Terms & Conditions

Please see the Treefort Terms & Conditions below.

TERMS AND CONDITIONS

These terms and conditions (the “Terms and Conditions“) are a binding legal agreement between you and Treefort Technologies Incorporated (the “Parties“) that governs your access to and use of the website https://treeforttech.com/ and (the “Website“) its System. This agreement is effective the moment you access the Website or System and remains in effect until terminated by either Party in accordance with these Terms and Conditions or any other agreement between you and us, as applicable. By accessing or using the Website or the System, you acknowledge that you have read and understood these Terms and Conditions, and agree to be legally bound by them and our Privacy Policy (collectively, the “Agreement“), in addition to complying with applicable laws and regulations. If you do not agree to these Terms and Conditions, you are not authorized to access or use the Website or the System.

Definitions

    1. In these Terms and Conditions:

a)“Administrator” means a person who has been designated by their Organization to manage all user accounts within the Organization.

b)“Authentication ID” means a security mechanism determined by Provider, and which may include user identification and passwords, by which an Administrator or an Authorized User identifies themselves to the System to gain access.

c) “Authorized User” means a person to whom an Administrator has issued an Authentication ID.

d) “Business Terms Agreement” means an agreement between you and the Provider that sets out additional or alternative terms that govern the relationship between you and your Organization and the Provider.

e) “Confidential Information” means the System, Data, and all ideas, designs, business models, databases, drawings, documents, diagrams, formulas, test data, marketing, financial or personnel data, sales information, client or supplier information, information of an individual used to create the ID Verification Report or any other information already furnished and to be furnished or made available by Provider to you. Confidential Information does not include information or material which is or was, at the time of disclosure or thereafter, demonstrably: (i) already known by you prior to the disclosure thereof, (ii) generally available to and known by the public (other than as a result of a disclosure directly or indirectly by you), (iii) available to you on a non-confidential basis from a source other than the Provider, (iv) independently acquired or developed by you without violating any of your obligations under these Terms and Conditions, or (v) information for which the Provider has authorized the unrestricted disclosure.

f) “Content” means all materials and content made available to users on the Website or System including notices, guidelines, communications, text, RSS feeds, graphics, images, illustrations, audio-visual works, multimedia elements, photographs, videos, music, sound recordings, policies, documents, software, information, data and any other work, including the manner in which such content is presented.

g) “Data” means any data, files, documentation, or other information that you may upload to the System, or which may be uploaded on your behalf. Data may include Personal Information.

h) “Data Breach” means any breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, Data and/or Personal Information that has been transmitted, stored, or otherwise processed.

i) “ID Verification Report” means the form of report produced by the System for each individual who is the subject of the ID verification process. The ID Verification Report will contain, at a minimum, the following information: a) the name of the individual; b) his/her address; and c) a pass or fail mention.

j) “Organization” means the entity you work for or the entity who has otherwise provided you access to the System.

k) “Personal Information” means data about an “identifiable individual”. It is information that on its own or combined with other pieces of data, can identify someone as an individual.

l) “Privacy Laws” mean all applicable privacy and data protection legislation and regulations, national and provincial laws and regulations relating to the processing of Personal Information, as amended, replaced or updated from time to time.

m) “Provider” means Treefort Technologies Incorporated.

n) “Related Parties” means any person or entity acting on behalf of or under authority of Provider to carry out Provider’s obligations under the Agreement, including but not being limited to Provider’s employees, agents, contractors and Sub-Contractors.

o) “Reliable Sources” means certain credit bureaus, financial institutions, telecommunication companies, and other entities the System receives ID verification information from;

p) “Sub-Contractor” means any person or entity acting on behalf of or under Provider’s authority to carry out specific processing activities with Data and/or Personal Information.

q) “System” means the computer server and application computer software, known as “Treefort”, that: (i) determines whether personal information about an individual inputted by you matches information about the individual held by Reliable Sources; and, (ii) obtains and reviews other risk indicators associated with the individual whose identity is being identified.

USE OF SYSTEM

2. These Terms and Conditions govern your access to and use of the System.

3. Subject to these Terms and Conditions, Provider hereby grants you a non-exclusive, non-transferable, revocable right to access and use all or a portion of the System in accordance with the provisions of these Terms and Conditions.

4. If you are an Administrator you will provide each Authorized User with an Authentication ID. You shall control and maintain the security of the Authentication IDs and you shall be responsible for all instructions, commitments and other actions or communications taken under each Authentication ID. You shall promptly report to Provider any errors or irregularities in the System or any unauthorized use and inform Provider immediately if an Authentication ID becomes known to any unauthorized person.

5. You agree:

a) not to sell, lease, transfer, provide or otherwise make available the System or any portion of the System to any third party, whether as a demonstration or otherwise;
b) not to take any action whatsoever to access, store, merge, aggregate, compile, decompile, manipulate, copy, reverse engineer, create derivative products, derive the source code, sublicense, sell, distribute, commercially exploit, frame, mirror, scrape or data-mine the System or any content in any form or by any means, and you will not attempt to access any restricted areas of the System;
c) not to develop a product that will compete with the System for a period of three (3) years after you stop using the System;
d) to be responsible for all actions taken by you, and all communications made by you, while you access the System;
e) to comply with all laws that apply or may apply to your access of the System, including Privacy Laws;
f) to ensure that all devices used by yourself to access and use the System are placed in a secure location, and that such devices are secured when not in use through such means as screen locks or shutting power controls off;
g) you will not share your Authentication ID with anyone including your staff and associates;
h) you will not use the System for personal (non-business), improper or unlawful purposes;
i) that if you cease working for your Organization, or if you otherwise cease your association with the Organization, you will immediately return all documentation and information associated with the System to your Organization, and you agree you will not access the System even if your Authentication ID still allows for access to the System.
j) not to access the System in a manner that could damage, disable, abuse or otherwise interfere with the System, its security, any services, system resources, accounts, servers or networks connected to or accessible through the System, or any other person’s use or enjoyment of the System; and,
k) not to upload to, distribute to, or otherwise disseminate through the System any material or information of any kind that is libelous, defamatory, obscene, pornographic, abusive, false, misleading or otherwise violates any law or infringes or violates any rights of any other person or entity (including any intellectual property or other property rights), or that contains viruses, backdoors or any other harmful or malicious code.

6. a) The System has a search function that allows Authorized Users to search for ID Verification Reports generated by other organizations for which they have been granted access. This search function is in addition to the ability of an Authorized User to search for ID Verification Reports that have been generated by their Organization. The ability to search for ID Verification Reports generated by other organizations is turned off by default, but an Administrator may turn it on so that Authorized Users in the Organization can search for ID Verification Reports generated by other organizations for which they have been granted access by the other organization. If the ability to search for ID Verification Reports generated by other organizations is turned on you agree to:

i. only search for ID Verification Reports that relate directly to transactions you are contemplating, or have entered in to, and for which you have consent to receive it from the individual to whom the ID Verification Report relates; and,

ii. use the ID Verification Reports you obtain as a result of a search only for the purpose of satisfying your KYC requirements, determining whether you want to enter into a transaction or to complete a transaction you have already entered into.

b) The System also has a sharing function that allows your Organization to make ID Verification Reports generated by Authorized Users in your Organization available to specific authorized users in other organizations. This requires providing access to the ID Verification Report to other organizations. The sharing of ID Verification Reports generated by your Organization is turned off by default, but an Administrator can turn it on so that ID Verification Reports generated by your Organization can be accessed by other organizations. You agree that you will not sell, lease, transfer, provide or otherwise make available an ID Verification Report to any third party other than the individual whose identity is being verified, whether as a demonstration or otherwise, other than through the sharing function in the System and only to the other organizations that have a legitimate interest in having access to the report.

7. If you are an Administrator, in addition to all other tasks and obligations imposed on you by these Terms and Conditions you agree to:

a) assign, record and control the issuance and use of all Authentication IDs within your Organization, keeping the same Authentication IDs confidential except to those who are permitted to use them;
b) without delay, disable any Authentication ID and notify Provider immediately if Provider determines an Authentication ID issued by you has been provided to a person who is not an Authorized User or ceases to be an Authorized User. You shall also, in compliance with law, notify the individuals whose information was potentially accessed or acquired that an unauthorized use has occurred;
c) ensure your Organization complies, at all times, with all applicable legal and regulatory requirements and with the policies of the Reliable Sources in respect of the use of the System, including:
https://www.equifax.com/terms/; and
https://www.iproov.com/terms-and-conditions;
d) ensure that all devices used by Authorized Users to order or access the System are accessible only by the Authorized User, and that such devices are secured when not in use through such means as screen locks, shutting power controls off, or other commercially reasonable security procedures;
e) implement secure authentication practices when providing Authentication IDs to Authorized Users, including but not limited to: (i) using individually assigned email addresses and not shared e-mail accounts; (ii) prohibiting the sharing of Authentication IDs; and (iii) use of anti-malware, anti-spam, and similar controls;
f) confirm your Organization has effective administrative, technological, and physical safeguards in place to stop theft, loss and unauthorized access, copying, modification, use, disclosure, or disposal of information that are consistent with industry best practices;
g) respect all applicable Privacy Laws including any requirements of notification or declaration in relation to a Data Breach or incident of confidentiality as required by the applicable legislation;
h) educate Authorized Users with respect to Privacy Laws and policies and take reasonable steps to ensure compliance through training, confidentiality agreements and sanctions, as needed;
i) ensure Authorized Users who are fired, resign or whose association with your Organization is otherwise terminated return to you, or securely dispose of, all Confidential Information and terminate their access to the System;
j) monitor compliance with the obligations of these Terms and Conditions, and immediately notify the Provider if you suspect or know of any unauthorized access or attempt to access the System. Without limiting the generality of the foregoing, you agree that on at least a quarterly basis you will review the use of the System to ensure that such uses were performed for a legitimate business purpose and in compliance with all terms and conditions herein;
k) maintain and enforce data destruction procedures to protect the security and confidentiality of the Confidential Information and all other information obtained through the System as it is being destroyed or deleted when you or your Organization no longer has a need to keep it; and,
l) put in place procedures and protocols that ensure no one in your Organization uploads to, distributes to, or otherwise disseminates through the System any material or information of any kind that is libelous, defamatory, obscene, pornographic, abusive, or otherwise violates any law or infringes or violates any rights of any other person or entity (including any intellectual property or other property rights), or that contain viruses, backdoors or any other harmful or malicious code.

Priority and Changes:

8. If you or your Organization have entered into a Business Terms Agreement with the Provider the terms of that agreement shall have priority in the event of a conflict between the Business Terms Agreement and these Terms and Conditions.

9. Provider reserves the right, at its sole discretion, from time to time, to modify, add, or delete portions of these Terms and Conditions, and you agree to be bound by such changes. Such changes will be effective immediately upon notice to you and the notice may be given by any means including, posting in the System, on our Website or by e-mail. You agree to regularly review the Terms and Conditions and to be aware of such changes. If you do not agree with the updated Terms and Conditions, please stop using our System. Your use of the System following any such change constitutes your agreement to follow and be bound by the changed Terms and Conditions.

Transaction Charges

10. As you request and consume ID Verification Reports from the System you are required to pay to the Provider the request fees. The Provider charges a fee for every ID Verification Report produced by the System and the fees are set out in the pricing guide the Provider will deliver to you.

11. You or your Organization will be invoiced following the end of each calendar month for the total number of ID Verification Reports initiated by you during that month. For clarity, if you initiate an ID Verification in one month, but the ID Verification Report is not delivered to you until the next month, the charges for that ID Verification Report will be included in the invoice for the first month.

12. All invoices will be delivered to you or your Organization via email using the email address you have given to the Provider.

13. Payment terms are NET 15 days from the invoice date.

14. You or your Organization will submit payment based on the invoice amount.

15. If any payment due to Provider is not received by the required payment date, all overdue payments will be subject to a late payment charge of 2% per month.

Termination

16. You may stop using the System for any reason at any time.

17. Provider may terminate your ability to access the System for any reason at any time on 30 days’ written notice to you.

18. Provider may terminate your ability to access the System with immediate effect if you or your Organization:

a) commits a material breach of these Terms and Conditions;
b) suffers or incurs any form of insolvency or enters an arrangement with creditors;
c) fails to pay any amount due to the Provider on the due date and fails to cure the default within thirty (30) days of receiving written notice of the non-payment;
d) has provided incomplete or inaccurate information to Provider during the account set-up process or fails to maintain such information on a timely basis;
e) operates in a territory that introduces a data localization requirement that affects the Personal Information, the Confidential Information or the Data the Provider stores or where Provider must store it or introduces any law that could require Provider to build a ‘back door’ to any data Provider stores or processes;
f) becomes a competitor of Provider or the System, or controls any person or organization which is a competitor of Provider or the System. Provider shall determine if you or your Organization is a competitor in its sole discretion; or
g) use the System in such a way that it causes harm to any individual or to Provider’s reputation or goodwill.

19. Termination of the Agreement shall not affect any rights, remedies, obligations, or liabilities of the parties that have accrued up to the date of termination.

OWNERSHIP

20. Exclusive ownership of, and title to, all of the Provider’s Content, copyrights, trademarks, service marks, patent rights, trade secrets and all other intellectual property and other proprietary rights in the System and all of its functionality and content, including, software, text, design, graphics, images, data, advertisements, audio, video and all trade-marks, service marks and trade names and the selection and arrangements thereof will remain with, and vest in, Provider. Except as expressly provided in these Terms and Conditions, no license to use, copy, distribute, republish, transmit or otherwise exploit any of the System’s functionality or content is given to you or your Organization and all intellectual property and other proprietary rights in and to the System and all of its functionality and content are expressly reserved to Provider, or, as applicable, to a third party from whom Provider has obtained the right to the use of the third party intellectual property and other proprietary rights.

SCOPE OF USE

21. If the individual who is the subject of an ID Verification Report is not the age of majority according to the applicable laws of the jurisdiction where that individual resides then you must refuse the request for an ID Verification Report on that person.

22. IF YOU ACCESS CREDIT REPORTS OR OTHER INFORMATION PROVIDED BY A RELIABLE SOURCE THROUGH THE SYSTEM FOR UNAUTHORIZED PURPOSES YOU MAY BE SUBJECT TO CIVIL AND CRIMINAL LIABILITY UNDER CANADIAN CONSUMER LAWS PUNISHABLE BY FINES AND IMPRISONMENT.

RIGHT TO CONTROL ACCESS, FUNCTIONALITY, AND CONTENT

23. Provider reserves the right, at its sole discretion, from time to time, without notice, to:

a) modify, add, or delete portions of the System, including its functionality or content; and

b) deny, restrict, control, or revoke your access to the System, or to any portion of the System.

24. By using the System you acknowledge and consent to the Provider sharing information about you and your use of the System with the Reliable Sources for the purpose of obtaining approval from the Reliable Sources to share information and documentation developed or provided by the Reliable Sources with you and also to satisfy the audit requirements of the Reliable Sources.

25. Provider reserves the right to require you to use periodically updated complex passwords for Authentication IDs as well as enhanced authentication procedures such as two factor authentication.

ECONOMIC SANCTION LAWS AND NO CONSUMER REPORTS

26. You acknowledge the Provider is subject to economic sanctions laws, including but not limited to those enforced by the U.S. Department of the Treasury’s Office of Foreign Assets Control (“OFAC”), the European Union, and the United Kingdom. You certify that, to your knowledge, you are neither identified on, and you shall not knowingly provide access to the System to any individuals or entities identified on (1) OFAC’s list of Specially Designated Nationals, (2) the UK’s HM Treasury’s Consolidated List of Sanctions Targets, (3) the EU’s Consolidated List of Persons, Groups, and Entities Subject to EU Financial Sanctions, (4) any other applicable sanctions lists, or (5) any person 50 percent or more owned, directly or indirectly, individually or in the aggregate by a person(s) identified in (1) through (4).

27. You agree the System is not provided by “consumer reporting agencies,” as that term is defined in the Fair Credit Reporting Act (15 U.S.C. § 1681, et seq.) (“FCRA”) and outputs of the System, including the ID Verification Reports do not constitute “consumer reports,” as that term is defined in the FCRA. You may not use the System, in whole or in part, as a factor in determining eligibility for credit, insurance other than title insurance, employment or another purpose in connection with which a consumer report may be used under the FCRA.

AUDIT  

28. Provider reserves the right to monitor and audit your usage of the System for the purpose of (among others) ensuring compliance with these Terms and Conditions. Any such audit may be carried out by Provider or a third-party authorized by Provider, at Provider’s expense.

CONFIDENTIALITY

29. You acknowledge the Confidential Information consists of confidential and proprietary information of the Provider. You shall hold all Confidential Information in confidence and shall use the same degree of care to maintain the confidentiality of the Confidential Information you use to maintain the confidentiality of other confidential information you or your Organization controls or has access to, but with at least a reasonable degree of care commensurate with the nature and importance of the Confidential Information.

30. In the event you conclude, on the advice of your counsel, that you are legally compelled to disclose publicly any of the Confidential Information or to disclose any of such Confidential Information to a third party other than as expressly permitted by these Terms and Conditions, you shall provide to the Provider, if you are legally permitted to do so, prompt, prior written notice of such requirement so that the Provider may seek, at its sole expense, a protective order or other appropriate remedy and/or waive compliance with the provisions of these Terms and Conditions and you agree to delay such disclosure of the Confidential Information as long as is reasonably possible (without incurring liability for failure to make such a disclosure) to permit the Provider to seek, at its sole expense, a protective order and to allow for consultation between you and the Provider with respect to any reasonable alternatives to such disclosure and with respect to the content of any such disclosure. You will not oppose any action by the Provider or any of its agents or affiliates to seek a protective order or other remedy. In the event that a protective order or other remedy is not obtained, or that compliance with the provisions hereof are waived, you agree to furnish only that portion of the Confidential Information which you have been advised by counsel is legally required to be disclosed and, to the extent reasonably possible in the circumstances, you agree to use reasonable commercial efforts to ensure that confidential treatment will be accorded to the Confidential Information you have disclosed.
 
31. You authorize Provider to disclose Data and Personal Information to Reliable Sources through the System for the purpose of obtaining an ID Verification Report.
 
32. Where authorized by the relevant individual who is the subject of an ID verification process, you authorize Provider to deliver a copy of the ID Verification Report created by you to other clients of Provider through the report sharing function in the System.
 
33. Notwithstanding any other provision of these Agreement, if Provider receives a lawful request from a Law Society or a similar regulatory body to produce copies of information Provider has received from a Reliable Source, Provider shall deliver the requested information to that Law Society or similar regulatory body within a reasonable time and without notice to you.

REPRESENTATIONS, WARRANTIES, AND DISCLAIMERS

34. EXCEPT AS OTHERWISE EXPRESSLY STATED IN THESE TERMS AND CONDITIONS, PROVIDER EXPRESSLY DISCLAIMS ALL CONDITIONS, WARRANTIES AND REPRESENTATIONS, EXPRESS, IMPLIED OR STATUTORY INCLUDING, BUT NOT LIMITED TO, IMPLIED CONDITIONS OR WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR DURABILITY, WHETHER ARISING BY USAGE OF TRADE, COURSE OF DEALING, COURSE OF PERFORMANCE OR OTHERWISE, OR THAT THE SERVICES, SYSTEM OR DOCUMENTATION WILL MEET YOUR NEEDS OR WILL BE AVAILABLE FOR USE AT ANY PARTICULAR TIME OR WILL BE ERROR FREE. UNDER NO CIRCUMSTANCES WILL PROVIDER BE LIABLE FOR THE RESULTS OF THE USE OR MISUSE OF THE SERVICES, SYSTEM OR DOCUMENTATION, INCLUDING ANY USE CONTRARY TO LAW, BY YOU. Without limiting the generality of the foregoing, you are advised that information obtained from the Reliable Sources may contain errors as source data is sometimes reported or entered inaccurately, processed incorrectly and is not warranted to be free from defects. By accepting these Terms and Conditions you acknowledge that Provider is not the source of the data in the System. 

INDEMNITY AND LIMITATION LIABILITY

35. Except in relation to an intentional breach of these Terms and Conditions by a Party, each Party’s liability under these Terms and Conditions shall be limited to direct damages incurred and neither party shall be liable for any special, indirect, incidental, consequential, special, or economic damages (including, but not limited to loss of profits, loss of use and lost business opportunities), regardless of the legal theory under which such damages are sought, and even if that Party has been advised of the possibility of such damages. Other than for: (i) infringement of the intellectual property and other proprietary rights of a third party; and (ii) any breach of confidentiality or Privacy Laws, the total cumulative liability under these Terms and Conditions for direct damages from all causes of action and under all theories of liability shall not exceed a maximum aggregate amount equal to the amount paid by you or your Organization to Provider in the 12 months preceding the date of the loss.
 
36. You acknowledge that if unauthorized intruders are able to bypass all of Provider’s security safeguards, such unauthorized intruder may change, delete, or otherwise corrupt the contents and data, including the Data and Personal Information. Although Provider cannot guarantee the security of the System against a cyber attack, Provider shall procure and maintain cyber liability insurance which shall be sufficiently broad to cover Provider’s duties and obligations under this Agreement and include coverage for claims relating to any unauthorized access or use of the System, Data and Personal Information.

Provider’s Obligations

37. In consideration of your abiding by the provisions of these Terms and Conditions the Provider shall:

I) comply with all relevant Privacy Laws and:

a) deal with Personal Information only in accordance with your lawful instructions;
b) take reasonable steps to ensure only the Provider’s authorized personnel have access to the Personal Information, and they are under obligations of confidentiality;
c) maintain commercially reasonable and appropriate security measures, including administrative, physical, and technical safeguards, to protect against unauthorized or unlawful access to any Personal Information and against accidental loss or destruction of, or damage to Personal Information and to ensure a level of security appropriate to the risk;
d) ensure that it and any employees, Authorized Users, Related Parties and Reliable Sources are made aware of their obligations regarding the security and protection of Personal Information and, where applicable, the same data protection obligations as set out in these Terms and Conditions shall be imposed upon them by way of a contract or applicable laws;
e) ensure that all agreements with Related Parties and or Reliable Sources are in writing and contain provisions requiring said parties to maintain commercially reasonable security measures to maintain the confidentiality of all Personal Information; and,
f) modify these Terms and Conditions as may become necessary as Privacy Laws become effective or change to ensure these Terms and Conditions are consistent with, and do not violate, the Privacy Laws;

II) maintain and make available to you, a written record of all categories of processing activities carried out by Provider on your behalf. This report shall include, where applicable: (a) categories of processing activities performed; (b) name and contact details of all Sub-Contractors; (c) details of any cross-border data transfers outside of Canada, including documentation of suitable safeguards; (d) a general description of the technical and organizational security measures implemented with respect to the Personal Information; and (e) the name of Provider’s Privacy Officer or privacy representative;

III) notify you without undue delay, but no later than within 72 hours, if Provider receives any complaint, notice or communication which relates directly or indirectly to the processing of Personal Information related to an ID verification initiated by you, or to either party’s compliance with Privacy Laws, and shall provide reasonable cooperation and assistance to you in relation to any such complaint, notice, communication or non-compliance;

IV) deal promptly and properly with all inquiries from you relating to the processing of Personal Information provided by you;

V) make available to you all information necessary to demonstrate compliance with the obligations pursuant to Privacy Laws and allow for and contribute to audits, including inspections, conducted by you;

VI) assist you, when and where possible, with the fulfilment of your obligation to respond to requests by individuals exercising their rights of access, rectification and erasure, restriction of processing, and data portability pursuant to Privacy Laws;

VII) at your direction, delete or return to you all Personal Information provided by you to Provider in its possession after you cease to use the System and to delete existing copies unless Provider is otherwise required by law to maintain the Personal Information;

VIII) not transfer Personal Information outside of Canada without the appropriate legal mechanisms first being implemented, such as any necessary privacy impact assessment of the receiving country, or organization and contractual protections;

IX) implement appropriate technical and organizational measures to ensure the security and protection of Personal Information;

X) in the event of a Data Breach, or suspected Data Breach:

a) inform you without undue delay of the Data Breach or any other breach of security that could potentially affect the confidentiality of Personal Information;
b) promptly provide you with reasonable cooperation and assistance, including providing any necessary documentation concerning the breach, for you to investigate including but not limited filing any reports with government authorities or notifying individuals or any other actions necessary to comply with your breach notification obligations under the Privacy Laws; and
c) take reasonable measures to mitigate against and to prevent similar breaches from occurring in the future.

XI) to the extent possible, provide you the following details regarding a Data Breach when this information is available:

a) the possible cause and consequences for individuals to whom the Personal Information relates of the Data Breach;
b) the categories of Personal Information involved;
c) the risk of serious harm for the individuals to whom the Personal Information relates;
d) identification of the unauthorized recipient(s) of the Personal Information; and
e) the measures taken to mitigate any damage and/or adverse effects;

XII) implement and maintain safeguards and controls to deter, detect, prevent, and correct any unauthorized access or use of the System, Data and Personal Information.

XIII) collect, use, and store Data and Personal Information in accordance with the privacy policy located at https://treefort.tech/website-privacy-statement/. Other than to the extent required by Privacy Laws, Provider will not be responsible for the monitoring, accuracy, completeness, or adequacy of any Data and Personal Information provided by you.

General:

38. These Terms and Conditions shall be governed by, and construed and enforced in accordance with, the laws in force in the Province of Alberta (excluding any conflict of laws rule or principle which might refer such construction to the laws of another jurisdiction). You agree to submit to the exclusive jurisdiction of the courts of the Province of Alberta and you waive any objection relating to improper venue or forum non conveniens to the conduct of any proceeding in any such court.
 
39. Except as otherwise expressly provided herein, all written notices permitted or required to be delivered by the parties pursuant hereto, shall be deemed so delivered forthwith when delivered by hand, one (1) business day after transmission by electronic system, or five (5) business days after posting in the mail by registered or certified mail, postage prepaid and addressed as follows:

To PROVIDER:

c/o 12306 109A Ave NW
Edmonton, AB T5M 2H7
Attention: Jay Krushell
Email address: jkrushell@treeforttech.com 
To YOU:

At the mailing address or email address provided by you to Provider

40. If any provision of these Terms and Conditions is invalid, illegal, or unenforceable in any jurisdiction, such invalidity, illegality, or unenforceability will not affect any other term or provision of these Terms and Conditions or invalidate or render unenforceable such term or provision in any other jurisdiction.
 
41. With the exception of a Business Terms Agreement, these Terms and Conditions, together with any other documents incorporated herein by reference, constitutes all of the terms and conditions governing your access to and use of the System and supersedes all prior and contemporaneous understandings, agreements, and representations and warranties, both written and oral, with respect to such subject matter.
 
Updated as of September 9, 2024