HOME

 

OVERALL INFO ON COMMUNICATIONS
==============================

THIS MISSION STATEMENT HERE PERTAINS TO HOW THIS COMPANY WILL TALK OVERALL,
INCLUDING E-MAIL (COVERED IN UNSOLICITED E-MAILS TO YOU) BELOW IN THIS
OVERALL COMMUNICATIONS POLICY AREA YOU ARE IN!

1. GENERALLY, CAPIENT DOES NOT SEND E-MAILS (EXCEPT WHEN NECESSARY), WHERE
   SECTION [UNSOLICITED E-MAILS TO YOU] DESCRIBES WHEN MESSAGES ARE
   POTENTIALLY SENT

2. NORMALLY, DOMAINS SUCH AS CAPIENT.COM AND OTHERS ARE RESTRICTED FROM
   E-MAIL CONFIGURATION; ANY SEEN MESSAGES FROM CAPIENT.COM OR OTHER
   LINKED E-MAILS ARE UNAPPROVED AND DO NOT COME FROM CAPIENT

3. POSTINGS INCLUDING ANY ON SOCIAL MEDIA, WEB SITE SHARING SITES, INCLUDING
   FORUMS; ACCOUNTS FOR SHARING DATA; ACCOUNTS FOR LINKING COMPANY BRANDING
   TO PUBLICATIONS (AND THE LIKE); AND OTHER DATA SHARING ENTERPRISES OR
   NETWORKS ARE PROHIBITED FROM BEING UTILIZED BY CAPIENT

4. PLEASE SEE GENERAL INFORMATION INSIDE SOFTWARE OR HERE TO FIND DETAILS
   ON HOW CAPIENT WILL SUPPORT BUSINESS DEVELOPERS; PROVIDE GUIDANCE AND
   PROVIDE TOOLS TO BUILD NEW BUSINESS PATHS

6. INFORMATION OVERALL UNDER OUR POLICY STATEMENTS FOR HOW CAPIENT INTENDS
   TO COMMUNICATE NOW AND IN THE FUTURE GENERALLY WILL NOT CHANGE; TO FIND
   LINKS TO WAYS TO SEND MESSAGES TO CAPIENT AN INDEX IS PROVIDED FOR
   SOME PATHS TO ARCHIVAL INCOMING POINTS FOR SENDING MESSAGES TO CAPIENT

DATA SHARING
============

CAPIENT DOES NOT AND WILL NOT PROVIDE DATA SHARING ARRANGEMENTS THRU
SCREENS PROJECT, WHICH MAY INCLUDE ANY OF THE FOLLOWING:

1. SPECIAL CONNECTIONS FOR MONITORING OR DISCOVERY
2. INTERNAL OR PRIVILEGED DATA SHARING OF CUSTOMER INFO
3. ANY TYPE OF "HOOK" OR SPECIAL MECHANISM WHICH IS INTENDED TO
   RETRIEVE INFORMATION NOT NORMALLY FOUND IN PUBLIC DATABASE

THE PUBLIC HAS RIGHT TO SAFE AND SOUND SCREENS ENVIRONMENT AND ANY
INFORMATION THAT WOULD BE USEFUL WHERE LEGAL, OR SPECIAL ASSISTANCE THRU
NORMAL PROCESS IS REQUIRED MAY BE FOUND BY:

1. REVIEW OF MAPS IF AVAILABLE AND ANY RELEASED INFO THAT IS CONSISTENT
   WITH HOW OTHER USERS OF SCREENS MAY RELEASE PUBLIC INFO*
2. CONNECTIONS TO THIRD-PARTY TOOLS WHICH THRU AUTHORIZATION GRANT ACCESS
   TO INFO WHICH IS ACKNOWLEDGED BY END-USER
3. TYPICAL PUBLISHED INFORMATION THAT IS ALREADY KNOWN WHICH ALLOWS
   BEST-IN-CLASS COLLABORATION AND COMMUNICATIONS WITH ANY END PARTY
   WHERE ALLOWED BY LAW
4. AND USEFUL PUBLISHED INFO WHICH BY RIGHT GRANTS ACCESS TO INFORMATION
   SIMILAR TO YELLOW OR WHITE PAGES IN A TELEPHONE BOOK FOR AUTHORIZED
   ENTITIES

THE PROJECT WILL NOT ALLOW OR CREATE AN ENVIRONMENT WHERE SECRET RELATIONSHIPS
EXIST BETWEEN CAPIENT (THE SOFTWARE PROVIDER) AND ANY THIRD-PARTY.

BY DEFINITION, THE TERM "SECRET RELATIONSHIPS" INTENDS TO CONVEY ANY TYPE
OF NDA OR PROTECTED RELATIONSHIP WHERE PUBLIC MAY NOT BE AWARE OF ANY
TRANSACTIONS WHICH WOULD VIOLATE THIS PRIVACY POLICY CONSISTENT WITH ANY
OTHER POLICIES RELATED TO PRIVACY OVER SCREENS.

(*) RELATED TO PUBLIC INFO: BY DEFINITION, "PUBLIC INFO" INTENDS TO DESCRIBE
INFORMATION WHICH ANY PERSON CAN ACCESS AND IS NOT RESTRICTED BY ANY MEANS
SUCH AS PASSWORDS OR PROCESS TO ENTER

SOCIAL MEDIA POLICY AT CAPIENT
==============================

IT IS CAPIENT'S POLICY TO NOT PARTICIPATE IN FORUMS, SESSION SYSTEMS
SUCH AS THOSE WHICH DISTRIBUTE PERSONAL MESSAGES, OR ANY MEDIA SHARING
SITES OF PERSONAL NATURE. CAPIENT'S POLICY REVOLVES AROUND THESE SIX
POLICIES WHICH GOVERN MESSAGING OR FORUM SERVICES:

1. CAPIENT WILL NEVER MANAGE OR POST COMMUNITY MESSAGES, OUTSIDE OF
   OFFICIAL NEWS AND POLICIES AVAILABLE ONLY THRU CREDIBLE DOMAINS;
   SUCH AS THE WEBSITE YOU ARE ON NOW

2. CAPIENT DOES NOT ACTIVELY HIRE PEOPLE TO MANAGE ON BEHALF OF CAPIENT
   ANY AVATARS OR PERSONAS FOR PURPOSE OF INFLUENCING; SUCH AS THRU
   MESSAGING SYSTEMS FOR MARKETING OR ANY REASON

3. CAPIENT WILL NOT PARTICIPATE EVEN IF REQUESTED TO DO SO, IN SYSTEMS
   WHICH CONVEY VIDEO FEEDS OR INTERVIEW SESSIONS OTHERWISE

4. CAPIENT'S LONGSTANDING E-MAIL POLICY IS CONSISTENT WITH SOCIAL
   MEDIA POLICY, REGARDING BLOGS AND ANY SOCIAL MEDIA STYLE PARTICIPATION
   WHERE E-MAIL REGISTRATION IS REQUIRED

5. ANY MESSAGES OUTSIDE OF OFFICIAL DOMAINS LISTED HERE SHOULD BE
   CONSIDERED UNOFFICIAL AND/OR UNRECOGNIZED IF POSTED IN CONTEXT
   OF MEDIA EVENTS AND/OR SOCIAL MEDIA DISTRIBUTION (SUCH AS NEWS OR
   CHATTING)

6. ANY ACCOUNTS REPRESENTED WITH CAPIENT, CAPIENT'S LOGO, OR ANY
   USE OF TERMS ASSOCIATED TO CAPIENT SHOWING ACTIVITY WILL
   BE CONSIDERED UNOFFICIAL AND UNRECOGNIZED BY VIRTUE OF
   THESE STATEMENTS

UNSOLICITED E-MAILS TO YOU
==========================

CAPIENT DOES NOT SEND E-MAIL ADVERTISEMENTS OR MESSAGES VIA E-MAIL,
INCLUDING REQUESTS, PROPOSALS, OR CONSIDERATIONS. ANY FORMAL CONTACT
IS DONE SO IN WRITING AND BY AUTHORIZED ENTITY.

IF YOU RECEIVE COMMUNICATIONS YOU BELIEVE ARE FROM CAPIENT
PLEASE DISREGARD. CAPIENT WILL NOT CONTACT YOU RELATED TO ANY
REQUEST OR OTHER ISSUE UNLESS IT IS THRU CONFIRMABLE OR ESTABLISHED
CONNECTION IF IT IS RELATED TO NORMAL BUSINESS ACTIVITY SUCH AS
ENGAGEMENTS FOR SERVICE. USUALLY THIS IS DONE BY PROCESS THAT
GUARANTEES IT IS AUTHORIZED.

UPFRONT REQUESTS TO SOLICIT BUSINESS FROM ANY CAPIENT E-MAIL ADDRESS
IS PROBABLY NOT REAL. CAPIENT DOES NOT MAKE USE OF ANY OF ITS DOMAINS
TO MASS MARKET INFORMATION OR SERVICES.

SPECIAL OBLIGATIONS
===================

CAPIENT (BUILDERS) MAY REQUIRE THIRD-PARTIES WHO USE SERVICES BY CAPIENT
TO REGISTER AND PROVIDE MINIMAL INFORMATION WHICH CONNECTS END-USER
TO SERVICES. USUALLY THIS BEGINS RELATIONSHIP WHERE END-USER IS
ACTIVE AND EXPRESSLY COMMITS TO ANY AND ALL END-USER LICENSE AND
POLICY ARRANGEMENTS.

SOMETIMES, WITHOUT USER CONFIGURATION WHERE INFORMATION IS PROVIDED
THERE IS AN EXPRESS NORMAL CONDITION WHERE BY DEFAULT USE OF SOFTWARE
TRIGGERS END-USER RELATIONSHIP.

THE END-USER AGREES TO PROVISIONS RELATED TO COPYRIGHT AND TRADITIONAL
LAW PROTECTIONS COVERED IN DOCUMENTATION. ALL PROVISIONS ARE OUTLINED
CLEARLY FOR EXPLORATION. MOST COVER BASIC END-USE SCENARIOS AND ARE
TYPICAL OF GENERAL SOFTWARE PRODUCT REQUIREMENTS SUCH AS:


1. COPYHOLDER PROTECTIONS
2. COMMON LAW TRADEMARK PROTECTIONS
3. END-USE LIMITATIONS FOR MODIFICATION
4. END-USE RESTRICTIONS WHERE NOTED

ANY COMMUNICATIONS WHERE ATTEMPTS TO CIRCUMVENT PROTECTIONS WHERE
SOFTWARE IS EXPLOITED FOR END-USER GAIN WHERE ANY OF THE FOLLOWING
OCCURS WOULD BE CONSIDERED UNLAWFUL:

1. CONNECTIONS WITH THIRD-PARTIES TO HACK OR BREAK SOFTWARE PROTECTION
   INTENDED TO SAFEGUARD END-USER AT INSTALL TIME
2. USE OF TOOLS OR HACKER EXPLOIT KITS (OR PROCESSES) TO TRANSMIT TO
   DEFAME OR OTHERWISE HARM BRAND INCORPORATED IN PRODUCT, OTHER USERS,
   OR TO GENERALLY CREATE HAVOC
3. PROCESS THAT GENERALLY IS INTENDED TO OVERWHELM ISP TRAFFIC THAT
   GENERALLY WOULD BE NORMALIZED UNDER TYPICAL CONDITIONS; THIS MIGHT
   BE WHERE SOME PROCESS NOT INTENDED FOR NORMAL OPERATION HAS ENHANCED
   NETWORK TRAFFIC WITH INTENTION TO CAUSE HARM
4. ANY OTHER PROCESS OR TECHNIQUE WHICH CAUSES SOFTWARE DAMAGE BY
   EXPLOITING ANY KNOWN FLAW; WHERE USE OF SUCH WOULD BE CONSIDERED
   ILLEGAL BY DEFAULT; OR OTHERWISE SHOULD BE CONSIDERED UNETHICAL
   IF USE OF SUCH PROCESS OR TECHNIQUE CAUSES DAMAGE TO A LOCAL
   UNPROTECTED COMPUTER; INCLUDING NETWORK OR NETWORKS WHICH USES THE
   SAME UNPROTECTED HARDWARE ARCHITECTURE

TRADITIONALLY ANY OF THE ABOVE POLICY STIPULATIONS ARE NORMAL COMMON
SENSE WHERE SOFTWARE TOOLS MAY EXPLOIT AND CAUSE DAMAGE TO HARDWARE,
NETWORK ROUTERS, AND INLINE PROCESSES GOVERNING HOW A COMPUTER
OPERATES. OVERALL, ANY TYPE OF SHARING OF TECHNIQUES INTENDED TO
ILLEGALLY BREAK OR DAMAGE COMPUTER SYSTEMS (INCLUDING THE NETWORKS
THAT MAY INTERCONNECT BETWEEN COMPUTER SYSTEMS) WOULD BE THE TYPE
OF TRAINING OR DISCLOSURE NOT ADVISED AND POTENTIALLY ILLEGAL. BY NATURE
OF SUCH ACTIVITY, THE BUILDERS TENDER ANY ACTIONS THAT MAY ARISE
OUT OF SUCH CONDUCT TO END-USERS PARTICIPATING.


THIRD-PARTY CONTACTS
====================

PLEASE USE DISCRETION IF VISITING A WEB DOMAIN THAT MAY BE PROMOTING
CAPIENT ORIGINAL SOFTWARE. HASH CHECKSUM PROCESSES WILL CONFIRM ANY
ELECTRONIC ARTIFACT, SUCH AS SOFTWARE, AND SHOULD BE PUBLISHED
ALONGSIDE ANY OFFICIALLY PROMOTED ITEMS. CAPIENT DOES HAVE SPECIFIC
INTERNAL POLICIES FOR MANAGEMENT OF PROMOTIONALS, BUSINESS
RELATIONSHIPS, OUTSIDE VENDORS, AND PAY TO PLAY PROVIDERS.

VERY SIMPLE STEPS TO CONFIRM ANY QUESTIONABLE SOFTWARE WILL BE
PROVIDED ALONGSIDE PUBLISHED SOFTWARE. IF YOU CANNOT CONFIRM
SOFTWARE IS GENUINE OR HASH CHECKSUM INFORMATION IS ABSENT YOU
CAN FOLLOW FURTHER STEPS BY:

1. SEARCHING FOR VALID SOFTWARE CHECKSUM INFORMATION THAT CAN
   IDENTIFY VALID CAPIENT SOFTWARE

2. VISIT TRUSTED DOWNLOAD LOCATION WHERE SOFTWARE WAS OBTAINED
   FROM AND CONFIRM IF HASH CHECKSUM INFORMATION WAS INCLUDED

3. COMPARE HASH CHECKSUM INFORMATION THAT WILL BE PUBLISHED
   ALONGSIDE OFFICIALLY RELEASED CAPIENT SOFTWARE AT OFFICIALLY
   APPROVED WEBSITES

4. VERIFY WEBSITES REDISTRIBUTING CAPIENT SOFTWARE HAVE SEALS OF
   APPROVAL BY RECOGNIZED TRUST BODIES AND ANTI-PHISHING & VIRUS
   VERIFICATIONS

5. CONFIRM SUSPECT SOFTWARE IS INDEED AUTHENTIC BY READING
   PUBLIC NOTICES APPROVED BY CAPIENT AT ANY APPROVED NEWS LINK HUB.

MISINFORMATION
==============

INFORMATION PROVIDED BY THIS SYSTEM INTENDS TO STRUCTURE DETAILS
ABOUT POLICIES FOR HOW REACTIONS ARE CONDUCTED. THIS EXCLUDES NORMAL
LEGAL PROCESS THAT IS TYPICAL OF STANDARD ARRANGEMENTS:

FOR EXAMPLE, A CROOK MAY STEAL SOFTWARE AND REPERCUSSIONS ARE USUALLY
OUTLINED OR IMPLIED IN SOFTWARE ARRANGEMENT. ALL POLICIES ARE EITHER
CARRIED AT OFFICIAL WEB PRESENCES OR WITHIN SOFTWARE ITSELF.

IT IS GENUINE SOFTWARE WHEN THE SOFTWARE IS VERIFIED AS CAPIENT OFFICIAL.
IF UNOFFICIAL SOFTWARE IS RE-DISTRIBUTED, IT SHOULD CARRY THE SAME
POLICIES WITHIN. IF MISSING, HOWEVER, THE ORIGINAL POLICIES CARRIED
WITH AUTHENTIC AND COMPLETE SOFTWARE STILL ARE VALID AND NORMAL; TO THE
EXTENT CHANGES ARE ADDED, ANY UNOFFICIAL CHANGES THAT DID NOT COME
FROM SOFTWARE PUBLISHER WITH RIGHT TO ADD CHANGES WOULD BE INVALID.

FURTHER EXAMPLES OF MISINFORMATION WHICH MAY BE INVALID ARE INSTRUCTIONS
THAT ARE PUBLISHED WHICH INTEND TO CONFUSE END-USER DIRECTION. IT COULD
BE TO DEGRADE SECURITY, CAUSE EFFECTS TO COMPUTER SYSTEMS THAT ARE
INTENDED TO NOT BE OPTIMAL, ETC. IF YOU FIND INFORMATION THAT CLEARLY
IS MISSING PARTS OR CONFUSING THEN FIND ANOTHER OUTLET TO SECURE
YOUR INFORMATION. IDENTIFY LOCATIONS WHICH PROVIDE THE BEST INFORMATION
SUCH AS FORUMS AND HELPFUL LOCATIONS OVER THE INTERNET.

DOUBTING INTENTIONS
===================

FOR CLARITY IF NECESSARY RESEARCH NEEDS CLARIFICATION, ALL POSITIONS
WHICH REFLECT TRUE DIRECTION OF SOFTWARE ART RELEASED BY THE BUILDERS.
ARE CARRIED AT THREE PRIMARY VENUES.

FIRST IS THE NEWS HUB WHICH PERIODICALLY IS REFRESHED WITH PRESS RELEASE
(INFORMATIONAL) DATA. THE LINK IS FOUND THRU OFFICIAL CAPIENT DOMAINS.

SECOND IS ANY MARKETING WHICH IS PUBLISHED AND GENERALLY AVAILABLE AS
OBVIOUS MARKETING FROM THE INTERNET BUILDING COMPANY LLC. OVER TIME THE
GENERAL MARKETING IS DISTINGUISHED AS INDIVIDUAL TAILORED FOR AUDIENCE
OR TIMEFRAME.

THIRD WOULD INCLUDE STRUCTURED DETAILS CONTAINED IN THE SOFTWARE WHICH
PROVIDE LISTS OF POINTERS, INSTRUCTIONS, OR MOTIVATIONAL OR INSPIRATIONAL
IDEALS (INCLUDING STANDARDS AND IDEAS FOR GROWTH).

GENERALLY ONE OF THESE THREE CAN BE HELPFUL IF END-USER DOUBTS INTENTIONS
OF SOFTWARE OR HAS QUESTIONS ABOUT SECURITY OF SOFTWARE ON THEIR COMPUTER.
FURTHER VALIDATIONS ARE PROVIDED AT MANY POINTS CONCERNING ANY PATH
WHERE END-USER MIGHT BE INQUISITIVE ABOUT HOW SOFTWARE WORKS, RISKS, AND
WHAT TO DO FOR OPTIMAL PERFORMANCE AND PRIVACY.

HELPING, HELPER GUIDES, OTHER
=============================

OVERALL, CAPIENT'S POLICY REGARDING ANY HELP GUIDES, BLOGS, MESSAGES OR
OTHER WAYS TO HELP OTHERS IS VERY OPEN AND FAIR.

GENERALLY THE BUILDERS DO NOT CARE IF THIRD-PARTIES WRITE ANY OF THE
ABOVE (INCLUDING FOR PROFIT). ANY DETAILS PUT INTO TEXTBOOKS, WELCOME
SITES, OR OTHER ELECTRONIC COMMUNICATIONS ARE TOTALLY UP TO THIRD-PARTY.

FINDING POLICIES
================


Legal Responsibilities (For You)
Capient Policies




UPDATED 2.JULY.2017

Information may change over time or become outdated. Information presented
is current as of today's date. Unless specified all web links are official
and considered part of The Builders c/o CAPIENT official websites.