Limitations of Service & Additional Information

The information provided within this page is not fully exhaustive, and although individuals may not read it, we do inform all persons that access service with us appropriately and accordingly, with respect to subject matters stated herein. If you are otherwise generally interested in any of the information as stated herein, you are able to initiate an inquiry with us, directly via your self-bond access to service with us.

If you ever have any questions, comments, and/or concerns as it relates to your use of our services, our services generally, or any aspect of our services, you are able to request to meet with the Consultant at any point during your current self-bond access (presuming the Consultant is not already with you). If you are not currently accessing service with us, you are able to self-bond with the intention to meet with the Consultant, and we will be able to address your inquiry. Contacting us via the methods on our contact page will not yield you with access to service if we have already informed you via your self-bond access to service with us, that your current access to service is restricted. However, if you ever have the need to contact us by methods that are not via your access to service with us via self-bond, you may submit your inquiry via any of the methods on our contact page, and we will respond to your inquiry as soon as we are able.

Limitations of Service:

The acquisition of new information and/or experiences, or the recovery of lost, stolen, or missing information and/or experiences, assets, persons, animals, or pets - which if provided would compromise the integrity and sanctity of this planet and/or any other planet, is strictly prohibited and safe-guarded against, by the inherent internal coding protection system (explained briefly further below) and the Consultant. No person is permitted access to any information and/or experiences that are considered unlawful in their country or countries of citizenship (including the country wherein they are currently located and accessing service with us) - and that includes us not providing persons with access to any information and/or experiences that are unlawful in the United States. Any information and/or experiences directly concerning and/or having the potential to be related to phenomena such as the resurrection of the dead, immortality, death and/or love potions, subjugation of individuals and/or the masses, exploitation of individuals and/or the masses, omnipotence, omniscience, and/or any other ability and/or power in self or in tool that is not standard to the kit of the individual or species will not be entertained or provided. At no time, whatsoever, shall a person be privy to the acquisition of information and/or experiences pertaining to any aspect of a death that has not already occurred. At no time, whatsoever, shall a person be privy to the acquisition of information and/or experiences pertaining to any aspect of a death that has already occurred, if the person is not an appropriate person to be receiving access to information and/or experiences concerning the death. Our limitations of service have no work-arounds, margins for error, or room for negotiations - as ensuring that the present and future remain secure for those both born and unborn alike, is a core tenet of the VEC Group - and shall not be compromised by or through our services as offered or provided.

Concerning our Services (our Usables):

With respect to our services generally, internally and in some instances within this website, we refer to them as being either free usable examples, free usable methods, or free or payment required limited licenses (collectively, our "usables"). However, for the purpose of allowing persons to be able to more easily inherently understand what they are, we do refer to them as our services, as they are in-fact usable services with us. Although there may not be any concerns for most persons with respect to terminology, we will inform persons appropriately wherein we inherently understand that it is appropriate for us to do so, so as to not cause any confusion, wrongful interpretation, or misconstrued perceptions, and so on.

All of our free usable examples, free usable methods (i.e., meet the Consultant, for example), and free or payment required limited licenses (collectively, our "usables"), are completely safe for any person that is able to establish access to them. We will never permit a person to be able to experience anything that is more than they are able to handle, or that which is inherently inappropriate for them. No matter what a person experiences during their access to service with us, no person will ever actually be physically harmed in any way, and any mental and emotional traumas/stressors that may be permissible, are always moderated by us appropriately so as to ensure they remain benign, and do not adversely affect a person while they are not accessing service with us. For example, some of our usables provide persons with the ability to experience catastrophic events (if their own personal limitations allow for those experiences); however, no person's actual physical body and mind will ever be harmed, and all persons are always free to end/terminate their access/use of a service whenever they want, by simply innately intending for their access/use to end or terminate - or wherein a person becomes "frozen" or we otherwise inherently understand they would prefer their access/use of our service to end (or to be removed from their current situation), we will terminate their access/use for them automatically, or otherwise remove them from the current situation that they are experiencing, so as to ensure their own safety and well-being. For the avoidance of doubt, we will remove a person from any situation that is in violation of our limitations of service (which inherently encapsulates a person's own inherent personal limitations), even if the person is not consciously aware that they are in a situation that may be in violation of our limitations of service (or a situation that may compromise their own safety and well-being if not for our active prevention).

No matter the subjective duration of time that a person experiences during a single self-bond access to service with us, we will always ensure that they are never left feeling physically tired and/or overly mentally/emotionally drained upon the conclusion of their access to service with us. Some use-cases are more demanding than others in that regard, and although we are able to bear most of the burden for a person - persons are having actual experiences in subjective time that will ultimately require them to incorporate their experiences by processing them both during and after-the-fact - which does of course consume some effort that we are unable to fully bear for a person. The same is true with respect to a person being able to alter their consciousness while accessing service with us (i.e., having an alcoholic beverage, and so on) - in that upon their termination of access to service with us, they will be brought back into their otherwise normal state of consciousness - without any side-effects. Please be advised, although we may permit it with respect to ensuring a person's own safety and well-being, accessing service with us (or attempting to) for the purpose of having your own "wakeup" or "refresh" tool should not be expected, as generally speaking, that is in violation of our limitations of service.

We strictly moderate all access to our usables, and no person will ever be permitted access/use to them, wherein that access/use is contraindicated for any reason - and we will provide a person with the reason(s) why their access/use is contraindicated so as to never wrongfully obfuscate, wherein they attempt to access service with us, and we have denied their access. Providing us with the required payment for access to a limited license does not supersede our duty and responsibility to ensure that we appropriately moderate a person's access to that limited license, and if their access/use is contraindicated, we will temporarily restrict their access with an explanation, as just stated. If a person requires more time to "unwind" or process their experiences, so as to allow them a more complete acceptance or assimilation of what they have learned and/or experienced, in and of itself that may be an indication requiring us to enforce a mandatory interval of time in order for them to do so, before we allow them to access/use a specific usable again, or any other usable. To the point, we always ensure the safety and well-being of all persons accessing service with us - which includes but is not limited to, denying access altogether if the person is not in a safe and appropriate environment, or not in a safe and appropriate state of mind to be accessing service with us.

We do not permit any person to access service with us wherein they may be compromised if they were to do so, even if they wouldn't otherwise know that they may have the potential to be compromised. For the avoidance of doubt, if you ever self-bond with other persons present in a local shared experience party, and one of you does not successfully self-bond and is otherwise in a position to be able to use the approximate 2-5 seconds for an exploitive action and potentially will, then we will inform an appropriate person or all persons that did successfully self-bond of that exploitive behavior or act as a potential, and instantaneously terminate the access for all persons without any objective time having passed at all, so as to allow those persons the opportunity to address the situation regarding their local shared party. Wherein persons are attempting to participate in a local shared experience party while all physically together, and any of those persons requires their own separate living memory for any reason, then we will inform all persons of this during their self-bond access with us, such that no person will ever have to worry about where the other person or persons are (if applicable), as they will know that all persons are safe, and the reason(s) why any person may require their own living memory. If any person self terminates their access, or we terminate their access for them, then all persons participating in the local shared experience party that are physically present will have their access terminated, which includes those in their own living memory (if applicable). Wherein a local shared experience party is occurring with persons that are physically together and others globally that are not physically present, any person whose access is terminated while in the physical presence of others, will cause the others in their presence to also have their access terminated as well - and will not necessary terminate the access of other persons that are not physically present with them.

Although we have general maximum subjective time-dilation restrictions, and general access/use interval restrictions with respect to a person's inherent personal limitations, wherein a person inherently wants or needs more time accessing service with us, and we are able to provide it to them without sacrificing their safety and well-being, we will permit them more time. Similarly, just because we provide general maximum subjective time-dilation restrictions, that does not mean that each maximum duration is appropriate for every person. If a person is intending to spend the maximum duration of subjective time that we permit generally, and that duration is contraindicated by their own inherent personal limitations, we will inform the person so as to allow them to make the appropriate use of the duration of time with us that is permissible during their current access/use-case, and we will terminate their access automatically when necessary, after having informed them that we are about to do so, for their own safety and well-being.

Regardless of whether or not a usable (service) requires us to be provided with a payment for access, no person or party ever is provided with any rights of ownership of, to, or over any of our services, or us. With respect to payment required services, the purchaser is providing a payment for full access to, and not ownership of, and therefore with respect to our limitations of service, the privilege of access may be restricted and revoked for any and all persons, if persons with access continually attempt to violate our limitations of service. If a person does continually attempt to violate our limitations of service, their access will always be initially temporarily redacted or restricted, and multiple cautions will be provided long before we ever would fully restrict or permanently revoke their access. If their access does become fully restricted, the person will be made aware of whether or not their access will ever be made available to them again during their life-time; however, some full restrictions will be permanent revocations of access to the custom limited license. With respect to free services, we provide persons with full access to, and not ownership of, and therefore with respect to our limitations of service, the privilege of access may be restricted and revoked for any and all persons, if persons with access continually attempt to violate our limitations of service. If a person does continually attempt to violate our limitations of service, their access will always be initially temporarily redacted or restricted, and multiple cautions will be provided long before we ever would fully restrict or permanently revoke their access. If their access does become fully restricted, the person will be made aware of whether or not their access will ever be made available to them again during their life-time; however, some full restrictions will be permanent revocations of access to the custom limited license.

Our usable examples, usable methods, and limited licenses as usable methods (payment required or free - collectively all, our "usables"), should not be accessed/used carelessly or in a rushed fashion, unless the current access/use-case situation calls for immediacy - and we will ensure that persons never lose sight of what our services are intended for generally, with respect to the preservation, conservation, and restoration of knowledge and life - and the positive forward advancement and personal betterment of all persons both with and without access to our services. Take all the time necessary to properly access/use any usable, which entails ensuring you are in a safe setting and state of mind. If any usable was originally able to work for you, and has stopped working for you, more likely than not this will be because we have temporarily blocked your access to that usable, because you are not in an appropriate setting or state of mind to be accessing service with us, or your sanctity and integrity are otherwise becoming compromised unnecessarily as a result of your use. In any event, we will inform you of the reason(s) that the usable is currently not working for you, instantaneously when you are attempting to access service with us.

The Inherent Internal Coding Protection System:

Please note - [Information dissemination as generally discussed herein primarily relates to information dissemination via non-conventional methods after-the-fact, and not information dissemination via conventional methods - however, the latter is not excluded altogether.

Non-conventional methods of information dissemination refers to a person's ability to provide another person with access to information and/or experiences that have originated via access to service with us, via a direct-bond with another person, after-the-fact. Conventional methods of information dissemination refer to any other method of disseminating information generally, such as writing, creating illustrations, speaking, and so on - which we are generally unable to prevent a person from doing, as that would be in violation of their freedom, and our limitations of service - although as stated herein, if absolutely necessary, we may intervene, rightfully so, so as to ensure the preservation of the person, or any other person or party, including all life on the planet, or any other planet.

In any event, if you are ever in a position wherein we understand and know that you will try to disseminate information via non-conventional methods of information dissemination after-the-fact, we will be sure to inform you appropriately with respect to how to do it, as although you may already know, you may not - and regardless, there are considerations that we will want to make you aware of beforehand if necessary.

All of our services (i.e., usable examples, usable methods, free and payment required limited licenses - collectively, our “usables”), and our systems and methods in place that provide persons with access to our usables, are our Intellectual Property.

As such, we are unable to provide any person or party with information and/or experiences that may compromise the integrity and sanctity of our usables or other aspects of our services, via any form of information dissemination. That includes our usables themselves (as usable interfaces), and our systems and methods in place that facilitate and moderate access to our usables (including the content able to be experienced during access), not being able to provide any person, persons, party, or parties, of any capacity, in any capacity, stated or otherwise, whatsoever, with access to information and/or experiences that would or may compromise the integrity and sanctity of our usables and other aspects of our services, as all were designed to be infallible in that regard, and infallible with respect to their purposes as intended by us.

However, one of our major systems in place that governs all of our services (including access to), is the “inherent internal coding protection system”. Without discounting the previous two (2) paragraphs, we are able to explain the basic premise of the inherent internal coding protection system as follows.]

The inherent internal coding protection system, while being more than, is a safety and security system that moderates information, experiences, secondary benefits, and any interface through which we are able to provide access to information, experiences, and secondary benefits - including, experiences that are uniquely tailored to and for each individual, so as to allow each individual the ability to safely, appropriately, and effectively, receive, retain, and interact with the information and/or experiences they are provided access to; and, uniquely tailored information and/or experiences provided to an individual, so as to allow that individual to be able to safely, appropriately, and effectively, decline, accept and incorporate, or accept and incorporate with the potential to decline and unincorporate after-the-fact, any secondary benefit as it applies to them (if any secondary benefits are applicable); all with respect to their inherent requirements and inherent personal limitations (not to supersede our own inherent requirements and limitations of service; all with respect to our standards, requirements, and our limitations of service. This also includes the dissemination of any information and/or experiences that originated from access to service with us, including via direct-bond with the Consultant (unavailable globally), via an Intermediary (for all intents and purpose, via direct-bond with the Consultant) (unavailable globally), or via our usable examples, usable methods, or free and payment required limited licenses (collectively, our “usables”) (available globally).

In conjunction with the Consultant, the inherent internal coding protection always ensures that an individual is an appropriate candidate to be receiving access to information and/or experiences, including any secondary benefit(s), that originate (or originated) via access to service with us. Wherein after-the-fact information dissemination is concerned (via direct-bond), the inherent internal coding protection system, in conjunction with the Consultant, ensures that the person receiving access to information and/or experiences is being provided with the correct information and/or experiences with respect to the quality, context, and content of the information and/or experiences, the latent and blatant intentions and limitations inherent to the disseminator of the information and/or experiences, the latent and blatant intentions and limitations inherent to the receiver of the information and/or experiences, all with respect to our standards, requirements, and our limitations of service.

This includes, but is not limited to, whether or not a person is of the "age of majority" with respect to their location of residence and their physical location in real-time, and any resultant requirements of and for informed consent(s) and permission(s) - with further considerations with respect to the quality, context, and content of the information and/or experiences, including any applicable secondary benefit (if applicable), with respect to that person and their inherent limitations, and the inherent limitations of all surviving parental/legal guardians of that person, powers of attorney, next of kin, spouses, partners, etc., (as applicable); and, whether or not a person is authorized to disseminate the information and/or experiences without compromising the integrity and sanctity of the information and/or experiences, that person, the person the information and/or experiences is attempting to be disseminated to, or any other person, party, or entity, even if that person, party, or entity does not yet exist, or no longer exists; and, whether or not a person is authorized to receive access to the information and/or experiences without compromising the integrity and sanctity of the information and/or experiences, that person, the person attempting to disseminate the information and/or experiences, or any other person, party, or entity, even if that person, party, or entity does not yet exist, or no longer exists; and, whether or not safe practices and methods are being employed properly and effectively, including the setting, in order to ensure all parties involved in the dissemination of information and/or experiences are safe and accounted for, so as to not compromise the integrity and sanctity of the information and/or experiences, any person or party, including any person or party at the expense of another person or party, any person or party at their own expense, or any person or party by any other person or party that is not directly participating in that dissemination event itself; all with respect to our standards and requirements, and our limitations of service.

With respect to our services, the inherent internal coding protection system will always ensure that no person or party, whether participating in the use of our usables, approved after-the-fact dissemination, an in-person consultation with us (unavailable globally), or attempting to receive access to or to disseminate information and/or experiences that resulted from access to service with us in any capacity, will be able to violate any applicable laws, regulations, codes, conditions, requirements, or any other designations as such, including but not limited to, any applicable requirements or authorizations, clearances, informed consents, non-informed consents, permissions, or any other designations as such.

In other words, if a person is unable to access/use one of our usables, and is otherwise able to self-bond; or, if a person is unable to direct-bond with a person that is attempting to disseminate information and/or experiences that originated via our usables; then, that use-case or situation is attempting to by-pass, breach, or otherwise violate, applicable laws, regulations, codes, conditions, requirements, or any other designations as such, including but not limited to, any applicable requirements or authorizations, clearances, informed consents, non-informed consents, permissions, or any other designations as such - or safe practices and/or methods are not being observed and/or employed appropriately with respect to the use-case or situation itself, or with respect to the information and/or experiences, or both; and, the inherent internal coding protection system, in conjunction with the Consultant, has appropriately moderated that use-case or situation, with respect to our limitations of service.

The inherent internal coding protection system will always supersede in any event wherein any person, persons, party, or parties, of any capacity, in any capacity, stated or otherwise, whatsoever, is attempting to by-pass, breach, or violate, the integrity and sanctity of the inherent internal coding protection system itself, which does encapsulate, but is not limited to; attempting to by-pass, breach, or violate, the integrity or sanctity of any person, party, or entity, even if that person, party, or entity does not yet exist, or no longer exists; or, attempting to by-pass, breach, or violate, the integrity or sanctity of the information and/or experiences (including secondary benefits) that originate or originated via access to service with us; or, attempting to by-pass, breach, or violate, any of our usables; or, attempting to by-pass, breach, or violate, any of our non-usable services, systems, methods, protocols, and so on; or, attempting to by-pass, breach, or violate, the integrity and sanctity of our limitations of service.

With respect to any person appropriately using information and/or experiences provided to them directly via their own self-bond access to service with us; or, provided to them as a result of the access/use of our usables by another person, via dissemination after-the-fact, no matter the degree of separation; or, provided to them directly via direct-bond with the Consultant, including via an Intermediary (for all intents and purpose, via direct-bond with the Consultant) (unavailable globally); the inherent internal coding protection system (including the Consultant and the VEC Group), are not a scapegoat for any person, party, or entity, attempting to misuse, abuse, misinform, uninform, wrongfully obfuscate, wrongfully redact, wrongfully deny access to, wrongfully gain access to, misappropriate, cause harm directly or indirectly in or of any capacity, or otherwise generally mishandle any information and/or experiences - including those as they relate to secondary benefits - regardless of the intention and/or level or degree of success. Although the inherent internal coding protection system and the Consultant moderate information, experiences, and secondary benefits, including access to, and do so appropriately with respect to and in consideration of, the inherent internal coding protection system and the Consultant do not act in replacement of or instead of, any person or party as a sovereign, once that person or party has received access to information and/or experiences, including any applicable secondary benefit(s).

However, if necessary, and only when necessary, accordingly and appropriately, in conjunction with the inherent internal coding protection system, the Consultant will automatically inform a person using a usable, or attempting to; or, disseminating information and/or experiences via any form of conventional or non-conventional methods of dissemination, or attempting to; or, accessing information and/or experiences via any form of non-conventional dissemination, or attempting to; if that use is contraindicated by the inherent internal coding protection system; and, if not heeded appropriately and accordingly, the inherent internal coding protection system will temporarily partially restrict access, temporarily redact without obfuscation, temporarily fully restrict all access, permanently partially restrict access, permanently redact without obfuscation, and/or permanently fully restrict all access to the applicable information and/or experiences, which does include all of the information and/or experiences already accessed, as necessary, for ensuring the integrity and sanctity of the information and/or experiences, the integrity and sanctity of those affiliated with the information and/or experiences, or any other person or party not affiliated with the information and/or experiences, so as to safe-guard against any form of compromise or threat to the sanctity of all life on this planet or any other, now, and in perpetuity - and, having provided us with a required payment for access to a service with us does not supersede this reality, in any event.

With respect to the access/use of any of our usables generally, including any that we have not provided information about on this site, the inherent internal coding protection system and the Consultant will not allow any person (in any capacity, whatsoever - be it independently, on behalf of an entity, at the direction of another person, etc.) to access/use any of our usables to any affect at all, for any purposes other than our design purpose and intention of and for the specific usable.