1.  By registering for the Webinar,  the User shall consent  for participation in the Webinar.
  2. Information on the  organizing   a Webinar is provided to the User either before he/she registers for the Webinar by the organiser of the Webinar  in the respective invitation to register sent by email.
  3. The number of participants in a Webinar is limited. If the maximum number of participants for a Webinar is reached, registration for this Webinar will no longer be possible, unless another User cancels his/her participation.
  4.  After registering for the Webinar, you will receive a registration confirmation by email from the organiser. The e-mail will also contain a link to access the respective online Webinar. Users also usually receive a reminder email  one day as well as one hour before the start of the Webinar with the information when the Webinar is to be held.
  5. Webinar is  held online at fixed times (date, time, duration) with simultaneous participation of moderators/speakers and participants.
  6. In order to use the Service, the User must activate the Webinar access link provided to him/her. After activation, the User is in the “webinar room”.
  7. At the beginning of the Webinar, we will inform you, among other things,  whether the Webinar will be recorded.
  8.  If the Webinar is recorded, the recording is usually made available to Users after the Webinar. The recordings are then available and maintained by Tribe47..
  9. You can ask questions in a chat window, which the speaker will be able to see either during or at the end of the Webinar. You can also raise the so-called “virtual hand” (hand massage).
  10.  The mute function will be switched off by the organiser as soon as you raise your virtual hand. If the mute function is off, you can speak directly to the speaker.
  11. At the end of the Webinar, Users are usually requested to give feedback.
  12. We reserve the right to make necessary changes to the programme, e.g. if the speaker falls ill or if the situation requires so. We will make every effort to notify you of any such changes as soon as possible.
  13.  Should the speaker cancel his/her participation or the minimum number of participants for a Webinar , we reserve the right to cancel the event. The same applies in cases of force majeure, such as strikes or natural disasters or in the event of other circumstances that make it impossible for us to hold the event on the announced date(s). We will notify you thereof as soon as possible.
  14. The information included in the Webinars or the content presented as part of the Webinar does not constitute any  advice  and providing the services by Tribe47  or by the speaker. The Webinar has been prepared to the best of our knowledge and level of expertise.
  15. All necessary technical requirements, e.g. requisite hardware and software, telecommunications equipment and Internet providers, shall be provided by every participant at their own expense.
  16. All copyrights, rights of use and other property rights remain vested with Tribe47  or third parties, where the content, contributions or images are subject to copyright or other property rights of third parties. You are only entitled to use the content offered as part of the Webinar for your own purposes, to print it out or save it as a file. You are not entitled to make the Webinar or the content and presentations contained therein available to third parties for further use in the Internet, intranets or extranets. Reproduction and resale of the content for commercial purposes are expressly prohibited.
  17. The User will be entitled to use the Service exclusively for the purposes described in these Terms of Use.
  18. The User shall have in place the hardware required for the use of the Service and shall ensure that the hardware deployed by the User for the use of the Service is suitable and in working order, and that there are no safety risks for the operation of Tribe47 and provider of the platform.
  19. The User is responsible for ensuring that his/her hardware and software, as well as his/her data are sufficiently protected against malware and unauthorised access by third parties.