Business Plan
Date: 01 April 2018
This business plan (the “Business Plan”) is for information purposes only. The information
contained herein is subject to change. No part of this Business Plan is legally binding or
enforceable, nor is it meant to be, until it has been discussed, reviewed and revised by the
board of directors of IAME Limited (“IAME” or the “Company”). Please do not copy or
disseminate any part of this business plan without including this disclaimer. The final
version of this business plan will be published as soon as adopted.
Nothing in this Business Plan shall be deemed to constitute a prospectus of any sort or a
solicitation for investment, nor does it in any way pertain to an offering or a solicitation of
an offer to buy any securities in any jurisdiction. This document is not composed in
accordance with, and is not subject to, laws or regulations of any jurisdiction, which are
designed to protect investors.
The Initial Coin Offering (hereafter referred to as the “ICO”) project presented by the
Company is an unregulated fundraising operation. It poses several risks to buyers, in
particular, that of losing all amounts traded for tokens issued by the Company (the “IAM
Tokens”).
IAM Tokens are utility tokens and cannot be used for any purposes other than those
provided in the Business Plan, including but not limited to, any investment, speculative or
other financial purposes.
IAM Tokens are not intended for sale or use in any jurisdiction where sale or use of digital
tokens may be prohibited.
IAM Tokens confer no other rights in any form, including but not limited to any ownership,
distribution (including but not limited to profit), redemption, liquidation, proprietary
(including all forms of intellectual property), or other financial or legal rights, other than
those specifically described in the business plan.
Certain statements, estimates and financial information contained in this business plan
constitute forward-looking statements or information. Such forward-looking statements or
information involve known and unknown risks and uncertainties, which may cause actual
events or results to differ materially from the estimates or the results implied or expressed
in such forward-looking statements. This Business Plan can be modified to provide more
detailed information.
This Business Plan is the primary official source of information about the IAM Tokens. The
information contained herein may from time to time be translated into other languages or
used in the course of written or verbal communications with existing and prospective
customers, partners etc. In the course of such translation or communication, some of the
information contained herein may be lost, corrupted, or misrepresented. The accuracy of
such alternative communications cannot be guaranteed. In the event of any conflicts or
inconsistencies between such translations and communications, the provisions of the
english language Business Plan shall prevail.
You acknowledge and agree that there are risks associated with purchasing, holding, and
using IAM Tokens in connection with the Company’s product, services and platform
developed for such products and/or services (hereafter, the “Platform”), as disclosed and
explained in this Business Plan and in the Terms and Condition available at www.iame.io.
If you have any questions regarding these risks, please contact us at [email protected].
BY PURCHASING IAM TOKENS, YOU EXPRESSLY ACKNOWLEDGE AND ASSUME THESE
RISKS. Only people who are fully aware of these risks should participate in the ICO.
General Warning
i
Introduction to IAME
Vision
Truly Decentralised Identification
Comparative Analysis
IAMEconomics
Road to ICO
The Initial Coin Offering
Token Sale Timeline
Building on Ethereum
Token Allocation
Proof of Concept
Development Timeline
Primary Development Targets
Secondary Development Targets
Fundraising Targets
Allocation of Resources
Go-to-Market Strategy
Expectations
Legal Disclaimer
General Disclaimer
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
Table of Contents
I AM ME
Introduction to
IAME
IAME Limited (“IAME”) is a blockchain technology company located in Mauritius. The company focuses on developing transformative systems and solutions for the blockchain - largely centered around identity verification and data security.
The visionaries behind IAME’s project include a team of experts with significant experience in and a commitment to developing and deploying unconventional technologies that are built to address the increasing data security challenges modern businesses are faced with.
IAME’s flagship project is a decentralised fragmented identification system that takes the notion of data security a step further by making compromised information “hack-worthless”!
Our Core Commitment
Developing technologies that significantly mitigate the impact of data breaches.
Transforming identification processes within the blockchain.
Contributing technology that enables greater integration of the blockchain into mainstream spaces.
1
VisionThe biggest issue with the integration of cryptocurrencies into the regulated world is the identification of ownership. Identification was never considered in the original Bitcoin architecture, which is the basis upon which subsequent developments are being made.
While attempts have been made at identification, they do not take into consideration several major issues. Firstly, traditional KYC cannot guarantee that the sender in a cryptocurrency transaction is always the owner. Secondly, cryptocurrency accounts (public key/private key pairs) can be generated anonymously at mass scale. Finally, wholesome data sharing between parties pose a security risk to both counterparties. These are the problems that IAME seeks to resolve.
There is both a technological and economic need for a decentralised identification system. The first being that the identification systems are still highly dependent on humans and are yet to transition into high level automation. Secondly, that the development of a decentralised identification system is commercially viable and yet to be developed.
IAME will be a disruptor in the field of identification and will shift another archaic industry into the crowdsourced economy.
2
Decentralised fragmented identification reinvents the entire identification process by shifting the identification process from systems that transact wholesome data to a system of fragmented data transaction, counterparties now have the ability to validate their blockchain address without having to trust the other transactional parties with their non-essential sensitive information.
Decentralised Fragmented identification immediately renders the data shared within these transactions worthless. This is due to the fact that the data is first fragmented and then distributed among a series of independent third-parties, who are not affiliated to either party operating within the transaction. This network of third-party validators are assigned the task of validating each of these fractured pieces of personal data, which by themselves are useless to malicious parties (in the event of a breach). The compilation of these fragmented validations would constitute and confirm a valid identification to the transactional counterparty, thereby verifying the identity of initiating party.
Many solutions currently available or at the development stage provide validation and authentication via a network of official Validators and Agents - typically comprising formal institutions like banks, financial establishments, utility service providers, to name a few. These systems are rigid and maintain a strict client-agent environment. Our system disrupts and democratises this entirely. As opposed to depending on formal institutions to conduct validation, our system completely democratises the approach by leveraging a completely decentralised and anonymous network of third-party validators.
These individuals receive fragmented pieces of information that on their own mean absolutely nothing. The individual third-party validators would then verify the fragments they receive. The identification process is hashed onto a designated blockchain and made accessible on a public repository where the identification status linked to specific blockchain addresses can be consulted, without compromising the identification data.
3
Fragmented Identification Crowdsourced Validation
Truly Decentralised IdentificationWhile many entities talk about decentralised identification and how this makes data secure, the reality is that data, no matter where it is
transacted, will always be at risk of being breach and compromised. There simply is no way for this to be avoided - as data security technologies improve, so do the technologies and techniques leveraged by hackers and thieves.
4
Functionalities
Data Manipulation
Economics
Hack Risk Assessment
Anti-Money Laundering
Data Storage
User Participation
Man in the Middle Attack
Data Transfer
Token Economics
Database hacking
Counterparty risk
Data Authentication
Cost of Identification
Cryptocurrency Support
Payment System
Sole focus is on KYC - not AML
Client data stored by centralised validators/Agents.
Users are strictly clients paying for a service.
Hackers can intercept wholesome information.
Wholesome and encrypted.
Tokens pool towards centralised Validators/Agents who hold dumping power.
A single breach at the Validators/Agents compromises the entire system.
Counterparties can misappropriate identification documentation.
Data is only authenticated by Validators/Agents.
Cost is determined by Validators/Agents.
No support and integration.
No support and integration - identity validation only.
Anti-Money Laundering processes are native: by identifying cryptocurrency addresses, funds are traceable.
No wholesome data is stored by IAME or its third-party validators. Only boolean metadata is stored on Ethereum.
Users are part of the network and can economically participate in the identification process as third-party validators.
Hackers can only intercept fragments of information.
Data is fragmented, individually encrypted, and transferred through shuffling servers. Intercepted data is of no use to hackers.
In the identification process, IAM Tokens are distributed to the third-party validator network participating in the identification process.
Neither IAME nor its third-party validators holds any wholesome identification data belonging to users. The information fragments and the boolean metadata are of no value to hackers.
Information sharing between counterparties on IAME is restricted to simple information. No wholesome documentation is shared.
Data fragments authentication is crowdsourced to IAME third-party validators.
The crowdsourced process drives the cost of identification to a fraction of traditional identification costs.
IAME is purpose built for Cryptocurrency support with option for fiat integration.
Identification will be integrated into a payment system, minimizing friction between identification and payment.
Comparative Analysis
IAMEconomicsIn the IAME ecosystem, users spend IAM tokens to validate their information, which in turn is distributed to Third Party Validators. The IAM tokens are sold back by same Third Party Validators onto crypto exchanges and the cycle goes on. Because of the ephemeral aspect of data validation in the field of identification demand will be recurring.
IAM Tokens are utility tokens that flow from the people requesting the identification to Third Party Validators validating the fragments. There are several aspects that necessitate a proprietary token:
5
In a single fragment validation transaction there can be thousands of validators involved, hence to enable microtransactions, a highly divisible medium is needed.
By using our IAM Token we can track and ensure that identification requests are not issued from unauthorised parties, this eliminates the risk of fraudulent identification.
Because identity metadata will be stored on Ethereum using an ERC20 Token will ensure that the whole process from identification to validation to information hashing will be streamlined.
Divisibility
Security
Blockchain InteroperabilityThird Party
Validator
User
Exchange
Token Life Cycle
Initial Coin
Offering
Road to ICO
IAME’s ICO will help the team complete its journey towards making vital personal data “hack-worthless”.
The IAME ICO will start on the 4th of July 2018 and will run until the 24th of August.
Initial Coin Offering
IAME is among few blockchain startups to release a working proof of concept prior to initiating an ICO. This is our way of proving what the team is made of. We want contributors to know and to see that they are contributing into a real project.
Proof of Concept
Many blockchain startups initiate an initial coin offering with just an idea in mind. Our team spent months pitching to angel investors to come up with a viable development and go-to-market strategy. As of today, $180,000 has been secured to kickstart development.
From a bootstrapped basement project to a fully fledged start up, the IAME project has come a long way. While most blockchain startups aim straight at an initial coin offering with just an idea in mind, we have opted to take the the long road.
Angel Investment
6
The Initial Coin
Offering
2017 was the year of the Initial Coin Offering, where hundreds of companies created their own cryptographic tokens/coins for a specific product, service, and/or idea to sell to the public.
As a formidable and far more accessible source of financing, ICOs have empowered young start-ups with unprecedented levels of access to finance. ICOs are going to revolutionize the global financial order
For IAME, the objectives of the initial coin offering will go beyond just fundraising and include a commitment to:
Objectives
Raising capital for the development of the IAME Identification Network.
Distributing IAM utility tokens among investors and future users.
Creat ion of awareness on the concept of Decentralised Fragmented Identification.
7
Token Sale TimelineThe IAME token sale will start on the 18th of April 2018 and end on the 24th of August 2018.
The token sale has been separated into three parts: a Private Sale, a Presale and an Initial Coin Offering.
8
8th April to 20th May 2018
Minimum Contribution: 1 ETH
Rate 20,000 IAM/ETH
(ETH and Fiat Only)
6th June to 10th June 2018
Minimum Contribution: 0.5 ETH
Rate 15,000 IAM/ETH
(ETH Only)
20th June to 24th June 2018
Minimum Contribution: 0.1 ETH
Rate 12,500 IAM/ETH
(ETH Only)
4th July to 24th August 2018
No Minimum Contribution: n/a
Rate 10,000 IAM/ETH
(ETH Only)
PRIVATE SALE 2ND PRE SALE
INITIAL COIN OFFERING
1ST PRE SALE
Building on EthereumThe IAM Tokens that will be offered in the IAME initial coin offering will be built as a tailored ERC20 token on Ethereum that makes full use of the Turing Completeness of Solidity.
The contract will contain a payable function that recognises Ether transfer to the contract. Once the Ether is received, the contract will mint IAM Tokens and allocate immediately to the msg.sender. This feature implies that no manual reconciliation will be required for the initial coin offering.
Every time IAM Tokens are created for the msg.sender, an equivalent amount will be created and sent to a reserve pool. 50% of all tokens created will be allocated to the reserve pool, regardless of how many Ether is contributed or the rate applied.
As part of the commitment to transparency by the IAME team, not all Ether raised or IAM Tokens minted will be made available to IAME immediately after the ICO. Part of the Ether and IAM Tokens raised will be locked into Ethereum time based contracts such that they can only be accessed after a specific amount of time has passed.
Auto Mint
Mirrored Mint
Lockbox
Contract Features
9
Token AllocationAll IAM Tokens minted under the reserve system will be allocated to various pools. The token pools are intended to complement the overall development of IAME. The breakdown for those pools is as follows: IAM Token Distribution
Community Pool (10%)
This pool will be allocated for t h e d e v e l o p m e n t o f t h e communi ty around IAME. Bounties operated by IAME will be drawn from this pool, as will be rewards for open source developments headed by IAME.
Advisors Pool (10%)
This pool will be allocated for the advisors of IAME and third parties acting in an advisory or consultancy position to IAME. Beyond simple advice we have been working towards starting actual commercialisation of our solution.
Business Pool (20%)
This pool will be allocated for the business development of IAME. Such cases are being forseen that IAME will engage into token swap agreements with other blockchain companies to assure m u t u a l c o o p e r a t i o n o n a commercial level.
Team Pool (10%)
This pool will be allocated for the founders and the team that are working day and night to bring the development of IAME to fruition.
Advisor Pool
Team Pool
ICO Investors
50%
20%
10%
10%
10%
Business Pool
Community Pool
50%
20%
10%
10%
10%
ICO investors would account for 50% of all IAM tokens, with the remaining 50% allocated to the various pools.
10
Development
Proof of Concept At IAME, development is active, we know where we are going and how to get there, which is why we do not need to wait for the ICO to be completed to start. We come with more than just an idea in mind, we have deployed our Identification Prototype, our Validation Prototype, and the IAME wallet for both iOS and Android.
11
This prototypes enable the user to experience IAME from the identifying user’s perspective.
This prototypes enable the user to experience IAME from the identifying user’s perspective.
The wallet available for both Android and iOS allows p2p transactions and will be upgraded to support identification as development progresses.
Identification Prototype Validation Prototype IAME Wallet
Development TimelineWhile conceptualising our development strategy and approach, we wanted to focus on three specific focus areas:
12
1. Building a comprehensive system that was both scalable and integratable into multiple spaces,
2. Maintaining open channels of development with both crypto-based and traditional businesses, and
3. Prioritising the release of a Minimum Viable product as soon as the ICO is completed.
Proof of Concept
Peer to Peer Payment
KYC Databank Integration
Merchant Gateway
Exchange Integration
IAME Base Identification
Automation Lab
IAME Core Identification
Enterprise Solution
Q1 2018 Q2 2018 Q3 2018 Q4 2018 Q1 2019
Q2 2019Q3 2019Q4 2019Q1 2020
Primary Development TargetsGiven the complexity and applicability of the identification network, our development approach has two phases, primary and secondary, which are dependent on the amount of funds we are able to raise through the ICO. The following are the primary targets that the IAME
team will prioritise with the funds generated initially.
IAME Core• Mobile Android / iOS wallet app.
• Mobile Android/ iOS validator app.
• Mobile API / Backend Services.
• Validation Server.
• Identity server.
Payment Gateway• Payment API/SDK for merchants.
• Cryptocurrency transaction implementation.
• Cryptocurrency transaction authentication.
Exchange Integration• IAME exchange backend services /
API integration with exchanges.
• iOS/Android Mobile wallet exchange service implementation.
13
Secondary Development TargetsIn addition to the primary development targets, there are several secondary developments that can be employed to improve the IAME network. The
secondary development targets comprise specific components that work towards making the platform as commercially viable as possible.
KYC Databank Integration• Integration with existing AML/
KYC solutions.
• Cross validation of fragmented data with centralised database.
Automation Lab• Open and develop external API for
Third Party Validator developers.
• Machine learning workshops and training.
• Validation marketplace.
Enterprise Solution• Enterprise portal for custodial service
providers and SAS web portal for multiple account management.
• SSO & Whitelabeling.
14
Financials
Minimum CapThe minimum cap has been set to $1 million. Should the initial coin offering raise any amount less than $1 million in Ether at the end of the ICO, all Ether contributed will be returned to ICO contributors.
Hard CapThe hard cap has been set to $ 25 million. Should the initial coin offering raise that amount at any point in time, the ICO will be stopped, and no further contributions will be accepted.
Fundraising Targets In order to facilitate the ICO, we have set two fundraising benchmarks, a minimum cap, which is the minimum amount needed to be raised to achieve a basic working system, and a hard cap being the maximum amount that is required to bring the IAME project to successful and holistic completion.
For any funds generated anywhere between the soft cap and hard cap, IAME prioritise elements of its Primary Development Targets, before allocating resources to its Secondary Development Targets.
15
16
Allocation of ResourcesResources raised in the ICO will be allocated over a period of 3 years. It is expected that revenue generation will pick up
by start of 2019 and reach break even point before the end of 2020. The allocation of resources will be highly dependent on the amount raised in the ICO. Funds will be allocated in priority to development, and as we approach the hard cap, a
more aggressive allocation will be made towards growing retail and enterprise adoption.
Development 70%
Listing 10%
Retail Marketing 5%
Enterprise Marketing 5%
Infrastructure 5%
Legal 5%
Development 60%
Listing 14%
Retail Marketing 8%
Enterprise Marketing 10%
Infrastructure 4%
Legal 4%
Development 50%
Listing 18%
Retail Marketing 11%
Enterprise Marketing 15%
Infrastructure 3%
Legal 3%
Conservative Allocation Balanced Allocation Aggressive Allocation
Third Party Validation Outsourced KYC
Merchant Adoption Enterprise Solution
Third party validation is a crowdsourced process that transforms IAME users into “miners” that confirm information fragments akin to cryptocurrency mining minus the necessity for expensive tech hardware. The entry barrier for third party validation is also very low, which will allow almost anyone to become a third party validator.
By crowdsourcing the validation of identity, the cost of compliance can be lowered to a fragment of the existing cost of onboarding and KYCing new customers. Several avenues have been explored for non-cryptocurrency based businesses who have heavy cost of compliance.
The main hurdle to merchant adoption of cryptocurrency as a payment system is anonymity. A transaction with a tainted cryptocurrency can cost a merchant its business, which is why a robust KYC system is required. The IAME identified wallet can function as a payment gateway with a layer of integrated identification that is both streamlined and safe for both the merchant and the customer.
On a broader horizon, we forsee that regulated institutions will be transitioning into cryptocurrency. There will be a demand from the institutional side for the ability to create managed identified cryptocurrency accounts for their clients.
Go-to-Market StrategyEven though blockchain technology development is still at a very early stage, it remains a relatively
competitive space. The IAME team will leverage the following strategies to set itself apart from competitors within the blockchain ecosystem.
17
General Expectations
Cryptocurrency EvolutionFor the first quarter of 2018, Cryptocurrency market capitalisation (both coins and tokens) stood between $250 and $450 billion with daily volumes averaging $18 billion per day. This amount is dwarfed by the market capitalisation of international equity and debt which stand above the $200 trillion mark. As blockchain technology receives more widespread adoption, traditional securities will slowly transition into blockchain securities growing Cryptocurrency market capitalisation.
With the emergence of a new generation of easily transferable generation of Crypto Securities, KYC and AML will have to evolve to cope with a fast paced market. Centralised identification systems as they are will never be able to support such volumes without crippling the whole ecosystem as they have with the current financial industry, which is why IAME is the most adapted solution for the fifth industrial revolution: decentralisation.
No matter the winning form, be it Cryptographic Currencies, Cryptographic Assets or Cryptographic Securities. We will adapt and succeed.
18
Traditional Securities
Cryptographic Currencies
Cryptographic Assets
Cryptographic Securities
2018
2028
Disclaimer
Any buyer purchasing the IAME’s products or services expressly acknowledges technical
and market uncertainties which are inherent in any business development project as
presented in this Business Plan (see below for risk factors) and that this project may
therefore never come to fruition or may have to be abandoned, without the IAM Tokens
being used. In such a case, the buyer expressly acknowledges and accepts that it will not
be entitled to sue or bring any direct or indirect legal action against the Company, its
directors, shareholders, employees or subcontractors in the event of the non-
performance, non-deployment or non-implementation of the project, even in cases where
its IAM Tokens have lost some or all of their value.
In addition, IAME may not be held liable for any of the following:
(i) use of services that are not compliant with the applicable terms;
(ii) non-performance, failure, malfunction or unavailability of the services due to a
third party, the buyer, a third-party product, or the buyer’s breach of its obligations;
(iii) indirect damages such as business loss or disturbance, loss of orders, operating
loss, infringement of the trade mark, loss of profits or clients (e.g. improper disclosure of
confidential information concerning said clients due to failure or piracy of the Platform,
third-party proceedings against the client, etc.);
(iv) loss, disclosure or unlawful or fraudulent use of user sign ons by the buyers or
third parties;
(v) suspension of access or temporary or permanent suspension of services (in
particular, arising from a request issued by an appropriate administrative or judicial
authority, or notification received from a third party);
(vi) loss, alteration or destruction of all or part of the content (information, data,
applications, files or other items) hosted on the infrastructure, insofar as IAME is not
responsible for managing the continuity of buyers activities, and data backups in
particular;
(vii) mismatch between the services and the buyer’s needs (in particular, with regard
to the sensitivity of the relevant data);
(viii) security incidents relating to use of the Internet, concerning in particular the
loss, alteration, destruction, disclosure or unauthorized access to the buyer’s data or
details on or via the Internet; and
(ix) damages to systems, applications and other items installed by the buyer on the
infrastructure.
Legal Disclaimer
19
Until it is distributed to the buyer, the said buyer’s IAM Tokens may be linked to a Company
account. You can only access the Company account using the credentials selected by the
buyer. The loss of these credentials will result in the loss of the IAM Tokens. Good
practices advise buyers to store their credentials securely in one or more backup locations
that are geographically separated from the work location.
Any third party that obtains access to the buyer’s credentials or private keys may be able
to use the buyer’s IAM Tokens. To minimize this risk, buyers must protect themselves
against people gaining unauthorized access to their electronic devices.
Following presales and development of the original version of the Platform, there is a
possibility that alternative platforms may have been established using the same open-
source code and open source protocol that underlies the Platform. The official Platform
may find itself in competition with these alternatives, unofficial platforms based on IAM
Tokens, which could potentially adversely impact the Platform and IAM Tokens.
There is a possibility that the Platform may not be used by a large number of companies,
individuals and other organizations, and that there may be limited public interest in the
creation and development of distributed applications. Such a lack of interest could impact on
the development of the Platform and, therefore, on the uses or potential value of IAM Tokens.
Blockchain technologies are being reviewed by various regulatory bodies around the
world. The operation of the Platform and of IAM Tokens may be impacted by the passing
of restrictive laws, the publication of restrictive or negative opinions, the issuing of
injunctions by national regulators, the initiation of regulatory actions or investigations,
including but not limited to restrictions on the use or ownership of digital tokens such as
IAM Tokens, which may prevent or limit development of the Platform. Given the lack of
crypto-currency qualifications in most countries, each buyer is strongly advised to carry
out a legal and tax analysis concerning the purchase and ownership of IAM Tokens
according to their nationality and place of residence.
General Disclaimer
20
1. Risk of loss of access to IAM Tokens due to loss of credentials:
2. Risks associated with the buyer’s credentials:
4. Risk of an alternative, unofficial Platform:
5. Risk of a lack of interest in the Platform or distributed applications:
3. Legal risk and risk of adverse regulatory intervention in one or more jurisdictions:
The main right associated with IAM Tokens is the right to access the Platform, and the
right to initiate identification processes using the Platform. The value of the IAM Tokens is
therefore heavily correlated with the development and adoption of the Platform which has
not yet been fully implemented. IAM Tokens may lose part or all of their value if the
Platform and/or network is never fully developed.
6. Risk that the Platform is not developed:
Part of the Platform‘s core software is based open source software. There is a risk that the third
parties, may intentionally or unintentionally introduce weaknesses or bugs into the core infrastructure
elements of the Platform, by interfering with the use of, or causing loss of, IAM Tokens.
Advances in cryptography, or technical advances such as the development of quantum
computers, may present risks for crypto-currencies and the Platform, which could result in
the theft or loss of IAM Tokens.
As with other decentralized cryptographic tokens and crypto-currencies, the blockchain
used for the Platform is vulnerable to mining attacks, including but not limited to, dual-
expense attacks, powerful mining attacks, selfish mining attacks, and critical competition
attacks. Any successful attack poses a risk to the Platform, the expected performance
and sequencing of the Company’s markets. Despite the best efforts of the Company’s
team, the risk of known or new mining attacks exists.
Hackers or other malicious or criminal groups or organizations may attempt to interfere with the
Platform or the availability of IAM Tokens in several ways including, but not limited to, denial of
service attacks, Sybil attacks, mystification, surfing, malware attacks, or consensus-based attacks.
21
9. Risk of security weaknesses in the Platform’s core infrastructure software:
10. Risk of weakness or exploitable breakthrough in the field of cryptography:
11. Risk of a mining attack:
8. Risk of theft and piracy:
The Platform is currently under development and may undergo significant redesign prior
to its launch. For a number of reasons, not all buyer expectations concerning the Platform
or IAM Tokens’ form and function may be met on the launch date, including changes in
design, implementation and execution of the Platform.
7. Risk that the Platform, as developed, does not meet buyer expectations:
While IAM Tokens should not be considered an investment, their value is bound to change over
time. This value may be limited if the Platform is not sufficiently used and adopted. In such a case,
there could be few or no markets at the Platform launch, which would limit the value of IAM Tokens.
There are currently no exchanges or trading facilities on which IAM Tokens can be traded. If
such exchanges or trading facilities do develop, they will probably be relatively new and
subject to poorly understood regulatory oversight. They may therefore be more vulnerable to
fraud and default than the established and regulated exchanges that exist for other products.
Should exchanges or trading facilities that represent a substantial part of the IAM Tokens
trading volume be involved in fraud, security failures or other operational problems, the
failures of such exchanges or trading facilities may limit the IAM Tokens’ value or liquidity.
Unlike bank accounts or accounts in other regulated financial institutions, funds held through
the Company are generally uninsured. At present, there are no public or private insurance
agents providing buyers with coverage against a loss of IAM Tokens or a loss of value.
12. Risk of the Platform failing to be used or adopted:
13. Risk of a tight market for IAM Tokens:
14. Risk of an uninsured loss:
For a number of reasons including, but not limited to, an unfavorable fluctuation in IAM Tokens
value, the failure of business relationships or competing intellectual property claims, the IAME
project may no longer be a viable activity and may be dissolved or simply not launched.
The Platform may be impacted by an adverse malfunction including, but not limited to, a
malfunction that results in the loss of IAM Tokens or market information.
15. Risk of winding-up of IAME’s project:
16. Risk of malfunction in the Platform:
17. Unforeseen risks:
Crypto-currencies and cryptographic tokens are a new, untested technology. In addition to
the risks stipulated above, there are other risks that the Company’s team cannot predict.
Risks may also occur as unanticipated combinations or as changes in the risks stipulated
herein.
While IAM Tokens should not be considered an investment, their value is bound to change
over time. This value may be limited if the Platform is not sufficiently used and adopted. In
such a case, there could be few or no markets at the Platform launch, which would limit
the value of IAM Tokens.
There are currently no exchanges or trading facilities on which IAM Tokens can be traded.
If such exchanges or trading facilities do develop, they will probably be relatively new and
subject to poorly understood regulatory oversight. They may therefore be more vulnerable
to fraud and default than the established and regulated exchanges that exist for other
products. Should exchanges or trading facilities that represent a substantial part of the
IAM Tokens trading volume be involved in fraud, security failures or other operational
problems, the failures of such exchanges or trading facilities may limit the IAM Tokens’
value or liquidity.
Unlike bank accounts or accounts in other regulated financial institutions, funds held
through the Company are generally uninsured. At present, there are no public or private
insurance agents providing buyers with coverage against a loss of IAM Tokens or a loss of
value.
For a number of reasons including, but not limited to, an unfavorable fluctuation in IAM
Tokens value, the failure of business relationships or competing intellectual property
claims, the IAME project may no longer be a viable activity and may be dissolved or simply
not launched.
The Platform may be impacted by an adverse malfunction including, but not limited to, a
malfunction that results in the loss of IAM Tokens or market information.
Crypto-currencies and cryptographic tokens are a new, untested technology. In addition to
the risks stipulated above, there are other risks that the Company’s team cannot predict.
Risks may also occur as unanticipated combinations or as changes in the risks stipulated
herein.
General Disclaimer
22
12. Risk of the Platform failing to be used or adopted:
13. Risk of a tight market for IAM Tokens:
14. Risk of an uninsured loss:
15. Risk of winding-up of IAME’s project:
16. Risk of malfunction in the Platform:
17. Unforeseen risks:
Business Plan
IAME Limited (Business Registration No.: C1715002)
803, Columbia Court, Cr St Jean Street/Drapers Avenue, Quatre Bornes, 72208, Mauritius