reasonable opportunity for alleged violators to respond to accusations; -This License is effective until terminated. We may, at Our sole discretion, terminate this License at any time, with or without cause, and with or without notice. Upon termination, You shall cease all use of the software and destroy all copies, full or partial, of the software in Your possession. +**(c)** Consider all relevant facts and circumstances before making enforcement decisions; -Termination of this License shall not relieve You of any obligations or liabilities accrued prior to the termination date, including but not limited to any indemnification obligations and limitations of liability outlined in this License. +**(d)** Apply enforcement actions proportionally to the nature and severity of violations. -Breach of any terms or conditions of this License shall result in the immediate termination of this License. +### 14.8 Appeals and Reconsideration + +Parties subject to enforcement actions may request reconsideration by: + +**(a)** Submitting a written appeal within thirty (30) days of the enforcement action; + +**(b)** Providing new evidence or information that was not available during the initial investigation; + +**(c)** Demonstrating that the enforcement action was based on factual errors or misunderstanding; + +**(d)** Showing that corrective actions have been taken to address the violation. + +We will review appeals in good faith but retain sole discretion over final enforcement decisions. + +### 14.9 Cooperation with Legal Authorities + +We reserve the right to: + +**(a)** Cooperate with law enforcement agencies investigating potential criminal violations; + +**(b)** Report violations to appropriate regulatory authorities where required by law; + +**(c)** Provide information to legal authorities as permitted or required by applicable legal process; + +**(d)** Coordinate Our enforcement actions with ongoing legal proceedings or investigations. + +### 14.10 Modification of Enforcement Policies + +We may modify Our enforcement policies, procedures, or priorities at any time without prior notice. Any changes will: + +**(a)** Apply to all future violations and ongoing enforcement matters; + +**(b)** Be implemented in a manner consistent with Our discretionary authority under this Licence; + +**(c)** Not affect Our fundamental rights and remedies under this Licence or applicable law. + +## 15. TERMINATION OF LICENCE + +This Licence shall remain in effect until terminated in accordance with the provisions set forth below. ### 15.1 Termination by Us -We reserve the right to terminate this License: +We reserve the absolute and unrestricted right to terminate this Licence: -- At any time -- For any reason or no reason -- With or without prior notice +**(a)** At any time, for any reason or for no reason at all; -Reasons for termination may include, but are not limited to: +**(b)** With or without prior notice to You; -- Violation of any terms of this License -- Misuse of the Software -- Legal or regulatory requirements -- Discontinuation of the Software +**(c)** With immediate effect upon notification or as otherwise specified by Us; -### 15.2 Automatic Termination +**(d)** For the convenience of Our business operations or strategic decisions. -This License terminates automatically if You: +Common reasons for termination may include, but are not limited to: -- Fail to comply with any term or condition of this License -- Initiate any litigation against Us related to the Software +**(i)** Violation of any terms or conditions of this Licence; -### 15.3 Effect of Termination +**(ii)** Misuse of Our Software contrary to its intended purposes; -Upon termination of this License, You must: +**(iii)** Breach of Our Code of Conduct or community standards; -- Immediately cease all use of the Software -- Destroy all copies, full or partial, of the Software in Your possession or control -- Remove the Software from all systems under Your control -- Cease distribution of any works derived from the Software +**(iv)** Legal or regulatory requirements mandating termination; -You must provide written confirmation of these actions upon Our request. +**(v)** Discontinuation of Our Software or related services; -### 15.4 Survival of Terms +**(vi)** Changes in Our business model or strategic direction. -The following sections of this License shall survive termination: +### 15.2 Automatic Termination Events -- Any sections explicitly stated to survive termination -- All provisions regarding ownership, disclaimer of warranties, limitations of liability, and indemnification -- Any accrued rights or obligations +This Licence shall terminate automatically and immediately, without any notice from Us, if: -### 15.5 No Refunds +**(a)** You fail to comply with any material term or condition of this Licence; -Termination of this License does not entitle You to any refunds, credits, or other compensation. +**(b)** You initiate or threaten litigation against Us relating to Our Software or this Licence; -### 15.6 Reinstatement +**(c)** You engage in conduct that We reasonably determine to be harmful to Us, Our Software, or Our community; -Your rights under this License may be reinstated only upon Our express written consent. +**(d)** You file for bankruptcy, become insolvent, or make an assignment for the benefit of creditors; -Any reinstatement may be subject to additional terms and conditions. +**(e)** You cease to exist as a legal entity or discontinue business operations. -### 15.7 Termination and Third Parties +### 15.3 Immediate Obligations Upon Termination -Termination of Your License does not affect the rights of any third parties who have received the Software or derivative works from You in compliance with this License prior to termination. +Upon termination of this Licence for any reason, You must immediately and completely: -### 15.8 Notification of Termination +**(a)** Cease all use of Our Software in any form or context; -While We may terminate this License without notice, We may choose to provide notification through: +**(b)** Destroy or permanently delete all copies of Our Software in Your possession or control, including: -- Email to Your last known address -- Posting on Our website or in the Software repository -- Any other means We deem appropriate +- **(i)** Source code versions +- **(ii)** Compiled or executable versions +- **(iii)** Modified or derivative versions +- **(iv)** Backup copies stored on any media +- **(v)** Cached or temporary files -### 15.9 Appeal of Termination +**(c)** Remove Our Software from all computer systems, servers, and devices under Your control; -If You believe the termination was in error, You may appeal the decision within 30 days of termination. +**(d)** Cease distribution of any Works derived from Our Software; -Appeals must be submitted in writing and will be reviewed at Our discretion. +**(e)** Take reasonable measures to ensure that any third parties You have provided with Our Software are notified of the termination and cease their use as well. -## 16. License Versions +### 15.4 Certification of Compliance -Versioning of this license is managed through git. You may view the version history [in these commits](https://git.nhcarrigan.com/nhcarrigan/docs/commits/branch/main/LICENSE.md). +Upon Our request, You must provide written certification that You have fully complied with all termination obligations, including: -### 16.1 Future License Changes +**(a)** Confirmation of the destruction or deletion of all copies of Our Software; -We reserve the right to modify the terms of this License, including its licensing of Contributions, at its sole discretion. In the event that such changes are made, We will make reasonable efforts to notify You through Our chat channels. +**(b)** Certification that all use and distribution has ceased; -#### 16.1.1 Notification Process +**(c)** Details of any third parties who may have received Our Software from You; -Notifications of License changes may include: +**(d)** Any other information reasonably requested to verify compliance with termination requirements. -- Announcements in Our chat channels -- Updates to the License file in the git repository -- Notifications on Our website or blog -- Email notifications to registered users, if applicable +### 15.5 Survival of Terms -#### 16.1.2 Review Period +The following provisions of this Licence shall survive termination and continue in full force and effect indefinitely: -We may, at Our discretion, provide a review period for significant License changes. +**(a)** All warranty disclaimers and limitations of liability; -During this period, users may submit feedback or concerns about the proposed changes. +**(b)** Indemnification obligations and User responsibility provisions; -#### 16.1.3 Acceptance of Changes +**(c)** Intellectual property rights and ownership provisions; -Continued use of the Software after a License change constitutes acceptance of the new terms. +**(d)** Definitions and interpretation clauses; -### 16.2 Version Perpetuation +**(e)** Dispute resolution and governing law provisions; -All Works derived from this Software must be licensed under the latest version of this License. This includes Works that are modifications or incorporations of the Software. +**(f)** Any other provisions that by their nature are intended to survive termination. -Changes to this License retroactively apply to all Works derived from this Software, even those created before the date of the changes. +### 15.6 No Entitlement to Refunds or Compensation -#### 16.2.1 Scope of Retroactive Application +Termination of this Licence does not entitle You to: -Retroactive application includes: +**(a)** Any refunds, credits, or financial compensation; -- All existing Works derived from the Software -- Any ongoing use or distribution of such Works -- Future modifications to existing derived Works +**(b)** Reimbursement for costs incurred in using or implementing Our Software; -#### 16.2.2 Compliance Timeline +**(c)** Damages for loss of use or business disruption; -Users of derived Works must update to the latest License version within a reasonable timeframe after notification of changes. +**(d)** Any other form of compensation or consideration. -#### 16.2.3 Conflicts with Existing Agreements +### 15.7 Reinstatement Possibilities -In case of conflicts between retroactive changes and existing agreements: +Your rights under this Licence may potentially be reinstated only: -- The terms of this License shall prevail -- Users may need to renegotiate any conflicting agreements +**(a)** Upon Our express written consent, granted in Our sole discretion; -### 16.3 Last Updated +**(b)** Subject to such additional terms, conditions, or restrictions as We may impose; -The terms of this License were last modified on 7 July 2024. +**(c)** With no guarantee that reinstatement will be granted even if requested; -#### 16.3.1 Version Identification +**(d)** Following satisfactory resolution of the issues that led to termination. -Each version of the License will be identified by: +### 15.8 Effect on Third-Party Rights -- The last modification date +Termination of Your Licence does not affect: -#### 16.3.2 Version Comparison +**(a)** The rights of any third parties who received Our Software from You in compliance with this Licence prior to termination; -Users can compare different versions of the License by: +**(b)** The validity of any sublicences properly granted before termination; -- Reviewing the commit history in the git repository -- Checking the "Last Updated" date in each version +**(c)** Our rights and remedies against You or any other party; -#### 16.3.3 Archived Versions +**(d)** The enforceability of Our intellectual property rights. -Previous versions of the License will remain accessible in the commit history for reference purposes. +### 15.9 Methods of Termination Notice -## 17. Contact +When We elect to provide notice of termination, such notice may be delivered through: -If you have questions about this License, We may be reached in Our [forum](https://forum.nhcarrigan.com). +**(a)** Email to Your last known email address; -### 17.1 Communication Channels +**(b)** Posting on Our website, repository, or community forums; -#### 17.1.1 Primary Contact Method +**(c)** Direct communication through any platform or service You use to access Our Software; -Our chat server is the primary method for License-related inquiries. +**(d)** Any other method We deem appropriate under the circumstances. -#### 17.1.2 Additional Contact Methods +### 15.10 Appeal and Review Process -- Email: `license@nhcarrigan.com` -- Issue Tracker: https://git.nhcarrigan.com/nhcarrigan/docs/issues +If You believe termination was made in error, You may: -### 17.2 Response Times +**(a)** Submit a written appeal within thirty (30) days of termination; -We strive to respond to inquiries within 5 business days. +**(b)** Provide evidence supporting Your position that termination was unwarranted; -Complex issues may require additional time for a comprehensive response. +**(c)** Request reconsideration based on changed circumstances or corrective actions; -### 17.3 Language Support +**(d)** Such appeals will be reviewed at Our sole discretion, and Our decision shall be final. -Primary communication is in English. +## 16. LICENCE VERSIONING AND UPDATES -We will make reasonable efforts to accommodate other languages when possible. +This Licence is subject to version control and potential updates as described below. -### 17.4 Confidentiality +### 16.1 Version Management System -Communications regarding the License are generally not confidential unless explicitly agreed upon. +**(a)** The versioning of this Licence is managed through our git version control system; -Do not share sensitive or personal information in public channels. +**(b)** You may view the complete version history and all changes at: https://git.nhcarrigan.com/nhcarrigan/docs/commits/branch/main/LICENSE.md -### 17.5 Suggestions +**(c)** Each version is identified by commit hash, date, and version number where applicable; -This License is a living document. We are happy to hear suggestions about the terms of this License. Please reach out to Us in Our chat server. +**(d)** All historical versions remain accessible for reference and comparison purposes. -#### 17.5.1 Suggestion Process +### 16.2 Right to Modify Terms -To submit a suggestion: +We reserve the unrestricted right to modify, amend, update, or replace any terms of this Licence, including: -- Join Our chat server -- Locate the appropriate channel for License discussions -- Clearly state your suggestion and provide a rationale +**(a)** Substantive changes to rights, obligations, or restrictions; -#### 17.5.2 Evaluation of Suggestions +**(b)** Modifications to enforcement procedures or remedies; -We will review all suggestions in good faith. +**(c)** Updates to definitions, scope, or applicability; -Factors considered in evaluating suggestions include: +**(d)** Changes to contribution terms and intellectual property provisions; -- Alignment with the License's overall purpose -- Legal implications -- Impact on existing users and projects -- Practicality of implementation +**(e)** Any other modifications We deem necessary or appropriate. -#### 17.5.3 Feedback on Suggestions +#### 16.2.1 Notification Procedures -We will provide feedback on suggestions when possible. +When We make changes to this Licence, We will make reasonable efforts to notify affected users through: -Implementation of suggestions is at Our sole discretion. +**(a)** Announcements in Our community forums and chat channels; -### 17.6 Legal Inquiries +**(b)** Updates and notifications in Our software repositories; -For formal legal inquiries, please contact `legal@nhcarrigan.com`. +**(c)** Notices posted on Our official website or blog; -Legal inquiries should be made in writing and may require verification of identity and authority. +**(d)** Email notifications to registered users where contact information is available; -### 17.7 Reporting Violations +**(e)** In-application notifications where technically feasible. -#### 17.7.1 To report potential License violations: +#### 16.2.2 Review and Comment Period -- Provide a detailed description of the suspected violation -- Include any supporting evidence -- Use the designated reporting channel in Our chat server +For significant changes to this Licence, We may, at Our sole discretion: + +**(a)** Provide a public review period before implementing changes; + +**(b)** Accept feedback and comments from the community; + +**(c)** Consider reasonable suggestions for modifications; + +**(d)** The final decision regarding any changes remains entirely at Our discretion. + +#### 16.2.3 Effective Date of Changes + +Changes to this Licence shall become effective: + +**(a)** Immediately upon publication of the updated version, unless otherwise specified; + +**(b)** On a specific future date announced with the changes; + +**(c)** Upon Your continued use of Our Software after notification of changes; + +**(d)** As otherwise determined by Us and communicated with the updated Licence. + +### 16.3 Mandatory Version Updates + +All Works derived from Our Software must comply with the most current version of this Licence at all times. + +#### 16.3.1 Automatic Application to Existing Works + +**(a)** Changes to this Licence apply retroactively to all existing Works derived from Our Software; + +**(b)** This includes Works that were created, modified, or distributed before the date of Licence changes; + +**(c)** Users of existing Works must update their compliance to reflect the new Licence terms; + +**(d)** Continued use or distribution of existing Works constitutes acceptance of the updated terms. + +#### 16.3.2 Scope of Retroactive Application + +Retroactive application of Licence changes includes: + +**(a)** All existing modifications and derivative works of Our Software; + +**(b)** Any ongoing use, distribution, or development activities; + +**(c)** Future updates or modifications to existing derivative works; + +**(d)** All associated documentation, attribution, and compliance requirements. + +#### 16.3.3 Compliance Timeline and Requirements + +**(a)** Users must update their practices to comply with Licence changes within a reasonable timeframe after notification; + +**(b)** "Reasonable timeframe" typically means thirty (30) to ninety (90) days, depending on the nature of the changes; + +**(c)** We may specify different timeframes for different types of changes; + +**(d)** Failure to comply within the specified timeframe may result in automatic termination of Licence rights. + +#### 16.3.4 Resolution of Conflicts + +In case of conflicts between new Licence terms and existing agreements or practices: + +**(a)** The terms of the most current version of this Licence shall prevail; + +**(b)** Users may need to renegotiate or modify any conflicting agreements with third parties; + +**(c)** Where legal conflicts cannot be resolved, users may need to cease using Our Software; + +**(d)** We are not responsible for any costs, damages, or complications arising from such conflicts. + +### 16.4 Version Information and Documentation + +#### 16.4.1 Current Version Identification + +**(a)** Each version of this Licence includes a "last modified" date for identification; + +**(b)** The most current version is always available at our official documentation site; + +**(c)** Version numbers or identifiers may be assigned to major revisions; + +**(d)** Users are responsible for ensuring they are referencing the most current version. + +#### 16.4.2 Change Documentation + +**(a)** Significant changes will be documented with explanations of the modifications and their implications; + +**(b)** A change log may be maintained to help users understand the evolution of terms; + +**(c)** Comparison tools may be provided to help users identify differences between versions; + +**(d)** Technical explanations may be provided for complex or technical changes. + +#### 16.4.3 Historical Archive + +**(a)** Previous versions of this Licence will remain accessible through our version control system; + +**(b)** Users may reference historical versions for comparison or understanding purposes; + +**(c)** Historical versions are provided for reference only and do not constitute current licence terms; + +**(d)** Legal effect and enforceability apply only to the most current version. + +### 16.5 Last Updated Information + +**The terms of this Licence were last modified on:** 7 July 2024 + +**(This date will be updated with each revision of the Licence to reflect the most recent changes)** + +## 17. CONTACT INFORMATION AND SUPPORT + +For questions, clarifications, or other matters related to this Licence, We may be contacted through the channels specified below. + +### 17.1 Primary Communication Channels + +#### 17.1.1 Community Forum + +Our primary venue for Licence-related discussions and inquiries: + +**Website:** https://forum.nhcarrigan.com + +**Purpose:** General questions, clarifications, community discussion about licence terms + +**Response Time:** We endeavour to respond within five (5) business days + +#### 17.1.2 Direct Email Contacts + +**General Licence Inquiries:** licence@nhcarrigan.com + +**Legal and Compliance Matters:** legal@nhcarrigan.com + +**Violation Reports:** legal@nhcarrigan.com + +**Business and Commercial Inquiries:** business@nhcarrigan.com + +#### 17.1.3 Technical Support Channels + +**Issue Tracker:** https://git.nhcarrigan.com/nhcarrigan/docs/issues + +**Purpose:** Technical problems with accessing or understanding this Licence document + +### 17.2 Response Standards and Expectations + +#### 17.2.1 General Response Times + +**(a)** Routine inquiries: Within five (5) to seven (7) business days; + +**(b)** Urgent compliance matters: Within two (2) to three (3) business days; + +**(c)** Legal or violation reports: Within twenty-four (24) to forty-eight (48) hours; + +**(d)** Complex technical or legal questions may require additional time for comprehensive responses. + +#### 17.2.2 Business Hours and Availability + +**(a)** Our standard business hours are Monday through Friday, 9:00 AM to 5:00 PM Pacific Standard Time; + +**(b)** Responses may be delayed during weekends, holidays, or other non-business periods; + +**(c)** Urgent matters requiring immediate attention should be clearly marked as such; + +**(d)** We reserve the right to prioritise inquiries based on urgency and available resources. + +### 17.3 Communication Guidelines + +#### 17.3.1 Language and Accessibility + +**(a)** Primary communication is conducted in English; + +**(b)** We will make reasonable efforts to accommodate other languages when possible and practical; + +**(c)** Complex legal or technical matters may require English communication for accuracy; + +**(d)** Translation services may be recommended for non-English speakers with complex inquiries. + +#### 17.3.2 Information Security and Confidentiality + +**(a)** Communications regarding this Licence are generally not considered confidential unless explicitly agreed upon in advance; + +**(b)** Do not share sensitive personal information, proprietary business data, or confidential materials through public channels; + +**(c)** For confidential matters, use direct email contact and clearly mark communications as confidential; + +**(d)** We reserve the right to make licence-related discussions public to benefit the broader community. + +#### 17.3.3 Professional Communication Standards + +**(a)** All communications should be professional, respectful, and constructive; + +**(b)** Abusive, threatening, or inappropriate communications will not be tolerated; + +**(c)** Communications must comply with Our Code of Conduct; + +**(d)** We reserve the right to cease communication with parties who engage in inappropriate conduct. + +### 17.4 Types of Inquiries We Address + +#### 17.4.1 Licence Interpretation and Clarification + +**(a)** Questions about specific terms, conditions, or requirements; + +**(b)** Clarification of rights and obligations under this Licence; + +**(c)** Guidance on compliance with licence terms; + +**(d)** Interpretation of how the licence applies to specific use cases. + +#### 17.4.2 Compliance and Legal Matters + +**(a)** Questions about compliance requirements for specific projects or use cases; + +**(b)** Reporting of potential licence violations; + +**(c)** Requests for legal clarification or formal interpretation; + +**(d)** Dispute resolution and enforcement matters. + +#### 17.4.3 Business and Commercial Inquiries + +**(a)** Questions about commercial use of Our Software; + +**(b)** Requests for special licensing arrangements; + +**(c)** Partnership or collaboration opportunities; + +**(d)** Custom licensing or commercial support arrangements. + +### 17.5 Community Feedback and Suggestions + +#### 17.5.1 Encouraging Community Input + +This Licence is designed to serve Our Software community effectively, and We welcome constructive feedback and suggestions for improvement. + +#### 17.5.2 Suggestion Submission Process + +To submit suggestions for licence improvements: + +**(a)** Join Our community forum and locate the appropriate discussion area; + +**(b)** Clearly describe Your suggestion and provide detailed rationale; + +**(c)** Explain the problem Your suggestion addresses and how it would improve the licence; + +**(d)** Be prepared to engage in constructive discussion with other community members. + +#### 17.5.3 Evaluation Criteria + +We evaluate suggestions based on: + +**(a)** Alignment with the overall purpose and philosophy of this Licence; + +**(b)** Legal soundness and practical enforceability; + +**(c)** Impact on existing users and projects; + +**(d)** Feasibility of implementation and ongoing maintenance; + +**(e)** Benefit to the broader software community. + +#### 17.5.4 Implementation and Feedback + +**(a)** We will acknowledge receipt of suggestions and provide feedback when possible; + +**(b)** Implementation of suggestions remains entirely at Our discretion; + +**(c)** Significant suggestions may be subject to community discussion and review; + +**(d)** Contributors of adopted suggestions may receive acknowledgment in licence updates. + +### 17.6 Formal Legal Communications + +#### 17.6.1 Legal Notices and Service of Process + +For formal legal communications, including service of legal process: + +**Email:** legal@nhcarrigan.com + +**Subject Line:** LEGAL NOTICE - [Brief Description] + +**Requirements:** All formal legal communications should be clearly identified as such and may require verification of identity and authority. + +#### 17.6.2 Compliance with Legal Requirements + +**(a)** Legal communications should comply with applicable rules for service of process; + +**(b)** International communications may require additional procedural compliance; + +**(c)** We may request additional verification for formal legal matters; + +**(d)** Response times for legal matters may differ from general inquiry response times. + +### 17.7 Reporting Licence Violations + +#### 17.7.1 How to Report Violations + +To report suspected violations of this Licence: + +**(a)** **Email:** legal@nhcarrigan.com with subject line "LICENCE VIOLATION REPORT" + +**(b)** **Forum:** Use designated violation reporting channels in our community forum + +**(c)** **Provide detailed information:** Include specific details about the suspected violation, supporting evidence, and contact information + +#### 17.7.2 Information to Include in Reports + +**(a)** Detailed description of the suspected violation and relevant licence provisions; + +**(b)** Evidence supporting the allegation (links, screenshots, documentation); + +**(c)** Information about any attempts to resolve the matter directly; + +**(d)** Your contact information and relationship to the matter (which may be kept confidential); + +**(e)** Any relevant dates, timelines, or deadlines. + +#### 17.7.3 Confidentiality and Protection + +**(a)** We will treat violation reports with appropriate confidentiality; + +**(b)** Reporter identity may be kept confidential upon request; + +**(c)** We will not retaliate against good-faith reporters of violations; + +**(d)** False or malicious reports may result in consequences for the reporter. ### 17.8 Updates to Contact Information -We reserve the right to update Our contact information at any time. +**(a)** We reserve the right to update Our contact information, communication channels, or procedures at any time; -Current contact information will always be available in the latest version of this License. +**(b)** Current contact information will always be available in the most recent version of this Licence; + +**(c)** Users should verify contact information using the official licence document rather than cached or copied versions; + +**(d)** Changes to contact information will be announced through Our standard communication channels. + +--- + +**FINAL PROVISIONS** + +This Licence represents Our commitment to fostering an ethical, collaborative, and sustainable software development ecosystem whilst protecting Our rights and the rights of Our community members. By using Our Software, You become part of this community and agree to uphold its values and standards. + +We encourage all users to engage constructively with Our community, contribute positively to the development and improvement of Our Software, and help maintain the collaborative and ethical environment that makes open-source development possible. + +This is the current version of our software licence. + +**Document Version:** 2.0 + +**Last Updated:** 15 September 2025 + +**Effective Date:** 15 September 2025 + +**Licence Identifier:** Naomi's Public Licence + +--- + +*By using Our Software, you acknowledge that you have read, understood, and agree to be bound by all terms and conditions of this Licence. This Licence represents the complete agreement between you and us regarding your use of Our Software and supersedes all prior agreements and understandings.* diff --git a/src/content/docs/legal/privacy.md b/src/content/docs/legal/privacy.md index b61e7cf..aa6ca7b 100644 --- a/src/content/docs/legal/privacy.md +++ b/src/content/docs/legal/privacy.md @@ -2,241 +2,464 @@ title: Privacy Policy --- -## 1. Overview and Scope +**YOUR PRIVACY RIGHTS AND OUR DATA PROTECTION COMMITMENTS** -### 1.1. General Applicability +## 1. INTRODUCTION AND SCOPE -This privacy policy ("General Policy") governs the collection, use, storage, and protection of data across all our services, platforms, and applications (collectively referred to as "Services"). +### 1.1 About This Policy -### 1.2. Project-Specific Policies +This Privacy Policy ("Policy") sets out how nhcarrigan ("we," "us," "our," or "the Company") collects, uses, stores, and protects your personal information when you use our services, applications, and platforms (collectively, the "Services"). -Individual projects or Services may be subject to additional, project-specific privacy policies ("Project Policies"). These Project Policies apply concurrently with the General Policy. In the event of any conflict between the General Policy and a Project Policy, the stricter privacy protections shall prevail. +### 1.2 Policy Applicability -### 1.3. Policy Updates and Retroactivity +This Policy applies to: -We reserve the right to modify, amend, or update this General Policy and any Project Policies at any time. All changes to these policies, including the General Policy and any Project Policies, are retroactive and apply to previously collected data as well as data collected after the changes take effect. +**(a)** All services, websites, and applications operated by nhcarrigan; -### 1.4. Notification of Changes +**(b)** All users of our Services, regardless of location; -We will make reasonable efforts to notify users of significant changes to our privacy policies. However, it is the user's responsibility to regularly review the applicable privacy policies for any updates. +**(c)** All personal data collected through our Services; -### 1.5. Acceptance of Terms +**(d)** Both current and former users of our Services. -By accessing, using, or continuing to use our Services, you explicitly acknowledge and agree to be bound by the most current version of the General Policy and any applicable Project Policies. If you do not agree with the terms of these policies, you must immediately cease using our Services. +### 1.3 Additional Policies -### 1.6. Effective Date +Specific Services may be subject to additional privacy notices or terms ("Service-Specific Policies"). Where such policies exist: -The effective date of the current version of this policy will be clearly stated at the beginning of the document. Each revision will be numbered or dated for easy reference. +**(a)** They supplement this main Policy; -## 2. Data Collection, Documentation, and User Rights +**(b)** In case of conflict, the most privacy-protective terms shall apply; -### 2.1. Data Collection Practices +**(c)** We shall clearly identify when additional policies apply. -We strive to collect only the data necessary for the proper functioning and improvement of our Services. However, the scope of data collection may change as our Services evolve. +### 1.4 Policy Updates -### 2.2. Documentation Efforts +We reserve the right to update this Policy at any time. Changes may: -We make every effort to maintain accurate and up-to-date documentation regarding our data collection practices. This includes: +**(a)** Take effect immediately upon publication; -- Regular reviews of our data collection processes -- Timely updates to our privacy policy and related documentation -- Clear communication about significant changes in data collection +**(b)** Apply retroactively to previously collected data; -### 2.3. Potential Undocumented Data Collection +**(c)** Require your continued consent through ongoing use of our Services. -Despite our best efforts, it is possible that at any given time, an application or Service may collect data that is not explicitly documented. This may occur due to: +### 1.5 Acceptance and Consent -- Recent updates or changes to our Services -- Technical issues or bugs -- Third-party integrations or dependencies +By using our Services, you: -### 2.4. General Data Rights +**(a)** Acknowledge that you have read and understood this Policy; -Regardless of whether specific data collection is documented, users have the following rights: +**(b)** Consent to our collection and processing of your personal data as described; -#### 2.4.1. Right to Access: +**(c)** Agree to be bound by the current version of this Policy. -At any time, you may request a complete copy of your data stored by one of our applications. Requests must be done via `privacy@nhcarrigan.com` from the email address the data belongs to. This ensures that a user cannot impersonate you and request your data. We may request additional identifying information, depending on the structure of the data collected by the application. +### 1.6 Contact for Privacy Matters -#### 3.4.2. Right to Rectification: +For all privacy-related inquiries, please contact us at: **privacy@nhcarrigan.com** -You may request corrections to any inaccurate data we hold about you. +## 2. INFORMATION WE COLLECT -#### 3.4.3. Right to Erasure: +### 2.1 Types of Personal Information -At any time, you may request complete removal of your stored data. Requests must be done via `privacy@nhcarrigan.com` from the email address the data belongs to. This ensures that a user cannot impersonate you and request your data. We may request additional identifying information, depending on the structure of the data collected by the application. +We may collect the following categories of personal information: -This will **not** opt you out of future data collection unless specifically requested. We reserve the right to refuse removal requests when the data are necessary for specific functionality of the app, in circumstances where removing your data would compromise the functionality for all users. +**(a)** **Identity Information:** Name, username, email address, and demographic information; -#### 3.4.4. Right to Restrict Processing: +**(b)** **Technical Information:** IP address, browser type, device information, and operating system; -At any time, you may request to opt out of data collection for an application by requesting removal of your data and discontinuing interaction with the application. We may request additional identifying information, depending on the structure of the data collected by the application. +**(c)** **Usage Information:** How you interact with our Services, including pages visited and features used; -We reserve the right to refuse opt-out requests when the data are necessary for specific functionality of the app, in circumstances where opting-out would compromise the functionality for all users. +**(d)** **Communication Information:** Messages sent through our platforms and support communications; -#### 3.4.5. Right to Data Portability: +**(e)** **Account Information:** Registration details, preferences, and account settings. -You may request a copy of your data in a structured, commonly used, and machine-readable format. +### 2.2 Methods of Collection -### 3.5. Exercising Your Rights +We collect personal information through: -To exercise any of these rights or to inquire about data we may hold: +**(a)** **Direct Provision:** Information you provide when registering, using our Services, or contacting us; -- Contact us through `privacy@nhcarrigan.com`. -- Be prepared to verify your identity to protect the security of your information +**(b)** **Automated Collection:** Technical data collected through cookies, logs, and analytics tools; -### 3.6. Opting Out of Data Collection +**(c)** **Third-Party Sources:** Information from integrated services and platforms (with your consent). -- You may cease using our Services -- For specific types of data collection, we may offer granular opt-out options -- Note that opting out of essential data collection may limit or prevent your use of certain Services +### 2.3 Undocumented Collection -### 3.7. Response Time and Process +Despite our best efforts to maintain comprehensive documentation: -We will make reasonable efforts to respond to all data-related requests within 30 days. Complex requests may require additional time, in which case we will notify you. +**(a)** Some data collection may occur that is not explicitly documented; -### 3.8. Limitations +**(b)** This may result from system updates, third-party integrations, or technical changes; -While we strive to honour all legitimate requests, be aware that legal requirements may sometimes prevent us from fully complying with certain requests. +**(c)** You maintain all privacy rights regardless of documentation status; -### 3.9. Ongoing Commitment +**(d)** We commit to honouring all data subject rights for any collected information. -We are committed to transparency and user privacy. We continuously work to improve our data practices and documentation to ensure the highest standards of data protection and user trust. +## 3. HOW WE USE YOUR INFORMATION -## 4. Data Retention +### 3.1 Primary Purposes -### 4.1. Retention Principle +We process your personal information for the following purposes: -We adhere to the principle of data minimization, storing personal data for the shortest time necessary to fulfil the purposes for which it was collected and to ensure the proper functioning of our applications. +**(a)** **Service Provision:** To provide, operate, and maintain our Services; -### 4.2. Retention Periods +**(b)** **Communication:** To respond to inquiries and provide customer support; -Specific retention periods may vary depending on the type of data and the purpose for which it is processed. Generally: +**(c)** **Improvement:** To analyse usage patterns and enhance our Services; -- Active user data is retained for the duration of the user's account activity -- Inactive user data may be retained for a period after the last user interaction, typically not exceeding 12 months -- Aggregated and anonymized data may be retained indefinitely for analytical purposes +**(d)** **Security:** To protect against fraud, abuse, and security threats; -### 4.3. Automatic Deletion +**(e)** **Legal Compliance:** To fulfil our legal obligations and protect our rights. -Where technically feasible, we implement automated processes to delete or anonymize personal data that has exceeded its retention period. +### 3.2 Legal Basis for Processing -### 4.4. Legal and Regulatory Compliance +Our legal basis for processing personal information includes: -Certain data may be retained for longer periods if required by applicable laws, regulations, or to comply with legal obligations. +**(a)** **Consent:** Where you have explicitly agreed to processing; -### 4.5. Backup Retention +**(b)** **Contract:** Where processing is necessary to perform our Services; -For data recovery purposes, backups may contain personal data for a period beyond the active retention period. These backups are secured and accessed only when necessary for system restoration. +**(c)** **Legitimate Interests:** Where we have legitimate business interests that do not override your rights; -### 4.6. User-Initiated Deletion +**(d)** **Legal Obligation:** Where required by applicable law. -Users may request the deletion of their data at any time, subject to our legitimate business needs and legal obligations. +### 3.3 Automated Decision-Making -## 5. Availability of Data +We may use automated systems for: -### 5.1. Access Control +**(a)** Spam detection and content moderation; -Access to user data is strictly controlled and limited to authorized members of the nhcarrigan team on a need-to-know basis. +**(b)** Security threat identification; -### 5.2. Purpose Limitation +**(c)** Service personalisation and recommendations. -Data access by the nhcarrigan team is permitted only for the following purposes: +You have the right to request human review of automated decisions that significantly affect you. -- Debugging application issues -- Improving application functionality and user experience -- Contributing to the development and maintenance of the application -- Responding to user support requests -- Ensuring compliance with legal and regulatory requirements +## 4. DATA SHARING AND DISCLOSURE -### 5.3. Data Security Measures +### 4.1 Internal Access -We implement robust security measures to protect data from unauthorized access, including but not limited to: +Access to your personal information within our organisation is restricted to: -- Encryption of data in transit and at rest -- Multi-factor authentication for developer accounts -- Regular security audits and vulnerability assessments -- Logging of data access and modifications +**(a)** Authorised team members on a need-to-know basis; -### 5.4. Developer Training and Accountability +**(b)** Personnel responsible for system maintenance and support; -All team members with data access are: +**(c)** Individuals involved in legal compliance and security matters. -- Required to undergo privacy and security training -- Bound by confidentiality agreements -- Subject to disciplinary action for unauthorized data access or misuse +### 4.2 Third-Party Sharing -### 5.5. Third-Party Access +We may share your information with: -We do not sell user data. In cases where third-party service providers require access to perform specific functions: +**(a)** **Service Providers:** Third-party companies that help us operate our Services; -- Access is limited to the minimum necessary data -- Providers are bound by strict contractual obligations to protect user data -- We regularly review and audit third-party practices +**(b)** **Legal Authorities:** When required by law, court order, or to protect legal rights; -### 5.6. Transparency +**(c)** **Business Partners:** With your explicit consent and for specific purposes; -We maintain logs of data access by our team and can provide this information upon justified request, subject to privacy and security considerations. +**(d)** **Successors:** In the event of a merger, acquisition, or business transfer. -### 5.7. User Data Requests +### 4.3 Data Sale Prohibition -Users may request information about how their data has been accessed or used by contacting our designated data protection contact. +We do not and will not sell your personal information to third parties for commercial purposes. -### 5.8. Continuous Improvement +### 4.4 International Transfers -We regularly review and update our data handling practices to ensure the highest standards of data protection and to minimize unnecessary access to personal information. +Your information may be transferred to and processed in countries other than your own. We ensure appropriate safeguards are in place for such transfers, including: -## 6. Contact Information and Data Inquiries +**(a)** Adequacy decisions by relevant authorities; -We value transparency and are committed to addressing any questions or concerns you may have regarding our privacy practices. There are several ways to reach us: +**(b)** Standard contractual clauses; -### 6.1. Forum +**(c)** Other legally recognised transfer mechanisms. -For immediate assistance and community support, join our forum: https://forum.nhcarrigan.com +## 5. YOUR PRIVACY RIGHTS -### 6.2. Email Contact +### 5.1 General Rights -For privacy-specific inquiries or formal requests, please email: `privacy@nhcarrigan.com` +Regardless of your location, you have the following rights regarding your personal information: -### 6.3. Response Time +**(a)** **Right of Access:** Request a copy of the personal information we hold about you; -We strive to respond to all inquiries within 5 business days. Complex issues may require additional time. +**(b)** **Right of Rectification:** Request correction of inaccurate or incomplete information; -### 6.4. Types of Inquiries +**(c)** **Right of Erasure:** Request deletion of your personal information in certain circumstances; -We welcome contact regarding: +**(d)** **Right to Restrict Processing:** Request limitation of how we process your information; -- Questions about this privacy policy -- Inquiries about our data collection and use practices -- Requests to exercise your data rights (access, rectification, erasure, etc.) -- Reporting of potential data breaches or security concerns -- Suggestions for improving our privacy practices +**(e)** **Right to Data Portability:** Receive your information in a structured, commonly used format. -### 6.5. Information to Include +### 5.2 Exercising Your Rights -To help us address your inquiry efficiently, please include: +To exercise any of these rights: -- Your full name -- The email address associated with your account (if applicable) -- A detailed description of your question or concern -- Any relevant dates, times, or specific instances related to your inquiry +**(a)** Submit requests to **privacy@nhcarrigan.com** from the email address associated with your account; -### 6.6. Verification Process +**(b)** Provide sufficient information to verify your identity; -For security reasons, we may need to verify your identity before processing certain requests, especially those related to personal data. +**(c)** Specify clearly which right you wish to exercise; -### 6.7. Alternative Contact Methods +**(d)** Include any relevant details or documentation to support your request. -If you are unable to use Discord or email, please visit our website for additional contact options: https://nhcarrigan.com +### 5.3 Response Timeframes -### 6.8. Updates and Notifications +We endeavour to respond to all privacy requests within: -If you wish to receive updates about changes to our privacy policy or data practices, please bookmark this page. +**(a)** **Simple requests:** Five (5) business days; -### 6.9. Legal Inquiries +**(b)** **Complex requests:** Thirty (30) days, with notification if additional time is required; -For legal or formal inquiries, please use the email provided above and clearly mark your message as a legal inquiry. +**(c)** **Urgent security matters:** Within twenty-four (24) hours where possible. -### 6.10. Accessibility +### 5.4 Limitations on Rights -If you require this information in an alternative format for accessibility reasons, please let us know, and we will do our best to accommodate your needs. +Your privacy rights may be limited where: + +**(a)** Deletion would compromise essential functionality for all users; + +**(b)** We have overriding legitimate interests or legal obligations; + +**(c)** Information is necessary for the establishment, exercise, or defence of legal claims; + +**(d)** Processing is required for compliance with legal obligations. + +## 6. DATA RETENTION AND DELETION + +### 6.1 Retention Principles + +We retain personal information based on the following principles: + +**(a)** **Data Minimisation:** We keep only what is necessary for the stated purposes; + +**(b)** **Purpose Limitation:** Information is retained only as long as needed for its original purpose; + +**(c)** **Legal Requirements:** Some information may be retained to comply with legal obligations. + +### 6.2 Retention Periods + +General retention periods include: + +**(a)** **Active Account Data:** Retained whilst your account remains active; + +**(b)** **Inactive Account Data:** Retained for up to twelve (12) months after last activity; + +**(c)** **Communication Records:** Retained for up to three (3) years for support purposes; + +**(d)** **Legal and Compliance Data:** Retained as required by applicable laws. + +### 6.3 Automated Deletion + +Where technically feasible, we implement automated systems to: + +**(a)** Delete information that has exceeded its retention period; + +**(b)** Anonymise data where deletion is not possible; + +**(c)** Regularly review and purge unnecessary information. + +### 6.4 Backup Retention + +For system recovery purposes: + +**(a)** Backups may contain personal information beyond active retention periods; + +**(b)** Backup systems are secured and accessed only when necessary for restoration; + +**(c)** Personal information in backups is subject to the same protection standards. + +## 7. DATA SECURITY + +### 7.1 Security Measures + +We implement comprehensive security measures including: + +**(a)** **Encryption:** Data is encrypted both in transit and at rest; + +**(b)** **Access Controls:** Multi-factor authentication and role-based access restrictions; + +**(c)** **Monitoring:** Continuous monitoring for security threats and unauthorised access; + +**(d)** **Regular Audits:** Periodic security assessments and vulnerability testing. + +### 7.2 Personnel Security + +All team members with access to personal information: + +**(a)** Undergo privacy and security training; + +**(b)** Sign confidentiality agreements; + +**(c)** Are subject to background checks where legally permissible; + +**(d)** Face disciplinary action for unauthorised access or misuse. + +### 7.3 Incident Response + +In the event of a data breach: + +**(a)** We will investigate and contain the incident promptly; + +**(b)** Affected users will be notified within seventy-two (72) hours where feasible; + +**(c)** Relevant authorities will be notified as required by law; + +**(d)** We will provide regular updates on our investigation and remediation efforts. + +### 7.4 Third-Party Security + +Third-party service providers must: + +**(a)** Maintain equivalent security standards; + +**(b)** Sign data processing agreements; + +**(c)** Undergo regular security assessments; + +**(d)** Notify us immediately of any security incidents. + +## 8. COOKIES AND TRACKING TECHNOLOGIES + +### 8.1 Use of Cookies + +We use cookies and similar technologies to: + +**(a)** Remember your preferences and settings; + +**(b)** Analyse usage patterns and improve our Services; + +**(c)** Provide personalised content and features; + +**(d)** Maintain security and prevent fraud. + +### 8.2 Types of Cookies + +We may use the following types of cookies: + +**(a)** **Essential Cookies:** Necessary for basic functionality; + +**(b)** **Performance Cookies:** Help us understand how our Services are used; + +**(c)** **Functional Cookies:** Remember your choices and preferences; + +**(d)** **Targeting Cookies:** Used to deliver relevant content (with consent). + +### 8.3 Cookie Management + +You can manage cookies through: + +**(a)** Your browser settings; + +**(b)** Our cookie preference centre (where available); + +**(c)** Opt-out tools provided by third-party services. + +Please note that disabling certain cookies may affect the functionality of our Services. + +## 9. CHILDREN'S PRIVACY + +### 9.1 Age Restrictions + +Our Services are not intended for children under the age of thirteen (13), or the minimum digital age of consent in your jurisdiction, whichever is higher. + +### 9.2 Collection from Children + +We do not knowingly collect personal information from children under the applicable minimum age. If we become aware that we have collected such information: + +**(a)** We will delete the information promptly; + +**(b)** We will notify the child's parent or guardian if possible; + +**(c)** We will take steps to prevent future collection. + +### 9.3 Parental Rights + +Parents and guardians have the right to: + +**(a)** Review any personal information we hold about their child; + +**(b)** Request deletion of their child's information; + +**(c)** Refuse to permit further collection from their child. + +## 10. CONTACT INFORMATION AND COMPLAINTS + +### 10.1 Privacy Contact + +For all privacy-related matters, contact our Data Protection Officer at: + +**Email:** privacy@nhcarrigan.com + +**Forum:** https://forum.nhcarrigan.com (for general inquiries) + +### 10.2 Information to Include + +When contacting us about privacy matters, please provide: + +**(a)** Your full name and contact information; + +**(b)** Details of your request or concern; + +**(c)** Any relevant account information or identifiers; + +**(d)** Supporting documentation if applicable. + +### 10.3 Response Commitment + +We commit to: + +**(a)** Acknowledging all privacy inquiries within two (2) business days; + +**(b)** Providing substantive responses within the timeframes specified in this Policy; + +**(c)** Treating all inquiries with respect and confidentiality; + +**(d)** Following up to ensure your concerns have been adequately addressed. + +### 10.4 Complaints and Escalation + +If you are not satisfied with our response: + +**(a)** You may request escalation to senior management; + +**(b)** You have the right to lodge a complaint with relevant data protection authorities; + +**(c)** You may seek independent legal advice regarding your rights. + +### 10.5 Supervisory Authority Contact + +For complaints in jurisdictions with data protection authorities, you may contact your local supervisory authority. In the European Union, you can find your local authority at: https://edpb.europa.eu/about-edpb/board/members_en + +## 11. UPDATES AND EFFECTIVE DATE + +### 11.1 Policy Updates + +We may update this Policy periodically to reflect: + +**(a)** Changes in our data processing practices; + +**(b)** New legal requirements or regulatory guidance; + +**(c)** Feedback from users and data protection authorities; + +**(d)** Technological developments and security enhancements. + +### 11.2 Notification of Changes + +We will notify you of material changes through: + +**(a)** Prominent notices on our Services; + +**(b)** Email notifications to registered users; + +**(c)** Updates to our website and documentation. + +### 11.3 Version History + +Previous versions of this Policy are available upon request for transparency and reference purposes. + +**Last Updated:** 15 September 2025 + +**Effective Date:** 15 September 2025 + +--- + +*This Privacy Policy is designed to comply with applicable data protection laws whilst providing clear information about our privacy practices. If you have any questions or concerns, please do not hesitate to contact us.* diff --git a/src/content/docs/legal/security.md b/src/content/docs/legal/security.md index 23655e3..29bea5a 100644 --- a/src/content/docs/legal/security.md +++ b/src/content/docs/legal/security.md @@ -2,135 +2,606 @@ title: Security Policy --- -## 1. Introduction +**PROTECTING OUR SYSTEMS AND YOUR DATA THROUGH RESPONSIBLE SECURITY PRACTICES** -This Security Policy outlines the procedures for reporting security vulnerabilities in our applications and the terms under which we handle such reports. By participating in our security reporting process, you agree to comply with this policy. +## 1. INTRODUCTION AND SCOPE -## 2. Scope +### 1.1 Policy Overview -This policy applies to all applications, services, and systems maintained by our organization, including but not limited to: +This Security Policy ("Policy") establishes the procedures and terms under which we handle the reporting and resolution of security vulnerabilities discovered in our applications, systems, and services. By participating in our security reporting process, you acknowledge and agree to comply with all provisions of this Policy. -- Our main websites and applications -- All open-source projects hosted on our repositories -- Any associated APIs or backend services +### 1.2 Scope of Coverage -## 3. Reporting a Vulnerability +This Policy applies to all applications, services, and systems maintained by nhcarrigan, including but not limited to: -### 3.1 Reporting Channels +**(a)** All primary websites and web applications operated under our domain; -If you discover a security vulnerability within any of our applications or systems, please report it through one of the following secure channels: +**(b)** Mobile applications distributed through official channels; -1. Send an email to `security@nhcarrigan.com` +**(c)** Open-source projects hosted in our official repositories; -### 3.2 Public Disclosure Prohibition +**(d)** Application Programming Interfaces (APIs) and backend services; -Do NOT disclose the vulnerability publicly or through any public channels, including but not limited to: +**(e)** Infrastructure and hosting environments that support our services; -- Public GitHub issues -- Social media platforms -- Public forums or chat rooms -- Blog posts or articles +**(f)** Associated documentation, support systems, and auxiliary platforms. -### 3.3 Required Information +### 1.3 Security Principles -When reporting a vulnerability, please provide: +Our security programme is founded on the following principles: -- A detailed description of the vulnerability -- Steps to reproduce the issue -- Potential impact of the vulnerability -- Any suggested mitigation or fix (if known) +**(a)** **Transparency:** We maintain open communication about our security practices whilst protecting sensitive operational details; -## 4. Response Process +**(b)** **Collaboration:** We work cooperatively with security researchers and the broader community to identify and address vulnerabilities; -### 4.1 Acknowledgment +**(c)** **Continuous Improvement:** We regularly assess and enhance our security measures based on emerging threats and best practices; -We will acknowledge receipt of your vulnerability report within 3 business days. +**(d)** **User Protection:** Our primary focus is protecting the confidentiality, integrity, and availability of user data and systems. -### 4.2 Assessment and Verification +### 1.4 Legal Framework -Our security team will assess the reported vulnerability and may contact you for additional information if needed. +This Policy is designed to operate within the framework of applicable laws and regulations, including but not limited to computer fraud and abuse laws, data protection regulations, and responsible disclosure principles recognised in the security research community. -### 4.3 Resolution Timeline +## 2. VULNERABILITY REPORTING PROCEDURES -We strive to resolve confirmed vulnerabilities within 90 days of the initial report, depending on the complexity and severity of the issue. +### 2.1 Reporting Channels -## 5. Disclosure Policy +If you discover a security vulnerability within any of our systems or applications, please report it exclusively through our designated secure reporting channel: -### 5.1 Coordinated Disclosure +**Primary Contact:** security@nhcarrigan.com -We practice coordinated disclosure. We will work with you to ensure that a fix is available before any public disclosure of the vulnerability. +**Subject Line Format:** [SECURITY] Brief description of vulnerability -### 5.2 Public Acknowledgment +**Alternative Contact:** For urgent matters requiring immediate attention, you may also contact our general support team with clear indication of the security nature of your report. -With your permission, we may publicly acknowledge your contribution in discovering and reporting the vulnerability after it has been resolved. +### 2.2 Public Disclosure Prohibition -## 6. Legal Safe Harbor +To protect our users and systems, you must not disclose security vulnerabilities publicly or through any public channels until we have had reasonable opportunity to investigate and address the issue. Prohibited disclosure methods include, but are not limited to: -### 6.1 Authorization +**(a)** Public GitHub issues or pull requests; -We authorize security research and vulnerability disclosure activities, provided they are conducted in accordance with this policy and all applicable laws. +**(b)** Social media platforms (Twitter, LinkedIn, Facebook, etc.); -### 6.2 Scope of Protection +**(c)** Public forums, discussion boards, or community platforms; -We will not initiate legal action for accidental, good faith violations of this policy. This safe harbor applies only to activities that: +**(d)** Blog posts, articles, or public presentations; -- Comply with all aspects of this Security Policy -- Do not compromise or attempt to compromise the privacy or safety of our users, employees, or systems -- Do not violate any applicable laws +**(e)** Security mailing lists or vulnerability databases; -### 6.3 Limitations +**(f)** Any other medium accessible to the general public. -This safe harbor does not apply to: +### 2.3 Required Information for Vulnerability Reports -- Vulnerabilities or information obtained through means other than security research -- Research conducted on third-party applications or services that integrate with our systems +To facilitate effective investigation and resolution, please include the following information in your vulnerability report: -## 7. Bug Bounty Program +**(a)** **Detailed Description:** A comprehensive explanation of the vulnerability, including the potential security impact and risk level; -We do not currently offer monetary rewards or "bug bounties" for reporting security vulnerabilities. Your contributions to our security are greatly appreciated, but are on a voluntary basis. +**(b)** **Reproduction Steps:** Clear, step-by-step instructions that allow our team to reproduce the vulnerability consistently; -We will gladly thank you in our [Hall of Fame](/community/hall-of-fame) +**(c)** **Technical Details:** Relevant technical information such as affected URLs, parameters, request/response examples, and system configurations; -## 8. Data Protection and Privacy +**(d)** **Proof of Concept:** Where appropriate and safe, include demonstration code or screenshots that illustrate the vulnerability without causing harm; -### 8.1 Handling of Submitted Information +**(e)** **Suggested Remediation:** If known, provide recommendations for addressing the vulnerability or mitigating the risk; -Any information you provide in your vulnerability report will be handled in accordance with our Privacy Policy and applicable data protection laws. +**(f)** **Discovery Context:** Information about how the vulnerability was discovered and any tools or techniques used. -### 8.2 Confidentiality +### 2.4 Information Handling and Confidentiality -We will treat all vulnerability reports as confidential and will not share the information beyond what is necessary to address the reported issue. +All vulnerability reports and related communications will be handled with strict confidentiality in accordance with our privacy policy and applicable data protection laws. We commit to: -## 9. Proactive Measures +**(a)** Limiting access to vulnerability information to authorised personnel only; -In order to maintain the best possible effort to protect your data and the safety of our applications, we implement the following proactive security measures. +**(b)** Implementing appropriate security measures to protect report details; -### 9.1. Code Scanning +**(c)** Not sharing vulnerability information with third parties without explicit consent, except as required by law; -Our projects are scanned for potential security risks and vulnerabilities using SonarQube. You can view the latest scan reports [on our dashboard](https://quality.nhcarrigan.link). +**(d)** Maintaining detailed records of all communications and actions taken. -### 9.2. Local Scanning +## 3. RESPONSE PROCEDURES AND TIMELINES -We also run a weekly scan on all of our projects using local tooling: +### 3.1 Initial Acknowledgement -- Gitleaks (to detect leaked secrets and credentials) -- Grype (secondary detection for vulnerabilities in dependencies) -- Snyk (in-depth scanning of code and dependencies) -- Syft (to generate Software Bill of Materials for third-party auditors to use) -- Trivy (to detect vulnerabilities in dependencies) +We will acknowledge receipt of your vulnerability report within the following timeframes: -The results of these scans are found at https://security.nhcarrigan.com +**(a)** **Standard Reports:** Within three (3) business days of receipt; -## 10. Compliance with Laws and Regulations +**(b)** **High-Priority Reports:** Within twenty-four (24) hours for reports indicating critical vulnerabilities or active exploitation; -All security research and vulnerability disclosure activities must comply with all applicable local, state, and federal laws, as well as any relevant international laws. +**(c)** **Complex Reports:** Within five (5) business days for reports requiring initial technical assessment before acknowledgement. -## 11. Policy Updates +### 3.2 Assessment and Verification Process -We reserve the right to update or modify this Security Policy at any time. Any changes will be effective immediately upon posting the updated policy on our website or repository. +Following initial acknowledgement, our security team will: -## 12. Contact Information +**(a)** Conduct a thorough technical assessment of the reported vulnerability; -For any questions regarding this Security Policy, please contact us at `security@nhcarrigan.com`. +**(b)** Attempt to reproduce the issue using the provided steps and information; -By reporting a security vulnerability to us, you acknowledge that you have read, understood, and agree to this Security Policy. +**(c)** Evaluate the potential impact and risk level of the vulnerability; + +**(d)** Determine the scope of affected systems and users; + +**(e)** Develop an appropriate response and remediation plan. + +### 3.3 Communication and Updates + +Throughout the investigation and resolution process, we will: + +**(a)** Provide regular status updates on the progress of our investigation; + +**(b)** Communicate any additional information required to complete our assessment; + +**(c)** Notify you of our preliminary findings and proposed resolution timeline; + +**(d)** Keep you informed of any changes to our remediation plans or timelines. + +### 3.4 Resolution Timeline + +We are committed to resolving confirmed vulnerabilities within the following timeframes: + +**(a)** **Critical Vulnerabilities:** Within seven (7) days for issues posing immediate risk to user data or system integrity; + +**(b)** **High-Risk Vulnerabilities:** Within thirty (30) days for significant security issues requiring comprehensive remediation; + +**(c)** **Medium-Risk Vulnerabilities:** Within sixty (60) days for moderate security concerns; + +**(d)** **Low-Risk Vulnerabilities:** Within ninety (90) days for minor security issues; + +**(e)** **Complex Vulnerabilities:** Extended timelines may be necessary for issues requiring significant architectural changes or third-party coordination, with regular communication about progress. + +## 4. COORDINATED DISCLOSURE POLICY + +### 4.1 Coordinated Disclosure Principles + +We practice coordinated disclosure to balance transparency with security. This approach ensures that: + +**(a)** Vulnerabilities are thoroughly investigated and properly addressed before public disclosure; + +**(b)** Users and affected parties have adequate time to apply security updates; + +**(c)** The security research community benefits from shared knowledge whilst minimising potential harm. + +### 4.2 Disclosure Timeline + +Our standard coordinated disclosure timeline follows this process: + +**(a)** **Initial Report:** Vulnerability reported through appropriate channels; + +**(b)** **Assessment Period:** Investigation and verification (up to 30 days); + +**(c)** **Remediation Period:** Development and deployment of fixes (30-90 days depending on complexity); + +**(d)** **Public Disclosure:** Joint announcement of vulnerability and resolution (after fix deployment and reasonable notice period). + +### 4.3 Public Acknowledgement + +With your explicit consent, we may publicly acknowledge your contribution in discovering and reporting the vulnerability after it has been resolved. Such acknowledgement may include: + +**(a)** Recognition in our security advisories or public statements; + +**(b)** Listing in our security researchers hall of fame; + +**(c)** Social media recognition and appreciation; + +**(d)** References in relevant security documentation or case studies. + +### 4.4 Researcher Discretion + +You retain the right to: + +**(a)** Request anonymity in all public communications and acknowledgements; + +**(b)** Decline participation in joint disclosure activities; + +**(c)** Publish your own disclosure after coordinated resolution, following responsible disclosure principles; + +**(d)** Specify your preferred method and format for public acknowledgement. + +## 5. LEGAL SAFE HARBOUR PROVISIONS + +### 5.1 Authorisation for Security Research + +We explicitly authorise security research and vulnerability disclosure activities conducted in accordance with this Policy and applicable laws. This authorisation is intended to encourage responsible security research whilst protecting both researchers and our organisation. + +### 5.2 Scope of Safe Harbour Protection + +Our safe harbour provisions apply to security research activities that: + +**(a)** Comply with all requirements and restrictions outlined in this Policy; + +**(b)** Are conducted in good faith for the purpose of improving security; + +**(c)** Do not compromise the privacy, safety, or security of our users, employees, or systems; + +**(d)** Do not violate applicable laws or regulations; + +**(e)** Are conducted without commercial motivation or malicious intent. + +### 5.3 Protected Activities + +Under this safe harbour, we will not initiate legal action against researchers for activities including: + +**(a)** Accessing systems or data necessary to identify and document security vulnerabilities; + +**(b)** Circumventing security measures solely for the purpose of vulnerability research; + +**(c)** Creating accounts or using services as reasonably necessary for security testing; + +**(d)** Downloading or accessing data that is the direct result of a security vulnerability, provided such access is limited to demonstrating the issue. + +### 5.4 Limitations and Exclusions + +This safe harbour protection does not apply to: + +**(a)** Activities that violate applicable laws, regardless of research intent; + +**(b)** Research conducted on third-party systems or applications that integrate with our services; + +**(c)** Activities that involve social engineering, phishing, or physical security testing; + +**(d)** Accessing, modifying, or deleting data belonging to other users; + +**(e)** Conducting denial-of-service attacks or similar disruptive activities; + +**(f)** Activities conducted after we have requested cessation or identified security policy violations. + +### 5.5 Compliance Requirements + +To maintain safe harbour protection, researchers must: + +**(a)** Report vulnerabilities through designated channels within a reasonable timeframe; + +**(b)** Provide sufficient detail to allow us to reproduce and address the vulnerability; + +**(c)** Avoid disclosing vulnerabilities publicly before coordinated resolution; + +**(d)** Cooperate with our investigation and remediation efforts; + +**(e)** Cease testing activities upon request from our security team. + +## 6. BUG BOUNTY PROGRAMME + +### 6.1 Current Programme Status + +At present, we do not operate a formal monetary bug bounty programme. Our security efforts rely on the goodwill and community spirit of security researchers who contribute to improving our security posture on a voluntary basis. + +### 6.2 Non-Monetary Recognition + +While we do not currently offer financial rewards, we deeply appreciate security researchers' contributions and provide recognition through: + +**(a)** **Hall of Fame Recognition:** Public acknowledgement in our security contributors hall of fame; + +**(b)** **Community Recognition:** Acknowledgement in our community forums and social media channels; + +**(c)** **Professional References:** With your consent, we may serve as a reference for your security research activities; + +**(d)** **Networking Opportunities:** Introduction to other security professionals and organisations within our network. + +### 6.3 Future Programme Development + +We continuously evaluate the possibility of implementing a formal bug bounty programme. Factors influencing this decision include: + +**(a)** The volume and quality of vulnerability reports received; + +**(b)** Available resources for programme administration and reward distribution; + +**(c)** Legal and regulatory considerations in relevant jurisdictions; + +**(d)** Alignment with our organisational priorities and community values. + +### 6.4 Alternative Contribution Opportunities + +Security researchers interested in contributing to our security efforts may also consider: + +**(a)** Contributing to our open-source security tools and documentation; + +**(b)** Participating in community discussions about security best practices; + +**(c)** Helping to educate other community members about security awareness; + +**(d)** Collaborating on security-related content and educational materials. + +## 7. DATA PROTECTION AND PRIVACY + +### 7.1 Handling of Submitted Information + +All information provided in vulnerability reports will be processed and protected in accordance with our Privacy Policy and applicable data protection laws. This includes: + +**(a)** Implementing appropriate technical and organisational measures to protect report data; + +**(b)** Limiting access to vulnerability information to authorised personnel only; + +**(c)** Using vulnerability information solely for the purpose of investigation and remediation; + +**(d)** Maintaining confidentiality of researcher information and contact details. + +### 7.2 Data Retention Policies + +We retain vulnerability reports and related communications: + +**(a)** **Active Cases:** For the duration of the investigation and remediation process; + +**(b)** **Resolved Cases:** For up to three (3) years following resolution for audit and reference purposes; + +**(c)** **Legal Requirements:** As required by applicable laws and regulations; + +**(d)** **Historical Analysis:** Anonymised trend data may be retained indefinitely for security improvement purposes. + +### 7.3 Confidentiality Commitments + +We commit to treating all vulnerability reports as confidential information and will not: + +**(a)** Share report details with unauthorised third parties; + +**(b)** Use vulnerability information for purposes other than remediation and security improvement; + +**(c)** Disclose researcher identity or contact information without explicit consent; + +**(d)** Publicly discuss specific vulnerability details before coordinated disclosure. + +### 7.4 Researcher Privacy Rights + +Security researchers maintain standard privacy rights regarding their personal information, including: + +**(a)** The right to request access to personal data we hold about them; + +**(b)** The right to request correction of inaccurate personal information; + +**(c)** The right to request deletion of personal data in certain circumstances; + +**(d)** The right to object to or restrict processing of personal data where legally applicable. + +## 8. PROACTIVE SECURITY MEASURES + +### 8.1 Security Monitoring and Assessment + +To maintain the highest possible security standards and protect user data, we implement comprehensive proactive security measures across all our systems and applications. + +### 8.2 Automated Security Scanning + +Our security programme includes regular automated scanning and assessment using industry-standard tools: + +**(a)** **Static Code Analysis:** Regular scanning of source code for potential security vulnerabilities using SonarQube and similar tools; + +**(b)** **Dynamic Application Security Testing:** Ongoing testing of running applications to identify runtime vulnerabilities; + +**(c)** **Infrastructure Scanning:** Regular assessment of our hosting infrastructure and network security; + +**(d)** **Dependency Scanning:** Continuous monitoring of third-party libraries and components for known vulnerabilities. + +### 8.3 Security Tool Integration + +We utilise a comprehensive suite of security tools integrated into our development and deployment processes: + +**(a)** **Gitleaks:** Automated detection of secrets, credentials, and sensitive information in code repositories; + +**(b)** **Grype:** Secondary vulnerability scanning for dependencies and container images; + +**(c)** **Snyk:** In-depth analysis of code and dependencies for security vulnerabilities and license compliance; + +**(d)** **Syft:** Generation of Software Bills of Materials (SBOMs) for third-party security audits; + +**(e)** **Trivy:** Comprehensive vulnerability scanning for containers, filesystems, and cloud configurations. + +### 8.4 Public Security Reporting + +We maintain transparency about our security posture through publicly accessible security reports and dashboards: + +**(a)** **Quality Dashboard:** Real-time security and quality metrics available at https://quality.nhcarrigan.link; + +**(b)** **Security Reports:** Comprehensive security scan results published at https://security.nhcarrigan.com; + +**(c)** **Regular Updates:** Weekly scanning cycles ensure up-to-date security information; + +**(d)** **Trend Analysis:** Historical data tracking to identify and address security trends over time. + +### 8.5 Security Development Lifecycle + +Our development processes incorporate security at every stage: + +**(a)** **Secure Coding Standards:** All developers follow established secure coding guidelines and best practices; + +**(b)** **Security Code Reviews:** Mandatory security-focused code reviews for all changes and new features; + +**(c)** **Automated Testing:** Security tests integrated into continuous integration and deployment pipelines; + +**(d)** **Regular Training:** Ongoing security awareness and training for all development team members. + +## 9. COMPLIANCE AND REGULATORY CONSIDERATIONS + +### 9.1 Legal Compliance Requirements + +All security research and vulnerability disclosure activities must comply with applicable laws and regulations, including but not limited to: + +**(a)** Computer Fraud and Abuse Act (CFAA) and similar legislation in various jurisdictions; + +**(b)** Data protection and privacy laws (GDPR, CCPA, etc.); + +**(c)** Export control regulations affecting security tools and techniques; + +**(d)** Industry-specific regulations applicable to our services or user base. + +### 9.2 International Considerations + +Given the global nature of our services and user base, researchers should be aware that: + +**(a)** Different jurisdictions may have varying legal frameworks for security research; + +**(b)** Cross-border data transfer and access may be subject to additional regulations; + +**(c)** Some security research techniques may be legal in one jurisdiction but prohibited in another; + +**(d)** Researchers are responsible for ensuring their activities comply with laws in their jurisdiction. + +### 9.3 Ethical Guidelines + +Beyond legal compliance, we expect all security research to adhere to widely recognised ethical guidelines: + +**(a)** **Minimise Harm:** Avoid actions that could compromise user privacy, data integrity, or system availability; + +**(b)** **Respect Boundaries:** Cease testing when requested or when encountering systems outside our scope; + +**(c)** **Professional Conduct:** Maintain professional standards in all communications and interactions; + +**(d)** **Community Benefit:** Focus on activities that benefit the broader security community and user protection. + +### 9.4 Reporting Regulatory Concerns + +If vulnerability research reveals potential regulatory compliance issues or legal violations: + +**(a)** Include such concerns in your initial vulnerability report; + +**(b)** We will assess the regulatory implications as part of our investigation; + +**(c)** We may need to report certain types of vulnerabilities to relevant regulatory authorities; + +**(d)** Researchers will be kept informed of any regulatory reporting requirements that may affect disclosure timelines. + +## 10. CONTACT INFORMATION AND SUPPORT + +### 10.1 Primary Security Contact + +For all security-related matters, including vulnerability reports, questions about this Policy, and general security inquiries: + +**Email:** security@nhcarrigan.com + +**Response Time:** We aim to respond to all security inquiries within 24 hours during business days + +**Emergency Contact:** For critical security issues requiring immediate attention, mark your email with [URGENT] in the subject line + +### 10.2 Alternative Contact Methods + +If you are unable to use our primary email contact: + +**General Support:** contact@nhcarrigan.com (clearly mark security-related messages) + +**Community Forum:** https://forum.nhcarrigan.com (for general security discussions only, not vulnerability reports) + +**Documentation:** This Policy and related security documentation is maintained at our official documentation site + +### 10.3 Response Commitments and Service Levels + +We commit to maintaining the following response standards: + +**(a)** **Initial Acknowledgement:** All security reports acknowledged within 24-72 hours; + +**(b)** **Status Updates:** Regular progress updates provided at least weekly for active investigations; + +**(c)** **Technical Clarification:** Response to technical questions within 2-3 business days; + +**(d)** **Escalation Path:** Clear escalation procedures for urgent matters or communication issues. + +### 10.4 Communication Preferences and Requirements + +To ensure effective communication: + +**(a)** **Language:** All communications should be in English to ensure proper understanding and response; + +**(b)** **Technical Detail:** Provide sufficient technical detail to enable reproduction and assessment; + +**(c)** **Contact Information:** Include reliable contact information for follow-up questions; + +**(d)** **Time Zone Considerations:** Our primary response times are based on Pacific Standard Time business hours. + +### 10.5 Support Resources + +Additional resources available to security researchers: + +**(a)** **Documentation:** Comprehensive security policy documentation and guidelines; + +**(b)** **Community Support:** Access to our community forums for general security discussions; + +**(c)** **Educational Resources:** Links to security research best practices and legal guidelines; + +**(d)** **Feedback Mechanisms:** Opportunities to provide feedback on our security policies and procedures. + +## 11. POLICY UPDATES AND MAINTENANCE + +### 11.1 Regular Review and Updates + +This Security Policy is reviewed and updated regularly to ensure: + +**(a)** **Legal Compliance:** Alignment with current laws and regulations; + +**(b)** **Best Practices:** Incorporation of industry best practices and standards; + +**(c)** **Community Feedback:** Response to input from security researchers and community members; + +**(d)** **Operational Experience:** Refinement based on our experience with vulnerability reports and security incidents. + +### 11.2 Change Notification Process + +Changes to this Policy will be communicated through: + +**(a)** **Direct Notification:** Email notification to researchers who have previously submitted reports; + +**(b)** **Public Announcement:** Updates posted on our website and community forums; + +**(c)** **Documentation Updates:** Version-controlled updates to our official documentation; + +**(d)** **Industry Channels:** Notification through relevant security community channels where appropriate. + +### 11.3 Effective Date and Implementation + +Policy updates will: + +**(a)** Include clear effective dates for all changes; + +**(b)** Provide reasonable notice periods for significant changes; + +**(c)** Maintain backward compatibility for ongoing vulnerability reports; + +**(d)** Include transition procedures for any changes affecting active security research. + +### 11.4 Feedback and Continuous Improvement + +We welcome feedback on this Policy from: + +**(a)** Security researchers who have participated in our vulnerability disclosure process; + +**(b)** Legal and compliance professionals familiar with relevant regulations; + +**(c)** Industry peers and security community members; + +**(d)** Internal team members involved in security operations and incident response. + +## 12. ACKNOWLEDGEMENTS AND RECOGNITION + +### 12.1 Community Appreciation + +We extend our sincere gratitude to the global security research community for their valuable contributions to improving the security of our systems and protecting our users. The collaborative approach to security research benefits everyone and represents the best of community-driven innovation. + +### 12.2 Commitment to Excellence + +This Security Policy represents our ongoing commitment to: + +**(a)** **Transparency:** Maintaining open and honest communication about our security practices; + +**(b)** **Collaboration:** Working cooperatively with researchers to address security concerns; + +**(c)** **Continuous Improvement:** Regularly enhancing our security measures and response procedures; + +**(d)** **User Protection:** Prioritising the security and privacy of our users above all other considerations. + +### 12.3 Future Development + +We are committed to the ongoing development and improvement of our security programme, including: + +**(a)** Regular assessment of our security policies and procedures; + +**(b)** Investment in security tools and technologies; + +**(c)** Training and professional development for our security team; + +**(d)** Engagement with the broader security community and industry initiatives. + +**Last Updated:** 15 September 2025 + +**Effective Date:** 15 September 2025 + +**Policy Version:** 2.0 + +--- + +*By reporting a security vulnerability to us, you acknowledge that you have read, understood, and agree to comply with this Security Policy. This Policy is designed to promote responsible security research whilst protecting the interests of our users, our organisation, and the broader community. For questions about this Policy or to report security vulnerabilities, please contact us at security@nhcarrigan.com.* diff --git a/src/content/docs/legal/sla.md b/src/content/docs/legal/sla.md new file mode 100644 index 0000000..b6970ef --- /dev/null +++ b/src/content/docs/legal/sla.md @@ -0,0 +1,505 @@ +--- +title: Service Level Agreement and Warranty Disclaimer +--- + +**DEFINING SERVICE EXPECTATIONS WHILST PROTECTING AGAINST UNFOUNDED WARRANTY CLAIMS** + +## 1. INTRODUCTION AND SCOPE + +### 1.1 Purpose and Application + +This Service Level Agreement and Warranty Disclaimer ("SLA") establishes the terms and conditions governing the availability, performance, and reliability of services provided by nhcarrigan ("we," "us," "our," or "the Company"). This SLA applies to all users of our services, applications, and platforms (collectively, the "Services"). + +### 1.2 Integration with Other Policies + +This SLA supplements and operates in conjunction with: + +**(a)** Our Terms of Service, which govern the general terms of service usage; + +**(b)** Our Privacy Policy, which governs data collection and processing; + +**(c)** Our Acceptable Use Policy, which defines permissible usage patterns; + +**(d)** All other applicable policies and agreements. + +### 1.3 Scope of Services Covered + +This SLA applies to: + +**(a)** All websites and web applications operated by nhcarrigan; + +**(b)** Application Programming Interfaces (APIs) and related services; + +**(c)** Community platforms and interactive services; + +**(d)** Support services and documentation platforms; + +**(e)** Any other services explicitly designated as covered by this SLA. + +### 1.4 Definitions + +For the purposes of this SLA: + +**(a)** "Availability" means the percentage of time Services are accessible and functional; + +**(b)** "Downtime" means periods when Services are not accessible or functional due to our systems; + +**(c)** "Maintenance Window" means scheduled periods for system maintenance or updates; + +**(d)** "Service Credit" means any remedial measure provided for SLA violations; + +**(e)** "Uptime" means the percentage of time Services are operational and accessible. + +## 2. SERVICE AVAILABILITY COMMITMENTS + +### 2.1 General Availability Targets + +We endeavour to maintain the following availability targets for our Services: + +**(a)** **Primary Services**: 99.5% uptime on a monthly basis, excluding scheduled maintenance; + +**(b)** **API Services**: 99.0% uptime on a monthly basis, excluding scheduled maintenance; + +**(c)** **Community Platforms**: 99.0% uptime on a monthly basis, excluding scheduled maintenance; + +**(d)** **Documentation Services**: 98.0% uptime on a monthly basis, excluding scheduled maintenance. + +### 2.2 Availability Calculation Methodology + +Availability percentages are calculated as follows: + +**(a)** **Measurement Period**: Monthly calendar periods from 00:00 UTC on the first day to 23:59 UTC on the last day; + +**(b)** **Exclusions**: Scheduled maintenance windows, force majeure events, and user-caused outages; + +**(c)** **Monitoring**: Continuous automated monitoring from multiple geographic locations; + +**(d)** **Verification**: All calculations subject to verification through our monitoring systems. + +### 2.3 Scheduled Maintenance + +We reserve the right to perform scheduled maintenance with the following provisions: + +**(a)** **Notice Period**: Minimum 24 hours advance notice for non-emergency maintenance; + +**(b)** **Maintenance Windows**: Typically scheduled during low-usage periods; + +**(c)** **Duration Limits**: Routine maintenance limited to 4 hours per month; + +**(d)** **Emergency Maintenance**: May be performed without advance notice when necessary for security or stability. + +### 2.4 Service Availability Exclusions + +The following circumstances are excluded from availability calculations: + +**(a)** **Scheduled Maintenance**: Planned system updates and maintenance activities; + +**(b)** **Force Majeure**: Natural disasters, acts of terrorism, government actions, or other events beyond our control; + +**(c)** **Third-Party Failures**: Outages caused by internet service providers, cloud platforms, or other external dependencies; + +**(d)** **User-Caused Issues**: Problems resulting from user actions, misconfigurations, or violations of our usage policies; + +**(e)** **Denial of Service Attacks**: Service disruptions caused by malicious attacks or abuse; + +**(f)** **Beta or Experimental Services**: Services explicitly designated as beta, experimental, or pre-release. + +## 3. PERFORMANCE STANDARDS + +### 3.1 Response Time Targets + +We endeavour to maintain the following response time targets: + +**(a)** **Web Application Response**: Average page load time under 3 seconds for standard pages; + +**(b)** **API Response Time**: Average API response time under 500 milliseconds for standard requests; + +**(c)** **Database Query Performance**: Average database response time under 100 milliseconds; + +**(d)** **Static Content Delivery**: Average content delivery time under 1 second globally. + +### 3.2 Performance Measurement + +Performance metrics are measured using: + +**(a)** **Automated Monitoring**: Continuous performance monitoring from multiple locations; + +**(b)** **Real User Monitoring**: Analysis of actual user experience data; + +**(c)** **Synthetic Testing**: Regular automated testing of key user journeys; + +**(d)** **Third-Party Verification**: Independent monitoring services where applicable. + +### 3.3 Performance Factors + +Performance may be affected by: + +**(a)** **Geographic Location**: Distance from our servers and content delivery network; + +**(b)** **Network Conditions**: Internet connectivity quality and bandwidth; + +**(c)** **Device Capabilities**: Processing power and memory of user devices; + +**(d)** **Usage Patterns**: High traffic volumes and concurrent user loads; + +**(e)** **Content Complexity**: Size and complexity of requested resources. + +## 4. WARRANTY DISCLAIMERS + +### 4.1 Reference to Comprehensive Warranty Disclaimers + +**IMPORTANT: Comprehensive warranty disclaimers, including all general, software, third-party service, and data warranties, are set forth in our Limitation of Liability and Indemnification Policy, which is incorporated herein by reference.** + +### 4.2 SLA-Specific Disclaimers + +In addition to the comprehensive disclaimers in our Liability Policy, we specifically disclaim any warranties regarding: + +**(a)** **Specific Availability Levels**: While we endeavour to meet stated availability targets, we do not warrant specific uptime percentages; + +**(b)** **Performance Metrics**: Target performance levels are goals, not guaranteed service levels; + +**(c)** **Service Continuity**: We do not warrant uninterrupted service or elimination of all outages; + +**(d)** **Remedy Completeness**: Service credits and remedies are your sole remedies for service level shortfalls. + +## 5. SERVICE LIMITATIONS AND RESTRICTIONS + +### 5.1 Usage Limitations + +Our Services are subject to the following limitations: + +**(a)** **Rate Limits**: API and automated access may be subject to rate limiting; + +**(b)** **Resource Limits**: Storage, bandwidth, and processing resources may be limited; + +**(c)** **Concurrent User Limits**: Some services may limit concurrent user connections; + +**(d)** **Feature Restrictions**: Certain features may be limited or restricted based on usage patterns. + +### 5.2 Geographic and Legal Restrictions + +Services may be subject to: + +**(a)** **Geographic Limitations**: Some services may not be available in all jurisdictions; + +**(b)** **Export Control Compliance**: Restrictions based on export control and sanctions laws; + +**(c)** **Local Law Compliance**: Limitations required by applicable local laws and regulations; + +**(d)** **Content Restrictions**: Geographic restrictions on certain content or features. + +### 5.3 Technical Limitations + +Users should be aware of the following technical limitations: + +**(a)** **Platform Dependencies**: Services may depend on third-party platforms and services; + +**(b)** **Browser Compatibility**: Web services may not function identically across all browsers; + +**(c)** **Device Limitations**: Mobile applications may have varying functionality across devices; + +**(d)** **Network Requirements**: Services may require stable internet connectivity for full functionality. + +## 6. SERVICE LEVEL REMEDIES AND CREDITS + +### 6.1 Service Level Breach Determination + +A Service Level breach occurs when: + +**(a)** Monthly availability falls below the stated targets in Section 2.1; + +**(b)** The shortfall is verified through our monitoring systems; + +**(c)** The user has properly reported the issue through appropriate channels; + +**(d)** The breach is not due to excluded circumstances listed in Section 2.4. + +### 6.2 Available Remedies + +**IMPORTANT: SERVICE CREDITS ARE YOUR SOLE AND EXCLUSIVE REMEDY FOR SERVICE LEVEL BREACHES.** + +Available remedies for verified Service Level breaches include: + +**(a)** **Service Extension**: Extension of service periods to compensate for downtime; + +**(b)** **Service Credits**: Credits applicable to future services (where paid services are involved); + +**(c)** **Priority Support**: Enhanced support priority for affected users; + +**(d)** **Alternative Solutions**: Reasonable alternative arrangements where technically feasible. + +### 6.3 Remedy Limitations + +Service Level remedies are subject to the following limitations: + +**(a)** **Maximum Credits**: Total credits shall not exceed 100% of monthly service fees (where applicable); + +**(b)** **Request Timeline**: Remedy requests must be submitted within 30 days of the alleged breach; + +**(c)** **Verification Required**: All remedy requests subject to verification through our monitoring data; + +**(d)** **Good Faith Usage**: Remedies available only to users in good standing with all applicable policies. + +### 6.4 Remedy Request Process + +To request Service Level remedies: + +**(a)** **Submission**: Submit requests to support@nhcarrigan.com with "SLA Remedy Request" in the subject line; + +**(b)** **Documentation**: Provide detailed information about the service disruption experienced; + +**(c)** **Verification**: Allow reasonable time for our team to verify the claim against monitoring data; + +**(d)** **Resolution**: We will respond within 10 business days with our determination and any applicable remedies. + +## 7. FORCE MAJEURE AND EXTERNAL FACTORS + +### 7.1 Force Majeure Events + +We shall not be liable for service disruptions caused by force majeure events including: + +**(a)** **Natural Disasters**: Earthquakes, floods, hurricanes, volcanic eruptions, or other natural catastrophes; + +**(b)** **Human Actions**: Wars, terrorism, civil unrest, labour strikes, or government actions; + +**(c)** **Infrastructure Failures**: Power grid failures, internet backbone disruptions, or telecommunications outages; + +**(d)** **Pandemic Events**: Public health emergencies that affect our operations or service delivery. + +### 7.2 Third-Party Dependencies + +Our Services rely on various third-party providers, and we cannot guarantee: + +**(a)** **Cloud Platform Reliability**: Availability of underlying cloud infrastructure providers; + +**(b)** **Internet Service Continuity**: Stability of internet service providers and network infrastructure; + +**(c)** **Payment Processor Availability**: Functionality of payment processing services; + +**(d)** **Content Delivery Networks**: Performance of content distribution services. + +### 7.3 Cyber Security Threats + +Service availability may be affected by: + +**(a)** **Denial of Service Attacks**: Malicious attempts to disrupt service availability; + +**(b)** **Security Incidents**: Necessary service restrictions to address security vulnerabilities; + +**(c)** **Malicious Traffic**: Need to block or filter harmful or abusive traffic; + +**(d)** **Threat Response**: Implementation of security measures that may affect service performance. + +## 8. MONITORING AND REPORTING + +### 8.1 Service Monitoring + +We maintain comprehensive service monitoring including: + +**(a)** **Automated Monitoring**: 24/7 automated monitoring of service availability and performance; + +**(b)** **Geographic Distribution**: Monitoring from multiple global locations to assess user experience; + +**(c)** **Real-Time Alerts**: Immediate notification systems for service disruptions; + +**(d)** **Performance Metrics**: Continuous measurement of response times and system performance. + +### 8.2 Status Communication + +Service status information is communicated through: + +**(a)** **Status Page**: Real-time service status available at designated status page; + +**(b)** **Incident Updates**: Regular updates during service disruptions or maintenance; + +**(c)** **Social Media**: Status updates through official social media channels; + +**(d)** **Email Notifications**: Direct notifications to users for significant service impacts (where contact information is available). + +### 8.3 Transparency Reports + +We publish regular transparency reports including: + +**(a)** **Monthly Availability Reports**: Summary of availability statistics for each service category; + +**(b)** **Performance Summaries**: Analysis of performance trends and improvements; + +**(c)** **Incident Reviews**: Post-incident analysis and improvement measures implemented; + +**(d)** **Infrastructure Updates**: Information about infrastructure improvements and expansions. + +## 9. USER RESPONSIBILITIES AND OBLIGATIONS + +### 9.1 Proper Usage Requirements + +To ensure optimal service performance, users must: + +**(a)** **Comply with Usage Policies**: Adhere to all applicable usage policies and terms of service; + +**(b)** **Use Services Appropriately**: Avoid activities that may degrade service performance for other users; + +**(c)** **Report Issues Promptly**: Notify us of service issues through appropriate channels; + +**(d)** **Maintain Account Security**: Implement appropriate security measures for account access. + +### 9.2 System Requirements + +Users are responsible for: + +**(a)** **Compatible Systems**: Ensuring their systems meet minimum requirements for service access; + +**(b)** **Network Connectivity**: Maintaining adequate internet connectivity for service usage; + +**(c)** **Software Updates**: Keeping browsers and applications updated for optimal compatibility; + +**(d)** **Security Software**: Managing security software that may interfere with service access. + +### 9.3 Data Management + +Users must: + +**(a)** **Backup Important Data**: Maintain independent backups of critical data; + +**(b)** **Verify Data Accuracy**: Confirm accuracy of data before relying on it for important decisions; + +**(c)** **Understand Data Limitations**: Recognise the limitations of automated data processing; + +**(d)** **Report Data Issues**: Promptly report suspected data corruption or inconsistencies. + +## 10. LIMITATION OF LIABILITY + +### 10.1 Reference to Comprehensive Liability Framework + +**IMPORTANT: Comprehensive liability limitations, damage exclusions, maximum liability caps, and all related legal protections are set forth in our Limitation of Liability and Indemnification Policy, which is incorporated herein by reference and governs all liability matters related to service level performance.** + +### 10.2 SLA-Specific Liability Clarifications + +In addition to the comprehensive protections in our Liability Policy: + +**(a)** **Service Credits as Sole Remedy**: Service credits and remedies specified in this SLA are your sole and exclusive remedies for service level breaches; + +**(b)** **No Additional Damages**: No additional damages are available beyond the specific remedies outlined in Section 6 of this SLA; + +**(c)** **Remedy Limitations**: All SLA remedies are subject to the overall liability limitations in our Liability Policy. + +## 11. INDEMNIFICATION + +### 11.1 Reference to Comprehensive Indemnification Framework + +**IMPORTANT: All indemnification obligations, procedures, scope, and related provisions are set forth in our Limitation of Liability and Indemnification Policy, which is incorporated herein by reference and governs all indemnification matters related to SLA compliance and service usage.** + +## 12. DISPUTE RESOLUTION + +### 12.1 Initial Resolution Procedures + +Before initiating formal legal proceedings, parties agree to attempt resolution through: + +**(a)** **Direct Communication**: Good faith discussions between the parties for at least 30 days; + +**(b)** **Technical Review**: Joint technical review of any service-related disputes; + +**(c)** **Escalation Process**: Progressive escalation through appropriate management levels; + +**(d)** **Documentation**: Maintenance of detailed records of resolution attempts. + +### 12.2 Governing Law and Jurisdiction + +This SLA shall be governed by: + +**(a)** **Applicable Law**: The laws of Washington State, United States, without regard to conflict of law principles; + +**(b)** **Jurisdiction**: Exclusive jurisdiction of federal or state courts located in Washington State; + +**(c)** **Consent**: You consent to the jurisdiction of such courts and waive any objection to venue; + +**(d)** **Enforcement**: This SLA may be enforced in any court of competent jurisdiction. + +## 13. MODIFICATIONS AND UPDATES + +### 13.1 Right to Modify + +We reserve the right to modify this SLA at any time to: + +**(a)** **Reflect Service Changes**: Update terms to reflect changes in service offerings or technology; + +**(b)** **Legal Compliance**: Ensure compliance with applicable laws and regulations; + +**(c)** **Business Requirements**: Adapt to changing business needs and operational requirements; + +**(d)** **User Feedback**: Incorporate feedback and lessons learned from service operations. + +### 13.2 Modification Notice + +Material changes to this SLA will be communicated through: + +**(a)** **Website Posting**: Prominent notice on our primary website; + +**(b)** **Email Notification**: Direct notification to registered users where contact information is available; + +**(c)** **Service Notifications**: In-application notifications where technically feasible; + +**(d)** **Advance Notice**: Minimum 30 days advance notice for material changes affecting service levels. + +### 13.3 Acceptance of Modifications + +**(a)** **Continued Use**: Continued use of Services after modification notice constitutes acceptance; + +**(b)** **Opt-Out Right**: You may discontinue service usage if you disagree with modifications; + +**(c)** **Effective Date**: Modifications become effective on the date specified in the notice; + +**(d)** **Version Control**: Current and historical versions available for reference. + +## 14. CONTACT INFORMATION AND SUPPORT + +### 14.1 SLA-Related Inquiries + +For questions about this SLA or service level issues: + +**Email:** sla@nhcarrigan.com + +**Subject Line:** SLA Inquiry - [Brief Description] + +**Response Time:** Within 2 business days for SLA-related inquiries + +### 14.2 Service Level Remedy Requests + +For Service Level remedy requests: + +**Email:** support@nhcarrigan.com + +**Subject Line:** SLA Remedy Request - [Service Name] + +**Response Time:** Within 10 business days for remedy determinations + +### 14.3 Technical Support + +For general technical support: + +**Email:** support@nhcarrigan.com + +**Community Forum:** https://forum.nhcarrigan.com + +**Response Time:** Within 48 hours for technical support requests + +### 14.4 Legal and Compliance Matters + +For legal matters related to this SLA: + +**Email:** legal@nhcarrigan.com + +**Subject Line:** Legal Matter - SLA + +**Response Time:** Within 5 business days for legal inquiries + +**Document Version:** 1.0 + +**Last Updated:** 15 September 2025 + +**Effective Date:** 15 September 2025 + +**Next Review Date:** 15 March 2026 + +--- + +*This Service Level Agreement and Warranty Disclaimer defines our service commitments whilst protecting against unfounded warranty claims. By using our Services, you acknowledge understanding of these terms and agree to the limitations and obligations described herein. For questions about service levels or to report issues, please contact us at sla@nhcarrigan.com.* diff --git a/src/content/docs/legal/subprocessors.md b/src/content/docs/legal/subprocessors.md index 674c92a..6bd7c65 100644 --- a/src/content/docs/legal/subprocessors.md +++ b/src/content/docs/legal/subprocessors.md @@ -2,28 +2,514 @@ title: Data Subprocessors --- -## 1. Subprocessors +**TRANSPARENCY IN DATA PROCESSING RELATIONSHIPS** -The following entities process your data on our behalf. Interacting with our applications is subject to the privacy policies and terms of these entities. +## 1. INTRODUCTION AND OVERVIEW -### 1.1. Primary Subprocessors +### 1.1 Purpose and Scope -These entities directly store, manage, or handle our application data. +This document provides comprehensive information about third-party entities that process personal data on behalf of nhcarrigan ("we," "us," "our," or "the Company"). By using our services, you acknowledge that your data may be processed by these subprocessors in accordance with their respective privacy policies and our contractual agreements. -| Entity | Data Processed | -| ------------ | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -| Anthropic | Messages/commands sent to and from any of our applications that use an AI integration. | -| DigitalOcean | Any data transmitted over the network to and from our applications. | -| MongoDB | Any data provided to our applications when you interact with them. | -| Stripe | Information provided during the identity and age verification processes necessary to access certain applications and community channels, and payment information for invoices. | +### 1.2 Legal Framework -### 1.2. Secondary Subprocessors +This disclosure is provided in accordance with: -In addition to our primary subprocessors, platforms and services you engage with in order to interface with our applications maintain their own privacy policies, and may store your data pursuant to those policies. +**(a)** Data protection regulations requiring transparency about third-party processing; -Such platforms include, but are not limited to: +**(b)** Our commitment to user privacy and informed consent; -- Discord -- GitHub -- Paypal -- Twitch +**(c)** Contractual obligations with our users regarding data processing; + +**(d)** Industry best practices for data processing transparency. + +### 1.3 Data Processing Principles + +All subprocessor relationships are governed by: + +**(a)** **Purpose Limitation:** Data processing is limited to specified, legitimate purposes; + +**(b)** **Data Minimisation:** Only necessary data is shared with subprocessors; + +**(c)** **Security Requirements:** All subprocessors must maintain appropriate security measures; + +**(d)** **Contractual Protection:** Formal agreements govern all data processing relationships. + +### 1.4 User Rights and Protections + +Your rights regarding subprocessor data processing include: + +**(a)** **Transparency:** Full disclosure of all entities processing your data; + +**(b)** **Consent:** Your continued use constitutes consent to the processing described; + +**(c)** **Control:** Rights to access, correct, and delete data processed by subprocessors; + +**(d)** **Notice:** Advance notification of changes to subprocessor arrangements. + +## 2. PRIMARY SUBPROCESSORS + +### 2.1 Definition and Role + +Primary subprocessors are third-party entities that directly process, store, or manage data on our behalf as part of our core service delivery. These relationships involve direct contractual arrangements and technical integrations. + +### 2.2 Primary Subprocessor Details + +#### 2.2.1 Anthropic + +**Data Processing Role:** Artificial Intelligence and Natural Language Processing + +**Types of Data Processed:** +- Messages and commands sent to and from applications utilising AI integration services +- User interactions with AI-powered features +- Content analysis for service improvement and safety + +**Processing Purpose:** +- Providing AI-powered responses and functionality +- Natural language understanding and generation +- Content moderation and safety filtering +- Service improvement and optimisation + +**Data Transfer Mechanism:** Encrypted API communications + +**Retention Period:** As specified in Anthropic's data retention policies + +**Security Measures:** Industry-standard encryption and access controls + +**Location:** United States + +**Privacy Policy:** https://www.anthropic.com/privacy + +#### 2.2.2 DigitalOcean + +**Data Processing Role:** Infrastructure and Hosting Services + +**Types of Data Processed:** +- All data transmitted over networks to and from our applications +- System logs and performance metrics +- Backup data and system configurations +- Network traffic metadata + +**Processing Purpose:** +- Providing cloud infrastructure and hosting services +- Ensuring system availability and performance +- Maintaining security and monitoring systems +- Data backup and disaster recovery + +**Data Transfer Mechanism:** Encrypted network transmission + +**Retention Period:** As required for service provision and legal compliance + +**Security Measures:** SOC 2 Type II compliance, encryption, access controls + +**Location:** Multiple global data centres (primarily United States and Europe) + +**Privacy Policy:** https://www.digitalocean.com/legal/privacy-policy + +#### 2.2.3 MongoDB + +**Data Processing Role:** Database Management and Storage + +**Types of Data Processed:** +- All structured data provided to our applications through user interactions +- User account information and preferences +- Application data and user-generated content +- System configuration and metadata + +**Processing Purpose:** +- Providing database hosting and management services +- Ensuring data availability and integrity +- Facilitating data backup and recovery +- Supporting application functionality + +**Data Transfer Mechanism:** Encrypted database connections + +**Retention Period:** As configured in our data retention policies + +**Security Measures:** Encryption at rest and in transit, access controls, audit logging + +**Location:** Configurable global regions (primarily United States) + +**Privacy Policy:** https://www.mongodb.com/legal/privacy-policy + +#### 2.2.4 Stripe + +**Data Processing Role:** Payment Processing and Identity Verification + +**Types of Data Processed:** +- Payment information including credit card details and billing addresses +- Identity verification information for age and identity confirmation +- Transaction history and payment method data +- Information necessary for regulatory compliance (KYC/AML) + +**Processing Purpose:** +- Processing payments and managing billing +- Verifying user identity and age for service access +- Preventing fraud and ensuring regulatory compliance +- Managing subscriptions and recurring payments + +**Data Transfer Mechanism:** PCI DSS compliant encrypted transmissions + +**Retention Period:** As required by payment regulations and Stripe policies + +**Security Measures:** PCI DSS Level 1 compliance, tokenisation, fraud detection + +**Location:** Global processing infrastructure with data residency options + +**Privacy Policy:** https://stripe.com/privacy + +## 3. SECONDARY SUBPROCESSORS + +### 3.1 Definition and Role + +Secondary subprocessors are platforms and services that users interact with directly to access our services. While we do not have direct contractual control over these entities, user interaction with our services through these platforms may result in data processing by these entities under their own terms and policies. + +### 3.2 Platform Integration Notice + +When you access our services through third-party platforms, your interactions are subject to both our privacy policy and the privacy policies of these platforms. We recommend reviewing the privacy policies of all platforms you use to access our services. + +### 3.3 Secondary Subprocessor Platforms + +#### 3.3.1 Discord + +**Relationship Type:** Community Platform Integration + +**Data Processing Context:** +- User interactions in Discord servers managed by or affiliated with nhcarrigan +- Bot services and integrations provided through Discord +- Community management and moderation activities + +**User Responsibility:** Review Discord's Privacy Policy and Terms of Service + +**Privacy Policy:** https://discord.com/privacy + +#### 3.3.2 GitHub + +**Relationship Type:** Development Platform and Code Repository + +**Data Processing Context:** +- Contributions to open-source projects +- Issue reporting and feature requests +- Code repository access and version control +- Development collaboration activities + +**User Responsibility:** Review GitHub's Privacy Statement and Terms of Service + +**Privacy Policy:** https://docs.github.com/en/site-policy/privacy-policies/github-privacy-statement + +#### 3.3.3 PayPal + +**Relationship Type:** Alternative Payment Processing + +**Data Processing Context:** +- Payment processing for services and donations +- Transaction history and payment verification +- Dispute resolution and customer service + +**User Responsibility:** Review PayPal's Privacy Statement and User Agreement + +**Privacy Policy:** https://www.paypal.com/us/legalhub/privacy-full + +#### 3.3.4 Twitch + +**Relationship Type:** Live Streaming Platform Integration + +**Data Processing Context:** +- Live streaming services and chat interactions +- Channel management and viewer analytics +- Content delivery and broadcasting services + +**User Responsibility:** Review Twitch's Privacy Notice and Terms of Service + +**Privacy Policy:** https://www.twitch.tv/p/legal/privacy-notice + +## 4. SUBPROCESSOR MANAGEMENT AND GOVERNANCE + +### 4.1 Due Diligence Process + +Before engaging any primary subprocessor, we conduct comprehensive due diligence including: + +**(a)** **Security Assessment:** Evaluation of data security measures and certifications; + +**(b)** **Privacy Review:** Analysis of privacy policies and data processing practices; + +**(c)** **Compliance Verification:** Confirmation of regulatory compliance and certifications; + +**(d)** **Contract Negotiation:** Establishment of data processing agreements with appropriate protections. + +### 4.2 Ongoing Monitoring + +We maintain ongoing oversight of subprocessor relationships through: + +**(a)** **Regular Audits:** Periodic review of subprocessor security and privacy practices; + +**(b)** **Performance Monitoring:** Assessment of service quality and compliance; + +**(c)** **Incident Management:** Coordination on security incidents and data breaches; + +**(d)** **Contract Management:** Regular review and update of contractual terms. + +### 4.3 Data Processing Agreements + +All primary subprocessors are bound by data processing agreements that include: + +**(a)** **Purpose Limitation:** Specific restrictions on data use and processing purposes; + +**(b)** **Security Requirements:** Mandatory security controls and incident response procedures; + +**(c)** **Confidentiality:** Strict confidentiality and non-disclosure obligations; + +**(d)** **Audit Rights:** Our right to audit subprocessor data processing practices. + +### 4.4 Subprocessor Change Management + +Changes to subprocessor arrangements are managed through: + +**(a)** **Impact Assessment:** Evaluation of privacy and security implications; + +**(b)** **User Notification:** Advance notice to users of significant changes; + +**(c)** **Transition Planning:** Careful planning to minimise service disruption; + +**(d)** **Documentation Updates:** Timely updates to this disclosure document. + +## 5. DATA TRANSFER AND SECURITY + +### 5.1 International Data Transfers + +When data is transferred internationally to subprocessors, we ensure appropriate safeguards through: + +**(a)** **Adequacy Decisions:** Reliance on jurisdictions with adequate data protection laws; + +**(b)** **Standard Contractual Clauses:** Implementation of EU Standard Contractual Clauses where applicable; + +**(c)** **Certification Schemes:** Use of subprocessors with recognised privacy certifications; + +**(d)** **Binding Corporate Rules:** Acceptance of subprocessors with approved internal data transfer rules. + +### 5.2 Security Requirements + +All primary subprocessors must maintain security measures including: + +**(a)** **Encryption:** Data encryption both in transit and at rest; + +**(b)** **Access Controls:** Role-based access controls and multi-factor authentication; + +**(c)** **Monitoring:** Continuous monitoring for security threats and incidents; + +**(d)** **Incident Response:** Established procedures for responding to security incidents. + +### 5.3 Compliance and Certifications + +We prefer subprocessors with recognised compliance certifications such as: + +**(a)** **SOC 2 Type II:** System and Organisation Controls for service organisations; + +**(b)** **ISO 27001:** International standard for information security management; + +**(c)** **PCI DSS:** Payment Card Industry Data Security Standard (for payment processors); + +**(d)** **GDPR Compliance:** Demonstrated compliance with General Data Protection Regulation. + +### 5.4 Data Breach Response + +In the event of a data breach involving a subprocessor: + +**(a)** **Immediate Notification:** Subprocessors must notify us within 24 hours; + +**(b)** **Impact Assessment:** Joint assessment of the scope and impact of the breach; + +**(c)** **User Notification:** Prompt notification to affected users where required; + +**(d)** **Remediation:** Collaborative efforts to contain and remedy the breach. + +## 6. USER RIGHTS AND CONTROL + +### 6.1 Transparency Rights + +Users have the right to: + +**(a)** **Information:** Full transparency about subprocessor data processing activities; + +**(b)** **Updates:** Regular updates about changes to subprocessor arrangements; + +**(c)** **Access:** Information about how to exercise rights with each subprocessor; + +**(d)** **Contact:** Direct communication channels for subprocessor-related concerns. + +### 6.2 Data Subject Rights + +Regarding data processed by subprocessors, users may: + +**(a)** **Request Access:** Obtain information about data processing activities; + +**(b)** **Seek Rectification:** Request correction of inaccurate data; + +**(c)** **Demand Erasure:** Request deletion of personal data in certain circumstances; + +**(d)** **Restrict Processing:** Limit how data is processed by subprocessors. + +### 6.3 Exercise of Rights + +To exercise rights regarding subprocessor data processing: + +**(a)** **Primary Contact:** Contact us at privacy@nhcarrigan.com for coordination; + +**(b)** **Direct Contact:** Contact subprocessors directly using their provided channels; + +**(c)** **Documentation:** Provide sufficient information to verify identity and specify requests; + +**(d)** **Response Time:** Allow reasonable time for investigation and response. + +### 6.4 Complaint Mechanisms + +If you have concerns about subprocessor data processing: + +**(a)** **Internal Escalation:** Raise concerns through our customer support channels; + +**(b)** **Supervisory Authorities:** Contact relevant data protection authorities; + +**(c)** **Legal Remedies:** Pursue legal remedies available in your jurisdiction; + +**(d)** **Alternative Resolution:** Participate in mediation or arbitration where available. + +## 7. UPDATES AND CHANGES + +### 7.1 Change Notification Process + +We will notify users of changes to subprocessor arrangements through: + +**(a)** **Email Notification:** Direct notification to registered users for significant changes; + +**(b)** **Website Updates:** Updates to this document with change logs and effective dates; + +**(c)** **Service Notifications:** In-app notifications where technically feasible; + +**(d)** **Community Announcements:** Public announcements in community forums. + +### 7.2 Types of Changes Requiring Notification + +Changes requiring advance notification include: + +**(a)** **New Subprocessors:** Addition of new primary subprocessors; + +**(b)** **Changed Processing:** Significant changes to data processing purposes or methods; + +**(c)** **Location Changes:** Changes to data processing locations or jurisdictions; + +**(d)** **Security Changes:** Material changes to security measures or protections. + +### 7.3 Objection Rights + +If you object to changes in subprocessor arrangements: + +**(a)** **Notification Period:** We typically provide 30 days' notice of significant changes; + +**(b)** **Objection Process:** You may object within the notification period; + +**(c)** **Alternative Arrangements:** We will consider reasonable alternative arrangements where possible; + +**(d)** **Service Termination:** You may terminate services if objections cannot be accommodated. + +### 7.4 Emergency Changes + +In emergency situations requiring immediate subprocessor changes: + +**(a)** **Immediate Implementation:** Changes may be implemented without prior notice; + +**(b)** **Prompt Notification:** Users will be notified as soon as reasonably possible; + +**(c)** **Explanation:** Full explanation of the circumstances requiring emergency changes; + +**(d)** **Remediation Options:** Information about available remediation options. + +## 8. CONTACT INFORMATION AND SUPPORT + +### 8.1 Primary Contact + +For questions about subprocessor data processing: + +**Email:** privacy@nhcarrigan.com + +**Subject Line:** Subprocessor Data Processing Inquiry + +**Response Time:** Within 5 business days for standard inquiries + +### 8.2 Rights Requests + +For exercising data subject rights regarding subprocessor processing: + +**Email:** privacy@nhcarrigan.com + +**Subject Line:** Data Subject Rights - Subprocessor + +**Required Information:** Please include your full name, account information, and specific request details + +### 8.3 Complaints and Concerns + +For complaints about subprocessor data processing: + +**Email:** privacy@nhcarrigan.com + +**Subject Line:** Subprocessor Complaint + +**Alternative:** Contact relevant supervisory authorities in your jurisdiction + +### 8.4 Technical Support + +For technical issues related to third-party platform integrations: + +**Email:** support@nhcarrigan.com + +**Community Forum:** https://forum.nhcarrigan.com + +**Response Time:** Within 48 hours for technical support requests + +## 9. COMPLIANCE AND REGULATORY INFORMATION + +### 9.1 Regulatory Framework + +This subprocessor disclosure is maintained in compliance with: + +**(a)** **General Data Protection Regulation (GDPR):** EU data protection requirements; + +**(b)** **California Consumer Privacy Act (CCPA):** California privacy law requirements; + +**(c)** **Other Applicable Laws:** Additional data protection laws in relevant jurisdictions; + +**(d)** **Industry Standards:** Best practices for data processing transparency. + +### 9.2 Regular Review + +This document is reviewed and updated: + +**(a)** **Quarterly:** Regular quarterly review for accuracy and completeness; + +**(b)** **Change-Triggered:** Updates following any changes to subprocessor arrangements; + +**(c)** **Annual Audit:** Comprehensive annual audit of all subprocessor relationships; + +**(d)** **Regulatory Updates:** Updates following changes in applicable laws or regulations. + +### 9.3 Documentation Standards + +We maintain documentation standards including: + +**(a)** **Version Control:** Clear versioning and change tracking for all updates; + +**(b)** **Audit Trail:** Complete records of all changes and their justifications; + +**(c)** **Legal Review:** Review by qualified legal counsel before publication; + +**(d)** **Stakeholder Input:** Consideration of feedback from users and privacy advocates. + +**Document Version:** 2.0 + +**Last Updated:** 15 September 2025 + +**Next Review Date:** 15 September 2026 + +**Effective Date:** 15 September 2025 + +--- + +*This document provides transparency about our data processing relationships to help you make informed decisions about using our services. By using our services, you acknowledge understanding of these subprocessor arrangements and consent to the data processing described herein. For questions or concerns about subprocessor data processing, please contact us at privacy@nhcarrigan.com.* diff --git a/src/content/docs/legal/terms.md b/src/content/docs/legal/terms.md index e6f039d..995fc1c 100644 --- a/src/content/docs/legal/terms.md +++ b/src/content/docs/legal/terms.md @@ -2,1203 +2,402 @@ title: Terms of Service --- -## 1. OVERVIEW AND ACCEPTANCE OF TERMS +**PLEASE READ THESE TERMS CAREFULLY BEFORE USING OUR SERVICES** -### 1.1 Application Operator +## 1. INTRODUCTION AND DEFINITIONS -This application (hereinafter referred to as the "Application") is owned and operated by nhcarrigan ("we," "us," or "our"). By accessing or using the Application, you agree to be bound by these Terms of Service ("Terms"). +### 1.1 About These Terms -### 1.2 Acceptance of Terms +These Terms of Service ("Terms") constitute a legally binding agreement between you and nhcarrigan ("we," "us," "our," or "the Company"). By accessing or using any of our applications, services, or platforms (collectively, the "Services"), you acknowledge that you have read, understood, and agree to be bound by these Terms and all incorporated policies. -By using our Application, you engage in our "Service" and agree to be bound by these Terms, including any additional terms, conditions, and policies referenced herein or available via hyperlink. If you do not agree to all the terms and conditions of this agreement, you must not access or use the Application. +### 1.2 Incorporated Policies -### 1.3 Scope of Application +These Terms incorporate by reference the following additional policies, which form an integral part of your agreement with us: -These Terms apply to all users of the Application, including but not limited to browsers, vendors, customers, merchants, and contributors of content. +**(a)** **Acceptable Use Policy**: Detailed guidelines for appropriate use of our Services; -### 1.4 Modification of Terms +**(b)** **Service Level Agreement and Warranty Disclaimer**: Service expectations and comprehensive warranty disclaimers; -We reserve the right, at our sole discretion, to modify, amend, or replace any part of these Terms at any time. It is your responsibility to check these Terms periodically for changes. Your continued use of or access to the Application following the posting of any changes constitutes acceptance of those changes. +**(c)** **API Terms and Conditions**: Specific terms governing API and developer services; -### 1.5 Current Version +**(d)** **Content and Moderation Policy**: Standards and procedures for content and community moderation; -The most current version of the Terms will always be available for review on this page. The version date will be clearly indicated at the top of the document. +**(e)** **Limitation of Liability and Indemnification Policy**: Comprehensive legal protections and risk allocation; -### 1.6 Additional Features and Tools +**(f)** **Export Control and Sanctions Compliance Policy**: International trade compliance requirements; -Any new features or tools added to the current Application shall also be subject to these Terms. +**(g)** **Privacy Policy**: Data collection and processing practices; -### 1.7 Electronic Communications +**(h)** **Data Subprocessors**: Information about third-party data processing relationships. -By using this Application or communicating with us by electronic means, you consent to receive communications from us electronically. You agree that all agreements, notices, disclosures, and other communications that we provide to you electronically satisfy any legal requirement that such communications be in writing. +### 1.3 Definitions -### 1.8 User Accounts +For the purposes of these Terms: -You may be required to create an account to access certain features of the Application. You are responsible for maintaining the confidentiality of your account information and for all activities that occur under your account. +**(a)** "Application" means any software application, website, platform, or digital service owned or operated by nhcarrigan; -### 1.9 Intellectual Property +**(b)** "Content" means all information, data, text, software, music, sound, photographs, graphics, video, messages, or other materials; -All content on this Application, including but not limited to text, graphics, logos, images, and software, is the property of nhcarrigan or its content suppliers and is protected by international copyright laws. +**(c)** "Services" means all applications, platforms, tools, and related services provided by nhcarrigan; -### 1.10 Prohibited Uses +**(d)** "User" means any individual or entity that accesses or uses the Services; -You agree not to use the Application for any unlawful purpose or in any way that could damage, disable, overburden, or impair the Application or interfere with any other party's use of the Application. +**(e)** "Account" means any user account created to access specific features of the Services. -### 1.11 Termination +### 1.3 Acceptance of Terms -We may terminate or suspend your access to the Application immediately, without prior notice or liability, for any reason whatsoever, including without limitation if you breach these Terms. +By using our Services, you represent and warrant that: -### 1.12 Governing Law +**(a)** You have the legal capacity to enter into this agreement; -These Terms shall be governed by and construed in accordance with the laws of [insert applicable jurisdiction], without regard to its conflict of law provisions. +**(b)** You are at least 13 years of age, or the minimum age required in your jurisdiction; -### 1.13 Severability +**(c)** You will comply with all applicable laws and regulations; -If any provision of these Terms is held to be unenforceable or invalid, such provision will be changed and interpreted to accomplish the objectives of such provision to the greatest extent possible under applicable law, and the remaining provisions will continue in full force and effect. +**(d)** All information you provide is accurate and complete. -### 1.14 Entire Agreement +### 1.4 Scope of Application -These Terms, including any legal notices and disclaimers contained on this Application, constitute the entire agreement between nhcarrigan and you in relation to your use of this Application, and supersede all prior agreements and understandings with respect to the same. +These Terms govern your use of all Services, including but not limited to: -## 2. ONLINE STORE TERMS AND USER ELIGIBILITY +**(a)** All websites and web applications operated by nhcarrigan; -### 2.1 Age Requirement +**(b)** Mobile applications and desktop software; -By agreeing to these Terms of Service, you represent and warrant that: +**(c)** Application Programming Interfaces (APIs); -- You are at least the age of majority in your state, province, or country of residence; or -- If you are under the age of majority, you are using this Application with the consent of your parent or legal guardian, who agrees to be bound by these Terms of Service. +**(d)** Any related documentation, support, or auxiliary services. -### 2.2 Prohibited Uses +## 2. MODIFICATIONS TO TERMS -You agree that you will not use our products, services, or Application for any purposes that are unlawful, prohibited by these Terms, or contrary to public policy. Prohibited activities include, but are not limited to: +### 2.1 Right to Modify -- Any illegal or unauthorized purpose -- Violating any applicable local, state, national, or international laws or regulations -- Infringing upon or violating our intellectual property rights or the intellectual property rights of others -- Harassing, abusing, insulting, harming, defaming, slandering, disparaging, intimidating, or discriminating based on gender, sexual orientation, religion, ethnicity, race, age, national origin, or disability -- Submitting false or misleading information -- Uploading or transmitting viruses, malware, or any other type of malicious code that will or may be used in any way that will affect the functionality or operation of the Application, our services, or any related website -- Collecting or tracking the personal information of others -- Spamming, phishing, pharming, pretexting, spidering, crawling, or scraping -- Any obscene or immoral purpose -- Interfering with or circumventing the security features of the Application, our services, or any related website +We reserve the right, at our sole discretion, to modify, amend, supplement, or replace any provision of these Terms at any time without prior notice. Such modifications shall be effective immediately upon publication on our Services. -### 2.3 Intellectual Property Rights +### 2.2 Notification of Changes -You acknowledge and agree that all content and materials available on this Application are protected by copyrights, trademarks, service marks, patents, trade secrets, or other proprietary rights and laws. Except as expressly authorized by nhcarrigan, you agree not to sell, license, rent, modify, distribute, copy, reproduce, transmit, publicly display, publicly perform, publish, adapt, edit, or create derivative works from such materials or content. +We shall make reasonable efforts to notify users of material changes to these Terms through: -### 2.4 User-Generated Content +**(a)** Prominent notice on our primary website; -If you submit any information or content to the Application, you grant nhcarrigan a non-exclusive, royalty-free, perpetual, irrevocable, and fully sublicensable right to use, reproduce, modify, adapt, publish, translate, create derivative works from, distribute, and display such content throughout the world in any media. +**(b)** Email notification to registered users; -### 2.5 Account Termination +**(c)** In-application notifications where technically feasible. -We reserve the right to terminate or suspend your account and bar access to the Application immediately, without prior notice or liability, for any reason whatsoever, including but not limited to a breach of these Terms. +### 2.3 Acceptance of Modifications -### 2.6 Service Modifications +Your continued use of the Services following the publication of modified Terms constitutes your acceptance of such modifications. If you do not agree to the modified Terms, you must immediately discontinue use of all Services. -We reserve the right to withdraw or amend our service, and any service or material we provide via the Application, in our sole discretion without notice. We will not be liable if, for any reason, all or any part of the Application is unavailable at any time or for any period. +### 2.4 Version Control -### 2.7 Security +The current version of these Terms shall always be available on our website, with the effective date clearly indicated. We may, at our discretion, maintain an archive of previous versions. -While we implement reasonable security measures, we cannot guarantee the security of your personal information transmitted to our Application. Any transmission of personal information is at your own risk. +## 3. USER ELIGIBILITY AND ACCOUNT REQUIREMENTS -## 3. GENERAL CONDITIONS +### 3.1 Age Requirements -### 3.1 Right to Refuse Service +By agreeing to these Terms, you represent and warrant that: -We reserve the right to refuse service to anyone for any reason at any time, without prior notice or explanation. This includes the right to terminate accounts or access to any or all parts of the Application. +**(a)** You are at least 13 years of age, or such higher minimum age as may be required in your jurisdiction; -### 3.2 Content Transmission and Adaptation +**(b)** If you are under 18 years of age (or the age of majority in your jurisdiction), you have obtained proper consent from your parent or legal guardian to use our Services; -You understand and acknowledge that: +**(c)** Your parent or legal guardian has reviewed and agreed to these Terms on your behalf, if applicable. -- Your content may be transferred unencrypted and involve transmissions over various networks. -- Your content may be altered to conform and adapt to technical requirements of connecting networks or devices. -- We are not responsible for any loss, alteration, or interception of data during such transmissions. +### 3.2 Account Creation and Management -### 3.3 Intellectual Property and Use Restrictions +Where account creation is required: -You agree not to, without express written permission from nhcarrigan: +**(a)** You must provide accurate, current, and complete information during the registration process; -- Reproduce, duplicate, copy, sell, resell, or exploit any portion of the Service. -- Use any portion of the Service for commercial purposes unless explicitly authorized. -- Access or attempt to access the Service by any means other than through the interface provided by nhcarrigan. -- Circumvent, disable, or otherwise interfere with security-related features of the Service. -- Engage in unauthorized framing of or linking to the Application. +**(b)** You are responsible for maintaining the confidentiality of your account credentials; -## 4. ACCURACY, COMPLETENESS AND TIMELINESS OF INFORMATION +**(c)** You must promptly notify us of any unauthorised use of your account; -### 4.1 Disclaimer of Information Accuracy +**(d)** You accept full responsibility for all activities that occur under your account. -We strive to provide accurate and up-to-date information on our Application. However, we cannot and do not guarantee that any information available on this Application is accurate, complete, current, or free from errors. The material on this Application is provided for general information purposes only and should not be relied upon as the sole basis for making decisions without consulting primary, more accurate, more complete, or more timely sources of information. +### 3.3 Account Termination Rights -### 4.2 User Responsibility +We reserve the right to suspend or terminate your account immediately, with or without notice, if: + +**(a)** You breach any provision of these Terms; + +**(b)** You engage in conduct that we reasonably believe is harmful to other users or our business; + +**(c)** Required by applicable law or regulation; + +**(d)** For any other reason at our sole discretion. + +## 4. PROHIBITED USES AND CONDUCT + +### 4.1 Reference to Detailed Policies + +Detailed prohibitions and conduct requirements are set forth in our Acceptable Use Policy, which is incorporated herein by reference. Users must comply with all provisions of the Acceptable Use Policy in addition to these Terms. + +### 4.2 General Prohibition Summary + +Without limiting the detailed provisions in our Acceptable Use Policy, users shall not use our Services for any unlawful purpose or in any manner that violates applicable laws, regulations, or the rights of others. + +### 4.3 Intellectual Property Compliance + +You acknowledge that all content and materials on our Services are protected by intellectual property laws. Unauthorised use may result in immediate termination and legal action. Detailed intellectual property obligations are set forth in our Acceptable Use Policy. + +## 5. USER-GENERATED CONTENT + +### 5.1 Content Licence Grant + +By submitting any content to our Services, you grant nhcarrigan: + +**(a)** A non-exclusive, royalty-free, perpetual, irrevocable licence to use, reproduce, modify, adapt, publish, translate, distribute, and display such content; + +**(b)** The right to sublicense such content to third parties; + +**(c)** The right to use such content for any lawful purpose, including commercial purposes. + +### 5.2 Content Representations + +You represent and warrant that: + +**(a)** You own or have the necessary rights to submit the content; + +**(b)** The content does not infringe any third-party rights; + +**(c)** The content complies with all applicable laws and these Terms. + +### 5.3 Content Moderation + +Content moderation standards and procedures are detailed in our Content and Moderation Policy, which is incorporated herein by reference. We reserve the right to moderate content in accordance with that Policy and may take appropriate enforcement actions for policy violations. + +## 6. SERVICE AVAILABILITY AND MODIFICATIONS + +### 6.1 Right to Refuse or Discontinue Service + +We reserve the right, at our sole discretion and without prior notice, to: + +**(a)** Refuse service to any person or entity for any reason; + +**(b)** Modify, suspend, or discontinue any aspect of our Services; + +**(c)** Impose limits on certain features or restrict access to parts of our Services. + +### 6.2 Technical Limitations and Data Transmission + +You acknowledge and accept that: + +**(a)** Content may be transmitted over various networks and systems not under our control; + +**(b)** Technical modifications may be necessary to conform to network requirements; + +**(c)** We cannot guarantee the security or integrity of data during transmission; + +**(d)** We are not liable for any loss, alteration, or unauthorised access to data during transmission. + +### 6.3 Usage Restrictions + +Without our express written consent, you shall not: + +**(a)** Reproduce, duplicate, copy, sell, or exploit any portion of the Services; + +**(b)** Use the Services for unauthorised commercial purposes; + +**(c)** Access the Services through means other than our provided interfaces; + +**(d)** Circumvent, disable, or interfere with security features; + +**(e)** Engage in unauthorised framing, deep-linking, or mirroring. + +## 7. INFORMATION ACCURACY AND LIABILITY + +### 7.1 Information Disclaimer + +We strive to provide accurate and current information through our Services. However, we make no representations or warranties regarding: + +**(a)** The accuracy, completeness, or timeliness of any information; + +**(b)** The suitability of information for any particular purpose; + +**(c)** The availability or functionality of any service or feature. + +### 7.2 User Responsibility for Information You acknowledge and agree that: -- Any reliance on the material on this Application is at your own risk. -- It is your responsibility to evaluate the accuracy, completeness, and usefulness of any information, opinion, advice, or other content available through the Application. +**(a)** It is your responsibility to verify the accuracy of any information obtained through our Services; -### 4.3 Historical Information +**(b)** You should not rely solely on information from our Services for making important decisions; -This Application may contain certain historical information. Such historical information is, by its nature, not current and is provided for your reference only. We are under no obligation to update such historical information. +**(c)** Any reliance upon information obtained through our Services is at your sole risk. -### 4.4 Modifications to Application Content - -We reserve the right to modify, update, or remove the contents of this Application at any time, without prior notice. However, we are under no obligation to update any information on our Application. You agree that it is your responsibility to monitor changes to our Application. - -### 4.5 No Professional Advice - -The information provided on this Application is for informational purposes only and does not constitute professional advice. You should not act or refrain from acting on the basis of any content included in this Application without seeking professional or specialist advice. We disclaim all liability and responsibility arising from any reliance placed on such materials by you or any other visitor to our Application, or by anyone who may be informed of any of its contents. - -### 4.6 User-Generated Content - -We may allow users to post, submit, publish, display, or transmit content on the Application. Any such user-generated content is not endorsed by us and does not necessarily represent our opinions or policies. We assume no responsibility or liability for any user-generated content or for any loss or damage resulting therefrom. - -### 4.7 Errors and Omissions - -While we make reasonable efforts to ensure the accuracy of the information on our Application, there may be occasions when information contains typographical errors, inaccuracies, or omissions. We reserve the right to correct any errors, inaccuracies, or omissions and to change or update information at any time without prior notice. - -### 4.9 No Guarantee of Timeliness - -We do not guarantee that the Application will be updated on a real-time basis, and information presented on the Application may be delayed or may not reflect the most current state of affairs. - -## 5. MODIFICATIONS TO THE SERVICE AND PRICES - -### 5.1 Right to Modify or Discontinue Service - -We reserve the right, at our sole discretion, to modify, suspend, or discontinue the Service (or any part or content thereof) at any time without prior notice. This includes, but is not limited to: - -- Adding or removing features or functionality -- Changing the user interface -- Altering the technology stack or infrastructure -- Modifying or discontinuing any content within the Service - -### 5.2 Price Changes +### 7.3 Updates and Corrections We reserve the right to: -- Change, modify, or adjust the pricing for our Service at any time. -- Introduce new fees or charges for previously free aspects of the Service. -- Change the billing methods or payment terms for the Service. +**(a)** Correct any errors, inaccuracies, or omissions at any time without notice; -### 5.3 Notice of Changes +**(b)** Update or modify information as necessary; -While we may attempt to notify you of significant changes to the Service or pricing, we are under no obligation to do so. It is your responsibility to check these Terms and any official communication channels we may establish for updates and changes. +**(c)** Remove information that is outdated or no longer relevant. -### 5.4 Effect of Changes +## 8. THIRD-PARTY SERVICES AND CONTENT -Your continued use of the Service after any modifications or price changes constitutes your acceptance of such changes. If you do not agree with any modifications or price changes, you must discontinue using the Service. +### 8.1 Third-Party Integration -### 5.5 No Liability for Modifications or Discontinuation +Our Services may integrate with or link to third-party services, applications, or content ("Third-Party Services"). Such integration does not constitute our endorsement of the Third-Party Services. -We shall not be liable to you or to any third party for any: +### 8.2 Third-Party Terms and Policies -- Modification, change, suspension, or discontinuance of the Service -- Price change, including increases or introduction of new fees -- Loss of data or functionality resulting from modifications to the Service -- Inconvenience or damages caused by any modification or discontinuation of the Service +Your use of Third-Party Services may be subject to separate terms of service, privacy policies, and other agreements with the third-party providers. You are responsible for reviewing and complying with such terms. -### 5.6 Refunds and Credits +### 8.3 Disclaimer for Third-Party Services -Unless explicitly stated otherwise, we are not obligated to provide refunds or credits for any prepaid services in the event of Service modification, price change, suspension, or discontinuation. +We are not responsible for and make no warranties regarding: -### 5.7 Service Level Agreements +**(a)** The availability, functionality, or security of Third-Party Services; -Any service level agreements (SLAs) or performance guarantees, if offered, may be modified or terminated at our discretion. Changes to SLAs will be communicated through our official channels. +**(b)** The accuracy or completeness of third-party content; -### 5.8 Third-Party Services and Integrations +**(c)** Any transactions or interactions with third parties; -We may change, suspend, or discontinue any third-party services or integrations that are part of our Service. We are not responsible for any modifications, price changes, suspension, or discontinuation of third-party services integrated with our Service. +**(d)** Any damages or losses resulting from your use of Third-Party Services. -### 5.9 Data Retention and Export +## 9. PRIVACY AND DATA PROTECTION -In the event of Service discontinuation, we will make reasonable efforts to: +### 9.1 Privacy Policy -- Provide notice of the impending discontinuation -- Offer a method for you to export your data, if applicable -- Retain your data for a reasonable period before permanent deletion +Your privacy is important to us. Our collection, use, and protection of your personal information is governed by our Privacy Policy, which is incorporated into these Terms by reference. -### 5.10 Transition Assistance +### 9.2 Data Processing Consent -In case of significant changes or discontinuation of the Service, we may, at our discretion, provide transition assistance or alternative solutions. However, we are under no obligation to do so. +By using our Services, you consent to our processing of your personal information in accordance with our Privacy Policy and applicable data protection laws. -### 5.11 Survival of Terms +### 9.3 Data Security -Certain provisions of these Terms, by their nature, will continue to apply even after the modification or discontinuation of the Service, including but not limited to provisions relating to intellectual property, limitation of liability, and dispute resolution. +Whilst we implement reasonable security measures to protect your information, we cannot guarantee absolute security. You acknowledge that any transmission of data is at your own risk. -### 5.12 Communication of Changes +## 10. DISCLAIMERS AND WARRANTIES -While not obligated to do so, we may communicate significant changes to the Service or pricing through one or more of the following methods: +### 10.1 Reference to Comprehensive Disclaimers -- Email notifications to the address associated with your account -- Notices posted on our Application or website -- Announcements through our official social media channels -- In-app notifications or messages +Comprehensive warranty disclaimers and service limitations are set forth in our Service Level Agreement and Warranty Disclaimer, and our Limitation of Liability and Indemnification Policy, both of which are incorporated herein by reference. -## 6. OPTIONAL TOOLS AND THIRD-PARTY SERVICES +### 10.2 Summary Disclaimer -### 6.1 Provision of Third-Party Tools +**IMPORTANT: Our Services are provided on an "AS IS" and "AS AVAILABLE" basis without warranties of any kind. We disclaim all warranties including merchantability, fitness for purpose, and non-infringement.** -We may provide you with access to third-party tools, applications, or services ("Third-Party Tools") over which we neither monitor nor have any control or input. These Third-Party Tools are provided for your convenience only. +### 10.3 Professional Advice Disclaimer -### 6.2 No Warranties for Third-Party Tools +Information provided through our Services is for general purposes only and does not constitute professional advice. Users should consult qualified professionals for specific advice. -You acknowledge and agree that we provide access to such Third-Party Tools "as is" and "as available" without any warranties, representations, or conditions of any kind and without any endorsement. We shall have no liability whatsoever arising from or relating to your use of these optional Third-Party Tools. +## 11. LIMITATION OF LIABILITY -### 6.3 Use at Your Own Risk +### 11.1 Reference to Comprehensive Liability Limitations -Any use by you of optional Third-Party Tools offered through the Application is entirely at your own risk and discretion. You should ensure that you are familiar with and approve of the terms on which tools are provided by the relevant third-party provider(s). +Comprehensive liability limitations, damage exclusions, and maximum liability caps are set forth in our Limitation of Liability and Indemnification Policy, which is incorporated herein by reference and constitutes an integral part of these Terms. -### 6.4 Third-Party Terms and Policies +### 11.2 Summary of Key Limitations -Your use of Third-Party Tools may be subject to separate terms of service, privacy policies, and other agreements with the third-party providers. It is your responsibility to review and comply with such terms. +**TO THE MAXIMUM EXTENT PERMITTED BY LAW, WE SHALL NOT BE LIABLE FOR INDIRECT, CONSEQUENTIAL, OR PUNITIVE DAMAGES. OUR TOTAL LIABILITY IS LIMITED AS SPECIFIED IN OUR LIABILITY POLICY.** -### 6.5 No Support or Maintenance for Third-Party Tools +### 11.3 Jurisdictional Adaptation -We do not provide any support or maintenance for Third-Party Tools. For assistance with these tools, you should contact the third-party provider directly. +Liability limitations apply to the maximum extent permitted by applicable law in each jurisdiction, with provisions for jurisdictional adaptation as detailed in our Liability Policy. -### 6.6 Integration and Compatibility +## 12. INDEMNIFICATION -While we may integrate Third-Party Tools into our Service, we do not guarantee their compatibility, accuracy, or continued availability within our Application. +### 12.1 Reference to Comprehensive Indemnification -### 6.7 Changes to Third-Party Tools +Detailed indemnification obligations, procedures, and scope are set forth in our Limitation of Liability and Indemnification Policy, which is incorporated herein by reference. -Third-party providers may modify or discontinue their tools at any time. We are not responsible for any consequences resulting from changes to Third-Party Tools. +### 12.2 Summary of Indemnification -### 6.8 Data Sharing with Third Parties +Users agree to indemnify nhcarrigan for claims arising from their use of Services, breach of terms, legal violations, and infringement of third-party rights, subject to the detailed provisions in our Indemnification Policy. -By using Third-Party Tools, you may be sharing your data with these third parties. We are not responsible for how these third parties collect, use, or protect your data. Please review the privacy policies of these third parties before using their tools. +## 13. TERMINATION -### 6.9 Removal of Third-Party Tools +### 13.1 Termination by Either Party -We reserve the right to disable access to any Third-Party Tool at any time, without notice, for any reason or no reason. +Either party may terminate these Terms at any time: -### 6.10 Future Services and Features +**(a)** You may terminate by discontinuing use of all Services; -We may, in the future, offer new services and/or features through the Application (including the release of new tools and resources). Such new features and/or services shall also be subject to these Terms of Service. +**(b)** We may terminate immediately with or without cause or notice. -### 6.11 Beta Features +### 13.2 Effect of Termination -We may offer access to beta features or services. These are provided on an "as is" basis and may be modified or discontinued at any time without notice. +Upon termination: -### 6.12 Feedback on Third-Party Tools +**(a)** Your right to use the Services shall immediately cease; -While we welcome your feedback on Third-Party Tools, we are under no obligation to act upon such feedback or to communicate it to the third-party providers. +**(b)** You must destroy all copies of any downloaded materials; -### 6.13 No Revenue Sharing +**(c)** Sections that by their nature should survive termination shall remain in effect. -Unless explicitly stated otherwise, we do not share any revenue or receive any compensation from third-party providers for making their tools available through our Application. +### 13.3 Survival -### 6.14 Indemnification for Third-Party Tool Usage +The following sections shall survive termination of these Terms: Definitions, User-Generated Content, Disclaimers, Limitation of Liability, Indemnification, Governing Law, and any other sections that by their nature should survive. -You agree to indemnify, defend, and hold harmless nhcarrigan and its affiliates from any claims, liabilities, damages, or expenses (including attorneys' fees) arising from your use of any Third-Party Tools. +## 14. GOVERNING LAW AND DISPUTE RESOLUTION -### 6.15 Security and Data Protection +### 14.1 Governing Law -While we take reasonable measures to ensure the security of our Application, we cannot guarantee the security of Third-Party Tools or any data transmitted to or from these tools. +These Terms shall be governed by and construed in accordance with the laws of Washington State, United States, without regard to its conflict of law principles. -### 6.16 Compliance with Laws +### 14.2 Jurisdiction and Venue -You are responsible for ensuring that your use of Third-Party Tools complies with all applicable laws and regulations. +Any legal action or proceeding arising out of or relating to these Terms shall be brought exclusively in the federal or state courts located in Washington State, United States. You consent to the jurisdiction of such courts. -## 7. THIRD-PARTY LINKS AND CONTENT +### 14.3 Dispute Resolution -### 7.1 Third-Party Materials +Before initiating any formal legal proceedings, the parties agree to attempt to resolve any disputes through good faith negotiations for a period of at least thirty (30) days. -Certain content, products, and services available via our Service may include materials from third parties. These may include, but are not limited to, text, graphics, images, videos, software, and other content. +### 14.4 Class Action Waiver -### 7.2 Third-Party Links +You agree that any disputes shall be resolved on an individual basis and not as part of a class action, collective action, or representative proceeding. -Our Application may contain links to third-party websites, applications, or services that are not owned, controlled, or operated by nhcarrigan. These links are provided for your convenience and reference only. +## 15. GENERAL PROVISIONS -### 7.3 No Responsibility for Third-Party Content +### 15.1 Entire Agreement -We are not responsible for examining or evaluating the content, accuracy, completeness, timeliness, validity, copyright compliance, legality, decency, quality, or any other aspect of third-party materials, websites, products, or services. We do not warrant and will not have any liability or responsibility for any: +These Terms, together with our Privacy Policy and any other legal notices published by us, constitute the complete and exclusive agreement between you and us regarding your use of the Services. -- Third-party materials or websites -- Other materials, products, or services of third parties -- Content or accuracy of any third-party content presented on our Application +### 15.2 Severability -### 7.4 Use of Third-Party Websites and Services +If any provision of these Terms is found to be unenforceable or invalid, such provision shall be limited or eliminated to the minimum extent necessary so that these Terms shall otherwise remain in full force and effect. -Your use of any third-party websites or services is subject to the terms and conditions of use and privacy policies of those third parties. We strongly advise you to read the terms and conditions and privacy policies of any third-party website or service that you visit or use. +### 15.3 Assignment -### 7.5 No Liability for Third-Party Transactions +You may not assign or transfer these Terms or your rights hereunder without our prior written consent. We may assign these Terms without restriction. -We are not liable for any harm, damages, or losses related to the purchase or use of goods, services, resources, content, or any other transactions made in connection with any third-party websites or services. Any transactions you engage in with third parties are between you and the third party, and not with nhcarrigan. +### 15.4 No Waiver -### 7.6 Complaints and Claims +Our failure to enforce any provision of these Terms shall not be construed as a waiver of such provision or our right to enforce it in the future. -Any complaints, claims, concerns, or questions regarding third-party products or services should be directed to the respective third party. We are not responsible for addressing such issues. +### 15.5 Electronic Communications -### 7.7 Disclaimer of Warranties +You consent to receive communications from us electronically, and you agree that all agreements, notices, and other communications satisfy any legal requirement that such communications be in writing. -We make no warranties or representations about the accuracy or completeness of any third-party content accessible through our Application, and we assume no liability or responsibility for any: +## 16. CONTACT INFORMATION -- Errors, mistakes, or inaccuracies of content -- Personal injury or property damage resulting from your access to or use of third-party services -- Any unauthorized access to or use of our secure servers and/or any personal information stored therein -- Any interruption or cessation of transmission to or from third-party services -- Any bugs, viruses, Trojan horses, or the like which may be transmitted to or through our Application by any third party -- Any loss or damage of any kind incurred as a result of the use of any content posted, emailed, transmitted, or otherwise made available via third-party services +### 16.1 General Inquiries -### 7.8 Monitoring of Third-Party Links +For questions about these Terms or our Services, please contact us at: -While we may periodically review third-party links on our Application, we are under no obligation to monitor or review such links or content. You agree that we have no liability for any loss or damage arising from your use of any third-party website, service, or content. +**Email:** terms@nhcarrigan.com -### 7.9 Removal of Third-Party Links +### 16.2 Legal Notices -We reserve the right to remove any third-party links from our Application at any time without notice. +All legal notices and formal communications should be sent to: -### 7.10 No Endorsement +**Email:** legal@nhcarrigan.com -The presence of third-party links on our Application does not imply endorsement, approval, or sponsorship by nhcarrigan of the linked websites, products, or services. +### 16.3 Business Hours -### 7.11 Framing and Deep Linking +We endeavour to respond to all inquiries within forty-eight (48) hours during normal business hours (Monday through Friday, 9:00 AM to 5:00 PM Pacific Standard Time). -You may not frame or deep link to any page or content on our Application without our express written permission. +**Last Updated:** 15 September 2025 -### 7.12 Indemnification +**Effective Date:** 15 September 2025 -You agree to indemnify, defend, and hold harmless nhcarrigan and its affiliates from any claims, liabilities, damages, or expenses (including attorneys' fees) arising from your use of any third-party websites, services, or content accessed through our Application. +--- -### 7.13 Security Warning - -Be aware that when you leave our Application by using a link, other sites may have different privacy policies and terms that are beyond our control. Please be sure to check the privacy policies of these sites as well as their "Terms of Service" before engaging in any business or uploading any information. - -## 8. USER COMMENTS, FEEDBACK, AND OTHER SUBMISSIONS - -### 8.1 User Submissions - -By submitting comments, ideas, suggestions, proposals, plans, or other materials ("User Submissions"), whether solicited or unsolicited, you grant nhcarrigan a perpetual, irrevocable, worldwide, non-exclusive, royalty-free, sublicensable, and transferable license to use, reproduce, distribute, prepare derivative works of, display, perform, and otherwise exploit your User Submissions in connection with the Application and nhcarrigan's business. - -### 8.2 Rights Granted - -You agree that we may, at any time, without restriction or compensation, and without notice: - -- Edit, copy, publish, distribute, translate, and otherwise use in any medium any User Submissions -- Use any ideas, concepts, know-how, or techniques contained in any User Submissions for any purpose whatsoever, including developing, manufacturing, and marketing products or services - -### 8.3 No Obligation - -We are under no obligation to: - -- Maintain any User Submissions in confidence -- Pay compensation for any User Submissions -- Respond to any User Submissions - -### 8.4 Content Moderation - -We reserve the right, but have no obligation, to monitor, edit, or remove any User Submissions that we determine, in our sole discretion, to be: - -- Unlawful, offensive, threatening, libellous, defamatory, pornographic, or obscene -- Violating any party's intellectual property rights -- Violating these Terms of Service or our Code of Conduct -- Otherwise objectionable - -### 8.5 User Representations and Warranties - -You represent and warrant that your User Submissions: - -- Do not violate any right of any third party, including copyright, trademark, privacy, personality, or other personal or proprietary rights -- Do not contain libellous, unlawful, abusive, or obscene material -- Do not contain any computer virus or other malware that could affect the operation of the Service or any related website -- Do not violate any applicable local, state, national, or international law or regulation - -### 8.6 Prohibited Content - -You agree not to submit User Submissions that: - -- Impersonate any person or entity -- Falsely state or otherwise misrepresent your affiliation with a person or entity -- Contain false or misleading information -- Infringe upon or violate our intellectual property rights or the intellectual property rights of others -- Promote illegal activities or conduct that is abusive, threatening, obscene, defamatory, or libellous -- Promote discrimination based on race, sex, religion, nationality, disability, sexual orientation, or age -- Contain topics, names, material, or information that violate any applicable law or regulation - -### 8.7 Responsibility for User Submissions - -You are solely responsible for any User Submissions you make and their accuracy. We take no responsibility and assume no liability for any User Submissions posted by you or any third party. - -### 8.8 No Endorsement - -We do not endorse any User Submissions or any opinion, recommendation, or advice expressed therein, and we expressly disclaim any and all liability in connection with User Submissions. - -### 8.9 Right to Remove or Refuse - -We reserve the right to remove any User Submissions from the Application at any time, for any reason, without notice. We also reserve the right to refuse to post any User Submissions, at our sole discretion. - -### 8.10 Feedback - -If you provide us with any feedback or suggestions regarding the Application ("Feedback"), you hereby assign to us all rights in such Feedback and agree that we shall have the right to use and fully exploit such Feedback in any manner we deem appropriate. - -### 8.11 No Compensation - -You agree that you will not be entitled to, and shall not receive, any compensation or reimbursement of any kind for your User Submissions or Feedback. - -### 8.12 Indemnification - -You agree to indemnify and hold nhcarrigan and its affiliates, officers, agents, employees, and partners harmless from any claim or demand, including reasonable attorneys' fees, made by any third party due to or arising out of your User Submissions. - -### 8.13 Survival - -The provisions of this section shall survive the termination of these Terms of Service. - -## 9. PERSONAL INFORMATION AND PRIVACY - -### 9.1 Governing Policy - -Your submission of personal information through the Application is governed by our Privacy Policy. Our Privacy Policy is incorporated into these Terms of Service by reference. - -### 9.2 Location of Privacy Policy - -To view our complete Privacy Policy, please visit: [Privacy Policy](./privacy.md) - -### 9.3 Consent to Privacy Policy - -By using our Application and providing personal information, you consent to the collection, use, and disclosure of your information as described in our Privacy Policy. - -### 9.4 Types of Information Collected - -We may collect various types of personal information, including but not limited to: - -- Contact information (e.g., name, email address, phone number) -- Account credentials -- Usage data and analytics -- Device information -- Location data (if permitted by you) - -### 9.5 Use of Personal Information - -We use your personal information to: - -- Provide and improve our services -- Communicate with you about our services -- Personalize your experience -- Comply with legal obligations -- Protect our rights and the rights of others - -### 9.6 Data Security - -We implement reasonable security measures to protect your personal information. However, no method of transmission over the Internet or electronic storage is 100% secure, and we cannot guarantee absolute security. - -### 9.7 Third-Party Access - -We may share your personal information with third-party service providers who assist us in operating our Application and providing services to you. These third parties are obligated to use your information only for the purposes for which we disclose it to them. - -### 9.8 Data Retention - -We retain your personal information for as long as necessary to fulfil the purposes outlined in our Privacy Policy, unless a longer retention period is required or permitted by law. - -### 9.9 Your Rights - -Depending on your jurisdiction, you may have certain rights regarding your personal information, such as the right to access, correct, or delete your data. Please refer to our Privacy Policy for more information on how to exercise these rights. - -### 9.10 Children's Privacy - -Our Application is not intended for use by children under the age of 13 (or the applicable age of digital consent in your jurisdiction). We do not knowingly collect personal information from children under this age. - -### 9.11 International Data Transfers - -Your information may be transferred to and processed in countries other than your own. By using our Application, you consent to these transfers in accordance with our Privacy Policy. - -### 9.12 Cookies and Tracking Technologies - -We may use cookies and similar tracking technologies to collect information about your use of our Application. You can manage your cookie preferences through your browser settings. - -### 9.13 Changes to Privacy Policy - -We may update our Privacy Policy from time to time. We will notify you of any changes by posting the new Privacy Policy on this page and updating the "Last Updated" date. - -### 9.14 Contact Information - -If you have any questions about our Privacy Policy or how we handle your personal information, please contact us using the information provided in the Privacy Policy. - -### 9.15 Governing Law - -The collection and use of your personal information shall be governed by the laws specified in our Privacy Policy and these Terms of Service. - -## 10. ERRORS, INACCURACIES AND OMISSIONS - -### 10.1 Possibility of Errors - -We strive to provide accurate and up-to-date information on our Application and in our Service. However, occasionally there may be information that contains typographical errors, inaccuracies, or omissions. We do not warrant that the content within the Service or on any related website is complete, accurate, or current. - -### 10.2 Right to Correct Errors - -We reserve the right to: - -- Correct any errors, inaccuracies, or omissions -- Change or update information -- Modify or discontinue all or part of the Service at any time without prior notice. - -### 10.3 No Obligation to Update - -We undertake no obligation to update, amend, or clarify information in the Service or on any related website, except as required by law. This includes, but is not limited to: - -- Product descriptions -- Pricing information -- Availability information -- User-generated content - -### 10.4 Interpretation of Update Dates - -No specified update or refresh date applied in the Service or on any related website should be taken to indicate that all information has been modified or updated. The absence of a specific update date does not necessarily mean that the information is current or accurate. - -### 10.5 Pricing Errors - -In the event that a product or service is mistakenly listed at an incorrect price or with incorrect information, we reserve the right to refuse or cancel any orders placed for that product or service, whether or not the order has been confirmed and your payment method charged. - -### 10.6 Changes Without Notice - -We reserve the right to change product or service descriptions, pricing, promotions, and availability at any time without notice and without incurring any obligation to you. - -### 10.7 User Responsibility - -You agree that it is your responsibility to: - -- Monitor changes to the Service -- Verify the accuracy of information before relying on it -- Contact us if you find any errors or inaccuracies - -### 10.8 Limitation of Liability - -We shall not be liable for any loss or damage caused by your reliance on information obtained through the Service. It is your responsibility to evaluate the accuracy, completeness, or usefulness of any information, opinion, advice, or other content available through the Service. - -### 10.9 Third-Party Content - -We are not responsible for any errors, inaccuracies, or omissions in content provided by third parties, including user-generated content and linked third-party websites. - -### 10.10 Reporting Errors - -If you believe you have found an error, inaccuracy, or omission in our Service, please contact us immediately with details so that we can investigate and, if necessary, correct the issue. - -### 10.11 Accuracy of Information - -While we strive to provide accurate information, we do not warrant that product descriptions, pricing, or other content of this Application is accurate, complete, reliable, current, or error-free. - -## 11. PROHIBITED USES - -In addition to other prohibitions set forth in these Terms of Service, you are strictly prohibited from using the Application or its content in the following ways: - -### 11.1 Unlawful Activities - -- For any unlawful purpose -- To solicit others to perform or participate in any unlawful acts -- To violate any international, federal, provincial, state, or local regulations, rules, laws, or ordinances - -### 11.2 Intellectual Property Infringement - -- To infringe upon or violate our intellectual property rights or the intellectual property rights of others - -### 11.3 Harassment and Discrimination - -- To harass, abuse, insult, harm, defame, slander, disparage, intimidate, or discriminate based on: - - Gender or gender identity - - Sexual orientation - - Religion or religious beliefs - - Ethnicity - - Race - - Age - - National origin - - Disability - - Any other protected characteristic - -### 11.4 Misrepresentation - -- To submit false or misleading information - -### 11.5 Malicious Activities - -- To upload or transmit viruses, malware, or any other type of malicious code that will or may be used in any way that will affect the functionality or operation of: - -- The Service -- Any related website -- Other websites -- The Internet - -### 11.6 Privacy Violations - -- To collect or track the personal information of others without their explicit consent - -### 11.7 Automated Access - -- To engage in any automated use of the system, such as: - - Spamming - - Phishing - - Pharming - - Pretexting - - Using scripts to collect information - - Using bots or scrapers - -### 11.8 Obscene or Immoral Purposes - -- For any obscene or immoral purpose - -### 11.9 Security Interference - -- To interfere with or circumvent the security features of: - -- The Service -- Any related website -- Other websites -- The Internet - -### 11.10 Additional Prohibited Activities - -- To impersonate or attempt to impersonate nhcarrigan, an nhcarrigan employee, another user, or any other person or entity -- To engage in any activity that interferes with or disrupts the Service (or the servers and networks which are connected to the Service) -- To attempt to gain unauthorized access to any portion of the Service, other accounts, computer systems, or networks connected to the Service -- To probe, scan, or test the vulnerability of the Service or any network connected to the Service -- To use any device, software, or routine to interfere with the proper working of the Service -- To forge headers or otherwise manipulate identifiers to disguise the origin of any information transmitted through the Service -- To "frame" or "mirror" any part of the Service without our prior written authorization -- To use meta tags or any other "hidden text" utilizing our name or trademarks -- To sell, resell, or make commercial use of the Service without our express written consent -- OR any other activity that violates our Code of Conduct - -### 11.11 Enforcement - -We reserve the right to: - -- Investigate and take appropriate legal action against anyone who, in our sole discretion, violates this section, including without limitation, reporting such user to law enforcement authorities -- Terminate or suspend your access to all or part of the Service for violating any of the prohibited uses -- Remove or refuse to post any user contributions for any or no reason at our sole discretion - -### 11.12 Cooperation with Authorities - -We will fully cooperate with any law enforcement authorities or court order requesting or directing us to disclose the identity or other information of anyone posting any materials on or through the Service in violation of these prohibitions. - -### 11.13 Indemnification - -You agree to indemnify, defend, and hold harmless nhcarrigan and its affiliates, licensors, and service providers from any claims resulting from any action taken by us as a result of your violation of these prohibited uses. - -### 11.14 Modifications - -We reserve the right to modify, add to, or remove any part of this list of prohibited uses at any time without prior notice. - -## 12 DISCLAIMER OF WARRANTIES; LIMITATION OF LIABILITY - -### 12.1 No Guarantee of Uninterrupted Service - -We do not guarantee, represent, or warrant that your use of our Service will be uninterrupted, timely, secure, or error-free. You acknowledge that there may be interruptions, delays, inaccuracies, and other problems with the Service. - -### 12.2 No Warranty of Results - -We do not warrant that the results that may be obtained from the use of the Service will be accurate or reliable. You acknowledge that any reliance on such results is at your own risk. - -### 12.3 Right to Modify or Cancel Service - -You agree that we may, in our sole discretion and without prior notice: - -- Remove the Service for indefinite periods of time -- Cancel the Service at any time -- Modify, suspend, or discontinue any aspect of the Service - -### 12.4 Use at Your Own Risk - -You expressly agree that your use of, or inability to use, the Service is at your sole risk. You assume full responsibility and risk of loss resulting from your use of the Service. - -### 12.5 'As Is' and 'As Available' Basis - -The Service and all products and services delivered to you through the Service are provided on an 'as is' and 'as available' basis, without any representation, warranties, or conditions of any kind, either express or implied, including all implied warranties or conditions of: - -- Merchantability -- Merchantable quality -- Fitness for a particular purpose -- Durability -- Title -- Non-infringement - -### 12.6 Disclaimer of Warranties - -TO THE FULLEST EXTENT PERMISSIBLE PURSUANT TO APPLICABLE LAW, NHCARRIGAN DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. - -### 12.7 Limitation of Liability - -In no case shall nhcarrigan, our directors, officers, employees, affiliates, agents, contractors, interns, suppliers, service providers, or licensors be liable for any injury, loss, claim, or any direct, indirect, incidental, punitive, special, or consequential damages of any kind, including, without limitation: - -- Lost profits -- Lost revenue -- Lost savings -- Loss of data -- Replacement costs -- Any similar damages - -Whether based in contract, tort (including negligence), strict liability, or otherwise, arising from: - -- Your use of any of the Service -- Any products procured using the Service -- Any other claim related in any way to your use of the Service or any product - -This limitation applies to any errors or omissions in any content, or any loss or damage of any kind incurred as a result of the use of the Service or any content (or product) posted, transmitted, or otherwise made available via the Service, even if advised of their possibility. - -### 12.8 Jurisdictional Limitations - -Because some states or jurisdictions do not allow the exclusion or the limitation of liability for consequential or incidental damages, in such states or jurisdictions, our liability shall be limited to the maximum extent permitted by law. - -### 12.9 Essential Purpose - -You acknowledge and agree that the foregoing disclaimers and limitations of liability are essential elements of the basis of the bargain between you and nhcarrigan, and will apply even if found to have failed their essential purpose. - -### 12.10 Force Majeure - -We will not be liable for any failure or delay in performing our obligations where such failure or delay results from any cause beyond our reasonable control, including, without limitation, acts of God, natural disasters, pandemic, labour disputes, war, riot, embargoes, acts of civil or military authorities, fire, floods, accidents, strikes, or shortages of transportation facilities, fuel, energy, labour, or materials. - -### 12.11 Time Limitation - -You agree that any claim or cause of action arising out of or related to use of the Service or these Terms of Service must be filed within one (1) year after such claim or cause of action arose or be forever barred. - -## 13. INDEMNIFICATION - -### 13.1 Scope of Indemnification - -You agree to indemnify, defend, and hold harmless nhcarrigan and our: - -- Parent companies -- Subsidiaries -- Affiliates -- Partners -- Officers -- Directors -- Agents -- Contractors -- Licensors -- Service providers -- Subcontractors -- Suppliers -- Interns -- Employees - -from any claim or demand, including reasonable attorneys' fees and costs, made by any third party due to or arising out of: - -- Your breach of these Terms of Service -- Your breach of any documents incorporated by reference into these Terms -- Your violation of any law or regulation -- Your violation of the rights of any third party -- Your use or misuse of the Service -- Any content you submit, post, or transmit through the Service -- Your interaction with any other user of the Service -- Any transaction you enter into through the Service - -### 13.2 Duty to Defend - -You agree to cooperate as fully as reasonably required in the defence of any claim. nhcarrigan reserves the right to assume the exclusive defence and control of any matter subject to indemnification by you. - -### 13.3 No Admission of Liability - -Your agreement to indemnify nhcarrigan does not constitute an admission of liability on your part. - -### 13.4 Notification of Claims - -You agree to promptly notify nhcarrigan in writing of any third-party claim subject to indemnification. - -### 13.5 Settlement of Claims - -You agree not to settle any claim without the prior written consent of nhcarrigan. - -### 13.6 Expenses - -You agree to reimburse nhcarrigan for any and all reasonable expenses incurred in defending against any indemnified claim, including but not limited to attorneys' fees, court costs, and expert witness fees. - -### 13.7 Survival of Indemnification - -This indemnification obligation will survive the termination of these Terms of Service and your use of the Service. - -### 13.8 Limitation on Indemnification - -Your indemnification obligation shall be limited to the extent permitted by applicable law. - -### 13.9 Right to Assume Defence - -nhcarrigan reserves the right, at your expense, to assume the exclusive defence and control of any matter for which you are required to indemnify us, and you agree to cooperate with our defence of these claims. - -### 13.10 Mitigation of Damages - -Both parties agree to use reasonable efforts to mitigate any potential damages subject to indemnification. - -### 13.11 No Waiver of Other Rights - -Nothing in this section shall be construed as a waiver of any other rights or remedies nhcarrigan may have under law or equity. - -### 13.12 Severability - -If any portion of this indemnification provision is found to be unenforceable or invalid, that portion shall be limited or eliminated to the minimum extent necessary so that this indemnification provision shall otherwise remain in full force and effect and enforceable. - -### 13.13 Modification - -nhcarrigan reserves the right to modify this indemnification provision at any time, effective upon posting of an updated version on this Application. You are responsible for regularly reviewing these Terms of Service to stay informed of updates. - -## 14. SEVERABILITY - -### 14.1 Severability Principle - -In the event that any provision of these Terms of Service is determined to be unlawful, void, or unenforceable, such provision shall: - -- Be deemed severed from these Terms of Service -- Not affect the validity and enforceability of any other remaining provisions -- Nonetheless be enforceable to the fullest extent permitted by applicable law - -### 14.2 Interpretation of Severed Provisions - -If any provision is severed from these Terms: - -- The remaining provisions shall be interpreted in a manner that best reflects the original intent of the parties -- The severed provision shall be replaced with a valid and enforceable provision that most closely matches the intent of the original provision - -### 14.3 Partial Enforcement - -If any provision of these Terms is found to be partially unlawful, void, or unenforceable: - -- The provision shall be enforced to the maximum extent permissible under applicable law -- The unenforceable portion shall be deemed to be severed from these Terms - -### 14.4 Reformation - -In lieu of severing any provision, a court or arbitrator may reform the provision to the extent necessary to make it enforceable while preserving its intent. - -### 14.5 Severability in Different Jurisdictions - -The severability of provisions may be assessed differently in various jurisdictions. These Terms shall be interpreted and enforced as if the unenforceable provision had never been included, in any jurisdiction where the provision is deemed unenforceable. - -### 14.6 Effect on Entire Agreement - -The un-enforceability or invalidity of any provision shall not affect the enforceability or validity of the entire agreement. These Terms shall continue in full force and effect as if such invalid or unenforceable provision had never been contained herein. - -### 14.7 Negotiation in Good Faith - -If any provision is determined to be unenforceable, the parties agree to negotiate in good faith to modify these Terms so as to effect the original intent of the parties as closely as possible. - -### 14.8 Severability of Headings - -The headings used in these Terms are for convenience only and shall not affect the interpretation or enforceability of any provision. - -### 14.9 No Waiver - -The failure to enforce any part of these Terms shall not constitute a waiver of the right to later enforce that or any other part of these Terms. - -### 14.10 Survival of Essential Provisions - -Provisions that are essential to the purpose of these Terms, including but not limited to indemnification, limitation of liability, and dispute resolution provisions, shall survive the termination or expiration of these Terms. - -### 14.11 Interpretation in Favour of Validity - -These Terms shall be interpreted, to the extent possible, in a manner that makes them valid and enforceable under applicable law. - -### 14.12 Notification of Un-enforceability - -If you believe any provision of these Terms to be unenforceable, please notify us in writing with a detailed explanation. - -## 15. TERMINATION - -### 15.1 Survival of Obligations - -The obligations and liabilities of the parties incurred prior to the termination date shall survive the termination of this agreement for all purposes. This includes, but is not limited to: - -- Payment obligations -- Indemnification obligations -- Confidentiality obligations -- Intellectual property rights - -### 15.2 Effective Period - -These Terms of Service are effective unless and until terminated by either you or nhcarrigan. - -### 15.3 User-Initiated Termination - -You may terminate these Terms of Service at any time by: - -- Notifying us in writing that you no longer wish to use our Services -- Ceasing to use our Application -- Closing your account, if applicable - -### 15.4 nhcarrigan-Initiated Termination - -We reserve the right to terminate this agreement at any time, without notice, if in our sole judgment: - -- You fail to comply with any term or provision of these Terms of Service -- We suspect that you have failed to comply with these Terms -- You violate any applicable laws or regulations -- You engage in conduct that is harmful to other users, third parties, or our business interests - -### 15.5 Consequences of Termination - -Upon termination of these Terms of Service: - -- Your right to use the Service will immediately cease -- You will remain liable for all amounts due up to and including the date of termination -- We may deny you access to our Services (or any part thereof) -- We may delete or deactivate your account and all related information and files in your account - -### 15.6 Data Retention and Deletion - -After termination, we: - -- May retain your data for a period of time for backup, archival, or audit purposes -- Are not obligated to maintain or provide you with any of your data -- May delete your data in accordance with our data retention policies and applicable laws - -### 15.7 Reinstatement - -Terminated accounts may not be reactivated without our express permission. - -### 15.8 Refunds - -Unless otherwise specified, termination does not entitle you to any refunds for fees paid. - -### 15.9 Suspension - -In addition to termination, we reserve the right to suspend your access to the Service temporarily or permanently, without notice, for conduct that we believe violates these Terms or is harmful to other users, third parties, or our business interests. - -### 15.10 Notice of Termination - -While we may provide notice of termination in some cases, we reserve the right to terminate without notice. - -### 15.11 Ongoing Obligations - -Certain provisions of these Terms shall continue to be effective after termination, including: - -- Ownership provisions -- Warranty disclaimers -- Indemnity obligations -- Limitation of liability - -### 15.12 Cumulative Remedies - -The rights of termination provided in this section are in addition to any other rights and remedies available to nhcarrigan under these Terms or by law. - -### 15.13 Appeal Process - -If you believe your account has been terminated in error, you may appeal the termination by contacting us with a detailed explanation. - -## 16. ENTIRE AGREEMENT - -### 16.1 No Waiver - -The failure of nhcarrigan to exercise or enforce any right or provision of these Terms of Service shall not constitute a waiver of such right or provision. Our failure to act with respect to a breach by you or others does not waive our right to act with respect to subsequent or similar breaches. - -### 16.2 Comprehensive Agreement - -These Terms of Service, together with any policies or operating rules posted by us on this Application or in respect to The Service, constitute the entire agreement and understanding between you and nhcarrigan and govern your use of the Service. This agreement supersedes any prior or contemporaneous agreements, communications, and proposals, whether oral or written, between you and us (including, but not limited to, any prior versions of the Terms of Service). - -### 16.3 Policies and Operating Rules - -Any policies or operating rules posted by us on this Application are hereby incorporated by reference into these Terms of Service. - -### 16.4 No Reliance on External Representations - -You agree that you have not relied on any statement, promise, or representation made or given by or on behalf of nhcarrigan which is not set out in these Terms of Service or any document expressly referred to in them. - -### 16.5 Modification of Terms - -No modification of these Terms of Service shall be effective unless it is in writing and signed by an authorized representative of nhcarrigan. - -### 16.6 Interpretation - -Any ambiguities in the interpretation of these Terms of Service shall not be construed against the drafting party. The language in these Terms shall be interpreted as to its fair meaning and not strictly for or against any party. - -### 16.7 Severability - -If any provision of these Terms is held to be unenforceable or invalid, such provision will be changed and interpreted to accomplish the objectives of such provision to the greatest extent possible under applicable law, and the remaining provisions will continue in full force and effect. - -### 16.8 Assignment - -These Terms, and any rights and licenses granted hereunder, may not be transferred or assigned by you but may be assigned by nhcarrigan without restriction. - -### 16.9 No Agency - -No agency, partnership, joint venture, employee-employer, or franchiser-franchisee relationship is intended or created by these Terms of Service. - -### 16.10 Headings - -The section titles in these Terms of Service are for convenience only and have no legal or contractual effect. - -### 16.11 Survival - -All provisions of these Terms which by their nature should survive termination shall survive termination, including, without limitation, ownership provisions, warranty disclaimers, indemnity, and limitations of liability. - -### 16.12 Electronic Communications - -For contractual purposes, you (a) consent to receive communications from nhcarrigan in an electronic form; and (b) agree that all terms and conditions, agreements, notices, disclosures, and other communications that nhcarrigan provides to you electronically satisfy any legal requirement that such communications would satisfy if it were in writing. - -### 16.13 Conflicting Terms - -If there is a conflict between these Terms of Service and any other agreement or policy, these Terms of Service will prevail in relation to the subject matter of these Terms. - -### 16.14 Language - -Where nhcarrigan has provided you with a translation of the English language version of these Terms, you agree that the translation is provided for your convenience only and that the English language version of these Terms will govern your relationship with nhcarrigan. - -## 17. GOVERNING LAW AND DISPUTE RESOLUTION - -### 17.1 Governing Law - -These Terms of Service and any separate agreements whereby we provide you Services shall be governed by and construed in accordance with the laws of the State of Washington, United States, without regard to its conflict of law principles. - -### 17.2 Jurisdiction - -You agree that any legal action or proceeding between you and nhcarrigan shall be brought exclusively in a federal or state court of competent jurisdiction sitting in Washington, United States. - -### 17.3 Binding Arbitration - -Any dispute, controversy, or claim arising out of or relating to these Terms of Service, including the formation, interpretation, breach, or termination thereof, including whether the claims asserted can be arbitrated, shall be referred to and finally determined by binding arbitration in accordance with the JAMS International Arbitration Rules. - -### 17.4 Arbitration Process - -The arbitration shall be conducted as follows: - -- The arbitration tribunal shall consist of one arbitrator. -- The place of arbitration shall be Seattle, Washington, United States. -- The language to be used in the arbitral proceedings shall be English. -- The arbitration award shall be final and binding on both parties. - -### 17.5 Class Action Waiver - -To the fullest extent permitted by applicable law, no arbitration under these Terms of Service shall be joined to an arbitration involving any other party subject to these Terms of Service, whether through class arbitration proceedings or otherwise. - -### 17.6 Exception to Arbitration - -Notwithstanding the foregoing, we reserve the right to bring an action in any court of competent jurisdiction to seek injunctive or other equitable relief in the event of a breach or threatened breach by you of these Terms of Service. - -### 17.7 Time Limitation - -You agree that regardless of any statute or law to the contrary, any claim or cause of action arising out of or related to use of the Service or these Terms of Service must be filed within one (1) year after such claim or cause of action arose or be forever barred. - -### 17.8 Severability - -If any provision of this Section 17 is held to be unenforceable, such provision shall be struck and the remainder of this section shall be enforced. - -### 17.9 Modifications to this Section - -nhcarrigan reserves the right to modify this Section 17 at any time. If we do make changes, we will provide notice of such changes by posting the revised Terms of Service on our Application and updating the "Last Updated" date at the top of this Section 17. Your continued use of the Service following the posting of changes to this section constitutes your acceptance of those changes. - -### 17.10 Costs of Arbitration - -The costs of arbitration shall be borne by You unless the arbitrator determines otherwise. - -### 17.11 Confidentiality - -The parties agree to keep confidential all awards in their arbitration, together with all materials in the proceedings created for the purpose of the arbitration and all other documents produced by another party in the proceedings not otherwise in the public domain, save and to the extent that disclosure may be required of a party by legal duty, to protect or pursue a legal right, or to enforce or challenge an award in legal proceedings before a court or other judicial authority. - -## 18. CHANGES TO TERMS OF SERVICE - -### 18.1 Current Version - -You can review the most current version of the Terms of Service at any time on this page: https://docs.nhcarrigan.com/#/terms - -### 18.2 Right to Modify - -We reserve the right, at our sole discretion, to update, change, or replace any part of these Terms of Service by posting updates and changes to our website. This includes the right to modify, discontinue, or add to any portion of these Terms at any time. - -### 18.3 Notification of Changes - -While we may attempt to notify you when major changes are made to these Terms of Service, you should periodically review the most up-to-date version. We may, but are not obligated to, provide additional notice of significant changes. - -### 18.4 User Responsibility - -It is your responsibility to check our website periodically for changes to these Terms of Service. We recommend reviewing these Terms at least once every 30 days. - -### 18.5 Acceptance of Changes - -Your continued use of or access to our website or the Service following the posting of any changes to these Terms of Service constitutes acceptance of those changes. If you do not agree to the modified terms, you should discontinue your use of the Service. - -### 18.6 Effective Date of Changes - -Any changes to these Terms will be effective immediately upon posting unless otherwise stated. The "Last Updated" date at the top of this Terms of Service will be updated to reflect the date of the most recent changes. - -### 18.7 Material Changes - -If we make material changes to these Terms, we will provide a more prominent notice or, in some cases, email notification of the changes. - -### 18.8 Prior Versions - -We may, at our discretion, provide access to prior versions of these Terms. However, please note that your use of the Service is governed by the current version of the Terms at the time of your use. - -### 18.9 Continuation of Service - -If you do not agree with the changes to these Terms, you must stop using the Service. Continued use of the Service will indicate your acceptance of the new Terms. - -### 18.10 Severability of Changes - -If any change to these Terms is found to be invalid, void, or for any reason unenforceable, that change is severable and does not affect the validity and enforceability of any remaining changes or the Terms as a whole. - -### 18.11 Governing Law of Changes - -Any changes to these Terms will be governed by the law specified in the "Governing Law" section of these Terms. - -### 18.12 Questions About Changes - -If you have any questions or concerns about changes to these Terms, please contact us at terms@nhcarrigan.com. - -### 18.13 Language of Changes - -Any changes to these Terms will be made in the same language(s) in which these Terms are provided. In the event of any discrepancy between versions in different languages, the English version shall prevail. - -## 19. CONTACT INFORMATION - -### 19.1 Primary Contact Method - -Questions about the Terms of Service should be sent to us at: - -Email: terms@nhcarrigan.com - -### 19.2 Additional Contact Information - -For other inquiries or concerns, you may also reach us through the following channels: - -Email: contact@nhcarrigan.com -Forum: https://forum.nhcarrigan.com - -### 19.3 Business Hours - -Our team is available to respond to inquiries during the following hours: - -M-F 9a-5p PST - -### 19.4 Response Time - -We strive to respond to all inquiries within 48 business hours. However, complex issues may require additional time for a comprehensive response. - -### 19.5 Reporting Violations - -If you believe any user has violated these Terms of Service, please report it immediately to the email address above. - -### 19.6 Technical Support - -For technical issues or support related to the Service, please contact: support@nhcarrigan.com - -### 19.7 Legal Notices - -Any legal notices should be sent to: legal@nhcarrigan.com - -### 19.8 Press Inquiries - -For press or media inquiries, please contact: press@nhcarrigan.com - -### 19.9 Updates to Contact Information - -We may update our contact information from time to time. The most current contact information will always be available in these Terms of Service. - -### 19.10 Privacy Concerns - -For privacy-related questions or to exercise your data rights, please contact our Data Protection Officer at: privacy@nhcarrigan.com - -### 19.11 Accessibility - -If you have any accessibility concerns or require these Terms in an alternative format, please contact us at the email address provided above. - -### 19.12 Language Support - -We currently offer support in the following languages: - -- English - -For support in these languages, please use the appropriate contact method listed on our website. - -### 19.13 Social Media - -While we maintain social media accounts, please note that these are not official channels for legal notices or time-sensitive communications. For urgent matters, please use the email address provided above. +*These Terms of Service are governed by the laws of Washington State, United States. By using our Services, you acknowledge that you have read and understood these Terms and agree to be bound by them.* diff --git a/src/content/docs/staff/apply.md b/src/content/docs/staff/apply.md index da2a1f7..fc6e8a6 100644 --- a/src/content/docs/staff/apply.md +++ b/src/content/docs/staff/apply.md @@ -1,19 +1,147 @@ --- -title: Join Our Staff Team +title: Join Our Volunteer Team --- -## 1. Volunteer Positions +## 1. Volunteer Service Framework -Unless explicitly stated otherwise in a separate written agreement, all positions within our organization are on a voluntary basis. No compensation, monetary or otherwise, should be expected for these roles. +### 1.1 Volunteer Position Nature -## 2. Application Process +Unless explicitly stated otherwise in a separate written agreement, all positions within our organisation are provided on a voluntary basis. No compensation, monetary or otherwise, should be expected for these roles. -If you feel ready to apply to join our team, please complete the [application form](https://forms.nhcarrigan.com/form/PEpB3gA79gxP8wmfEf4zou96opkpUTjssTcaeYjhoi8). +### 1.2 Service Philosophy -## 3. Legal Disclaimer +Our volunteer program operates on servant leadership principles, emphasising service to the community, professional development opportunities, and meaningful contribution to creating inclusive online environments. All volunteer service operates within our comprehensive legal and policy framework. -This document does not constitute an offer of employment or a binding contract. Our organization reserves the right to modify, suspend, or terminate any volunteer position or the mentorship programme at any time, without prior notice. +## 2. Available Volunteer Opportunities -By engaging in any volunteer activities you acknowledge that you have read, understood, and agree to these terms. +### 2.1 Leadership Positions -For any questions or clarifications regarding these policies, please contact us on Discord. +We offer volunteer opportunities across multiple leadership levels: + +**(a)** **Executive Leadership**: Strategic direction and organisational governance (Community Director, Deputy Director); + +**(b)** **Operational Leadership**: Day-to-day operations and specialised management (Head Moderator, Community Manager, Technical Manager, Technical Administrator); + +**(c)** **Specialist Leadership**: Focused expertise areas (Accessibility Coordinator, Events Coordinator); + +**(d)** **Community Leadership**: Front-line community support and member assistance (Moderators, Mentors, Subject Matter Experts, Technical Contributors). + +### 2.2 Comprehensive Role Information + +**For detailed information about specific volunteer roles, responsibilities, qualifications, and selection criteria, please review our [Volunteer Roles and Opportunities documentation](/staff/roles).** + +## 3. Application Process and Selection + +### 3.1 Universal Selection Criteria + +All volunteer positions require: +- Minimum six months of positive community participation (adjustable for specialised roles) +- Clean disciplinary record with no serious policy violations +- Demonstrated commitment to community values and inclusive principles +- Reliable availability and strong collaborative communication skills + +### 3.2 Application Submission + +**Ready to Apply?** Complete our comprehensive application form: [**Volunteer Application Form**](https://forms.nhcarrigan.com/form/PEpB3gA79gxP8wmfEf4zou96opkpUTjssTcaeYjhoi8) + +**Application Requirements:** +- Personal statement explaining your interest and relevant experience +- Community references from existing members who can speak to your qualifications +- Specification of preferred volunteer roles and availability commitments +- Acknowledgement of policy framework compliance requirements + +### 3.3 Selection and Onboarding Process + +**Selection Timeline:** +1. **Application Review**: Diverse selection committee evaluation including community representation +2. **Interview Process**: Values alignment and role-specific competency assessment +3. **Community Input**: Public feedback period for community member input on candidates +4. **Final Selection**: Decision based on established criteria and community needs + +**New Volunteer Integration:** +- Comprehensive orientation including community values and policy framework training +- Role-specific training and competency development programs +- Mentorship assignment with experienced volunteers for ongoing support +- Progressive responsibility integration with regular check-ins and feedback + +## 4. Volunteer Support and Development + +### 4.1 Professional Development Opportunities + +All volunteers receive access to: +- Leadership coaching and mentorship programs +- External training and conference attendance support +- Cross-functional experience and advancement opportunities +- Professional development resources and networking opportunities + +### 4.2 Recognition and Wellness Support + +**Comprehensive Support Systems:** +- Regular recognition and appreciation programs celebrating volunteer contributions +- Mental health resources and peer support networks +- Flexible volunteer arrangements accommodating life circumstances +- Clear role boundaries and burnout prevention resources + +## 5. Legal Framework and Policy Compliance + +### 5.1 Comprehensive Policy Integration + +All volunteers must understand and comply with our complete legal and policy framework: + +**(a)** **Terms of Service**: Fundamental legal obligations and user agreements; + +**(b)** **Community Code of Conduct**: Behavioural standards and community values; + +**(c)** **Community Leadership and Governance Policy**: Leadership accountability and performance standards; + +**(d)** **Content and Moderation Policy**: Enforcement procedures and community safety standards; + +**(e)** **All Legal and Community Policies**: Privacy protection, acceptable use, recognition systems, and democratic participation frameworks. + +### 5.2 Legal Disclaimer and Volunteer Acknowledgement + +**IMPORTANT LEGAL NOTICE:** + +This document does not constitute an offer of employment or create a binding employment contract. Our organisation reserves the right to modify, suspend, or terminate any volunteer position or associated programs at any time, without prior notice. + +**Volunteer Service Acknowledgement:** + +By engaging in any volunteer activities, you explicitly acknowledge that you have: + +**(a)** Read, understood, and agreed to comply with this application information and all referenced policies; + +**(b)** Understood that volunteer service is provided without expectation of compensation and may be terminated at any time; + +**(c)** Committed to upholding community values and maintaining the highest standards of volunteer service; + +**(d)** Agreed to participate in ongoing training, feedback, and accountability processes as outlined in our governance frameworks. + +**IMPORTANT: Comprehensive warranty disclaimers and liability limitations applicable to all volunteer service and community participation are set forth in our Limitation of Liability and Indemnification Policy, which is incorporated herein by reference.** + +## 6. Questions and Support + +### 6.1 Getting Started + +**Questions About Volunteer Opportunities?** +- Review our comprehensive [Volunteer Roles and Opportunities](/staff/roles) documentation +- Contact our Community Leaders through Discord for specific questions +- Participate in community activities to gain familiarity with our values and culture before applying + +### 6.2 Application Support + +**Need Help with Your Application?** +- Community Leaders are available to discuss volunteer opportunities and application processes +- Current volunteers can provide insights about their experiences and role responsibilities +- Community mentors can assist with understanding community culture and expectations + +--- + +## Commitment to Volunteer Excellence + +We are committed to providing exceptional volunteer experiences that contribute to both personal development and meaningful community impact. Through comprehensive support systems, professional development opportunities, and recognition programs, we ensure that volunteer service is rewarding, sustainable, and aligned with our mission of creating inclusive online environments. + +Your interest in volunteering with our organisation demonstrates commitment to community service and inclusive values that we deeply appreciate. We look forward to reviewing your application and potentially welcoming you to our volunteer team. + +--- + +*This volunteer application information was last updated on 15 September 2025. For questions about volunteer opportunities, please contact our Community Leaders through the designated channels outlined in our Community Code of Conduct.* diff --git a/src/content/docs/staff/handbook.md b/src/content/docs/staff/handbook.md index f56a099..e4eed2b 100644 --- a/src/content/docs/staff/handbook.md +++ b/src/content/docs/staff/handbook.md @@ -2,11 +2,29 @@ title: Staff Handbook --- -Welcome to our organization. This Staff Handbook serves as a comprehensive guide to our policies, procedures, and expectations. It is designed to help you understand your role in our community and how you can contribute to our collective success. +## Introduction and Framework -We rely on every staff member, regardless of position, to help keep our community running smoothly and efficiently. Your dedication, skills, and adherence to our standards are crucial in achieving our organizational goals. +Welcome to our organisation. This Staff Handbook serves as a comprehensive guide to our policies, procedures, and expectations for all volunteer staff members. This handbook operates within our comprehensive legal and policy framework, which includes: -By familiarizing yourself with this handbook and adhering to its guidelines, you play a vital role in maintaining the integrity and effectiveness of our organization. Your commitment to these principles helps ensure a positive, productive, and harmonious work environment for all. +**(a)** **Community Code of Conduct**: Fundamental behavioural standards and community values; + +**(b)** **Community Leadership and Governance Policy**: Leadership structure, accountability, and governance frameworks; + +**(c)** **Community Recognition and Appreciation Policy**: Recognition systems and volunteer support programs; + +**(d)** **Community Feedback and Participation Policy**: Democratic participation and community input processes; + +**(e)** **Terms of Service and Legal Policies**: All applicable legal frameworks and user obligations; + +**(f)** **Content and Moderation Policy**: Comprehensive moderation standards and enforcement procedures. + +**IMPORTANT: This handbook supplements but does not replace our comprehensive policy framework. All staff members are required to familiarise themselves with and adhere to all applicable policies, which are incorporated herein by reference.** + +### Our Mission and Values + +We rely on every staff member, regardless of position, to help foster a safe, welcoming, and inclusive environment that serves our community's diverse needs. Your dedication, skills, and adherence to our standards are crucial in achieving our organisational mission of creating exceptional online communities. + +By familiarising yourself with this handbook and our broader policy framework, you play a vital role in maintaining the integrity, inclusivity, and effectiveness of our organisation. ## 1. Activity Requirements @@ -43,167 +61,221 @@ We encourage you to balance your volunteer work with your personal life and othe - Your well-being is important to us. Never feel pressured to overextend yourself. - If you find your role becoming stressful or overly time-consuming, please discuss this with an admin. -### 1.6 Recognition of Contributions +### 1.6 Recognition and Appreciation -While we don't set specific activity requirements, we do recognize and appreciate consistent engagement and contributions: +**Reference to Comprehensive Recognition Framework**: Detailed volunteer recognition, appreciation programs, and wellness support systems are set forth in our Community Recognition and Appreciation Policy, which is incorporated herein by reference. -- Regular participation helps build a strong, cohesive community. -- Outstanding contributions may be acknowledged through our staff recognition program. +Key recognition elements include: +- Regular appreciation and acknowledgement of volunteer contributions +- Volunteer milestone recognition and celebration programs +- Burnout prevention resources and wellness support systems +- Professional development opportunities and growth support +- Flexible volunteer arrangements accommodating personal circumstances -## 2. Moderator Guidelines +## 2. Staff Roles and Leadership Framework -### 2.1 Role Definition +### 2.1 Leadership Structure Integration -As a moderator, you occupy a position of trust within our community. This role comes with additional responsibilities and tools to ensure the safety and well-being of our community members. However, it's crucial to understand that: +**Reference to Comprehensive Leadership Framework**: Detailed leadership roles, responsibilities, selection processes, and accountability mechanisms are set forth in our Community Leadership and Governance Policy, which is incorporated herein by reference. -- Being a moderator does not elevate you above other community members. -- Your role is one of service and support, not authority or superiority. +Our community leadership operates through a structured hierarchy, outlined in [a diagram](/staff/hierarchy). -### 2.2 General Expectations +### 2.2 Staff Role Definition and Principles -#### 2.2.1 Leading by Example +As a staff member, you occupy a position of trust within our community operating under the servant leadership principle. All staff roles come with responsibilities and tools to ensure the safety and well-being of our community members. Key principles: -As moderators, you are expected to exemplify the ideal community member: +- Being a staff member does not elevate you above other community members +- Your role is one of service and support, not authority or superiority +- You serve the community rather than wielding authority for personal benefit +- You are accountable to the community you serve through established accountability mechanisms -- Be active and engaged within the community. -- Strictly adhere to all community rules and guidelines. -- Demonstrate a welcoming and inclusive attitude towards all members, especially newcomers. +### 2.3 General Staff Expectations -#### 2.2.2 Balancing Roles +#### 2.3.1 Leading by Example -Remember that you are both a moderator and a community member: +As staff members, you are expected to exemplify the ideal community member: -- Not every interaction requires a moderation action. -- Engage in regular social interactions with fellow community members. -- Maintain a balance between your moderator duties and personal enjoyment within the community. +- Be active and engaged within the community within your capacity and role +- Strictly adhere to all community rules and guidelines +- Demonstrate a welcoming and inclusive attitude towards all members, especially newcomers +- Model the behaviour and values we want to see throughout the community -#### 2.2.3 Platform Familiarity +#### 2.3.2 Balancing Roles and Responsibilities -Our community spans multiple platforms: +Remember that you are both a staff member and a community member: -- You are entrusted with maintaining all our platforms, but you're not expected to be an expert on all of them. -- Focus on moderating platforms you're comfortable with. -- Seek assistance or guidance from fellow moderators when dealing with unfamiliar platforms. +- Not every interaction requires official staff intervention +- Engage in regular social interactions with fellow community members +- Maintain a balance between your staff duties and personal enjoyment within the community +- Recognise when situations require your staff expertise versus when you can participate as a regular member -### 2.3 Conduct Guidelines +#### 2.3.3 Platform Familiarity and Cross-Platform Coordination -#### 2.3.1 Professionalism +Our community spans multiple platforms with coordinated governance: -Maintain a professional demeanour in all interactions: +- You are entrusted with maintaining community standards across platforms, following consistent policies +- Focus on supporting platforms you're comfortable with whilst maintaining policy consistency +- Seek assistance or guidance from fellow staff members and leadership when dealing with unfamiliar situations +- Coordinate with other platform teams to ensure cohesive community experience -- Remain calm and objective, especially in challenging situations. -- Avoid engaging in or escalating conflicts. -- Use appropriate language and tone at all times. +### 2.4 Staff Standards and Accountability -#### 2.3.2 Fairness and Consistency +**Reference to Comprehensive Standards Framework**: Detailed performance standards, accountability mechanisms, and oversight procedures are set forth in our Community Leadership and Governance Policy, which is incorporated herein by reference. -Apply rules and take actions consistently: +#### 2.4.1 Professional Conduct and Community Values -- Treat all community members equally, regardless of their status or your personal feelings. -- Make decisions based on community guidelines, not personal preferences. +Maintain exemplary conduct aligned with our community values: -#### 2.3.3 Transparency +- Demonstrate respect, inclusivity, safety, and collaborative problem-solving in all interactions +- Remain calm and objective, especially in challenging situations involving community safety +- Model the behaviour expected of all community members whilst serving in your staff capacity +- Use appropriate, inclusive language and maintain trauma-informed practices -Be open about your actions as a moderator: +#### 2.4.2 Fairness, Consistency, and Evidence-Based Decision-Making -- Clearly explain the reasons for any moderation decisions when appropriate. -- Be willing to discuss your actions with other moderators or admins if questions arise. +Apply policies and take actions consistently following established frameworks: -### 2.4 Collaboration and Support +- Treat all community members equally with dignity and respect regardless of background or circumstances +- Make decisions based on community policies and evidence-based practices, not personal preferences +- Follow progressive disciplinary frameworks and restorative justice principles when appropriate +- Consider cultural sensitivity and accessibility needs in all staff decisions and actions -#### 2.4.1 Team Communication +#### 2.4.3 Transparency and Community Accountability -Maintain open lines of communication with your fellow moderators: +Maintain transparency and accountability to the community: -- Use designated channels (e.g., `#staff-chat`) to discuss moderation issues. -- Share experiences and seek advice when facing challenging situations. +- Clearly explain reasons for staff decisions using established policy frameworks +- Document actions appropriately for consistency and accountability +- Participate in community feedback systems and performance review processes +- Be responsive to community input and concerns about staff effectiveness -#### 2.4.2 Continuous Learning +### 2.5 Collaboration and Support -Stay informed and improve your moderation skills: +#### 2.5.1 Team Communication -- Keep up-to-date with any changes to community guidelines or moderation policies. -- Participate in any provided training or skill-sharing sessions. +Maintain open lines of communication with your fellow staff members: -#### 2.4.3 Escalation Protocol +- Use designated channels (e.g., `#staff-chat`) to discuss community issues and seek guidance +- Share experiences and seek advice when facing challenging situations +- Communicate openly about workload, availability, and support needs + +#### 2.5.2 Continuous Learning and Development + +Stay informed and improve your skills: + +- Keep up-to-date with any changes to community guidelines, policies, and procedures +- Participate in provided training, skill-sharing sessions, and professional development opportunities +- Seek feedback from peers and leadership to continuously improve your effectiveness + +#### 2.5.3 Escalation Protocol Know when and how to escalate issues: -- Identify situations that require input from administrators. -- Follow established procedures for escalating complex or sensitive matters. +- Identify situations that require input from senior staff or administrators +- Follow established procedures for escalating complex, sensitive, or high-impact matters +- Understand the scope of your role and when issues exceed your authority or expertise -### 2.5 Sanction Logging +### 2.6 Documentation and Transparency -All moderation actions you take must be logged via our [web form](https://moderation.nhcarrigan.com/log). +**Reference to Comprehensive Frameworks**: Detailed procedures, documentation requirements, and transparency systems are set forth in our Content and Moderation Policy and Community Leadership and Governance Policy, which are incorporated herein by reference. -If you have not been granted a token, please notify Naomi and she will generate one for you. +#### 2.6.1 Action Documentation Requirements +- All significant staff actions must be documented appropriately for transparency and consistency +- Staff in moderation roles must log actions via our API system +- Documentation maintained in our public transparency system at [hikari.nhcarrigan.com/sanctions](https://hikari.nhcarrigan.com/sanctions) where applicable +- Privacy protection measures ensure appropriate balance between transparency and confidentiality +- Regular documentation review for quality assurance and consistency improvement -## 3. Working With Fellow Moderators +#### 2.6.2 Access and Training +- System access provided based on role requirements (contact leadership team for setup) +- Training provided on relevant documentation systems and transparency requirements +- Ongoing support available for technical and procedural questions related to your specific role + +## 3. Working With Fellow Staff Members ### 3.1 Communication Channels -#### 3.1.1 Primary Communication Platform -- Our forum as our primary communication hub for the moderation team. -- A private `staff` category is available for internal discussions. +#### 3.1.1 Primary Communication Platforms +- Our forum serves as a primary communication hub for the staff team +- A private `staff` category is available for internal discussions +- Discord `#staff-chat` channel for real-time communication and coordination -#### 3.1.2 Use of Staff Chat -- Utilize the `staff` channel for: - - Discussing concerns - - Seeking advice on handling situations - - Requesting assistance with ongoing issues - - Sharing relevant information with the team +#### 3.1.2 Use of Staff Communication Channels +- Utilize staff channels for: + - Discussing concerns and seeking guidance on community issues + - Seeking advice on handling situations within your role + - Requesting assistance with ongoing issues or projects + - Sharing relevant information and updates with the team + - Coordinating activities and ensuring smooth operations ### 3.2 Collaborative Problem-Solving -- Approach fellow moderators for help and insights when needed. -- Be open to offering assistance when others request it. -- Engage in constructive discussions to find optimal solutions. +- Approach fellow staff members for help and insights when needed +- Be open to offering assistance when others request it within your expertise +- Engage in constructive discussions to find optimal solutions +- Collaborate effectively across different roles and specialties ### 3.3 Team Unity and Public Image -- Maintain a united front in public spaces. -- Avoid disagreeing with or criticizing fellow moderators in public forums. -- If you have concerns about a moderation action or a colleague's behavior: - - Address the issue privately in the staff chat or through direct messages. - - Seek resolution through open and respectful dialogue. +- Maintain a united front in public spaces +- Avoid disagreeing with or criticizing fellow staff members in public forums +- If you have concerns about a staff action or a colleague's behaviour: + - Address the issue privately in staff channels or through direct messages + - Seek resolution through open and respectful dialogue + - Follow established conflict resolution procedures when needed -### 3.4 Conflict Resolution +### 3.4 Conflict Resolution and Appeals -- If unable to resolve disagreements among yourselves: - - Escalate the matter to Naomi for guidance. - - Present the situation objectively, providing necessary context. +**Reference to Comprehensive Resolution Framework**: Detailed conflict resolution procedures, mediation processes, and appeals mechanisms are set forth in our Community Code of Conduct and Appeals Policy, which are incorporated herein by reference. + +#### 3.4.1 Internal Staff Conflict Resolution +- Follow established conflict resolution procedures emphasising collaborative problem-solving +- Utilise mediation and restorative justice approaches when appropriate +- Escalate to leadership team through proper channels when peer resolution is unsuccessful +- Present situations objectively with comprehensive context and evidence + +#### 3.4.2 Community Member Concerns and Support +- Direct community members to appropriate resources and processes based on their needs +- Support community members in understanding available options and procedures +- Maintain professional boundaries whilst providing appropriate information and assistance +- Follow established protocols for handling member concerns and feedback ### 3.5 Supporting Each Other -- Recognize that moderation can be challenging. -- Offer emotional support and encouragement to fellow moderators. -- Share experiences and coping strategies for dealing with difficult situations. +- Recognise that staff work can be challenging and sometimes emotionally demanding +- Offer emotional support and encouragement to fellow staff members +- Share experiences and coping strategies for dealing with difficult situations +- Promote a supportive team environment that prioritises member wellness ### 3.6 Knowledge Sharing -- Use the staff chat to share useful resources, tools, or techniques. -- Discuss emerging trends or patterns in user behavior that may require attention. +- Use staff channels to share useful resources, tools, or techniques relevant to your roles +- Discuss emerging trends or patterns in community behaviour that may require attention +- Share learning opportunities and professional development resources with the team -### 3.7 Consistency in Moderation +### 3.7 Consistency in Operations -- Regularly discuss and align on interpretation and enforcement of community rules. -- Share examples of how you've handled specific situations to ensure consistency. +- Regularly discuss and align on interpretation and implementation of community policies +- Share examples of how you've handled specific situations to ensure consistency across the team +- Collaborate on developing best practices and standard procedures for common situations ### 3.8 Respecting Privacy -- Keep all discussions in staff channels confidential. -- Do not share private moderator conversations with community members. +- Keep all discussions in staff channels confidential +- Do not share private staff conversations with community members +- Maintain appropriate professional boundaries regarding internal team information ### 3.9 Active Participation -- Regularly check and engage in staff communications. -- Contribute to team discussions and decision-making processes. +- Regularly check and engage in staff communications +- Contribute to team discussions and decision-making processes +- Participate actively in team meetings and collaborative planning sessions ### 3.10 Continuous Improvement -- Be open to feedback from fellow moderators. -- Suggest improvements to moderation processes or team communication. -- Participate in any team training or development activities. +- Be open to feedback from fellow staff members and leadership +- Suggest improvements to processes, procedures, or team communication +- Participate in team training, development activities, and skill-building opportunities ## 4. User Support @@ -343,7 +415,94 @@ As a member of our team, you play a crucial role in ensuring a positive and smoo - Ensure that taking on additional platforms does not negatively impact your performance on your original platform. - Communicate with the moderation team if you feel overwhelmed or need to scale back your responsibilities. -### 6.8 Periodic Review +### 6.8 Performance Review and Continuous Improvement -- Your cross-platform roles will be periodically reviewed to ensure effective moderation across all assigned platforms. -- Feedback and additional training may be provided as needed. +**Reference to Comprehensive Review Framework**: Detailed performance review processes, community feedback integration, and continuous improvement systems are set forth in our Community Leadership and Governance Policy, which is incorporated herein by reference. + +#### 6.8.1 Regular Performance Assessment +- Quarterly performance reviews incorporating community feedback and peer evaluation +- Annual comprehensive assessments with goal-setting and development planning +- 360-degree feedback including community members, peers, and leadership input +- Professional development opportunities and skill enhancement support + +#### 6.8.2 Community Accountability +- Community feedback integration through surveys and input mechanisms +- Transparent performance reporting while respecting individual privacy +- Responsive improvement planning based on community needs and feedback +- Leadership development support and succession planning participation + +## 7. Legal Framework and Policy Compliance + +### 7.1 Comprehensive Policy Integration + +All staff members must comply with our complete legal and policy framework: + +**(a)** **Terms of Service**: Fundamental legal obligations and user agreements; + +**(b)** **Limitation of Liability and Indemnification Policy**: Legal protections and risk allocation; + +**(c)** **Acceptable Use Policy**: Detailed usage restrictions and prohibited activities; + +**(d)** **Content and Moderation Policy**: Comprehensive content standards and enforcement procedures; + +**(e)** **Privacy Policy**: Data protection requirements and user privacy rights; + +**(f)** **All Community Policies**: Code of conduct, leadership governance, recognition systems, and participation frameworks. + +### 7.2 Staff Legal Obligations + +#### 7.2.1 Policy Adherence Requirements +- Comprehensive understanding of all applicable policies and their practical implementation +- Regular policy review and update acknowledgement as frameworks evolve +- Professional application of policies with consistency and cultural sensitivity +- Escalation of complex legal or policy questions through proper channels + +#### 7.2.2 Community Protection and Safety +- Prioritisation of community member safety and well-being in all decisions +- Appropriate handling of sensitive information with privacy protection +- Recognition of mandatory reporting obligations where legally required +- Coordination with external authorities when community safety requires professional intervention + +## 8. Professional Development and Support + +### 8.1 Training and Education Programs + +**Reference to Comprehensive Development Framework**: Detailed training programs, professional development opportunities, and leadership skill enhancement are set forth in our Community Leadership and Governance Policy, which is incorporated herein by reference. + +#### 8.1.1 Mandatory Training Components +- Foundation training in community values, mission, and policy frameworks +- Conflict resolution and mediation skills development +- Accessibility and inclusive practices certification +- Cultural competency and trauma-informed practices education + +#### 8.1.2 Ongoing Development Opportunities +- Leadership coaching and mentorship programs +- External training and conference attendance support +- Cross-functional experience and role advancement opportunities +- Professional networking and community management best practices + +### 8.2 Wellness and Support Systems + +#### 8.2.1 Volunteer Wellness Priority +- Recognition that volunteer well-being is essential for sustainable community service +- Regular wellness check-ins and proactive intervention when support is needed +- Flexible arrangements accommodating personal circumstances and life changes +- Access to mental health resources and peer support networks + +#### 8.2.2 Burnout Prevention and Management +- Clear role boundaries and expectation setting to prevent volunteer overextension +- Mandatory rest periods and vacation time for sustainable volunteer engagement +- Workload assessment and redistribution systems to maintain healthy participation levels +- Recognition and appreciation systems celebrating volunteer contributions without creating pressure + +--- + +## Commitment to Excellence and Community Service + +This Staff Handbook represents our commitment to maintaining exceptional standards of volunteer leadership that serve our community's mission of fostering safe, welcoming, and inclusive environments. By joining our staff team, you become part of a comprehensive framework designed to support both your personal development and our collective success in community building. + +Your service as a volunteer staff member contributes to creating spaces where all community members can thrive, participate meaningfully, and experience genuine belonging. We are grateful for your dedication to this important work. + +--- + +*This Staff Handbook was last updated on 15 September 2025 and operates within our comprehensive legal and policy framework. For questions about staff responsibilities or policy interpretation, please contact leadership through designated staff channels.* diff --git a/src/content/docs/staff/hierarchy.md b/src/content/docs/staff/hierarchy.md new file mode 100644 index 0000000..91caf25 --- /dev/null +++ b/src/content/docs/staff/hierarchy.md @@ -0,0 +1,39 @@ +--- +title: Position Hierarchy +--- + +```mermaid +--- +config: + look: handDrawn + theme: forest +--- +stateDiagram + direction TB + exec --> dir + dir --> ddir + ddir --> mgr + mgr --> hm + exec --> tech + mgr --> event + tech --> tm + mgr --> acc + hm --> mod + hm --> ment + hm --> sme + tm --> cont + tm --> acc + exec:Executives (CEO, etc.) + dir:Community Director + ddir:Deputy Director + mgr:Community Manager + hm:Head Moderator + tech:Technical Administrator + event:Events Coordinator + acc:Accessibility Coordinator + mod:Moderator + ment:Mentor + sme:Subject Matter Expert + cont:Technical Contributor + tm:Technical Manager +``` diff --git a/src/content/docs/staff/roles.md b/src/content/docs/staff/roles.md new file mode 100644 index 0000000..49005ca --- /dev/null +++ b/src/content/docs/staff/roles.md @@ -0,0 +1,484 @@ +--- +title: Volunteer Roles and Opportunities +--- + +## 1. Volunteer Framework and Structure + +### 1.1 Introduction to Volunteer Service + +This document provides comprehensive information about volunteer opportunities within our organisation, outlining available roles, responsibilities, selection processes, and support systems. All volunteer positions operate within our comprehensive legal and policy framework, particularly our Community Leadership and Governance Policy, which is incorporated herein by reference. + +### 1.2 Volunteer Philosophy and Principles + +Our volunteer program is built on servant leadership principles: + +**(a)** **Service-Oriented Leadership**: Volunteers serve the community rather than wielding authority for personal benefit; + +**(b)** **Inclusive Participation**: Volunteer opportunities are designed to accommodate diverse backgrounds, experiences, and availability levels; + +**(c)** **Professional Development**: Volunteer service includes training, mentorship, and growth opportunities; + +**(d)** **Community Accountability**: All volunteers operate within established accountability frameworks and community feedback systems; + +**(e)** **Sustainable Engagement**: Volunteer roles are structured to prevent burnout and support long-term community service. + +### 1.3 Legal Framework Integration + +All volunteer positions operate within our complete legal and policy framework, including Terms of Service, Community Policies, and specialised legal protections. **IMPORTANT: No volunteer position constitutes employment, and all service is provided on a voluntary basis without expectation of compensation.** + +## 2. Executive Leadership Volunteer Opportunities + +### 2.1 Community Director (Executive Level) + +#### 2.1.1 Role Overview +The Community Director provides overall strategic direction and final decision-making authority for community operations, representing the highest level of volunteer leadership within our organisation. + +**Key Responsibilities:** +- Establish and maintain community vision and strategic objectives +- Make final decisions on significant policy changes and complex disciplinary matters +- Represent the community in external relationships and partnership development +- Ensure leadership team accountability and performance standards +- Oversee crisis management and emergency response coordination + +#### 2.1.2 Qualifications and Requirements +**Essential Qualifications:** +- Minimum two years of successful community leadership or relevant professional experience +- Demonstrated expertise in organisational management and strategic planning +- Strong understanding of inclusive practices and community governance principles +- Exceptional communication and decision-making capabilities + +**Preferred Experience:** +- Advanced education in management, public administration, or related fields +- Professional experience in non-profit management or community organisation +- Previous volunteer leadership roles with progressive responsibility increases +- Crisis management and conflict resolution expertise + +### 2.2 Deputy Director (Executive Level) + +#### 2.2.1 Role Overview +The Deputy Director supports the Community Director in strategic planning and implementation whilst serving as primary succession candidate for executive leadership. + +**Key Responsibilities:** +- Support Community Director in strategic planning and policy implementation +- Lead specific high-priority initiatives and cross-functional projects +- Coordinate leadership team activities and ensure effective communication +- Serve as Community Director when needed and prepare for potential succession + +#### 2.2.2 Selection and Development +**Selection Criteria:** +- Demonstrated leadership excellence in operational or specialist leadership roles +- Strong strategic thinking and project management capabilities +- Commitment to community values and inclusive leadership principles +- Ability to work collaboratively with diverse leadership team members + +## 3. Operational Leadership Volunteer Opportunities + +### 3.1 Head Moderator (Operational Leadership) + +#### 3.1.1 Role Overview +The Head Moderator oversees the community moderation team, ensuring consistent application of community standards across all platforms and maintaining high-quality community safety and engagement. + +**Key Responsibilities:** +- Ensure consistent enforcement of community standards across all platforms +- Train, support, and evaluate moderation team performance and development +- Develop and continuously refine moderation procedures and best practices +- Handle escalated disciplinary matters and coordinate appeals processes +- Maintain moderation transparency and accountability systems + +#### 3.1.2 Qualifications and Selection +**Essential Requirements:** +- Minimum one year of successful community moderation experience +- Strong understanding of community policies and inclusive enforcement practices +- Excellent communication and conflict resolution capabilities +- Experience with training and mentoring other community members + +**Professional Development Support:** +- Advanced moderation techniques and leadership training +- Conflict resolution and mediation skill development +- Community management best practices and industry networking +- Mental health first aid and trauma-informed practices certification + +### 3.2 Community Manager (Operational Leadership) + +#### 3.2.1 Role Overview +Community Managers focus on fostering positive community culture, coordinating activities, and serving as primary liaisons between community members and leadership. + +**Key Responsibilities:** +- Foster positive community culture through engagement and programming +- Coordinate community activities, discussions, and special initiatives +- Serve as primary liaison between community members and leadership team +- Monitor community health metrics and member satisfaction indicators +- Implement community feedback programs and responsive improvement initiatives + +#### 3.2.2 Skills and Development +**Required Capabilities:** +- Strong interpersonal communication and relationship-building skills +- Experience with event planning and community engagement activities +- Understanding of diverse community needs and inclusive programming +- Ability to collect and analyse community feedback for improvement planning + +### 3.3 Technical Manager (Operational Leadership) + +#### 3.3.1 Role Overview +Technical Managers oversee day-to-day technical operations, coordinate development activities, and manage technical contributor teams, enabling Technical Administrators to focus on high-level infrastructure and strategic technical initiatives. + +**Key Responsibilities:** +- Oversee pull request reviews and coordinate code review processes +- Manage issue triage, prioritization, and assignment to Technical Contributors +- Coordinate technical contributor team activities and project management +- Provide technical guidance and mentorship to Technical Contributors and community members +- Serve as primary liaison between Technical Administrators and Technical Contributors +- Monitor technical project progress and ensure timely completion of development tasks +- Facilitate technical discussions and decision-making for community projects + +#### 3.3.2 Technical Leadership Requirements +**Essential Management Skills:** +- Experience in technical project management and team coordination +- Strong code review capabilities and software development best practices knowledge +- Ability to triage and prioritize technical issues based on community impact and resources +- Excellent communication skills for coordinating between technical and non-technical team members + +**Technical Competencies:** +- Proficiency in relevant programming languages and development frameworks used by community projects +- Understanding of version control workflows, branching strategies, and collaborative development processes +- Experience with issue tracking systems and project management tools +- Knowledge of software testing, deployment, and quality assurance practices + +### 3.4 Technical Administrator (Operational Leadership) + +#### 3.4.1 Role Overview +Technical Administrators manage platform infrastructure, security systems, and high-level technical strategy that support community operations and member experience. + +**Key Responsibilities:** +- Platform infrastructure management and strategic technical planning +- Security system implementation, monitoring, and policy development +- High-level technical architecture decisions and system design +- Integration strategy between different platforms and external systems +- Technical policy development and compliance oversight +- Strategic technical training and support for leadership team members + +#### 3.4.2 Technical Requirements +**Essential Technical Skills:** +- Advanced platform administration experience (Discord, forums, databases, cloud infrastructure) +- Comprehensive security and privacy protection implementation knowledge +- Strategic API integration and system architecture capabilities +- Advanced technical troubleshooting and infrastructure management experience + +## 4. Specialist Leadership Volunteer Opportunities + +### 4.1 Accessibility Coordinator (Specialist Leadership) + +#### 4.1.1 Role Overview +The Accessibility Coordinator ensures that all community systems, activities, and policies promote inclusion and accommodate diverse accessibility needs. + +**Key Responsibilities:** +- Develop and maintain accessibility standards and implementation guidelines +- Provide consultation on inclusive design and accommodation need assessments +- Coordinate assistive technology support and resource development +- Evaluate platform accessibility and recommend system improvements +- Serve as primary contact for accessibility-related concerns and accommodation requests + +#### 4.1.2 Expertise and Training +**Required Knowledge:** +- Understanding of accessibility principles and universal design concepts +- Familiarity with assistive technologies and accommodation strategies +- Experience with inclusive communication and content creation practices +- Knowledge of legal accessibility requirements and best practices + +**Ongoing Development:** +- Accessibility certification programs and continuing education +- Collaboration with external accessibility experts and organisations +- Training in emerging assistive technologies and inclusive design innovations + +### 4.2 Events Coordinator (Specialist Leadership) + +#### 4.2.1 Role Overview +Events Coordinators plan and execute community activities, celebrations, and educational programming that strengthen community bonds and provide value to members. + +**Key Responsibilities:** +- Plan and coordinate community events, celebrations, and educational programs +- Manage event logistics including accessibility accommodations and timezone considerations +- Coordinate with other leadership team members for integrated programming +- Evaluate event success and gather feedback for continuous improvement +- Develop partnerships with external organisations for enhanced programming opportunities + +#### 4.2.2 Skills Development +**Event Planning Capabilities:** +- Experience with inclusive event planning and accessibility accommodation +- Understanding of diverse community interests and engagement preferences +- Project management skills and ability to coordinate multiple stakeholders +- Cultural sensitivity and awareness of diverse celebration practices + +## 5. Volunteer Leadership Opportunities + +### 5.1 Community Moderators + +#### 5.1.1 Role Overview +Community Moderators provide front-line community support, enforce community standards, and ensure safe, welcoming environments for all community members. + +**Key Responsibilities:** +- Monitor community discussions and enforce community standards consistently +- Respond to community member questions and provide assistance with platform navigation +- Document moderation actions through established transparency systems +- Support new member integration and community onboarding processes +- Participate in moderation team collaboration and continuous improvement efforts + +#### 5.1.2 Training and Support +**Mandatory Training Components:** +- Community values and policy framework comprehensive orientation +- Moderation techniques and de-escalation skill development +- Cultural competency and inclusive practices certification +- Documentation systems and transparency requirements training + +**Ongoing Support Systems:** +- Peer mentorship with experienced moderators +- Regular team meetings and collaboration opportunities +- Professional development and skill enhancement programs +- Burnout prevention resources and wellness support systems + +### 5.2 Community Mentors + +#### 5.2.1 Role Overview +Community Mentors provide guidance and support to new community members, helping them integrate successfully into community culture and participate meaningfully in community activities. + +**Key Responsibilities:** +- Welcome and orient new community members to community culture and expectations +- Provide ongoing guidance and support during new member integration periods +- Answer questions about community activities, policies, and participation opportunities +- Connect new members with relevant resources, tools, and community connections +- Participate in mentor training and peer support programs + +#### 5.2.2 Mentor Development +**Qualification Requirements:** +- Minimum six months of positive community participation and engagement +- Demonstrated understanding of community values and inclusive practices +- Strong communication skills and patience with learning processes +- Commitment to supporting diverse community members with varying needs and backgrounds + +**Support and Training:** +- Peer support training and inclusive communication skill development +- Cultural competency and sensitivity training for diverse member support +- Regular mentor coordination meetings and experience sharing sessions +- Recognition and appreciation programs celebrating mentor contributions + +### 5.3 Subject Matter Experts + +#### 5.3.1 Role Overview +Subject Matter Experts provide specialised knowledge and educational support in specific areas relevant to community interests and activities. + +**Key Responsibilities:** +- Provide expert guidance and education in designated speciality areas +- Develop educational resources and content for community benefit +- Support community members learning and skill development in relevant areas +- Participate in community programming and educational initiative development +- Collaborate with other volunteers to integrate expertise into community activities + +#### 5.3.2 Expertise Areas +**Technical Specialties:** +- Programming languages and software development +- System administration and cybersecurity +- Design and user experience principles +- Digital accessibility and inclusive technology + +**Community Specialties:** +- Conflict resolution and mediation +- Mental health support and wellness resources +- Cultural competency and diversity initiatives +- Educational program development and facilitation + +### 5.4 Technical Contributors + +#### 5.4.1 Role Overview +Technical Contributors provide development support, code contributions, and technical expertise to improve community platforms, tools, and resources while participating in community activities and technical discussions. + +**Key Responsibilities:** +- Contribute code improvements, bug fixes, and new features to community projects and platforms +- Provide technical guidance and support to community members working on projects +- Participate in code reviews and collaborative development processes +- Assist with technical documentation and resource development +- Support community technical education and knowledge sharing initiatives +- Collaborate with Technical Administrators on platform improvements and maintenance + +#### 5.4.2 Technical Expertise Areas + +**Development Specialties:** +- Web development (frontend and backend technologies) +- Mobile application development and cross-platform solutions +- Database design and management +- API development and integration +- DevOps, deployment, and infrastructure management + +**Community Platform Expertise:** +- Discord bot development and community tool creation +- Forum and community platform customisation and enhancement +- Documentation system development and maintenance +- Accessibility implementation and testing +- Security assessment and improvement recommendations + +#### 5.4.3 Qualifications and Selection + +**Essential Technical Skills:** +- Proficiency in relevant programming languages and development frameworks +- Experience with version control systems (Git) and collaborative development practices +- Understanding of software development best practices and code quality standards +- Ability to write clear technical documentation and provide user support + +**Community Integration Requirements:** +- Commitment to community values and inclusive development practices +- Ability to explain technical concepts clearly to non-technical community members +- Collaborative approach to development and willingness to mentor others +- Understanding of accessibility principles and inclusive design practices + +## 6. Volunteer Selection and Application Process + +### 6.1 Universal Selection Criteria + +#### 6.1.1 Essential Qualifications for All Volunteers +All volunteer positions require demonstration of: + +**Community Participation:** +- Minimum six months of positive community engagement (may be adjusted for specialised roles) +- Clean disciplinary record with no serious policy violations +- Understanding and commitment to community values and inclusive principles + +**Personal Qualities:** +- Reliable availability and commitment to volunteer service expectations +- Strong communication skills and ability to work collaboratively with diverse team members +- Cultural sensitivity and commitment to inclusive practices +- Professional maturity and emotional stability for community leadership responsibilities + +#### 6.1.2 Selection Process Overview +**Application Submission:** +- Complete volunteer application form: [https://forms.nhcarrigan.com/form/PEpB3gA79gxP8wmfEf4zou96opkpUTjssTcaeYjhoi8](https://forms.nhcarrigan.com/form/PEpB3gA79gxP8wmfEf4zou96opkpUTjssTcaeYjhoi8) +- Provide personal statement explaining interest and relevant experience +- Submit community references from existing members who can speak to qualifications +- Participate in interview process with existing leadership team members + +**Evaluation and Selection:** +- Application review by diverse selection committee including community member representation +- Interview assessment focusing on values alignment and role-specific competencies +- Community input period allowing feedback on candidates from community members +- Final selection based on established criteria and community needs assessment + +### 6.2 Onboarding and Integration + +#### 6.2.1 New Volunteer Orientation +**Comprehensive Training Program:** +- Community values, mission, and strategic objectives orientation +- Legal and policy framework training including all applicable policies +- Role-specific training and competency development +- Mentorship assignment with experienced volunteer for ongoing support + +**Progressive Responsibility Integration:** +- Initial period of supervised activity and guided learning +- Gradual assumption of full role responsibilities with continued support +- Regular check-ins during first 90 days to ensure successful integration +- Ongoing feedback and adjustment to optimise volunteer experience and effectiveness + +## 7. Volunteer Support and Recognition Systems + +### 7.1 Comprehensive Support Framework + +#### 7.1.1 Professional Development Opportunities +**Training and Skill Enhancement:** +- External conference attendance and professional development support +- Leadership coaching and mentorship programs +- Cross-functional experience opportunities and role advancement pathways +- Community management best practices education and networking opportunities + +**Recognition and Appreciation:** +- Regular volunteer appreciation events and celebration programs +- Professional reference and recommendation support for career development +- Public recognition of outstanding volunteer contributions and service milestones +- Flexible volunteer arrangements accommodating changing life circumstances + +### 7.2 Wellness and Sustainability + +#### 7.2.1 Burnout Prevention and Volunteer Wellness +**Proactive Wellness Support:** +- Regular wellness check-ins and mental health resource access +- Clear role boundaries and expectation management to prevent overextension +- Mandatory rest periods and vacation time for sustainable volunteer engagement +- Peer support networks and community connections for mutual encouragement + +**Flexible Engagement Options:** +- Accommodation for changing availability and life circumstances +- Temporary role adjustment options during high-stress periods +- Re-engagement support for volunteers returning after breaks +- Multiple volunteer pathway options for different interests and availability levels + +## 8. Community Impact and Volunteer Benefits + +### 8.1 Community Contribution and Impact + +#### 8.1.1 Meaningful Service Opportunities +Volunteers contribute to creating and maintaining: +- Safe, welcoming, and inclusive online environments where all community members can thrive +- Educational resources and programming that benefit community learning and development +- Crisis response and member support systems that provide essential community safety nets +- Democratic governance and feedback systems that ensure community member voices are heard and valued + +#### 8.1.2 Personal and Professional Benefits +**Skill Development and Experience:** +- Leadership and management experience applicable to professional development +- Conflict resolution and communication skill enhancement +- Technical and specialised knowledge development through training and experience +- Cultural competency and inclusive practices expertise development + +**Community and Networking:** +- Meaningful relationships with diverse community members and fellow volunteers +- Professional networking opportunities within community management and technology sectors +- Recognition and reputation building within community and broader professional networks +- Contribution to important social impact work promoting inclusive online spaces + +## 9. Volunteer Policy Integration and Compliance + +### 9.1 Legal and Policy Framework + +#### 9.1.1 Comprehensive Policy Compliance +All volunteers must understand and comply with: + +**(a)** **Community Code of Conduct**: Behavioural standards and community values adherence; + +**(b)** **Community Leadership and Governance Policy**: Leadership accountability and performance standards; + +**(c)** **Content and Moderation Policy**: Enforcement procedures and community safety standards; + +**(d)** **Legal Policies**: Terms of Service, Privacy Policy, and all applicable legal frameworks; + +**(e)** **Recognition and Participation Policies**: Community engagement and democratic participation requirements. + +#### 9.1.2 Ongoing Policy Education and Updates +**Regular Policy Review:** +- Quarterly policy update training sessions for all volunteers +- New policy education and implementation training when frameworks evolve +- Annual comprehensive policy compliance assessment and certification renewal +- Access to legal and policy consultation resources for complex questions and situations + +### 9.2 Accountability and Performance Standards + +#### 9.2.1 Performance Evaluation and Feedback +**Regular Assessment Processes:** +- Quarterly performance reviews incorporating community feedback and peer evaluation +- Annual comprehensive assessments with goal-setting and development planning +- Community feedback integration through surveys and input mechanisms +- 360-degree feedback including community members, peers, and leadership perspectives + +#### 9.2.2 Continuous Improvement and Development +**Community-Driven Enhancement:** +- Regular volunteer program assessment and improvement based on community needs +- Volunteer feedback integration into program development and policy refinement +- Innovation in volunteer support systems and recognition programs +- Strategic planning for volunteer program expansion and enhancement as community grows + +--- + +## Commitment to Volunteer Excellence and Community Service + +Our volunteer program represents a comprehensive framework for meaningful community service that creates lasting positive impact for both volunteers and the communities they serve. Through these opportunities, volunteers develop valuable skills, build meaningful relationships, and contribute to creating inclusive online environments where all community members can thrive. + +We recognise that volunteer service is a gift to our community, and we are committed to providing exceptional support, training, and recognition systems that honour this contribution whilst promoting personal and professional development for all volunteers. + +--- + +*This Volunteer Roles and Opportunities guide was created on 15 September 2025. For questions about volunteer opportunities or to begin the application process, please visit our application form or contact our Community Leaders through the designated channels outlined in our Community Code of Conduct.*