Super Technologies, Inc. (“STec”)
has created this Acceptable Use
Policy (the "Policy")
so you will understand when and
under what circumstances we may
suspend or terminate your use of
your services (the "Service")
and access to Super Technologies’
service related Internet sites,
which sites contain information
and data available via your computer
and/or a device (the "STec
Sites"). By using our Service
or accessing the STec Sites, you
consent to the acceptable use practices
described in this Policy, as modified
from time-to-time by us.
Content Prohibitions
Our goal is for our subscribers to
have a pleasurable experience each
time they access the STec Sites or
use our Service. Therefore, you may
only use our Service for lawful purposes
and in a manner that does not interfere
with other subscribers or our systems.
To assure this, we reserve the right,
but are not obligated, to suspend
or terminate your access to the STec
Sites and/or your use of the Service
at any time, if we determine in our
sole discretion that your conduct
or behavior on the STec Sites or our
Service involves or causes:
Content
Harmful or Offensive to Third-Parties:
Do not upload, download, post,
distribute, publish, or otherwise
transmit (collectively, "Disclose")
any message, data, information,
image, text, termination minutes,
DID or other material (collectively,
"Content") that
is unlawful, libelous, defamatory,
slanderous, obscene, pornographic,
indecent, lewd, harassing,
threatening, harmful, invasive
of privacy or publicity rights,
abusive, inflammatory, or
otherwise harmful or offensive
to third parties;
Content
Harmful to Other Systems:
Do not Disclose harmful Content,
including without limitation,
viruses, Trojan horses, worms,
time bombs, zombies, cancelbots,
or any other computer programming
routines that may damage,
interfere with, surreptitiously
intercept or expropriate any
system, program, data, or
personal information, via
our Service;
Impersonation:
Do not impersonate any person
or entity or otherwise misrepresent
your affiliation with a person
or entity;
Infringing
Content:
Do not Disclose
any Content that may infringe
any patent, trademark, trade
secret, copyright or other
intellectual or proprietary
right of any party. Infringement
may result from the unauthorized
copying and posting or distributing
graphics, DID, termination
minutes, pictures, photographs,
logos, software, articles,
music, or videos. By posting
any Content, you represent
and warrant that you have
the lawful right to distribute
and reproduce such Content;
Interference:
Do not do anything to interfere
with other users of Services;
Unapproved
Promotions or Advertising
of Goods or Services:
Without our prior written
permission, do not Disclose
on the Sites any unsolicited
promotions of goods or services,
commercial solicitation or
any advertising, promotional
materials, or any other solicitation
of other users for goods or
services except in those areas
(e.g., Tiki support sites)
that are designated for such
purpose;
Unlawful
Content: Do not Disclose
any Content that would constitute
or encourage a criminal offense,
violate the rights of any
party, or that would otherwise
create liability or violate
any local, state, national,
or international law.
|
Violations of system or network security
are prohibited, and may result in criminal
and civil liability. STec may investigate
incidents involving such violations
and may involve and will cooperate with
law enforcement if a criminal violation
is suspected. Examples of system or
network security violations include,
without limitation, the following:
Avoiding
System Restrictions:
Using manual or electronic
means to avoid any use limitations
placed on the Services.
Falsification
of Origin:
Forging
any TCP-IP packet header,
e-mail header, or any part
of a message header. This
prohibition does not include
the use of aliases or anonymous
remailers.
Hacking:
Unauthorized access to or
use of data, systems, or networks,
including any attempt to probe,
scan, or test the vulnerability
of a system or network or
to breach security or authentication
measures without express authorization
of the owner of the system
or network.
Interception:
Unauthorized monitoring of
data or traffic on any network
or system without express
authorization of the owner
of the system or network.
Intentional
Interference:
Interference
with service to any user,
host, or network including,
without limitation, mail bombing,
news bombing, other flooding
techniques, deliberate attempts
to overload a system, or broadcast
attacks.
Modifications
to Transmissions:
Installation of any amplifiers,
enhancers, repeaters, or other
devices that modify, disrupt,
or interfere in any way with
the radio frequency licensed
to us to provide Service.
|
We
take no responsibility and assume no
liability for any Content uploaded,
transmitted, or downloaded by you or
any third party, or for any mistakes,
defamation, slander, libel, omissions,
falsehoods, obscenity, pornography,
or profanity you may encounter. As the
provider of the STec Sites and Service,
we are only a marketplace and are not
liable for any statements, representations,
or Content provided by our users in
any public forum. It is not our objective
to discourage you from taking controversial
positions or expressing vigorously what
may be unpopular views. However, we
reserve the right to take such action
as we deem appropriate in cases where
the STec Sites or Service is used to
disseminate statements which are offensive
or harmful.
We
reserve the right, but do not assume
the obligation, to strictly enforce
this Policy by, without limitation,
issuing warnings, suspending, or terminating
Service, refusing to transmit, removing,
screening, or editing Content prior
to delivery or actively investigating
violations and prosecuting them in any
court or appropriate venue. We may block
access to certain categories of numbers
(e.g. certain international destinations)
or certain sites if, in our sole discretion,
we are experiencing excessive billing,
collection, fraud problems or other
misuse of our network.
We
may access, use, and disclose transaction
information about your use of our
Service, and any Content transmitted
by you via the STec Sites or through
the Service, to the extent permitted
by law, in order to comply with the
law (e.g., a lawful subpoena); to
enforce or apply our subscriber agreements;
to initiate, render, bill, and collect
for our Services; to protect our rights
or property, or to protect users of
our Services from fraudulent, abusive,
or unlawful use of, or subscription
to, our Service. INDIRECT OR ATTEMPTED
VIOLATIONS OF THIS POLICY OR ANY RELATED
POLICY, GUIDELINE OR AGREEMENT, AND
ACTUAL OR ATTEMPTED VIOLATIONS BY
A THIRD PARTY ON YOUR BEHALF SHALL
BE CONSIDERED VIOLATIONS OF THIS POLICY
BY YOU.
You
are solely liable for any transmissions
you initiate through our Service or
any Content you Disclose. Unless you
are participating in an area of the
STec Sites or Service that requires
or allows anonymity, you will always
use your real name in online communications.
You agree to indemnify and hold us harmless
from any claim, action, demand, loss,
or damage (including attorneys' fees)
made or incurred by any third party
arising out of or relating to your violation
of this Policy.
We
will revise and update this Policy
if our practices change, as technology
changes, or as we add new services
or change existing ones. If we make
any material changes to this Policy,
we will post an "update"
notice to the STec Sites and change
the date of the Policy. You should
refer back to this page for the latest
information and to be privy to your
acceptable use obligations.
If
you have any questions, comments,
or concerns about this Policy, please
write to us at:
Super
Technologies, Inc.
P.O. Box 969
Pensacola, FL 32595
|
|