BLUEHACK is an innovation marathon for programming, design, creativity & entrepreneurship.
Participation in BlueHack is governed by the terms of the BlueHack Rules set out below (“the Rules”). Therefore, by completing the registration and enrollment process for BlueHack, all participants agree to fully adhere to all the Rules of the program and confirm that they have read, understood and accept all of the terms set out below.
REGISTRATON open until October 22 , 2017. Extensions to the deadline may be granted by the Organizing Committee as deemed necessary.
Over the weekend of November 4 to 5, software developers, designers, and business professionals will gather for an innovation marathon of programming, brainstorming, mentoring and evaluations. This year’s event has been themed Jamaica! AI Nation. Participants will be able to register for the BlueHack from September 29 to October 22, 2017.
HOW TO PARTICIPATE?
Select one of the challenges listed on the BlueHack website – and register by October 22, 2017.
Build Your Team and Compete: For 2 days, participants will remain on the premises of the Jamaica Pegasus Hotel, competing in teams of five, comprised of 3 programmers or developers, 1 designer and 1 business person.
1.1. BlueHack aims to develop technological solutions as well as foster innovative entrepreneurship.
1.2. Technological solutions should be developed by responding to the themes of the challenges outlined on the registration website.
2. DATES AND LOCATION
2.1. The BlueHack will be run according to agenda outlined in the registration website.
2.2. The competition will be staged on the premises of the Jamaica Pegasus Hotel in New Kingston.
3.1. Individuals 18 years of age or older may enroll for BlueHack, provided that you accept the terms of the "IBM Systems Access Agreement" on the IBM website – Participation in the BlueHack competition confirms acceptance of said "IBM Systems Access Agreement" and these rules.
3.2. Only one (1) registration per individual is allowed.
3.3. Registration will be open until 23:59 hours Jamaican time on October 22, 2017. Participants complete registration by filling in all the mandatory fields in the electronic registration form on the registration website.
3.4. At the time of registration, two challenge options in order of preference, should be selected. The Organizing Committee will make final assignments of teams to challenges.
3.5. Entrants must have knowledge and / or experience in at least one (1) of the areas listed below. Skill is not required in all areas:
a) Programming and development of web / mobile applications; or
b) Graphic design; or
c) Business management; or
d) Team management; or
e) Basic or advanced electronics.
3.6. Completing and submitting the electronic registration form does not guarantee participation in the competition by the BlueHack registrant. Confirmation of acceptance is subject to the discretion of the BlueHack Organizing Committee. Registrants will be evaluated and confirmed for participation on a first-come, first-served basis.
4.1. Participation in BlueHack is voluntary, free, nominative and non-transferable.
4.2. All interested parties whose registrations are accepted are expected to arrive at the Pegasus Hotel by 8 am on Saturday November 4, 2017 and remain on-site until Sunday November 5, 2017 at 5 pm when the closing ceremony concludes. When the maximum number of participants per challenge is reached, the doors will be closed and competitors will not be allowed entry, even if they have had their registration approved.
4.2.1. Participants who are not present at the Pegasus Hotel until 5 pm on Sunday November 5, 2017 when the event concludes will be automatically disqualified.
4.3. Participants will compete in teams of up to five (5) people and should always observe the theme and challenge areas outlined for the event.
4.3.1. With regard to the formation of teams:
a) They may be previously formed by the participants themselves;
b) They may only have less than or more than five (5) persons, if approved by the Organizing Committee; or
c) The Organizing Committee will be responsible for organizing and leading the process of training incomplete teams and the inclusion of participants who are not yet staffed.
4.3.2. It shall be incumbent upon the Organizing Committee to approve any team formation other than that described in items 4.3.1.
4.4. Each participant will be required to take his own laptop for use during the event. Participants without laptops will be disqualified. IBM & NCB will make Wi-Fi available.
4.5. The participant must visibly display the badge provided at the time of registration throughout the two days of the competition and in all venues in which the event will be held.
4.6. The participant will have access to all relevant hotel facilities as communicated by the Organising Committee on or before the event.
5.1. BlueHack's agenda includes brainstorming, programming, mentoring and evaluations to select the best technological solutions developed. The full schedule will be announced on the event's website.
6. EVALUATION CRITERIA
6.1. On Sunday November 5, after the prototype development period has ended, the judges invited by the Organizing Committee will carry out the analysis and evaluation necessary to rank the technological solutions that have been developed by the teams.
6.1.1. For this analysis, the following aspects will be considered:
b) Source code, when applicable, (with instructions for execution); and
c) Presentation ("elevator pitch" model).
6.1.2. Through this analysis, 3 (three) finalist teams will be selected.
6.2. On November 5, 2017 at the time scheduled for judging, only 1 (one) representative of each of the finalist teams will present the technological solution developed to the judging panel members, using the "elevator pitch" model (up to 3 minutes).
6.2.1. Only the best evaluated teams - 1 (one) per category - will be considered winners, based on the following criteria:
b) Applicability of the system to solve the problems related to the shared and collaborative economy;
c) Disruption of innovation;
d) Viability of actual implementation of the technological solution developed;
e) Quality and progress in the development of functional prototype.
7.1. On Sunday November 5, 2017, at the closing of BlueHack, according to the schedule and in the same place as the event, the finalists selection ceremony will be held.
7.2. All prizes offered to the members of the 3 (three) winning teams are personal and non-transferable. Announcement of the winners be published on the BlueHack website -
8.1. To maintain the highest ethical standards and in order to guarantee impartiality, the members that will form the judging panel must inform the Organizing Committee of any conflict of interest in the evaluation of the technological solution developed, once it is identified.
9.1. In all stages of BlueHack, the Organizing Committee will communicate with registered participants by telephone contact or by electronic means, namely by e-mail and by the BlueHack website.
9.2. Registered participants are responsible for following the schedule, results and any changes posted about the event.
9.3. The Organizing Committee requests the disabling of anti-spam that may block the communications about BlueHack, which should arrive through the domain "@ br.ibm.com".
10. ADDITIONAL CONSIDERATIONS
10.1. The dates of the registration period and the confirmation of the participants whose registrations are accepted may be extended at the discretion of the Organizing Committee. In this case, the changes made will be publicized through the website.
10.2. The BlueHack will be coordinated by an Organizing Committee which is responsible for designating and inviting mentors and evaluators who will be part of the judging panel.
10.3. By enrolling in BlueHack, entrants agree to these Participant Rules, the Terms of Access to IBM Systems, authorizing IBM to use, edit, publish, reproduce and disseminate through newspapers, magazines, television, movies, radio and Internet, or any other means of communication, without charge and without additional authorization, their names, voices, images, projects or companies, both nationally and internationally.
10.5. Participants also authorize the use of all data provided at the time of enrollment, for non-commercial purposes only, by IBM.
10.6. Participants are responsible for the originality of all content produced by them within the scope of this Regulation, responding in full and exclusively for damages or liens to third parties, excluding and indemnifying IBM and NCB, in the event of a judicial or extrajudicial action brought by third parties, under any allegation related to infringement of intellectual, industrial, patent, image, voice and name rights. For clarity, IBM does not acquire any rights to any original materials that may be created by participants during their participation in BlueHack.
10.7. IBM is not responsible for the use of public and / or private databases by event participants and / or loss of data, even while using IBM systems or tools.
10.8. Suspicions of unethical behavior, failure to comply with these Rules, or the internal rules of the venue in which the event will occur, will be investigated by the Organizing Committee, and may result in the disqualification of the respective participant.
10.9. Technological solutions will not be accepted if they are copied from other sources and / or competitions. The identification of a total copy will result in the disqualification of the respective participant. Partial use of other sources may be allowed provided that the differences between the source and the presentation in the BlueHack can be validated.
10.10. Participants will be responsible for all expenses related to transportation, and any additional accommodation required beyond the basic accommodations afforded at the Jamaica Pegasus Hotel for participation in the event.
10.11. IBM will not be liable for loss, theft, or damage to the personal property of the participants (such as, notebooks, tablets or mobile phones) during the days of the event. It is the exclusive duty of the participants to guard and care for such belongings. If the participant is absent from the venue of the event, even for a short time, he must take with him his belongings and equipment.
10.12. The decisions of the members of the judging panel regarding the selection and the award of the winning teams, in addition to the decisions of the Organizing Committee will be final and unappealable.
10.13. BlueHack has an exclusively cultural purpose, aiming at recognizing and disseminating technological solutions that have innovative potential, stimulating the diffusion of ideas into the business environment, not having a commercial character, not being conditioned in any way to luck, nor aiming at financial results, and does not imply any liens of any nature for the registered participants and the winners at the end of the contest, in addition to not linking the participation to the acquisition, use and / or purchase of products or services of the organizer or partners.
10.14. IBM may, at any time, if necessary, change these Rules, as well as replace any of the prizes with others of equal value, by communicating on the event website.
10.15. The competition may be interrupted, suspended or cancelled for reasons of force majeure outside of the control of IBM or NCB such as problems of inaccessibility to the internet network, servers, among others, and no compensation will be due to the contestants in such event. IBM will, in such cases, make the best efforts to continue the event as soon as the problem has been settled, with the possibility of definitive cancellation should it not be possible to resume the competition.
10.16. Omitted cases not provided for in this Regulation shall be judged by the Organizing Committee.
IBM CLOUD SYSTEM ACCESS AGREEMENT
This IBM Cloud System (“System”) Access Agreement (“Agreement”) is by and between International Business Machines Corporation, a New York corporation (“IBM”), through IBM Brasil Ltda - Research Laboratory, located at Rua Tutoia, 1157 – Paraíso – São Paulo -SP, and an individual person and/or the legal entity for which such individual person is authorized to access the System or an individual authorized by their employer or academic institution in accordance with the terms and conditions of this Agreement (“User”).
User’s use of the System indicates that it accepts the terms and conditions set forth in this Agreement. If User is accepting these terms on behalf of itself and any other person, company or other legal entity, User hereby represents and warrants that it has full authority to bind that person, company or legal entity to these terms and conditions
User will access the System solely for the duration of the Jamaica AI Nation Hackathon - (“Bluehack”) from 4th of November, 2017 to 5th of November, 2017. The Hackathon will be held at the Jamica Pegasus Hotel.
1.0 Scope of Work IBM: (i) grants the User access on site at the Hackathon, at no cost, to use the System; and (ii) will allow the User use of System and the object code of IBM’s operational software (IBM Software) on the System.
2.0 Technical Coordinator The IBM Technical Coordinator for this Agreement will be Márcia Golfieri. The IBM Technical Coordinator will arrange all matters necessary to carry out this Agreement, other than contract amendments.
IBM will give the User access to the System to enable and test User generated Software. Availability is subject to scheduled maintenance and unanticipated conditions. The User will use the System attached to the IBM WAN to enable and test User Software. Unless this Agreement permits it, the User will not copy or erase any code or data from any of the Systems.
The User will prevent any viruses or Harmful Code from entering the IBM WAN or System as a result of the User’s access. “Harmful Code” means any computer programming code constructed with the intent or likelihood of damage to or interference with other computer programs, data files or hardware, without the knowledge or consent of the computer user, and includes self-replicating and self-propagating program instructions such as viruses, worms, or the like. The User will promptly notify IBM if the User discovers or suspects that Harmful Code has entered the IBM WAN or System, and IBM may take any steps to protect the System and the WAN without notice to the User including, without limitation, termination of the User’s access rights set forth in Article 1.
The User will use reasonable care to fulfill its obligations under this Agreement. The User will cooperate with IBM in handling any third party claims arising out of the User’s activities under this Agreement.
IBM WILL NOT BE LIABLE TO THE USER FOR ANY INDIRECT, INCIDENTAL, SPECIAL OR CONSEQUENTIAL DAMAGES, (INCLUDING LOST PROFITS OR REVENUE) INCURRED BY THE USER OR ANY THIRD PARTY, WHATEVER THE FORM OF THE ACTION WHETHER IN CONTRACT, TORT, OR OTHERWISE, EVEN IF IBM HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. ACCESS TO AND USE OF THE IBM SYSTEM, WAN AND ANY RELATED SERVICES ARE PROVIDED WITHOUT WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT.
IBM’s entire liability for all claims in the aggregate arising under this Agreement will not exceed Five Thousand US Dollars ($5,000 USD). This limit applies regardless of why a party claims damages from the other, including default, fundamental breach, negligence, misrepresentation, or other contract or tort claim.
4.0 Security and Use Standards
The User, with assistance from IBM, will control access to the System via the facilities provided on the System. All User equipment which accesses the System will be physically and technically protected, including without limitation, screen and keyboard locks, and will prevent IP forwarding or other services such as DNS or DHCP, and maintain security for the User’s facilities and its computer network. The User agrees to protect all passwords from unauthorized users and use.
The User will not: (i) use the System or connected User equipment for System related activity not otherwise approved under the terms of this Agreement; (ii) use the System, the WAN, or connected User equipment for any unlawful or improper activity; (iii) provide this Agreement to any other entities; or (iv) use the Hackathon name or IBM trademark, or refer to User’s use of the System other than for academic purposes without IBM’s prior written approval.
If the User violates any of the foregoing security and use standards, IBM may, in its discretion, terminate the user’s access rights set forth in Article 1 without notice.
The User agrees to hold IBM harmless from and indemnify IBM for any damages or claims for damages arising from the User’s activities under this Agreement including but not limited to the User’s access to the System, introduction of Harmful Code onto the System, security breaches that occur when the User is connected to the System or the User’s unlawful or improper activity.
“Software” means computer programs, computer program changes, computer program enhancements, and/or any documentation related to computer programs. The User’s Software is owned by the User or provided by an institution which is third party or open source software, all for use on the System. The User represents that it has the right to use all Software that is run on the System under this Agreement. The User agrees not to provide or expose any User Software to IBM except for providing a copy to IBM to load on the System. IBM will not provide any bug fixes or services which require exposure to the User’s Software. User acknowledges that certain third party and/or open source software is necessary for the operation of IBM Software and that User is responsible for obtaining necessary rights to that software. User further acknowledges that future operation of User Software specifically created pursuant to this Agreement (“Created User Software”) shall be limited to operation in conjunction with IBM Software.
IBM grants to the User a revocable, nonexclusive, right to access the IBM Software and associated documentation only for the purpose of and during this Agreement. The User agrees not to, nor to permit others to download, modify, disassemble, reverse compile, reverse engineer, or reduce the IBM Software to human readable form.
6.0 Export Regulations
The parties agree to comply and to reasonably assist the other in complying with applicable government export and import laws and regulations. Further, each party agrees that unless authorized by applicable government license or regulation, including but not limited to U.S. authorization, both parties will not directly or indirectly export or re-export, at any time, any technology, software and/or commodities furnished or developed under this or any other,
Agreement between the parties, or its direct product, to any prohibited country (including release of technology, software and/or commodities to nationals, wherever they may be located, of any prohibited country) as specified in applicable export, embargo, and sanctions regulations. The User also agrees to comply with U.S. prohibitions on delivery of technology, software and/or commodities and providing services to certain end users and for certain end uses including, but not limited to, the following end uses/end users: nuclear facilities, space or missile, and weapons systems (including chemical and biological).
Further, the User understands and acknowledges that IBM may use its global resources, including but not limited to the use of non-U.S. nationals and/or hosting of data in non-U.S. countries for delivery of services under this agreement.
The User warrants that none of the User’s data exported to, or otherwise accessible by, IBM under this Agreement is controlled as a defense article under the U.S. International Traffic in Arms Regulation (ITAR) or under any other country’s laws or regulations.
The User further warrants that none of the User’s data exported to or otherwise accessible by IBM under this Agreement requires an export license. The User agrees to provide all information necessary, in connection with the Agreement, to determine all relevant export authorizations. The User shall be fully responsible for the correctness of information provided and any use of it to comply with applicable regulations.
This section will survive after termination or expiration of this Agreement and will remain in effect until fulfilled.
7.0 General Provisions
This Agreement will take effect when User begins using the System and will last until November 6th, 2017 – 8pm. Either party may end this Agreement at any time on written notice to the other party.
The User agrees to comply with applicable export laws and regulations.
The User’s right to access and use the System may not be transferred to anyone else. Each party represents that is has agreements with its employees or contractors sufficient to meet its obligations under this Agreement.
This Agreement will be governed by the laws of the State of New York and the parties waive the right to trial by jury.
Without written approval from the other party, this Agreement does not confer any rights to, a) use in advertising, publicity or other marketing activities any name, trade name, trademark, or other designation of either party, or, b) refer to this Agreement or its terms in any such activities.
This Agreement may only be modified by mutual written consent. If any provision of this Agreement is held to be unenforceable, the enforceability of the remaining provisions will not be affected as long as the intent of the parties can be preserved.
This Agreement are the complete and exclusive agreement between the parties regarding this subject and take the place of any prior oral or written communications or understandings between the parties.
User’s use of and access to the System is governed by:
(a) The following terms of the IBM Cloud Services Agreement (CSA) available at
(i) Article titled “Cloud Services”,
(ii) Article titled “Data Protection”, and
(iii) Article titled “Changes.”
(b) IBM Bluemix Service Description available at: except that access to IBM Bluemix is provided “as is,” and terms related to charges, term and renewal options, and service levels, including availability credits shall not apply.
(c) IBM Watson IoT Platform Service Description available at: except that access to IBM Watson IoT Platform is provided “as is,” and terms related to charges, billing, and service levels, including availability credits shall not apply
User’s access or continued use of IBM Bluemix constitutes User’s acceptance of the process, terms, and conditions stated or referenced in this Article 8.0 of this Agreement.