Cryptocurrencies are a high-risk investment and may not be suitable for all members of the public and all types of investor. Before purchasing cryptocurrency, you must ensure that the nature, complexity and risks inherent in the trading of cryptocurrency are suitable for your objectives in light of your circumstances and financial position. You should not purchase cryptocurrency unless you understand the extent of your exposure to potential loss. Cryptocurrency exchange rates have exhibited strong volatility to date and you understand that the extent of exposure to potential loss could extend to your entire cryptocurrency investment. Many factors outside of the control of Polis will affect the market price of cryptocurrencies, including, but not limited to, national and international economic, financial, regulatory, political, terrorist, military, and other events, adverse or positive news events and publicity, and generally extreme, uncertain, and volatile market conditions. Extreme changes in price may occur at any time, resulting in a potential loss of value of your entire investment in cryptocurrencies, complete or partial loss of purchasing power, and difficulty or a complete inability to sell or exchange your digital currency. Polis shall be under no obligation to purchase or to broker the purchase back from you of your cryptocurrency in any circumstances.
It is important to exercise caution online as there are various methods that cyber criminals use to try to obtain personal data to commit scams. The most important are:
Phishing: On the Internet, phishing refers to criminal activity that attempts to fraudulently obtain sensitive information. Sometimes a fraudster will first send you a benign email (think of this as the bait) to lure you into a conversation and then follow that up with a phishing email. At other times, the fraudster will just send one phishing email that will direct you to a website requesting you to enter your personal information such as User ID and Password.
Pharming: is another scam where a fraudster installs malicious code on a personal computer or server. This code then redirects any clicks you make on a website to another fraudulent Website without your consent or knowledge.
Voice Phishing: Unfortunately, phishing emails are not the only way people can try to fool you into providing personal information in an effort to steal your identity or commit fraud. Fraudsters also use the phone to solicit your personal information.
SMS Phishing: Referred to as “Smishing”, this mentioned uses cell phone SMS text messages to lure consumers in. Often the text will contain an URL or phone number. The phone number often has an automated voice response system. Again, just like phishing, the smishing message usually asks for your immediate attention.
Unless otherwise required by law, in no event shall the owners of, or contributors to, the Website be liable for any damages of any kind, including, but not limited to, loss of use, loss of profits, or loss of data arising out of or in any way connected with the use of the Website.
This disclaimer was last updated on February 28, 2018.