Roosens Anti-Leak End-User Terms of Service
Effective Date: October 24, 2025
WHEREAS, Roosens Ltd. (hereinafter referred to interchangeably as “Roosens,” “we,” “us,” “our,” or “the Forensic Controller”), a limited liability entity duly incorporated and existing under the laws of the Isle of Man, with its registered office at [REDACTED], is the exclusive proprietor, licensor, and deployer of certain proprietary forensic watermarking, session telemetry, anti-disclosure, leak-tracing, and tamper-evident technologies (collectively, the “Anti-Leak Mechanisms”) embedded within pre-release, embargoed, confidential, or otherwise restricted software builds (hereinafter the “Protected Software”);
AND WHEREAS, access to and use of the Protected Software is granted exclusively to pre-vetted, contractually bound natural persons (hereinafter the “Authorized Recipient,” “End User,” “you,” or “your”) pursuant to a separate, confidential, and non-disclosed non-disclosure agreement, limited-use license, or early-access authorization executed with the intellectual property rights holder (hereinafter the “Rights Holder”);
AND WHEREAS, the Protected Software contains embedded, obfuscated, self-executing, and dynamically adaptive Anti-Leak Mechanisms designed to:
- Embed cryptographically verifiable forensic watermarks into runtime memory, display output, and file artifacts;
- Monitor, log, and transmit session telemetry in real time;
- Detect and report unauthorized capture, recording, streaming, or exfiltration attempts;
- Prevent circumvention of confidentiality controls;
- Generate immutable forensic leak reports for the Rights Holder and law enforcement.
AND WHEREAS, Roosens retains absolute, irrevocable, and non-delegable control over the activation, monitoring, and enforcement logic of the Anti-Leak Mechanisms, independent of the Rights Holder’s distribution rights;
AND WHEREAS, any breach of confidentiality, unauthorized disclosure, or circumvention attempt constitutes immediate, irreparable harm to the Rights Holder and Roosens;
NOW, THEREFORE, in consideration of the mutual covenants, representations, warranties, and undertakings herein contained, and for other good and valuable consideration, the receipt and sufficiency of which are hereby acknowledged by all parties, these Roosens Anti-Leak End-User Terms of Service (hereinafter the “Anti-Leak ToS”) constitute a binding, non-negotiable, irrevocable, and enforceable contractual instrument between you and Roosens, effective immediately and instantaneously upon the first execution, initialization, loading into memory, or launch of the Protected Software binary, regardless of the method of acquisition (authorized or otherwise), and shall govern all present and future use, access, interaction, or observation thereof, in perpetuity, subject exclusively to the laws of the Isle of Man and applicable international treaties on intellectual property and computer misuse.
1. Grant of Ultra-Restricted, Conditional, and Revocable License
1.1 Subject to your full, continuous, unqualified, and uninterrupted compliance with each and every provision, term, covenant, condition, and proviso of this Anti-Leak ToS, Roosens hereby grants you a limited, revocable, non-exclusive, non-transferable, non-sublicensable, personal, non-commercial, and strictly purpose-bound license to execute the Protected Software solely for the precise, pre-authorized, and contractually defined purpose as stipulated by the Rights Holder.
1.2 This license is expressly and irrevocably contingent upon:
- Valid, verifiable, and non-revoked authorization from the Rights Holder;
- Strict adherence to all confidentiality, non-disclosure, and limited-use obligations;
- Absence of any detected or suspected leak, capture, or circumvention attempt.
1.3 The license may be suspended, limited, or permanently revoked at Roosens’ sole, absolute, and unreviewable discretion, without notice, refund, compensation, explanation, or liability, upon detection of any anomalous behavior, including but not limited to unauthorized screenshots, screen recording, network exfiltration, or third-party access.
2. Absolute, Unqualified, and Global Prohibitions
2.1 You covenant, warrant, represent, and irrevocably agree that you shall not, nor shall you permit, assist, facilitate, enable, or conspire with any third party — whether knowingly, negligently, or otherwise — to:
- Reverse engineer, decompile, disassemble, decrypt, or derive any source code, algorithm, watermark structure, or operational logic of the Protected Software or Anti-Leak Mechanisms;
- Analyze, test, probe, document, publish, disclose, or disseminate any information regarding the structure, behavior, implementation, or forensic markers of the Anti-Leak Mechanisms;
- Circumvent, disable, remove, or interfere with any watermarking, telemetry, anti-capture, or anti-disclosure functionality;
- Modify, patch, alter, or create derivative works of the Protected Software;
- Leak, share, stream, record, screenshot, photograph, transcribe, or distribute any part of the Protected Software, its output, or its content — in whole or in part — via any medium, including but not limited to digital, analog, or physical reproduction;
- Remove, alter, obscure, or tamper with any proprietary notice, watermark, or forensic identifier;
- Use automated tools, scripts, virtual machines, emulators, or sandbox environments to bypass, extract, or defeat protections;
- Engage in any activity that may be construed as preparation for, facilitation of, or contribution to unauthorized disclosure, industrial espionage, or breach of confidentiality.
2.2 These prohibitions apply globally, to all copies — authorized or unauthorized — and survive termination, revocation, or expiry of this license in perpetuity.
2.3 Any violation constitutes willful, material, and irreparable breach and may result in:
- Immediate, permanent, and irreversible revocation of access;
- Civil liability under the DMCA, CFAA, EU Copyright Directive, UK Computer Misuse Act, and international equivalents;
- Criminal prosecution under applicable laws governing trade secrets, confidentiality, and computer fraud;
- Pursuit of all available remedies, including statutory damages, disgorgement of profits, punitive damages, and worldwide injunctive relief.
3. Forensic Watermarking and Leak Attribution
3.1 The Protected Software embeds unique, cryptographically bound, and forensically recoverable watermarks into all runtime instances, display outputs, and generated artifacts.
3.2 You expressly consent to the embedding, transmission, and perpetual storage of such watermarks for the purpose of leak attribution.
3.3 In the event of a detected leak, Roosens and the Rights Holder reserve the unqualified right to use watermark data to identify, trace, and pursue the source of the breach.
4. Data Collection, Processing, and Retention
4.1 The Protected Software collects non-specific, pseudonymized session and system telemetry for leak prevention, forensic reporting, and compliance purposes only.
4.2 All system identifiers are irreversibly anonymized within the executable prior to transmission. Roosens never receives or processes raw identifiers.
4.3 Data is retained for the full duration of the Protection Agreement and destroyed within thirty (30) days of termination using NIST SP 800-88 compliant methods.
4.4 GDPR rights exercisable via [email protected], subject to strict verification and legitimate interest overrides.
5. Service Availability, Downtime, and Best-Effort Remediation
5.1 Roosen provides no warranty, guarantee, or service level agreement regarding uptime, availability, or functionality of the Protected Software or its telemetry infrastructure.
5.2 In the event of downtime, access failure, or service interruption — whether caused by Roosens, third-party providers, or force majeure — Roosens shall use commercially reasonable best efforts to restore functionality if and only if the root cause is within its direct control and technically feasible to resolve.
5.3 No obligation exists to resolve issues outside Roosens’ control.
5.4 You expressly waive any and all claims for compensation, refund, credit, or damages arising from downtime, access loss, or service failure — regardless of cause, duration, or foreseeability.
6. Legal Requests and Verification Protocol
6.1 All legal requests — including but not limited to data subject access requests, deletion requests, leak investigation inquiries, or any other formal inquiry — must be submitted in writing to [email protected] and accompanied by:
- (a) A clear, unredacted, and fully legible copy of a valid, government-issued photographic identification document (e.g., passport, national ID card, or driver’s license) bearing your full legal name, date of birth, and photograph, and which has not expired;
- (b) Proof of authorized access to the Protected Software (e.g., signed NDA, access key, email from Rights Holder, or contractual authorization);
- (c) A sworn affidavit, notarized or certified under penalty of perjury, attesting to the truthfulness and legitimacy of the request.
6.2 Any request that is frivolous, vexatious, manifestly unfounded, or intended to harass, overburden, or drain Roosens’ resources shall be classified as a social engineering attack and may result in:
- Immediate rejection without response or explanation;
- Reporting to relevant law enforcement and data protection authorities;
- Civil claims for damages, including legal fees, administrative costs, and punitive awards.
6.3 Roosens reserves the absolute right to refuse, delay, or condition any request that does not strictly comply with this protocol.
7. Disclaimer of Warranties
7.1 THE PROTECTED SOFTWARE AND ALL ROOSENS SERVICES ARE PROVIDED “AS IS,” “AS AVAILABLE,” AND “WITH ALL FAULTS.” ALL WARRANTIES ARE HEREBY DISCLAIMED.
8. Absolute Limitation of Liability – ZERO DOLLAR CAP
8.1 To the maximum extent permitted by applicable law, Roosens shall not be liable under any theory of liability — whether contract, tort, strict liability, negligence, or otherwise — for any indirect, incidental, special, consequential, punitive, or exemplary damages, including but not limited to leak-related losses, downtime, access revocation, data loss, or personal injury, even if advised of the possibility thereof and even if arising from gross negligence or willful misconduct.
8.2 In no event shall Roosens’ total, cumulative, and aggregate liability to you or any third party exceed zero dollars ($0.00 USD). This limitation applies regardless of the form of action, whether in contract, tort, or otherwise.
8.3 You expressly acknowledge and agree that your use of the Protected Software is at your sole risk and that Roosens shall have no liability whatsoever. Launching the Protected Software constitutes irrevocable acceptance of this zero-liability provision.
9. Termination and Access Revocation
9.1 This license terminates immediately upon breach, suspicion of breach, or at Roosens’ discretion. You must cease use and destroy all copies.
9.2 Roosens may disable access without notice, justification, or liability.
10. Governing Law and Dispute Resolution
10.1 Governed by the laws of the Isle of Man. Exclusive LCIA arbitration in Douglas. Injunctive relief available in any court of competent jurisdiction.
Contact
[email protected]