The Hackers Meetup Agreement
In order to officially represent ComExpo Cyber Security Foundation in your country or region as part
of our “The Hackers Meetup” project that is to become a “Core Team Member” you must indicate
your agreement to the terms below by completing and signing this agreement and returning it to the
organization.
Project:
“The Hackers Meetup” project (aka THM) is a program designed as to provide a framework and specific
tools to help Core Team Members be the eyes, ears and voice of THM. Anyone who is passionate and
knowledgeable about THM and who is ready to dive deeper in to the project can apply to become a
Core Team Member. The core team member helps push responsibility and authority to the edges,
making it much easier for volunteers to organize and /or attend events, recruit and mentor new
contributors and better support their local communities.
1. The “Core Team Member” is open to anyone who is:
Passionate about “The Hackers Meetup” project
Knowledgeable of the “The Hackers Meetup”, Comexpo cyber security foundation, its mission,
its products and its community
Willing to communicate to as many people as possible and keen to inspire people to
contribute to THM
2. As a Core Team Member you agree to take on the following responsibilities:
To advance the values and mission of “The Hackers Meetup”
Represent THM in your country /region
Promote the “The Hackers Meetup” project and Mission.
Build on, empower and support existing /future local/global community efforts and programs.
Inspire, recruit and support new contributors
Support and mentor future Core Team Member
Documents Clearly all of your activities
Handle operations of chapter and manage the events
To keep the confidence that is given via the NDA
To exercise care and discretion when communicating about The Hackers Meetup to those
outside of the NDA’dgroup
3. You agree that as a Core Team Member
You are authorized to speak for and about The Hackers Meetup with respect to your
responsibilities identified above.
You will not be using Comexpo cyber security foundation resources for personal interest or
for financial gain, if you do so then you understand that Comexpo cyber security foundation
can take legal action on you.
You can use your role as a Core Team Member only to benefit the THM project and mission
and the Comexpo cyber security foundation community and programs
You are not authorized to bind Comexpo cyber security foundation in any way, or sign any
agreements on behalf of Comexpo cyber security foundation
You are not an employee or agent of Comexpo Cyber Security foundation and cannot
represent yourself as such.
You cannot use your role as a Core Team Member to raise money for yourself. You also cannot
use your role as a Core Team Member to raise money for your group, unless pre-approved by
Comexpo Cyber Security Foundation.
You absolutely may not bribe any person, including government officials, on Comexpo Cyber
Security Foundation behalf or in your capacity as a Core Team Member
You cannot engage in any activities that violates the laws of your locale, Comexpo Cyber
Security Foundation policies, or the rights of any group or individual
You agree to the terms of, and will comply with, the Comexpo Cyber Security Non-Disclosure
Agreement attached as Exhibit A also the Code of Conduct as Exhibit B.
You will behave in a professional and respectable manner when acting as a Core Team
Member.
You may not use the Comexpo Cyber Security Foundation and “The Hackers Meetup” brand
or trademarks without the prior consent of the Comexpo cyber security Council (except in
materials provided to you by CCSF) and any such permitted use is limited to fulfilling
responsibilities under this agreement
Your responsibilities under this agreement are not transferable to any other person
Comexpo Cyber Security Foundation has a right to terminate this agreement and your
involvement in “The Hackers Meetup” project at any time for any reason. Similarly, you may
terminate this agreement and your involvement in the “The Hackers Meetup at any time.
Certain terms of the Comexpo cyber Security Foundation non-disclosure agreement shall
survive any termination of this agreement as set forth in the Non-Disclosure Agreement.
You confirm that at the time of the signing of this agreement you are at last 18 years of ages
Background information
I am eligible to work/study in India and I am not debarred by any law, or by any other legal
obligation to my former/current employer or anyone else, to join the volunteer work
I have not been arrested for, pled guilty to, or charged with or convicted any criminal offence
in any court of India or in any country or territory.
I have never been dismissed from educational institution or employment or resigned in lieu
of being dismissed for inefficiency, delinquency, or misconduct
The above facts/information are true and correct to the best of my knowledge and belief.
I hereby declare that I accept all the terms and condition assigned by the organization to me. If found
violating, organization can suspend me or detain me.
Signed: HARSHIL .
Date: 12.01.2024 .
Name: HARSHIL PARIKH .
Address: D- 404 BARODA SKYZ, OPP. ADDARSH DUPLEX, GORWA ITI, VADODARA
.
.
EXHIBIT A
Confidentiality Agreement for ComExpo Cyber Security Foundation
In order for you to have access to confidential information about Comexpo Cyber Security Foundation,
“The Hackers Meetup”, or other Comexpo Cyber Security Foundation related entities (“CCSF”), or any
Comexpo Cyber Security Foundation partners, and become an “NDA’d Volunteer” you must indicate
your understanding and agreement with the terms in this Confidentiality Agreement (also referred to
as a non-disclosure agreement, “NDA”). This NDA forms a legal agreement between you and Comexpo
Cyber Security Foundation.
1. Scope
“The Hackers Meetup” is an open source project committed to being as open as possible. Sometimes,
however, certain information is not intended to be public and is to be treated as confidential
(“Confidential Information”). During the course of your volunteering, you may receive Confidential
Information as part of your activities for The Hackers Meetup (“Activities”). The purpose of this NDA
is to explain what information is considered Confidential Information, your obligations with respect to
Confidential Information, and whom you should contact if you have questions or suspect a leak of
Confidential Information.
2. How do you know if information is Confidential Information?
You’ll know information is Confidential Information if:
The person disclosing the information tells you that the information is confidential;
There is a notation on the email, document or material to indicate that the information is
confidential; or
The information is not public and made available in an internal Comexpo Cyber Security
Foundation meeting to which you are invited, or is made available to you through a
permission-required or password-required online document, mana page, or other form of
access restriction.
Some examples of Confidential Information include:
unannounced marketing and communications materials related to Comexpo Cyber Security
Foundation campaigns and product launches (including partners, dates, and product release
plans);
non-public source code and plans related to unannounced Comexpo Cyber Security
Foundation projects;
metrics and dashboards on performance that are labelled confidential;
data related to comexpo cyber security foundation and The Hackers Meetup’s users,
volunteers, or employees (including contact information, profile information, server logs,
etc.); and
discussions on comexpo cyber security foundation and The Hackers Meetup and partners
shared in any internal company meetings for Comexpo Cyber Security Foundation staff and
NDA’d Voluteer.
If you’re unsure if information is Confidential Information, ask the person who you received
the information from before sharing or acting on the information. Alternatively, you can
always email
[email protected], which goes to “comexpo cyber security
foundation’s Legal Team”.
3. What are your obligations when handling Confidential Information?
You will only use Confidential Information to perform your Activities on behalf of comexpo cyber
security foundation.
You will not publicly disclose or share the Confidential Information with any other persons, except
with other comexpo cyber security foundation’s employees or other volunteers under an NDA
with comexpo cyber security foundation as noted below.
You will:
a) only share the Confidential Information if the person disclosing the information tells you that
it can be shared,
b) only share the Confidential Information with the specific group or individuals comexpo cyber
security foundation authorizes you to share with; and
c) use appropriate judgment and access restrictions to prevent unauthorized disclosure.
4. When do your obligations end?
Your obligations continue for as long as the information remains confidential, even if this NDA ends.
Only when the information is publicly announced or made publicly available by comexpo cyber
security foundation (or its partner) is the information no longer considered Confidential Information.
If you’re unsure, ask the persons who provided you with the Confidential Information or email
comexpo cyber security foundation’s Legal Team.
5. When does this NDA end?
This NDA lasts for one year from the date of your acceptance of this NDA. After a year, you may receive
a notification to renew this NDA. Renewal would be appropriate if, at the time of renewal, you meet
the following criteria:
(a) you are still an active volunteer and
(b) you may have access to Confidential Information as part of your Activities.
If the NDA ends and is not renewed, you will be removed from certain channels of communication in
which Confidential Information is shared (for example, monthly organization meetings on certain
email distribution lists). If, for any reason, you have continued access to Confidential Information, you
remain under an obligation to keep such information confidential. If you receive Confidential
Information after the expiration of this NDA, you will notify the person disclosing the information that
you should not have received the information. You can email
[email protected] to stop
receiving Confidential Information or to end this NDA prior to the one-year expiration date.
6. What else do you need to know?
Here are a few other key terms that you should be aware of:
a) you understand that your breach of this NDA may cause immediate and irreparable injury to
comexpo cyber security foundation due to the potentially unique nature of the Confidential
Information;
b) you are not authorized to bind comexpo cyber security foundation/The Hackers Meetup in any way,
or sign any agreements on behalf of comexpo cyber security foundation/The Hackers Meetup;
c) you are not an employee or agent of comexpo cyber security foundation and cannot represent
yourself as such;
d) this NDA is not transferable to any other person;
e) this NDA is governed and construed in accordance with Company’s act in the Republic of India,
without regard to its conflict of law principles;
f) in the event of a conflict between a translated version of this NDA and the English language version,
this English language version shall control; and
g) this NDA constitutes the entire agreement between you and comexpo cyber security foundation on
the subject matter herein and supersedes all previous and related communications relating to the
subject matter herein.
The Hackers Meetup Copyright policy
Copyright (c) 2015 ComExpo Cyber Security Foundation
No one can use this name or idea to implement their own The Hackers Meetup, if anyone want to
join us they can officially contact us and promote this campaign with the permission only, any use of
graphics and name of our project or any resources is used for personal interest or for financial gain
will be condemned and Comexpo cyber security foundation can take legal action on
his/her/organization.
Permission should be granted through proper procedure only; all the event will be free of charge -
no cost will obtain from the attendee by the organizer, people who is associated with this project
should have a copy of confirmation letter.
We will provide all the required associated documentation files, proposal and material to deal with
other organization, volunteers should check for the restriction, limitation, rights to use, copy,
modify, merge, publish, distribute, sublicense, and/or sell copies of the Brand name, subject to the
following conditions:
The above copyright notice and permission notice is included to bring the light on our project privacy
policy. We here by declared that if any infringement, copying or replication of our Project, Names
and design will be condemned and Comexpo cyber security foundation can take legal action on
his/her/organization.
Exhibit B
Code of conduct
This code of conduct outlines our expectations for participants within the “The Hackers Meetup”
community, as well as steps to reporting unacceptable behaviour. We are committed to providing a
welcoming and inspiring community for all and expect our code of conduct to be honoured. Anyone
who violates this code of conduct may be banned from the community.
Participation Guidelines
Be friendly and patient.
Be welcoming: We strive to be a community that welcomes and supports people of all
backgrounds and identities. This includes, but is not limited to members of any race, ethnicity,
culture, national origin, colour, immigration status, social and economic class, educational
level, sex, sexual orientation, gender identity and expression, age, size, family status, political
belief, religion, and mental and physical ability.
Be considerate: Your work will be used by other people, and you in turn will depend on the
work of others. Any decision you take will affect users and colleagues, and you should take
those consequences into account when making decisions. Remember that we’re a world-wide
community, so you might not be communicating in someone else’s primary language.
Be respectful: Not all of us will agree all the time, but disagreement is no excuse for poor
behavior and poor manners. We might all experience some frustration now and then, but we
cannot allow that frustration to turn into a personal attack. It’s important to remember that
a community where people feel uncomfortable or threatened is not a productive one.
Be careful in the words that we choose: we are a community of professionals, and we conduct
ourselves professionally. Be kind to others. Do not insult or put down other participants.
Harassment and other exclusionary behaviour aren’t acceptable.
Try to understand why we disagree: Disagreements, both social and technical, happen all the
time. It is important that we resolve disagreements and differing views constructively.
Remember that we’re different. The strength of our community comes from its diversity,
people from a wide range of backgrounds. Different people have different perspectives on
issues. Being unable to understand why someone holds a viewpoint doesn’t mean that they’re
wrong. Don’t forget that it is human to err and blaming each other doesn’t get us anywhere.
Instead, focus on helping to resolve issues and learning from mistakes.
Photography & Videography Guidelines
The Hackers Meet-up is open to the public event and it will be recorded for quality and
promotion purpose, and we do not restrict attendees (including ComExpo Cyber Security
foundation staff, volunteers, sponsors, and media) from taking photos or videos at our
events.
By attending our events, you acknowledge that you are in a public space and that attendees
(including ComExpo Cyber Security foundation staff, volunteers, sponsors, and media) may
capture your image in photos and videos.
Nevertheless, ComExpo Cyber Security foundation encourages event attendees to exercise
common sense and good judgment, and respect the wishes of other attendees who do not
wish to be photographed at the Events.
The organizers reserve the right to use of images/videos taken at the meetup with your
photograph and/or likeness in future marketing materials.
Brand Promotion Guidelines
Any Chapter Leaders, team members, speakers or any attendee cannot promote any
company and its product, services and merchandise in “The Hackers Meetup” event without
the consent of A-Team.
Any Chapter Leaders, team members, speakers or any attendee can promote Government
projects and services without any hesitation but it should be related to aim and agenda of
the event “The Hackers Meetup”.
Any Chapter Leaders, team members, speakers or any attendee can promote any
organization and its product, services and merchandise in event, if the organization is official
partner or sponsor of “The Hackers Meetup” event but it should not be done without the
consent of A-Team.
The organizers reserve the right to use of images/videos taken at the meetup with brands
photograph and/or likeness in future marketing materials.
The Hackers Meet-up is open to the public event and it will be recorded for quality and
promotion purpose, and we do not restrict attendees (including ComExpo Cyber Security
foundation staff, volunteers, sponsors, and media) from taking photos or videos at our
events.
Speakers Code of Conduct
Speaker must adhere Code of Conduct.
Speakers cannot promote their company and related information to their business.
Speakers should complete their talk in given time.
Speakers have to submit their talk presentation 2 days before the event.
We assure you that your talk's Agenda's and information is not goanna reused by another
person.
Be considerate, respectful, and collaborative.
Treat everyone with respect and dignity.
Refrain from demeaning, discriminatory or harassing behaviour and speech.
Be mindful of your surroundings and of your fellow participants.
The organizers reserve the right to use of images/videos taken at the meetup with your
photograph and/or likeness in future marketing materials.
The organizers reserve the right to use of presentation and Research to publish on public
platform taken for the meetup with your photograph in future marketing materials.
The Hackers Meetup social media community standards
The Hackers Meetup communities thrive when you show up IRL to do what you love — together. We
believe the global The Hackers Meetup community deserves to feel welcomed, respected, and
excited to connect with each other, whether we do that in person or on social media.
Here are the five key tenets of our community on social media:
Be welcoming. Cultivate a space where everyone feels safe to be themselves: a community
driven by kindness — not bullying, trolling, or bigotry.
Be real. Act as you would act in real life: with integrity and authenticity.
Be impactful. Contribute to the discussion, and respect everyone’s time. What would you
say if you were talking in person at an event?
Be spirited. Show up with an openness to diverse perspectives and lively debate.
Be thoughtful. Challenge ideas, not people.
If your posts on social media conflict with any of these tenets:
Your post may be removed. You will be privately notified, warned, and encouraged to adjust
your actions going forward in order to stay a member of the community.
If you violate any of these tenets again, we have the right to ban you from our community on all
social media channels.
The Hackers Meetup Social Media Channels
If you’re not yet a member of our online community, join the conversation:
The Hackers Meetup (Instagram, Twitter, Facebook , LinkedIn): For everyone who wants to get
inspired to show up to events.
The Hackers Meetup Support (Twitter): For members and organizers who have questions about
their account, bug reports, or suggestions on how The Hackers Meetup can improve.
Definitions
Harassment includes, but is not limited to:
Offensive comments related to gender, gender identity and expression, sexual orientation,
disability, mental illness, neuro(a)typicality, physical appearance, body size, race, age, regional
discrimination, political or religious affiliation
Unwelcome comments regarding a person’s lifestyle choices and practices, including those
related to food, health, parenting, drugs, and employment
Deliberate misgendering. This includes deadnaming or persistently using a pronoun that does
not correctly reflect a person’s gender identity. You must address people by the name they
give you when not addressing them by their username or handle
Physical contact and simulated physical contact (eg, textual descriptions like “hug” or
“backrub”) without consent or after a request to stop
Threats of violence, both physical and psychological
Incitement of violence towards any individual, including encouraging a person to commit
suicide or to engage in self-harm
Deliberate intimidation
Stalking or following
Harassing photography or recording, including logging online activity for harassment purposes
Sustained disruption of discussion
Unwelcome sexual attention, including gratuitous or off-topic sexual images or behaviour
Pattern of inappropriate social contact, such as requesting/assuming inappropriate levels of
intimacy with others
Continued one-on-one communication after requests to cease
Deliberate “outing” of any aspect of a person’s identity without their consent except as
necessary to protect others from intentional abuse
Publication of non-harassing private communication
Our open source community prioritizes marginalized people’s safety over privileged people’s
comfort. We will not act on complaints regarding:
‘Reverse’ -isms, including ‘reverse racism,’ ‘reverse sexism,’ and ‘cisphobia’
Reasonable communication of boundaries, such as “leave me alone,” “go away,” or “I’m not
discussing this with you”
Refusal to explain or debate social justice concepts
Communicating in a ‘tone’ you don’t find congenial
Criticizing racist, sexist, cissexist, or otherwise oppressive behaviour or assumptions
Diversity Statement
We encourage everyone to participate and are committed to building a community for all. Although
we will fail at times, we seek to treat everyone both as fairly and equally as possible. Whenever a
participant has made a mistake, we expect them to take responsibility for it. If someone has been
harmed or offended, it is our responsibility to listen carefully and respectfully, and do our best to right
the wrong.
Although this list cannot be exhaustive, we explicitly honour diversity in age, gender, gender identity
or expression, culture, ethnicity, language, national origin, political beliefs, profession, race, religion,
sexual orientation, socioeconomic status, and technical ability. We will not tolerate discrimination
based on any of the protected characteristics above, including participants with disabilities.
Reporting Issues:
If you experience or witness unacceptable behaviour—or have any other concerns—please report it
by contacting us via [email protected] all reports will be handled with discretion. In
your report please include:
Your contact information.
Names (real, nicknames, or pseudonyms) of any individuals involved. If there are additional witnesses,
please include them as well. Your account of what occurred, and if you believe the incident is ongoing.
If there is a publicly available record (e.g. a mailing list archive or a public IRC logger), please include a
link.
Any additional information that may be helpful.
After filing a report, a representative will contact you personally, review the incident, follow up with
any additional questions, and make a decision as to how to respond. If the person who is harassing
you is part of the response team, they will recuse themselves from handling your incident. If the
complaint originates from a member of the response team, it will be handled by a different member
of the response team. We will respect confidentiality requests for the purpose of protecting victims
of abuse.
With love from Comexpo Cyber Security Foundation