VEIL IN RUNNING FUNCTIONS ACCORDING TO PROVISIONS

Tayo last
4 min readMay 1, 2019

--

The provision of a user-based service is something that has never been abandoned in the implementation of functions. Service providers need to determine specific rules for all people who use the services and facilities provided. This was done as a form of anticipation against various bad possibilities that could threaten the existence of the service provider. User provisions become a special trick for the owner to always place it in a safe position. Provisions must be well understood by potential users so that they do not sue in the end. Users who have agreed to the conditions will be welcome to continue registering registration and automatically they are agreed to all the conditions set.

Veil applies several provisions which are divided into 6 groups of provisions, namely the use of Veil software and networks, disputes on social media, cloning and forking Veil source code, participation in Veil prize programs, use of Veil support services, and representation of fake Veil and fraudulent actions. Veil service users must comply with every provision related to these topics to be able to use Veil software and other services provided.

Use of the Veil Software and Network

Each user must ensure that each of them is willing to comply with every Veil provision and all agreements relating to the use of individual software. In the event of loss of digital assets caused by user errors, Veil is not responsible for replacing a number of lost digital assets. Instead of replacing, Veil will make every effort to recover the lost digital assets if this really happens in the future. But Veil also does not guarantee that the lost funds can be recovered. Each function has been designed in such a way as to provide perfect performance. This makes it impossible for any user to change Veil software under any circumstances to obtain personal benefits through unjustified ways.

Disputes on Social Media

Because it involves a number of users from various countries with very different background differences, users are expected to comply with every provision. Usually they will find an opening message containing questions about willingness. The owner of the platform in this case Veil has outlined every provision that can be understood more deeply by the user. Every user must respect each other in terms of the rights and freedoms of other users including their decision to become anonymous users. If there is an attempt to deceive, phish, or spread the virus, Veil staff will immediately deal with it. Staff can issue a ban permanently for the perpetrators. Users are not allowed to advertise or request without permission. If they violate, the user will be warned. Veil will not tolerate shipments that violate copyright, slander, and others.

Cloning and Forking Source Code Veil

Cloning and forking of the Veil source code must be carried out in accordance with the conditions that apply in this platform. They are expected to obey the MIT license and understand the copyright in it.

Participation in the Veil Prize Program

The program with prizes held by Veil is Bounty. Every user who participates directly in this program is not connected in any way. This is also a form of anonymity that supports user privacy. If the user successfully completes the Bounty project, they are entitled to incentives. Users must provide the correct and honest Veil address so that incentive shipments are targeted at the right target.

Use of Veil Support Services

Veil staff only prioritizes operational digital platforms. That is, Veil will not involve itself more in using messages directly on Discord or other social media services and forums. Assistance will be provided through freshdesk or in-chanel. Users will be involved in providing information that involves the problems they are facing. The information submitted must be relevant and factual so that it can be addressed appropriately. Users don’t need to worry about the information security they have to provide. Veil maintains that every data is protected safely and will not have any harmful impact on the user’s account. The information provided is very important to support efforts to improve software performance and as a reference for other users who experience similar problems.

Fake Veil Representations and Fraud Actions

Users must receive appropriate rewards if they are found to be involved in fraudulent actions that deal with Veil and produce fake coins. This could lead to the cancellation of contracts and account deactivation and even legal channels.

Thank you for reading this article, please click the link below for more information:

Website: https://veil-project.com/

Twitter: https://twitter.com/projectveil

Telegram: https://t.me/VEILProject

Team: https://veil-project.com/team/

Discord: https://discord.veil-project.com/

— — — — — — — — — — — — — — — — — — — — — — — — — —

Bitcointalk: Tayolast

Veil Address: bv1qxd29lf0kpkcmgemg3hs7frxx0cmyw04gjhye78

--

--