Terms + Conditions

 All members acknowledge and agree that the information they provide shall be honest and accurate as to his or her personal details. Each member acknowledges and agrees that any information he or she submits to Join WONDERLAND LLC for publication can be used, unconditionally and without restriction, by Join WONDERLAND LLC. Members also agree not to:

 

 

6. Content Management Policy & Procedures

6.1 Purpose
This document establishes the policies and procedures for managing, reviewing, and monitoring content on WONDERLAND’s website(s) and platforms, including live streaming. It ensures that all content complies with legal standards, Card Brand rules, and internal guidelines while protecting users and the organization from unlawful or harmful material.

6.2 Scope
This policy applies to all content providers, users, employees, contractors, and third-party vendors involved in content creation, publication, and moderation on WONDERLAND’s platforms.

6.3 Definitions

  • Content Provider: Any individual or entity that submits or creates content for publication.
  • Content: All multimedia material including text, images, videos, and live-streamed material produced by educators and experts.
  • Prohibited Content: Material that is illegal, violates Card Brand rules, promotes human trafficking, sex trafficking, physical abuse, prostitution, or includes marketing/search terms alluding to child exploitation, non-consensual activities, or other illegal conduct.
  • Verification: The process by which a content provider’s identity and age are confirmed using appropriate documentation.
  • Live Streaming: Real-time broadcasting of content over the internet.

6.4 Age and Identity Verification of Content Providers

  • Verification Process:
    a. Prior to content publication rights being granted, all content providers must submit government-issued identification and any other required documentation.
    b. Verification confirms that the provider is at least 18 years old.
  • Third-Party Verification:
    Third-party service provider, VERIFF.com is contracted to perform secure and reliable identity and age verification. Contracted dated 3/11/25
  • Record Keeping:
    All verification documents and related records will be securely stored in accordance with data protection laws and retained for the duration required by regulatory standards.

6.5 Content Review Process (Prior to Publishing)

  • Submission Requirements:
    All submitted content must include the necessary verification documents and must comply with all relevant policies.
  • Review Procedure:
    a. Manual Review: Content flagged by automated systems or identified as sensitive is reviewed by trained content moderators.
    b. Expert Content Review: Approved content is published; content that does not meet compliance standards is rejected. All decisions and the rationale for rejections are documented in a secure log.
  • Feedback:
    Content providers are notified of any issues with their submissions and provided with guidance for remediation or an appeals process if applicable.

6.6 Real-Time Platform Monitoring and Content Removal for Live Streaming

  • Monitoring Tools:
    a. The live stream function is only available to trusted partners, educators and experts, members do not have access to this feature for pre-planned slots for workshops and clubs (ie. book club, wellness workshops, Q+As with authors, toy manufacturers, founders of on-profits and charitable causes, etc.)
    b. The monitoring systems are configured to detect violations such as the display of illegal or prohibited content.
  • Intervention Procedures:
    a. If a violation is detected during a live stream, the stream will be immediately interrupted or taken offline.
    b. Moderators will investigate the incident in real time and take necessary actions, including the removal of offending content.
  • Post-Incident Review:
    All live-stream incidents are logged and reviewed to refine detection and enforcement protocols and to ensure ongoing compliance.

6.7 Handling Prohibited, Illegal, or Otherwise Violating Content

  • Content Standards:
    Prohibited content includes, but is not limited to, any material that:
    • Is illegal or violates Card Brand rules.
    • Promotes or facilitates human trafficking, sex trafficking, physical abuse, or prostitution.
    • Contains marketing or search terms that allude to child exploitation, non-consensual activities, or other illegal behaviors.
  • Removal Process:
    a. Any content identified as violating these policies will be promptly removed from the platform.
    b. The content provider will be notified of the removal, and a record of the action will be maintained.
    c. Providers may initiate an appeal process if they dispute the removal decision.
  • Disciplinary Actions:
    Repeated or egregious violations may result in content provider suspension, account termination, and, where applicable, legal action.

6.8 Controls to Prevent Promotion or Facilitation of Human Trafficking, Sex Trafficking, Physical Abuse, or Prostitution

  • Policy Statement:
    The platform shall not be used to promote, facilitate, or support activities related to human trafficking, sex trafficking, physical abuse, or prostitution.
  • Technical and Procedural Safeguards:
    a. Automated detection systems are configured to screen for content indicative of trafficking, abuse, or prostitution.
    b. Content flagged by these systems is immediately reviewed by the moderation team.
    c. In cases of confirmed violations, content is removed and the content provider’s access may be suspended or terminated.
  • Third-Party Assistance:
    Our risk management and content safety partners assist in monitoring and enforcing these controls to ensure a safe environment.

6.9 Prohibited Marketing and Search Terms

  • Marketing Guidelines:
    a. Use of marketing or search terms that reference child exploitation, non-consensual activities, or any form of illegal behavior is strictly prohibited.
    b. Content providers must ensure that their marketing materials do not include language or imagery that could be interpreted as encouraging or endorsing such activities.
  • Enforcement:
    a. Automated systems monitor all marketing and search terms for compliance.
    b. Any detected violations result in content removal and may trigger further disciplinary actions against the provider.

6.10 Written Agreement and Consent from All Content Providers

  • Agreement Requirement:
    a. All content providers must sign a written agreement confirming that they have read, understood, and agree to abide by these policies and procedures.
    b. This agreement includes explicit consent for the use, modification, and publication of content in accordance with the platform’s guidelines.
  • Record Keeping:
    Signed agreements are stored securely and are accessible for audit and compliance purposes.
  • Periodic Updates:
    Consent documents will be reviewed and updated as needed to reflect changes in policy or legal requirements.

6.11 Roles and Responsibilities

  • Content Moderation Team:
    Responsible for reviewing submitted content, performing manual reviews, and enforcing content standards across the platform.
  • Compliance Team:
    Ensures that all content management processes meet legal and regulatory requirements and oversees audits and investigations.
  • IT and Security Team:
    Implements and maintains automated monitoring tools, supports third-party verification systems, and safeguards verification records and content logs.
  • Third-Party Service Providers:
    Providers such as Jumio or IDology for identity verification and other designated content moderation tools assist in maintaining compliance and operational efficiency.

6.12 Training and Continuous Improvement

  • Training Programs:
    Regular training sessions are provided for all staff involved in content management and moderation to stay updated on evolving policies and regulatory requirements.
  • Feedback and Updates:
    This policy and its associated procedures are reviewed annually or as needed based on regulatory changes or feedback from internal audits and stakeholders.
  • Continuous Improvement:
    Data from monitoring systems, user feedback, and audit results are used to continuously enhance content management practices.

6.13 Documentation and Record Keeping

  • Record Maintenance:
    All verification records, content reviews, moderation actions, and removal decisions are documented and stored securely.
  • Access Controls:
    Access to sensitive records is restricted to authorized personnel only and maintained in compliance with applicable data protection regulations.