Business Plan - IAMEThe Initial Coin Offering (hereafter referred to as the “ICO”) project...

31
Business Plan Date: 01 April 2018

Transcript of Business Plan - IAMEThe Initial Coin Offering (hereafter referred to as the “ICO”) project...

Page 1: Business Plan - IAMEThe Initial Coin Offering (hereafter referred to as the “ICO”) project presented by the Company is an unregulated fundraising operation. It poses several risks

Business Plan

Date: 01 April 2018

Page 2: Business Plan - IAMEThe Initial Coin Offering (hereafter referred to as the “ICO”) project presented by the Company is an unregulated fundraising operation. It poses several risks

This business plan (the “Business Plan”) is for information purposes only. The information

contained herein is subject to change. No part of this Business Plan is legally binding or

enforceable, nor is it meant to be, until it has been discussed, reviewed and revised by the

board of directors of IAME Limited (“IAME” or the “Company”). Please do not copy or

disseminate any part of this business plan without including this disclaimer. The final

version of this business plan will be published as soon as adopted.

Nothing in this Business Plan shall be deemed to constitute a prospectus of any sort or a

solicitation for investment, nor does it in any way pertain to an offering or a solicitation of

an offer to buy any securities in any jurisdiction. This document is not composed in

accordance with, and is not subject to, laws or regulations of any jurisdiction, which are

designed to protect investors.

The Initial Coin Offering (hereafter referred to as the “ICO”) project presented by the

Company is an unregulated fundraising operation. It poses several risks to buyers, in

particular, that of losing all amounts traded for tokens issued by the Company (the “IAM

Tokens”).

IAM Tokens are utility tokens and cannot be used for any purposes other than those

provided in the Business Plan, including but not limited to, any investment, speculative or

other financial purposes.

IAM Tokens are not intended for sale or use in any jurisdiction where sale or use of digital

tokens may be prohibited.

IAM Tokens confer no other rights in any form, including but not limited to any ownership,

distribution (including but not limited to profit), redemption, liquidation, proprietary

(including all forms of intellectual property), or other financial or legal rights, other than

those specifically described in the business plan.

Certain statements, estimates and financial information contained in this business plan

constitute forward-looking statements or information. Such forward-looking statements or

information involve known and unknown risks and uncertainties, which may cause actual

events or results to differ materially from the estimates or the results implied or expressed

in such forward-looking statements. This Business Plan can be modified to provide more

detailed information.

This Business Plan is the primary official source of information about the IAM Tokens. The

information contained herein may from time to time be translated into other languages or

used in the course of written or verbal communications with existing and prospective

customers, partners etc. In the course of such translation or communication, some of the

information contained herein may be lost, corrupted, or misrepresented. The accuracy of

such alternative communications cannot be guaranteed. In the event of any conflicts or

inconsistencies between such translations and communications, the provisions of the

english language Business Plan shall prevail.

You acknowledge and agree that there are risks associated with purchasing, holding, and

using IAM Tokens in connection with the Company’s product, services and platform

developed for such products and/or services (hereafter, the “Platform”), as disclosed and

explained in this Business Plan and in the Terms and Condition available at www.iame.io.

If you have any questions regarding these risks, please contact us at [email protected].

BY PURCHASING IAM TOKENS, YOU EXPRESSLY ACKNOWLEDGE AND ASSUME THESE

RISKS. Only people who are fully aware of these risks should participate in the ICO.

General Warning

i

Page 3: Business Plan - IAMEThe Initial Coin Offering (hereafter referred to as the “ICO”) project presented by the Company is an unregulated fundraising operation. It poses several risks

Introduction to IAME

Vision

Truly Decentralised Identification

Comparative Analysis

IAMEconomics

Road to ICO

The Initial Coin Offering

Token Sale Timeline

Building on Ethereum

Token Allocation

Proof of Concept

Development Timeline

Primary Development Targets

Secondary Development Targets

Fundraising Targets

Allocation of Resources

Go-to-Market Strategy

Expectations

Legal Disclaimer

General Disclaimer

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

Table of Contents

Page 4: Business Plan - IAMEThe Initial Coin Offering (hereafter referred to as the “ICO”) project presented by the Company is an unregulated fundraising operation. It poses several risks

I AM ME

Page 5: Business Plan - IAMEThe Initial Coin Offering (hereafter referred to as the “ICO”) project presented by the Company is an unregulated fundraising operation. It poses several risks

Introduction to

IAME

IAME Limited (“IAME”) is a blockchain technology company located in Mauritius. The company focuses on developing transformative systems and solutions for the blockchain - largely centered around identity verification and data security.

The visionaries behind IAME’s project include a team of experts with significant experience in and a commitment to developing and deploying unconventional technologies that are built to address the increasing data security challenges modern businesses are faced with.

IAME’s flagship project is a decentralised fragmented identification system that takes the notion of data security a step further by making compromised information “hack-worthless”!

Our Core Commitment

Developing technologies that significantly mitigate the impact of data breaches.

Transforming identification processes within the blockchain.

Contributing technology that enables greater integration of the blockchain into mainstream spaces.

1

Page 6: Business Plan - IAMEThe Initial Coin Offering (hereafter referred to as the “ICO”) project presented by the Company is an unregulated fundraising operation. It poses several risks

VisionThe biggest issue with the integration of cryptocurrencies into the regulated world is the identification of ownership. Identification was never considered in the original Bitcoin architecture, which is the basis upon which subsequent developments are being made.

While attempts have been made at identification, they do not take into consideration several major issues. Firstly, traditional KYC cannot guarantee that the sender in a cryptocurrency transaction is always the owner. Secondly, cryptocurrency accounts (public key/private key pairs) can be generated anonymously at mass scale. Finally, wholesome data sharing between parties pose a security risk to both counterparties. These are the problems that IAME seeks to resolve.

There is both a technological and economic need for a decentralised identification system. The first being that the identification systems are still highly dependent on humans and are yet to transition into high level automation. Secondly, that the development of a decentralised identification system is commercially viable and yet to be developed.

IAME will be a disruptor in the field of identification and will shift another archaic industry into the crowdsourced economy.

2

Page 7: Business Plan - IAMEThe Initial Coin Offering (hereafter referred to as the “ICO”) project presented by the Company is an unregulated fundraising operation. It poses several risks

Decentralised fragmented identification reinvents the entire identification process by shifting the identification process from systems that transact wholesome data to a system of fragmented data transaction, counterparties now have the ability to validate their blockchain address without having to trust the other transactional parties with their non-essential sensitive information.

Decentralised Fragmented identification immediately renders the data shared within these transactions worthless. This is due to the fact that the data is first fragmented and then distributed among a series of independent third-parties, who are not affiliated to either party operating within the transaction. This network of third-party validators are assigned the task of validating each of these fractured pieces of personal data, which by themselves are useless to malicious parties (in the event of a breach). The compilation of these fragmented validations would constitute and confirm a valid identification to the transactional counterparty, thereby verifying the identity of initiating party.

Many solutions currently available or at the development stage provide validation and authentication via a network of official Validators and Agents - typically comprising formal institutions like banks, financial establishments, utility service providers, to name a few. These systems are rigid and maintain a strict client-agent environment. Our system disrupts and democratises this entirely. As opposed to depending on formal institutions to conduct validation, our system completely democratises the approach by leveraging a completely decentralised and anonymous network of third-party validators.

These individuals receive fragmented pieces of information that on their own mean absolutely nothing. The individual third-party validators would then verify the fragments they receive. The identification process is hashed onto a designated blockchain and made accessible on a public repository where the identification status linked to specific blockchain addresses can be consulted, without compromising the identification data.

3

Fragmented Identification Crowdsourced Validation

Truly Decentralised IdentificationWhile many entities talk about decentralised identification and how this makes data secure, the reality is that data, no matter where it is

transacted, will always be at risk of being breach and compromised. There simply is no way for this to be avoided - as data security technologies improve, so do the technologies and techniques leveraged by hackers and thieves.

Page 8: Business Plan - IAMEThe Initial Coin Offering (hereafter referred to as the “ICO”) project presented by the Company is an unregulated fundraising operation. It poses several risks

4

Functionalities

Data Manipulation

Economics

Hack Risk Assessment

Anti-Money Laundering

Data Storage

User Participation

Man in the Middle Attack

Data Transfer

Token Economics

Database hacking

Counterparty risk

Data Authentication

Cost of Identification

Cryptocurrency Support

Payment System

Sole focus is on KYC - not AML

Client data stored by centralised validators/Agents.

Users are strictly clients paying for a service.

Hackers can intercept wholesome information.

Wholesome and encrypted.

Tokens pool towards centralised Validators/Agents who hold dumping power.

A single breach at the Validators/Agents compromises the entire system.

Counterparties can misappropriate identification documentation.

Data is only authenticated by Validators/Agents.

Cost is determined by Validators/Agents.

No support and integration.

No support and integration - identity validation only.

Anti-Money Laundering processes are native: by identifying cryptocurrency addresses, funds are traceable.

No wholesome data is stored by IAME or its third-party validators. Only boolean metadata is stored on Ethereum.

Users are part of the network and can economically participate in the identification process as third-party validators.

Hackers can only intercept fragments of information.

Data is fragmented, individually encrypted, and transferred through shuffling servers. Intercepted data is of no use to hackers.

In the identification process, IAM Tokens are distributed to the third-party validator network participating in the identification process.

Neither IAME nor its third-party validators holds any wholesome identification data belonging to users. The information fragments and the boolean metadata are of no value to hackers.

Information sharing between counterparties on IAME is restricted to simple information. No wholesome documentation is shared.

Data fragments authentication is crowdsourced to IAME third-party validators.

The crowdsourced process drives the cost of identification to a fraction of traditional identification costs.

IAME is purpose built for Cryptocurrency support with option for fiat integration.

Identification will be integrated into a payment system, minimizing friction between identification and payment.

Comparative Analysis

Page 9: Business Plan - IAMEThe Initial Coin Offering (hereafter referred to as the “ICO”) project presented by the Company is an unregulated fundraising operation. It poses several risks

IAMEconomicsIn the IAME ecosystem, users spend IAM tokens to validate their information, which in turn is distributed to Third Party Validators. The IAM tokens are sold back by same Third Party Validators onto crypto exchanges and the cycle goes on. Because of the ephemeral aspect of data validation in the field of identification demand will be recurring.

IAM Tokens are utility tokens that flow from the people requesting the identification to Third Party Validators validating the fragments. There are several aspects that necessitate a proprietary token:

5

In a single fragment validation transaction there can be thousands of validators involved, hence to enable microtransactions, a highly divisible medium is needed.

By using our IAM Token we can track and ensure that identification requests are not issued from unauthorised parties, this eliminates the risk of fraudulent identification.

Because identity metadata will be stored on Ethereum using an ERC20 Token will ensure that the whole process from identification to validation to information hashing will be streamlined.

Divisibility

Security

Blockchain InteroperabilityThird Party

Validator

User

Exchange

Token Life Cycle

Page 10: Business Plan - IAMEThe Initial Coin Offering (hereafter referred to as the “ICO”) project presented by the Company is an unregulated fundraising operation. It poses several risks

Initial Coin

Offering

Page 11: Business Plan - IAMEThe Initial Coin Offering (hereafter referred to as the “ICO”) project presented by the Company is an unregulated fundraising operation. It poses several risks

Road to ICO

IAME’s ICO will help the team complete its journey towards making vital personal data “hack-worthless”.

The IAME ICO will start on the 4th of July 2018 and will run until the 24th of August.

Initial Coin Offering

IAME is among few blockchain startups to release a working proof of concept prior to initiating an ICO. This is our way of proving what the team is made of. We want contributors to know and to see that they are contributing into a real project.

Proof of Concept

Many blockchain startups initiate an initial coin offering with just an idea in mind. Our team spent months pitching to angel investors to come up with a viable development and go-to-market strategy. As of today, $180,000 has been secured to kickstart development.

From a bootstrapped basement project to a fully fledged start up, the IAME project has come a long way. While most blockchain startups aim straight at an initial coin offering with just an idea in mind, we have opted to take the the long road.

Angel Investment

6

Page 12: Business Plan - IAMEThe Initial Coin Offering (hereafter referred to as the “ICO”) project presented by the Company is an unregulated fundraising operation. It poses several risks

The Initial Coin

Offering

2017 was the year of the Initial Coin Offering, where hundreds of companies created their own cryptographic tokens/coins for a specific product, service, and/or idea to sell to the public.

As a formidable and far more accessible source of financing, ICOs have empowered young start-ups with unprecedented levels of access to finance. ICOs are going to revolutionize the global financial order

For IAME, the objectives of the initial coin offering will go beyond just fundraising and include a commitment to:

Objectives

Raising capital for the development of the IAME Identification Network.

Distributing IAM utility tokens among investors and future users.

Creat ion of awareness on the concept of Decentralised Fragmented Identification.

7

Page 13: Business Plan - IAMEThe Initial Coin Offering (hereafter referred to as the “ICO”) project presented by the Company is an unregulated fundraising operation. It poses several risks

Token Sale TimelineThe IAME token sale will start on the 18th of April 2018 and end on the 24th of August 2018.

The token sale has been separated into three parts: a Private Sale, a Presale and an Initial Coin Offering.

8

8th April to 20th May 2018

Minimum Contribution: 1 ETH

Rate 20,000 IAM/ETH

(ETH and Fiat Only)

6th June to 10th June 2018

Minimum Contribution: 0.5 ETH

Rate 15,000 IAM/ETH

(ETH Only)

20th June to 24th June 2018

Minimum Contribution: 0.1 ETH

Rate 12,500 IAM/ETH

(ETH Only)

4th July to 24th August 2018

No Minimum Contribution: n/a

Rate 10,000 IAM/ETH

(ETH Only)

PRIVATE SALE 2ND PRE SALE

INITIAL COIN OFFERING

1ST PRE SALE

Page 14: Business Plan - IAMEThe Initial Coin Offering (hereafter referred to as the “ICO”) project presented by the Company is an unregulated fundraising operation. It poses several risks

Building on EthereumThe IAM Tokens that will be offered in the IAME initial coin offering will be built as a tailored ERC20 token on Ethereum that makes full use of the Turing Completeness of Solidity.

The contract will contain a payable function that recognises Ether transfer to the contract. Once the Ether is received, the contract will mint IAM Tokens and allocate immediately to the msg.sender. This feature implies that no manual reconciliation will be required for the initial coin offering.

Every time IAM Tokens are created for the msg.sender, an equivalent amount will be created and sent to a reserve pool. 50% of all tokens created will be allocated to the reserve pool, regardless of how many Ether is contributed or the rate applied.

As part of the commitment to transparency by the IAME team, not all Ether raised or IAM Tokens minted will be made available to IAME immediately after the ICO. Part of the Ether and IAM Tokens raised will be locked into Ethereum time based contracts such that they can only be accessed after a specific amount of time has passed.

Auto Mint

Mirrored Mint

Lockbox

Contract Features

9

Page 15: Business Plan - IAMEThe Initial Coin Offering (hereafter referred to as the “ICO”) project presented by the Company is an unregulated fundraising operation. It poses several risks

Token AllocationAll IAM Tokens minted under the reserve system will be allocated to various pools. The token pools are intended to complement the overall development of IAME. The breakdown for those pools is as follows: IAM Token Distribution

Community Pool (10%)

This pool will be allocated for t h e d e v e l o p m e n t o f t h e communi ty around IAME. Bounties operated by IAME will be drawn from this pool, as will be rewards for open source developments headed by IAME.

Advisors Pool (10%)

This pool will be allocated for the advisors of IAME and third parties acting in an advisory or consultancy position to IAME. Beyond simple advice we have been working towards starting actual commercialisation of our solution.

Business Pool (20%)

This pool will be allocated for the business development of IAME. Such cases are being forseen that IAME will engage into token swap agreements with other blockchain companies to assure m u t u a l c o o p e r a t i o n o n a commercial level.

Team Pool (10%)

This pool will be allocated for the founders and the team that are working day and night to bring the development of IAME to fruition.

Advisor Pool

Team Pool

ICO Investors

50%

20%

10%

10%

10%

Business Pool

Community Pool

50%

20%

10%

10%

10%

ICO investors would account for 50% of all IAM tokens, with the remaining 50% allocated to the various pools.

10

Page 16: Business Plan - IAMEThe Initial Coin Offering (hereafter referred to as the “ICO”) project presented by the Company is an unregulated fundraising operation. It poses several risks

Development

Page 17: Business Plan - IAMEThe Initial Coin Offering (hereafter referred to as the “ICO”) project presented by the Company is an unregulated fundraising operation. It poses several risks

Proof of Concept At IAME, development is active, we know where we are going and how to get there, which is why we do not need to wait for the ICO to be completed to start. We come with more than just an idea in mind, we have deployed our Identification Prototype, our Validation Prototype, and the IAME wallet for both iOS and Android.

11

This prototypes enable the user to experience IAME from the identifying user’s perspective.

This prototypes enable the user to experience IAME from the identifying user’s perspective.

The wallet available for both Android and iOS allows p2p transactions and will be upgraded to support identification as development progresses.

Identification Prototype Validation Prototype IAME Wallet

Page 18: Business Plan - IAMEThe Initial Coin Offering (hereafter referred to as the “ICO”) project presented by the Company is an unregulated fundraising operation. It poses several risks

Development TimelineWhile conceptualising our development strategy and approach, we wanted to focus on three specific focus areas:

12

1. Building a comprehensive system that was both scalable and integratable into multiple spaces,

2. Maintaining open channels of development with both crypto-based and traditional businesses, and

3. Prioritising the release of a Minimum Viable product as soon as the ICO is completed.

Proof of Concept

Peer to Peer Payment

KYC Databank Integration

Merchant Gateway

Exchange Integration

IAME Base Identification

Automation Lab

IAME Core Identification

Enterprise Solution

Q1 2018 Q2 2018 Q3 2018 Q4 2018 Q1 2019

Q2 2019Q3 2019Q4 2019Q1 2020

Page 19: Business Plan - IAMEThe Initial Coin Offering (hereafter referred to as the “ICO”) project presented by the Company is an unregulated fundraising operation. It poses several risks

Primary Development TargetsGiven the complexity and applicability of the identification network, our development approach has two phases, primary and secondary, which are dependent on the amount of funds we are able to raise through the ICO. The following are the primary targets that the IAME

team will prioritise with the funds generated initially.

IAME Core• Mobile Android / iOS wallet app.

• Mobile Android/ iOS validator app.

• Mobile API / Backend Services.

• Validation Server.

• Identity server.

Payment Gateway• Payment API/SDK for merchants.

• Cryptocurrency transaction implementation.

• Cryptocurrency transaction authentication.

Exchange Integration• IAME exchange backend services /

API integration with exchanges.

• iOS/Android Mobile wallet exchange service implementation.

13

Page 20: Business Plan - IAMEThe Initial Coin Offering (hereafter referred to as the “ICO”) project presented by the Company is an unregulated fundraising operation. It poses several risks

Secondary Development TargetsIn addition to the primary development targets, there are several secondary developments that can be employed to improve the IAME network. The

secondary development targets comprise specific components that work towards making the platform as commercially viable as possible.

KYC Databank Integration• Integration with existing AML/

KYC solutions.

• Cross validation of fragmented data with centralised database.

Automation Lab• Open and develop external API for

Third Party Validator developers.

• Machine learning workshops and training.

• Validation marketplace.

Enterprise Solution• Enterprise portal for custodial service

providers and SAS web portal for multiple account management.

• SSO & Whitelabeling.

14

Page 21: Business Plan - IAMEThe Initial Coin Offering (hereafter referred to as the “ICO”) project presented by the Company is an unregulated fundraising operation. It poses several risks

Financials

Page 22: Business Plan - IAMEThe Initial Coin Offering (hereafter referred to as the “ICO”) project presented by the Company is an unregulated fundraising operation. It poses several risks

Minimum CapThe minimum cap has been set to $1 million. Should the initial coin offering raise any amount less than $1 million in Ether at the end of the ICO, all Ether contributed will be returned to ICO contributors.

Hard CapThe hard cap has been set to $ 25 million. Should the initial coin offering raise that amount at any point in time, the ICO will be stopped, and no further contributions will be accepted.

Fundraising Targets In order to facilitate the ICO, we have set two fundraising benchmarks, a minimum cap, which is the minimum amount needed to be raised to achieve a basic working system, and a hard cap being the maximum amount that is required to bring the IAME project to successful and holistic completion.

For any funds generated anywhere between the soft cap and hard cap, IAME prioritise elements of its Primary Development Targets, before allocating resources to its Secondary Development Targets.

15

Page 23: Business Plan - IAMEThe Initial Coin Offering (hereafter referred to as the “ICO”) project presented by the Company is an unregulated fundraising operation. It poses several risks

16

Allocation of ResourcesResources raised in the ICO will be allocated over a period of 3 years. It is expected that revenue generation will pick up

by start of 2019 and reach break even point before the end of 2020. The allocation of resources will be highly dependent on the amount raised in the ICO. Funds will be allocated in priority to development, and as we approach the hard cap, a

more aggressive allocation will be made towards growing retail and enterprise adoption.

Development 70%

Listing 10%

Retail Marketing 5%

Enterprise Marketing 5%

Infrastructure 5%

Legal 5%

Development 60%

Listing 14%

Retail Marketing 8%

Enterprise Marketing 10%

Infrastructure 4%

Legal 4%

Development 50%

Listing 18%

Retail Marketing 11%

Enterprise Marketing 15%

Infrastructure 3%

Legal 3%

Conservative Allocation Balanced Allocation Aggressive Allocation

Page 24: Business Plan - IAMEThe Initial Coin Offering (hereafter referred to as the “ICO”) project presented by the Company is an unregulated fundraising operation. It poses several risks

Third Party Validation Outsourced KYC

Merchant Adoption Enterprise Solution

Third party validation is a crowdsourced process that transforms IAME users into “miners” that confirm information fragments akin to cryptocurrency mining minus the necessity for expensive tech hardware. The entry barrier for third party validation is also very low, which will allow almost anyone to become a third party validator.

By crowdsourcing the validation of identity, the cost of compliance can be lowered to a fragment of the existing cost of onboarding and KYCing new customers. Several avenues have been explored for non-cryptocurrency based businesses who have heavy cost of compliance.

The main hurdle to merchant adoption of cryptocurrency as a payment system is anonymity. A transaction with a tainted cryptocurrency can cost a merchant its business, which is why a robust KYC system is required. The IAME identified wallet can function as a payment gateway with a layer of integrated identification that is both streamlined and safe for both the merchant and the customer.

On a broader horizon, we forsee that regulated institutions will be transitioning into cryptocurrency. There will be a demand from the institutional side for the ability to create managed identified cryptocurrency accounts for their clients.

Go-to-Market StrategyEven though blockchain technology development is still at a very early stage, it remains a relatively

competitive space. The IAME team will leverage the following strategies to set itself apart from competitors within the blockchain ecosystem.

17

Page 25: Business Plan - IAMEThe Initial Coin Offering (hereafter referred to as the “ICO”) project presented by the Company is an unregulated fundraising operation. It poses several risks

General Expectations

Cryptocurrency EvolutionFor the first quarter of 2018, Cryptocurrency market capitalisation (both coins and tokens) stood between $250 and $450 billion with daily volumes averaging $18 billion per day. This amount is dwarfed by the market capitalisation of international equity and debt which stand above the $200 trillion mark. As blockchain technology receives more widespread adoption, traditional securities will slowly transition into blockchain securities growing Cryptocurrency market capitalisation.

With the emergence of a new generation of easily transferable generation of Crypto Securities, KYC and AML will have to evolve to cope with a fast paced market. Centralised identification systems as they are will never be able to support such volumes without crippling the whole ecosystem as they have with the current financial industry, which is why IAME is the most adapted solution for the fifth industrial revolution: decentralisation.

No matter the winning form, be it Cryptographic Currencies, Cryptographic Assets or Cryptographic Securities. We will adapt and succeed.

18

Traditional Securities

Cryptographic Currencies

Cryptographic Assets

Cryptographic Securities

2018

2028

Page 26: Business Plan - IAMEThe Initial Coin Offering (hereafter referred to as the “ICO”) project presented by the Company is an unregulated fundraising operation. It poses several risks

Disclaimer

Page 27: Business Plan - IAMEThe Initial Coin Offering (hereafter referred to as the “ICO”) project presented by the Company is an unregulated fundraising operation. It poses several risks

Any buyer purchasing the IAME’s products or services expressly acknowledges technical

and market uncertainties which are inherent in any business development project as

presented in this Business Plan (see below for risk factors) and that this project may

therefore never come to fruition or may have to be abandoned, without the IAM Tokens

being used. In such a case, the buyer expressly acknowledges and accepts that it will not

be entitled to sue or bring any direct or indirect legal action against the Company, its

directors, shareholders, employees or subcontractors in the event of the non-

performance, non-deployment or non-implementation of the project, even in cases where

its IAM Tokens have lost some or all of their value.

In addition, IAME may not be held liable for any of the following:

(i) use of services that are not compliant with the applicable terms;

(ii) non-performance, failure, malfunction or unavailability of the services due to a

third party, the buyer, a third-party product, or the buyer’s breach of its obligations;

(iii) indirect damages such as business loss or disturbance, loss of orders, operating

loss, infringement of the trade mark, loss of profits or clients (e.g. improper disclosure of

confidential information concerning said clients due to failure or piracy of the Platform,

third-party proceedings against the client, etc.);

(iv) loss, disclosure or unlawful or fraudulent use of user sign ons by the buyers or

third parties;

(v) suspension of access or temporary or permanent suspension of services (in

particular, arising from a request issued by an appropriate administrative or judicial

authority, or notification received from a third party);

(vi) loss, alteration or destruction of all or part of the content (information, data,

applications, files or other items) hosted on the infrastructure, insofar as IAME is not

responsible for managing the continuity of buyers activities, and data backups in

particular;

(vii) mismatch between the services and the buyer’s needs (in particular, with regard

to the sensitivity of the relevant data);

(viii) security incidents relating to use of the Internet, concerning in particular the

loss, alteration, destruction, disclosure or unauthorized access to the buyer’s data or

details on or via the Internet; and

(ix) damages to systems, applications and other items installed by the buyer on the

infrastructure.

Legal Disclaimer

19

Page 28: Business Plan - IAMEThe Initial Coin Offering (hereafter referred to as the “ICO”) project presented by the Company is an unregulated fundraising operation. It poses several risks

Until it is distributed to the buyer, the said buyer’s IAM Tokens may be linked to a Company

account. You can only access the Company account using the credentials selected by the

buyer. The loss of these credentials will result in the loss of the IAM Tokens. Good

practices advise buyers to store their credentials securely in one or more backup locations

that are geographically separated from the work location.

Any third party that obtains access to the buyer’s credentials or private keys may be able

to use the buyer’s IAM Tokens. To minimize this risk, buyers must protect themselves

against people gaining unauthorized access to their electronic devices.

Following presales and development of the original version of the Platform, there is a

possibility that alternative platforms may have been established using the same open-

source code and open source protocol that underlies the Platform. The official Platform

may find itself in competition with these alternatives, unofficial platforms based on IAM

Tokens, which could potentially adversely impact the Platform and IAM Tokens.

There is a possibility that the Platform may not be used by a large number of companies,

individuals and other organizations, and that there may be limited public interest in the

creation and development of distributed applications. Such a lack of interest could impact on

the development of the Platform and, therefore, on the uses or potential value of IAM Tokens.

Blockchain technologies are being reviewed by various regulatory bodies around the

world. The operation of the Platform and of IAM Tokens may be impacted by the passing

of restrictive laws, the publication of restrictive or negative opinions, the issuing of

injunctions by national regulators, the initiation of regulatory actions or investigations,

including but not limited to restrictions on the use or ownership of digital tokens such as

IAM Tokens, which may prevent or limit development of the Platform. Given the lack of

crypto-currency qualifications in most countries, each buyer is strongly advised to carry

out a legal and tax analysis concerning the purchase and ownership of IAM Tokens

according to their nationality and place of residence.

General Disclaimer

20

1. Risk of loss of access to IAM Tokens due to loss of credentials:

2. Risks associated with the buyer’s credentials:

4. Risk of an alternative, unofficial Platform:

5. Risk of a lack of interest in the Platform or distributed applications:

3. Legal risk and risk of adverse regulatory intervention in one or more jurisdictions:

The main right associated with IAM Tokens is the right to access the Platform, and the

right to initiate identification processes using the Platform. The value of the IAM Tokens is

therefore heavily correlated with the development and adoption of the Platform which has

not yet been fully implemented. IAM Tokens may lose part or all of their value if the

Platform and/or network is never fully developed.

6. Risk that the Platform is not developed:

Page 29: Business Plan - IAMEThe Initial Coin Offering (hereafter referred to as the “ICO”) project presented by the Company is an unregulated fundraising operation. It poses several risks

Part of the Platform‘s core software is based open source software. There is a risk that the third

parties, may intentionally or unintentionally introduce weaknesses or bugs into the core infrastructure

elements of the Platform, by interfering with the use of, or causing loss of, IAM Tokens.

Advances in cryptography, or technical advances such as the development of quantum

computers, may present risks for crypto-currencies and the Platform, which could result in

the theft or loss of IAM Tokens.

As with other decentralized cryptographic tokens and crypto-currencies, the blockchain

used for the Platform is vulnerable to mining attacks, including but not limited to, dual-

expense attacks, powerful mining attacks, selfish mining attacks, and critical competition

attacks. Any successful attack poses a risk to the Platform, the expected performance

and sequencing of the Company’s markets. Despite the best efforts of the Company’s

team, the risk of known or new mining attacks exists.

Hackers or other malicious or criminal groups or organizations may attempt to interfere with the

Platform or the availability of IAM Tokens in several ways including, but not limited to, denial of

service attacks, Sybil attacks, mystification, surfing, malware attacks, or consensus-based attacks.

21

9. Risk of security weaknesses in the Platform’s core infrastructure software:

10. Risk of weakness or exploitable breakthrough in the field of cryptography:

11. Risk of a mining attack:

8. Risk of theft and piracy:

The Platform is currently under development and may undergo significant redesign prior

to its launch. For a number of reasons, not all buyer expectations concerning the Platform

or IAM Tokens’ form and function may be met on the launch date, including changes in

design, implementation and execution of the Platform.

7. Risk that the Platform, as developed, does not meet buyer expectations:

While IAM Tokens should not be considered an investment, their value is bound to change over

time. This value may be limited if the Platform is not sufficiently used and adopted. In such a case,

there could be few or no markets at the Platform launch, which would limit the value of IAM Tokens.

There are currently no exchanges or trading facilities on which IAM Tokens can be traded. If

such exchanges or trading facilities do develop, they will probably be relatively new and

subject to poorly understood regulatory oversight. They may therefore be more vulnerable to

fraud and default than the established and regulated exchanges that exist for other products.

Should exchanges or trading facilities that represent a substantial part of the IAM Tokens

trading volume be involved in fraud, security failures or other operational problems, the

failures of such exchanges or trading facilities may limit the IAM Tokens’ value or liquidity.

Unlike bank accounts or accounts in other regulated financial institutions, funds held through

the Company are generally uninsured. At present, there are no public or private insurance

agents providing buyers with coverage against a loss of IAM Tokens or a loss of value.

12. Risk of the Platform failing to be used or adopted:

13. Risk of a tight market for IAM Tokens:

14. Risk of an uninsured loss:

For a number of reasons including, but not limited to, an unfavorable fluctuation in IAM Tokens

value, the failure of business relationships or competing intellectual property claims, the IAME

project may no longer be a viable activity and may be dissolved or simply not launched.

The Platform may be impacted by an adverse malfunction including, but not limited to, a

malfunction that results in the loss of IAM Tokens or market information.

15. Risk of winding-up of IAME’s project:

16. Risk of malfunction in the Platform:

17. Unforeseen risks:

Crypto-currencies and cryptographic tokens are a new, untested technology. In addition to

the risks stipulated above, there are other risks that the Company’s team cannot predict.

Risks may also occur as unanticipated combinations or as changes in the risks stipulated

herein.

Page 30: Business Plan - IAMEThe Initial Coin Offering (hereafter referred to as the “ICO”) project presented by the Company is an unregulated fundraising operation. It poses several risks

While IAM Tokens should not be considered an investment, their value is bound to change

over time. This value may be limited if the Platform is not sufficiently used and adopted. In

such a case, there could be few or no markets at the Platform launch, which would limit

the value of IAM Tokens.

There are currently no exchanges or trading facilities on which IAM Tokens can be traded.

If such exchanges or trading facilities do develop, they will probably be relatively new and

subject to poorly understood regulatory oversight. They may therefore be more vulnerable

to fraud and default than the established and regulated exchanges that exist for other

products. Should exchanges or trading facilities that represent a substantial part of the

IAM Tokens trading volume be involved in fraud, security failures or other operational

problems, the failures of such exchanges or trading facilities may limit the IAM Tokens’

value or liquidity.

Unlike bank accounts or accounts in other regulated financial institutions, funds held

through the Company are generally uninsured. At present, there are no public or private

insurance agents providing buyers with coverage against a loss of IAM Tokens or a loss of

value.

For a number of reasons including, but not limited to, an unfavorable fluctuation in IAM

Tokens value, the failure of business relationships or competing intellectual property

claims, the IAME project may no longer be a viable activity and may be dissolved or simply

not launched.

The Platform may be impacted by an adverse malfunction including, but not limited to, a

malfunction that results in the loss of IAM Tokens or market information.

Crypto-currencies and cryptographic tokens are a new, untested technology. In addition to

the risks stipulated above, there are other risks that the Company’s team cannot predict.

Risks may also occur as unanticipated combinations or as changes in the risks stipulated

herein.

General Disclaimer

22

12. Risk of the Platform failing to be used or adopted:

13. Risk of a tight market for IAM Tokens:

14. Risk of an uninsured loss:

15. Risk of winding-up of IAME’s project:

16. Risk of malfunction in the Platform:

17. Unforeseen risks:

Page 31: Business Plan - IAMEThe Initial Coin Offering (hereafter referred to as the “ICO”) project presented by the Company is an unregulated fundraising operation. It poses several risks

Business Plan

IAME Limited (Business Registration No.: C1715002)

803, Columbia Court, Cr St Jean Street/Drapers Avenue, Quatre Bornes, 72208, Mauritius