Please read this Disclaimer carefully before accessing, interacting with, or using the DeFi Dozen Index Protocol (hereafter "the Protocol") software, consisting of the Protocol technology stack (in particular its smart contracts).
Introduction
This disclaimer relates to the use of the Protocol software. The Protocol software enables its users (“User”) e.g., to track the DeFi Dozen Index. Any and all functionalities of the Protocol Software are of purely technical nature and there is no claim towards any private individual or legal entity in this regard.
No Relationship to The DeFi Dozen Association / Usage of the Protocol Software at Own Risk
While the DeFi Dozen Association developed the Protocol Software, the Protocol Software runs in a fully decentralized and autonomous manner on the Ethereum network. The DeFi Dozen Association is neither involved nor in any way responsible for the operation, running or functioning of the Protocol Software and/or any of the interactions, collaborations or factual relationships between Users and the smart contracts of the Protocol Software. The DeFi Dozen Association has neither access to nor any other possibility to control and/or influence the corresponding transactions, deposits and/or allocations made by the Users and the involved smart contracts using the Protocol Software. The DeFi Dozen Association does not operate an own frontend, nor has it entered in any relationship towards the frontend operators.
In particular, the DeFi Dozen Association has not and will not enter into any legal or factual relationship with any User of the Protocol Software. Consequently, THE DEFI DOZEN ASSOCIATION IS NOT LIABLE TO ANY USER FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE, IN CONNECTION WITH THE USE OR INABILITY TO USE THE PROTOCOL SOFTWARE (INCLUDING BUT NOT LIMITED TO LOSS OF DATA, BUSINESS INTERRUPTION, DATA BEING PROVIDED BY THIRD PARTIES, E.G. ORACLES, DATA BEING RENDERED INACCURATE OR OTHER LOSSES SUSTAINED BY A USER OR THIRD PARTIES RELATED TO THE PROTOCOL SOFTWARE AND/OR ANY ACTIVITY OF A FRONTEND OPERATOR OR A FAILURE OF THE PROTOCOL SOFTWARE TO OPERATE WITH ANY OTHER SOFTWARE).
As the Protocol Software is of experimental nature it may contain bugs, defects, or errors (including any bug, defect, or error relating to or resulting from the display, manipulation, processing, storage, transmission, or use of data) that may materially and adversely affect the use, functionality, or performance of the Protocol Software or any product or system containing or used in conjunction with the Protocol Software.
THE PROTOCOL SOFTWARE HAS BEEN PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANT ABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
There are no official frontend operators, and the use of any frontend is made by User at its own risk. To assess the trustworthiness of a frontend operator lies in the sole responsibility of the User and must be made carefully.
Further, as the Protocol Software is built on the Ethereum network its proper functioning is depending on the Ethereum network.
Assumption of Risks of Cryptographic Token, Currencies and Systems
There are also general risks associated with purchasing, owning and using cryptographic Token (hereinafter “Token”). In order to access and make use of certain features of the Protocol Software, a User may need Token (in particular, ETH).
Token such as ETH are highly volatile due to many factors including but not limited to adoption, speculation, technology, and security risks. The cost of transacting on the Ethereum network or related blockchain technologies is variable and may increase at any time causing impact to any activities taking place on the Ethereum network.
User is solely responsible for transacting and holding Token like ETH while accessing and/or interacting with the Protocol Software, and for implementing reasonable measures for securing the wallet, vault or other storage mechanism used to receive and hold such Token, including any requisite private key(s) or other credentials necessary to access such storage mechanism(s). If User’s private key(s) or other access credentials are lost, User may lose access to its Token.
Risk of Regulatory Actions and Compliance with Laws
The Protocol Software could be impacted by one or more regulatory inquiries or regulatory actions, which could impede or limit User’s ability to access or use the Protocol Software.
User is solely responsible for complying with applicable law when interacting with the Protocol Software whatsoever.