Everest is a user-centric, self-sovereign identity and value transfer solution based on blockchain technology and the cryptographic underpinnings of that system and reflects the principles of identity espoused in the sustainable development goals (“SDGs”) of the United Nations. Upon those foundations, Everest has architected the Identity Network with a focus on resilience, availability, security, privacy and control over personal data. As you use Everest, then they ask you to follow these Terms and Conditions to get the most out of our Services.
Just below is a summary of Everest Terms of Service, followed by the full, legally-binding set of Terms. This summary is for your convenience only and points out certain important user rights and responsibilities. Since you are bound by the full Terms of Service whenever you use Everest, you are required to read, understand and agree to the full-length version. If you do not agree to any of these Terms, you may not use the Everest Applications, any Everest-enabled applications or any other services provided by Everest.
Everest Key Information
|Soft cap||2,000,000 USD|
|Hard cap||20,000,000 USD|
|Distributed in ICO||38%|
|Min. investment||10,000 USD|
|Accepting||ETH, BTC, Fiat|
|Price in ICO||0.0900 USD|
|Whitepaper||Click Here For View Whitepaper|
|Website||Click Here For Visit ICO Homepage|
The Game Change Team Behind Everest
Privacy Options and Compliance
Once you sign up for an account with Everest, you are agreeing to receive electronic communications from, through either your email address, mobile phone text message, or push notifications in the Everest App. They may use your messaging address to contact you in the event that we have updates or other information to provide you. Such information may include, without limitation, new services offered, your partners, or information relating to your account.
Please note that they will not ask for any Personally Identifying Information by email. You should immediately report any emails you may receive that ask for any Personal Information, whether or not it is Personally Identifying Information, and appear as though they are coming from or promoting Everest, to contact@Everest.org with the word “abuse” in the subject line.
Collection of Information by Third-Party Sites and Sponsors
Those sites may have their own privacy policies and practices for use of Personal Information, over which they have no control. The companies and service providers that may work with may also have their own privacy practices, over which they have no control. A company encourage you to familiarize yourself with the privacy statements provided by these other parties prior to providing them with information or taking advantage of any offer.
You will have the ability to download and use the Everest mobile App, which may ask for access to your location or other Personal Information, or for your permission to receive notifications through the application. They may also ask for access to your calendar, photos or other applications on your phone in order to provide services to you. You will have the ability to deny access at your discretion, though denial of access may mean that you will not be able to use all of the services they provide to users. They will not share your Personally Identifying Information with non-affiliated third-parties. All information may become part of your non-identifying, aggregate data.
Commitment to Security
Everest protects your information by taking reasonable steps to secure it against unauthorized access. Everest do this through encryption, physical administration by your staff members, and electronic measures. However, no security system or method is guaranteed to be safe from hackers or human error. They will contact you the soonest possible if find any breaches in your security methods. Thereafter, they will either delete your Personal Information or de-identify it so that it is anonymous and not attributed to your identity. Your rights to request that delete your Personal Information are set forth in the “Accessing, Correcting, and Deleting Your Personal Information” section above.