Disclaimer – Unify the People.ca



The information on https://unifythepeople.ca/ Web pages are in the public domain, unless specifically noted otherwise, and may be used without charge for any lawful purpose

Use of the Unify the people name (“unify the people”) and/or visual identifier are protected under trademark law and may not be used without permission from unify the people.

Use of the Unify the people name and/ or visual identifier to identify unaltered unify the people content or links to unify the people web sites are allowable uses. Permission may be requested for this use at https://www.unifythepeople.ca .

Permission is not required to display unaltered unify the people products which include unify the people name or unify the people visual identifier as part of the original product.

Neither the name nor visual identifier may be used.

However, if used in a manner that implies an endorsement or affiliation with unify the people is permissible.

Use of all Information MUST be credited to all the Sovereigns who created and gathered information to educate the FACTS.


Before using information obtained from any Unify the People Web pages, special attention should be given to the date and time of the data and products being displayed.

The user assumes the entire risk related to its use of information on Unify the People Web pages. Unify The People provides such information “as is,” and Unify The People disclaims any and all warranties, whether expressed or implied, including (without limitation) any implied warranties of merchantability or fitness for a particular purpose.

In no event will Unify the People be liable to you or to any third party for any direct, indirect, incidental, consequential, special or exemplary damages or lost profit resulting from any use or misuse of this data.

As required by, third parties producing copyrighted works consisting predominantly of the material appearing on Unify the People Web pages must provide notice with such work(s) identifying the Unify the People material and stating that such material is not subject to copyright protection.






Below are guidelines for the use of all Unify the People website material:

Unify the People has a dedicated mission to provide all users access to information for the protection of life and property and enhancement of their nation. There are numerous Information Technology resources that provide information across different interfaces. We have a responsibility to protect the integrity of these systems and maintain the boundary of any resource limitations. We are constantly monitoring those IT limits and adjusting thresholds that define the abusive usage policy.

Sometimes Unify the People determines that a particular user is impacting our service delivery capability.  To protect our resources and our service level to the greater, our community we may find it necessary to block IP addresses or query types. Users who find that their queries are blocked should send an email to travelingtruthtour.@outlook.com Our IT professionals are happy to work with you to restore your service within the recommended guidelines that are outlined below.

  • Information from Unify the People:

Which is always being updated at significantly different intervals.  Is valuable educational information and is free to all with recognizing the amazing contribution from the Sovereigns.

  • Request data that you need from Unify the People:

The many services that allow for the request of individual data sets and locations.

  • React appropriately to return status and error codes:

If a Web Service isn’t available users should limit the number of retries to 1 minute intervals. If a file is not available do not immediately retry the following second, pause for an appropriate interval based on your data refresh rate.

  • Occasionally check your logs to ensure that you are not requesting invalid links from Unify the People. Products are constantly updated/changed/decommissioned, check your logs to ensure that you are pulling valid data.

Do not attempt any of the following or similar practices:

  • Trojan Horse attack
  • SQL Injection attack
  • Cross Site Scripting attack
  • Command Injection
  • Remote File Inclusion
  • PHP Script Injection


Pin It on Pinterest