LogRhythm Rule Your Network Hackathon Official Rules – (the “Official Rules”) 

NO PURCHASE OR PAYMENT NECESSARY. A PURCHASE OR PAYMENT OF ANY KIND WILL NOT INCREASE YOUR CHANCES OF WINNING.  

Hackathon Name: LogRhythm Rule Your Network (the “Hackathon”)

Hackathon Website: (the “Hackathon Website”): http://logrhythm.devpost.com/

1. POSTER

Poster (the “Poster”): LogRhythm, Inc., 4780 Pearl East Circle, Boulder, CO 80301 USA.

The Poster is the sponsor and entity responsible for the Hackathon.

Devpost, Inc. (“Devpost”) will provide the Hackathon Website and will be the official timekeeper for the Hackathon.

 

2. DATES AND TIMING

Hackathon Submission Period: June 1, 2017 (10:00am Mountain Time) – August 31, 2017 (5:00pm Mountain Time) (the “Hackathon Submission Period”)

Judging Period: September 1, 2017 (12:00pm Mountain Time) – September 14 2017 (12:00pm Mountain Time) (the “Judging Period”)

Winners Announced: On or around September 15, 2017 (2:00pm Mountain Time) 

 

3. ELIGIBILITY

A. The Hackathon IS open to: 

  • Individuals who are at least 18 years of age as of the time of entry (“Eligible Individuals”)
  • Teams of Eligible Individuals (“Teams”)
  • Teams of Eligible Individuals entering on behalf of Organizations (including corporations, not-for-profit corporations and other nonprofit organizations, limited liability companies, partnerships, and other legal entities) that exist and have been organized or incorporated at the time of entry (“Organizations”)

(the above are collectively, “Entrants”)

Sponsor Channel and Technical Alliance Partners ARE eligible to participate in the Hackathon provided they meet all other eligibility requirements.

An Eligible Individual may join more than one Team or Organization and an Eligible Individual who is part of a Team or Organization may also enter the Hackathon on an individual basis.  

If a Team or Organization is entering the Hackathon, they must appoint and authorize one individual (the “Representative”) to represent, act, and enter a Submission, on their behalf. The Representative must meet the eligibility requirements above. By entering a Submission on the Site on behalf of a Team or Organization you represent and warrant that you are the Representative authorized to act on behalf of your Team or Organization.

B. The Hackathon IS NOT open to: 

  • Individuals who are residents of, or Organizations domiciled in, a country, state, province or territory where the laws of the United States or local law prohibits participating or receiving a prize in the Hackathon. Residents and Organizations from Brazil, Quebec, Cuba, Sudan, Iran, North Korea, Syria and any other country designated by the United States Treasury's Office of Foreign Assets Control are not eligible to participate.
  • Organizations involved with the design, production, paid promotion, execution, or distribution of the Hackathon, including the Poster and Devpost (“Promotion Entities”)
  • Employees, representatives and agents** of Promotion Entities, and all members of their immediate family or household*
  • Any other individual involved with the design, production, promotion, execution, or distribution of the Hackathon, and each member of their immediate family or household*
  • Any Judge (defined below), or company or individual that employs a Judge
  • Any parent company, subsidiary, or other affiliate*** of any organization described above
  • Any other individual or organization whose participation in the Hackathon would create, in the sole discretion of the Poster and/or Devpost, a real or apparent conflict of interest

*The members of an individual’s immediate family include the individual’s spouse, children and stepchildren, parents and stepparents, and siblings and stepsiblings. The members of an individual’s household include any other person that shares the same residence as the individual for at least three (3) months out of the year.

**Agents include individuals or organizations that in creating a Submission to the Hackathon, are acting on behalf of, and at the direction of, a Promotion Entity through a contractual or similar relationship.

***An affiliate is: (a) an organization that is under common control, sharing a common majority or controlling owner, or common management; or (b) an organization that has a substantial ownership in, or is substantially owned by the other organization.

4. SUBMISSION REQUIREMENTS

Entrants must do the following to participate in the Hackathon:

  • Register for the Hackathon on the Hackathon Website by clicking the “Register for this Hackathon” button. To complete registration, sign up to create a Devpost account, or log in with an existing Devpost account. There is no charge for creating a Devpost account. This will enable you to receive important updates and access the “Enter a Submission” page.
  • Sign up to receive a download link for NetMon Freemium at https://logrhythm.com/freemium-download-form/. There is no charge for downloading or using NetMon Freemium. Entrants can also use their enterprise version of Network Monitor.
  • Use NetMon version 3.3.1 or higher and create a use case, Deep Packet Analytics (DPA) rule, or dashboard (each a “Solution”) that is relevant to one of the following categories (further defined below):
    • Novel Threat Detection (isolate and validate a unique or interesting network threat)
    • Best Security Hunting Dashboard or Use Case (create a dashboard or use case that provides visibility into critical evidence)
    • Best IT Operations Use Case (create a dashboard or use case that leverages network data to solve an IT operations need)

IMPORTANT NOTE: Your Solution must be your own work and you must make the Solution available to the public at the time of entry under one of the following open source licenses: MIT License, BSD 2-Clause, or BSD 3-Clause.

  • Submit the following:
    • A Readme file explaining the purpose, functionality and steps to test your Solution.
    • A DPA rule, and/or an exported dashboard, and/or a query rule, and/or a combination thereof
    • Sample data (PCAP files), and/or screen shots, and/or a video walkthrough of the working Solution, and/or a combination thereof
  • Complete and enter all of the required fields on the “Enter a Submission” page of the Hackathon Website (each a “Submission”) during the Hackathon Submission Period, and follow the additional requirements below.

 

A. Language Requirements 

All Submission materials must be in English or, if not in English, the Entrant must provide an English translation of the demonstration video, text description, and testing instructions as well as all other materials submitted. 

B. Solution Requirements

(i) Categories: Solutions must be entered into one of the following categories (the “Categories”). As part of your Submission, you must select the Category which best applies to your Solution.

  • Novel Threat Detection: Solutions in this Category must be relevant to current real world security issues. Using your Network Monitor Freemium and any of the tools at your disposal (DPA, PCAP Replay, Dashboards, Query Rules) isolate and validate a unique or interesting network threat.
  • Best Security Hunting Dashboard or Use Case: Solutions in this Category must be efficient and effective at identifying suspicious activity through analyzing network traffic. Using Network Monitor Freemium and any of the tools at your disposal (DPA, PCAP Replay, Dashboards, Query Rules) create a dashboard or use case that gives a security analyst the best possible chance to see the critical piece of evidence.
  • Best IT Operations Use Case: Solutions in this category must provide operational context about the working functionality of IT systems. Using Network Monitor Freemium and any of the tools at your disposal (DPA, PCAP Replay, Dashboards, Query Rules) create a dashboard or use case that leverages network data to solve an IT operations need.

At any time, and at its sole discretion, the Poster will have the ability to re-assign a submitted Solution from one Category to another. Solutions in each Category are eligible for different prizes. See Section 7 for prize details.

(ii) Functionality: The Solution must be capable of being successfully tested and replicated by the Poster, and must function as depicted in Submission materials.

(iii) New & Existing: Solutions may be either newly created by the Entrant or may have been created by the Entrant prior to the Hackathon Submission Period, however the submitted version of the Solution must use NetMon version 3.3.1 or higher.

(iv) Testing:  Upon request, the Entrant must make the Solution available free of charge and without any restriction, for testing, evaluation and use by the Poster and Judges during the Hackathon and until the Judging Period ends.

(v) Multiple Submissions: An Entrant may submit more than one Submission to one or more of the Categories, however, each Submission must be unique and substantially different from each of the Entrant’s other Submissions, as determined by the Poster.

(vi) SDKs, APIs, & Data: Solutions may integrate SDKs, APIs and data, provided the Entrant is authorized to use them.

(vii) Intellectual Property: Your Submission must: (a) be your (or your Team or Organization’s) original work product; (b) be solely owned by you, your Team or Organization with no other person or entity having any right or interest in it; and (c) not violate the intellectual property rights or other rights including but not limited to copyright, trademark, patent, contract, and/or privacy rights, of any other person or entity. An Entrant may contract with a third party for technical assistance to create the Submission provided the Submission components are solely the Entrant’s work product and the result of the Entrant’s ideas and creativity, and the Entrant owns all rights to them. An Entrant may submit a Submission that includes the use of open source software or hardware, provided the Entrant complies with applicable open source licenses and, as part of the Submission, creates software that enhances and builds upon the features and functionality included in the underlying open source product. By entering the Hackathon you represent, warrant, and agree that your Submission meets these requirements.

(viii) Financial or Preferential Support: A Solution must not have been developed, or derived from a Solution developed, with financial or preferential support from the Poster or Promotion Entities. Such Solutions include, but are not limited to, those that received funding or investment for their development, were developed under contract, or received a commercial license, from the Poster or Promotion Entities any time prior to the end of Hackathon Submission Period. The Poster, at their sole discretion, may disqualify a Solution, if awarding a prize to the Solution would create a real or apparent conflict of interest.

 

C. Text Description, Image, and Video Requirements 

(i) Readme text: must explain the purpose, functionality and steps to test your Solution.

(ii) Images (optional): The image(s) should be photographs or screenshots of your working Solution. 

(iii) Video (optional): The video portion of the Submission: 

a. should be less than five (5) minutes;

b. should include footage that clearly demonstrates and walks through the Solution

c. if included, must be uploaded to YouTube, Vimeo, or Youku, and a link to the video must be provided on the submission form on the Hackathon Website; and

d. must not include third party trademarks, or copyrighted music or other material unless the Entrant has permission to use such material.

 

5. SUBMISSION RIGHTS

A. Open Source License: By entering the Hackathon, you agree to make your Solution available to the public at the time of entry under one of the following open source licenses: MIT License, BSD 2-Clause, or BSD 3-Clause.

B. Additional Poster Rights:By entering the Hackathon, you grant to the Poster, Devpost, and any other third parties acting on the Poster’s behalf, a royalty-free, non-exclusive, worldwide, perpetual license to display publicly, use for promotional purposes, and distribute the Submission (in accordance with the applicable open source license). This license includes, but is not limited to, posting or linking to the Submission, or portions thereof, on Poster’s, Devpost’s, and partners’ websites and applications, including the Hackathon Website and Network Monitor Community website, and display and promotion of the Submission in any other media, worldwide.

C. Submission Display: Submission components may be displayed to the public and may be viewed by the Poster, Devpost, and Judges for screening and evaluation. Entrants must not include confidential, sensitive or proprietary materials with their Submission.

D. Entrants represent and warrant that the Poster, Devpost, and Hackathon partners are free to use Entrants’ Submission in the manner described above, as provided or as modified by Devpost, without obtaining permission or license from any third party and without any compensation to Entrants.

 

6. JUDGING

A. Judges: Eligible Submissions will be evaluated by a panel of judges selected by the Poster (the “Judges”). Judges may be employees of the Poster or external, may or may not be listed individually on the Hackathon Website, and may change before or during the Judging Period. Judging may take place in one or more rounds with one or more panels of Judges, at the discretion of the Poster.

B. Criteria: The Judges will score all eligible Submissions on a 1-10 scale using the following weighted criteria (the “Judging Criteria”):

(i) Relevance (45% weighting): Is the Solution relevant to a current challenge in the Category?

  • Novel Threat Detection: Submissions in this Category must be relevant to current real world security issues. Relevance emphasis will be given to challenging security issues that are "in the wild" now.
  • Best Security Hunting Dashboard or Use Case: Submissions in this Category must be efficient and effective at identifying suspicious activity through analyzing network traffic. Relevance points will be awarded for Solutions that are efficient at identifying interesting traffic while minimizing additional analysis steps for qualification. Additional relevance points will be given based on identification of true positive results while minimizing "noise", false negatives and false positives.
  • Best IT Operations Use Case: Submissions in this category must provide operational context about the working functionality of IT systems. Relevance points will be awarded for Submissions that are efficient and effective at providing actionable intelligence about network operations.

(ii) Technical content (35% weighting): Does the Solution use NetMon capabilities in a technically correct and interesting fashion?

(iii) Novelty (20% weighting): Is the Solution a unique approach or a unique problem?

The Judging Criteria above may not apply to every Prize. See Section 7 below for the Judging Criteria that apply for each Prize. The Entrant(s) that are eligible for a Prize, and whose Submissions earn the highest overall scores based on the applicable Judging Criteria and, if applicable, an extra point for contributions to Docker, will become potential winners of that Prize.

C. Submission Review: JUDGES are not required to test the SOLUTION and may choose to judge based solely on the description, IMAGES and video provided in the Submission. 

D. Tie Breaker: For each Prize listed in Section 7 below, if two or more Submissions are tied, the tied Submission with the highest score in the first applicable criterion listed above will be considered the higher scoring Submission. In the event any ties remain, this process will be repeated, as needed, by comparing the tied Submissions’ scores on the next applicable criterion. If two or more Submissions are tied on all applicable criteria, the panel of Judges will vote on the tied Submissions.

7. PRIZES

Winner

Prize 

Quantity

 

Applicable Judging Criteria

1st Prize: Novel Threat Detection

US $5,000

One (1) T-shirt

1

i, ii, iii

2nd Prize: Novel Threat Detection

US $1,000

One (1) T-shirt

1

i, ii, iii

1st Prize: Best Security Hunting Dashboard or Use Case

US $5,000

One (1) T-shirt

1

i, ii, iii

2nd Prize: Best Security Hunting Dashboard or Use Case

US $1,000

One (1) T-shirt

1

i, ii, iii

1st Prize: Best IT Operations Use Case

US $5,000

One (1) T-shirt

1

i, ii, iii

2nd Prize: Best IT Operations Use Case

US $1,000

One (1) T-shirt

1

i, ii, iii

First 20 Entrants Prize

One (1) T-shirt

20

Awarded to the first twenty (20) eligible Submissions entered in the Hackathon

 

8. Verification of Potential Winners

A. Verification Requirement: THE AWARD OF A PRIZE TO A POTENTIAL WINNER IS SUBJECT TO VERIFICATION OF THE IDENTITY, QUALIFICATIONS AND ROLE OF THE POTENTIAL WINNER IN THE CREATION OF THE SUBMISSION. The final decision to designate a winner shall be made by the Poster.

B. Required Forms: Potential winners will be notified using the email address associated with the Devpost account used to enter the Submission (the submitter is the “Representative” in the case of a Team or Organization). In order to receive a Prize, the potential winner (including all participating team members in the case of a Team or Organization) will be required to sign and return to the Poster or Devpost, affidavit(s) of eligibility (or a similar verification document) and liability/publicity release(s), and any applicable tax forms (“Required Forms”).

Deadline for Returning Required Forms: ten (10) business days after the Required Forms are sent.

C. Disqualification: The Poster may deem a potential winner (or participating team members) ineligible to win if: 

(i) the potential winner’s Representative or any participating member does not respond to multiple emails or fails to sign and return the Required Forms by the deadline listed above, or responds and rejects the Prize;  

(ii) the Prize or Prize notification is returned as undeliverable; or  

(iii) the Submission or the potential winner, or any member of a potential winner’s Team or Organization, is disqualified for any other reason. 

In the event of a disqualification, the Poster may award the applicable Prize to an alternate potential winner.

 

9. PRIZE DISTRIBUTION

A. Substitutions & Changes: The Poster has the right to make a Prize substitution of equivalent or greater value. The Poster will not award a Prize if there are no eligible Submissions entered in the Hackathon, or if there are no eligible Entrants or Submissions for a specific Prize.

B. Prize Delivery: Prizes will be payable to the Entrant, if an individual, to the Entrant’s Representative, if a Team, or to the Organization, if the Entrant is an Organization. It will be the responsibility of the winning Entrant’s Representative to allocate the Prize among their Team or Organization’s participating members, as the Representative deems appropriate. A monetary Prize will be mailed to the winning Entrant’s address (if an individual) or the Representative’s address (if a Team or Organization), or wired to the Entrant, Entrant Representative, or Organization’s bank account, only after receipt of the Required Forms.

Failure to provide correct information on the Required Forms, or other correct information required for the delivery of a Prize, may result in delayed Prize delivery, disqualification or the Entrant, and/or forfeiture of a Prize.

C. Prize Delivery Timeframe: Within 45 days of the Poster receipt of the Required Forms.

D. Fees & Taxes: Winners (and in the case of Team or Organization, all participating members) are responsible for any fees associated with receiving or using a prize, including but not limited to, wiring fees. Winners (and in the case of Team or Organization, all participating members) are responsible for reporting and paying all applicable taxes in their jurisdiction of residence (federal, state/provincial/territorial and local). Winners may be required to provide certain information to facilitate receipt of the award, including completing and submitting any tax or other forms necessary for compliance with applicable withholding and reporting requirements. Winners are also responsible for complying with foreign exchange and banking regulations in their respective jurisdictions and reporting the receipt of the Prize to relevant government departments/agencies, if necessary. The Poster, DEVPOST, and/or Prize provider reserve the right to withhold a portion of the prize amount to comply with the tax laws of the United States or other Poster jurisdiction, or those of a winner’s jurisdiction.

 

10. ENTRY CONDITIONS AND RELEASE

A. By entering the Hackathon, you (and, if you are entering on behalf of a Team or Organization each participating members) agree(s) to the following:

(i) The relationship between you, the Entrant, and the Poster and Devpost, is not a confidential, fiduciary, or other special relationship.

(ii) You will be bound by and comply with these Official Rules and the decisions of the Poster, Devpost, and/or the Hackathon Judges which are binding and final in all matters relating to the Hackathon.

(iii) You release, indemnify, defend and hold harmless the Poster, Devpost, Promotion Entities, and their respective parent, subsidiary, and affiliated companies, the Prize suppliers and any other organizations responsible for sponsoring, fulfilling, administering, advertising or promoting the Hackathon, and all of their respective past and present officers, directors, employees, agents and representatives (hereafter the “Released Parties”) from and against any and all claims, expenses, and liabilities (including reasonable attorneys’ fees), including but not limited to negligence and damages of any kind to persons and property, defamation, slander, libel, violation of right of publicity, infringement of trademark, copyright or other intellectual property rights, property damage, or death or personal injury arising out of or relating to an Entrant’s entry, creation of Submission or entry of a Submission, participation in the Hackathon, acceptance or use or misuse of the Prize (including any travel or activity related thereto) and/or the broadcast, transmission, performance, exploitation or use of the Submission as authorized or licensed by these Official Rules. 

B. Without limiting the foregoing, the Released Parties shall have no liability in connection with: 

(i) any incorrect or inaccurate information, whether caused by the Poster or Devpost’s electronic or printing error, or by any of the equipment or programming associated with or utilized in the Hackathon; 

(ii) technical failures of any kind, including, but not limited to malfunctions, interruptions, or disconnections in phone lines, internet connectivity or electronic transmission errors, or network hardware or software or failure of the Hackathon Website;

(iii) unauthorized human intervention in any part of the entry process or the Hackathon; 

(iv) technical or human error which may occur in the administration of the Hackathon or the processing of Submissions; or 

(v) any injury or damage to persons or property which may be caused, directly or indirectly, in whole or in part, from the Entrant’s participation in the Hackathon or receipt or use or misuse of any Prize.

The Released Parties are not responsible for incomplete, late, misdirected, damaged, lost, illegible, or incomprehensible Submissions or for address or email address changes of the Entrants. Proof of sending or submitting will not be deemed to be proof of receipt by the Poster or Devpost.

If for any reason any Entrant’s Submission is determined to have not been received or been erroneously deleted, lost, or otherwise destroyed or corrupted, the Entrant’s sole remedy is to request the opportunity to resubmit its Submission. Such request must be made promptly after the Entrant knows or should have known there was a problem, and will be determined at the sole discretion of the Poster.

 

11. PUBLICITY

By participating in the Hackathon you consent to the use of personal information about you, if you are a winner, by the Poster, Devpost, and third parties acting on their behalf. Such personal information includes, but is not limited to, your name, likeness, photograph, voice, opinions, comments and hometown and country of residence. It may be used in any existing or newly created media, worldwide without further payment or consideration or right of review, unless prohibited by law. Authorized use includes advertising and promotional purposes.

The duration of your consent is for a period of three years following the conclusion of the Hackathon. This consent applies, as applicable, to all members an Entrant’s Team or Organization that participated in the winning Submission.

 

12. GENERAL CONDITIONS

A. Poster and Devpost reserve the right, in their sole discretion, to cancel, suspend and/or modify the Hackathon, or any part of it, in the event of a technical failure, fraud, or any other factor or event that was not anticipated or is not within their control.

B.  Poster and Devpost reserve the right in their sole discretion to disqualify any individual or Entrant it finds to be actually or presenting the appearance of tampering with the entry process or the operation of the Hackathon or to be acting in violation of these Official Rules or in a manner that is inappropriate, unsportsmanlike, not in the best interests of this Hackathon, or a violation of any applicable law or regulation. 

C. Any attempt by any person to undermine the proper conduct of the Hackathon may be a violation of criminal and civil law.  Should Poster or Devpost suspect that such an attempt has been made or is threatened, they reserve the right to take appropriate action including but not limited to requiring an Entrant to cooperate with an investigation and referral to criminal and civil law enforcement authorities.

D. If there is any discrepancy or inconsistency between the terms and conditions of the Official Rules and disclosures or other statements contained in any Hackathon materials, including but not limited to the Hackathon Submission form, Hackathon Website, advertising (including but not limited to television, print, radio or online ads), the terms and conditions of the Official Rules shall prevail. 

E. The terms and conditions of the Official Rules are subject to change at any time, including the rights or obligations of the Entrant, the Poster and Devpost. The Poster and Devpost will post the terms and conditions of the amended Official Rules on the Hackathon Website.  To the fullest extent permitted by law, any amendment will become effective at the time specified in the posting of the amended Official Rules or, if no time is specified, the time of posting. 

F. If at any time prior to the deadline, an Entrant or prospective Entrant believes that any Official Rule is or may be unclear or ambiguous, they must submit a written request for clarification.   

G. The Poster or Devpost’s failure to enforce any term of these Official Rules shall not constitute a waiver of that provision. Should any provision of these Official Rules be or become illegal or unenforceable in any jurisdiction whose laws or regulations may apply to an Entrant, such illegality or unenforceability shall leave the remainder of these Official Rules, including the Rule affected, to the fullest extent permitted by law, unaffected and valid. The illegal or unenforceable provision shall be replaced by a valid and enforceable provision that comes closest and best reflects the Poster’s intention in a legal and enforceable manner with respect to the invalid or unenforceable provision.

H. Excluding Submissions, all intellectual property related to this Hackathon, including but not limited to copyrighted material, trademarks, trade-names, logos, designs, promotional materials, web pages, source codes, drawings, illustrations, slogans and representations are owned or used under license by the Poster and/or Devpost. All rights are reserved. Unauthorized copying or use of any copyrighted material or intellectual property without the express written consent of its owners is strictly prohibited. Any use in a Submission of Poster or Devpost intellectual property shall be solely to the extent provided for in these Official Rules.

 

13. LIMITATIONS OF LIABILITY

By entering, all Entrants (including, in the case of a Team or Organization, all participating members) agree to be bound by the Official Rules and hereby release the Released Parties from any and all liability in connection with the Prizes or Entrant’s participation in the Hackathon. Provided, however, that any liability limitation regarding gross negligence or intentional acts, or events of death or body injury shall not be applicable in jurisdictions where such limitation is not legal. 

 

14. DISPUTES

A. Except where prohibited by law, as a condition of participating in this Hackathon, Entrant agrees that:

(i) any and all disputes and causes of action arising out of or connected with this Hackathon, or any Prizes awarded, shall be resolved individually, without resort to any form of class action lawsuit, and exclusively by final and binding arbitration under the rules of the American Arbitration Association and held at the AAA regional office nearest the contestant;

(ii) the Federal Arbitration Act shall govern the interpretation, enforcement and all proceedings at such arbitration; and

(iii) judgment upon such arbitration award may be entered in any court having jurisdiction.

B. Under no circumstances will Entrant be permitted to obtain awards for, and contestant hereby waives all rights to claim, punitive, incidental or consequential damages, or any other damages, including attorneys’ fees, other than contestant’s actual out-of-pocket expenses (i.e., costs associated with entering this Hackathon), and Entrant further waives all rights to have damages multiplied or increased.

C. All issues and questions concerning the construction, validity, interpretation and enforceability of these Official Rules, or the rights and obligations of Entrant and Poster in connection with this Hackathon, shall be governed by, and construed in accordance with, the substantive laws of the State of New York, USA without regard to New York choice of law rules.

SOME JURISDICTIONS DO NOT ALLOW THE LIMITATIONS OR EXCLUSION OF LIABILITY FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THE ABOVE MAY NOT APPLY TO YOU.

 

15. ADDITIONAL TERMS THAT ARE PART OF THE OFFICIAL RULES

Please review the Devpost Terms of Service at https://info.devpost.com/hackathon_terms for additional rules that apply to your participation in the Hackathon and more generally your use of the Hackathon Website. Such Terms of Service are incorporated by reference into these Official Rules. If there is a conflict between the Terms of Service and these Official Rules, the latter terms shall control with respect to this Hackathon only.

Participation in the Hackathon constitutes Entrant’s full and unconditional agreement to these Official Rules. By entering, an Entrant agrees that all decisions related to the Hackathon that are made pursuant to these Official Rules are final and binding, and that all such decisions are at the sole discretion of the Poster and/or Devpost.

Devpost collects personal information from you when you enter the Hackathon. The information collected is subject to the privacy policy located here: https://info.devpost.com/privacy.

 

16. CONTACT

If you have any questions or comment, or wish to send us any notice regarding this Hackathon, please email us at Support@Devpost.com