KAST Risk Disclosure
Updated: May 22nd 2024
General Awareness. This segment discusses the inherent risks related to Virtual Assets and using the Services. It's not an exhaustive list, so you should carefully assess whether our Services align with your needs and circumstances.
Legal Considerations. The regulatory environment concerning cryptocurrencies and other Virtual Assets continues to develop. The application and interpretation of existing laws and regulations are often largely untested and there is a lack of certainty as to how they will be applied. New laws and regulations will be promulgated in the future that apply to blockchain technology and Virtual Assets, and related services providers, and no assurance can be given that any such changes will not adversely affect Virtual Assets generally or the Services.
The legal status of Virtual Assets varies significantly across jurisdictions. They might be prohibited or heavily regulated in certain areas, and you are solely responsible for understanding and adhering to any such laws at your own risk and expense. We do not endorse or take a stance on the legal status of any Virtual Assets. You are encouraged to conduct your own research and understand the legal implications of Virtual Assets. Your use of Virtual Assets through our Services is at your own risk, and you should be aware of and prepared to accept these risks.
Understanding Virtual Assets Risks. The price of Virtual Assets can be highly unpredictable and volatile. There's a possibility they might become valueless in the future. Trading or holding Virtual Assets involves substantial risks, including potential severe losses. Valuing them can be challenging due to unpredictable trading patterns and unclear fundamentals. You should carefully consider if trading or holding Virtual Assets aligns with your financial situation and risk tolerance. Given the inherent risks in Virtual Assets markets and the influence of technological and international market factors, we cannot assure the ongoing availability of any particular Virtual Assets as part of the Services. The Company retains the right to discontinue offering trades in certain Virtual Assets.
Funds: In case of failure, bankruptcy or liquidation by us, you won't be protected by the Consumer Act in your local jurisdiction, thus, there is a risk you won't recover your money or cryptocurrency paid to us.
Accuracy of information. While we endeavor to keep the information displayed on the Services as accurate as possible, there is a risk that this may not be correct, complete, or updated.
Cybersecurity. Malicious individuals, groups or organisations may attempt to interfere with the Platform in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, coordinated attacks, account takeovers and submitting fake transactions (including spoofing) which could negatively affect the operation of the Platform, or the availability of the Services. With the increased use of technologies and the dependence on computer systems to perform necessary business functions, Virtual Assets and Services are susceptible to operational and information security risks. In general, cyber incidents can result from deliberate attacks or unintentional events. Cyberattacks include but are not limited to gaining unauthorized access to digital systems for purposes of misappropriating assets or sensitive information, corrupting data, or causing operational disruption. Cyberattacks may also be carried out in a manner that does not require gaining unauthorized access, such as causing denial of service attacks on infrastructure. Cyber security failures or breaches of the third party service providers (including, but not limited to, software providers, cloud services providers, index providers, the administrator and transfer agent) could have a negative impact on Virtual Assets and the Services.
It is your responsibility to ensure (i) that your access credentials are kept secure and confidential, including your email, username, and password, as well as access to or use of any two factor authentication hardware, software, or secret and (ii) the security and integrity of any systems (both hardware and software) or services that you use to access the Services.
Last updated