Privacy Statement

We have created this privacy statement to demonstrate our firm commitment to privacy. The following discloses our information gathering and dissemination practices for this web site.

We use your IP address to help diagnose problems with our server, and to ensure the continued security of your transactions. Your IP address is used to help identify you and to gather broad demographic information.

Our site uses cookies to keep track of your shopping cart. We use cookies to identify you so we can retrieve your information, so you don’t have to re-enter it each time you visit our site.

Our site’s registration form requires users to give us contact information, like their name and email address, and unique identifiers. We use customer contact information from the registration form to send the user information about our company. The customer’s contact information is also used to contact the visitor when necessary if they have subscribed to the mail list. Users may opt-out of receiving future mailings by choosing to un-subscribe. Unique identifiers are collected to verify the user’s identity and for use in our record system.

This site may contain links to other sites. We are not responsible for the privacy practices or the content of such web sites nor their consistency or content.

Our site uses an order form for customers to request information, products and services. We collect visitor’s contact information and unique identifiers. Contact information from the order form is used to send orders and information about our company to our customers. The customer’s contact information is also used to get in touch with the visitor when necessary. Users may opt-out of receiving future mailings. Unique identifiers are collected from website visitors to verify the user’s identity and for use as account numbers in our record system.

Security

This site has security measures in place to protect the loss, misuse and alteration of the information under our control. All data is protected using the most advanced methods available. We do not store financial information like credit card numbers or personal information like telephone numbers on this site.

Unsubscribe

This site gives users the following options for removing their information from our database to not receive future communications or to no longer receive mail list messages.

You can send email to us by visiting the Contact Page.

You can unsubscribe directly via our mail list.

Correct/Update

This site gives users the following options for changing and modifying information previously provided.

You can send email to us by visiting the Contact Page.

As part of our service, we agree to provide you with information and other services that we may decide to offer, subject to the terms of this agreement. Upon notice published through the service, we may modify this agreement at any time. You agree and continue to agree to use our services in a manner consistent with all applicable laws and regulations and in accordance with our terms and conditions.

 

Terms & Conditions

The following terms and conditions do not override our rights under English law, they also DO NOT affect your statutory rights as a consumer.

 

Rules for Online Conduct

By using the service, you agree that you will not attempt to undermine the integrity of this website.

Limitation of Liability and Warranty

Customer agrees that use of the service is entirely at customer’s own risk. To the fullest extent permitted by law, The De-extinction Company Ltd nor any of its affiliates, directors, employees or other representatives will be liable for damages arising out of or in connection with the use of this website.

This disclaimer of liability applies to any damages or injury caused by any failure of performance, error, omission, interruption, deletion, defect, delay in operation or transmission, computer virus, communication line failure, theft or destruction or unauthorised access to, alteration of, or use of record, whether for breach of contract, tortious behaviour, negligence, or under any other cause of action. Customer specifically acknowledges the service is not liable for the defamatory, offensive or illegal conduct of other customers or third-parties and that the risk of injury from the foregoing rests entirely with the customer.

Neither the service nor any of its agents, affiliates or content providers shall be liable for any direct, indirect, incidental, special or consequential damages arising out of use of the service or inability to gain access to or use the service or out of any breach of any warranty.

The customer hereby acknowledges that the provisions of this section shall apply to all content on the service. The De-extinction Company Ltd will not limit its liability to death or personal injury to the extent that it only arises as a result of negligence of The De-extinction Company Ltd. The De-extinction Company Ltd reserve the rights to refuse, modify, amend, change an order, without any penalty whatsoever. Should upon acceptance of an order it is later found to be fraudulent, we have the right to cancel the order without explanation. And refuse future orders.

Copyright

All rights reserved. No part of this service may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of The De-extinction Company Ltd, provided that the recipient may download onto a personal computer owned or under the control of the recipient and make a single copy all or part of this service for the recipient’s private use or study. The De-extinction Company Ltd or any other associated companies will not be liable for any direct, indirect or consequential loss arising from the use of the information and material contained in this website or from your access to the websites via links from this site. In the event of any litigation arising from ordering goods or accessing data on this website, the user agrees that at any such litigation will only be subject to English law and would only be tried in English Courts. 

Trademarks

All trademarks appearing on this service are trademarks of their respective owners.

Donation Terms and Conditions

By making a donation to The De-Extinction Company (“we,” “us,” or “our”), you agree to the following terms and conditions:

  1. Purpose of Donations: Donations made to The De-Extinction Company are intended to support our pioneering project, to reintroduce the Dodo. While we strive to achieve the goals set for this cause/project, we cannot guarantee that a specific fundraising target will be reached or that the desired outcomes will be fully realized.
  2. Use of Funds: All donations received will be used at our discretion for the stated purpose. In the event that the fundraising goal is not met or if there are excess funds after the goal is achieved, we reserve the right to allocate the funds to related projects or general support for The De-Extinction Company.
  3. Refunds: Donations are non-refundable. Once a donation is made, it cannot be cancelled or returned except in the event of fraud or error in the amount donated.
  4. Acknowledgment of Donations: Via Paypal as our donation portal, it will provide an acknowledgment of your donation via email. This acknowledgment will serve as your receipt for tax purposes if applicable. Please consult with a tax professional regarding the deductibility of your donation.
  5. Privacy: Your personal information will be handled in accordance with our Privacy Policy. We are committed to protecting your privacy and will not share your personal information with third parties without your consent, except as required by law.
  6. Changes to Terms and Conditions: We reserve the right to make changes to these terms and conditions at any time. Any changes will be posted on our website, and continued donations after such changes will constitute your acceptance of the new terms and conditions.
  7. Limitation of Liability: To the fullest extent permitted by law, The De-Extinction Company shall not be liable for any loss or damage arising from or in connection with your donation, including any indirect, incidental, consequential, or punitive damages.

By making a donation, you acknowledge that you have read, understood, and agreed to these terms and conditions.

Thank you for your generous support!

DODO@Home Security & Legal Overview

Your computer gets a set of tasks from the dodo@home server. You have full control over when tasks are assigned. For instance, you can restrict the times of day or suspend tasks when you’re using the computer or running on battery power.

Your computer downloads the necessary files and analyzes the data in the background.

When complete, your computer uploads the results to the server and assigns you credit for the work completed.

Legal & Security

  • Usage Rules for Volunteers. Only run the software on computers that you own, or for which you have obtained the owner’s permission.
  • Computer Resources Used. The software will use part of the computer’s CPU power, disk space and network bandwidth. You can control how much of your resources are used, and when it uses them.
  • Privacy Policy. To avoid computing while you’re typing, the software monitors mouse and keyboard activity. It does not record keystrokes. This may trigger some anti-virus software.
  • Your account on the dodo@home project is identified by a name that you choose. This name may be shown on the project’s web site, along with a summary of the work your computer has done for the project. If you want to be anonymous, choose a name that doesn’t reveal your identity.
  • Information about your computer (such as its processor type, amount of memory, etc.) will be recorded by the project and used to decide what type of work to assign to your computer. This information will also be shown on the project’s web site. Nothing that reveals your computer’s location (e.g. its domain name, network address or physical location) will be visible to anyone but you.
  • To participate in dodo@home, you must provide a legitimate email address. This address will not be shown on the project’s web site or shared with organizations. The project may send you periodic newsletters; however, you can choose not to be sent these at any time.

 

Liability.

  • The BOINC project, the University of California and the De-Extinction Company assume no liability for damage to your computer, loss of data, or any other event or condition that may occur as a result of participating in dodo@home.
  • THE SOFTWARE IS PROVIDED “AS IS”, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR ANYONE DISTRIBUTING THE SOFTWARE BE LIABLE FOR ANY DAMAGES OR OTHER LIABILITY, WHETHER IN CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

 

Security Overview.

  • BOINC downloads programs and data over the Internet and runs them on your computer. You may be concerned that BOINC could be exploited by hackers to run malware on your computer (“malware” is software that does malicious things such as stealing private data).
  • Is BOINC safe? The short answer: in practice, yes. After 16 years, running on millions of computers, there have been no security incidents due to BOINC. However, the lack of incidents does not mean that none are possible. All software has security risks, and BOINC is no exception.

 

Security Measures.

  • Code Signing. BOINC uses a mechanism called code signing that protects you in the event that the project servers are compromised and someone tries to add malware to the files that are downloaded to your computer.
  • Code signing is based on public-key cryptography. Each project has a code-signing key pair consisting of a public key and a private key. The public key is sent to your client when you add the project. The private key is used to create “signatures” for programs. The BOINC client will only run programs with valid signatures.
  • The private key is kept on a computer that is never connected to a network, and that is physically secure. This computer is used to create signatures. This means hackers cannot sign malware, even if they break into the project’s server. Therefore they cannot trick BOINC into running malware.
  • Account-based Sandboxing. BOINC’s second line of defense is called account-based sandboxing. Operating systems (Windows, Mac OS X, Linux) have a notion of user accounts. Each file and program is associated with a user account. An unprivileged account is one that has access only to its own files; a program running under such an account is not able to access or modify any other data on the computer.
  • BOINC can be configured to use account-based sandboxing – that is, to run project applications under an unprivileged account. This is the default on Android, Mac OS X and on the installers provided by Linux distributions. Currently, it is not the default on Windows because GPU applications can’t run under unprivileged accounts. However, you can enable it on Windows by checking the Protected execution mode or Service install box during installation (depending on the version of BOINC).
  • BOINC Software Download Security. The BOINC software is created, maintained and distributed by the University of California at Berkeley.  They methods they use to ensure the security of the BOINC software installers is detailed below.
  • On Windows, you are protected from this by another form of code signing. When you run the BOINC installer on Windows, the first thing you should see is an “Open File – Security Warning” window. This window verifies that the installer is valid. If you do not see such a window, do not install the software.
  • On Mac OS 10.8 and later, you can select your security settings in System Preferences to allow running only applications from the App store or those signed by trusted developers registered with Apple. BOINC installers for the Mac are code signed with credentials provided by Apple, so OS X will accept them after warning you they have been downloaded from the Internet (as long as you have set your security preferences in this way.)
  • On Linux, code signing is not used.

 

Back to DODO@Home

JOIN OUR NEWSLETTER

We’d LOVE to welcome you on board. Sign up for free and stay updated on THE most ambitious and exciting project in human history (in our opinion!) and YOU can be a part of it. We send updates monthly, and you can unsubscribe at any time.