1Purpose
The Library is a private operating workspace built for approved CATNA 2.0 members. It contains confidential SOPs, systems, and intellectual property that represent significant investment. This AUP exists to prevent leakage, cloning, and misuse.
2Account Conduct
2.1 One account per person.Your account is personal. You may not share your sign-in details, the cookie that keeps you signed in, sign-in links, or browser profiles with anyone, including a team member, assistant, contractor, agency, editor, or family member.
2.2 No concurrent sessions on behalf of others.You may not hold open a session so that another person can use the Library through your account.
2.3 Credential hygiene.You must use a strong, unique password. You must not store credentials in shared password vaults, public repositories, screen recordings, or third-party AI tools.
2.4 Immediate notification.You must email legal@catna.cc immediately if you believe your credentials have been exposed or your account is being used without your authorisation.
3Handling Materials
3.1 Read-only use.You may read Materials, take personal notes in your own words, and apply insights to your own business.
3.2 No copying.You may not copy, download, print to PDF, screenshot, screen-record, or otherwise capture Materials in any form, except an incidental screenshot you keep privately for your personal reference inside your own password-protected device.
3.3 No external posting.You may not publish, upload, quote, paraphrase-in-bulk, or share Materials in any medium outside the Library, including but not limited to social media, blogs, podcasts, YouTube, Twitter/X, TikTok, LinkedIn, Discord servers, Slack workspaces, Telegram, WhatsApp, email lists, courses, paid communities, and private newsletters.
3.4 No AI training.You may not use Materials, in whole or in part, to train or tune any AI model, GPT, chatbot, or knowledge base that is made available to any person other than you.
3.5 Link sharing.You may not share direct links to SOP destinations (for example, external Notion, Google Docs, or Loom URLs) that are referenced inside the Library, with any third party.
4Anti-Leak & Anti-Clone
4.1 No derivative products.You may not use Materials to create or contribute to “templates”, “kits”, “vaults”, “notion packs”, “discord packs”, “GPT packs”, “swipe files”, or similar repackaged resources for sale or distribution.
4.2 No competing programme.You may not use Materials to build, launch, operate, or support a competing coaching, consulting, or training programme, community, or cohort.
4.3 No client delivery.You may not deliver Materials, or services substantially derived from Materials, to clients or customers as your own work without our prior written consent.
4.4 No resale.You may not sell, sublicence, barter, rent, or otherwise transfer access to the Library or any Materials.
5Technical Restrictions
You may not, and you may not attempt to:
- scrape, crawl, bulk-download, or systematically extract Materials from the Library;
- use bots, background browsers, scripts, extensions, or any other automation to read or download Materials;
- defeat, probe, or reverse-engineer the Library’s sign-in system, its limits on repeated failed sign-in attempts, or any other access controls;
- attempt to reach any account, admin page, or piece of Library data that is not expressly made available to you;
- introduce malware, backdoors, or destructive code into the Library or any Program infrastructure;
- interfere with, overload, or disrupt the Library, including by flooding it with traffic;
- use the Library to host, distribute, or test illegal content.
6Community Conduct
When you appear inside Library features, community areas, or any feedback channels exposed through the Library, you must not:
- harass, threaten, intimidate, defame, or discriminate against any person;
- dox, publish private conversations, or reveal the identity of other Library members;
- solicit, spam, or pitch other members without their consent;
- impersonate another member or the Company;
- encourage, coordinate, or facilitate chargebacks, mass refund demands, or payment reversals.
7Team Members
7.1 Discretionary.Team-member access (for example, an editor or creative director) is not a feature of the Library. Any limited Program-side access is granted under the CATNA 2.0 Terms of Service and EULA, at our sole discretion, and applies only where expressly stated in writing.
7.2 You are responsible.You are responsible for the conduct of any person to whom you expose Library content, whether or not authorised by us. Their breach is your breach.
8Reporting Abuse
If you observe a breach of this AUP, including leaked Materials, unauthorised distribution, or attempted access by an outsider, please report it confidentially to legal@catna.cc. Reports are handled discreetly and good-faith reporters are not disadvantaged.
9Enforcement
9.1 Investigation.We may investigate any suspected breach, including by reviewing account activity, usage history, sign-in records, watermark signals, and relevant communications.
9.2 Interim measures.We may take interim measures during an investigation, including temporarily suspending Access, rotating your credentials, or restricting certain features.
9.3 No notice required.Because leakage can cause ongoing harm, we are not required to provide advance notice of suspension or termination for suspected leakage or cloning.
10Remedies
10.1 Non-exclusive.Our remedies for breach of this AUP are cumulative and non-exclusive. We may pursue any combination of:
- immediate suspension or termination of your Access, without refund;
- termination of your CATNA 2.0 enrolment under the Program Terms of Service;
- recovery of any accelerated unpaid Program fees under the Program Terms of Service and Refund & Returns Policy;
- injunctive relief, specific performance, and delivery-up of unauthorised copies;
- damages, an account of profits, and recovery of reasonable enforcement costs and legal fees to the extent permitted by law;
- cooperation with payment processors, platform operators, and authorities to prevent continuing breach.
10.2 No waiver.Failure to take immediate action against any one breach is not a waiver of our right to enforce this AUP against that or any other breach.