VelroseGame All rights reserved

®.

AGGREMENT Select:

TERMS & CONDITIONS

Please read these Terms of Service and our Privacy Policy carefully before using VelroseGame Services.
Whenever you use the Services, you agree to be bound by all of the terms and conditions of these Terms of Service. If you don’t agree to all the terms and conditions you must not use our Services.
References to “VelroseGame,” “Us” or “We” means VelroseGame project.
In all cases, “VelroseGame,” “Us,” or “We” includes agents, consultants, employees, officers and directors.
1. DEFINITIONS
“Account” means an account you create when you access the Services.
“Community Rules” means the rules of conduct that govern your interaction with our Services and other players.
“Feature Terms” means any other rules related to specific services like platforms and APIs, applications for mobile devices, forums, contests, subscriptions or loyalty programs that We may publish which apply to your use of those specific services and state they are part of these Terms.
“Offers” means special programs, including offers, excursions, and special gifts, both digital and tactile, that Lineage 2 Infinity may offer from time to time to certain eligible players.
“Services” refers to products, games, services, content, https://velrosegame.com and/or the other domains provided by VelroseGame.
“Terms of Service” or “Terms” means these terms of service.
“User Content” means all the data that you upload or transmit on or through the Service. This includes things like your profile picture or your in-game chat.
“Virtual Items” means (a) virtual currency, including but not limited to virtual coins, cash, tokens, or points, all for use in the Service and (b) virtual in-game items.
“VelroseGame Affiliates” refers to the VelroseGame’s third-party content providers, distributors, licensees or licensors.
2. CHANGES TO THESE TERMS
We reserve the right, at our discretion, to change, modify, add or remove portions of the Terms, Community Rules, Feature Terms, and Privacy Policy at any time by posting the amended Terms, Community Rules, Feature Terms, or Privacy Policy on our sites or within the Service (such as through in-game notices). We may provide additional notice, such as an e-mail message or messaging within the Services, of any material changes. Unless We state otherwise, changes are effective when posted. If you continue to use the Services after the changes are posted you agree to the changes. New versions of the Terms, the Community Rules and the Privacy Policy and any other policies, codes or rules will be accessible at www.l2VelroseGame.com or from within the Services.
If you have a dispute with VelroseGame, the version of the Terms, the Community Rules, Feature Terms, and the Privacy Policy in effect at the time VelroseGame received actual notice of the dispute will apply to such dispute. However, if you keep using the Service after the changes are posted, you are agreeing that the changes apply to your continued use of the Services.
You can’t make changes to the Terms, Community Rules, Feature Terms, or Privacy Policy unless both you and VelroseGame sign a written amendment.
If the Terms or the Privacy Policy have provisions that conflict with other VelroseGame terms or policies, the provisions in these Terms and the Privacy Policy win.
3. ACCOUNT INFORMATION AND SECURITY
In order to use our Services, We may ask you to create an Account and select a password and/or provide Us with certain personal information, which may include your name, birth date, e-mail address, and, in some cases, payment information. This information will be held and used in accordance with VelroseGame’s Privacy Policy.
You agree to supply VelroseGame with accurate, complete, and updated information, particularly your email address.
You are responsible for maintaining the security of your Account. Don’t share your Account details with others or allow others to access or use your Account. You are solely responsible for any activity in your Account whether or not authorized by you, including purchases made using any payment instrument (for example, credit card, PayPal or social network or platform virtual currency).
Tell Us immediately of any actual or suspected loss, theft, fraud, or unauthorized use of your Account or Account password.
4. PRIVACY
VelroseGame’s Privacy Policy tells you how We collect and use information about you and your computer or mobile device, and how you can use the Services to share such information with others. You understand that through your use of our Services you acknowledge the collection, use and sharing of this information as described in VelroseGame’s Privacy Policy. If you don’t agree with the Privacy Policy, then you must stop using our Services.
We encourage you to read the VelroseGame Privacy Policy carefully and use it to make informed decisions.

5. USING OUR SERVICES
Who can use our Service: We are excited to have you start playing our games, but there are some limits on who can use our Service.
You may not use our Service if:
• You cannot enter into a binding contract with VelroseGame;
• You are under 13 years of age, in which case you must not create an Account, use any part of the Service except games with an age screen after accurately identifying your age, or submit personal information through the Service or to VelroseGame (for example, name, address, telephone number, email address);
• You are a convicted sex offender; or
• You have previously been banned from playing any VelroseGame game or using any VelroseGame Service.
If you are under the age of 18, or under the age of majority where you live, you represent that your legal guardian has reviewed and agreed to these Terms.
Additional Important Rules and Terms:
If you use our Service, you must follow the VelroseGame Community Rules and all other Feature Terms that may apply. These additional rules and terms apply in addition to these Terms and are important. Please read them. If you access the Service from a social network or download the Service from another platform, such as Apple or Google, you must also comply with its terms of service/use as well as these Terms.
Accessing our Service:
To access or play our games or create an account with Us, you may need an account with a social network, like Facebook, and, if you are using our mobile Service, an account with the company that provides your mobile applications, like an iTunes account. You may need to update third party software from time to time to receive the Service and play VelroseGame’s Games.
We provide the games. You provide the equipment (computer, phone, tablet, etc.) and pay any fees to connect to the Internet and app stores, or for data or cellular usage to download and use the Service.
Service Changes and Limitations:
The Service is evolving and We may require that you accept updates to the Service as well as to the Terms, Community Rules, and the VelroseGame Privacy Policy. From time to time we may make you update the game or your software to continue to use Our Services. We may perform these updates remotely including to VelroseGame software residing on your computer or mobile device, without notifying you.
VelroseGame reserves the right to stop offering and/or supporting the Service or a particular game or part of the Service at any time either permanently or temporarily, at which point your license to use the Service or any part of it will be automatically terminated or suspended. If that happens, VelroseGame is not required to provide refunds, benefits or other compensation to players in connection with discontinued elements of the Service or for virtual goods previously earned or purchased.
VelroseGame MAY, IN ITS SOLE DISCRETION LIMIT, SUSPEND, TERMINATE, MODIFY, OR DELETE ACCOUNTS OR ACCESS TO THE SERVICE OR ANY PORTION OF IT AND PROHIBIT ACCESS TO OUR GAMES AND SITES, AND THEIR CONTENT, SERVICES AND TOOLS, DELAY OR REMOVE HOSTED CONTENT AND VelroseGame IS UNDER NO OBLIGATION TO COMPENSATE YOU FOR ANY SUCH LOSSES OR RESULTS.
Deleting your Account:
You may stop using the Service at any time and may request that We stop making active use of your data at any time by following the instructions in the Privacy Policy. Unless the local law where you are located requires otherwise, We are not required to provide refunds, benefits or other compensation if you request deletion of your Account.

6. OWNERSHIP; LIMITED LICENSE
Games and Service:
The Service is comprised of works owned by VelroseGame, and it is protected by copyright, trademark, trade dress, intellectual property and other applicable laws, rules or regulations. VelroseGame owns, has licensed, or otherwise has rights to use all of the content that appears in the Service. These Terms do not grant you or any other party any right, title or interest in the Service or any content in the Service.
So long as you abide by these Terms and any other rules, including the Community Rules, VelroseGame grants you a non-exclusive, non-transferable, revocable limited license subject to the limitations in these Terms, to access and use the Service using a VelroseGame supported web browser or mobile device solely for your own non-commercial entertainment purposes. You agree not to use the Service for any other purpose.
If you violate these Terms, or any of Our other terms that apply to you, We may take action against you, up to and including permanently suspending your account. In addition, you may be breaking the law, including violations of VelroseGame’s intellectual property rights. ANY ATTEMPT BY YOU TO DISRUPT OR INTERFERE WITH THE SERVICE INCLUDING WITHOUT LIMITATION UNDERMINING OR MANIPULATING THE LEGITIMATE OPERATION OF ANY VelroseGame GAME IS A VIOLATION OF VelroseGame POLICY AND MAY BE A VIOLATION OF CRIMINAL AND CIVIL LAWS.
Your Account and Virtual Items:
Regardless of what anything else says in these Terms, the Community Rules, or any other Feature Terms that apply to features you may choose to use, you do not own the Account that you create on Our Service, including in Our games, and your Account is not your property. This also applies to other stuff, like in-game currency or items, regardless of whether you “earned” those items in a game or “purchased” them. Your account and any related items are owned by VelroseGame. VelroseGame gives you a limited license to use your account and the related items while We offer the Services
WE MAY DELETE OR TERMINATE ACCOUNTS THAT ARE INACTIVE (I.E., NOT LOGGED INTO) FOR 180 DAYS.
IF YOU WANT US TO DELETE YOUR ACCOUNT, YOU CAN GO TO THE PRIVACY POLICY PAGE FOR INSTRUCTIONS ON HOW TO MAKE THAT REQUEST.
You are not allowed to transfer Virtual Items outside of the Service (i.e., in the “real world”), for example by selling, gifting, or trading them. We won’t recognize those transfers as legitimate. You are not allowed to sublicense, trade, sell or attempt to sell in-game Virtual Items for “real” money, or exchange Virtual Items for value of any kind outside of a game. Any such transfer or attempted transfer is prohibited and void, and We may terminate your Account because of it.
User Content:
If you transmit or upload User Content on the Service, you agree that it will be:
1. accurate;
2. not confidential;
3. not in violation of the law;
4. not in violation of contractual restrictions or other parties’ rights, and that you have permission from any other party whose personal or other information or intellectual property is contained within the User Content;
5. free of viruses, adware, spyware, worms or other malicious code;
6. in compliance with the VelroseGame Community Rules.
Your User Content will be processed by VelroseGame in accordance with its Privacy Policy.
You own your User Content, but you give VelroseGame a perpetual and irrevocable (other than as provided below), worldwide, fully paid-up and royalty free, non-exclusive, license to use your User Content and any modified and derivative works thereof in connection with the Service, including in marketing and promotions. To the extent allowed by applicable laws, you waive any moral rights you may have in any User Content (like the right to be identified as the author of the User Content or the right to object to a certain use of that User Content).
VelroseGame’s license to your User Content ends when you request deletion of your User Content by submitting a request to [email protected]
User Content submitted in response to VelroseGame promotions (which will be subject to the terms of the promotion);
1. User Content either shared with others which they have not deleted or already used publicly as allowed under these Terms; and
2. User Content subject to a separate license with VelroseGame (which will be subject to the terms of such license).
If you request deletion of your User Content we will take reasonable steps to remove your User Content from active use, which may include suppression of your User Content in our systems. However, User Content may persist in our systems, including back-up copies. We may also retain copies of User Content if we are legally required to do so.
When you post your observations and comments on the Service such as in forums, blogs and chat features, We cannot guarantee that other players will not use the ideas and information that you share. If you have an idea or information that you would like to keep confidential and/or don’t want others to use, don’t post it. VelroseGame IS NOT RESPONSIBLE FOR ANY OTHER PERSON’S USE OR APPROPRIATION OF ANY CONTENT OR INFORMATION YOU POST IN ANY FORUMS, BLOGS AND CHAT ROOMS.
7. MONITORING USE OF SERVICE AND USER CONTENT
We have no obligation to monitor User Content and We are not responsible for monitoring the Service for inappropriate or illegal User Content or conduct by other players. That said, We have the right, in our sole discretion, to edit, refuse to post, or remove any User Content.
We may also, at our discretion, choose to monitor and/or record your interaction with the Service or your communications with VelroseGame or other players (including without limitation chat text and voice communications) when you are using the Service.
We are not responsible for information, materials, products or services provided by other players (for instance, in their profiles). However, if someone is violating these Terms or misusing the Service, please let Us know by contact Us at [email protected]
8. YOUR DEALINGS WITH OTHER PLAYERS
You are responsible for your interactions with other players. If you have a problem with another player, We are not required to get involved, but We can if We desire.
9. PAYMENT TERMS
We provide a service in the form of access to games and Virtual Items. In the Service you may use “real world” money to obtain a limited license to use Virtual Items and/or other goods or services.
How it Works:
You get a limited license to Virtual Items by visiting the purchase page in one of our games and providing billing authorization through the platform on which You are playing (e.g., Facebook, Apple iOS, Android).
On l2VelroseGame.com, the payment page will let you know what you can use to pay when you make your purchase. We may change what you can use to pay from time to time, at Our sole discretion. Virtual Items purchased in Our games on other platforms such as Facebook, Apple iOS, or Android will be subject to those platforms’ payment terms and conditions. VelroseGame does not control how you can pay or how any refunds may be issued on those platforms. Please review those platforms’ terms of service for additional information.
For Virtual Items, your order will represent an offer to Us to obtain a limited license for the relevant service(s) or virtual in-game item(s) which will be accepted by Us when We make the Virtual Items available in your account for you to use in our games or debit the account through which you paid, whichever comes first. Your limited license to Virtual Items for use in VelroseGame games is a service provided by VelroseGame that starts when We accept your payment or redemption of third party virtual currency.
For orders to obtain a limited license to use Virtual Items, by clicking the button on the purchase window or page you:
1. agree that We may start to supply your purchased Virtual Items immediately after you have clicked that button; and
2. if you reside in the European Union, you acknowledge that you will therefore no longer have the right to cancel under the EU’s Consumer Rights Directive (as implemented by the law of the country where you are located) once we start to supply the Virtual Item.
You understand that while you may “earn” “buy” or “purchase” Virtual Items in our Services, You do not legally “own” the Virtual Items and the amounts of any Virtual Item do not refer to any credit balance of real currency or its equivalent. Any “virtual currency” balance shown in your Account does not constitute a real-world balance or reflect any stored value, but instead constitutes a measurement of the extent of your limited license.
ALL SALES ARE FINAL:
YOU ACKNOWLEDGE THAT VelroseGame IS NOT REQUIRED TO PROVIDE A REFUND FOR ANY REASON, AND THAT YOU WILL NOT RECEIVE MONEY OR OTHER COMPENSATION FOR UNUSED VIRTUAL ITEMS WHEN AN ACCOUNT IS CLOSED, WHETHER SUCH CLOSURE WAS VOLUNTARY OR INVOLUNTARY, OR WHETHER YOU MADE A PAYMENT THROUGH l2VelroseGame.com OR ANOTHER PLATFORM SUCH AS APPLE, GOOGLE, FACEBOOK, OR ANY OTHER SITES OR PLATFORMS WHERE WE OFFER OUR SERVICES.
PURCHASES OR REDEMPTIONS OF THIRD PARTY VIRTUAL CURRENCY TO ACQUIRE A LICENSE TO USE VIRTUAL ITEMS ARE NON-REFUNDABLE TO THE FULLEST EXTENT ALLOWED BY LAW.
If you purchase third party currency or choose to make a payment in our Services through a third party (like Facebook, Apple, or Google), you are agreeing to the third party’s payment terms, and VelroseGame is not a party to the transaction.
Additional Payment Terms:
You agree to pay all fees and applicable taxes incurred by you or anyone using an Account registered to you. VelroseGame may revise the pricing for the goods and services it licenses to you through the Service at any time.
Billing Support:
For billing support, send us an email to Live Chat with the subject “Payment Support”
10. PROMOTIONS AND OFFERS
From time to time, We may offer limited time promotions. Please review the official rules (if any) associated with the promotion. They will apply in addition to these Terms.
In addition, from time to time, We may promote Offers. We are not required to give, and players are not required to accept, any Offer. Offers are not transferable, redeemable or exchangeable for other things of value, except at our sole discretion. If you accept any Offer, you may have to sign a declaration of eligibility and liability release, or sign other paperwork in order to get the Offer. Some Offers will be subject to taxes and other charges, travel, or activities outside of the virtual world, all of which will be disclosed before You accept the offer. If you accept an Offer you also assume all liability associated with the Offer.
11. THIRD PARTY ADVERTISING
Our Service and our games may feature advertisements from Us or other companies. Our Privacy Policy explains what information We share with advertisers. Please read it.
Sometimes We provide links in Our games or on the Service to other companies websites or to companies who invite you to participate in a promotional offer and offer you some feature of the Service or upgrade (such as in-game currency) in exchange. Any charges or obligations you take on in dealing with these other companies are your responsibility.
We make no representation or promises about any content, goods or services these other companies provide, even if linked to or from Our Service or games. Also, just because We allow a link to be included in Our games or Service does not mean We endorse that linked site. We are not liable for any claim relating to any content, goods and/or services of third parties.
Please also note that the linked sites are not under our control and may collect data or ask you to provide them with your personal or other information, or they may automatically collect information from you. When you use other companies’ services like these, the other company’s service may (or may not) ask you for permission to access your information and content. We are not responsible for these other companies’ content, business practices or privacy policies, or for how they collect, use or share the information they get from you.
12. COPYRIGHT NOTICES/COMPLAINTS
We respect the intellectual property rights of others and ask that you should, too. We reserve the right to terminate any player’s access to the Service if We determine that the player is a “repeat infringer.” We do not have to notify the player before We do this. We also accommodate and do not interfere with standard technical measures copyright owners use to protect their materials.
13. FEEDBACK AND Unsolicited Ideas
Sometimes, We may request your feedback on certain features through a promotion or our customer insights program. Any feedback you provide at Our request through a promotion or program is subject to the rules of the specific promotion or program.
Any idea, information or feedback you submit to us without Our specific request is subject to Our Unsolicited Ideas Policy.
14. WARRANTY DISCLAIMER; SERVICES AVAILABLE ON AN “AS IS” BASIS
Neither VelroseGame nor any VelroseGame Affiliate makes any promise or guarantee that the Service will be uninterrupted or error-free.
USE OF THE SERVICE IS AT YOUR SOLE RISK. IT IS PROVIDED ON AN “AS IS” BASIS. TO THE EXTENT PERMITTED BY APPLICABLE LAW, VelroseGame AND ANY VelroseGame AFFILIATE MAKE NO WARRANTIES, CONDITIONS OR OTHER TERMS OF ANY KIND, EITHER EXPRESS OR IMPLIED, ABOUT THE SERVICES. VelroseGame AND ANY VelroseGame AFFILIATE DISCLAIM ANY WARRANTIES OF TITLE OR IMPLIED WARRANTIES, CONDITIONS OR OTHER TERMS OF NON-INFRINGEMENT, MERCHANTABILITY, QUIET ENJOYMENT OR FITNESS FOR A PARTICULAR PURPOSE.
If your state or country does not allow these disclaimers, they do not apply to you. If your state or country requires a certain period for which a warranty applies, it will be either the shorter of 30 days from your first use of the Service or the shortest period required by law.
15. LIMITATIONS; WAIVERS OF LIABILITY
YOU ACKNOWLEDGE THAT VelroseGame AND THE VelroseGame AFFILIATES ARE NOT LIABLE
(1) FOR ANY INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY OR CONSEQUENTIAL DAMAGES, INCLUDING FOR LOSS OF PROFITS, GOODWILL OR DATA, IN ANY WAY WHATSOEVER ARISING OUT OF THE USE OF, OR INABILITY TO USE, THE SERVICE; OR
(2) FOR THE CONDUCT OF THIRD PARTIES, INCLUDING OTHER USERS OF THE SERVICE AND OPERATORS OF EXTERNAL SITES.
THE RISK OF USING THE SERVICE AND EXTERNAL SITES RESTS ENTIRELY WITH YOU AS DOES THE RISK OF INJURY FROM THE SERVICE AND EXTERNAL SITES.
TO THE FULLEST EXTENT ALLOWED BY ANY LAW THAT APPLIES, THE DISCLAIMERS OF LIABILITY IN THESE TERMS APPLY TO ALL DAMAGES OR INJURY CAUSED BY THE SERVICE, OR RELATED TO USE OF, OR INABILITY TO USE, THE SERVICE, UNDER ANY CAUSE OF ACTION IN ANY JURISDICTION, INCLUDING, WITHOUT LIMITATION, ACTIONS FOR BREACH OF WARRANTY, BREACH OF CONTRACT OR TORT (INCLUDING NEGLIGENCE).
Some states or countries do not allow the exclusion of certain warranties or the limitations/exclusions of liability described above. So these limitations/exclusions may not apply to you if you reside in one of those states or countries.
16. INDEMNITY
If you use or misuse the Service, or if you violate these Terms or any other applicable rules, including the Community Rules or Feature Terms, and that results in loss or damage or in a claim or liability against VelroseGame or any VelroseGame Affiliate, you agree to indemnify, defend and hold harmless VelroseGame and/or the VelroseGame Affiliate (which means you agree to compensate VelroseGame and/or the VelroseGame Affiliate on a “euro for euro” basis) for that loss, damage, claim or liability, including compensating VelroseGame and/or the applicable VelroseGame Affiliate for our legal fees or expenses. If VelroseGame or the VelroseGame Affiliate wants to, they are allowed to take exclusive charge of the defense of any case on which you are required to compensate or reimburse them, and it will be at your expense. You also have to cooperate in VelroseGame’s and/or the VelroseGame Affiliate’s defense of these cases. VelroseGame and/or the VelroseGame Affiliate will use reasonable efforts to let you know if they learn of any claim on which you have to compensate or reimburse them. This will apply even if you stop using the Services or your account is deleted.
17. ASSIGNMENT
We may give our rights, or Our obligations, under these Terms, Feature Terms, Community Rules, or our Privacy Policy to any person or entity at any time with or without your consent. You may not give your rights or your obligations under these Terms, Feature Terms, Community Rules, or our Privacy Policy without first getting VelroseGame’s written consent, and any attempt to do so without our consent is void.
18. ENTIRE AGREEMENT
These Terms, and any other policies or rules We reference in these Terms, make up the entire agreement between you and Us relating to the subject matter of these Terms, and supersede all prior understandings of the parties relating to the subject matter of these Terms, whether those prior understandings were electronic, oral or written, or whether established by custom, practice, policy or precedent, between you and Us.
19. LANGUAGE OF THE TERMS
If We provide a translated version of these Terms, Feature Terms, the Community Rules, the VelroseGame Privacy Policy, or any other terms or policy, it is for informational purposes only. If the translated version means something different than the English version, then the English meaning will be the one that applies.
20. NO WAIVER
If We do not enforce a provision of these Terms, Feature Terms, the Community Rules, or our Privacy Policy, that does not waive our right to do so later. And, if We do expressly waive a provision of these Terms, Feature Terms, the Community Rules, or our Privacy Policy that does not mean it is waived for all time in the future. Any waiver must be in writing and signed by both you and Us to be legally binding.
21. NOTICES
We may notify you by posting something on www.l2VelroseGame.com, or in the VelroseGame game(s) you play, and sending you an e-mail or using other ways of communicating with you based on the contact information you provide to Us.
Any attempted notice that does not follow these rules has no legal effect.

22. EQUITABLE REMEDIES
You agree that given the unique and irreplaceable nature of the rights granted and obligations made under these Terms and the Community Rules, if you breach these Terms, Feature Terms, Community Rules and/or our Privacy Policy, or intend to breach these Terms, Feature Terms, Community Rules or Privacy Policy, money damages alone will not be enough to repair the harm to VelroseGame.

23. FORCE MAJEURE
We are not liable for any changes or problems out of our control, for example changes or problems caused by like natural disasters, war, terrorism, riots, embargoes, acts of civil or military authorities, fire, floods, accidents, network infrastructure failures, strikes, or shortages of transportation facilities, fuel, energy, labor or materials.
FREE DOWNLOAD
Fafurion Patch Server – Game Client 11.3GB
PATCH
Unzip it to your lineage2 folder. 133 MB

User agreement of the limited company L2Infinity

This Agreement is designed to regulate the relationship between the user and the copyrighter of the Internet Portal velrosegame.com

Content:
1. Defintions.
2. Subject of the Agreement.
3. Terms for entry of the Agreement into a force .
4. Rights and Obligations of the Parties
4.1 User Rights.
4.2 User Obligations.
4.3 User does not have the right to:
4.4 Operator Rights.
4.5 Operator Obligations.
4.6 Limitation of liability of the Operator.
4.7 The Operator does not guarantee:
5. Privacy and Security.
6. Additional Paid Services.
7. Disclaimer of Warranties
8. Additional provisions.

1. Defintions
«Operator» — the owner of velrosegame.com Portal, is a Party to the User Agreement. Operator performs administration and maintenance, provides users access to the portal, services (also paid services), under the terms of this agreement.
«User.» means an individual (natural person) that has completed the registration on velrosegame.com Portal or participating in a Portal projects

«User» and «Operator» are the Parties to the Agreement.

«Portal» — special software and hardware complexes placed on the Operator’s resources. User access to the portal is provided only by the Operator. All rights to use this portal belong exclusively to the Operator.

«Site» is a website located on the Internet at https://velrosegame.com.

«Services» means providing Users with access to the Portal, using opportunities and services, participating in projects on the terms and conditions specified in the Agreements. Operator’s services are provided free of charge. Exceptions are only Additional Paid Services. All Services are provided by the operator only within the Portal, i.e. During its use by the User.

«Additional paid services» means providing the User with additional special features of the Portal for a fee. These services are not mandatory and are provided at the request of the User. Paid Services are also provided by the Operator exclusively within the Portal.

2. Subject of the Agreement
2.1. Operator provides access to the Portal (Services, Paid Services) to an unlimited number of persons on the terms of this Agreement.

2.2. The user is aware that the main purpose of project is to portal velrosegame.com organization operator of leisure and entertainment, is in no way associated with gambling.

3. Terms for entry of the Agreement into a force
3.1. From the moment of acceptance of this Agreement, the User has the Rights and performs the Obligations stipulated in the text of this Agreement.

3.2. The User accepts and agrees to the terms of this Agreement by registering the account on the site: velrosegame.com. The fact of acceptance means the full and unconditional consent of the User with all the conditions and annexes of this Agreement.

3.3. If the User for any reason does not agree with the terms and conditions of this Agreement, he must stop further use of the Site and Operator’s Services.

3.4. Use Operator’s Site and Services possible only after acceptance of this Agreement by the User.

3.5. By accepting this Agreement, the User confirms his legal capacity, the right to enter into this Agreement. The operator does not have to check the data specified by the user at registration.

3.6. If you need to create an account (hereinafter «Account») to use the information and entertainment portal velrosegame.com or participate in portal projects, the User must complete the registration process by providing the Operator with up-to-date, complete and accurate information (including e-mail) in the relevant Form. In case of posting on the portal velrosegame.com messages about participation in partner programs, the registered user has the right to participate in contests, drawings, competitions on the Site of partners velrosegame.com

4. Rights and Obligations of the Parties

4.1. User Rights.

In accordance with this agreement, the User has the Rights:

To use the Portal only for personal, non-commercial purposes.

To use all services, resources (including Additional Paid Services) provided by the Operator.

If necessary, get help from technical support of the site, ask Operator about the issues that arise, through contact information or feedback form.

Free of charge (excluding the provision of Additional Paid Services) to use the site and participate in the projects of the Portal.

4.2. User Obligations.

Complying with the terms of this agreement, the User is obliged:

Provide reliable information when registering on the Site.

The User shall be responsible for ensuring non-disclosure (confidentiality) of the data stored in his/her account, his/her login and passwords and bear liability for any failure to keep confidential and disclose in any way his/her account data.

If necessary, at the request of the Operator, provide confirmation of their personal data indicated on the Site at the time of registration.

Follow the Operator’s instructions within this Portal.

Do not violate the rights of author and intellectual property of the Operator, located on its Portal.

Comply with all conditions of this Agreement without limitations.

The User undertakes to use the Portal exclusively for entertainment purposes, without pursuing any gain from the Portal.

4.3. User does not have the right to:

Using the Operator Portal, the User does not have the right to:

— Use errors (bugs) of the Site and Services of the Portal. Get unauthorized access to the database, computer system, modify the program code. The User is prohibited from using malicious programs that can cause damage the Portal, as well as special software that gives him superiority over other users. If such and similar violations are detected, the Operator has the right to impose penalties on the User, including the prohibition of access to Sites and the deletion of the account.
— Restrict access to the sites of other Users.
— Cheating and other illegal actions.
— To advertise anything that does not relate to the Portal without the written permission of the Operator.
— It is forbidden use profanity, express threats to the Operator or other Users, disseminate materials that promote violence, racial hatred, dislike of religious beliefs, containing pornographic information, advertising of drugs, calling for the violent overthrow of power.
— Conduct anti-advertising on the Portal, including on other resources
— The User agrees that his Rights and Obligations can be changed / supplemented by the Operator, which he is notified by the contact information specified at the time of registration (or on the Site)

4.4. Operator Rights.

This Agreement gives to Operator the following Rights:

At any time, at its discretion, unilaterally without prior notice to Users, expand, modify, terminate, restrict the provision of the Services, as well as the Additional Paid Services.

Manage all processes on the Portal only at their own discretion. Suspend, change the course of any processes without notifying the User in advance.

Apply penalties to the User in case of violation of this Agreement.

Delete / modify the User information posted on the Portals.

To monitor, store identification and statistical information about the User.

To send to the Users technical, advertising and other information concerning the Portal, Services and Paid Services.

Inform, warn, make observations, notify the User in case of non-observance / violation of the terms of this Agreement. All instructions of the Operator must be strictly adhered to.

Take legal measures to protect their intellectual, copyright property.

Modify, change, supplement the Portal on your own, without warning the User in advance.

Inaction of the Operator for violation of this Agreement by the User does not exclude the use of penalties for them later.

4.5. Operator Obligations.

As a party to the User Agreement, the Operator shall:

Make possible that the User can receive the Operator’s Services within this Portal (including the receipt of Additional Paid Services).

Answer the Users’ questions, if there are any disputable situations, take all measures to resolve them.

4.6. Limitation of liability of the Operator.

In accordance with this section, the Operator is not responsible for:

Any damage caused or which can only be caused to the personal data and computer of the User related with the use of the Portal and the Site

Losses (direct / indirect) caused to the User related to the use or inaccessibility of the Portal (inability to use it), the behavior of third parties on the Portal, as well as other participants in the Portal’s projects, unauthorized access to the User’s personal data.

Speech, disseminated information, User’s statements and other unlawful acts carried out by him on the Portal and beyond.

The information specified by the User at registration, the lost possibility of access to the Portal (login, password, etc.).

The User’s loss of acquired virtual values, as a result of the provision of Services and Additional Paid Services by the Operator.

Payment by the User of Additional Paid Services and related expenses.

Continuous and trouble-free work of the Portal.

Possibilities of the User, related with Internet connection, data transmission speed.

4.7. The Operator does not guarantee:

Continuous, reliable, error-free operation of the Portal, access to its resources, Services, including Additional Paid Services

The fact that the Portal will full compliance with the requirements and representations of the User.

That the quality of the provided Services (Additional Paid Services) will meet the expectations of the User.

The Operator is not obliged to provide documents and other evidence indicating the violation (by the User) of this Agreement and the application of penalty / disciplinary sanctions against the User upon the User’s request.

The User uses the Portal, the Operator’s Site solely at his own risk, of his own free will, without coercion. He understands the possible risks associated with the use of the Operator’s resources and has no claims to the Operator.

5. Privacy and Security.
5.1. Confidential Information — information received by the operator in the process of registering the User on the Site, as well as during visits to the Sites / Portal and participation in the events of the Portal.

5.2. Confidential information is not subject to disclosure and transfer to third parties.

5.3. Personal data can be transferred by the Operator only in the following cases:

-Official request of law enforcement agencies (violation of local and international legislation).

-Personal will of the User.

-Inability to use the Services and Additional Paid Services on the Portals (which the User is warned about in advance).

-Violations of the clauses of this Agreement (at the discretion of the Operator).

5.4. The operator ensures the safety of the user’s personal data using special software. In case of unauthorized access to the Portal / Site of third parties, personal data security is not guaranteed.

6. Additional Paid Services.
6.1. At the request of the User, the Operator provides him with Additional Paid Services. They allow you to use the advanced features of the Portal.

6.2. Additional Paid Services are not a prerequisite for using the Portal and participating in the Portal’s projects.

6.3. Since debiting of funds by the Portal Operator from the User’s account, the additional Paid Service is considered to be rendered in full, of the proper quality.

6.4. After the provision of the Additional Paid Service, the money spent for its purchase is not refundable.

6.5. The User agrees that the Operator has the right to store the personal information received when User purchase the Additional Paid Services.

6.6. The list of Additional Paid Services and their cost are published only by the Operator on the Site / Portal. Any information and offers of purchase posted on third-party resources are considered fraud, for which the Operator does not bear responsibility.

6.7. The methods and the possibility of purchasing Additional Paid Services are explained by the Operator on the Site.

6.8. The operator does not give explanations on the issues of working with payment systems with which the User has decided to purchase Additional Paid Services, and is not responsible for their correct operation.

6.9. In a cases of a technical malfunction of the Sites or intentional actions of the User, or in other cases when Additional Paid Services were rendered without full / partial debiting of funds from the User’s account, he is obliged to report this fact to the Operator. After that, the User is obliged to repay the arrears.

6.10. The Operator does not reimburse the User for unused (partially used) Additional Paid Services.

6.11. The user at his own expense, independently carries all the financial costs associated with the acquisition (transfer of money) of Additional Paid Services. This section includes: commissions, fees and other expenses.

6.12. The User guarantees to the Operator that he has all legitimate power and rights to conclude this Agreement in the part of Additional Paid Services.

6.13. In the case of purchasing Additional Paid Services by a User who has not reached the age of 18, he must first obtain consent to conduct a financial transaction with legal representatives. The fact of purchasing Additional Paid Services is a confirmation of the receipt of such consent from the legal representative. If necessary, the Operator has the right to request a written confirmation of the receipt of consent and the provision of passport data to determine the true age of the User.

6.14. Responsibility for the purchase of Additional Paid Services is entirely the responsibility of the User and his legal representatives.

6.15. Disputes about responsibility for the purchase of Additional Paid Services with the Portal Operator are not allowed.

6.16. Receipt of additional Paid Services by the User is possible only after full payment of their cost.

7. Disclaimer of Warranties.
ALL SERVICES ON PORTALS ARE PROVIDED TO USERS UNDER THE INSTALLED CONCEPT «AS IS» . PORTAL DISCLAIMS THE WARRANTY OF RELATING TO SERVICES OR INGAME ITEMS.

OPERATOR HEREBY WARNS AND REMINDS THAT EXCESSIVE USE OF PC, INCLUDING PLAY ON PC, CAN BE HARMFUL FOR THE USER’S HEALTH. THE USER OR ITS LEGAL REPRESENTATIVES, TRUSTEE HEREBY AGREE TO BE RESPONSIBLE FOR CONTROLLING THE STATE OF HIS/HER HEALTH AND NOT TO USE THE SERVICES / RESTRICT THEIR USE IN CASE OF ANY CONTRAINDICATIONS.

OPERATOR SHALL NOT BE RESPONSIBLE OR LIABLE FOR ANY INDIRECT, INCIDENTAL, OR OTHER DAMAGES (INCLUDING WITHOUT LIMITATION, LOST PROFITS) RESULTING FROM THE GAME SERVICES, OPERATOR’S PORTAL AND/OR MATERIALS ON THE SITES, THIRD PARTIES’ ACTIONS RELATED TO THE GAME SERVICES AND OPERATOR’S PORTAL AND/OR MATERIALS ON THE SITES, INCLUDING FRAUDULENT AND/OR NEGLIGENT ACTIONS OF THIRD PARTIES.

8. Additional provisions.
8.1. If the User does not have the right to use the Portal according to the laws of his country or there are other restrictions (age limits and others), he is obligated to refuse to use the Portal without warning, as well as their separate services. The user assumes all responsibility of using the Portal in his country, based on local laws and taking into account international legislation.

8.2. Invalidity of one / several items / sections of the User Agreement does not entail its invalidity as a whole. In this case, the Parties must fulfill their obligations under the remaining items / sections of the Agreement.

8.3. Disputes arising between the Parties are shall be settled on a pre-trial basis through correspondence between the Operator and the User. In case of ineffective settlement of disputes, they will be resolved in accordance with the legislation of Romania.

8.4. This Agreement may be amended, supplemented by the Operator without prior notice to the User. Any changes take effect immediately after the publication of the amended version of the Agreement on the Site. To avoid disputes, the User undertakes to independently verify the text of the Agreement on the Site, where it is freely available. In case of failure to verify the text of the Agreement by the User, this fact can not serve as a basis for refusing to fulfill the obligations undertaken. The amended version of the Agreement after publication on the Site has a similar legal effect with the original text.

This Policy establishes the specificities of data-processing of the Users of the Service located at http://velrosegame.com (hereinafter referred to as the “Service”) and the game servers (hereinafter referred to as “Servers”). This Policy also includes all applications and additions to it.

This document (hereinafter referred to as the “Policy”) is an integral part of the User Agreement of the Service.

The text of this document is available at http://velrosegame.com

When downloading, installing, registering, accessing and any other way of using the Service, you fully accept the terms of this Policy and express your consent to the processing of your data in a manner and for purposes as described in this document. If you do not agree with this Policy, please, refuse to download, install and otherwise use the Service.

The Administration may from time to time modify and / or supplement this Policy without prior written notice to Users. The new version of this document is located at http://velrosegame.com You need to periodically check the changes and / or additions made to it. If you continue to use the Service after making changes to this document, you confirm your agreement with the new edition of the Policy.

1. Purposes of User data processing

The data is provided by Users in connection with the conclusion with the Administration of the User Agreement located at http://lineage2.velrosegame.com/page.php

The data could be obtained on request from Service in connection with the execution of the concluded agreements. Cases of the User providing data (without limitation):

– When creating an account in the Service http://velrosegame.com and / or on any Server and managing it;
– If you participate in testing additional game services and / or service updates (if applicable);
– When participation in game Events, promotions competitions and other similar events;
– When sending requests, letters or other types of contacts with the Administration of the Service;
– When using additional, special services inside the Game.

Your data is processed for the following purposes (not limited to):

– Providing the ability to create and then use and manage a User account on the Service;
– Participation in the Game and access to the game features that are provided for in the Gameplay;
– Implementing interactions with other Users;
– Fixing bugs, developing new game features and services;
– Interaction with Users for comments on the Service, support for Users, sending notifications and other important messages regarding the Service;
– Accepting, processing and verification of payments;
– Providing technical support;
– Informing about future events related to the Service, their updates and other similar events.

2. Users data, collected and processed by the Service.

Collected and processed data by the Service may include (but not limited to):
– Name, nickname (character name);
– User ID (login or user ID);
– E-mail address;
– Billing information, etc.

3. Other data collected and processed by the Service.

In order to provide quality services, the Service collects and processes additional non-personal data. These data include:

– Unique identifier of the user device (HWID) and parameters of the used software;
– Operating system version, device type and hardware identifiers;
– Timezone;
– Information about the user’s actions on the Service and directly in the Game (logs of game actions, actions on the Service, in-game achievements, time spent in the Game, the time of the last entry into the Game, information about the inputs to the Game, etc.).

The service can collect information about your IP address and information about the geographical location of the device from which you access the Service and the Game in order to provide you with the services and information available for the relevant territory on which you are located.

4. Data storage.

The data storage period is the period during which the Service and related gaming services are provided (for the longest period), unless another period is provided for by applicable law.

5. Uses. Dissemination and transmission of data.

The Service can combine (merge, splice) and use combined data of Users with other information (including other data collected by the Service, as defined in section 4 of this Policy) for the provision, management and development of the Game.

In addition, your data can be provided in the following cases:

– When it is necessary to comply with the law, for example, investigating cases of fraud in making payments and any other illegal activities;
– When there are reasonable suspicions of a potential or existing violation of the rights of the Service;

THE ADMINISTRATION DOES NOT TRANSFER YOUR DATA TO THIRD PARTIES.

6. Other duties of the Parties.

The User is responsible for the completeness and reliability of the data provided by him. In case of inconsistencies and / or incorrectness in the data provided by you, they must be changed, including by contacting the technical support of the Service, whose contacts are listed in the Support section on the Service website – http://velrosegame.com

The Administration reserves the right to delete and / or modify User data, store data that is necessary for the purposes of compliance with applicable laws, ensure the security and effectiveness of the Service and the Game.

7. Cookies

Cookies are small pieces of information stored by your internet browser on your computer’s hard drive. Like most website providers, L2pandora uses cookies to make a link between you and the information you have provided to our website and therefore provide you with personalized content so that we can give you a better experience when you return. In order to benefit from such features you should accept and enable the use of cookies.

We would like to point out that if you choose not to accept cookies you will not be able to fully use all of the functions of our Service. By activating the cookies feature of your browser you agree and consent to the data collection and processing as explained herein.

Service also uses so-called authorization cookies, which are intended to store information and data submitted by the user on the Service, in order to avoid you from multiple and/or repeated submission of such data in a single visit session or longer, if you wish, which increases the comfort of using website.

8. Contacts

If you have any questions regarding this Policy or the processing of your data in connection with the use of the Game, please contact:

Privacy Policy.

 

GNU GENERAL PUBLIC LICENSE http://l2-scripts.com

AND

GNU GENERAL PUBLIC LICENSE (COPY FROM http://www.l2jserver.com/)
Version 3, 29 June 2007

Copyright © 2007 Free Software Foundation, Inc. <http://fsf.org/>

Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.

Preamble
The GNU General Public License is a free, copyleft license for software and other kinds of works.

The licenses for most software and other practical works are designed to take away your freedom to share and change the works. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change all versions of a program–to make sure it remains free software for all its users. We, the Free Software Foundation, use the GNU General Public License for most of our software; it applies also to any other work released this way by its authors. You can apply it to your programs, too.

When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for them if you wish), that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs, and that you know you can do these things.

To protect your rights, we need to prevent others from denying you these rights or asking you to surrender the rights. Therefore, you have certain responsibilities if you distribute copies of the software, or if you modify it: responsibilities to respect the freedom of others.

For example, if you distribute copies of such a program, whether gratis or for a fee, you must pass on to the recipients the same freedoms that you received. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights.

Developers that use the GNU GPL protect your rights with two steps: (1) assert copyright on the software, and (2) offer you this License giving you legal permission to copy, distribute and/or modify it.

For the developers’ and authors’ protection, the GPL clearly explains that there is no warranty for this free software. For both users’ and authors’ sake, the GPL requires that modified versions be marked as changed, so that their problems will not be attributed erroneously to authors of previous versions.

Some devices are designed to deny users access to install or run modified versions of the software inside them, although the manufacturer can do so. This is fundamentally incompatible with the aim of protecting users’ freedom to change the software. The systematic pattern of such abuse occurs in the area of products for individuals to use, which is precisely where it is most unacceptable. Therefore, we have designed this version of the GPL to prohibit the practice for those products. If such problems arise substantially in other domains, we stand ready to extend this provision to those domains in future versions of the GPL, as needed to protect the freedom of users.

Finally, every program is threatened constantly by software patents. States should not allow patents to restrict development and use of software on general-purpose computers, but in those that do, we wish to avoid the special danger that patents applied to a free program could make it effectively proprietary. To prevent this, the GPL assures that patents cannot be used to render the program non-free.

The precise terms and conditions for copying, distribution and modification follow.

TERMS AND CONDITIONS
0. Definitions.

“This License” refers to version 3 of the GNU General Public License.

“Copyright” also means copyright-like laws that apply to other kinds of works, such as semiconductor masks.

“The Program” refers to any copyrightable work licensed under this License. Each licensee is addressed as “you”. “Licensees” and “recipients” may be individuals or organizations.

To “modify” a work means to copy from or adapt all or part of the work in a fashion requiring copyright permission, other than the making of an exact copy. The resulting work is called a “modified version” of the earlier work or a work “based on” the earlier work.

A “covered work” means either the unmodified Program or a work based on the Program.

To “propagate” a work means to do anything with it that, without permission, would make you directly or secondarily liable for infringement under applicable copyright law, except executing it on a computer or modifying a private copy. Propagation includes copying, distribution (with or without modification), making available to the public, and in some countries other activities as well.

To “convey” a work means any kind of propagation that enables other parties to make or receive copies. Mere interaction with a user through a computer network, with no transfer of a copy, is not conveying.

An interactive user interface displays “Appropriate Legal Notices” to the extent that it includes a convenient and prominently visible feature that (1) displays an appropriate copyright notice, and (2) tells the user that there is no warranty for the work (except to the extent that warranties are provided), that licensees may convey the work under this License, and how to view a copy of this License. If the interface presents a list of user commands or options, such as a menu, a prominent item in the list meets this criterion.

1. Source Code.

The “source code” for a work means the preferred form of the work for making modifications to it. “Object code” means any non-source form of a work.

A “Standard Interface” means an interface that either is an official standard defined by a recognized standards body, or, in the case of interfaces specified for a particular programming language, one that is widely used among developers working in that language.

The “System Libraries” of an executable work include anything, other than the work as a whole, that (a) is included in the normal form of packaging a Major Component, but which is not part of that Major Component, and (b) serves only to enable use of the work with that Major Component, or to implement a Standard Interface for which an implementation is available to the public in source code form. A “Major Component”, in this context, means a major essential component (kernel, window system, and so on) of the specific operating system (if any) on which the executable work runs, or a compiler used to produce the work, or an object code interpreter used to run it.

The “Corresponding Source” for a work in object code form means all the source code needed to generate, install, and (for an executable work) run the object code and to modify the work, including scripts to control those activities. However, it does not include the work’s System Libraries, or general-purpose tools or generally available free programs which are used unmodified in performing those activities but which are not part of the work. For example, Corresponding Source includes interface definition files associated with source files for the work, and the source code for shared libraries and dynamically linked subprograms that the work is specifically designed to require, such as by intimate data communication or control flow between those subprograms and other parts of the work.

The Corresponding Source need not include anything that users can regenerate automatically from other parts of the Corresponding Source.

The Corresponding Source for a work in source code form is that same work.

2. Basic Permissions.

All rights granted under this License are granted for the term of copyright on the Program, and are irrevocable provided the stated conditions are met. This License explicitly affirms your unlimited permission to run the unmodified Program. The output from running a covered work is covered by this License only if the output, given its content, constitutes a covered work. This License acknowledges your rights of fair use or other equivalent, as provided by copyright law.

You may make, run and propagate covered works that you do not convey, without conditions so long as your license otherwise remains in force. You may convey covered works to others for the sole purpose of having them make modifications exclusively for you, or provide you with facilities for running those works, provided that you comply with the terms of this License in conveying all material for which you do not control copyright. Those thus making or running the covered works for you must do so exclusively on your behalf, under your direction and control, on terms that prohibit them from making any copies of your copyrighted material outside their relationship with you.

Conveying under any other circumstances is permitted solely under the conditions stated below. Sublicensing is not allowed; section 10 makes it unnecessary.

3. Protecting Users’ Legal Rights From Anti-Circumvention Law.

No covered work shall be deemed part of an effective technological measure under any applicable law fulfilling obligations under article 11 of the WIPO copyright treaty adopted on 20 December 1996, or similar laws prohibiting or restricting circumvention of such measures.

When you convey a covered work, you waive any legal power to forbid circumvention of technological measures to the extent such circumvention is effected by exercising rights under this License with respect to the covered work, and you disclaim any intention to limit operation or modification of the work as a means of enforcing, against the work’s users, your or third parties’ legal rights to forbid circumvention of technological measures.

4. Conveying Verbatim Copies.

You may convey verbatim copies of the Program’s source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice; keep intact all notices stating that this License and any non-permissive terms added in accord with section 7 apply to the code; keep intact all notices of the absence of any warranty; and give all recipients a copy of this License along with the Program.

You may charge any price or no price for each copy that you convey, and you may offer support or warranty protection for a fee.

5. Conveying Modified Source Versions.

You may convey a work based on the Program, or the modifications to produce it from the Program, in the form of source code under the terms of section 4, provided that you also meet all of these conditions:

a) The work must carry prominent notices stating that you modified it, and giving a relevant date.
b) The work must carry prominent notices stating that it is released under this License and any conditions added under section 7. This requirement modifies the requirement in section 4 to “keep intact all notices”.
c) You must license the entire work, as a whole, under this License to anyone who comes into possession of a copy. This License will therefore apply, along with any applicable section 7 additional terms, to the whole of the work, and all its parts, regardless of how they are packaged. This License gives no permission to license the work in any other way, but it does not invalidate such permission if you have separately received it.
d) If the work has interactive user interfaces, each must display Appropriate Legal Notices; however, if the Program has interactive interfaces that do not display Appropriate Legal Notices, your work need not make them do so.
A compilation of a covered work with other separate and independent works, which are not by their nature extensions of the covered work, and which are not combined with it such as to form a larger program, in or on a volume of a storage or distribution medium, is called an “aggregate” if the compilation and its resulting copyright are not used to limit the access or legal rights of the compilation’s users beyond what the individual works permit. Inclusion of a covered work in an aggregate does not cause this License to apply to the other parts of the aggregate.

6. Conveying Non-Source Forms.

You may convey a covered work in object code form under the terms of sections 4 and 5, provided that you also convey the machine-readable Corresponding Source under the terms of this License, in one of these ways:

a) Convey the object code in, or embodied in, a physical product (including a physical distribution medium), accompanied by the Corresponding Source fixed on a durable physical medium customarily used for software interchange.
b) Convey the object code in, or embodied in, a physical product (including a physical distribution medium), accompanied by a written offer, valid for at least three years and valid for as long as you offer spare parts or customer support for that product model, to give anyone who possesses the object code either (1) a copy of the Corresponding Source for all the software in the product that is covered by this License, on a durable physical medium customarily used for software interchange, for a price no more than your reasonable cost of physically performing this conveying of source, or (2) access to copy the Corresponding Source from a network server at no charge.
c) Convey individual copies of the object code with a copy of the written offer to provide the Corresponding Source. This alternative is allowed only occasionally and noncommercially, and only if you received the object code with such an offer, in accord with subsection 6b.
d) Convey the object code by offering access from a designated place (gratis or for a charge), and offer equivalent access to the Corresponding Source in the same way through the same place at no further charge. You need not require recipients to copy the Corresponding Source along with the object code. If the place to copy the object code is a network server, the Corresponding Source may be on a different server (operated by you or a third party) that supports equivalent copying facilities, provided you maintain clear directions next to the object code saying where to find the Corresponding Source. Regardless of what server hosts the Corresponding Source, you remain obligated to ensure that it is available for as long as needed to satisfy these requirements.
e) Convey the object code using peer-to-peer transmission, provided you inform other peers where the object code and Corresponding Source of the work are being offered to the general public at no charge under subsection 6d.
A separable portion of the object code, whose source code is excluded from the Corresponding Source as a System Library, need not be included in conveying the object code work.

A “User Product” is either (1) a “consumer product”, which means any tangible personal property which is normally used for personal, family, or household purposes, or (2) anything designed or sold for incorporation into a dwelling. In determining whether a product is a consumer product, doubtful cases shall be resolved in favor of coverage. For a particular product received by a particular user, “normally used” refers to a typical or common use of that class of product, regardless of the status of the particular user or of the way in which the particular user actually uses, or expects or is expected to use, the product. A product is a consumer product regardless of whether the product has substantial commercial, industrial or non-consumer uses, unless such uses represent the only significant mode of use of the product.

“Installation Information” for a User Product means any methods, procedures, authorization keys, or other information required to install and execute modified versions of a covered work in that User Product from a modified version of its Corresponding Source. The information must suffice to ensure that the continued functioning of the modified object code is in no case prevented or interfered with solely because modification has been made.

If you convey an object code work under this section in, or with, or specifically for use in, a User Product, and the conveying occurs as part of a transaction in which the right of possession and use of the User Product is transferred to the recipient in perpetuity or for a fixed term (regardless of how the transaction is characterized), the Corresponding Source conveyed under this section must be accompanied by the Installation Information. But this requirement does not apply if neither you nor any third party retains the ability to install modified object code on the User Product (for example, the work has been installed in ROM).

The requirement to provide Installation Information does not include a requirement to continue to provide support service, warranty, or updates for a work that has been modified or installed by the recipient, or for the User Product in which it has been modified or installed. Access to a network may be denied when the modification itself materially and adversely affects the operation of the network or violates the rules and protocols for communication across the network.

Corresponding Source conveyed, and Installation Information provided, in accord with this section must be in a format that is publicly documented (and with an implementation available to the public in source code form), and must require no special password or key for unpacking, reading or copying.

7. Additional Terms.

“Additional permissions” are terms that supplement the terms of this License by making exceptions from one or more of its conditions. Additional permissions that are applicable to the entire Program shall be treated as though they were included in this License, to the extent that they are valid under applicable law. If additional permissions apply only to part of the Program, that part may be used separately under those permissions, but the entire Program remains governed by this License without regard to the additional permissions.

When you convey a copy of a covered work, you may at your option remove any additional permissions from that copy, or from any part of it. (Additional permissions may be written to require their own removal in certain cases when you modify the work.) You may place additional permissions on material, added by you to a covered work, for which you have or can give appropriate copyright permission.

Notwithstanding any other provision of this License, for material you add to a covered work, you may (if authorized by the copyright holders of that material) supplement the terms of this License with terms:

a) Disclaiming warranty or limiting liability differently from the terms of sections 15 and 16 of this License; or
b) Requiring preservation of specified reasonable legal notices or author attributions in that material or in the Appropriate Legal Notices displayed by works containing it; or
c) Prohibiting misrepresentation of the origin of that material, or requiring that modified versions of such material be marked in reasonable ways as different from the original version; or
d) Limiting the use for publicity purposes of names of licensors or authors of the material; or
e) Declining to grant rights under trademark law for use of some trade names, trademarks, or service marks; or
f) Requiring indemnification of licensors and authors of that material by anyone who conveys the material (or modified versions of it) with contractual assumptions of liability to the recipient, for any liability that these contractual assumptions directly impose on those licensors and authors.
All other non-permissive additional terms are considered “further restrictions” within the meaning of section 10. If the Program as you received it, or any part of it, contains a notice stating that it is governed by this License along with a term that is a further restriction, you may remove that term. If a license document contains a further restriction but permits relicensing or conveying under this License, you may add to a covered work material governed by the terms of that license document, provided that the further restriction does not survive such relicensing or conveying.

If you add terms to a covered work in accord with this section, you must place, in the relevant source files, a statement of the additional terms that apply to those files, or a notice indicating where to find the applicable terms.

Additional terms, permissive or non-permissive, may be stated in the form of a separately written license, or stated as exceptions; the above requirements apply either way.

8. Termination.

You may not propagate or modify a covered work except as expressly provided under this License. Any attempt otherwise to propagate or modify it is void, and will automatically terminate your rights under this License (including any patent licenses granted under the third paragraph of section 11).

However, if you cease all violation of this License, then your license from a particular copyright holder is reinstated (a) provisionally, unless and until the copyright holder explicitly and finally terminates your license, and (b) permanently, if the copyright holder fails to notify you of the violation by some reasonable means prior to 60 days after the cessation.

Moreover, your license from a particular copyright holder is reinstated permanently if the copyright holder notifies you of the violation by some reasonable means, this is the first time you have received notice of violation of this License (for any work) from that copyright holder, and you cure the violation prior to 30 days after your receipt of the notice.

Termination of your rights under this section does not terminate the licenses of parties who have received copies or rights from you under this License. If your rights have been terminated and not permanently reinstated, you do not qualify to receive new licenses for the same material under section 10.

9. Acceptance Not Required for Having Copies.

You are not required to accept this License in order to receive or run a copy of the Program. Ancillary propagation of a covered work occurring solely as a consequence of using peer-to-peer transmission to receive a copy likewise does not require acceptance. However, nothing other than this License grants you permission to propagate or modify any covered work. These actions infringe copyright if you do not accept this License. Therefore, by modifying or propagating a covered work, you indicate your acceptance of this License to do so.

10. Automatic Licensing of Downstream Recipients.

Each time you convey a covered work, the recipient automatically receives a license from the original licensors, to run, modify and propagate that work, subject to this License. You are not responsible for enforcing compliance by third parties with this License.

An “entity transaction” is a transaction transferring control of an organization, or substantially all assets of one, or subdividing an organization, or merging organizations. If propagation of a covered work results from an entity transaction, each party to that transaction who receives a copy of the work also receives whatever licenses to the work the party’s predecessor in interest had or could give under the previous paragraph, plus a right to possession of the Corresponding Source of the work from the predecessor in interest, if the predecessor has it or can get it with reasonable efforts.

You may not impose any further restrictions on the exercise of the rights granted or affirmed under this License. For example, you may not impose a license fee, royalty, or other charge for exercise of rights granted under this License, and you may not initiate litigation (including a cross-claim or counterclaim in a lawsuit) alleging that any patent claim is infringed by making, using, selling, offering for sale, or importing the Program or any portion of it.

11. Patents.

A “contributor” is a copyright holder who authorizes use under this License of the Program or a work on which the Program is based. The work thus licensed is called the contributor’s “contributor version”.

A contributor’s “essential patent claims” are all patent claims owned or controlled by the contributor, whether already acquired or hereafter acquired, that would be infringed by some manner, permitted by this License, of making, using, or selling its contributor version, but do not include claims that would be infringed only as a consequence of further modification of the contributor version. For purposes of this definition, “control” includes the right to grant patent sublicenses in a manner consistent with the requirements of this License.

Each contributor grants you a non-exclusive, worldwide, royalty-free patent license under the contributor’s essential patent claims, to make, use, sell, offer for sale, import and otherwise run, modify and propagate the contents of its contributor version.

In the following three paragraphs, a “patent license” is any express agreement or commitment, however denominated, not to enforce a patent (such as an express permission to practice a patent or covenant not to sue for patent infringement). To “grant” such a patent license to a party means to make such an agreement or commitment not to enforce a patent against the party.

If you convey a covered work, knowingly relying on a patent license, and the Corresponding Source of the work is not available for anyone to copy, free of charge and under the terms of this License, through a publicly available network server or other readily accessible means, then you must either (1) cause the Corresponding Source to be so available, or (2) arrange to deprive yourself of the benefit of the patent license for this particular work, or (3) arrange, in a manner consistent with the requirements of this License, to extend the patent license to downstream recipients. “Knowingly relying” means you have actual knowledge that, but for the patent license, your conveying the covered work in a country, or your recipient’s use of the covered work in a country, would infringe one or more identifiable patents in that country that you have reason to believe are valid.

If, pursuant to or in connection with a single transaction or arrangement, you convey, or propagate by procuring conveyance of, a covered work, and grant a patent license to some of the parties receiving the covered work authorizing them to use, propagate, modify or convey a specific copy of the covered work, then the patent license you grant is automatically extended to all recipients of the covered work and works based on it.

A patent license is “discriminatory” if it does not include within the scope of its coverage, prohibits the exercise of, or is conditioned on the non-exercise of one or more of the rights that are specifically granted under this License. You may not convey a covered work if you are a party to an arrangement with a third party that is in the business of distributing software, under which you make payment to the third party based on the extent of your activity of conveying the work, and under which the third party grants, to any of the parties who would receive the covered work from you, a discriminatory patent license (a) in connection with copies of the covered work conveyed by you (or copies made from those copies), or (b) primarily for and in connection with specific products or compilations that contain the covered work, unless you entered into that arrangement, or that patent license was granted, prior to 28 March 2007.

Nothing in this License shall be construed as excluding or limiting any implied license or other defenses to infringement that may otherwise be available to you under applicable patent law.

12. No Surrender of Others’ Freedom.

If conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot convey a covered work so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not convey it at all. For example, if you agree to terms that obligate you to collect a royalty for further conveying from those to whom you convey the Program, the only way you could satisfy both those terms and this License would be to refrain entirely from conveying the Program.

13. Use with the GNU Affero General Public License.

Notwithstanding any other provision of this License, you have permission to link or combine any covered work with a work licensed under version 3 of the GNU Affero General Public License into a single combined work, and to convey the resulting work. The terms of this License will continue to apply to the part which is the covered work, but the special requirements of the GNU Affero General Public License, section 13, concerning interaction through a network will apply to the combination as such.

14. Revised Versions of this License.

The Free Software Foundation may publish revised and/or new versions of the GNU General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns.

Each version is given a distinguishing version number. If the Program specifies that a certain numbered version of the GNU General Public License “or any later version” applies to it, you have the option of following the terms and conditions either of that numbered version or of any later version published by the Free Software Foundation. If the Program does not specify a version number of the GNU General Public License, you may choose any version ever published by the Free Software Foundation.

If the Program specifies that a proxy can decide which future versions of the GNU General Public License can be used, that proxy’s public statement of acceptance of a version permanently authorizes you to choose that version for the Program.

Later license versions may give you additional or different permissions. However, no additional obligations are imposed on any author or copyright holder as a result of your choosing to follow a later version.

15. Disclaimer of Warranty.

THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.

16. Limitation of Liability.

IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

17. Interpretation of Sections 15 and 16.

If the disclaimer of warranty and limitation of liability provided above cannot be given local legal effect according to their terms, reviewing courts shall apply local law that most closely approximates an absolute waiver of all civil liability in connection with the Program, unless a warranty or assumption of liability accompanies a copy of the Program in return for a fee.

END OF TERMS AND CONDITIONS

How to Apply These Terms to Your New Programs
If you develop a new program, and you want it to be of the greatest possible use to the public, the best way to achieve this is to make it free software which everyone can redistribute and change under these terms.

To do so, attach the following notices to the program. It is safest to attach them to the start of each source file to most effectively state the exclusion of warranty; and each file should have at least the “copyright” line and a pointer to where the full notice is found.

<one line to give the program’s name and a brief idea of what it does.>
Copyright (C) <year> <name of author>

This program is free software: you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.

This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.

You should have received a copy of the GNU General Public License
along with this program. If not, see <http://www.gnu.org/licenses/>.

Also add information on how to contact you by electronic and paper mail.

If the program does terminal interaction, make it output a short notice like this when it starts in an interactive mode:

<program> Copyright (C) <year> <name of author>
This program comes with ABSOLUTELY NO WARRANTY; for details type `show w’.
This is free software, and you are welcome to redistribute it
under certain conditions; type `show c’ for details.

The hypothetical commands `show w’ and `show c’ should show the appropriate parts of the General Public License. Of course, your program’s commands might be different; for a GUI interface, you would use an “about box”.

You should also get your employer (if you work as a programmer) or school, if any, to sign a “copyright disclaimer” for the program, if necessary. For more information on this, and how to apply and follow the GNU GPL, see <http://www.gnu.org/licenses/>.

The GNU General Public License does not permit incorporating your program into proprietary programs. If your program is a subroutine library, you may consider it more useful to permit linking proprietary applications with the library. If this is what you want to do, use the GNU Lesser General Public License instead of this License. But first, please read <http://www.gnu.org/philosophy/why-not-lgpl.html>.

GNU GENERAL PUBLIC LICENSE (COPY FROM http://www.l2jserver.com/)
Version 3, 29 June 2007

Copyright © 2007 Free Software Foundation, Inc. <http://fsf.org/>

Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.

Preamble
The GNU General Public License is a free, copyleft license for software and other kinds of works.

The licenses for most software and other practical works are designed to take away your freedom to share and change the works. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change all versions of a program–to make sure it remains free software for all its users. We, the Free Software Foundation, use the GNU General Public License for most of our software; it applies also to any other work released this way by its authors. You can apply it to your programs, too.

When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for them if you wish), that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs, and that you know you can do these things.

To protect your rights, we need to prevent others from denying you these rights or asking you to surrender the rights. Therefore, you have certain responsibilities if you distribute copies of the software, or if you modify it: responsibilities to respect the freedom of others.

For example, if you distribute copies of such a program, whether gratis or for a fee, you must pass on to the recipients the same freedoms that you received. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights.

Developers that use the GNU GPL protect your rights with two steps: (1) assert copyright on the software, and (2) offer you this License giving you legal permission to copy, distribute and/or modify it.

For the developers’ and authors’ protection, the GPL clearly explains that there is no warranty for this free software. For both users’ and authors’ sake, the GPL requires that modified versions be marked as changed, so that their problems will not be attributed erroneously to authors of previous versions.

Some devices are designed to deny users access to install or run modified versions of the software inside them, although the manufacturer can do so. This is fundamentally incompatible with the aim of protecting users’ freedom to change the software. The systematic pattern of such abuse occurs in the area of products for individuals to use, which is precisely where it is most unacceptable. Therefore, we have designed this version of the GPL to prohibit the practice for those products. If such problems arise substantially in other domains, we stand ready to extend this provision to those domains in future versions of the GPL, as needed to protect the freedom of users.

Finally, every program is threatened constantly by software patents. States should not allow patents to restrict development and use of software on general-purpose computers, but in those that do, we wish to avoid the special danger that patents applied to a free program could make it effectively proprietary. To prevent this, the GPL assures that patents cannot be used to render the program non-free.

The precise terms and conditions for copying, distribution and modification follow.

TERMS AND CONDITIONS
0. Definitions.

“This License” refers to version 3 of the GNU General Public License.

“Copyright” also means copyright-like laws that apply to other kinds of works, such as semiconductor masks.

“The Program” refers to any copyrightable work licensed under this License. Each licensee is addressed as “you”. “Licensees” and “recipients” may be individuals or organizations.

To “modify” a work means to copy from or adapt all or part of the work in a fashion requiring copyright permission, other than the making of an exact copy. The resulting work is called a “modified version” of the earlier work or a work “based on” the earlier work.

A “covered work” means either the unmodified Program or a work based on the Program.

To “propagate” a work means to do anything with it that, without permission, would make you directly or secondarily liable for infringement under applicable copyright law, except executing it on a computer or modifying a private copy. Propagation includes copying, distribution (with or without modification), making available to the public, and in some countries other activities as well.

To “convey” a work means any kind of propagation that enables other parties to make or receive copies. Mere interaction with a user through a computer network, with no transfer of a copy, is not conveying.

An interactive user interface displays “Appropriate Legal Notices” to the extent that it includes a convenient and prominently visible feature that (1) displays an appropriate copyright notice, and (2) tells the user that there is no warranty for the work (except to the extent that warranties are provided), that licensees may convey the work under this License, and how to view a copy of this License. If the interface presents a list of user commands or options, such as a menu, a prominent item in the list meets this criterion.

1. Source Code.

The “source code” for a work means the preferred form of the work for making modifications to it. “Object code” means any non-source form of a work.

A “Standard Interface” means an interface that either is an official standard defined by a recognized standards body, or, in the case of interfaces specified for a particular programming language, one that is widely used among developers working in that language.

The “System Libraries” of an executable work include anything, other than the work as a whole, that (a) is included in the normal form of packaging a Major Component, but which is not part of that Major Component, and (b) serves only to enable use of the work with that Major Component, or to implement a Standard Interface for which an implementation is available to the public in source code form. A “Major Component”, in this context, means a major essential component (kernel, window system, and so on) of the specific operating system (if any) on which the executable work runs, or a compiler used to produce the work, or an object code interpreter used to run it.

The “Corresponding Source” for a work in object code form means all the source code needed to generate, install, and (for an executable work) run the object code and to modify the work, including scripts to control those activities. However, it does not include the work’s System Libraries, or general-purpose tools or generally available free programs which are used unmodified in performing those activities but which are not part of the work. For example, Corresponding Source includes interface definition files associated with source files for the work, and the source code for shared libraries and dynamically linked subprograms that the work is specifically designed to require, such as by intimate data communication or control flow between those subprograms and other parts of the work.

The Corresponding Source need not include anything that users can regenerate automatically from other parts of the Corresponding Source.

The Corresponding Source for a work in source code form is that same work.

2. Basic Permissions.

All rights granted under this License are granted for the term of copyright on the Program, and are irrevocable provided the stated conditions are met. This License explicitly affirms your unlimited permission to run the unmodified Program. The output from running a covered work is covered by this License only if the output, given its content, constitutes a covered work. This License acknowledges your rights of fair use or other equivalent, as provided by copyright law.

You may make, run and propagate covered works that you do not convey, without conditions so long as your license otherwise remains in force. You may convey covered works to others for the sole purpose of having them make modifications exclusively for you, or provide you with facilities for running those works, provided that you comply with the terms of this License in conveying all material for which you do not control copyright. Those thus making or running the covered works for you must do so exclusively on your behalf, under your direction and control, on terms that prohibit them from making any copies of your copyrighted material outside their relationship with you.

Conveying under any other circumstances is permitted solely under the conditions stated below. Sublicensing is not allowed; section 10 makes it unnecessary.

3. Protecting Users’ Legal Rights From Anti-Circumvention Law.

No covered work shall be deemed part of an effective technological measure under any applicable law fulfilling obligations under article 11 of the WIPO copyright treaty adopted on 20 December 1996, or similar laws prohibiting or restricting circumvention of such measures.

When you convey a covered work, you waive any legal power to forbid circumvention of technological measures to the extent such circumvention is effected by exercising rights under this License with respect to the covered work, and you disclaim any intention to limit operation or modification of the work as a means of enforcing, against the work’s users, your or third parties’ legal rights to forbid circumvention of technological measures.

4. Conveying Verbatim Copies.

You may convey verbatim copies of the Program’s source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice; keep intact all notices stating that this License and any non-permissive terms added in accord with section 7 apply to the code; keep intact all notices of the absence of any warranty; and give all recipients a copy of this License along with the Program.

You may charge any price or no price for each copy that you convey, and you may offer support or warranty protection for a fee.

5. Conveying Modified Source Versions.

You may convey a work based on the Program, or the modifications to produce it from the Program, in the form of source code under the terms of section 4, provided that you also meet all of these conditions:

a) The work must carry prominent notices stating that you modified it, and giving a relevant date.
b) The work must carry prominent notices stating that it is released under this License and any conditions added under section 7. This requirement modifies the requirement in section 4 to “keep intact all notices”.
c) You must license the entire work, as a whole, under this License to anyone who comes into possession of a copy. This License will therefore apply, along with any applicable section 7 additional terms, to the whole of the work, and all its parts, regardless of how they are packaged. This License gives no permission to license the work in any other way, but it does not invalidate such permission if you have separately received it.
d) If the work has interactive user interfaces, each must display Appropriate Legal Notices; however, if the Program has interactive interfaces that do not display Appropriate Legal Notices, your work need not make them do so.
A compilation of a covered work with other separate and independent works, which are not by their nature extensions of the covered work, and which are not combined with it such as to form a larger program, in or on a volume of a storage or distribution medium, is called an “aggregate” if the compilation and its resulting copyright are not used to limit the access or legal rights of the compilation’s users beyond what the individual works permit. Inclusion of a covered work in an aggregate does not cause this License to apply to the other parts of the aggregate.

6. Conveying Non-Source Forms.

You may convey a covered work in object code form under the terms of sections 4 and 5, provided that you also convey the machine-readable Corresponding Source under the terms of this License, in one of these ways:

a) Convey the object code in, or embodied in, a physical product (including a physical distribution medium), accompanied by the Corresponding Source fixed on a durable physical medium customarily used for software interchange.
b) Convey the object code in, or embodied in, a physical product (including a physical distribution medium), accompanied by a written offer, valid for at least three years and valid for as long as you offer spare parts or customer support for that product model, to give anyone who possesses the object code either (1) a copy of the Corresponding Source for all the software in the product that is covered by this License, on a durable physical medium customarily used for software interchange, for a price no more than your reasonable cost of physically performing this conveying of source, or (2) access to copy the Corresponding Source from a network server at no charge.
c) Convey individual copies of the object code with a copy of the written offer to provide the Corresponding Source. This alternative is allowed only occasionally and noncommercially, and only if you received the object code with such an offer, in accord with subsection 6b.
d) Convey the object code by offering access from a designated place (gratis or for a charge), and offer equivalent access to the Corresponding Source in the same way through the same place at no further charge. You need not require recipients to copy the Corresponding Source along with the object code. If the place to copy the object code is a network server, the Corresponding Source may be on a different server (operated by you or a third party) that supports equivalent copying facilities, provided you maintain clear directions next to the object code saying where to find the Corresponding Source. Regardless of what server hosts the Corresponding Source, you remain obligated to ensure that it is available for as long as needed to satisfy these requirements.
e) Convey the object code using peer-to-peer transmission, provided you inform other peers where the object code and Corresponding Source of the work are being offered to the general public at no charge under subsection 6d.
A separable portion of the object code, whose source code is excluded from the Corresponding Source as a System Library, need not be included in conveying the object code work.

A “User Product” is either (1) a “consumer product”, which means any tangible personal property which is normally used for personal, family, or household purposes, or (2) anything designed or sold for incorporation into a dwelling. In determining whether a product is a consumer product, doubtful cases shall be resolved in favor of coverage. For a particular product received by a particular user, “normally used” refers to a typical or common use of that class of product, regardless of the status of the particular user or of the way in which the particular user actually uses, or expects or is expected to use, the product. A product is a consumer product regardless of whether the product has substantial commercial, industrial or non-consumer uses, unless such uses represent the only significant mode of use of the product.

“Installation Information” for a User Product means any methods, procedures, authorization keys, or other information required to install and execute modified versions of a covered work in that User Product from a modified version of its Corresponding Source. The information must suffice to ensure that the continued functioning of the modified object code is in no case prevented or interfered with solely because modification has been made.

If you convey an object code work under this section in, or with, or specifically for use in, a User Product, and the conveying occurs as part of a transaction in which the right of possession and use of the User Product is transferred to the recipient in perpetuity or for a fixed term (regardless of how the transaction is characterized), the Corresponding Source conveyed under this section must be accompanied by the Installation Information. But this requirement does not apply if neither you nor any third party retains the ability to install modified object code on the User Product (for example, the work has been installed in ROM).

The requirement to provide Installation Information does not include a requirement to continue to provide support service, warranty, or updates for a work that has been modified or installed by the recipient, or for the User Product in which it has been modified or installed. Access to a network may be denied when the modification itself materially and adversely affects the operation of the network or violates the rules and protocols for communication across the network.

Corresponding Source conveyed, and Installation Information provided, in accord with this section must be in a format that is publicly documented (and with an implementation available to the public in source code form), and must require no special password or key for unpacking, reading or copying.

7. Additional Terms.

“Additional permissions” are terms that supplement the terms of this License by making exceptions from one or more of its conditions. Additional permissions that are applicable to the entire Program shall be treated as though they were included in this License, to the extent that they are valid under applicable law. If additional permissions apply only to part of the Program, that part may be used separately under those permissions, but the entire Program remains governed by this License without regard to the additional permissions.

When you convey a copy of a covered work, you may at your option remove any additional permissions from that copy, or from any part of it. (Additional permissions may be written to require their own removal in certain cases when you modify the work.) You may place additional permissions on material, added by you to a covered work, for which you have or can give appropriate copyright permission.

Notwithstanding any other provision of this License, for material you add to a covered work, you may (if authorized by the copyright holders of that material) supplement the terms of this License with terms:

a) Disclaiming warranty or limiting liability differently from the terms of sections 15 and 16 of this License; or
b) Requiring preservation of specified reasonable legal notices or author attributions in that material or in the Appropriate Legal Notices displayed by works containing it; or
c) Prohibiting misrepresentation of the origin of that material, or requiring that modified versions of such material be marked in reasonable ways as different from the original version; or
d) Limiting the use for publicity purposes of names of licensors or authors of the material; or
e) Declining to grant rights under trademark law for use of some trade names, trademarks, or service marks; or
f) Requiring indemnification of licensors and authors of that material by anyone who conveys the material (or modified versions of it) with contractual assumptions of liability to the recipient, for any liability that these contractual assumptions directly impose on those licensors and authors.
All other non-permissive additional terms are considered “further restrictions” within the meaning of section 10. If the Program as you received it, or any part of it, contains a notice stating that it is governed by this License along with a term that is a further restriction, you may remove that term. If a license document contains a further restriction but permits relicensing or conveying under this License, you may add to a covered work material governed by the terms of that license document, provided that the further restriction does not survive such relicensing or conveying.

If you add terms to a covered work in accord with this section, you must place, in the relevant source files, a statement of the additional terms that apply to those files, or a notice indicating where to find the applicable terms.

Additional terms, permissive or non-permissive, may be stated in the form of a separately written license, or stated as exceptions; the above requirements apply either way.

8. Termination.

You may not propagate or modify a covered work except as expressly provided under this License. Any attempt otherwise to propagate or modify it is void, and will automatically terminate your rights under this License (including any patent licenses granted under the third paragraph of section 11).

However, if you cease all violation of this License, then your license from a particular copyright holder is reinstated (a) provisionally, unless and until the copyright holder explicitly and finally terminates your license, and (b) permanently, if the copyright holder fails to notify you of the violation by some reasonable means prior to 60 days after the cessation.

Moreover, your license from a particular copyright holder is reinstated permanently if the copyright holder notifies you of the violation by some reasonable means, this is the first time you have received notice of violation of this License (for any work) from that copyright holder, and you cure the violation prior to 30 days after your receipt of the notice.

Termination of your rights under this section does not terminate the licenses of parties who have received copies or rights from you under this License. If your rights have been terminated and not permanently reinstated, you do not qualify to receive new licenses for the same material under section 10.

9. Acceptance Not Required for Having Copies.

You are not required to accept this License in order to receive or run a copy of the Program. Ancillary propagation of a covered work occurring solely as a consequence of using peer-to-peer transmission to receive a copy likewise does not require acceptance. However, nothing other than this License grants you permission to propagate or modify any covered work. These actions infringe copyright if you do not accept this License. Therefore, by modifying or propagating a covered work, you indicate your acceptance of this License to do so.

10. Automatic Licensing of Downstream Recipients.

Each time you convey a covered work, the recipient automatically receives a license from the original licensors, to run, modify and propagate that work, subject to this License. You are not responsible for enforcing compliance by third parties with this License.

An “entity transaction” is a transaction transferring control of an organization, or substantially all assets of one, or subdividing an organization, or merging organizations. If propagation of a covered work results from an entity transaction, each party to that transaction who receives a copy of the work also receives whatever licenses to the work the party’s predecessor in interest had or could give under the previous paragraph, plus a right to possession of the Corresponding Source of the work from the predecessor in interest, if the predecessor has it or can get it with reasonable efforts.

You may not impose any further restrictions on the exercise of the rights granted or affirmed under this License. For example, you may not impose a license fee, royalty, or other charge for exercise of rights granted under this License, and you may not initiate litigation (including a cross-claim or counterclaim in a lawsuit) alleging that any patent claim is infringed by making, using, selling, offering for sale, or importing the Program or any portion of it.

11. Patents.

A “contributor” is a copyright holder who authorizes use under this License of the Program or a work on which the Program is based. The work thus licensed is called the contributor’s “contributor version”.

A contributor’s “essential patent claims” are all patent claims owned or controlled by the contributor, whether already acquired or hereafter acquired, that would be infringed by some manner, permitted by this License, of making, using, or selling its contributor version, but do not include claims that would be infringed only as a consequence of further modification of the contributor version. For purposes of this definition, “control” includes the right to grant patent sublicenses in a manner consistent with the requirements of this License.

Each contributor grants you a non-exclusive, worldwide, royalty-free patent license under the contributor’s essential patent claims, to make, use, sell, offer for sale, import and otherwise run, modify and propagate the contents of its contributor version.

In the following three paragraphs, a “patent license” is any express agreement or commitment, however denominated, not to enforce a patent (such as an express permission to practice a patent or covenant not to sue for patent infringement). To “grant” such a patent license to a party means to make such an agreement or commitment not to enforce a patent against the party.

If you convey a covered work, knowingly relying on a patent license, and the Corresponding Source of the work is not available for anyone to copy, free of charge and under the terms of this License, through a publicly available network server or other readily accessible means, then you must either (1) cause the Corresponding Source to be so available, or (2) arrange to deprive yourself of the benefit of the patent license for this particular work, or (3) arrange, in a manner consistent with the requirements of this License, to extend the patent license to downstream recipients. “Knowingly relying” means you have actual knowledge that, but for the patent license, your conveying the covered work in a country, or your recipient’s use of the covered work in a country, would infringe one or more identifiable patents in that country that you have reason to believe are valid.

If, pursuant to or in connection with a single transaction or arrangement, you convey, or propagate by procuring conveyance of, a covered work, and grant a patent license to some of the parties receiving the covered work authorizing them to use, propagate, modify or convey a specific copy of the covered work, then the patent license you grant is automatically extended to all recipients of the covered work and works based on it.

A patent license is “discriminatory” if it does not include within the scope of its coverage, prohibits the exercise of, or is conditioned on the non-exercise of one or more of the rights that are specifically granted under this License. You may not convey a covered work if you are a party to an arrangement with a third party that is in the business of distributing software, under which you make payment to the third party based on the extent of your activity of conveying the work, and under which the third party grants, to any of the parties who would receive the covered work from you, a discriminatory patent license (a) in connection with copies of the covered work conveyed by you (or copies made from those copies), or (b) primarily for and in connection with specific products or compilations that contain the covered work, unless you entered into that arrangement, or that patent license was granted, prior to 28 March 2007.

Nothing in this License shall be construed as excluding or limiting any implied license or other defenses to infringement that may otherwise be available to you under applicable patent law.

12. No Surrender of Others’ Freedom.

If conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot convey a covered work so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not convey it at all. For example, if you agree to terms that obligate you to collect a royalty for further conveying from those to whom you convey the Program, the only way you could satisfy both those terms and this License would be to refrain entirely from conveying the Program.

13. Use with the GNU Affero General Public License.

Notwithstanding any other provision of this License, you have permission to link or combine any covered work with a work licensed under version 3 of the GNU Affero General Public License into a single combined work, and to convey the resulting work. The terms of this License will continue to apply to the part which is the covered work, but the special requirements of the GNU Affero General Public License, section 13, concerning interaction through a network will apply to the combination as such.

14. Revised Versions of this License.

The Free Software Foundation may publish revised and/or new versions of the GNU General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns.

Each version is given a distinguishing version number. If the Program specifies that a certain numbered version of the GNU General Public License “or any later version” applies to it, you have the option of following the terms and conditions either of that numbered version or of any later version published by the Free Software Foundation. If the Program does not specify a version number of the GNU General Public License, you may choose any version ever published by the Free Software Foundation.

If the Program specifies that a proxy can decide which future versions of the GNU General Public License can be used, that proxy’s public statement of acceptance of a version permanently authorizes you to choose that version for the Program.

Later license versions may give you additional or different permissions. However, no additional obligations are imposed on any author or copyright holder as a result of your choosing to follow a later version.

15. Disclaimer of Warranty.

THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.

16. Limitation of Liability.

IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

17. Interpretation of Sections 15 and 16.

If the disclaimer of warranty and limitation of liability provided above cannot be given local legal effect according to their terms, reviewing courts shall apply local law that most closely approximates an absolute waiver of all civil liability in connection with the Program, unless a warranty or assumption of liability accompanies a copy of the Program in return for a fee.

END OF TERMS AND CONDITIONS

How to Apply These Terms to Your New Programs
If you develop a new program, and you want it to be of the greatest possible use to the public, the best way to achieve this is to make it free software which everyone can redistribute and change under these terms.

To do so, attach the following notices to the program. It is safest to attach them to the start of each source file to most effectively state the exclusion of warranty; and each file should have at least the “copyright” line and a pointer to where the full notice is found.

<one line to give the program’s name and a brief idea of what it does.>
Copyright (C) <year> <name of author>

This program is free software: you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.

This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.

You should have received a copy of the GNU General Public License
along with this program. If not, see <http://www.gnu.org/licenses/>.

Also add information on how to contact you by electronic and paper mail.

If the program does terminal interaction, make it output a short notice like this when it starts in an interactive mode:

<program> Copyright (C) <year> <name of author>
This program comes with ABSOLUTELY NO WARRANTY; for details type `show w’.
This is free software, and you are welcome to redistribute it
under certain conditions; type `show c’ for details.

The hypothetical commands `show w’ and `show c’ should show the appropriate parts of the General Public License. Of course, your program’s commands might be different; for a GUI interface, you would use an “about box”.

You should also get your employer (if you work as a programmer) or school, if any, to sign a “copyright disclaimer” for the program, if necessary. For more information on this, and how to apply and follow the GNU GPL, see <http://www.gnu.org/licenses/>.

The GNU General Public License does not permit incorporating your program into proprietary programs. If your program is a subroutine library, you may consider it more useful to permit linking proprietary applications with the library. If this is what you want to do, use the GNU Lesser General Public License instead of this License. But first, please read <http://www.gnu.org/philosophy/why-not-lgpl.html>.

G2A TERMS & CONDITIONS

When you use G2A Pay services provided by G2A.COM Limited (hereinafter referred to as the “G2A Pay services provider”) to make a purchase on our website, responsibility over your purchase will first be transferred to G2A.COM Limited before it is delivered to you. G2A Pay services provider assumes primary responsibility, with our assistance, for payment and payment related customer support. The terms between G2A Pay services provider and customers who utilize services of G2A Pay are governed by separate agreements and are not subject to the Terms on this website.

With respect to customers making purchases through G2A Pay services provider checkout, (i) the Privacy Policy of G2A Pay services provider shall apply to all payments and should be reviewed before making any purchase, and (ii) the G2A Pay services provider Refund Policy shall apply to all payments unless notice is expressly provided by the relevant supplier to buyers in advance. In addition the purchase of certain products may also require shoppers to agree to one or more End-User License Agreements (or “EULAs”) that may include additional terms set by the product supplier rather than by Us or G2A Pay services provider. You will be bound by any EULA that you agree to.

We and/or entities that sell products on our website by using G2A Pay services are primarily responsible for warranty, maintenance, technical or product support services for those Products. We and/or entities that sell products on our website are primarily responsible to users for any liabilities related to fulfillment of orders, and EULAs entered into by the End-User Customer. G2A Pay services provider is primarily responsible for facilitating your payment.

You are responsible for any fees, taxes or other costs associated with the purchase and delivery of your items resulting from charges imposed by your relationship with payment services providers or the duties and taxes imposed by your local customs officials or other regulatory body.

For customer service inquiries or disputes, You may contact us by Live Chat or by phone at +6281250002296

Company: Cooming soon

Address : Jl Bintara Raya

Questions related to payments made through G2A Pay services provider payment should be addressed to https://www.g2a.com

Where possible, we will work with You and/or any user selling on our website, to resolve any disputes arising from your purchase.

PayPal TERMS & CONDITIONS

When you use Paypal Pay services provided by PAYPAL.COM Limited (hereinafter referred to as the “PAYPAL Pay services provider”) to make a purchase on our website, responsibility over your purchase will first be transferred to PAYPAL.COM Limited before it is delivered to you. PAYPAL Pay services provider assumes primary responsibility, with our assistance, for payment and payment related customer support. The terms between PAYPAL Pay services provider and customers who utilize services of PAYPAL Pay are governed by separate agreements and are not subject to the Terms on this website.

With respect to customers making purchases through PAYPAL Pay services provider checkout, (i) the Privacy Policy of PAYPAL Pay services provider shall apply to all payments and should be reviewed before making any purchase, and (ii) the PAYPAL Pay services provider Refund Policy shall apply to all payments unless notice is expressly provided by the relevant supplier to buyers in advance. In addition the purchase of certain products may also require shoppers to agree to one or more End-User License Agreements (or “EULAs”) that may include additional terms set by the product supplier rather than by Us or PAYPAL Pay services provider. You will be bound by any EULA that you agree to.

We and/or entities that sell products on our website by using PAYPAL Pay services are primarily responsible for warranty, maintenance, technical or product support services for those Products. We and/or entities that sell products on our website are primarily responsible to users for any liabilities related to fulfillment of orders, and EULAs entered into by the End-User Customer. PAYPAL Pay services provider is primarily responsible for facilitating your payment.

You are responsible for any fees, taxes or other costs associated with the purchase and delivery of your items resulting from charges imposed by your relationship with payment services providers or the duties and taxes imposed by your local customs officials or other regulatory body.

For customer service inquiries or disputes, You may contact us by Live Chat or by phone at +6281250002296

Company: Cooming soon

Address : Jl Bintara Raya

Questions related to payments made through PAYPAL Pay services provider payment should be addressed to https://www.PAYPAL.com

Where possible, we will work with You and/or any user selling on our website, to resolve any disputes arising from your purchase.

BANK TERMS & CONDITIONS

When you use BANK Pay services provided by BANK Limited (hereinafter referred to as the “BANK Pay services provider”) to make a purchase on our website, responsibility over your purchase will first be transferred to BANK Limited before it is delivered to you. BANK Pay services provider assumes primary responsibility, with our assistance, for payment and payment related customer support. The terms between BANK Pay services provider and customers who utilize services of BANK Pay are governed by separate agreements and are not subject to the Terms on this website.

With respect to customers making purchases through BANK Pay services provider checkout, (i) the Privacy Policy of BANK Pay services provider shall apply to all payments and should be reviewed before making any purchase, and (ii) the BANK Pay services provider Refund Policy shall apply to all payments unless notice is expressly provided by the relevant supplier to buyers in advance. In addition the purchase of certain products may also require shoppers to agree to one or more End-User License Agreements (or “EULAs”) that may include additional terms set by the product supplier rather than by Us or BANK Pay services provider. You will be bound by any EULA that you agree to.

We and/or entities that sell products on our website by using BANK Pay services are primarily responsible for warranty, maintenance, technical or product support services for those Products. We and/or entities that sell products on our website are primarily responsible to users for any liabilities related to fulfillment of orders, and EULAs entered into by the End-User Customer. BANK Pay services provider is primarily responsible for facilitating your payment.

You are responsible for any fees, taxes or other costs associated with the purchase and delivery of your items resulting from charges imposed by your relationship with payment services providers or the duties and taxes imposed by your local customs officials or other regulatory body.

For customer service inquiries or disputes, You may contact us by Live Chat or by phone at +6281250002296

Company: Cooming soon

Address : Jl Bintara Raya

Questions related to payments made through BANK Pay services provider payment should be addressed to Your bank

Where possible, we will work with You and/or any user selling on our website, to resolve any disputes arising from your purchase.

Cookies and other technologies employed by VelroseGame and its partners
What are cookies?
Cookies are pieces of data that websites you visit can set on your browser and device hard drive. The term may also be used to refer to other technologies that when employed in a certain manner may be able to track the online behavior of a web user.
VelroseGame and its partners use a number of technologies to support and improve the gaming experience we offer. Some of these technologies are used to identify users when they are on VelroseGame games and others may be used to track unique web users. This page was developed to describe the technologies we use, including how they work, our purposes for using them and your choices about their use.
Technology VelroseGame Uses
Local Shared Objects (LSOs), which are also known as “flash cookies”, are used to
• Identify devices so we can prevent and respond to fraud.
• Store game preferences so we can present the game experience you want. These preferences let us know things like whether you want music on or off or whether you want us to hide certain VelroseGame games.
• Store game assets (files) on your device so you can have faster load times.
To learn more about LSOs and how to manage them visit Adobe
Browser Cookies are used by VelroseGame primarily to
• Identify specific users and track whether they are logged in (Authentication)
• Customize site content and remember site preferences
There are a number of ways to manage browser cookies on your device. Most major browsers offer choices for whether and how you might receive future cookies and for deleting cookies already on your machine. Here are links for some of the larger browsers:
Chrome
Firefox
Safari
Internet Explorer
Html eTags is a technology that allows a web service to validate the temporary storage (cache) of web documents like html pages and images. They are used by VelroseGame or service providers working on VelroseGame’s behalf to optimize web caching for each user.
You may be able to remove eTags from your browser by following your browser instructions for clearing cache.
Beacons, pixel tags, clear gifs are all terms for similar technology that often works in the same way. Small strings of (software) code that track events such as when a web user visits a page or opens an email. They are used by VelroseGame to measure the effectiveness of our email campaigns, deliver more relevant content and manage advertising for VelroseGame’s games.
Generally you should be able manage beacons and pixel tags in the same way that you manage cookies – using your browser’s preferences (see browser links above).
NOTE: There are several browser plugins available to web users who want to be better informed about and have more control over these technologies. Two popular ones are Ghostery and Abine
Other Companies’ Technology VelroseGame uses within its games, apps and sites
Analytics
VelroseGame analyzes traffic and other end user activity to improve the user experience. VelroseGame and companies working its behalf may use web server log files and tracking technologies to collect and analyze certain types of technical information, such as cookies, IP addresses, device type and usage information including time spent on particular pages or number of clicks.
One of our analytics partners is Google Analytics. Google Analytics uses browser cookies to generate statistics about visitors to websites, such as the number of page views or times of peak traffic. If you don’t want your anonymous browser data to be collected by Google Analytics when you visit sites that use Google Analytics, you can install an opt-out in your web browser.
To learn more or inform Google that you do not want data about your website visit sent to Google, go here
Ads for VelroseGame games (VelroseGame as an advertiser)
VelroseGame works with web publishers and advertising networks (“Advertising Partners”) to deliver interest-based ads to users that have visited VelroseGame sites, played VelroseGame’s games or accessed VelroseGame’s content including videos (“VelroseGame Users”). This practice is also referred to as online behavioral advertising and here’s a brief description of how it works at VelroseGame.
Our Advertising Partners use software that recognizes pixels and cookies (identifiers) that are placed on the browsers of VelroseGame Users. When the ad software recognizes these identifiers, they deliver ads for VelroseGame’s products and services to VelroseGame Users who are on other web sites. Many of these ads for VelroseGame’s products will include an icon the ad recipient can click to learn more about the ad, why she received it and how to exercise choice. The icon displayed may range from the ad choices icon to a question mark (“?”) in the corner of the ad unit.
Ads for other sites and services (VelroseGame as a publisher)
As you know VelroseGame is a free service. One of the ways we generate revenue, which supports our ability to develop and publish fun games, is by publishing ads. Our advertising partners may serve targeted or personalized ads that are intended to be more relevant to you.
Advertising in Web Games and Emails
Tracking Pixels, Web Bugs, Pixel Tags, Browser Cookies – these are all references to technology that we permit others to set or read within our service. These technologies may be used to identify the interests and behavior of web users and target advertising to them based on those interests. They are also used to limit the number of times a user may see a particular ad or prevent certain ads from being shown at all.
Advertising in Mobile Games
When you play our mobile games we or our advertising partners may use one or more of several different identifiers for your device, including UDID and Mac Address, to target and deliver ads in our games. This means that your device identifier may be accessed by third party ad networks and used to (a) help manage the number and types of ads you see; (b) to track the source of installs related to ads seen in other developer apps, and; (c) identify the interests and behavior of users and target advertising to them based on those interests.
Identifiers VelroseGame uses
IP Addresses are numbers assigned to the device you use to access the internet. VelroseGame, like many other web services, automatically collects IP Addresses from visitors to its games and sites. VelroseGame puts this information to several uses including providing security features and identifying general user locations, which may be used to target advertising.
Mobile Identifiers are numbers that identify devices or access points for devices that access VelroseGame’s mobile offerings. When you play our mobile games we may use one or more of several different identifiers for your device, including UDID and Mac Address, to identify you and your game account and to recognize players from one VelroseGame app to another. If you elect to participate in an SMS program we will use and may store your mobile phone number.
Facebook and other social networks
In many instances users must be logged in to Facebook or other social networks to access our games. We typically collect and store the social network user ID and use it for several things including identifying specific players and accounts.
VelroseGame IDs
When you create an account with VelroseGame or establish a profile (like on l2VelroseGame.com) we will generate and assign a l2VelroseGame ID to your account.
NOTE: The social networks that offer l2VelroseGame games may use tracking technology of their own to recognize users and provide certain products and features. To learn more about Facebook’s practices visit Facebook

© 2019 VelroseGame Lineage 2 PUBLIC TEST SERVER, ALL RESPECTIVE RIGHTS BELONG TO NCSOFT.