PRIVACY POLICY

  1. Privacy

Your privacy rights are set forth in our Privacy Policy, which forms a part of this Agreement. Please review the Privacy Policy to learn about:

  1. What information we may collect about you

  2. For what purpose do we use that information

  1. Licenses Granted by You

    1. You grant the REC and its affiliates a worldwide, perpetual, irrevocable, non-exclusive, royalty-free license and right to copy, transmit, distribute, publicly perform and display (through all media now known or hereafter created), and make derivative works from your content. In addition, you waive any so-called "moral rights" in your content. If you make suggestions to the REC on improving or adding new features to the Website, the REC shall have the right to use your suggestions without any compensation to you.

  2. Code of Conduct; Prohibited Activities

In using Website, you must behave in a civil and respectful manner at all times. Further, you will not:

  1. Harass or stalk any other person;

  2. Harm or exploit minors;

  3. Act in a deceptive manner by, among other things, impersonating any person;

  4. Collect information about others;

  5. You will not express or imply that any statements you make are endorsed by the REC without our specific prior written consent.

  6. You will not distribute spam, and will not use any robot, spider, site search/retrieval application, or other manual or automatic device or process to retrieve, index, "data mine", or in any way reproduce or circumvent the navigational structure or presentation of the Service or its contents.

  7. You will not post, distribute or reproduce in any way any copyrighted material, trademarks, or other proprietary information without obtaining the prior consent of the owner of such proprietary rights.

  8. You will not interfere with or disrupt the services or the site or the servers or networks connected to the services or the site.

  9. You will not post, email, or otherwise transmit any material that contains software viruses or any other computer code, files, or programs designed to interrupt, destroy or limit the functionality of any computer software or hardware, or telecommunications equipment.'