Ledger™ Network Policy
Updated September 2, 2021
As a Member of Ledger, you can connect to our data network and to the internet using your personal Member login information. This Network Policy applies to your use of any of our data systems, so please read it carefully — if anything is unclear, just ask!
1. Your Access. We offer you network access as a Member and try our best to keep everything running smoothly. This includes maintaining wireless access points, providing ethernet cable options, and working to reduce downtimes as much as we can. Unfortunately, your connection may occasionally be unavailable for a variety of reasons: equipment problems, emergencies, maintenance, interference, and more. We are not responsible for these interruptions or for any performance issues you may experience — our Community Team will try to assist you in resolving these issues when possible. Your network speed can vary based on the equipment and technology you are using, and you are responsible for the setup and use of those devices. We are providing the connection on an “as is” and “as available” basis. To the extent permitted by law, we disclaim all warranties and terms, express or implied, including warranties, terms, or representations as to the availability, operation, security, performance, and/or use of our services, or any other materials on or accessed through our services, or the accuracy, speed, or availability of the services, network, or data, including any warranties or terms of merchantability, fitness for a particular purpose, title, non-infringement, and any implied warranties, terms, or indemnification arising from course of dealing or course of performance.
3. Your Responsibilities. You may only use our network for appropriate purposes that do not violate our Member policies, including our Community Standards. You may not seek to access or use our network in any way that violates the law, harms other Members, harms other parties, or harms us. You also may not interfere with our network’s operation and its use by other Members. Violation of these prohibited uses may result in suspension or termination of your access, termination of your membership, and civil or criminal liability. While we cannot give a complete list of specifically prohibited actions, examples of what you may not do include:
- transferring material that is harmful to minors
- transferring computer viruses, spam, or any other items that interfere with the operations of the network or of other systems
- transferring material that infringes the intellectual property rights of others
We may report violations of our policies to law enforcement or civil authorities, and we may cooperate to provide information for any relevant follow-on investigation.