IP and DMCA
Last updated: May 16, 2026. This page explains GigConverter's intellectual-property posture and complaint process. It is a product policy, not legal advice.
No affiliation
GigConverter is independent. Cubase, HALion, Steinberg, Tascam, GigaStudio, GigaSampler, Kontakt, Sforzando, Decent Sampler, and other product names may be trademarks of their respective owners. We use those names only to identify file formats, hosts, and compatibility targets. We do not use third-party logos or claim endorsement.
User-supplied files
The app converts files selected by the user in the user's browser. You are responsible for using only files you own or are licensed to use and for complying with the original sample library's license terms.
No DRM circumvention
GigConverter does not crack DRM, bypass encryption, or defeat access controls. If a library is DRM-locked or technically protected, the converter should fail rather than unlock it.
Clean-room implementation
The converter is intended to parse documented or observable file-container structures and output neutral WAV, AIFF, and SFZ files. We do not copy proprietary converter source code, third-party sample content, or third-party branding.
Copyright complaints
GigConverter does not host user sample libraries or converted audio output. If you believe material on the site infringes your rights, email legal@gigconverter.com with identification of the work, the allegedly infringing URL, your contact information, a statement that you have a good-faith belief the use is unauthorized, a statement under penalty of perjury that the notice is accurate and you are authorized to act, and your physical or electronic signature.
Trademark complaints
If you believe our compatibility wording creates confusion about source, sponsorship, or endorsement, email legal@gigconverter.com with the mark, registration or ownership details, the page at issue, and the specific change requested.
Repeat misuse
We may revoke licenses or block access for users who use GigConverter to infringe rights, bypass technical protections, distribute unauthorized converted libraries, or abuse support.