{"id":38,"date":"2011-06-22T13:53:40","date_gmt":"2011-06-22T13:53:40","guid":{"rendered":"http:\/\/sapsecurityanalyst.com\/WP\/?page_id=38"},"modified":"2015-05-03T02:26:53","modified_gmt":"2015-05-03T02:26:53","slug":"general-disclaimer","status":"publish","type":"page","link":"https:\/\/sapsecurityanalyst.com\/WP\/","title":{"rendered":"General Disclaimer"},"content":{"rendered":"<p style=\"text-align: justify;\"><span style=\"color: #4c4c4c;\">The \u00a0web log \u00a0<strong><span style=\"text-decoration: underline;\"><span style=\"color: #0000ff;\"><a href=\"http:\/\/www.sapsecurityanalyst.com\" target=\"_blank\"><span style=\"color: #0000ff; text-decoration: underline;\">sapsecurityanalyst.com<\/span><\/a><\/span><\/span>\u00a0<\/strong>\u00a0 is \u00a0<strong>NOT<\/strong>\u00a0 \u00a0affiliated \u00a0to SAP AG \u00a0or \u00a0any of \u00a0its<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #4c4c4c;\">subsidiaries. \u00a0sapsecurityanalyst.com \u00a0doesn&#8217;t \u00a0endorse \u00a0or \u00a0guarantee \u00a0 the \u00a0accuracy,<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #4c4c4c;\">reliability or quality of any of the information accessed through this site. You hereby<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #4c4c4c;\">acknowledge \u00a0that \u00a0any reliance \u00a0upon this site shall be at <strong>YOUR<\/strong> sole <strong>risk<\/strong>.<\/span><\/p>\n<p style=\"text-align: justify;\">This is a personal weblog created as a part of \u00a0the \u00a0blogger&#8217;s \u00a0interest \u00a0in technology.<\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #4c4c4c;\">sapsecurityanalyst.com \u00a0 reserves \u00a0the \u00a0right, \u00a0 in \u00a0 its sole discretion and \u00a0without \u00a0any<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #4c4c4c;\">obligation, to make improvements to, or correct any error or omissions in any portion<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #4c4c4c;\">of this site. In \u00a0no event shall sapsecurityanalyst.com be liable for any direct, indirect,<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #4c4c4c;\">incidental, punitive \u00a0or \u00a0consequential \u00a0damages of any kind whatsover with respect to<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #4c4c4c;\">this site. \u00a0sapsecurityanalyst.com \u00a0makes \u00a0no \u00a0warranty or representation whatsoever<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #4c4c4c;\">regarding \u00a0the \u00a0site or any content, \u00a0advertising, \u00a0services \u00a0or \u00a0products \u00a0provided<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #4c4c4c;\">through or in connection with the web log.\u00a0<\/span><\/p>\n<pre style=\"text-align: justify;\">The blogger would like to thank SAP AG and give due credit to SAP AG for \r\nsome of the screenshots and terminologies which have been used to explain \r\ncertain concepts\u00a0as those screenshots and terminologies are the copyright \r\nmaterials of SAP AG.<\/pre>\n","protected":false},"excerpt":{"rendered":"<p>The \u00a0web log \u00a0sapsecurityanalyst.com\u00a0\u00a0 is \u00a0NOT\u00a0 \u00a0affiliated \u00a0to SAP AG \u00a0or \u00a0any of \u00a0its subsidiaries. \u00a0sapsecurityanalyst.com \u00a0doesn&#8217;t \u00a0endorse \u00a0or \u00a0guarantee \u00a0 the \u00a0accuracy, reliability or quality of any of the information accessed through this site. You hereby acknowledge \u00a0that \u00a0any reliance \u00a0upon this site shall&nbsp;<a class=\"read-more\" href=\"https:\/\/sapsecurityanalyst.com\/WP\/\">&hellip;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/38"}],"collection":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/comments?post=38"}],"version-history":[{"count":95,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/38\/revisions"}],"predecessor-version":[{"id":1727,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/38\/revisions\/1727"}],"wp:attachment":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/media?parent=38"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}