Business Manager Agreement

img
Jan
31
0

By using this website, you agree to security monitoring and auditing. For security reasons and to ensure that the public service remains accessible to users, this government computer system uses network traffic monitoring programs to identify unauthorized attempts to upload or modify information, or otherwise cause damage, including attempts to deny service to users. Please report your traffic by updating your user agent to include company-specific information. Note that this policy may change if the SEC manages to SEC.gov to ensure that the site operates efficiently and remains available to all users. If a user or application submits more than 10 requests per second, other requests from the IP address may be limited for a short time. Once the request rate has fallen below the threshold for 10 minutes, the user can continue to access the content on SEC.gov. This SEC practice is designed to limit excessive automated searches to SEC.gov and is not intended or should not affect anyone browsing the site SEC.gov. Unauthorized attempts to upload information and/or modify information to any part of this website are strictly prohibited and subject to prosecution under the Computer Fraud and Abuse Act of 1986 and the National Information Infrastructure Protection Act of 1996 (see Title 18 U.S.C §§ 1001 and 1030). For more information, see the SEC`s Privacy and Security Policy. Thank you for your interest in the U.S. Securities and Exchange Commission. .