USER ACCOUNT TERMS – worldnewsstudio.com (World News Studio or WNS)

DOCUMENT CONTROL
Version: v1.0
Effective Date: 11 February 2026
Last Updated: 11 February 2026
Review Cycle: February 2027 or upon material regulatory change
Accessibility Target: WCAG 2.1 AA (with progression toward WCAG 2.2)
Applies To: worldnewsstudio.com and associated digital services

This Policy is necessarily detailed due to the global scope, legal complexity, and public-interest responsibilities of the Platform. It is written in formal governance language to ensure clarity, consistency, and reliability across jurisdictions.


 These User Account Terms govern the creation, maintenance, security, use, recovery, suspension, and termination of all user accounts across WNS platforms, including websites, mobile applications, APIs, newsletters, community features, citizen-journalism portals, digital products, and subscription systems.

ACCESSIBILITY, EQUAL ACCESS, AND ACCOUNT SERVICE INCLUSION

These User Account Terms are published and maintained in alignment with:

  • WCAG 2.1 and WCAG 2.2 success criteria
  • EU Web Accessibility Directive (EU) 2016/2102
  • UK Equality Act 2010 (digital service access)
  • Americans with Disabilities Act (ADA) Title III jurisprudence
  • India Rights of Persons with Disabilities Act, 2016
  • Canada Accessible Canada Act
  • Australia Disability Discrimination Act
  • Comparable disability-access and non-discrimination laws across:
    • Africa
    • Middle East
    • Latin America
    • Central Asia
    • Asia-Pacific

WNS undertakes ongoing good-faith efforts to ensure that:

  • Account creation forms are screen-reader compatible
  • Security challenges (e.g., CAPTCHA) include accessible alternatives
  • Account recovery processes do not unfairly exclude persons with disabilities

Accessibility concerns may be reported via:

  • Accessibility Statement
  • Accessibility Compliance Technical Statement (WCAG)
  • Grievance Redressal Policy

LEGAL INTEGRATION AND POLICY HIERARCHY

These User Account Terms operate together with:

Hierarchy in Case of Conflict

  1. Governing law and binding court orders
  2. Terms of Service
  3. Privacy and data-protection policies
  4. These User Account Terms
  5. Operational and community policies

1. PURPOSE AND ROLE OF USER ACCOUNTS

1.1 Why Accounts Exist

User accounts may be required to:

  • Access subscriptions
  • Comment on articles
  • Submit content
  • Receive personalized alerts
  • Purchase digital or physical products
  • Participate in community forums
  • Access APIs or partner tools

1.2 Public-Interest Orientation of Account Systems

WNS recognizes that accounts:

  • Enable civic participation
  • Facilitate whistleblowing and citizen journalism
  • Support emergency communications

Therefore, account systems are governed by:

  • Safety-first principles
  • Human-rights-aligned governance
  • Legal compliance frameworks

1.3 License Nature of Account Access

User accounts constitute revocable licenses to access WNS services and do not create property rights, ownership interests, or transferable digital assets unless expressly provided in a separate written agreement.

Access to accounts may be modified, suspended, or discontinued for operational, security, legal, or maintenance reasons without constituting breach of these Terms.

2. ELIGIBILITY, LEGAL CAPACITY, AND AGE REQUIREMENTS

2.1 Legal Capacity to Register

By creating an account, the user confirms that they:

  • Have legal capacity to enter contracts
  • Are not barred from services by law

Where acting for an organization, the user confirms:

  • Authority to bind that entity

2.2 Minimum Age Rules

Users must meet minimum age requirements under:

🇺🇸 United States

  • COPPA (under 13 restrictions)

🇪🇺 European Union

  • GDPR-K age thresholds (13–16 depending on country)

🇬🇧 United Kingdom

  • Age Appropriate Design Code

🇮🇳 India

  • IT Rules and child-safety frameworks

🌍 Other Regions

  • National child-protection statutes across Africa, Middle East, Asia, and Latin America

Where required, WNS may:

  • Restrict features
  • Require parental consent
  • Apply youth-appropriate defaults

2.3 Jurisdiction-Based Restrictions

Accounts may be restricted in jurisdictions subject to:

  • Economic sanctions
  • Export controls
  • Platform licensing bans

WNS does not guarantee:

  • Account availability in all countries

Compliance with sanctions, export-control laws, or government access restrictions shall not constitute breach of these Terms.

3. ACCOUNT CREATION AND REGISTRATION PROCESS

3.1 Required Information

Account registration may require:

  • Name or display name
  • Email address or phone number
  • Password or authentication credential
  • Country or region

Additional verification may be required for:

  • Subscriptions
  • Contributor programs
  • Payment services

3.2 Accuracy and Truthfulness Obligations

Users must provide:

  • Accurate
  • Complete
  • Non-misleading information

Impersonation, identity theft, or false affiliation is prohibited.

Users remain solely responsible for representations made through their accounts and for ensuring that use of pseudonyms does not infringe intellectual property, publicity, or identity rights of third parties.


3.3 Pseudonymity and Anonymity

WNS permits pseudonyms in:

  • Comments
  • Community discussions
  • Citizen reporting submissions

However:

  • Legal compliance may require identity verification in some cases
  • Payment and contractual services require verified identity

4. AUTHENTICATION, CREDENTIAL SECURITY, AND USER RESPONSIBILITIES

4.1 User Responsibility for Account Security

Users are responsible for:

  • Safeguarding passwords
  • Protecting authentication devices
  • Logging out of shared computers

4.2 Prohibited Credential Practices

Users must not:

  • Share passwords
  • Sell account access
  • Circumvent security features

4.3 Compromised Account Reporting

Users must promptly report:

  • Suspected hacking
  • Phishing incidents
  • Unauthorized access

WNS will undertake good-faith efforts to:

  • Secure affected accounts
  • Prevent further misuse

4.4 Two-Factor Authentication (2FA)

Where available, users are encouraged to:

  • Enable multi-factor authentication

WNS may mandate enhanced security for:

  • High-risk accounts
  • Contributor and administrator roles

5. MULTI-DEVICE, SHARED ACCESS, AND INSTITUTIONAL ACCOUNTS

5.1 Personal Account Limitations

Personal accounts are generally intended for:

  • Individual use only

Excessive concurrent logins may trigger:

  • Security reviews
  • Temporary restrictions

5.2 Family and Group Plans

Where offered, group subscriptions may permit:

  • Limited shared access

Subject to:

  • Usage caps
  • Authentication controls

5.3 Institutional and Enterprise Accounts

Educational institutions, media partners, and corporate clients may receive:

  • Multi-user access
  • Administrative dashboards

Governed by:

  • Separate enterprise agreements
  • Data-processing addenda

6. ACCOUNT VERIFICATION AND IDENTITY CONFIRMATION

6.1 Situations Requiring Verification

WNS may request identity verification for:

  • Payment disputes
  • Fraud investigations
  • Legal compliance
  • Contributor accreditation

6.2 Verification Methods

Verification may involve:

  • Email confirmation
  • SMS codes
  • Government ID submission (where lawful and necessary)

6.3 Data-Protection Safeguards

Verification data is processed under:

  • Privacy Policy
  • Data Protection & User Rights Statement

and is:

  • Access-restricted
  • Retained only as legally required

7. USER PROFILE INFORMATION AND PUBLIC VISIBILITY

7.1 Public vs Private Fields

Users may choose to display:

  • Display name
  • Bio
  • Profile image

Other data remains private unless:

  • Required for lawful disclosure

7.2 Search Engine Indexing

Public profiles may be:

  • Indexed by search engines

Users may adjust visibility where settings permit.

WNS does not guarantee uniform visibility, ranking, or discoverability of user profiles or content across regions, devices, or users.

8. ACCOUNT MISUSE, FRAUD PREVENTION, AND RISK DETECTION

8.1 Types of Prohibited Account Misuse

Users must not use accounts for:

  • Identity theft
  • Impersonation of public officials or journalists
  • Financial fraud
  • Phishing or scam campaigns
  • Coordinated harassment
  • Disinformation operations
  • Manipulation of rankings or polls
  • Circumvention of paywalls or security systems

WNS does not undertake a general obligation to monitor all user activity but may act upon detection of risks or lawful notice.

8.2 Automated Risk Monitoring Systems

WNS may deploy:

  • Behavioral anomaly detection
  • Device fingerprinting (where lawful)
  • IP reputation screening
  • Velocity and pattern analysis

To identify:

  • Compromised accounts
  • Bot-driven behavior
  • Coordinated inauthentic activity

8.3 Human Review and Editorial Oversight

Automated detection outputs may be reviewed by:

  • Trust and safety teams
  • Editorial compliance officers
  • Fraud investigation units

Particularly where actions may affect:

  • Journalists
  • Whistleblowers
  • Political activists
  • Human-rights defenders

8.4 Global Legal Frameworks Governing Fraud Monitoring

Monitoring practices comply with:

🌐 International Standards

  • UN Guiding Principles on Business and Human Rights
  • OECD Privacy Guidelines

🇪🇺 European Union

  • GDPR lawful-basis and proportionality principles
  • ePrivacy restrictions on device identifiers

🇬🇧 United Kingdom

  • UK GDPR
  • Investigatory Powers safeguards

🇺🇸 United States

  • State privacy laws (CCPA/CPRA, VCDPA, CPA, CTDPA, UCPA)
  • FTC unfair practices oversight

🇮🇳 India

  • DPDP Act, 2023
  • IT Act reasonable security practices

🌍 Africa, Middle East, Latin America, Central Asia, Asia-Pacific

Including privacy and cybercrime laws of:
South Africa, Nigeria, Kenya, Egypt, Morocco, UAE, Saudi Arabia, Israel, Turkey, Brazil, Mexico, Argentina, Colombia, Peru, Pakistan, Bangladesh, Sri Lanka, Nepal, Kazakhstan, Uzbekistan, Japan, Korea, Singapore, Indonesia, Australia, and others.

Use of a WNS account does not create agency, partnership, employment, or joint-venture relationships between users and WNS.


9. GRADUATED ENFORCEMENT AND ACCOUNT RESTRICTIONS

9.1 Proportional Enforcement Model

WNS applies graduated responses based on:

  • Severity of violation
  • Repetition
  • Risk to others
  • Legal mandates

9.2 Types of Enforcement Actions

Actions may include:

  • Warning notices
  • Temporary feature restrictions
  • Temporary suspension
  • Permanent termination
  • Device or IP blocking (where lawful)

9.3 Emergency Suspension Authority

Accounts may be immediately suspended where:

  • Child exploitation risk exists
  • Terrorist activity is suspected
  • Imminent harm is likely
  • Legal orders require immediate action

9.4 Cross-Policy Enforcement Integration

Account actions may result from violations of:

  • Community Guidelines
  • Editorial interference rules
  • Payment fraud detection
  • Notice-and-Action outcomes
  • National security mandates

Enforcement actions affecting accounts do not constitute public accusations of criminal conduct or factual determinations of wrongdoing.

10. ACCOUNT RECOVERY, VERIFICATION, AND APPEALS

10.1 Recovery From Compromised Accounts

Where accounts are hijacked, WNS may require:

  • Identity re-verification
  • Email or phone confirmation
  • Payment method verification (if applicable)

10.2 Appeal of Enforcement Actions

Where permitted by law, users may:

  • Appeal suspensions
  • Challenge content-linked restrictions

Appeals may be reviewed by:

  • Human moderators
  • Legal compliance teams

Filing an appeal does not automatically stay or suspend enforcement actions unless required by mandatory law.

10.3 Timelines and Practical Limitations

While WNS undertakes good-faith efforts to:

  • Review appeals promptly

WNS cannot guarantee:

  • Restoration of all accounts
  • Reversal where law requires termination

WNS is not required to disclose internal fraud-detection methodologies, security protocols, or confidential risk indicators during appeal review.

10.4 External Remedies Preserved

Nothing in this process limits:

  • Court access
  • Regulatory complaints
  • Ombudsman proceedings

Available under national law.


11. DORMANT, INACTIVE, AND ABANDONED ACCOUNTS

11.1 Dormancy Criteria

Accounts may be considered dormant if:

  • No login activity occurs over extended periods
  • No active subscriptions exist

11.2 Data Minimization and Account Cleanup

WNS may:

  • Anonymize inactive profiles
  • Delete obsolete data

Consistent with:

  • Data-minimization principles

11.3 Prior Notice Where Required

Where legally required, WNS may provide:

  • Advance notice before deletion

12. DEATH, INCAPACITY, AND LEGACY ACCOUNT HANDLING

12.1 Recognition of Digital Legacy Issues

WNS recognizes that:

  • Accounts may outlive users
  • Content may have historical value

12.2 Requests From Legal Representatives

Where lawful, WNS may process requests from:

  • Executors
  • Next of kin
  • Court-appointed administrators

Subject to:

  • Proof of authority
  • Privacy obligations

12.3 Archival Preservation of Journalistic Contributions

Where appropriate, WNS may:

  • Preserve content for public record
  • Remove personal profile identifiers

12.4 Global Legal Context

Legacy handling is governed by:

  • Succession laws
  • Data protection statutes
  • Probate procedures

Across jurisdictions worldwide.


13. DATA PORTABILITY AND EXPORT OF ACCOUNT DATA

13.1 Right to Data Portability

Users may request:

  • Export of personal data

Under laws including:

  • GDPR
  • UK GDPR
  • DPDP Act (India)
  • LGPD (Brazil)
  • POPIA (South Africa)

13.2 Format and Technical Feasibility

Exports may be provided in:

  • Structured, commonly used formats

Subject to:

  • Technical feasibility
  • Security safeguards

13.3 Limits to Portability

Portability may not include:

  • Trade secrets
  • Security-sensitive data
  • Information about other users

14. ACCOUNT DELETION AND RIGHT TO ERASURE

14.1 User-Initiated Deletion

Users may request:

  • Permanent account deletion

Through:

  • Account settings
  • Data rights request channels

14.2 Legal Limits on Deletion

Certain data may be retained for:

  • Legal compliance
  • Fraud prevention
  • Dispute resolution

As permitted by law.


14.3 Public Content and Archival Considerations

Deletion of accounts does not necessarily remove:

  • Public-interest journalism
  • Archived investigative content

Where removal would:

  • Undermine historical record
  • Conflict with freedom-of-expression obligations

Retention of journalistic or public-interest content does not imply endorsement of former account holders.

15. ACCOUNT DATA AFTER TERMINATION

15.1 Residual Data Processing

After termination, limited data may be retained to:

  • Enforce bans
  • Prevent re-registration abuse
  • Meet legal obligations

15.2 Anonymization and Aggregation

Where feasible, data may be:

  • Anonymized
  • Aggregated for research or transparency reporting

16. IDENTITY VERIFICATION, KYC, AND RISK-BASED AUTHENTICATION

16.1 Situations Requiring Identity Verification

WNS may require enhanced verification where:

  • Financial transactions occur
  • Refund disputes arise
  • Contributor accreditation is requested
  • Legal compliance requires identity confirmation
  • Fraud or abuse investigations are underway

16.2 Verification Methods

Verification may include, subject to local law:

  • Government-issued ID upload
  • Video verification
  • Bank or card micro-transactions
  • Trusted third-party verification services

16.3 Global Legal Framework Governing Verification

Verification practices are designed to comply with:

🌐 International Principles

  • FATF risk-based approach to customer due diligence
  • UN Business and Human Rights proportionality standards

🇪🇺 European Union

  • AML Directives (where financial services apply)
  • GDPR data minimization and purpose limitation

🇬🇧 United Kingdom

  • Money Laundering Regulations
  • UK GDPR

🇺🇸 United States

  • KYC expectations for payment services
  • State biometric privacy laws where applicable

🇮🇳 India

  • IT Act reasonable security practices
  • DPDP Act lawful processing
  • RBI KYC rules (where payment services intersect)

🌍 Africa, Middle East, Latin America, Central Asia, Asia-Pacific

Including identity and AML frameworks of:
South Africa, Nigeria, Kenya, Egypt, Morocco, UAE, Saudi Arabia, Qatar, Israel, Turkey, Brazil, Mexico, Argentina, Colombia, Peru, Pakistan, Bangladesh, Sri Lanka, Nepal, Kazakhstan, Uzbekistan, Japan, South Korea, Singapore, Indonesia, Australia, New Zealand, and others.


16.4 Data Protection in Verification

Verification data is:

  • Encrypted at rest and in transit where feasible
  • Access-restricted to compliance personnel
  • Retained only for legally required durations

Verification processes reduce risk but do not guarantee absolute accuracy of identity claims.

16.5 Good-Faith Safety Commitment

WNS undertakes good-faith efforts to:

  • Minimize identity data collection
  • Protect contributors and journalists from exposure
  • Avoid unnecessary verification where risk is low

within practical and legal limits.


17. PAYMENT-LINKED ACCOUNTS AND FINANCIAL SECURITY

17.1 Integration With Subscription and Commerce Systems

Accounts may be linked to:

  • Subscription billing
  • Digital product purchases
  • Physical goods orders
  • Donations or paid contributions

17.2 Financial Fraud Prevention

WNS may monitor for:

  • Chargeback abuse
  • Stolen card usage
  • Subscription manipulation

Using:

  • Transaction risk scoring
  • Payment provider alerts

17.3 Global Financial Compliance Context

Financial security measures align with:

  • PCI-DSS standards
  • AML regulations
  • Consumer protection laws

Across jurisdictions including:

US, EU, UK, India, China, Japan, Korea, Singapore, Australia, Brazil, South Africa, UAE, Saudi Arabia, and others.


17.4 Separation of Financial and Editorial Access

Payment disputes do not:

  • Influence editorial treatment
  • Affect news coverage decisions

17.5 Limitation of Liability

To the maximum extent permitted by law, liability arising from account access, suspension, termination, or security incidents is governed by the Risk Disclosure & Limitation of Liability Policy.

18. CONTRIBUTOR, JOURNALIST, AND SPECIAL ACCOUNT CATEGORIES

18.1 Types of Special Accounts

WNS may designate:

  • Staff journalist accounts
  • Freelance contributor accounts
  • Citizen journalist verified accounts
  • Institutional partner accounts
  • Researcher or academic access accounts

18.2 Additional Obligations for Contributors

Contributor accounts must comply with:

  • Code of Ethics
  • Code of Conduct
  • Editorial Policy
  • Conflicts of Interest Disclosure Policy

Contributor status does not create employment, fiduciary, or agency obligations unless expressly defined in a separate written agreement.

18.3 Verification and Accreditation

Contributor verification may include:

  • Identity confirmation
  • Professional credentials
  • Reference checks

18.4 Safety Considerations for High-Risk Contributors

Where contributors operate in:

  • Conflict zones
  • Authoritarian environments

WNS undertakes good-faith efforts to:

  • Minimize public exposure
  • Secure communications

subject to:

  • Technical feasibility
  • Legal constraints

19. GOVERNMENT AND LAW-ENFORCEMENT ACCESS TO ACCOUNT DATA

19.1 Legal Process Requirement

WNS discloses account data only when:

  • Legally required
  • Valid legal process is received

WNS does not provide voluntary bulk access to user data absent lawful compulsion.

19.2 Types of Requests

Requests may include:

  • Subscriber information
  • Login records
  • Transaction data
  • Content submissions

19.3 Jurisdictional Standards

Access is governed by:

🌐 International Law

  • ICCPR privacy protections
  • UN surveillance proportionality guidance

🇪🇺 Europe

  • Law Enforcement Directive
  • ECHR jurisprudence

🇬🇧 UK

  • Investigatory Powers Act

🇺🇸 US

  • Stored Communications Act
  • FISA frameworks

🇮🇳 India

  • Criminal Procedure Code
  • IT Act interception rules

🇨🇳 China

  • National Intelligence Law cooperation duties

🇷🇺 Russia

  • Yarovaya Law retention and access mandates

🌍 Other Regions

Including surveillance laws of:
Pakistan, Bangladesh, Sri Lanka, Nepal, Japan, Korea, Singapore, Indonesia, Turkey, Israel, UAE, Saudi Arabia, Egypt, South Africa, Nigeria, Kenya, Brazil, Mexico, Argentina, Colombia, Peru, and Central Asian states.


19.4 User Notification

Where lawful, WNS undertakes good-faith efforts to:

  • Notify affected users
  • Provide general legal context

20. CROSS-BORDER DATA TRANSFERS AND DATA LOCALIZATION

20.1 Global Data Infrastructure

WNS may store and process data in:

  • Multiple countries
  • Cloud service regions

20.2 Transfer Safeguards

Cross-border transfers rely on:

  • Contractual safeguards
  • Security controls
  • Regulatory compliance mechanisms

20.3 Localization Conflicts

Some countries require:

  • Local storage of citizen data

Including laws in:

China, Russia, Vietnam, Indonesia, Turkey, Saudi Arabia, Nigeria, and others.

Where conflicts arise, WNS may:

  • Localize data
  • Restrict services
  • Modify features

20.4 No Absolute Guarantee of Cross-Border Uniformity

Due to:

  • Sovereign legal differences
  • Infrastructure limitations

Service experience may differ by region.


21. ENTERPRISE AND INSTITUTIONAL ADMINISTRATOR RIGHTS

21.1 Administrative Controls

Institutional accounts may include:

  • User provisioning tools
  • Access revocation capabilities
  • Usage analytics dashboards

21.2 Responsibility of Administrators

Administrators must:

  • Comply with employment and labor laws
  • Respect user privacy rights

21.3 Data Processing Agreements

Enterprise services are governed by:

  • Data processing addenda
  • Contractual confidentiality obligations

21.4 Employee Privacy Safeguards

WNS does not provide employers with:

  • Private content
  • Personal messages

unless:

  • Legally compelled

22. INTEROPERABILITY WITH THIRD-PARTY AUTHENTICATION SERVICES

22.1 Social Login and Federated Identity

WNS may allow login via:

  • Third-party identity providers

22.2 Responsibility Allocation

Third-party authentication is governed by:

  • Provider privacy policies
  • Separate contractual terms

WNS is not responsible for:

  • Provider data practices

22.3 Revocation and Disconnection

Users may disconnect:

  • Third-party logins

subject to:

  • Alternative recovery methods

23. ACCESSIBILITY ACCOMMODATIONS IN ACCOUNT SERVICES

23.1 Commitment to Inclusive Account Access

WNS undertakes ongoing good-faith efforts to ensure that:

  • Account creation
  • Login systems
  • Security verification
  • Account management dashboards

are accessible to users with:

  • Visual impairments
  • Hearing impairments
  • Motor limitations
  • Cognitive disabilities

23.2 Technical Accessibility Measures

Measures may include:

  • Screen-reader compatibility
  • Keyboard navigation
  • Text alternatives for images
  • Adjustable time limits for authentication steps

23.3 Alternative Verification Channels

Where automated systems create barriers, WNS may offer:

  • Manual support review
  • Email-based verification

subject to:

  • Identity protection safeguards

23.4 Global Accessibility Law Compliance

Accessibility commitments align with:

  • WCAG 2.1 and WCAG 2.2
  • ADA (United States)
  • Equality Act (UK)
  • Rights of Persons with Disabilities Act (India)
  • EU accessibility legislation
  • Disability laws across Africa, Middle East, Latin America, Asia-Pacific

24. ALGORITHMIC DECISION-MAKING AND EXPLANATION RIGHTS

24.1 Use of Automated Systems

Automated tools may assist with:

  • Fraud detection
  • Abuse prevention
  • Spam filtering

24.2 Human Oversight Safeguards

No account termination decision relies solely on automation where:

  • Significant rights are affected
  • Law requires human review

24.3 Explanation and Appeal Rights

Where required by law, users may:

  • Request explanation of decisions
  • Seek human review

In compliance with:

  • GDPR Article 22
  • AI governance laws in EU, China, and emerging regimes

Automated systems assist risk mitigation and do not constitute legal judgments, governmental findings, or criminal determinations.

25. ANTI-DISCRIMINATION AND EQUAL TREATMENT

25.1 Non-Discrimination Commitment

Account services are provided without discrimination based on:

  • Nationality
  • Religion
  • Political views
  • Gender or sexual orientation
  • Disability
  • Ethnic origin

25.2 Bias Mitigation in Automated Systems

WNS undertakes ongoing efforts to:

  • Test algorithms for disparate impact
  • Adjust risk models where bias is detected

25.3 Legal Frameworks Supporting Equal Treatment

Including:

  • UN human rights treaties
  • National anti-discrimination statutes worldwide

26. USER EDUCATION AND SECURITY AWARENESS

26.1 Safety Education Initiatives

WNS may provide:

  • Security tips
  • Scam warnings
  • Privacy controls explanations

26.2 Journalist and Contributor Training

Special training may be offered for:

  • Secure communications
  • Digital hygiene
  • Source protection

27. POLICY UPDATES, VERSION CONTROL, AND USER NOTICE

27.1 Right to Modify Account Rules

WNS may update these Terms to reflect:

  • Legal developments
  • New features
  • Security threats

27.2 Notice of Material Changes

Where required, notice may be provided via:

  • Website postings
  • Email notifications
  • In-app alerts

27.3 Historical Version Access

Previous versions may be archived for:

  • Transparency
  • Regulatory review

28. LEGAL INTEGRATION AND ENTIRE AGREEMENT

These User Account Terms operate in conjunction with:

  • Terms of Service
  • Privacy Policy
  • Data Protection & User Rights Statement
  • Subscription and Billing Policies
  • Community and Editorial Policies

Together forming:

  • The complete account governance framework

29. SEVERABILITY, NON-WAIVER, AND ASSIGNMENT

29.1 Severability

Invalid provisions do not affect remaining clauses.


29.2 Non-Waiver

Failure to enforce does not waive future rights.


29.3 Assignment

WNS may assign rights in case of:

  • Merger
  • Acquisition
  • Corporate restructuring

Nothing in these Terms shall be construed as creating collective or class-based liability beyond individual contractual limits, except where mandatory law provides otherwise.

30. FINAL GOVERNING LAW AND JURISDICTION

30.1 Governing Law

These User Account Terms are governed by:

Laws of India


30.2 Exclusive Jurisdiction

All disputes shall be subject to:

Courts at Srinagar, Jammu & Kashmir, India


30.3 Mandatory Local Law Carve-Out

Nothing limits:

  • Consumer protection rights
  • Data-protection enforcement
  • Criminal jurisdiction of authorities

in user countries.


31. FINAL DECLARATION OF USER-RIGHTS COMMITMENT

WNS acknowledges that user accounts are:

  • Gateways to information
  • Tools of civic participation
  • Channels for journalistic contribution

Accordingly, WNS commits to:

  • Protecting account security
  • Respecting privacy and dignity
  • Providing appeal and review mechanisms
  • Improving accessibility and inclusion

while recognizing that:

  • Absolute security cannot be guaranteed
  • Legal conflicts may require restrictions
  • Platform abuse risks evolve constantly

This Policy reflects WNS’s institutional commitment to:

  • Ethical platform governance
  • Human-rights-aligned digital services
  • Responsible global operations

Contact & Official Communication

Primary Contact Officer
Akhtar Badana
info@worldnewsstudio.com

Phone: +91-9419061646

Correspondence & PR Office
1st Floor, Bhat Complex
Near Astan, Airport Road
Humhama, Srinagar – 190021
Jammu & Kashmir, India

Editorial & Media: editor@worldnewsstudio.com

Grievances: grievances@worldnewsstudio.com

Legal, privacy & Compliance: legal@worldnewsstudio.com

Advertising: advertise@worldnewsstudio.com

Editorial correspondence does not substitute for formal legal or grievance submissions. Grievance submissions are subject to preliminary review for completeness prior to formal registration.