Terms and Conditions
By using our internet service, you are entering into a binding agreement with LJA Engineering, Inc. (“LJA”, “we”, or “us”) and you hereby expressly acknowledge and agree that there are significant security, privacy, and confidentiality risks inherent in accessing or transmitting information through the internet, whether the connection is facilitated through wired or wireless technology. Security issues include, without limitation, interception of transmissions, loss of data, and the introduction or viruses and other programs that can corrupt or damage your computer.
Accordingly, you agree that LJA is NOT liable for any interception or transmissions, computer worms or viruses, loss of data, file corruption, hacking or damage to your computer or other devices that result from the transmission or download of information or materials through the internet service provided.
Use of the wireless network is subject to the general restrictions outlined below. If abnormal, illegal, or unauthorized behavior is detected, including heavy consumption of bandwidth, LJA reserves the right to permanently disconnect the offending device from the wireless network.
Examples of Illegal OR UNACCEPTABLE Uses
The following are representative examples only and do not comprise a comprehensive list of illegal uses:
- Spamming and invasion of privacy – Sending of unsolicited bulk and/or commercial messages over the Internet using the Service or using the Service for activities that invade another’s privacy.
- Intellectual property right violations – Engaging in any activity that infringes or misappropriates the intellectual property rights of others, including patents, copyrights, trademarks, service marks, trade secrets, or any other proprietary right of any third party.
- Accessing illegally or without authorization computers, accounts, equipment or networks belonging to another party, or attempting to penetrate/circumvent security measures of another system. This includes any activity that may be used as a precursor to an attempted system penetration, including, but not limited to, port scans, stealth scans, or other information gathering activity.
- The transfer of technology, software, or other materials in violation of applicable export laws and regulations.
- Export Control Violations.
- Using the Service in violation of applicable law and regulation, including, but not limited to, advertising, transmitting, or otherwise making available ponzi schemes, pyramid schemes, fraudulently charging credit cards, pirating software, or making fraudulent offers to sell or buy products, items, or services.
- Uttering defamatory or abusive language, making threats, or using indecent speech or materials.
- Distributing pornographic materials to minors or viewing/downloading child pornography.
- Conducting high bandwidth operations, such as large file transfers and media sharing with peer-to-peer programs (e.g., torrents).
- Forging or misrepresenting message headers, whether in whole or in part, to mask the originator of the message.
- Distributing information regarding the creation of and sending Internet viruses, worms, Trojan horses, pinging, flooding, mail-bombing, or denial of service attacks. Also, activities that disrupt the use of or interfere with the ability of others to effectively use the node or any connected network, system, service, or equipment.
- Engaging in the sale, transfer, or rental of the Service to customers, clients or other third parties, either directly or as part of a service or product created for resale.
- Seeking information on passwords or data belonging to another user.
- Making unauthorized copies of proprietary software, or offering unauthorized copies of proprietary software to others.
- Intercepting or examining the content of messages, files or communications in transit on a data network.
- Facilitating a Violation of these Terms of Use or advertising, transmitting, or otherwise making available any software product, product, or service that is designed to violate these Terms of Use, which includes the facilitation of the means to spam, initiation of pinging, flooding, mail-bombing, denial of service attacks, and piracy of software.
NO WARRANTY
THE SERVICE IS PROVIDED “AS IS” AND LJA MAKES NO REPRESENTATIONS OR WARRANTIES, AND LJA DISCLAIMS TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW ALL REPRESENTATIONS, WARRANTIES, AND CONDITIONS, ORAL OR WRITTEN, EXPRESS OR IMPLIED, ARISING FROM COURSE OF DEALING, COURSE OF PERFORMANCE, OR USAGE IN TRADE, OR OTHERWISE, INCLUDING, WITHOUT LIMITATION, IMPLIED WARRANTIES OF MERCHANTABILITY, QUALITY, FITNESS FOR A PARTICULAR PURPOSE (INCLUDING, BUT NOT LIMITED TO, REGULATORY COMPLIANCE PURPOSES), TITLE, NON-INFRINGEMENT, OR SYSTEMS INTEGRATION. WITHOUT LIMITING THE FOREGOING, LJA MAKES NO WARRANTY, REPRESENTATION, OR GUARANTEE AS TO THE SERVICE’S USE OR PERFORMANCE AND DOES NOT WARRANT, REPRESENT, OR GUARANTEE THAT THE OPERATION OF THE SERVICE WILL BE FAIL-SAFE, UNINTERRUPTED, OR FREE FROM ERRORS OR DEFECTS. YOU AGREE TO COOPERATE FULLY WITH LJA IN CONNECTION WITH LJA’S PROVISION OF THE SERVICE. IT IS SOLELY YOUR RESPONSIBILITY TO PROVIDE ANY EQUIPMENT OR SOFTWARE THAT MAY BE NECESSARY FOR YOUR USE OF THE SERVICE. YOU USE THE SERVICE AT YOUR SOLE RISK AND YOU ARE SOLELY RESPONSIBLE FOR ENSURING THAT ITS HARDWARE AND SOFTWARE ARE COMPATIBLE WITH THE HARDWARE AND SOFTWARE USED BY LJA TO PROVIDE THE SERVICE, WHICH MAY BE CHANGED BY LJA FROM TIME TO TIME IN ITS SOLE DISCRETION.