1:"$Sreact.fragment" 2:I[4970,[],"ClientSegmentRoot"] 3:I[328,["874","static/chunks/874-8179e1aff5ec9a87.js","766","static/chunks/766-88cba2556eb967be.js","946","static/chunks/946-98cf85e8eaddd93f.js","177","static/chunks/app/layout-3d0363b058443a76.js"],"default"] 4:I[7555,[],""] 5:I[1295,[],""] 7:I[9665,[],"OutletBoundary"] a:I[4911,[],"AsyncMetadataOutlet"] c:I[9665,[],"ViewportBoundary"] e:I[9665,[],"MetadataBoundary"] 10:I[6614,[],""] :HL["/_next/static/css/991efdcd1ebedf92.css","style"] :HL["/_next/static/css/ef46db3751d8e999.css","style"] :HL["/_next/static/css/0fcd4f902b4eca58.css","style"] 0:{"P":null,"b":"_D2urxF4OMzoHuc_3Y31M","p":"","c":["","termsAndConditions"],"i":false,"f":[[["",{"children":["(Components)",{"children":["(main)",{"children":["(Quiklinks)",{"children":["termsAndConditions",{"children":["__PAGE__",{}]}]}]}]}]},"$undefined","$undefined",true],["",["$","$1","c",{"children":[[["$","link","0",{"rel":"stylesheet","href":"/_next/static/css/991efdcd1ebedf92.css","precedence":"next","crossOrigin":"$undefined","nonce":"$undefined"}],["$","link","1",{"rel":"stylesheet","href":"/_next/static/css/ef46db3751d8e999.css","precedence":"next","crossOrigin":"$undefined","nonce":"$undefined"}]],["$","$L2",null,{"Component":"$3","slots":{"children":["$","$L4",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L5",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":[[["$","title",null,{"children":"404: This page could not be found."}],["$","div",null,{"style":{"fontFamily":"system-ui,\"Segoe UI\",Roboto,Helvetica,Arial,sans-serif,\"Apple Color Emoji\",\"Segoe UI Emoji\"","height":"100vh","textAlign":"center","display":"flex","flexDirection":"column","alignItems":"center","justifyContent":"center"},"children":["$","div",null,{"children":[["$","style",null,{"dangerouslySetInnerHTML":{"__html":"body{color:#000;background:#fff;margin:0}.next-error-h1{border-right:1px solid rgba(0,0,0,.3)}@media (prefers-color-scheme:dark){body{color:#fff;background:#000}.next-error-h1{border-right:1px solid rgba(255,255,255,.3)}}"}}],["$","h1",null,{"className":"next-error-h1","style":{"display":"inline-block","margin":"0 20px 0 0","padding":"0 23px 0 0","fontSize":24,"fontWeight":500,"verticalAlign":"top","lineHeight":"49px"},"children":404}],["$","div",null,{"style":{"display":"inline-block"},"children":["$","h2",null,{"style":{"fontSize":14,"fontWeight":400,"lineHeight":"49px","margin":0},"children":"This page could not be found."}]}]]}]}]],[]],"forbidden":"$undefined","unauthorized":"$undefined"}]},"params":{},"promise":"$@6"}]]}],{"children":["(Components)",["$","$1","c",{"children":[null,["$","$L4",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L5",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":[[["$","title",null,{"children":"404: This page could not be found."}],["$","div",null,{"style":"$0:f:0:1:1:props:children:1:props:slots:children:props:notFound:0:1:props:style","children":["$","div",null,{"children":[["$","style",null,{"dangerouslySetInnerHTML":{"__html":"body{color:#000;background:#fff;margin:0}.next-error-h1{border-right:1px solid rgba(0,0,0,.3)}@media (prefers-color-scheme:dark){body{color:#fff;background:#000}.next-error-h1{border-right:1px solid rgba(255,255,255,.3)}}"}}],["$","h1",null,{"className":"next-error-h1","style":"$0:f:0:1:1:props:children:1:props:slots:children:props:notFound:0:1:props:children:props:children:1:props:style","children":404}],["$","div",null,{"style":"$0:f:0:1:1:props:children:1:props:slots:children:props:notFound:0:1:props:children:props:children:2:props:style","children":["$","h2",null,{"style":"$0:f:0:1:1:props:children:1:props:slots:children:props:notFound:0:1:props:children:props:children:2:props:children:props:style","children":"This page could not be found."}]}]]}]}]],[]],"forbidden":"$undefined","unauthorized":"$undefined"}]]}],{"children":["(main)",["$","$1","c",{"children":[null,["$","$L4",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L5",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]]}],{"children":["(Quiklinks)",["$","$1","c",{"children":[null,["$","$L4",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L5",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]]}],{"children":["termsAndConditions",["$","$1","c",{"children":[null,["$","$L4",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L5",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]]}],{"children":["__PAGE__",["$","$1","c",{"children":[["$","div",null,{"className":" p-5 main_Container","children":[["$","h2",null,{"children":"TERMS AND CONDITIONS"}],["$","p",null,{"children":["$","strong",null,{"children":["ChatWet Application",["$","br",null,{}],"Operated by Omkaar Group"]}]}],["$","p",null,{"children":[["$","strong",null,{"children":"Effective Date:"}]," June 1, 2025",["$","br",null,{}],["$","strong",null,{"children":"Last Updated:"}]," June 1, 2025",["$","br",null,{}],["$","strong",null,{"children":"Version:"}]," 1.0"]}],["$","h2",null,{"children":"ARTICLE I - DEFINITIONS AND INTERPRETATION"}],["$","h2",null,{"children":"1.1 Definitions"}],["$","p",null,{"children":"In these Terms and Conditions, unless the context otherwise requires:"}],["$","p",null,{"children":[["$","strong",null,{"children":"“Agreement”"}]," means these Terms and Conditions as amended from time to time;"]}],["$","p",null,{"children":[["$","strong",null,{"children":"“Application” or “ChatWet”"}]," means the mobile application and web platform operated by the Company;"]}],["$","p",null,{"children":[["$","strong",null,{"children":"“Company,” “we,” “us,” or “our”"}]," means Omkaar Group, a company incorporated under the laws of India;"]}],["$","p",null,{"children":[["$","strong",null,{"children":"“User,” “you,” or “your”"}]," means any individual who accesses or uses the Application;"]}],["$","p",null,{"children":[["$","strong",null,{"children":"“Personal Data”"}]," means any information relating to an identified or identifiable natural person;"]}],["$","p",null,{"children":[["$","strong",null,{"children":"“Service”"}]," means all features, functionalities, and services provided through the Application;"]}],["$","p",null,{"children":[["$","strong",null,{"children":"“Virtual Gifts”"}]," means digital items that can be purchased and sent to other Users;"]}],["$","p",null,{"children":[["$","strong",null,{"children":"“Premium Subscription”"}]," means paid subscription tiers offering enhanced features;"]}],["$","p",null,{"children":[["$","strong",null,{"children":"“Verification”"}]," means the multi-tier identity confirmation process;"]}],["$","p",null,{"children":[["$","strong",null,{"children":"“Wallet”"}]," means the digital account for managing credits, earnings, and transactions;"]}],["$","p",null,{"children":[["$","strong",null,{"children":"“Force Majeure”"}]," means any event beyond the reasonable control of the Company including but not limited to acts of God, natural disasters, war, terrorism, government actions, internet failures, or other unforeseeable circumstances."]}],["$","h2",null,{"children":"1.2 Interpretation"}],["$","ul",null,{"children":[["$","li",null,{"children":"References to singular include plural and vice versa;"}],["$","li",null,{"children":"Headings are for convenience only and do not affect interpretation;"}],["$","li",null,{"children":"References to “include” or “including” are not limiting;"}],["$","li",null,{"children":"All monetary amounts are in Indian Rupees unless otherwise specified."}]]}],["$","h2",null,{"children":"ARTICLE II- COMPANY INFORMATION AND JURISDICTION"}],["$","h2",null,{"children":"2.1 Corporate Details"}],["$","p",null,{"children":[["$","strong",null,{"children":"Company Name:"}]," Omkaar Group",["$","br",null,{}],["$","strong",null,{"children":"Registered Office:"}]," Office No. 102, 1st Floor, Rituraj Business Park, Bicholi Mardana Road, near UNO Business Park, Indore, Deoguradia, Madhya Pradesh 452016, India",["$","br",null,{}],["$","strong",null,{"children":"Jurisdiction:"}]," Republic of India",["$","br",null,{}],["$","strong",null,{"children":"Governing Law:"}]," Laws of India and State of Madhya Pradesh",["$","br",null,{}],["$","strong",null,{"children":"Service Mark:"}]," ChatWet™"]}],["$","h2",null,{"children":"2.2 Legal Standing"}],["$","p",null,{"children":"The Company is duly incorporated and validly existing under Indian law with full corporate power and authority to operate the Service and enter into this Agreement."}],["$","h2",null,{"children":"ARTICLE III - ACCEPTANCE AND MODIFICATION OF TERMS"}],["$","h2",null,{"children":"3.1 Agreement Formation"}],["$","p",null,{"children":"By downloading, installing, accessing, or using ChatWet, you:"}],["$","ul",null,{"children":[["$","li",null,{"children":"Acknowledge that you have read and understood these Terms;"}],["$","li",null,{"children":"Agree to be legally bound by these Terms;"}],["$","li",null,{"children":"Represent that you have the legal capacity to enter into this Agreement;"}],["$","li",null,{"children":"Consent to electronic contracting and communication."}]]}],["$","h2",null,{"children":"3.2 Modification Rights"}],["$","p",null,{"children":"The Company reserves the unilateral right to modify these Terms at any time. Modifications will be effective upon:"}],["$","ul",null,{"children":[["$","li",null,{"children":"Posting of updated Terms on the Application;"}],["$","li",null,{"children":"In-app notification to active Users;"}],["$","li",null,{"children":"Email notification to registered Users (where applicable)."}]]}],["$","p",null,{"children":"Continued use of the Service after modification constitutes acceptance of the updated Terms."}],["$","h2",null,{"children":"3.3 Severability"}],["$","p",null,{"children":"If any provision of these Terms is held to be invalid, illegal, or unenforceable, the remaining provisions shall remain in full force and effect."}],["$","h2",null,{"children":"ARTICLE IV- ELIGIBILITY AND CAPACITY"}],["$","h2",null,{"children":"4.1 Age Requirements"}],["$","p",null,{"children":[["$","strong",null,{"children":"Minimum Age:"}]," Users must be at least eighteen (18) years of age or the age of majority in their jurisdiction, whichever is higher."]}],["$","p",null,{"children":[["$","strong",null,{"children":"Age Verification:"}]," The Company may require proof of age through government-issued identification."]}],["$","p",null,{"children":[["$","strong",null,{"children":"Underage Access:"}]," The Company expressly prohibits use by minors and will terminate accounts of Users under the required age."]}],["$","h2",null,{"children":"4.2 Legal Capacity"}],["$","p",null,{"children":"Users represent and warrant that they: "}],["$","ul",null,{"children":[["$","li",null,{"children":"Have full legal capacity to enter into this Agreement;"}],["$","li",null,{"children":"Are not subject to any legal disability that would prevent performance;"}],["$","li",null,{"children":"Are not prohibited from using the Service under applicable law;"}],["$","li",null,{"children":"Will comply with all applicable local, state, national, and international laws."}]]}],["$","h2",null,{"children":"4.3 Geographic Restrictions"}],["$","p",null,{"children":"The Service may not be available in all jurisdictions. Users are responsible for compliance with local laws regarding use of dating and social networking applications."}],["$","h2",null,{"children":"ARTICLE V - ACCOUNT REGISTRATION AND VERIFICATION"}],["$","h2",null,{"children":"5.1 Account Creation"}],["$","p",null,{"children":[["$","strong",null,{"children":"Single Account Policy:"}]," Each individual may maintain only one (1) active account."]}],["$","p",null,{"children":["$","strong",null,{"children":"Required Information:"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"Valid mobile telephone number"}],["$","li",null,{"children":"Functional email address"}],["$","li",null,{"children":"Legal name and date of birth"}],["$","li",null,{"children":"Gender identity and preferences"}],["$","li",null,{"children":"Geographic location"}]]}],["$","p",null,{"children":[["$","strong",null,{"children":"Accuracy Obligation:"}]," Users warrant that all provided information is true, accurate, current, and complete."]}],["$","h2",null,{"children":"5.2 Multi-Tier Verification System"}],["$","ul",null,{"children":[["$","li",null,{"children":[["$","h4",null,{"children":"Basic Verification (Mandatory)"}],["$","p",null,{"children":[["$","strong",null,{"children":"Mobile Number Verification:"}]," SMS-based One-Time Password (OTP) authentication; phone number must be active; international numbers accepted."]}],["$","p",null,{"children":[["$","strong",null,{"children":"Email Verification:"}]," Confirmation link sent to provided email; email must be valid; disposable addresses prohibited."]}],["$","p",null,{"children":[["$","strong",null,{"children":"Photo Verification:"}]," AI-powered face check; must be a clear, recent, solo photo; no group/professional headshots."]}]]}],["$","li",null,{"children":[["$","h4",null,{"children":"Enhanced Verification (Optional)"}],["$","p",null,{"children":[["$","strong",null,{"children":"Social Media Authentication:"}]," Linking of Facebook, Instagram, LinkedIn, or Google accounts to verify activity."]}],["$","p",null,{"children":["$","strong",null,{"children":"KYC Documentation:"}]}],["$","ul",null,{"children":[["$","li",null,{"children":[["$","strong",null,{"children":"Indian Residents:"}]," Aadhaar with biometrics or PAN with photo, proof of address, video verification if needed."]}],["$","li",null,{"children":[["$","strong",null,{"children":"International Users:"}]," Govt ID (passport, driver’s license), temporary credit charge for card verification, refunded in 3–5 days."]}]]}]]}]]}],["$","h2",null,{"children":"5.3 KYC Data Protection and Immutability"}],["$","p",null,{"children":[["$","strong",null,{"children":"Data Locking:"}]," Once KYC is done, key data (name, DOB, ID numbers) is locked."]}],["$","p",null,{"children":[["$","strong",null,{"children":"Display Options:"}]," Users can choose display name format."]}],["$","p",null,{"children":[["$","strong",null,{"children":"Security:"}]," High encryption, limited access, periodic audits, auto-deletion as per laws."]}],["$","p",null,{"children":[["$","strong",null,{"children":"Overrides:"}]," Only via valid legal documents and manual review."]}],["$","h2",null,{"children":"5.4 Verification Benefits"}],["$","p",null,{"children":[["$","strong",null,{"children":"100% Verified Users:"}]," One-month Premium, trust badges, support priority, better matches."]}],["$","p",null,{"children":[["$","strong",null,{"children":"Ongoing Perks:"}]," Badge display, higher ranking, access to exclusive features."]}],["$","h2",null,{"children":"5.5 Account Security"}],["$","p",null,{"children":[["$","strong",null,{"children":"User Duties:"}]," Keep credentials safe, use strong passwords, enable 2FA, report suspicious activity."]}],["$","p",null,{"children":[["$","strong",null,{"children":"Company Rights:"}]," Suspend or terminate accounts with suspicious or false data."]}],["$","h2",null,{"children":"ARTICLE VI - USER CONDUCT AND PROHIBITED ACTIVITIES"}],["$","h2",null,{"children":"6.1 Acceptable Use Policy"}],["$","p",null,{"children":"Users agree to use the Service lawfully and respectfully for relationship-building purposes only."}],["$","h2",null,{"children":"6.2 Strictly Prohibited Activities"}],["$","p",null,{"children":[["$","strong",null,{"children":"Identity Violations:"}]," No fake profiles, impersonation, or bots."]}],["$","p",null,{"children":[["$","strong",null,{"children":"Content Violations:"}]," No illegal, abusive, explicit, or IP-infringing content."]}],["$","p",null,{"children":[["$","strong",null,{"children":"Communication Violations:"}]," No harassment, spam, or hate speech."]}],["$","p",null,{"children":[["$","strong",null,{"children":"Security Violations:"}]," No hacking, reverse engineering, or interference."]}],["$","p",null,{"children":[["$","strong",null,{"children":"Commercial Violations:"}]," No unauthorized advertising or soliciting."]}],["$","h2",null,{"children":"6.3 Content Standards"}],["$","p",null,{"children":"User content must be legal, respectful, IP-compliant, and appropriate."}],["$","h2",null,{"children":"6.4 Reporting and Enforcement"}],["$","p",null,{"children":[["$","strong",null,{"children":"Reporting:"}]," In-app tools available for violations."]}],["$","p",null,{"children":[["$","strong",null,{"children":"Investigation:"}]," Prompt review by the Company."]}],["$","p",null,{"children":[["$","strong",null,{"children":"Actions:"}]," Warnings, removals, suspensions, bans, or legal action."]}],["$","div",null,{"children":[["$","h2",null,{"children":"7. SUBSCRIPTION PLANS AND PRICING"}],["$","h2",null,{"children":"7.1 Service Tiers"}],["$","p",null,{"children":[["$","strong",null,{"children":"Free Tier:"}]," Basic profile creation and browsing, limited daily profile views and matches, standard messaging features with restrictions, basic search and discovery tools, advertisement-supported experience."]}],["$","p",null,{"children":[["$","strong",null,{"children":"Premium Subscriptions:"}]," Note: Specific pricing to be determined and updated in separate pricing schedule."]}],["$","ul",null,{"children":[["$","li",null,{"children":"Enhanced profile visibility and priority placement"}],["$","li",null,{"children":"Unlimited profile views and advanced search filters"}],["$","li",null,{"children":"See who liked your profile feature"}],["$","li",null,{"children":"Super Likes and Profile Boost capabilities"}],["$","li",null,{"children":"Ad-free experience"}],["$","li",null,{"children":"Advanced privacy controls"}],["$","li",null,{"children":"Priority customer support"}]]}],["$","h2",null,{"children":"7.2 Payment Terms"}],["$","p",null,{"children":[["$","strong",null,{"children":"Billing Cycle:"}]," Subscriptions are billed in advance for the selected period (monthly, semi-annually, or annually)."]}],["$","p",null,{"children":[["$","strong",null,{"children":"Payment Methods:"}]," Credit cards, debit cards, net banking, UPI, digital wallets, and other approved payment methods."]}],["$","p",null,{"children":[["$","strong",null,{"children":"Auto-Renewal:"}]," Subscriptions automatically renew unless cancelled before the renewal date."]}],["$","p",null,{"children":[["$","strong",null,{"children":"Price Changes:"}]," The Company may modify subscription prices with thirty (30) days advance notice."]}],["$","h2",null,{"children":"7.3 Cancellation and Refunds"}],["$","p",null,{"children":[["$","strong",null,{"children":"Cancellation:"}]," Users may cancel subscriptions at any time through account settings."]}],["$","p",null,{"children":[["$","strong",null,{"children":"Refund Policy:"}]," No refunds for unused portions of current billing periods. Refunds may be provided at Company’s sole discretion. Payment method disputes handled according to payment processor policies. Fraudulent transactions will be reversed and accounts terminated."]}]]}],["$","div",null,{"children":[["$","h2",null,{"children":"ARTICLE VIII - VIRTUAL GIFT ECONOMY AND MONETIZATION"}],["$","h2",null,{"children":"8.1 Virtual Gift System"}],["$","p",null,{"children":[["$","strong",null,{"children":"Nature of Virtual Gifts:"}]," Digital items with no real-world value, used for expression and engagement within the Application."]}],["$","p",null,{"children":[["$","strong",null,{"children":"Purchase and Ownership:"}]," Users purchase virtual gifts using real currency but do not acquire ownership rights in the underlying digital assets."]}],["$","p",null,{"children":[["$","strong",null,{"children":"Revenue Sharing Model:"}]," Gift Recipients receive sixty percent (60%) of gift value as earnings. Company retains forty percent (40%) as platform service fee. Revenue sharing subject to applicable taxes and fees."]}],["$","h2",null,{"children":"8.2 Earnings and Wallet System"}],["$","p",null,{"children":[["$","strong",null,{"children":"Earning Sources:"}]," Virtual gifts received from other Users, referral commissions from successful referrals, promotional bonuses and rewards."]}],["$","p",null,{"children":[["$","strong",null,{"children":"Wallet Management:"}]," Digital wallet for tracking earnings and credits, real-time balance updates and transaction history, separate accounting for different earning sources."]}],["$","h2",null,{"children":"8.3 Withdrawal Process"}],["$","p",null,{"children":[["$","strong",null,{"children":"Eligibility Requirements:"}]," Withdrawal requests processed within 3-5 business days. Tax Deducted at Source (TDS) as per Indian Income Tax regulations. Transaction fees may apply based on withdrawal method."]}],["$","p",null,{"children":[["$","strong",null,{"children":"Tax Obligations:"}]," Users responsible for reporting earnings as per local tax laws. Company will provide necessary documentation for tax filing. TDS certificates provided for Indian Users as applicable."]}],["$","h2",null,{"children":"8.4 Referral Program"}],["$","p",null,{"children":[["$","strong",null,{"children":"Commission Structure:"}]," Level 1 (Direct Referrals): 7% of referral purchases, Level 2 (Secondary Referrals): 5%, Level 3 (Tertiary Referrals): 3%."]}],["$","p",null,{"children":[["$","strong",null,{"children":"Eligibility:"}]," Commissions earned only when referred Users make qualifying purchases."]}],["$","p",null,{"children":[["$","strong",null,{"children":"Gender-Based Bonuses:"}]," Enhanced commission rates for female referrers to promote gender balance on the platform."]}]]}],["$","div",null,{"children":[["$","h2",null,{"children":"ARTICLE IX - VIDEO CALLING AND LIVE STREAMING"}],["$","h2",null,{"children":"9.1 Video Communication Features"}],["$","p",null,{"children":[["$","strong",null,{"children":"Service Scope:"}]," One-on-one video calling, group video calls (up to 8 participants), voice-only calling options, screen sharing capabilities."]}],["$","p",null,{"children":[["$","strong",null,{"children":"Technical Requirements:"}]," Stable internet connection, compatible device with camera and microphone, updated Application version."]}],["$","h2",null,{"children":"9.2 Recording and Privacy"}],["$","p",null,{"children":[["$","strong",null,{"children":"Recording Policy:"}]," Call recording requires explicit consent from all participants. Unauthorized recording is strictly prohibited. Screen capture prevention measures implemented. Users notified when recording is active."]}],["$","p",null,{"children":[["$","strong",null,{"children":"Privacy Protections:"}]," End-to-end encryption for all communications. No monitoring of private communications. Data retention policies for call metadata. User controls for call privacy settings."]}],["$","h2",null,{"children":"9.3 Live Streaming"}],["$","p",null,{"children":[["$","strong",null,{"children":"Broadcasting Rights:"}]," Users may broadcast live streams subject to Community Guidelines."]}],["$","p",null,{"children":[["$","strong",null,{"children":"Content Moderation:"}]," Real-time monitoring and automated content filtering."]}],["$","p",null,{"children":[["$","strong",null,{"children":"Monetization:"}]," Streamers may receive virtual gifts from viewers during broadcasts."]}],["$","p",null,{"children":[["$","strong",null,{"children":"Platform Rights:"}]," Company reserves right to terminate streams violating terms or policies."]}]]}],["$","div",null,{"children":[["$","h2",null,{"children":"ARTICLE X - ARTIFICIAL INTELLIGENCE AND DATA PROCESSING"}],["$","h2",null,{"children":"10.1 AI Implementation"}],["$","p",null,{"children":[["$","strong",null,{"children":"Matching Algorithm:"}]," AI-powered compatibility analysis and User recommendations."]}],["$","p",null,{"children":[["$","strong",null,{"children":"Content Moderation:"}]," Automated detection and filtering of inappropriate content."]}],["$","p",null,{"children":[["$","strong",null,{"children":"Fraud Prevention:"}]," Machine learning systems for identifying suspicious activities and fake profiles."]}],["$","h2",null,{"children":"10.2 Data Processing Rights"}],["$","p",null,{"children":[["$","strong",null,{"children":"Processing Basis:"}]," User consent and legitimate business interests."]}],["$","p",null,{"children":[["$","strong",null,{"children":"Data Types:"}]," Profile information and preferences, communication patterns and interaction data, device information and usage analytics, location data (with permission)."]}],["$","p",null,{"children":[["$","strong",null,{"children":"User Controls:"}]," Opt-out options for certain AI features, data portability rights, deletion requests (subject to legal retention requirements)."]}]]}],["$","div",null,{"children":[["$","h2",null,{"children":"ARTICLE XI - INTELLECTUAL PROPERTY RIGHTS"}],["$","h2",null,{"children":"11.1 Company Intellectual Property"}],["$","p",null,{"children":[["$","strong",null,{"children":"Proprietary Rights:"}]," The Company owns all rights, title, and interest in ChatWet trademark and branding, Application source code and architecture, Virtual gift designs and animations, Algorithms and proprietary technology, User interface and experience design."]}],["$","p",null,{"children":[["$","strong",null,{"children":"License to Users:"}]," Limited, non-exclusive, non-transferable license to use the Service for personal, non-commercial purposes."]}],["$","h2",null,{"children":"11.2 User Content"}],["$","p",null,{"children":[["$","strong",null,{"children":"Ownership:"}]," Users retain ownership of content they create and upload."]}],["$","p",null,{"children":[["$","strong",null,{"children":"License Grant:"}]," By uploading content, Users grant the Company a worldwide, royalty-free, non-exclusive license to display, distribute, and promote User content within the Service, create derivative works for platform functionality, and use content for marketing and promotional purposes (with User consent)."]}],["$","p",null,{"children":[["$","strong",null,{"children":"Content Removal:"}]," Company may remove content violating these Terms without prior notice."]}],["$","h2",null,{"children":"11.3 Intellectual Property Violations"}],["$","p",null,{"children":[["$","strong",null,{"children":"DMCA Compliance:"}]," The Company respects intellectual property rights and responds to valid takedown notices."]}],["$","p",null,{"children":[["$","strong",null,{"children":"Reporting Infringement:"}]," Copyright holders may report violations through designated channels."]}],["$","p",null,{"children":[["$","strong",null,{"children":"Repeat Offender Policy:"}]," Accounts with multiple verified infringement claims may be terminated."]}]]}],["$","div",null,{"children":[["$","h2",null,{"children":"ARTICLE XII - PRIVACY AND DATA PROTECTION"}],["$","h2",null,{"children":"12.1 Data Collection and Use"}],["$","p",null,{"children":[["$","strong",null,{"children":"Collection Principles:"}]," Data minimization and purpose limitation, transparency in data collection practices, user consent for sensitive data processing, compliance with applicable privacy laws."]}],["$","p",null,{"children":[["$","strong",null,{"children":"Processing Purposes:"}]," Service provision and account management, safety, security, and fraud prevention, platform improvement and analytics, marketing and communication (with consent)."]}],["$","h2",null,{"children":"12.2 Data Sharing"}],["$","p",null,{"children":[["$","strong",null,{"children":"Third-Party Sharing:"}]," Limited to service providers and business partners (under strict confidentiality), legal compliance and law enforcement requests, business transfers (with user notification), aggregated, anonymized data for research and analytics."]}],["$","p",null,{"children":[["$","strong",null,{"children":"User Controls:"}]," Privacy settings and data access controls, marketing communication preferences, data deletion and portability requests."]}],["$","h2",null,{"children":"12.3 International Data Transfers"}],["$","p",null,{"children":[["$","strong",null,{"children":"Cross-Border Processing:"}]," User data may be processed in jurisdictions outside India for service provision."]}],["$","p",null,{"children":[["$","strong",null,{"children":"Safeguards:"}]," Appropriate technical and organizational measures to protect data during international transfers."]}]]}],["$","div",null,{"children":[["$","h2",null,{"children":"ARTICLE XIII - SAFETY AND SECURITY MEASURES"}],["$","h2",null,{"children":"13.1 Platform Security"}],["$","p",null,{"children":[["$","strong",null,{"children":"Technical Safeguards:"}]," Advanced encryption for data transmission and storage, multi-factor authentication options, regular security audits and penetration testing, incident response and breach notification procedures."]}],["$","p",null,{"children":[["$","strong",null,{"children":"Content Security:"}]," AI-powered content moderation, user reporting and flagging systems, manual review processes for sensitive content, proactive threat detection and mitigation."]}],["$","h2",null,{"children":"13.2 User Safety Features"}],["$","p",null,{"children":[["$","strong",null,{"children":"Safety Tools:"}]," Block and report functionality, privacy controls and visibility settings, emergency contact and location sharing features, safety tips and educational resources."]}],["$","p",null,{"children":[["$","strong",null,{"children":"Crisis Response:"}]," 24/7 safety support team, partnerships with safety organizations, emergency escalation procedures, post-incident support and follow-up."]}],["$","h2",null,{"children":"13.3 Community Guidelines Enforcement"}],["$","p",null,{"children":[["$","strong",null,{"children":"Violation Response:"}]," Graduated enforcement approach, due process for account actions, appeal mechanisms for disputed actions, transparency reporting on enforcement actions."]}]]}],["$","h2",null,{"children":"ARTICLE XIV - DISCLAIMERS AND LIMITATIONS OF LIABILITY"}],["$","h2",null,{"children":"14.1 Service Disclaimers"}],["$","p",null,{"children":[["$","strong",null,{"children":"“AS IS” BASIS:"}]," The Service is provided “as is” and “as available” without warranties of any kind."]}],["$","p",null,{"children":[["$","strong",null,{"children":"NO WARRANTIES:"}]," The Company disclaims all warranties, express or implied, including:"]}],["$","ul",null,{"children":[["$","li",null,{"children":["$","strong",null,{"children":"Merchantability and fitness for particular purpose"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Non-infringement of third-party rights"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Uninterrupted or error-free operation"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Accuracy or reliability of content or information"}]}]]}],["$","h2",null,{"children":"14.2 User Interaction Disclaimers"}],["$","p",null,{"children":[["$","strong",null,{"children":"No Background Checks:"}]," The Company does not conduct criminal background checks on Users beyond verification requirements."]}],["$","p",null,{"children":[["$","strong",null,{"children":"User Responsibility:"}]," Users interact with others at their own risk and should exercise appropriate caution."]}],["$","p",null,{"children":[["$","strong",null,{"children":"No Guarantees:"}]," No guarantee of finding matches, relationships, or achieving desired outcomes."]}],["$","h2",null,{"children":"14.3 Limitation of Liability"}],["$","p",null,{"children":[["$","strong",null,{"children":"MAXIMUM LIABILITY:"}]," Company’s total liability to any User shall not exceed the amount paid by the User to the Company in the twelve (12) months preceding the claim."]}],["$","p",null,{"children":[["$","strong",null,{"children":"EXCLUDED DAMAGES:"}]," Company shall not be liable for:"]}],["$","ul",null,{"children":[["$","li",null,{"children":["$","strong",null,{"children":"Indirect, incidental, special, consequential, or punitive damages"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Loss of profits, revenue, data, or business opportunities"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Personal injury or property damage arising from User interactions"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Third-party actions or content"}]}]]}],["$","h2",null,{"children":"14.4 Indemnification"}],["$","p",null,{"children":[["$","strong",null,{"children":"User Indemnification:"}]," Users agree to indemnify, defend, and hold harmless the Company from claims arising from:"]}],["$","ul",null,{"children":[["$","li",null,{"children":["$","strong",null,{"children":"User’s violation of these Terms"}]}],["$","li",null,{"children":["$","strong",null,{"children":"User’s content or conduct on the platform"}]}],["$","li",null,{"children":["$","strong",null,{"children":"User’s interaction with other Users"}]}],["$","li",null,{"children":["$","strong",null,{"children":"User’s violation of applicable laws or third-party rights"}]}]]}],["$","h2",null,{"children":"ARTICLE XV - FORCE MAJEURE AND SERVICE INTERRUPTIONS"}],["$","h2",null,{"children":"15.1 Force Majeure Events"}],["$","p",null,{"children":"The Company shall not be liable for delays or failures in performance resulting from Force Majeure events including:"}],["$","ul",null,{"children":[["$","li",null,{"children":["$","strong",null,{"children":"Natural disasters, pandemics, or public health emergencies"}]}],["$","li",null,{"children":["$","strong",null,{"children":"War, terrorism, civil unrest, or government actions"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Internet outages, cyberattacks, or infrastructure failures"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Labor disputes or supplier failures"}]}]]}],["$","h2",null,{"children":"15.2 Service Interruptions"}],["$","p",null,{"children":[["$","strong",null,{"children":"Planned Maintenance:"}]," Scheduled maintenance will be announced in advance when possible."]}],["$","p",null,{"children":[["$","strong",null,{"children":"Unplanned Outages:"}]," Company will work to restore service promptly and communicate status updates."]}],["$","p",null,{"children":[["$","strong",null,{"children":"No Compensation:"}]," No credits, refunds, or compensation for service interruptions unless required by law."]}],["$","h2",null,{"children":"ARTICLE XVI - TERMINATION"}],["$","h2",null,{"children":"16.1 Termination by User"}],["$","p",null,{"children":[["$","strong",null,{"children":"Voluntary Termination:"}]," Users may terminate their account at any time through account settings."]}],["$","p",null,{"children":["$","strong",null,{"children":"Effect of Termination:"}]}],["$","ul",null,{"children":[["$","li",null,{"children":["$","strong",null,{"children":"Immediate loss of access to the Service"}]}],["$","li",null,{"children":[["$","strong",null,{"children":"Deletion of profile and associated data"}]," (subject to legal retention requirements)"]}],["$","li",null,{"children":["$","strong",null,{"children":"Forfeiture of unused credits or subscription benefits"}]}]]}],["$","h2",null,{"children":"16.2 Termination by Company"}],["$","p",null,{"children":["$","strong",null,{"children":"Grounds for Termination:"}]}],["$","ul",null,{"children":[["$","li",null,{"children":["$","strong",null,{"children":"Material breach of these Terms"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Violation of Community Guidelines"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Fraudulent or illegal activity"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Extended period of inactivity"}]}]]}],["$","p",null,{"children":["$","strong",null,{"children":"Termination Process:"}]}],["$","ul",null,{"children":[["$","li",null,{"children":[["$","strong",null,{"children":"Notice provided when possible"}]," (except for serious violations)"]}],["$","li",null,{"children":[["$","strong",null,{"children":"Opportunity to cure violations"}]," when appropriate"]}],["$","li",null,{"children":["$","strong",null,{"children":"Right to appeal termination decisions"}]}]]}],["$","h2",null,{"children":"16.3 Survival of Terms"}],["$","p",null,{"children":["$","strong",null,{"children":"The following provisions survive termination:"}]}],["$","ul",null,{"children":[["$","li",null,{"children":["$","strong",null,{"children":"Payment obligations and dispute resolution"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Intellectual property rights and licenses"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Disclaimers and limitations of liability"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Indemnification obligations"}]}]]}],["$","h2",null,{"children":"ARTICLE XVII - DISPUTE RESOLUTION"}],["$","h2",null,{"children":"17.1 Governing Law and Jurisdiction"}],["$","p",null,{"children":[["$","strong",null,{"children":"Governing Law:"}]," These Terms are governed by the laws of India and the State of Madhya Pradesh."]}],["$","p",null,{"children":[["$","strong",null,{"children":"Jurisdiction:"}]," Exclusive jurisdiction of courts in Indore, Madhya Pradesh, India."]}],["$","p",null,{"children":[["$","strong",null,{"children":"Language:"}]," All proceedings shall be conducted in English."]}],["$","h2",null,{"children":"17.2 Dispute Resolution Process"}],["$","p",null,{"children":[["$","strong",null,{"children":"Step 1 - Direct Negotiation:"}]," Parties must attempt to resolve disputes through direct communication for thirty (30) days."]}],["$","p",null,{"children":[["$","strong",null,{"children":"Step 2 - Mediation:"}]," Unresolved disputes shall be submitted to mediation before an agreed mediator."]}],["$","p",null,{"children":[["$","strong",null,{"children":"Step 3 - Arbitration:"}]," Disputes not resolved through mediation may be submitted to binding arbitration under the Arbitration and Conciliation Act, 2015."]}],["$","h2",null,{"children":"17.3 Class Action Waiver"}],["$","p",null,{"children":["$","strong",null,{"children":"Users waive the right to participate in class action lawsuits or class-wide arbitration proceedings against the Company."}]}],["$","h2",null,{"children":"ARTICLE XVIII - MISCELLANEOUS PROVISIONS"}],["$","h2",null,{"children":"18.1 Entire Agreement"}],["$","p",null,{"children":[["$","strong",null,{"children":"These Terms constitute the entire agreement"}]," between the parties and supersede all prior agreements and understandings."]}],["$","h2",null,{"children":"18.2 Assignment"}],["$","p",null,{"children":[["$","strong",null,{"children":"Company Rights:"}]," Company may assign these Terms in connection with business transfers, mergers, or acquisitions."]}],["$","p",null,{"children":[["$","strong",null,{"children":"User Restrictions:"}]," Users may not assign their rights or obligations under these Terms."]}],["$","h2",null,{"children":"18.3 Waiver"}],["$","p",null,{"children":[["$","strong",null,{"children":"Failure to enforce any provision does not constitute a waiver"}]," of that provision or any other provision."]}],["$","h2",null,{"children":"18.4 Notices"}],["$","p",null,{"children":[["$","strong",null,{"children":"Electronic Notice:"}]," All notices may be provided electronically through the Application or email."]}],["$","p",null,{"children":["$","strong",null,{"children":"Legal Notice Address:"}]}],["$","address",null,{"children":["Omkaar Group",["$","br",null,{}],"Office No. 102, 1st Floor, Rituraj Business Park",["$","br",null,{}],"Bicholi Mardana Road, near UNO Business Park",["$","br",null,{}],"Indore, Deoguradia, Madhya Pradesh 452016, India"]}],["$","h2",null,{"children":"18.5 Compliance with Laws"}],["$","p",null,{"children":[["$","strong",null,{"children":"Export Controls:"}]," The Service may be subject to export control laws and regulations."]}],["$","p",null,{"children":[["$","strong",null,{"children":"Sanctions Compliance:"}]," Users must comply with applicable economic sanctions and trade restrictions."]}],["$","p",null,{"children":[["$","strong",null,{"children":"Local Laws:"}]," Users are responsible for compliance with all applicable local laws and regulations."]}],["$","h2",null,{"children":"ARTICLE XIX - REGULATORY COMPLIANCE"}],["$","h2",null,{"children":"19.1 Indian Regulatory Framework"}],["$","ul",null,{"children":[["$","li",null,{"children":[["$","strong",null,{"children":"Information Technology Act, 2000:"}]," Compliance with IT Act provisions regarding electronic commerce and data protection."]}],["$","li",null,{"children":[["$","strong",null,{"children":"Reserve Bank of India (RBI):"}]," Payment services comply with RBI guidelines for electronic payments and wallets."]}],["$","li",null,{"children":[["$","strong",null,{"children":"Goods and Services Tax (GST):"}]," Applicable taxes charged in accordance with GST regulations."]}]]}],["$","h2",null,{"children":"19.2 International Compliance"}],["$","ul",null,{"children":[["$","li",null,{"children":[["$","strong",null,{"children":"General Data Protection Regulation (GDPR):"}]," Compliance measures for European users."]}],["$","li",null,{"children":[["$","strong",null,{"children":"California Consumer Privacy Act (CCPA):"}]," Privacy rights for California residents."]}],["$","li",null,{"children":[["$","strong",null,{"children":"Other Jurisdictions:"}]," Best efforts to comply with applicable laws in user jurisdictions."]}]]}],["$","h2",null,{"children":"ARTICLE XX - EFFECTIVE DATE AND AMENDMENTS"}],["$","h2",null,{"children":"20.1 Effective Date"}],["$","p",null,{"children":[["$","strong",null,{"children":"These Terms become effective on [INSERT DATE]"}]," and remain in effect until amended or terminated."]}],["$","h2",null,{"children":"20.2 Amendment Process"}],["$","ul",null,{"children":[["$","li",null,{"children":[["$","strong",null,{"children":"Notice Period:"}]," Material changes require thirty (30) days advance notice."]}],["$","li",null,{"children":[["$","strong",null,{"children":"User Consent:"}]," Continued use after notice period constitutes acceptance of amendments."]}],["$","li",null,{"children":[["$","strong",null,{"children":"Version Control:"}]," All versions maintained for reference and legal compliance."]}]]}],["$","h2",null,{"children":"ARTICLE XXI - CHILD PROTECTION AND AGE VERIFICATION"}],["$","h2",null,{"children":"21.1 Zero Tolerance Policy"}],["$","p",null,{"children":[["$","strong",null,{"children":"The Company maintains a strict zero-tolerance policy"}]," regarding minors on the platform and implements comprehensive measures to prevent underage access."]}],["$","h2",null,{"children":"21.2 Enhanced Age Verification"}],["$","p",null,{"children":["$","strong",null,{"children":"Verification Mechanisms:"}]}],["$","ul",null,{"children":[["$","li",null,{"children":["$","strong",null,{"children":"Government-issued photo identification requirement"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Biometric age estimation technology"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Social media account age cross-verification"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Credit card verification (minimum age requirement)"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Manual review for suspicious accounts"}]}]]}],["$","p",null,{"children":["$","strong",null,{"children":"Failure to Verify:"}]}],["$","ul",null,{"children":[["$","li",null,{"children":["$","strong",null,{"children":"Immediate account suspension pending verification"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Requirement to provide additional documentation"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Account termination if verification cannot be completed"}]}]]}],["$","h2",null,{"children":"21.3 Mandatory Reporting"}],["$","p",null,{"children":["$","strong",null,{"children":"Suspected Minor Accounts:"}]}],["$","ul",null,{"children":[["$","li",null,{"children":["$","strong",null,{"children":"Immediate suspension and investigation"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Reporting to appropriate authorities as required by law"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Coordination with law enforcement agencies"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Documentation of all actions taken"}]}]]}],["$","p",null,{"children":["$","strong",null,{"children":"Child Exploitation Material:"}]}],["$","ul",null,{"children":[["$","li",null,{"children":["$","strong",null,{"children":"Immediate removal and preservation of evidence"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Reporting to National Center for Missing & Exploited Children (NCMEC) and local authorities"}]}],["$","li",null,{"children":["$","strong",null,{"children":"User account termination and IP address reporting"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Full cooperation with law enforcement investigations"}]}]]}],["$","h2",null,{"children":"21.4 Parental Rights"}],["$","p",null,{"children":[["$","strong",null,{"children":"Notification Rights:"}]," Parents may request information about potential underage accounts and request immediate termination."]}],["$","p",null,{"children":[["$","strong",null,{"children":"Verification Assistance:"}]," Company will assist parents in verifying their child is not using the platform."]}],["$","h2",null,{"children":"ARTICLE XXII - BIOMETRIC DATA PROTECTION"}],["$","h2",null,{"children":"22.1 Biometric Data Processing"}],["$","p",null,{"children":["$","strong",null,{"children":"Types of Biometric Data:"}]}],["$","ul",null,{"children":[["$","li",null,{"children":["$","strong",null,{"children":"Facial geometry measurements for verification"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Voice pattern analysis for authentication"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Behavioral biometrics for fraud prevention"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Liveness detection parameters"}]}]]}],["$","h2",null,{"children":"22.2 Consent and Processing"}],["$","p",null,{"children":[["$","strong",null,{"children":"Explicit Consent:"}]," Users must provide explicit, informed consent before any biometric data collection."]}],["$","p",null,{"children":["$","strong",null,{"children":"Processing Limitations:"}]}],["$","ul",null,{"children":[["$","li",null,{"children":["$","strong",null,{"children":"Biometric data used solely for identity verification and platform security"}]}],["$","li",null,{"children":["$","strong",null,{"children":"No sharing with third parties except as legally required"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Encryption of all biometric data in transit and at rest"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Regular deletion of biometric templates per retention schedule"}]}]]}],["$","h2",null,{"children":"22.3 User Rights"}],["$","ul",null,{"children":[["$","li",null,{"children":[["$","strong",null,{"children":"Access Rights:"}]," Users may request copies of their biometric data and processing records."]}],["$","li",null,{"children":[["$","strong",null,{"children":"Deletion Rights:"}]," Users may request deletion of biometric data, subject to legal retention requirements."]}],["$","li",null,{"children":[["$","strong",null,{"children":"Portability:"}]," Biometric data summaries provided upon request in machine-readable format."]}]]}],["$","h2",null,{"children":"22.4 Retention and Deletion"}],["$","p",null,{"children":[["$","strong",null,{"children":"Retention Period:"}]," Biometric data retained only as long as necessary for verification purposes, maximum 3 years."]}],["$","p",null,{"children":[["$","strong",null,{"children":"Automatic Deletion:"}]," Biometric templates automatically deleted upon account termination or user request."]}],["$","h2",null,{"children":"ARTICLE XXIII - CONTENT PROTECTION AND RECORDING PREVENTION"}],["$","h2",null,{"children":"23.1 Anti-Recording Technology"}],["$","p",null,{"children":["$","strong",null,{"children":"Technical Safeguards:"}]}],["$","ul",null,{"children":[["$","li",null,{"children":["$","strong",null,{"children":"Screen recording detection and prevention systems"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Screenshot blocking technology for sensitive content"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Watermarking of user photos and videos with unique identifiers"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Real-time monitoring for screen capture attempts"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Device-level protection mechanisms"}]}]]}],["$","h2",null,{"children":"23.2 Digital Rights Management"}],["$","p",null,{"children":["$","strong",null,{"children":"Content Protection:"}]}],["$","ul",null,{"children":[["$","li",null,{"children":["$","strong",null,{"children":"Dynamic watermarking with user identification"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Encrypted content transmission"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Time-limited content access"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Copy protection for premium content"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Forensic watermarking for leak detection"}]}]]}],["$","h2",null,{"children":"23.3 Violation Response"}],["$","p",null,{"children":["$","strong",null,{"children":"Automatic Actions:"}]}],["$","ul",null,{"children":[["$","li",null,{"children":["$","strong",null,{"children":"Immediate content blurring upon detection"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Screen blackout during recording attempts"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Automatic session termination for persistent violations"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Account flagging and investigation"}]}]]}],["$","p",null,{"children":["$","strong",null,{"children":"Legal Remedies:"}]}],["$","ul",null,{"children":[["$","li",null,{"children":["$","strong",null,{"children":"Civil action for unauthorized recording"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Criminal referral where applicable"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Damages calculation for content theft"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Injunctive relief to prevent distribution"}]}]]}],["$","h2",null,{"children":"23.4 User Obligations"}],["$","p",null,{"children":["$","strong",null,{"children":"Users expressly agree not to:"}]}],["$","ul",null,{"children":[["$","li",null,{"children":["$","strong",null,{"children":"Attempt to circumvent recording prevention measures"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Use external devices to record screen content"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Share or distribute any recorded content"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Reverse engineer protection mechanisms"}]}]]}],["$","h2",null,{"children":"ARTICLE XXIV - EMERGENCY RESPONSE PROTOCOLS"}],["$","h2",null,{"children":"24.1 Crisis Intervention"}],["$","p",null,{"children":["$","strong",null,{"children":"Self-Harm Prevention:"}]}],["$","ul",null,{"children":[["$","li",null,{"children":["$","strong",null,{"children":"AI monitoring for self-harm indicators in messages"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Immediate intervention protocols for at-risk users"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Mental health resource provision"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Crisis counselor referral system"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Emergency services coordination when necessary"}]}]]}],["$","h2",null,{"children":"24.2 Law Enforcement Cooperation"}],["$","p",null,{"children":["$","strong",null,{"children":"Investigation Support:"}]}],["$","ul",null,{"children":[["$","li",null,{"children":["$","strong",null,{"children":"Preservation of evidence upon valid legal request"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Real-time monitoring assistance for ongoing investigations"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Expert testimony provision when required"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Technical assistance for data recovery"}]}]]}],["$","p",null,{"children":["$","strong",null,{"children":"Emergency Situations:"}]}],["$","ul",null,{"children":[["$","li",null,{"children":["$","strong",null,{"children":"Immediate response to valid emergency requests"}]}],["$","li",null,{"children":["$","strong",null,{"children":"24/7 law enforcement liaison availability"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Expedited data provision for imminent threats"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Coordination with international law enforcement"}]}]]}],["$","h2",null,{"children":"24.3 Threat Assessment"}],["$","p",null,{"children":["$","strong",null,{"children":"Risk Evaluation:"}]}],["$","ul",null,{"children":[["$","li",null,{"children":["$","strong",null,{"children":"Automated threat detection algorithms"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Manual review of high-risk situations"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Escalation procedures for serious threats"}]}],["$","li",null,{"children":["$","strong",null,{"children":"User safety prioritization protocols"}]}]]}],["$","h2",null,{"children":"24.4 Mandatory Reporting"}],["$","p",null,{"children":["$","strong",null,{"children":"Legal Obligations:"}]}],["$","ul",null,{"children":[["$","li",null,{"children":["$","strong",null,{"children":"Child abuse and exploitation reporting"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Terrorism and violence threat reporting"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Court order compliance"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Regulatory authority cooperation"}]}]]}],["$","h2",null,{"children":"ARTICLE XXV - ARTIFICIAL INTELLIGENCE ETHICS AND TRANSPARENCY"}],["$","h2",null,{"children":"25.1 AI Decision-Making Transparency"}],["$","p",null,{"children":["$","strong",null,{"children":"Algorithmic Disclosure:"}]}],["$","ul",null,{"children":[["$","li",null,{"children":["$","strong",null,{"children":"General description of matching algorithms provided to users"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Explanation of factors considered in recommendations"}]}],["$","li",null,{"children":["$","strong",null,{"children":"User ability to understand AI-driven decisions"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Regular algorithm audit reports publication"}]}]]}],["$","h2",null,{"children":"25.2 Bias Prevention and Fairness"}],["$","p",null,{"children":["$","strong",null,{"children":"Algorithmic Fairness:"}]}],["$","ul",null,{"children":[["$","li",null,{"children":["$","strong",null,{"children":"Regular bias testing across demographic groups"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Diverse training data sets to prevent discrimination"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Ongoing monitoring for unfair outcomes"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Corrective action protocols for identified bias"}]}]]}],["$","p",null,{"children":["$","strong",null,{"children":"User Rights:"}]}],["$","ul",null,{"children":[["$","li",null,{"children":["$","strong",null,{"children":"Right to explanation for significant automated decisions"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Ability to request human review of AI decisions"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Opt-out options for certain AI features"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Appeal process for automated account actions"}]}]]}],["$","h2",null,{"children":"25.3 AI Training and Data Use"}],["$","p",null,{"children":["$","strong",null,{"children":"Training Data Sources:"}]}],["$","ul",null,{"children":[["$","li",null,{"children":["$","strong",null,{"children":"User-generated content (with consent)"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Publicly available datasets"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Synthetic data generation"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Third-party licensed datasets"}]}]]}],["$","p",null,{"children":["$","strong",null,{"children":"Model Updates:"}]}],["$","ul",null,{"children":[["$","li",null,{"children":["$","strong",null,{"children":"Regular retraining to improve accuracy"}]}],["$","li",null,{"children":["$","strong",null,{"children":"User notification of significant algorithm changes"}]}],["$","li",null,{"children":["$","strong",null,{"children":"A/B testing protocols for new features"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Performance monitoring and optimization"}]}]]}],["$","h2",null,{"children":"25.4 AI Safety Measures"}],["$","p",null,{"children":["$","strong",null,{"children":"Content Moderation AI:"}]}],["$","ul",null,{"children":[["$","li",null,{"children":["$","strong",null,{"children":"Multi-layered automated content screening"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Human oversight for borderline cases"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Appeal process for AI moderation decisions"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Regular accuracy assessment and improvement"}]}]]}],["$","h2",null,{"children":"ARTICLE XXVI - DATA BREACH RESPONSE AND NOTIFICATION"}],["$","h2",null,{"children":"26.1 Breach Detection and Assessment"}],["$","p",null,{"children":["$","strong",null,{"children":"Monitoring Systems:"}]}],["$","ul",null,{"children":[["$","li",null,{"children":["$","strong",null,{"children":"24/7 security monitoring and intrusion detection"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Automated breach detection algorithms"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Regular vulnerability assessments and penetration testing"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Real-time threat intelligence integration"}]}]]}],["$","h2",null,{"children":"26.2 Breach Response Procedures"}],["$","p",null,{"children":["$","strong",null,{"children":"Immediate Response (0–24 hours):"}]}],["$","ul",null,{"children":[["$","li",null,{"children":["$","strong",null,{"children":"Containment of the security incident"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Assessment of data types and users affected"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Preservation of evidence for investigation"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Implementation of additional security measures"}]}]]}],["$","p",null,{"children":["$","strong",null,{"children":"Investigation Phase (24–72 hours):"}]}],["$","ul",null,{"children":[["$","li",null,{"children":["$","strong",null,{"children":"Forensic analysis of the breach"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Determination of root cause and attack vector"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Assessment of data actually accessed or exfiltrated"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Coordination with law enforcement if required"}]}]]}],["$","h2",null,{"children":"26.3 User Notification Requirements"}],["$","p",null,{"children":["$","strong",null,{"children":"Notification Timeline:"}]}],["$","ul",null,{"children":[["$","li",null,{"children":["$","strong",null,{"children":"Users notified within 72 hours of breach discovery (where feasible)"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Regulatory authorities notified as required by applicable law"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Public disclosure if required by law or significant public interest"}]}]]}],["$","p",null,{"children":["$","strong",null,{"children":"Notification Content:"}]}],["$","ul",null,{"children":[["$","li",null,{"children":["$","strong",null,{"children":"Nature and scope of the data breach"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Types of personal information involved"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Steps taken to address the breach"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Measures users can take to protect themselves"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Contact information for questions and support"}]}]]}],["$","h2",null,{"children":"26.4 Post-Breach Support"}],["$","p",null,{"children":["$","strong",null,{"children":"User Assistance:"}]}],["$","ul",null,{"children":[["$","li",null,{"children":["$","strong",null,{"children":"Free credit monitoring services (if applicable)"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Identity theft protection resources"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Dedicated support channel for affected users"}]}],["$","li",null,{"children":["$","strong",null,{"children":"Regular updates on investigation progress"}]}]]}],["$","h2",null,{"children":"ARTICLE XXVII - DIGITAL MILLENNIUM COPYRIGHT ACT COMPLIANCE"}],["$","h2",null,{"children":"27.1 Copyright Policy"}],["$","p",null,{"children":[["$","strong",null,{"children":"DMCA Compliance:"}]," The Company complies with the Digital Millennium Copyright Act and similar international copyright laws."]}],["$","p",null,{"children":[["$","strong",null,{"children":"Designated Agent:"}]," [Company will designate DMCA agent with contact information]"]}],["$","h2",null,{"children":"27.2 Takedown Procedures"}],["$","p",null,{"children":["$","strong",null,{"children":"Notice Requirements:"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"Identification of copyrighted work claimed to be infringed"}],["$","li",null,{"children":"Identification of infringing material and its location"}],["$","li",null,{"children":"Contact information of copyright holder or authorized agent"}],["$","li",null,{"children":"Good faith statement of unauthorized use"}],["$","li",null,{"children":"Statement of accuracy under penalty of perjury"}]]}],["$","p",null,{"children":[["$","strong",null,{"children":"Response Timeline:"}]," Valid takedown notices processed within 24–48 hours."]}],["$","h2",null,{"children":"27.3 Counter-Notification Process"}],["$","p",null,{"children":[["$","strong",null,{"children":"User Rights:"}]," Users may submit counter-notifications for improperly removed content."]}],["$","p",null,{"children":[["$","strong",null,{"children":"Restoration:"}]," Content restored 10–14 business days after valid counter-notification unless copyright holder files legal action."]}],["$","h2",null,{"children":"27.4 Repeat Infringer Policy"}],["$","p",null,{"children":[["$","strong",null,{"children":"Three-Strike Policy:"}]," Users with three verified copyright violations face permanent account termination."]}],["$","p",null,{"children":[["$","strong",null,{"children":"Appeal Process:"}]," Users may appeal copyright strikes through formal review process."]}],["$","h2",null,{"children":"ARTICLE XXVIII - INTERNATIONAL LEGAL COMPLIANCE"}],["$","h2",null,{"children":"28.1 Jurisdiction-Specific Requirements"}],["$","p",null,{"children":["$","strong",null,{"children":"European Union:"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"GDPR compliance for EU users"}],["$","li",null,{"children":"Digital Services Act requirements"}],["$","li",null,{"children":"Cookie consent mechanisms"}],["$","li",null,{"children":"Data localization where required"}]]}],["$","p",null,{"children":["$","strong",null,{"children":"United Kingdom:"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"UK GDPR compliance"}],["$","li",null,{"children":"Online Safety Act provisions"}],["$","li",null,{"children":"Age verification requirements"}],["$","li",null,{"children":"Content moderation standards"}]]}],["$","p",null,{"children":["$","strong",null,{"children":"United States:"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"COPPA compliance for any users under 13"}],["$","li",null,{"children":"CAN-SPAM Act compliance"}],["$","li",null,{"children":"State privacy law compliance (CCPA, Virginia, Colorado)"}],["$","li",null,{"children":"Section 230 safe harbor provisions"}]]}],["$","h2",null,{"children":"28.2 Content Restrictions by Jurisdiction"}],["$","ul",null,{"children":[["$","li",null,{"children":"Region-specific content blocking"}],["$","li",null,{"children":"Local law compliance measures"}],["$","li",null,{"children":"Cultural sensitivity adaptations"}],["$","li",null,{"children":"Government request compliance"}]]}],["$","h2",null,{"children":"28.3 Cross-Border Data Transfers"}],["$","ul",null,{"children":[["$","li",null,{"children":"Adequate protection mechanisms"}],["$","li",null,{"children":"Standard contractual clauses"}],["$","li",null,{"children":"Cross-border transfer impact assessments"}],["$","li",null,{"children":"User notification of international processing"}]]}],["$","h2",null,{"children":"ARTICLE XXIX - SUBSCRIPTION BILLING AND AUTO-RENEWAL"}],["$","h2",null,{"children":"29.1 Auto-Renewal Disclosure"}],["$","p",null,{"children":[["$","strong",null,{"children":"Clear Disclosure:"}]," Subscription auto-renewal prominently disclosed before purchase with explicit user consent."]}],["$","p",null,{"children":["$","strong",null,{"children":"Reminder Notifications:"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"7-day advance notice of auto-renewal"}],["$","li",null,{"children":"24-hour final reminder"}],["$","li",null,{"children":"Easy cancellation link in all renewal notices"}],["$","li",null,{"children":"Clear instructions for avoiding charges"}]]}],["$","h2",null,{"children":"29.2 Cancellation Procedures"}],["$","p",null,{"children":[["$","strong",null,{"children":"Cancellation Timeline:"}]," Users may cancel at any time up to 24 hours before renewal date."]}],["$","p",null,{"children":["$","strong",null,{"children":"Cancellation Methods:"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"In-app cancellation through account settings"}],["$","li",null,{"children":"Customer service cancellation request"}],["$","li",null,{"children":"Payment method cancellation (as backup)"}]]}],["$","p",null,{"children":[["$","strong",null,{"children":"Confirmation:"}]," Cancellation confirmation provided within 24 hours via email and in-app notification."]}],["$","h2",null,{"children":"29.3 Free Trial Terms"}],["$","ul",null,{"children":[["$","li",null,{"children":"Clear disclosure of trial-to-paid conversion"}],["$","li",null,{"children":"Explicit consent required for auto-conversion"}],["$","li",null,{"children":"Easy trial cancellation without penalty"}],["$","li",null,{"children":"Full feature access during trial period"}]]}],["$","h2",null,{"children":"29.4 Payment Failure Handling"}],["$","ul",null,{"children":[["$","li",null,{"children":"Immediate notification of payment failure"}],["$","li",null,{"children":"3-day grace period for payment update"}],["$","li",null,{"children":"Service suspension after grace period"}],["$","li",null,{"children":"Account termination after 30 days (with data retention)"}]]}],["$","h2",null,{"children":"ARTICLE XXX - ACCESSIBILITY AND DISABILITY COMPLIANCE"}],["$","h2",null,{"children":"30.1 Accessibility Commitment"}],["$","p",null,{"children":[["$","strong",null,{"children":"WCAG 2.1 AA Compliance:"}]," The Company strives to meet Web Content Accessibility Guidelines Level AA standards."]}],["$","p",null,{"children":["$","strong",null,{"children":"Assistive Technology Support:"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"Screen reader compatibility"}],["$","li",null,{"children":"Voice control functionality"}],["$","li",null,{"children":"High contrast mode options"}],["$","li",null,{"children":"Font size adjustment capabilities"}],["$","li",null,{"children":"Keyboard navigation support"}]]}],["$","h2",null,{"children":"30.2 Reasonable Accommodations"}],["$","ul",null,{"children":[["$","li",null,{"children":"Dedicated accessibility support contact"}],["$","li",null,{"children":"Individual accommodation assessment"}],["$","li",null,{"children":"Custom accessibility solutions where possible"}],["$","li",null,{"children":"Regular accessibility feature updates"}]]}],["$","h2",null,{"children":"30.3 Accessibility Feedback"}],["$","ul",null,{"children":[["$","li",null,{"children":"Dedicated channel for accessibility feedback and improvement suggestions"}],["$","li",null,{"children":"Regular accessibility audits and user testing with disability community"}]]}],["$","h2",null,{"children":"ARTICLE XXXI - PLATFORM INTEROPERABILITY AND THIRD-PARTY INTEGRATIONS"}],["$","h2",null,{"children":"31.1 Social Media Integration"}],["$","ul",null,{"children":[["$","li",null,{"children":"Explicit consent required for each social platform connection"}],["$","li",null,{"children":"Granular control over shared information types"}],["$","li",null,{"children":"Regular permission review and renewal"}],["$","li",null,{"children":"Easy disconnection of linked accounts"}]]}],["$","h2",null,{"children":"31.2 API Usage and Third-Party Services"}],["$","ul",null,{"children":[["$","li",null,{"children":"No data sharing with unauthorized third parties"}],["$","li",null,{"children":"Rate limiting to prevent abuse"}],["$","li",null,{"children":"Security requirements for integrated services"}],["$","li",null,{"children":"Regular security assessments of partners"}]]}],["$","h2",null,{"children":"31.3 Third-Party Liability"}],["$","p",null,{"children":[["$","strong",null,{"children":"Disclaimer:"}]," Company not responsible for third-party service performance, security, or data handling practices."]}],["$","p",null,{"children":[["$","strong",null,{"children":"Due Diligence:"}]," Regular review of third-party partners for security and privacy compliance."]}],["$","h2",null,{"children":"ARTICLE XXXII - BUSINESS CONTINUITY AND SERVICE DISCONTINUATION"}],["$","h2",null,{"children":"32.1 Service Discontinuation Procedures"}],["$","p",null,{"children":[["$","strong",null,{"children":"Advance Notice:"}]," Minimum 90-day notice for service discontinuation."]}],["$","p",null,{"children":["$","strong",null,{"children":"Data Migration Rights:"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"User data export capabilities"}],["$","li",null,{"children":"Reasonable time period for data download"}],["$","li",null,{"children":"Assistance with data migration to alternative services"}],["$","li",null,{"children":"Secure data deletion after migration period"}]]}],["$","h2",null,{"children":"32.2 Asset Transfer"}],["$","p",null,{"children":[["$","strong",null,{"children":"Business Transfer:"}]," In case of merger, acquisition, or asset sale:"]}],["$","ul",null,{"children":[["$","li",null,{"children":"User notification of ownership change"}],["$","li",null,{"children":"Continued privacy protection under new ownership"}],["$","li",null,{"children":"Opt-out rights for users who object to transfer"}],["$","li",null,{"children":"Grandfathered terms protection"}]]}],["$","h2",null,{"children":"ARTICLE XXXIII - REGULATORY COMPLIANCE FRAMEWORK"}],["$","h2",null,{"children":"33.1 Indian Regulatory Compliance"}],["$","ul",null,{"children":[["$","li",null,{"children":[["$","strong",null,{"children":"IT Rules, 2021:"}]," Due diligence, grievance redressal, content removal"]}],["$","li",null,{"children":[["$","strong",null,{"children":"Personal Data Protection Bill:"}]," Impact assessments, localization, DPO"]}],["$","li",null,{"children":[["$","strong",null,{"children":"RBI Guidelines:"}]," KYC, AML, license compliance, transaction monitoring"]}]]}],["$","h2",null,{"children":"33.2 Compliance Monitoring"}],["$","ul",null,{"children":[["$","li",null,{"children":"Quarterly compliance assessments"}],["$","li",null,{"children":"Continuous monitoring of legal updates"}],["$","li",null,{"children":"Prompt implementation of required modifications"}]]}],["$","h2",null,{"children":"ARTICLE XXXV - SEPARATE POLICY DOCUMENTS"}],["$","h2",null,{"children":"35.1 Supplementary Legal Documents"}],["$","p",null,{"children":["$","strong",null,{"children":"The following documents are maintained separately:"}]}],["$","ul",null,{"children":[["$","li",null,{"children":[["$","strong",null,{"children":"Privacy Policy:"}]," Data practices, user rights, international transfers"]}],["$","li",null,{"children":[["$","strong",null,{"children":"Refund and Cancellation Policy:"}]," Refund/cancellation procedures, billing disputes"]}],["$","li",null,{"children":[["$","strong",null,{"children":"DMCA Policy:"}]," Takedown notices, counter-notification process"]}],["$","li",null,{"children":[["$","strong",null,{"children":"GDPR Compliance:"}]," EU rights, lawful basis, data controller details"]}]]}],["$","h2",null,{"children":"35.2 Document Integration and Hierarchy"}],["$","p",null,{"children":["$","strong",null,{"children":"Hierarchy of Legal Documents:"}]}],["$","ol",null,{"children":[["$","li",null,{"children":"Applicable laws and regulations"}],["$","li",null,{"children":"These Terms and Conditions"}],["$","li",null,{"children":"Privacy Policy"}],["$","li",null,{"children":"GDPR Compliance Documentation"}],["$","li",null,{"children":"Refund and Cancellation Policy"}],["$","li",null,{"children":"DMCA Policy"}],["$","li",null,{"children":"Community Guidelines"}],["$","li",null,{"children":"Platform-specific feature policies"}]]}],["$","p",null,{"children":[["$","strong",null,{"children":"Cross-Reference Requirements:"}]," Users are required to read and understand all applicable policy documents before using ChatWet services."]}],["$","h2",null,{"children":"ARTICLE XXXVI - EFFECTIVE DATE AND FINAL PROVISIONS"}],["$","h2",null,{"children":"36.1 Document Hierarchy"}],["$","p",null,{"children":["$","strong",null,{"children":"In case of conflict between documents, the following hierarchy applies:"}]}],["$","ol",null,{"children":[["$","li",null,{"children":"Applicable law and regulations"}],["$","li",null,{"children":"These Terms and Conditions"}],["$","li",null,{"children":"Privacy Policy"}],["$","li",null,{"children":"Community Guidelines"}],["$","li",null,{"children":"Platform-specific policies"}]]}],["$","h2",null,{"children":"36.2 Language and Translation"}],["$","p",null,{"children":[["$","strong",null,{"children":"Authoritative Version:"}]," English version is authoritative; translations provided for convenience only."]}],["$","p",null,{"children":[["$","strong",null,{"children":"Interpretation:"}]," In case of translation conflicts, English version prevails."]}],["$","h2",null,{"children":"36.3 Electronic Signatures"}],["$","p",null,{"children":[["$","strong",null,{"children":"Validity:"}]," Electronic acceptance constitutes valid signature under applicable electronic signature laws."]}],["$","p",null,{"children":[["$","strong",null,{"children":"Records:"}]," Company maintains records of user acceptance for legal compliance."]}],["$","p",null,{"className":"mt-4","children":["$","strong",null,{"children":"BY USING CHATWET, YOU ACKNOWLEDGE THAT YOU HAVE READ, UNDERSTOOD, AND AGREE TO BE BOUND BY THESE COMPREHENSIVE TERMS AND CONDITIONS."}]}],["$","p",null,{"className":"text-danger","children":[["$","strong",null,{"children":"IMPORTANT:"}]," These Terms contain binding arbitration and class action waiver provisions that affect your legal rights. Please read them carefully."]}],["$","div",null,{"className":"mb-2","children":[["$","strong",null,{"children":["OMKAAR GROUP ",["$","br",null,{}],"Date: [INSERT DATE] ",["$","br",null,{}],"Authorized Signatory: [NAME AND TITLE] ",["$","br",null,{}],"Legal Review Date: [INSERT DATE] ",["$","br",null,{}],"Next Review Due: [INSERT DATE + 6 MONTHS] ",["$","br",null,{}]]}],["$","p",null,{"className":"mt-4","children":"This comprehensive legal document has been prepared to address the complex regulatory and operational requirements of a modern social networking and dating platform. It should be reviewed by qualified legal counsel familiar with Indian cyber law, data protection regulations, and international compliance requirements before implementation. Regular updates are recommended to maintain compliance with evolving legal standards."}]]}]]}],[["$","link","0",{"rel":"stylesheet","href":"/_next/static/css/0fcd4f902b4eca58.css","precedence":"next","crossOrigin":"$undefined","nonce":"$undefined"}]],["$","$L7",null,{"children":["$L8","$L9",["$","$La",null,{"promise":"$@b"}]]}]]}],{},null,false]},null,false]},null,false]},null,false]},null,false]},null,false],["$","$1","h",{"children":[null,["$","$1","idR48_36w42K_jWrTigj-v",{"children":[["$","$Lc",null,{"children":"$Ld"}],null]}],["$","$Le",null,{"children":"$Lf"}]]}],false]],"m":"$undefined","G":["$10","$undefined"],"s":false,"S":true} 11:"$Sreact.suspense" 12:I[4911,[],"AsyncMetadata"] 6:{} f:["$","div",null,{"hidden":true,"children":["$","$11",null,{"fallback":null,"children":["$","$L12",null,{"promise":"$@13"}]}]}] 9:null d:[["$","meta","0",{"charSet":"utf-8"}],["$","meta","1",{"name":"viewport","content":"width=device-width, initial-scale=1"}]] 8:null b:{"metadata":[],"error":null,"digest":"$undefined"} 13:{"metadata":"$b:metadata","error":null,"digest":"$undefined"}