Intellectual Property Policy

CRYPTER – INTELLECTUAL PROPERTY POLICY

1. DEFINITIONS AND INTERPRETATION

1.1.Definitions

For the purposes of this Intellectual Property Policy (“Policy”), unless the context otherwise requires, the following capitalized terms shall have the meanings assigned to them below:

a. “Affiliate” means, with respect to any Party, any entity that directly or indirectly controls, is controlled by, or is under common control with such Party.
b. “Applicable Law” means all laws, statutes, enactments, ordinances, regulations, treaties, directives, protocols, guidelines, circulars, rules, codes, judgments, decrees, orders, or other requirements of any governmental authority or regulatory body (including self-regulatory organizations) having jurisdiction over the Parties, as may be applicable from time to time, including but not limited to the European Union Directives, United States Digital Millennium Copyright Act (DMCA), the WIPO Copyright Treaty, and the TRIPS Agreement.
c. “Content” means any data, material, information, graphics, text, software, scripts, source code, executable code, user interfaces, trademarks, service marks, logos, trade names, audiovisual content, designs, databases, or any other works of authorship or intellectual property displayed, distributed, hosted, stored, generated, or otherwise made available via the Crypter Platform.
d. “Crypter” refers to the digital asset trading platform operated by Crypter, including its mobile applications, websites, APIs, smart contracts, software infrastructure, and all related digital tools, interfaces, systems, and services.
e. “Crypter Marks” shall mean the registered and unregistered trademarks, trade dress, service marks, logos, domain names, and brand identifiers of Crypter or its Affiliates, whether currently in use or filed for registration globally.
f. “Intellectual Property Rights” or “IP Rights” means all rights, title, and interest, whether registered or unregistered, arising from or in relation to patents, copyrights (including moral rights and rights in software), trademarks, service marks, trade names, trade dress, industrial designs, semiconductor topographies, trade secrets, database rights, know-how, domain names, utility models, rights of publicity, and other intellectual property rights and similar rights of whatever nature existing now or in the future, under the laws of any jurisdiction.

g. “Platform” means the entire Crypter ecosystem including all software, hardware, user interfaces, trading engines, blockchain integrations, databases, source code, proprietary algorithms, APIs, and any other component developed, owned, or licensed by Crypter or its Affiliates.
h. “User Content” means all data, information, communications, uploads, materials, suggestions, posts, feedback, ideas, or other content submitted, posted, uploaded, or otherwise provided by a User on or through the Crypter Platform, including those transmitted via contact forms, forums, chatbots, social media integrations, or any other functionality.
i. “User” or “You” means any person or entity, whether registered or unregistered, accessing or using the Crypter Platform in any manner whatsoever, including but not limited to clients, traders, developers, contributors, employees, and third-party service providers.

9.2.Interpretation

a. Headings and titles used in this Policy are for convenience only and shall not affect the construction or interpretation of any provision herein.
b. Unless the context otherwise requires, words importing the singular shall include the plural, and vice versa; words importing one gender shall include all genders; and references to persons shall include natural persons, corporate bodies, unincorporated associations, and partnerships.
c. References to any statute or statutory provision shall include any amendments, re-enactments, or extensions thereof, and any subordinate legislation made thereunder.
d. The terms “including,” “inter alia,” or “such as” shall be deemed to be followed by the phrase “without limitation.”
e. In the event of any inconsistency between this Policy and any other publicly displayed document on the Crypter Platform, including Terms of Use or Privacy Policy, the provisions of this Policy shall govern with respect to IP-related matters, unless otherwise expressly stated.
f. Any ambiguity in this Policy shall not be construed against Crypter solely by virtue of it having drafted the same.

2. OWNERSHIP OF INTELLECTUAL PROPERTY

2.1.Proprietary Ownership of the Crypter Platform

All right, title, and interest in and to the Crypter Platform, including all software, source code, object code, smart contracts, trading engine architecture, user interfaces, APIs, website content, system documentation, graphical layouts, and other elements thereof (whether visible or underlying), are and shall remain the sole and exclusive property of Crypter, or its licensors, as the case may be. No rights are granted to the User except as expressly set forth herein.

2.2.Copyright and Related Rights

Crypter asserts full copyright and authorship rights over all original works of authorship developed or commissioned by it, including platform code, backend systems, frontend UX/UI elements, whitepapers, instructional materials, marketing collateral, and blockchain-related artifacts. These are protected under the Copyright Act of Turkey, the Berne Convention, and other international copyright treaties. Unauthorized reproduction, adaptation, translation, or public display of such works is strictly prohibited.

2.3.Trademarks and Trade Dress

All trademarks, service marks, logos, trade names, slogans, and trade dress appearing on the Crypter Platform, including but not limited to “CRYPTER,” its stylized form, and any associated brand identifiers (“Crypter Marks”), are the exclusive property of Crypter or its Affiliates. These marks are protected under the EU Trademark Regulation (EU) 2017/1001, the Madrid Protocol, and relevant national laws in applicable jurisdictions.

Users shall not use, imitate, or reproduce any Crypter Marks in whole or in part without prior written consent. Any goodwill derived from the unauthorized use of Crypter Marks shall automatically vest in Crypter.

2.4.Patent and Design Rights

Crypter may own or have licensed rights in one or more patented or patent-pending innovations, including but not limited to cryptographic authentication systems, multi-sig wallet designs, anti-fraud algorithms, and high-frequency trading frameworks. Where applicable, such rights shall be enforced under the European Patent Convention, the Patent Cooperation Treaty, and national patent laws globally. Design elements of the user interface may also be protected under community design rights or national design regimes.

2.5.Database Rights

Crypter’s proprietary databases, including trading records, historical market data, order book structures, and AI-trained data pools, are protected under the EU Database Directive (Directive 96/9/EC) and equivalent provisions in other jurisdictions. Users shall not engage in systematic scraping, data mining, or indexing of such databases without prior written authorization. All rights in data curation, selection, verification, and arrangement are expressly reserved.

2.6.No Transfer of Intellectual Property Rights

Nothing in this Policy or the Crypter Terms of Use shall be construed as transferring any ownership rights, title, or interest in Crypter’s Intellectual Property to Users, whether by implication, estoppel, or otherwise. Any rights not expressly granted herein are fully reserved. Users acquire a limited, revocable, non-exclusive, non-sublicensable, and non-transferable license solely to access and use the Platform in accordance with the Terms of Use.

2.7.Third-Party and Licensed Content

Certain elements of the Crypter Platform may incorporate or interface with third-party content, libraries, or software licensed under open-source or commercial terms. Crypter acknowledges the intellectual property rights of such third parties, and Users shall be bound by all applicable license terms, disclaimers, and attribution obligations, as set forth in Section 7 of this Policy.

2.8.Moral Rights

To the extent permitted under Applicable Law, Users and contributors waive all moral rights (including the right of attribution and integrity) in any content submitted to or created for Crypter, unless otherwise contractually stipulated.

2.9.Reservation of Rights

Crypter expressly reserves all rights, including but not limited to enforcement rights, injunctive remedies, statutory damages, and criminal prosecution, in relation to any unauthorized access, use, misappropriation, or infringement of its intellectual property. All rights not explicitly granted herein shall remain the property of Crypter or its respective rights holders.

3. LICENSE TO USERS

3.1.Grant of Limited License

Subject to the User’s ongoing compliance with the Crypter Terms of Use, this Intellectual Property Policy, and all other applicable policies, Crypter hereby grants the User a limited, non-exclusive, non-transferable, non-sublicensable, revocable license to:

a. Access and use the Crypter Platform and its associated content, solely for personal, lawful, and non-commercial use;
b. View and interact with publicly available content on the Crypter Platform;
c. Download or print a single copy of materials clearly marked as downloadable for informational or personal use, provided such copies retain all proprietary notices and disclaimers.

3.2.Scope and Limitations of License

This license is strictly confined to usage consistent with the intended functionality of the Platform. Without limiting the foregoing, the following acts are expressly prohibited:

a. Modifying, reverse engineering, decompiling, disassembling, translating, or creating derivative works of the Platform or any portion thereof;
b. Framing, mirroring, or reproducing the look and feel, layout, or code of the Platform;
c. Extracting, mining, aggregating, or scraping data (including order book data, price feeds, or trading history) from the Platform;
d. Commercializing, selling, reselling, licensing, sublicensing, renting, or otherwise exploiting the Platform, its components, or any Crypter Marks without prior written authorization;
e. Using Crypter content to train AI models, generate derivative content via automated tools, or deploy in machine learning systems;
f. Circumventing or attempting to circumvent any digital rights management (DRM), access control, rate limits, or other technical protection measures implemented by Crypter.

6.3.Restrictions on Use of Crypter Marks

Nothing in this Policy shall be construed as granting any license or right to use the Crypter Marks, except with the express prior written permission of Crypter. Use of Crypter Marks:

a. Shall not suggest any affiliation, endorsement, or sponsorship unless contractually agreed;
b. Must comply with Crypter’s Brand Guidelines and Trademark Usage Policy, if made available;
c. Is revocable at any time by Crypter, in its sole discretion.

3.4.Open Source and Third-Party Licenses

Where specific components of the Crypter Platform are licensed under open-source licenses, Users’ rights shall be subject to the terms of such licenses. Any use of those components must strictly conform to their respective license conditions, which may include obligations of attribution, disclosure, and license reciprocity. Crypter disclaims all warranties associated with such third-party or open-source code, as further detailed in Section 7.

3.5.Proprietary Notices

Users shall not remove, alter, obscure, or deface any proprietary notices, watermarks, copyright statements, or disclaimers appearing on or within the Platform. Any copies of materials obtained from the Platform must retain all such proprietary notices unaltered and intact.

3.6.Feedback and Suggestions

Users may from time to time submit feedback, comments, suggestions, or other communications relating to the Crypter Platform (“Feedback”). Users agree that Crypter shall have a perpetual, irrevocable, royalty-free, sublicensable, and worldwide right and license to use, reproduce, adapt, publish, translate, distribute, and incorporate such Feedback into its services or offerings without any obligation of attribution, confidentiality, or compensation.

3.7.Reservation of Rights

Except as expressly provided herein, no rights are granted, whether by implication, estoppel, or otherwise. All rights not expressly granted under this Section 3 remain reserved by Crypter and its licensors. Unauthorized use of the Platform or any part thereof shall constitute a material breach of this Policy and may result in account suspension, legal liability, and prosecution under applicable IP laws.

4. USER-GENERATED CONTENT

4.1.License Grant by Users

By submitting, posting, uploading, transmitting, or otherwise making available any content, information, materials, communications, suggestions, data, code, or media (“User Content”) on or through the Crypter Platform, the User hereby grants Crypter and its Affiliates a worldwide, perpetual, irrevocable, royalty-free, transferable, sublicensable (through multiple tiers) license to:

Use, host, store, reproduce, distribute, publicly display, publicly perform, modify, adapt, translate, and create derivative works from such User Content in any format and through any media channels, whether currently known or hereafter developed, for the purposes of operating, improving, promoting, or commercializing the Platform or any related services.

4.2.Warranties and Representations by Users

By providing User Content, the User represents and warrants that:

a. They are the sole legal and beneficial owner of such content, or possess full rights, licenses, consents, and permissions necessary to grant the license set forth in Section 4.1;
b. The User Content does not and will not infringe, misappropriate, or violate any third-party intellectual property rights, moral rights, rights of privacy or publicity, contractual rights, or other proprietary rights;
c. The submission of such content complies with Applicable Law, including but not limited to content regulation, financial promotions rules, and advertising guidelines where relevant.

3.3.Platform’s Rights Regarding User Content

Crypter retains the right, but not the obligation, to:

a. Review, monitor, screen, edit, filter, flag, or remove any User Content, at any time and for any reason, including without limitation for breach of this Policy, the Terms of Use, or Applicable Law;
b. Suspend, restrict, or terminate access to the Platform for Users who repeatedly or egregiously post infringing or unlawful content;
c. Retain archival or backup copies of removed or modified content as required for compliance, legal, or audit purposes.

3.4.User Content – No Endorsement or Confidentiality

Crypter does not endorse, sponsor, or guarantee the accuracy, integrity, legality, or reliability of any User Content, nor does it assume responsibility for any loss or damage arising from reliance thereon. Furthermore:

a. User Content shall not be deemed confidential, unless explicitly governed by a separate written agreement executed by Crypter;
b. Users should refrain from submitting any proprietary ideas, trade secrets, or sensitive information unless otherwise contractually protected.

2.5.Takedown Requests and Infringement Complaints

Crypter has adopted and implemented a notice-and-takedown mechanism consistent with the DMCA and other global best practices. Any third party who believes that their intellectual property rights have been infringed by User Content may submit a complaint in accordance with Section 5 of this Policy. Upon receipt of a valid takedown request, Crypter reserves the right to:

a. Remove or disable access to the allegedly infringing material;
b. Notify the User who submitted such content, and provide an opportunity for counter-notification (where applicable);
c. Terminate repeat infringers in appropriate circumstances and in Crypter’s sole discretion.

3.6.Indemnification

The User agrees to fully indemnify, defend, and hold harmless Crypter, its officers, directors, shareholders, employees, and agents from and against any and all claims, liabilities, damages, losses, costs, and expenses (including reasonable attorneys’ fees) arising from:

a. Any breach of the representations and warranties in Section 4.2;
b. Any claim that the User Content violates the rights of a third party;
c. Any misuse, misrepresentation, or unlawful dissemination of content on or through the Platform.

3.7.No Obligation to Store or Preserve

Crypter shall not be under any obligation to store, back up, or retain any User Content. It is the sole responsibility of the User to maintain independent copies of all content uploaded to or submitted through the Platform.

3.8.Moral Rights Waiver

To the maximum extent permitted under Applicable Law, the User hereby waives all moral rights in and to the User Content, including the right of attribution and the right to object to derogatory treatment, unless otherwise prohibited by law or expressly agreed in writing.

5. INFRINGEMENT REPORTING AND TAKEDOWN PROCEDURE

5.1.Policy Overview

Crypter respects the intellectual property rights of others and expects its Users to do the same. It is Crypter’s policy to:

a. Respond promptly to clear and legally substantiated notices of alleged intellectual property infringement;
b. Remove or disable access to infringing material, where appropriate;
c. Terminate access to the Platform by repeat infringers in accordance with Applicable Law.

This section describes the procedures to be followed for submitting complaints, processing notices, and asserting counterclaims relating to infringing material on or accessible through the Crypter Platform.

3.2.DMCA Agent and Contact Information

In accordance with the United States Digital Millennium Copyright Act (17 U.S.C. § 512) and international best practices, Crypter has designated the following agent to receive notifications of alleged copyright infringement:

Designated Copyright Agent
Crypter
Email: legal@crypter.com
Subject Line: “Notice – Crypter Platform”
Phone: +91-9910776588

3.3.Notice of Claimed Infringement (Copyright or Trademark)

If you believe that any content available on or through the Platform infringes your copyright, trademark, or other IP rights, you may submit a written notice (“Infringement Notice”) containing the following information:

a. A physical or electronic signature of the rights holder or a person authorized to act on their behalf;
b. A detailed description of the copyrighted work, trademark, or other intellectual property claimed to have been infringed, including registration numbers where applicable;
c. A description of the material claimed to be infringing and information reasonably sufficient to enable Crypter to locate it on the Platform (e.g., URLs, screenshots, timestamps);
d. Contact information of the complaining party (name, mailing address, telephone number, and email address);
e. A statement that the complaining party has a good faith belief that use of the material in the manner complained of is not authorized by the rights holder, its agent, or the law;
f. A statement, under penalty of perjury, that the information in the notification is accurate and that the complaining party is authorized to act on behalf of the rights holder.

Notices failing to include the above information may be deemed non-compliant and may not receive a response.

6.4.Crypter’s Response to Infringement Notices

Upon receipt of a valid Infringement Notice:

a. Crypter will acknowledge receipt within a reasonable period (typically within 5 business days);
b. Where Crypter determines the complaint to be valid, it will act expeditiously to remove or disable access to the infringing content;
c. The User responsible for uploading the content may be notified of the complaint and the action taken;
d. Repeat infringers may be subject to account suspension or permanent termination at Crypter’s sole discretion, in accordance with Section 5.7.

Crypter may, in appropriate circumstances, provide anonymized summaries of notices received to relevant regulatory authorities or include such data in compliance reporting.

4.5.Counter Notification Procedure

If a User believes that content was removed or disabled as a result of mistake or misidentification, the User may submit a counter-notification including:

a. The User’s physical or electronic signature;
b. Identification of the content that has been removed or to which access has been disabled, and the location at which it appeared before removal;
c. A statement under penalty of perjury that the User has a good faith belief that the material was removed or disabled as a result of mistake or misidentification;
d. The User’s name, address, telephone number, and email address;
e. A statement that the User consents to the jurisdiction of the courts in Turkey, and, if outside Turkey, that they will accept service of process from the complainant or their agent.
f. Upon receipt of a valid counter-notification, Crypter may restore the content within 10–14 business days, unless the original complainant provides notice that legal action has been initiated to restrain the User.

6.6.Non-Copyright IP Infringement (Trademarks, Patents, Designs, etc.)

For non-copyright claims (e.g., trademark misappropriation, design right violations, patent claims), Crypter applies equivalent notice and takedown principles. Claimants must provide documentation substantiating legal title to the IP in question, including jurisdiction of registration and evidence of infringement. Crypter may seek external legal advice or request additional documentation to verify such claims.

6.7.Repeat Infringer Policy

Crypter reserves the right to:

a. Identify and log accounts or IP addresses associated with multiple valid infringement complaints;
b. Suspend, limit, or terminate access to the Platform by Users found to be repeat infringers;
c. Escalate such matters to competent authorities or courts upon request by the IP holder or regulator.

3.8.Preservation of Rights and Non-Adjudication Clause

Crypter’s actions under this Section shall not constitute:

a. A waiver of any legal defenses, rights, or remedies available under Applicable Law;
b. A determination of the merits of the claim or the legality of the content;
c. Legal advice to any party.

Crypter is not a judicial or arbitral authority and does not adjudicate IP ownership disputes. Parties seeking resolution of underlying ownership rights are encouraged to pursue formal dispute resolution mechanisms.

6. TRADEMARK POLICY

6.1.Ownership of Crypter Marks

All trademarks, service marks, trade names, logos, symbols, brand identifiers, slogans, domain names, and trade dress associated with Crypter, whether registered or unregistered (collectively, “Crypter Marks”), are the exclusive property of Crypter, its Affiliates, or licensors, as the case may be. This includes, without limitation, the word mark “Crypter,” its stylized variations, logos, branded icons, and any visual elements embodying the trade identity of the Platform.

All rights in and to the Crypter Marks are expressly reserved. Any unauthorized use, reproduction, imitation, dilution, or misrepresentation thereof constitutes trademark infringement and may lead to civil and/or criminal liability under Applicable Law.

6.2.Prohibited Uses

Unless expressly authorized in writing by Crypter, the following uses of Crypter Marks are strictly prohibited:

a. Using the Marks in a way that may cause confusion or mislead others as to affiliation, sponsorship, or endorsement by Crypter;
b. Incorporating the Marks into domain names, usernames, social media handles, or meta tags;
c. Using the Marks in advertising, marketing materials, press releases, or promotional campaigns without prior written approval;
d. Modifying, distorting, animating, or superimposing the Marks with other symbols, words, or graphics;
e. Using the Marks in association with unlawful, defamatory, obscene, or harmful content;
f. Using Marks in comparative advertising or statements that disparage Crypter or its services.

Any use that tarnishes, blurs, or misappropriates the distinctiveness of Crypter Marks will be deemed a material breach of this Policy and will attract appropriate legal action.

6.3.Permissible Uses

Certain limited uses of Crypter Marks may be permitted under the principles of nominative fair use, provided the following conditions are strictly met:

a. The use is purely referential or descriptive, and is necessary to identify the Crypter service;
b. The use does not suggest sponsorship or endorsement by Crypter;
c. The use does not involve replication of any proprietary Crypter logos, icons, or design elements;
d. The use complies with this Policy and any accompanying Brand Usage Guidelines issued by Crypter.

Such use must cease immediately upon notice from Crypter, and no rights or licenses shall be deemed to have vested in the user.

4.4.Third-Party Licensing and Co-Branding

Entities wishing to use Crypter Marks for partnership, integration, media, or co-branding purposes must obtain a written trademark license agreement from Crypter, which shall:

a. Specify the scope, territory, and term of use;
b. Include quality control provisions to preserve the distinctiveness and goodwill associated with the Marks;
c. Require indemnification, non-transferability, and compliance with Applicable Law.

Absent such express agreement, no third party is permitted to use the Marks in any capacity.

3.5.Trademark Registration and Enforcement

Crypter actively maintains and enforces its trademark rights across jurisdictions by:

a. Filing and maintaining registrations under the European Union Intellectual Property Office (EUIPO), United States Patent and Trademark Office (USPTO), and under the Madrid System for the International Registration of Marks;
b. Monitoring marketplaces, websites, and app stores for unauthorized usage;
c. Issuing cease-and-desist notices, initiating domain name recovery actions (UDRP/URS), and pursuing litigation where warranted.

Crypter shall pursue full remedies available under law against counterfeiters, impersonators, or any party misusing its Marks to engage in phishing, fraud, or identity theft.

3.6.Reporting Trademark Violations

Parties who become aware of misuse or infringement of Crypter Marks may report such instances by contacting us at legal@crypter.com.

3.7.No Waiver of Rights

Failure by Crypter to enforce any provision of this Section or to pursue action against a particular unauthorized use shall not be deemed a waiver of any of its rights under trademark law or this Policy.

7. OPEN-SOURCE COMPONENTS AND THIRD-PARTY LICENSES

7.1.Use of Open-Source Software

The Crypter Platform incorporates certain software libraries, modules, and components that are licensed under open-source software (OSS) licenses. These components may be directly embedded into Crypter’s backend systems or indirectly used via integrations with third-party services or infrastructure tools (e.g., blockchain nodes, wallet SDKs, analytics platforms).

7.2.License Compliance and Attribution Obligations

Crypter acknowledges and complies with the terms of applicable OSS licenses, including:

a. Maintaining appropriate copyright and license notices;
b. Disclosing modifications, if any, made to open-source code where required;
c. Providing access to source code for covered components in accordance with license terms (e.g., GPL v3 requirements).

Crypter Users agree and acknowledge that access to, and use of, OSS components through the Platform may be governed by additional license terms as set forth by the original authors or maintainers of such codebases. By using the Crypter Platform, Users accept the applicability of such OSS licenses to relevant parts of their interaction with the system.

3.3.Third-Party Software and APIs

Crypter may utilize or offer functionality derived from third-party proprietary software, APIs, or SDKs, including:

a. Crypto custody tools;
b. Market data aggregators;
c. Blockchain analytics platforms;
d. KYC/AML service providers;
e. Payment gateway integrations;
f. Fiat on/off-ramp partners;
g. Infrastructure-as-a-Service (IaaS) and cloud-based hosting environments.

These third-party offerings are subject to their own license agreements, terms of service, and privacy policies, and Crypter disclaims any control over or liability for the same. Users are solely responsible for reviewing and agreeing to such third-party terms where applicable.

7.4.User Restrictions with Respect to Open-Source and Third-Party Code

Except as otherwise permitted by the governing OSS license:

a. Users shall not reverse engineer, modify, sublicense, or distribute any third-party code made available through Crypter without adherence to its applicable license;
b. Users may not use open-source components of the Platform for the purpose of building competing platforms, replicating proprietary features, or circumventing Crypter’s security architecture;
c. Any feedback or contributions made by Users to OSS modules embedded within Crypter shall be governed by standard OSS contribution practices (e.g., Contributor License Agreements or “CLA”).

Crypter does not assume any liability for license violations committed by Users who fail to comply with applicable OSS or third-party software terms.

3.5.Disclaimer of Warranties for Open-Source and Third-Party Components

To the fullest extent permitted by law, all open-source software and third-party components integrated into the Crypter Platform are provided on an “as-is” and “as-available” basis, without warranties of any kind, either express or implied, including without limitation:

a. Warranties of merchantability;
b. Fitness for a particular purpose;
c. Non-infringement;
d. Compatibility or error-free operation.

Crypter disclaims all liability arising from:

a. Security vulnerabilities, bugs, or exploits in OSS modules not authored by Crypter;
b. Downtime, delays, or service disruptions caused by third-party software providers;
c. Revisions or deprecations of APIs by third parties that may affect the functionality of the Platform.

3.6.Reservation of Rights and License Evolution

Crypter reserves the right to:

a. Modify, replace, or discontinue the use of any open-source or third-party component at any time, with or without notice;
b. Transition to commercial licenses for previously open-source modules where applicable;
c. Restrict or prohibit end-user access to certain components based on evolving security, compliance, or strategic considerations.

3.7.Transparency and Requests for Attribution Data

Crypter will maintain, upon request, a Public Attribution Register listing:

a. The names of open-source projects utilized;
b. The applicable license type;
c. The relevant version or commit ID (where required under license terms);
d. Any modifications made by Crypter.

Such requests may be submitted to info@crypter.com.

8. CONFIDENTIAL INFORMATION AND TRADE SECRETS

8.1.Definition of Confidential Information

For the purposes of this Policy, “Confidential Information” shall mean all non-public, proprietary, technical, financial, operational, strategic, commercial, or other sensitive information, in any form (oral, written, electronic, or otherwise), including without limitation:

a. Source code, object code, smart contract logic, and proprietary software architecture;
b. Blockchain validation logic, crypto wallet key generation protocols, and cybersecurity mechanisms;
c. Platform architecture diagrams, system design documents, and data schemas;
d. Internal policies, compliance frameworks, and risk assessment methodologies;
e. Business plans, marketing strategies, pricing models, customer lists, and vendor data;
f. Trade secrets and any other information marked as “confidential” or that by its nature or context ought reasonably to be understood as confidential.

Confidential Information expressly includes Crypter’s Trade Secrets (as defined in Section 8.2), regardless of whether such materials are marked “confidential” or disclosed verbally.

6.2.Trade Secrets

Crypter’s “Trade Secrets” shall include any formula, process, algorithm, cryptographic technique, method, pattern, program, device, or compilation of information:

a. That derives actual or potential independent economic value from not being generally known to the public or to other persons who can obtain economic value from its disclosure or use; and
b. For which Crypter undertakes reasonable efforts to maintain secrecy, including access controls, encryption, non-disclosure agreements (NDAs), and internal policies.

Trade Secrets shall remain protected indefinitely, unless and until they enter the public domain through lawful means not attributable to any breach of duty by the receiving party.

2.3.Obligations of Confidentiality

All Users, contractors, vendors, employees, and partners (“Recipients”) who are granted access to Crypter’s Confidential Information or Trade Secrets shall:

a. Treat such information as strictly confidential and maintain its secrecy using at least the same degree of care as they use for their own confidential information (and in no event less than a reasonable standard of care);
b. Not disclose, disseminate, publish, or permit unauthorized access to such information to any third party without Crypter’s prior written consent;
c. Use such information solely for the purpose for which it was disclosed and not for any unauthorized or competitive purpose;
d. Immediately report any known or suspected unauthorized access, loss, or misuse to Crypter’s legal department.

These confidentiality obligations shall survive the termination of any relationship or engagement with Crypter.

4.4.Permitted Disclosures

Recipients may disclose Confidential Information:

a. To their officers, directors, employees, or advisors who have a strict need to know and who are bound by equivalent confidentiality obligations;
b. Pursuant to a valid court order, subpoena, or regulatory demand, provided that Crypter is given prompt written notice (unless legally prohibited) and an opportunity to seek protective relief;
c. As otherwise expressly authorized in writing by Crypter.

Disclosures made under compulsion of law shall be limited to the minimum scope required and, where possible, marked as confidential.

3.5.Exclusions

Confidential Information shall not include information that the Recipient can demonstrate by written evidence:

a. Was lawfully known to the Recipient prior to disclosure by Crypter and not subject to any confidentiality obligation;
b. Becomes generally available to the public through no fault or breach of this Policy by the Recipient;
c. Was lawfully disclosed to the Recipient by a third party not under an obligation of confidentiality;
d. Was independently developed by the Recipient without access to or use of Crypter’s Confidential Information.

4.6.Security Measures and Access Control

Crypter employs industry-standard technical and organizational measures to safeguard its Confidential Information and Trade Secrets, including:

a. Role-based access control (RBAC);
b. Multi-factor authentication (MFA);
c. Data encryption in transit and at rest;
d. Monitoring, logging, and anomaly detection;
e. Segregation of development and production environments;
f. Mandatory employee training and NDAs.

Users are prohibited from circumventing, disabling, or interfering with any of Crypter’s information security controls or attempting unauthorized access to secured systems or data.

6.7.Injunctive and Equitable Relief

Crypter shall be entitled to seek temporary, preliminary, and permanent injunctive relief, including specific performance and other equitable remedies, in the event of an actual or threatened breach of this Section. The Recipient acknowledges that monetary damages may be insufficient to remedy such breaches and expressly waives any requirement for the posting of bond or proof of damages in such proceedings.

6.8.No License or Ownership Transfer

Nothing in this Section or elsewhere in this Policy shall be construed as granting, by implication, estoppel, or otherwise:

a. Any ownership right or license in any Confidential Information or Trade Secrets;
b. Any right to reverse engineer, decompile, disassemble, or derive the composition or underlying logic of any proprietary element of the Crypter Platform.

All such rights remain strictly reserved to Crypter.

2.9.Survival

The obligations under this Section 8 shall survive:

a. The expiration or termination of any user relationship with Crypter;
b. The cessation of access to the Crypter Platform;
c. The removal of any particular feature, service, or tool associated with the Confidential Information.

9. INTELLECTUAL PROPERTY IN CRYPTER’S TECHNOLOGY STACK

9.1.Overview of Proprietary Architecture

Crypter’s Technology Stack comprises a suite of proprietary and customized tools, protocols, and infrastructure elements developed, owned, or licensed by Crypter, including but not limited to:

a. Trading engine algorithms and order matching logic;
b. Blockchain integration modules (multi-chain and cross-chain operability);
c. Wallet infrastructure (custodial and non-custodial wallets, seed phrase generators, and cold/hot wallet security layers);
d. Smart contract architecture;
e. Application Programming Interfaces (APIs), Software Development Kits (SDKs), and Web3 interfaces;
f. Custom dashboards, reporting tools, and analytics engines;
g. Crypter’s mobile and web application frameworks.

All rights in and to the foregoing are protected by applicable copyright, patent, trade secret, and database right laws, and are the sole and exclusive property of Crypter or its licensors.

7.2.Blockchain and Smart Contract Infrastructure

Crypter deploys proprietary smart contracts and blockchain middleware for facilitating automated trading, staking, wallet operations, token listings, and liquidity management. These smart contracts:

a. Are custom-developed by or on behalf of Crypter and shall be treated as software works protected under copyright law;
b. May contain patentable subject matter such as novel DeFi logic, transaction verification layers, and gas-optimization routines;
c. Shall not be reproduced, forked, mirrored, reverse-engineered, or reused by third parties, except as expressly licensed.

Where applicable, Crypter may publish source code for selected smart contracts under an open-source license, which shall not affect the proprietary nature of the remainder of the stack.

3.3.Application Programming Interfaces (APIs)

Crypter offers limited access to its APIs for integration and third-party development purposes under controlled conditions. These APIs:

a. Remain proprietary to Crypter and are provided strictly on a non-exclusive, non-sublicensable, revocable license basis;
b. May not be replicated, framed, or used to create competing services;
c. Are subject to rate limits, security controls, and monitoring.

Access to APIs may be governed by separate API Terms of Use or commercial license agreements, and unauthorized use may result in termination of access and legal action.

3.4.Wallet Infrastructure and Security Protocols

Crypter’s wallet technology integrates internally-developed cryptographic systems, custody layers, and security enhancements including:

a. Multi-signature authorization mechanisms;
b. Biometric and MFA layers;
c. Proprietary key management systems (KMS);
d. Token whitelisting and withdrawal cooldown modules.

Such wallet infrastructure constitutes core Crypter intellectual property and is protected as a combination of trade secrets, copyrightable works, and technical know-how. Disclosure of internal wallet architecture to third parties is strictly prohibited unless contractually authorized.

4.5.AI, Data Pipelines, and Analytical Tools

Crypter may utilize custom-built tools that apply artificial intelligence and machine learning to:

a. Detect fraudulent activity;
b. Generate predictive trade signals;
c. Optimize liquidity allocation and pricing spreads;
d. Execute automated compliance screening (e.g., address blacklists, sanctions lists).

These tools are based on proprietary training data, algorithms, and compiled datasets that may be protected by database rights (EU), copyright, or confidential information doctrines under applicable laws. Users are prohibited from accessing, replicating, or using such data pipelines or outputs outside the Crypter Platform.

4.6.User Interface (UI) and Frontend Frameworks

The UI/UX elements of the Crypter Platform—including layout, color schemes, graphical elements, fonts, icons, loading animations, and interactive flows—are original works subject to copyright and trade dress protection. Unauthorized reproduction, replication, or adaptation of these elements is prohibited.

4.7.Patent Rights and Applications

Crypter reserves the right to:

a. File national and international patent applications relating to any novel technical solution embedded within its stack;
b. Assert patent rights against infringers in any relevant jurisdiction;
c. License such patents under defensive, offensive, or FRAND (Fair, Reasonable, and Non-Discriminatory) models.

Users and third parties may not use, sell, offer for sale, or import technologies covered under Crypter’s patents or patent-pending filings without authorization.

3.8.Reverse Engineering and Decompilation Prohibited

Users, contractors, developers, and third parties are strictly prohibited from:

a. Reverse engineering, decompiling, disassembling, or attempting to derive source code, architecture, or design logic from any component of Crypter’s technology stack;
b. Circumventing any access restrictions, encryption, obfuscation, or code-minimization measures implemented to protect proprietary technologies.

Any such act shall be considered a material breach of this Policy and may attract injunctive relief, civil damages, and criminal prosecution under relevant anti-circumvention and cybersecurity laws.

2.9.No Implied License

Access to or use of the Crypter Platform does not convey any express or implied license under any of Crypter’s intellectual property rights, except as expressly granted in writing. Crypter reserves all rights not explicitly granted under this Policy or any separate agreement.

10. GLOBAL COMPLIANCE AND JURISDICTION-SPECIFIC OBLIGATIONS

10.1.Territorial Scope and Applicability

Crypter, as a digital asset platform operated by Crypter, a company incorporated under the laws of Turkey, is subject to the intellectual property laws of the European Union, Turkey, and any other jurisdiction in which it offers its services, establishes data or infrastructure operations, or otherwise targets its commercial offerings.

This Policy shall be construed and enforced extraterritorially to the maximum extent permitted by applicable conflict-of-law and IP enforcement frameworks.

10.2.European Union

Crypter adheres to the following EU frameworks in relation to IP protection and user rights:

a. EU Copyright Directive (2019/790) (Digital Single Market Directive), including obligations on content moderation, safe harbors, and licensing of protected content;
b. EU Trademark Regulation (EU) 2017/1001, governing the registration and enforcement of EU trade marks;
c. Directive 96/9/EC on the legal protection of databases;
d. Directive (EU) 2016/943 on the protection of undisclosed know-how and business information (trade secrets);
e. GDPR-compliant restrictions on processing IP-sensitive personal data (e.g., NFTs tied to biometric or creative identifiers).


11. BREACH AND ENFORCEMENT

11.1.Definition of Breach

A “Breach” of this Policy shall include, but is not limited to:

a. Unauthorized use, reproduction, modification, or distribution of Crypter’s intellectual property;
b. Circumvention of technological protection measures (TPMs) or digital rights management (DRM) protocols;
c. Reverse engineering, scraping, decompiling, or disassembling any part of the Crypter Platform;
d. Use of Crypter Marks in a manner that causes confusion, dilution, or reputational harm;
e. Uploading or disseminating content that infringes upon the IP rights of third parties through the Platform;
f. Violation of Crypter’s license terms for APIs, SDKs, smart contracts, or branding assets;
g. Misappropriation or disclosure of Confidential Information or Trade Secrets;
h. Submitting false or malicious IP takedown requests or counter-notifications.

Each breach shall constitute a material violation of this Policy and may result in the immediate imposition of penalties, as set forth below.

8.2. Investigation of Violations

Crypter reserves the right to investigate any suspected or actual breach, including:

a. Logging and analyzing usage data, server access records, and user activity;
b. Conducting internal security audits and forensic analysis;
c. Engaging independent third-party forensic or legal experts;
d. Issuing information requests to Users or partners under contractual or statutory authority.

Crypter may temporarily suspend access to the Platform or specific services while an investigation is underway.

4.3. Remedies Available to Crypter

Upon confirmation of a breach, Crypter may take one or more of the following actions, without prejudice to any other legal remedies:

a. Immediate termination or suspension of user accounts, licenses, or integration privileges;
b. Issuance of cease-and-desist letters or legal notices to infringing parties;
c. Takedown or disabling of infringing content, URLs, APIs, or smart contracts;
d. Blocking of IP addresses, wallets, or associated credentials involved in the unauthorized use;
e. Recovery of liquidated damages, statutory damages, compensatory damages, or punitive damages as permitted under applicable law;
f. Referral to governmental authorities, regulators, or law enforcement bodies for criminal prosecution where warranted.

6.4. Civil Enforcement

Crypter may initiate civil legal proceedings in any competent court or arbitral forum to:

a. Enforce its copyrights, trademarks, patents, and trade secrets;
b. Obtain injunctive relief (temporary, preliminary, or permanent);
c. Seek compensatory or exemplary damages for economic harm, reputational damage, or lost profits;
d. Secure orders for delivery-up, account of profits, or destruction of infringing goods.

Such proceedings may be pursued in multiple jurisdictions simultaneously, in accordance with applicable law and forum selection clauses.

4.5. Criminal Enforcement and Governmental Cooperation

Where applicable, Crypter may:

a. Refer matters to national or international cybercrime units, IP enforcement agencies, or customs authorities;
b. Cooperate with investigations under laws such as the Computer Misuse Act (UK), DMCA (US), Information Technology Act (India), or equivalent frameworks;
c. Provide logs, metadata, or transactional data to authorities, subject to applicable data privacy laws;
d. Pursue action for the enforcement of IP rights via Interpol, Europol, or WIPO ALERT in high-risk jurisdictions.

4.6. Repeat Infringer Policy

In line with global best practices and Crypter’s obligations under intermediary safe harbor provisions (e.g., DMCA, E-Commerce Directive), Crypter will:

a. Maintain internal records of confirmed IP violations and abuse reports;
b. Permanently terminate access for Users or partners found to be repeat infringers, regardless of jurisdiction;
c. Block domain, API, or wallet access linked to known infringers.

A “repeat infringer” is any User or entity with two or more verified IP violations within a 12-month period.

3.7. Costs and Legal Fees

In any legal or arbitral proceeding initiated by Crypter relating to the enforcement of its intellectual property rights, Crypter shall be entitled to recover, to the fullest extent permitted under law:

a. All reasonable attorneys’ fees, court or arbitration costs, expert witness fees, and associated disbursements;
b. Pre- and post-judgment interest;
c. Liquidated or enhanced damages where allowed under statutory IP regimes.

3.8. No Waiver of Rights

Crypter’s failure or delay in enforcing any provision of this Policy shall not be construed as a waiver of its rights to take future or parallel action. Each breach shall be addressed on a case-by-case basis, and Crypter reserves all rights and remedies under contract, statute, and equity.

3.9. User Cooperation

All Users agree to cooperate in good faith with Crypter’s IP enforcement efforts, including:

a. Responding to lawful inquiries and takedown requests;
b. Providing evidence of ownership or authorization when challenged;
c. Complying with internal investigations and audits.

Failure to cooperate may be deemed a material breach of the Terms of Use and result in account termination.

12. DISPUTE RESOLUTION RELATING TO IP CLAIMS

In the event of a dispute, claim, or controversy arising from this Policy, Crypter has established a structured resolution framework as specified in its Terms of Use, which is incorporated by reference in the present Policy.

13. POLICY REVIEW AND AMENDMENT

13.1.Policy Governance and Oversight

The Intellectual Property Policy shall be maintained, reviewed, and amended by the Legal, Compliance, and Risk Management Committee of Crypter under the direct oversight of Crypter. This Committee shall be responsible for:

a. Ensuring alignment with global legal developments, including IP treaties, case law, and statutory reforms;
b. Monitoring emerging risks related to digital rights, user-generated content, blockchain-based assets, and technological obsolescence;
c. Ensuring that policy modifications uphold Crypter’s commitments to transparency, fairness, and enforceability.

This Policy shall be deemed a living document, subject to periodic review, with a formal revision cycle occurring at least annually, or more frequently if necessitated by regulatory changes, platform upgrades, or material risk triggers.

3.2. Right to Amend

Crypter reserves the right, in its sole discretion, to amend, update, revise, supplement, or modify this Policy, in whole or in part, at any time and without prior individual notice, provided such amendments:

a. Are published on the Crypter Platform with clear versioning and effective dates;
b. Do not retroactively alter legal obligations or materially diminish IP protection rights already accrued, except to comply with changes in law.

Amendments may include—but are not limited to—revisions to:

a. Definitions of IP categories and platform components;
b. Procedures governing infringement reporting, mediation, or enforcement;
c. Scope of licenses granted or limitations imposed;
d. Integration of new technologies (e.g., NFTs, zero-knowledge proofs, decentralized identifiers);
e. Applicable jurisdictions, arbitration venues, or dispute resolution terms.

5.3. User Notification and Acceptance

Users will be notified of material amendments to this Policy through one or more of the following methods:

a. Prominent in-app or on-site banner notifications;
b. Email communication to registered users;
c. Platform-wide announcements or blog posts;
d. Account login prompts requiring acknowledgment.

Continued use of the Crypter Platform after the effective date of any amendment shall constitute the User’s deemed acceptance of the updated Policy. If a User does not agree to the modified Policy, their sole remedy is to discontinue use of the Crypter Platform and close any associated accounts.

4.4. Version Control and Archiving

Crypter shall maintain a publicly accessible changelog documenting:

a. The effective date of each version;
b. A summary of key amendments;
c. Archived prior versions for reference or evidentiary purposes.

This ensures compliance with data and contract law disclosure standards under the GDPR (EU), CCPA (California), and similar global frameworks.

3.5. Conflict and Precedence

In the event of any inconsistency between this Policy and other Crypter legal instruments (e.g., Terms of Use, API Terms, Privacy Policy):

a. This Policy shall prevail with respect to all matters concerning intellectual property, unless expressly stated otherwise;
b. Any ambiguity shall be interpreted to preserve the broadest scope of protection for Crypter’s proprietary rights under applicable law.

2.6. Survival and Binding Effect

All obligations under this Policy that by their nature should survive—such as ownership rights, license restrictions, indemnities, dispute resolution provisions, and confidentiality clauses—shall remain in full force and effect, notwithstanding:

a. Termination of a User’s relationship with Crypter;
b. Suspension, discontinuation, or deprecation of platform features;
c. Withdrawal of services from any particular jurisdiction.

This Policy shall be binding upon all Users, successors, assigns, partners, contractors, and licensees engaging with Crypter’s intellectual property or technology ecosystem.

14. CONTACT INFORMATION FOR IP MATTERS

For any and all queries emanating from this Policy, please reach out to us at legal@crypter.com.

Be First to Trade Ethically

Join Crypter’s waitlist and get early access to the world’s first faith-driven crypto exchange — built on fairness, security, and transparency.