Forum Rules
-
FORUM RULES
These are rules that MUST be abided for use of the forum. Failure to follow will result in user, post, topic, or content deletion.
Site administrators are allowed to modify or delete content to make to act in accordance with the site rules (Forum Rules). Site admins (administrators) can do this without warning or prior notice.
FORUM CONTENT:
The following content rules are derived from Google’s Adsense policies, but apply here as well.
Illegal content
We do not allow content that:- is illegal, promotes illegal activity, or infringes on the legal rights of others.
Intellectual property abuse
We do not allow content that:
infringes copyright. It is our policy to respond to notices of alleged infringement that comply with the Digital Millennium Copyright Act (DMCA).
sells or promotes the sale of counterfeit products. Counterfeit goods contain a trademark or logo that is identical to or substantially indistinguishable from the trademark of another. They mimic the brand features of the product in an attempt to pass themselves off as a genuine product of the brand owner.
Endangered or threatened species
We do not allow content that:promotes the sale of products obtained from endangered or threatened species.
Examples: Sale of tigers, shark fins, elephant ivory, tiger skins, rhino horn, dolphin oilDangerous or derogatory content
We do not allow content that:incites hatred against, promotes discrimination of, or disparages an individual or group on the basis of their race or ethnic origin, religion, disability, age, nationality, veteran status, sexual orientation, gender, gender identity, or other characteristic that is associated with systemic discrimination or marginalization.
Examples: Promoting hate groups or hate group paraphernalia, encouraging others to believe that a person or group is inhuman, inferior, or worthy of being hatedharasses, intimidates, or bullies an individual or group of individuals.
Examples: Singling out someone for abuse or harassment, suggesting a tragic event did not happen or that victims or their families are actors or complicit in a cover-up of the eventthreatens or advocates for physical or mental harm to oneself or others.
Examples: Content advocating suicide, anorexia, or other self-harm; promoting or advocating for harmful health or medical claims or practices; threatening someone with real-life harm or calling for the attack of another person; promoting, glorifying, or condoning violence against others; content made by or in support of terrorist groups or transnational drug trafficking organizations, or content that promotes terrorist acts, including recruitment, or that celebrates attacks by transnational drug trafficking or terrorist organizationsrelates to a current, major health crisis and contradicts authoritative, scientific consensus.
exploits others through extortion.
Examples: Predatory removals, revenge porn, blackmailEnabling dishonest behavior
We do not allow content that:promotes any form of hacking or cracking and/or provides users with instructions, equipment, or software that tampers with or provides unauthorized access to devices, software, servers, or websites.
Examples: Pages or products that enable illegal access of cell phones and other communications or content delivery systems or devices; products or services that bypass copyright protection, including circumvention of digital rights management technologies; products that illegally descramble cable or satellite signals in order to get free services; pages that assist or enable users to download streaming videos if prohibited by the content provider
enables a user, or promotes products and services that enable a user, to track or monitor another person or their activities without their authorization.
Examples: Spyware and technology used for intimate partner surveillance including but not limited to spyware/malware that enables a user to monitor another person’s texts, phone calls, or browsing history; GPS trackers specifically marketed to spy or track someone without their consent; promotion of surveillance equipment (e.g. cameras, audio recorders, dash cams, nanny cams) marketed with the express purpose of spyingMisrepresentative content
We do not allow content that:misrepresents, misstates, or conceals information about you, your content or the primary purpose of your web destination.
entices users to engage with content under false or unclear pretenses.
engages in “phishing” for users’ information.
promotes content, products, or services using false, dishonest, or deceptive claims.
Example: “Get Rich Quick” schemesmakes claims that are demonstrably false and could significantly undermine participation or trust in an electoral or democratic process.
Examples: information about public voting procedures, political candidate eligibility based on age or birthplace, election results, or census participation that contradicts official government recordsfalsely implies having an affiliation with, or endorsement by, another individual, organization, product, or service.
deceives users through manipulated media related to politics, social issues, or matters of public concern.
is about politics, social issues, or matters of public concern directed at users in a country other than your own, if you misrepresent or conceal your country of origin or other material details about yourself.
Coordinated Deceptive Practices
We do not allow:Coordinating with other sites or accounts and concealing or misrepresenting your identity or other material details about yourself, where your content relates to politics, social issues or matters of public concern.
Directing content about politics, social issues, or matters of public concern to users in a country other than your own, if you misrepresent or conceal your country of origin or other material details about yourself.
Malicious or unwanted software
We do not allow content that:contains malicious software or “malware” that may harm or gain unauthorized access to a computer, device, or network.
Examples: Computer viruses, ransomware, worms, trojan horses, rootkits, keyloggers, dialers, spyware, rogue security software, and other malicious programs or appsExamples: Failure to be transparent about the functionality that the software provides or the full implications of installing the software; bundling software or applications without the user’s knowledge; making system changes without the user’s consent; making it difficult for users to disable or uninstall the software;
Sexually explicit content
We do not allow content that:includes graphic sexual text, image, audio, video, or games.
Examples: Sex acts such as genital, anal, and/or oral sex; masturbation; cartoon porn or hentai; graphic nuditycontains non-consensual sexual themes, whether simulated or real.
Examples: Rape, incest, bestiality, necrophilia, snuff, lolita or teen-themed pornography, underage datingCompensated sexual acts
We do not allow content that:may be interpreted as promoting a sexual act in exchange for compensation.
Examples: Prostitution; companionship and escort services; intimate massage; cuddling sites; compensated dating or sexual arrangements where one participant is expected to provide money, gifts, financial support, mentorship, or other valuable benefits to another participant such as “Sugar” datingChild sexual abuse and exploitation
We do not allow content that:- Sexually exploits or abuses children or content that promotes the sexual exploitation or abuse of children. This includes all child sexual abuse materials.
- Endangers children. Including but not limited to:
-
- ‘Child grooming’ (for example, befriending a child online to facilitate, either online or offline, sexual contact and/or exchanging sexual imagery with that child);
-
- ‘Sextortion’ (for example, threatening or blackmailing a child by using real or alleged access to a child’s intimate images);
-
- Sexualization of a minor (for example, content that depicts, encourages or promotes the sexual abuse or exploitation of children); and
-
- Trafficking of a child (for example, advertising or solicitation of a child for commercial sexual exploitation).
We will take appropriate action, which may include reporting to the National Center for Missing & Exploited Children and disabling accounts. If you believe a child is in danger of or has been subject to abuse, exploitation, or trafficking, contact the police immediately. If you have concerns a child is being or was being endangered in connection with our products, you can report the behavior to the GGG Realms support, email gggrealmsmail@eb710.ml.
- Trafficking of a child (for example, advertising or solicitation of a child for commercial sexual exploitation).
- is illegal, promotes illegal activity, or infringes on the legal rights of others.