Only authorized users are permitted use of the tools found within this site. All current employees of Biscom, Inc. are authorized to use this portal and the tools within.
The system employs software programs to monitor network traffic to identify unauthorized activities and their origins. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized users; to access, obtain, alter, damage, or destroy information; to upload or change information; to otherwise cause system or information damage; or otherwise to interfere with the system or its operation, is prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in prosecution under the Computer Fraud and Abuse Act of 1986 and the National Information Infrastructure Protection Act of 1996, or other applicable laws.
LIMITATION OF LIABILITY
By using this information, participants agree to use the contents herein for informational purposes only. “The Global Conflicts” or Biscom, Inc. does not assume any responsibility in the use of this service or its contents for accuracy, completeness, or currency. “The Global Conflicts” does not assume responsibility if this service is used to violate or infringe on the rights of others. This service is provided on a strictly "as is" basis. In no event shall “The Global Conflicts” be liable for any direct, indirect, incidental, punitive, or consequential damages of any kind whatsoever with respect to these services, materials, or products. “The Global Conflicts” expressly disclaims liability for errors and omissions in this publication. While we try to keep the information timely and accurate, we make no guarantee. We will make an effort to correct errors brought to our attention. The information we make available is subject to change without notice. “The Global Conflicts” may suspend or discontinue this service at any time. The user assumes the risk of verifying any materials used or relied upon.