Skip to content

Commit

Permalink
docs: Add compliance and security section. Fix broken links
Browse files Browse the repository at this point in the history
  • Loading branch information
ltfschoen committed Oct 23, 2024
1 parent 8d5be11 commit 0c2e638
Show file tree
Hide file tree
Showing 3 changed files with 73 additions and 18 deletions.
29 changes: 17 additions & 12 deletions README.md
Original file line number Diff line number Diff line change
@@ -1,22 +1,23 @@

Nunya.business
Nunya.business <a id="top"></a>
==============

> Receive business payments without revealing to others what you've earned.
**Table of contents**

- [Nunya.business](#nunyabusiness)
- [About ](#about-)
- [User focused summary ](#user-focused-summary-)
- [Investor pitch ](#investor-pitch-)
- [Nunya.business](#top)
- [About ](#about)
- [User focused summary ](#user-focused-summary)
- [Investor pitch ](#investor-pitch)
- [What is the problem it solves and the product market fit](#what-is-the-problem-it-solves-and-the-product-market-fit)
- [Development Deepdive ](#development-deepdive-)
- [Demo and Video ](#demo-and-video-)
- [Specification ](#specification-)
- [Setup and Usage ](#setup-and-usage-)
- [License ](#license-)
- [Disclaimer ](#disclaimer-)
- [Development Deepdive ](#development-deepdive)
- [Demo and Video ](#demo-video)
- [Specification ](#specification)
- [Setup and Usage ](#setup)
- [License ](#license)
- [Compliance and Security](#compliance-and-security)
- [Disclaimer ](#disclaimer)

> Important: README.md should be **MAX 2 PAGES**
Expand Down Expand Up @@ -69,6 +70,10 @@ It was built based on Scaffold ETH 2 that has MIT license that must be respected

The Secret contracts were built based on the example [SecretPath Confidential Voting Tutorial](https://github.com/SecretFoundation/Secretpath-tutorials/tree/master/secretpath-voting).

## Compliance and Security <a id="compliance-and-security"></a>

See the [COMPLIANCE_AND_SECURITY](./_COMPLIANCE_AND_SECURITY.md) file for details of managing compliance and security.

## Disclaimer <a id="disclaimer"></a>

See the [DISCLAIMER](./_DISCLAIMER.md) file for details.
See the [DISCLAIMER](./_DISCLAIMER.md) file for details of managing liabilities and compliance.
40 changes: 40 additions & 0 deletions _COMPLIANCE_AND_SECURITY.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,40 @@
# Compliance and Security

**Table of contents**

* [User Restrictions](#user-restrictions)
* [User Responsibility](#user-responsibility)
* [Geographical Restrictions](#geographical-restrictions)
* [Anonymity](#anonymity)
* [Wallet Compliance](#wallet-compliance)
* [Conclusion](#conclusion)

### User Restrictions

Nunya.business and its associated and its use of cross-chain privacy gateway, proxy, and bridge contracts are designed for legitimate and lawful use only, and are not to be exploited by means of criminal or illicit activities. Users are obliged to adhere to all laws and regulations of their respective jurisdiction. Usage by politically exposed persons or their associates is strictly prohibited as per prevailing laws.

Before using Nunya.business and its services, users must confirm and accept the following terms:

If acting individually, you are of legal age as specified in your jurisdiction. You are not a politically exposed person currently in or recently retired from a prominent public role. You are not an immediate family member or closely associated with a politically exposed person. You are not involved in money laundering or financing of terrorism. Your access to the network doesn't violate any rules, laws, regulations, or directives in your country of residence or jurisdiction. You have never been arrested or convicted of any offence or crime. You are prepared to verify your identity upon request.

### User Responsibility

Use of Nunya.business and its use of cross-chain privacy gateway, proxy, and bridge contracts is solely at the risk of the user. The codebase, autonomous protocol, and decentralized networks are all open-source and are not controlled by any specific team. Contributors to Nunya.business are not liable for any loss or damage resulting from inherent risks associated with cryptography, blockchain, and digital wallet usage.

The user agrees not to bypass location-based restrictions through the use of any technology. Users bear the responsibility of reporting and paying any relevant taxes. Any addresses suspected of malpractice can be blocked.

### Geographical Restrictions

While Nunya.business is in its Alpha stage with minimal restrictions, users must comply with their local, state, and federal laws. We strongly advise checking this before using Nunya.business and the networks that it uses. Certain jurisdictions may be programmatically restricted due to local regulatory authorities' policies that prevent anonymous transactions.

### Anonymity

The Securet Network token may, when used with cross-chain privacy gateway, proxy, and bridge contracts, cause privacy to be enabled. For the safety of all users, those from certain jurisdictions may be prohibited from using Nunya.business and accessing protocols that it uses. Post-alpha, restrictions may be implemented for additional countries based on legal considerations.

### Wallet Compliance

Nunya.business may in the future pursue integrations to ensure that wallets interacting with the Nunya.business do not contain funds from illicit sources. In that future case, suspicious wallets may be barred from depositing into Nunya.business and any protocols that it uses, and funds may not be withdrawn from Nunya.business to such wallets.

### Conclusion

Credit to the reference: https://docs.webb.tools/docs/projects/compliance-statement/
22 changes: 16 additions & 6 deletions _DISCLAIMER.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,15 @@
# Disclaimer

**Table of contents**

* [Intro](#intro)
* [Regulatory Landscape](#regulatory-landscape)
* [Liabilities and Risks](#liabilities-and-risks)
* [Mitigation Strategies](#mitigation-strategies)
* [Regulatory Examples](#regulatory-examples)
* [Illustrative Cases](#illustrative-cases)
* [Conclusion](#conclusion)

Nunya.business implementation code is for testing purposes only using local or testnet tokens that have no monetary value. It is not to be used in production for facilitating the execution of making and receiving privacy-enhanced transactions.

This guide is not intended to provide legal advice and should not be used as a substitute for seeking professional legal counsel. It is intended to provide a general overview of the regulatory landscape, potential liabilities, risks, and mitigation strategies associated with the execution of making and receiving privacy-enhanced transactions that interact with relayers using Nunya.business.
Expand All @@ -12,7 +22,7 @@ No reader should act or refrain from acting based on the information in this gui

We strongly recommend that all potential users of this Nunya.business implementation that wish to try to execute privacy-enhanced transactions with it and interact with relayers to consult with a qualified legal professional who is familiar with the blockchain and cryptocurrency industry in their jurisdiction. This will ensure you receive advice tailored to your specific circumstances and stay in compliance with all relevant laws and regulations.

### Regulatory Landscape
### Regulatory Landscape <a id="regulatory-landscape"></a>

Executing privacy-enhanced transactions and interacting with relayers can bring with it an obligation to comply with several laws and regulations. This section aims to provide an overview of the regulatory landscape pertinent to privacy-enhanced transactions and relayer activities, though it is essential to consult with legal professionals for advice tailored to individual circumstances.

Expand Down Expand Up @@ -42,7 +52,7 @@ Given the rapidly evolving nature of the blockchain and cryptocurrency industry,

Understanding the regulatory landscape is critical for any entity operating in the blockchain and cryptocurrency space. Failure to comply with applicable laws and regulations can lead to substantial penalties and reputational damage. As such, potential users of privacy-enhancing transactions and relayers should seek legal advice to ensure their operations align with all relevant legal requirements.

### Liabilities and Risks
### Liabilities and Risks <a id="liabilities-and-risks"></a>

Operating a relayer in the Secret Network and making privacy-enhancing transactions involves potential liabilities and risks. This section will provide an overview of these risks, though it is not exhaustive, and operators are urged to seek professional advice to understand all potential liabilities and risks.

Expand Down Expand Up @@ -70,7 +80,7 @@ Relayers and users making privacy-enhancing transactions might also face financi

Non-compliance with regulations, involvement in illicit activities, or failure to provide reliable service could harm a relayer's reputation and those wishing to make and receive privacy-enhanced transactions. In a competitive market, reputation is critical to attracting and retaining users. Consequently, operators should ensure they operate ethically and reliably to maintain a strong reputation.

### Mitigation Strategies
### Mitigation Strategies <a id="mitigation-strategies"></a>

To manage the potential liabilities and risks involved in operating a relayer and making and receiving privacy-enhanced transactions, it's essential to develop and implement effective mitigation strategies. Here are some suggested strategies, but please note that they should be customized to your specific circumstances and legal jurisdiction:

Expand Down Expand Up @@ -104,7 +114,7 @@ Consider obtaining insurance coverage to protect against potential losses from l

Developing effective mitigation strategies is a key part of managing the liabilities and risks of operating a relayer and making and receiving privacy-enhanced transactions. Regularly reviewing and updating these strategies is also important, as the operational and regulatory environment can change rapidly. As always, seek professional advice when developing these strategies to ensure they are comprehensive and comply with all relevant laws and regulations.

### Regulatory Examples
### Regulatory Examples <a id="regulatory-examples"></a>

While the regulations governing the blockchain and cryptocurrency sector vary significantly across different jurisdictions, here are some examples that can illustrate the diversity in the regulatory landscape:

Expand Down Expand Up @@ -132,7 +142,7 @@ Switzerland has a supportive regulatory environment for blockchain and digital a

These examples underscore the diversity in the regulatory environment for blockchain and digital assets worldwide. Regulations can change quickly and vary significantly by jurisdiction, emphasizing the importance for potential relayers and those making and receiving privacy-enhanced transactions to seek professional legal advice specific to their situation and jurisdiction.

### Illustrative Cases
### Illustrative Cases <a id="illustrative-cases"></a>

To help understand the potential liabilities and risks involved in operating a relayer and those making and receiving privacy-enhanced transactions using Secret Network and Nunya.business, let's consider some hypothetical scenarios:

Expand Down Expand Up @@ -162,7 +172,7 @@ In this case, the operator could face significant penalties under data protectio

These hypothetical cases provide examples of how the failure to properly manage the regulatory landscape, comply with legal obligations, implement technological safeguards, and respect user privacy can lead to significant liabilities and risks. As always, it's crucial to seek professional advice to ensure all potential issues are adequately addressed.

### Conclusion
### Conclusion <a id="conclusion"></a>

Operating a relayer and making and receiving privacy-enhanced transactions in the Secret Network and using Nunya.business presents a unique opportunity in the rapidly evolving blockchain and cryptocurrency industry. While the potential rewards can be significant, it's important to understand and manage the associated liabilities and risks.

Expand Down

0 comments on commit 0c2e638

Please sign in to comment.