Terms and Conditions
By
using our internet service, you hereby expressly acknowledge and agree
that there are significant security, privacy and confidentiality risks
inherent in accessing or transmitting information through the internet,
whether the connection is facilitated through wired or wireless
technology. Security issues include, without limitation, interception
of transmissions, loss of data, and the introduction or viruses and
other programs that can corrupt or damage your computer. Accordingly,
you agree that the owner and/or provider of this network is NOT liable
for any interception or transmissions, computer worms or viruses, loss
of data, file corruption, hacking or damage to your computer or other
devices that result from the transmission or download of information or
materials through the internet service provided. Use
of the wireless network is subject to the general restrictions outlined
below. If abnormal, illegal, or unauthorized behavior is detected,
including heavy consumption of bandwidth, the network provider reserves
the right to permanently disconnect the offending device from the
wireless network. Examples of Illegal Uses The following are representative examples only and do not comprise a comprehensive list of illegal uses: - Spamming
and invasion of privacy - Sending of unsolicited bulk and/or commercial
messages over the Internet using the Service or using the Service for
activities that invade another's privacy.
- Intellectual
property right violations - Engaging in any activity that infringes or
misappropriates the intellectual property rights of others, including
patents, copyrights, trademarks, service marks, trade secrets, or any
other proprietary right of any third party.
- Accessing
illegally or without authorization computers, accounts, equipment or
networks belonging to another party, or attempting to
penetrate/circumvent security measures of another system. This includes
any activity that may be used as a precursor to an attempted system
penetration, including, but not limited to, port scans, stealth scans,
or other information gathering activity.
- The transfer of technology, software, or other materials in violation of applicable export laws and regulations.
- Export Control Violations
- Using
the Service in violation of applicable law and regulation, including,
but not limited to, advertising, transmitting, or otherwise making
available ponzi schemes, pyramid schemes, fraudulently charging credit
cards, pirating software, or making fraudulent offers to sell or buy
products, items, or services.
- Uttering threats;
- Distribution of pornographic materials to minors;
- and Child pornography.
Examples of Unacceptable Uses The following are representative examples only and do not comprise a comprehensive list of unacceptable uses: - High bandwidth operations, such as large file transfers and media sharing with peer-to-peer programs (i.e.torrents)
- Obscene or indecent speech or materials
- Defamatory or abusive language
- Using
the Service to transmit, post, upload, or otherwise making available
defamatory, harassing, abusive, or threatening material or language
that encourages bodily harm, destruction of property or harasses
another.
- Forging or misrepresenting message headers, whether in whole or in part, to mask the originator of the message.
- Facilitating a Violation of these Terms of Use
- Hacking
- Distribution of Internet viruses, Trojan horses, or other destructive activities
- Distributing
information regarding the creation of and sending Internet viruses,
worms, Trojan horses, pinging, flooding, mail-bombing, or denial of
service attacks. Also, activities that disrupt the use of or interfere
with the ability of others to effectively use the node or any connected
network, system, service, or equipment.
- Advertising,
transmitting, or otherwise making available any software product,
product, or service that is designed to violate these Terms of Use,
which includes the facilitation of the means to spam, initiation of
pinging, flooding, mail-bombing, denial of service attacks, and piracy
of software.
- The sale, transfer, or
rental of the Service to customers, clients or other third parties,
either directly or as part of a service or product created for resale.
- Seeking information on passwords or data belonging to another user.
- Making unauthorized copies of proprietary software, or offering unauthorized copies of proprietary software to others.
- Intercepting or examining the content of messages, files or communications in transit on a data network.
|