1. Introduction

Our site encompasses content created by Makeup Mafia, its advertisers or partners, and users. By accessing the Service, you acknowledge Makeup Mafia’s ownership of all intellectual property rights associated with the Service, including logos and trademarks.

  1. Intellectual Property Rights

Neither Makeup Mafia nor its users or partners grant you a license or authorization to utilize any intellectual or industrial property rights related to the site, its content, or services. Unauthorized modification, reproduction, distribution, or exploitation of site resources is strictly prohibited.

  1. Responsibility for Your Content

You are solely responsible for all content you upload, transmit, or make available on our site (“Your Content”). By doing so, you grant us and our affiliates a license to use Your Content for various purposes, including displaying it on our site and distributing it to users.

  1. Content Usage

You may access and use content available on the Service for personal, noncommercial entertainment purposes only. However, your rights with respect to such content are limited by copyright law. You agree not to modify or alter any content obtained through the Service.

  1. License Grant to Makeup Mafia

By providing content and software to our site, software providers grant Makeup Mafia a license to use, adapt, and display such content for public distribution and advertising purposes. We cannot guarantee ad placement or availability, and we reserve the right to refuse or remove any content or ad at our discretion.

  1. Personal Use Only

You confirm that you are using the Service for personal, noncommercial purposes and agree not to redistribute or exploit any content obtained through the Service.

  1. Prohibited User Actions

While using the Service, you agree to refrain from engaging in prohibited activities, including unauthorized use of Makeup Mafia trademarks, tampering with our systems, or attempting to circumvent technological measures protecting the Service. Prohibited actions also include spamming, unauthorized data gathering, and interfering with the access of other users.