Access Technology™    REFUND  POLICY

Access Technology™    ACCEPTABLE USE POLICY

 

Access Technology™    REFUND  POLICY

1. REFUNDS

Access Technology prorates refunds for service based on the amount used. You will be refunded a prorated amount based on the length and type of service you have used. The cost for the service used is based on the current published rates at the time of cancellation. The cancellation fee is $20.


Current (09-2010) dialup refund rates:
1-3 months $16.95 per month
4-6 months $12.95 per month
7-11 months $11.00 per month

Example:

If you sign up for a  year contract at $9.75 per month and cancel after 7 months:
Initial payment: $117
Amount used: 7 months @ $11.00 per month = $77
Cancellation fee $20
Refund equals: $20

Access Technology™    ACCEPTABLE USE POLICY

1. INTRODUCTION

Access Technology's Acceptable Use Policy ("AUP") is intended to help enhance the use of the Internet by preventing unacceptable use. All users of Access Technology's Internet services (the "Services")—those who access some of our Services but do not have accounts ("Visitors"), as well as those who pay a monthly service fee to subscribe to the Services ("Members")—must comply with this AUP. We support the free flow of information and ideas over the Internet and do not actively monitor use of the Services under normal circumstances. Similarly, we do not exercise editorial control over the content of any Web site, electronic mail transmission, news group, or other material created or accessible over or through the Services, except for certain proprietary websites. However, in accordance with our Internet Service Agreement, we may remove any materials that, in our sole discretion, may be illegal, may subject us to liability, or which may violate this AUP. Access Technology may cooperate with legal authorities and/or third parties in the investigation of any suspected or alleged crime or civil wrong. Your violation of this AUP may result in the suspension or termination of either your access to the Services and/or your Access Technology account or other actions as detailed in Section 3. This AUP should be read in conjunction with our Internet Service Agreement and other policies.

2. VIOLATIONS OF Access Technology's ACCEPTABLE USE POLICY

The following constitute violations of this AUP:

a. Illegal use. Using the Services to transmit any material (by email, uploading, posting, or otherwise) that, intentionally or unintentionally, violates any applicable local, state, national or international law, or any rules or regulations promulgated thereunder.

b. Harm to minors. Using the Services to harm, or attempt to harm, minors in any way.

c. Threats. Using the Services to transmit any material (by email, uploading, posting, or otherwise) that threatens or encourages bodily harm or destruction of property.

d. Harassment. Using the Services to transmit any material (by email, uploading, posting, or otherwise) that harasses another.

e. Fraudulent activity. Using the Services to make fraudulent offers to sell or buy products, items, or services or to advance any type of financial scam such as "pyramid schemes," "Ponzi schemes," and "chain letters."

f. Forgery or impersonation. Adding, removing or modifying identifying network header information in an effort to deceive or mislead is prohibited. Attempting to impersonate any person by using forged headers or other identifying information is prohibited. The use of anonymous remailers or nicknames does not constitute impersonation. Using deliberately misleading headers ("munging" headers) in news postings in order to avoid spam email address collectors is allowed.

g. Unsolicited commercial email/Unsolicited bulk email. Using the Services to transmit any unsolicited commercial email or unsolicited bulk email. Activities that have the effect of facilitating unsolicited commercial email or unsolicited bulk email whether or not that email is commercial in nature, are prohibited.

h. Unauthorized access. Using the Services to access, or to attempt to access, the accounts of others, or to penetrate, or attempt to penetrate, security measures of Access Technology's or another entity's computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in the corruption or loss of data.

i. Copyright or trademark infringement. Using the Services to transmit any material (by email, uploading, posting, or otherwise) that infringes any copyright, trademark, patent, trade secret, or other proprietary rights of any third party, including, but not limited to, the unauthorized copying of copyrighted material, the digitization and distribution of photographs from magazines, books, or other copyrighted sources, and the unauthorized transmittal of copyrighted software. Access Technology is registered under the Digital Millenium Copyright Act of 1998.

j. Collection of personal data. Using the Services to collect, or attempt to collect, personal information about third parties without their knowledge or consent.

k. Reselling the services. Reselling the Services without Access Technology's authorization.

l. Network disruptions and unfriendly activity. Using the Services for any activity which adversely affects the ability of other people or systems to use Access Technology Services or the Internet. This includes "denial of service" (DoS) attacks against another network host or individual user. Interference with or disruption of other network users, network services or network equipment is prohibited. It is the Member's responsibility to ensure that their network is configured in a secure manner. A Member may not, through action or inaction, allow others to use their network for illegal or inappropriate actions. A Member may not permit their network, through action or inaction, to be configured in such a way that gives a third party the capability to use their network in an illegal or inappropriate manner.

m. News. Access Technology Members should use their best judgment when posting to any newsgroup. Many groups have charters, published guidelines, FAQs, or "community standards" describing what is and is not considered appropriate. Usenet can be a valuable resource if used properly. The continued posting of off-topic articles is prohibited. Commercial advertisements are off-topic in most newsgroups, especially regional groups not specifically named for such. The presence of such articles in a group is not indicative of the group's "intended" use. Please familiarize yourself with basic Usenet netiquette before posting to a newsgroup.

Access Technology considers "multiposting" to 10 or more groups within a two week sliding window to be excessive. Access Technology servers currently limit the number of allowable "cross-posts" to 9.

Access Technology Members may not cancel messages other than their own messages. A Member may cancel posts forged in that Member's name. We may cancel any postings which violate this AUP.

n. Long Connections and Multiple Logins. Using a personal account for high volume or commercial use is prohibited. The Services are intended for periodic, active use of email, newsgroups, file transfers, Internet chat, games, and browsing the World Wide Web. Members may stay connected so long as they are actively using that connection for the above purposes. Members may not use the Services on a standby or inactive basis in order to maintain a connection. Pinging is expressly prohibited. Accordingly, Access Technology maintains the right to terminate any member's connection following any extended period of inactivity as determined by Access Technology.

o. Exceeding Web Site Size and Traffic Limitations: All Access Technology Members receive 6MB free webspace for use with their Access Technology Internet access account. Each member’s free webspace is allocated 750MB of traffic per month (traffic is calculated on a formula multiplying the number of hits that your site receives by the size of your files). If a site exceeds its maximum monthly allotment of traffic, the site will become unavailable until the beginning of the next calendar month. A site that exceeds 6MB in size will also become unavailable. Unavailability includes but may not be limited to the inability to access the site publicly or to publish to or modify the site's contents via certain Web creation tools. More information about appropriate use of the free member webspace appears under Free Webspace Community Guidelines.

 

3. REPORTING VIOLATIONS OF Access Technology'S AUP

Access Technology requests that anyone who believes that there is a violation of this AUP direct the information to Director-Abuse Department, at: This e-mail address is being protected from spambots. You need JavaScript enabled to view it

If available, please provide the following information:

The IP address used to commit the alleged violation

The date and time of the alleged violation, including the time zone or offset from GMT

Evidence of the alleged violation

Email with full header information provides all of the above, as do syslog files. Other situations will require different methods of providing the above information.

Access Technology may take any one or more of the following actions in response to complaints:

issue warnings: written or verbal

suspend the Member's newsgroup posting privileges

suspend the Member's account

terminate the Member's account

bill the Member for administrative costs and/or reactivation charges

bring legal action to enjoin violations and/or to collect damages, if any, caused by violations.

 

4. REVISIONS TO THIS ACCEPTABLE USE POLICY

Access Technology reserves the right to revise, amend, or modify this AUP, our Internet Service Agreement and our other policies and agreements at any time and in any manner. Notice of any revision, amendment, or modification will be posted in accordance with the Internet Service Agreement.

DISCLAIMER OF WARRANTIES

1. YOU EXPRESSLY UNDERSTAND AND AGREE THAT:

(a) YOUR USE OF THE SERVICE AND/OR SOFTWARE IS AT YOUR SOLE RISK. THE SERVICE AND/OR SOFTWARE ARE PROVIDED ON AN "AS IS" AND "AS AVAILABLE" BASIS. ACCESS TECHNOLOGY EXPRESSLY DISCLAIMS ALL WARRANTIES OF ANY KIND, WHETHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT.

(b) ACCESS TECHNOLOGY MAKES NO WARRANTY THAT (i) THE SERVICE AND/OR SOFTWARE WILL MEET YOUR REQUIREMENTS, (ii) THE SERVICE AND/OR SOFTWARE WILL BE UNINTERRUPTED, TIMELY, SECURE, OR ERROR-FREE (FOR EXAMPLE BUT WITHOUT LIMITATION, ACCESS TECHNOLOGY DOES NOT WARRANT THAT YOU WILL ALWAYS RECEIVE EMAILS ADDRESSED TO YOU), (iii) THE RESULTS THAT MAY BE OBTAINED FROM THE USE OF THE SERVICE AND/OR SOFTWARE WILL BE ACCURATE OR RELIABLE, (iv) THE QUALITY OF ANY PRODUCTS, SERVICES, INFORMATION, OR OTHER MATERIAL PURCHASED OR OBTAINED BY YOU THROUGH THE SERVICE AND/OR SOFTWARE WILL MEET YOUR EXPECTATIONS, AND ANY ERRORS IN THE SERVICE AND/OR SOFTWARE WILL BE CORRECTED.

(c) ANY MATERIAL DOWNLOADED OR OTHERWISE OBTAINED THROUGH THE USE OF THE SERVICE/AND OR SOFTWARE IS DONE AT YOUR OWN DISCRETION AND RISK AND YOU WILL BE SOLELY RESPONSIBLE FOR ANY DAMAGE TO YOUR COMPUTER SYSTEM OR LOSS OF DATA THAT RESULTS FROM THE DOWNLOAD OF ANY SUCH MATERIAL.

(d) NO ADVICE OR INFORMATION, WHETHER ORAL OR WRITTEN, OBTAINED BY YOU FROM ACCESS TECHNOLOGY OR THROUGH OR FROM THE SERVICE AND/OR SOFTWARE WILL CREATE ANY WARRANTY NOT EXPRESSLY STATED IN THESE TOS.

2. LIMITATION OF LIABILITY

YOU EXPRESSLY UNDERSTAND AND AGREE THAT ACCESS TECHNOLOGY WILL NOT BE LIABLE TO YOU FOR ANY INDIRECT, INCIDENTAL, SPECIAL, CONSEQUENTIAL OR EXEMPLARY DAMAGES, INCLUDING BUT NOT LIMITED TO DAMAGES FOR LOSS OF PROFITS, GOODWILL, USE, DATA OR OTHER INTANGIBLE LOSSES (EVEN IF ACCESS TECHNOLOGY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES), RESULTING FROM: (a) THE USE OR THE INABILITY TO USE THE SERVICE AND/OR SOFTWARE; (b) THE COST OF PROCUREMENT OF SUBSTITUTE GOODS AND SERVICES RESULTING FROM ANY GOODS, DATA, INFORMATION OR SERVICES PURCHASED OR OBTAINED OR MESSAGES RECEIVED OR TRANSACTIONS ENTERED INTO THROUGH OR FROM THE SERVICE AND/OR SOFTWARE; (c) UNAUTHORIZED ACCESS TO OR ALTERATION OF YOUR TRANSMISSIONS OR DATA; (d) STATEMENTS OR CONDUCT OF ANY THIRD PARTY ON THE SERVICE AND/ OR SOFTWARE; (e) FAILURE TO INSURE THE COMPATIBILITY OF YOUR SYSTEM (I.E., THE EQUIPMENT, DEVICES, AND SOFTWARE THAT YOU PROVIDE TO RECEIVE THE SERVICE) WITH THE SERVICE AND/OR SOFTWARE, OR (f) ANY OTHER MATTER RELATING TO THE SERVICE AND/OR SOFTWARE.

YOUR SOLE REMEDY AND EXCLUSIVE REMEDY FOR ANY DISPUTE WITH ACCESS TECHNOLOGY IN CONNECTION WITH THE SERVICE AND/OR SOFTWARE IS THE CANCELLATION OF YOUR SERVICE AS PROVIDED IN THESE TOS.

Who's Online

We have 141 guests online

Advertisements

Featured Links:
Authorize.Net
We offer Safe, Secure Credit Card Processing for your company or online store through our partners at Authorize.Net
Refer a Friend!
Refer a Friend! Get Free Service!
Specials!
Get a new site, get a free Month of Hosting!
Hot Deals!
This week's Hot Deals!
VoIP Phones!
VoIP Phone Systems are hot! Save up to 80% on your phone bills!
Online Computer Store
Check out our online computer store! Specials every day!