01. PROTOCOL OF ENGAGEMENT
All service inquiries are subject to the Jrupitr Vetting Process. Access to digital vaults and observation frames is granted solely at the discretion of the Architect.
02. DIGITAL ASSETS & INTELLECTUAL PROPERTY
Unless otherwise stipulated in a signed contract, all source code remains the property of the Foundry. Clients are granted a Sovereign License for use, but not redistribution of the core architecture.
03. DATA SOVEREIGNTY
We do not track users for advertising. We collect IP addresses and WHOIS data solely for system security and identity verification. .
04. INTEGRITY OF INTENT
Engagement with the Foundry is a privilege, not a right. Users are prohibited from submitting fraudulent WHOIS data, utilizing disposable email domains, or deploying automated scripts (bots) against the Inquiry Ledger. Violation of this integrity results in immediate IP-level exclusion.
05. ASSET CONTAINMENT
All "Observation Frames" (screenshots) and manifested digital assets are for the exclusive review of the vetted party. Unauthorized redistribution, hot-linking, or "scraping" of the acquisition vault is strictly prohibited. You agree not to attempt to decompile or extract the underlying logic of the Foundry's systems.
06. CREDENTIAL SOVEREIGNTY
Access links provided by the Architect are Sovereign Credentials. They are non-transferable. Sharing access to a private acquisition folder with third parties without written consent is a breach of this protocol.
07. TERMINATION OF ACCESS
Violation of these terms results in the immediate "Blacklisting" of the client identity and the permanent sealing of the associated acquisition vault.