Last Modified August 10, 2020 Page 1 of 3 Wallace Cloud and Associated Networks Access and End User License Agreement The following terms and conditions apply to any network activity on these listed wired and wireless networks: Wallace Cloud TX Wallace Cloud NM VEIUA (Valle Escondido Internet Wallace Cloud TX (5GHz) Wallace Cloud NM (5GHz) Users Association) (2.4 & 5GHz) Wallace Cloud TN Wallace Lodge Wallace Cabin Powerbeam 5AC 500 Wallace Cloud TN (5GHz) (5735mhz) Wallace Lodge Powerbeam 5AC 500 (5735mhz) Terms and Conditions m By using any internet service provided via Wallace Cloud, you hereby expressly acknowledge and agree that there are significant security, privacy and confidentiality risks inherent in o accessing or transmitting information through the internet, whether the connection is facilitated . c through wired or wireless technology. Security issues include, without limitation, interception of transmissions, loss of data, and the introduction or viruses and other programs that can corrupt or d damage your computer. u Accordingly, you agree that the owner and/or provider of this network is NOT liable for any o interception or transmissions, computer worms or viruses, loss of data, file corruption, hacking or l g damage to your computer or other devices that result from the transmission or download of c r information or materials through the internet service provided. e o Use of the wireless network is subject to the general restrictions outlined below. If abnormal, c . illegal, or unauthorized behavior is detected, including heavy consumption of bandwidth, the a a network provider reserves the right to permanently disconnect the offending device and/or user l from the wireless and wired network. Wallace Cloud reserves the right to terminate an internet l i u session at any time. a e Examples of Illegal Uses w v The following are representative examples only and do not comprise a comprehensive list of . . illegal uses: a a 1. Spamming and invasion of privacy - Sending of unsolicited bulk and/or commercial l l messages over the Internet using the Service or using the Service for activities that u u invade another's privacy. e e 2. Intellectual property right violations - Engaging in any activity that infringes or misappropriates the intellectual property rights of others, including patents, copyrights, trademarks, service marks, trade secrets, or any other proprietary right of any third party. 3. Accessing illegally or without authorization computers, accounts, equipment or networks belonging to another party, or attempting to penetrate/circumvent security measures of another system. This includes any activity that may be used as a eula.wallacecloud.com eula.veiua.org Last Modified August 10, 2020 Page 2 of 3 precursor to an attempted system penetration, including, but not limited to, port scans, stealth scans, or other information gathering activity. 4. The transfer of technology, software, or other materials in violation of applicable export laws and regulations. 5. Export Control Violations 6. Using the Service in violation of applicable law and regulation, including, but not limited to, advertising, transmitting, or otherwise making available ponzi schemes, pyramid schemes, fraudulently charging credit cards, pirating software, or making fraudulent offers to sell or buy products, items, or services. 7. Uttering threats; 8. Distribution of pornographic material; 9. Distribution of pornographic materials to minors; 10. and Child pornography. Examples of Unacceptable Uses The following are representative examples only and do not comprise a comprehensive list of unacceptable uses: 1. High bandwidth operations, such as large file transfers and media sharing with peer- to-peer programs (i.e.torrents), operating several streaming services at once (Please m limit Netflix, Disney +, and others to no more than two instance at a time.), and large cloud based data backups o 2. Obscene or indecent speech or materials . c 3. Defamatory or abusive language 4. Using the Service to transmit, post, upload, or otherwise making available d defamatory, harassing, abusive, or threatening material or language that encourages u bodily harm, destruction of property or harasses another. o 5. Forging or misrepresenting message headers, whether in whole or in part, to mask the l g originator of the message. c r 6. Facilitating a Violation of these Terms of Use e o 7. Hacking; this includes port scans, brute forcing, etc. refer to item 3 of Examples of c . Illegal Uses a a 8. Distribution of Internet viruses, Trojan horses, or other destructive activities ll u 9. Distributing information regarding the creation of and sending Internet viruses, i worms, Trojan horses, pinging, flooding, mail-bombing, or denial of service attacks. a e Also, activities that disrupt the use of or interfere with the ability of others to w v effectively use the node or any connected network, system, service, or equipment. . . 10. Advertising, transmitting, or otherwise making available any software product, a a product, or service that is designed to violate these Terms of Use, which includes the l l facilitation of the means to spam, initiation of pinging, flooding, mail-bombing, u u denial of service attacks, and piracy of software. e e 11. The sale, transfer, or rental of the Service to customers, clients or other third parties, either directly or as part of a service or product created for resale. 12. Seeking information on passwords or data belonging to another user. 13. Making unauthorized copies of proprietary software, or offering unauthorized copies of proprietary software to others. 14. Intercepting or examining the content of messages, files or communications in transit on a data network. eula.wallacecloud.com eula.veiua.org Last Modified August 10, 2020 Page 3 of 3 Supervision and Monitoring Wallace Cloud reserves the right, upon reasonable cause for suspicion, to access all aspects of its computing systems and networks, including user’s internet sessions to determine if a user is violating any agreement mentioned above. Wallace Cloud has the right to determine which uses constitute acceptable use and to limit access to such uses. Wallace Cloud has the right to limit the time of access and priorities among competing acceptable uses. Wallace Cloud also reserves the right to view private files that have been downloaded using our network infrastructure to check for the propriety of downloaded files and monitor bandwidth usage. Consequences for Violation Violations to any of these terms and conditions may result in service termination depending on the severity and number of times the terms and conditions are violated. • First Offense –local network monitor logs unique address, associated traffic (including any data of offending usage), and other details of the offending device • Second Offense –all actions from First Offense, network monitor will dispatch email to registered administrators • Third Offense –all actions from First Offense and Second Offense, user will immediately lose internet access. An email from the network monitor will be dispatched to the user detailing the m conditions of their termination of service (if in contacts list). . c o u d c lo r g a c e a.o all i u . w . ve u la u la e e eula.wallacecloud.com eula.veiua.org
Enter the password to open this PDF file:
-
-
-
-
-
-
-
-
-
-
-
-