Policies and Terms
Terms and policies when doing business with Nunn Telephone Company
Terms & Conditions
This is Nunn Telephone Company’s Acceptable Use Policy (AUP). Nunn Telephone Company is referred to as EzLink Internet by Nunn Telephone Company, us, we, Company, or our. Users of our Internet related products are referred to as customer, you or your. This AUP is part of each customer’s contract with us, whether the contract is electronic or paper. Modifications to the AUP can be found on our website at www.nunntel.com/. By continuing to use our products, you agree to be bound by this AUP as modified. Your End Users and their customers are also bound by this AUP.
You expressly understand that the evolving nature of the Internet and on-line commerce makes it necessary for us to reserve the right to make changes to this AUP at any time, and without notice. For this reason as well, this AUP may not represent all possible ways in which you or an End User (as defined in your contract) engage in unacceptable behavior. We reserve the right to determine, in our sole and exclusive judgment, what activities are unacceptable.
This AUP incorporates, either explicitly, or by reference, other policies from entities providing products through us to you. These policies must be “passed through” to you and apply to you through this AUP. You are strongly encouraged to review these policies prior to agreeing to be bound by this AUP. They are listed under Legal Notices on our website.
You violate this AUP when you, or your End Users, engage in activities prohibited by the AUP. It is your responsibility and contractual obligation to ensure that End Users comply with this AUP, and cooperate with us in the enforcement and administration of this AUP.
- Lawful Purpose – The Services may be used for lawful purposes only. Transmission, storage, or presentation of any information, data or material in violation of any applicable law, regulation, this AUP, or any agreement for services, is prohibited. You may not use our products to directly facilitate the violation of any particular law or regulation.
The following list of prohibited uses is a partial list of uses prohibited by this AUP, and does not represent all unlawful uses of our products by you or End Users:
- instructing others in unlawful activities;
- forging, misrepresenting, omitting or deleting message headers (aka “spoofing”), return mailing information, internet protocol addresses to conceal or misidentify the origin of a message or to impersonate another person;
- creating or sending Internet viruses, worms or Trojan horses, flood or mail bombs, or other harmful components, or attempting to interfere with the service of others including users, hosts, and networks by engaging in denial of service attacks, “flooding” of networks, or deliberate attempts to overload a service and attempts to “crash” any host;
- attempting to obtain unauthorized access to any network or account, or engaging in any activity which would compromise customer privacy or gain access to any system or data without required permission, whether through hacking, and/or subverting, or assisting others in subverting, the security or integrity of our products, data, or systems;
- soliciting, or instructing in, the performance of any illegal activity, even if the activity itself is not performed;
- transmitting, posting or receiving material that is threatening, abusive, libelous, defamatory, obscene, pornographic, or otherwise in violation of any local, state, federal or international law or regulation;
- engaging in any activity which would result in third-party charges to Company;
- reselling or otherwise sharing Company’s Internet service, account information or passwords;
- distributing Company’s Internet services beyond the scope of your end-user account;
- attaching equipment, accessory, apparatus, circuit or devices that are harmful to the network and are attached to or connected with our facilities;
- using Internet service for web or email hosting without making special written subscription arrangements with Company.
You and End Users may not engage in activity that transmits, downloads, or infringes or misappropriates the intellectual property rights of others. This includes but is not limited to, copyrights, trademarks, service marks, trade secrets, software piracy and patents. You and End Users may not use our products to defame, harass, abuse or threaten third parties; and/or acting in any manner that might subject us to unfavorable regulatory action, subject us to any liability for any reason, or adversely affect our public image, reputation or goodwill, as determined by us in our sole and exclusive discretion.
- SPAM – We have a zero tolerance approach to SPAM. This zero tolerance policy extends both to your using our products to disseminate SPAM, and the use of our products to send SPAM to our customers.Customers, who send, disseminate or support SPAM will have their accounts suspended. We consider SPAM to be the sending or receipt of 200 or more email messages at one time. However, we reserve the right to determine, in our sole and absolute discretion, what constitutes SPAM. We also prohibit you, or End Users, from relaying email. In addition, should your use of our products cause us to be “black listed,” your account may be suspended.We filter email for SPAM. We are not responsible for refused, expired or misdirected email as a result of this filtering. It is your sole and exclusive responsibility to properly configure your SPAM filter. Quarantined email will not be available to you indefinitely. It is your obligation to review your SPAM mailbox regularly.
- Violations of Rights, Other than Copyright – Complaints about such activity by our customers or End Users may be directed to Nunn Telephone Company and can be reached at 970-897-2200 or email@example.com.
- Child Pornography, Child Erotica and Bestiality – We take a zero-tolerance approach to using our products to disseminate or display images classified under U.S. law as child pornography, child erotica and/or bestiality. The contracts of customers who are themselves, or whose End Users are, using our products to disseminate or display child erotica, regardless of its literary merit, will be terminated.
- U.S. Export Laws – You may not use the services to engage in a violation of U.S. export laws. Violation of these laws may include selling products that may be legal to sell in the U.S., but illegal to export. You may not use our products to provide products to End Users with whom U.S. citizens may not do business.
- IP Addresses – We administer the network on which our products are provided. You cannot use IP addresses which were not assigned to you by us. If it is determined that you are using IP addresses which were not officially assigned by us, you will be suspended from network access until such time as the IP address overlap can be corrected. We own the IP numbers and addresses that may be assigned to you by us. These addresses may not be assigned or transferred, and are recycled by us on termination of your use of the products. We may, in our sole discretion, change these addresses.
- Suspension and/or Termination of Products, and Credits – Your or an End User’s failure to abide by any of the items set out in this AUP is grounds for suspension or termination of your services. Any termination or suspension may be undertaken with, or without, notice to you or an End User.We do not issue credits for outages incurred as a result of our decision to suspend or terminate service for a violation of this AUP.You agree to indemnify and hold us harmless for any and all claims, damages, losses, expenses (including attorneys’ fees and other legal expenses) resulting from your use (or misuse), including any suspension or termination, of our Internet service whether or not such use is found to be in violation of any statute, regulation or rule.
- Monitoring Products, Cooperation with Law Enforcement and Legal Documents – We may disclose information, including information that you or End Users may consider confidential, in order to comply with a court order, subpoena, summons, discovery request, warrant, regulation, or governmental request. We assume no obligation to inform you or an End User that information has been so provided, and in some cases may be prohibited by law from giving such notice. We may also disclose such information when it is necessary for us to protect our business, or others, from harm.
- Security – You are solely responsible for ensuring that your data is secure, that confidential information remains confidential, and that you do not expose your business to risks you are not prepared to assume. Use of information accessed by the Internet is at customer’s own risk. Company disclaims any responsibility for the accuracy, privacy or quality of the information. By using the Internet service, the customer agrees to hold Company harmless for content accessed using the Internet service. We reserve the right to take immediate action to suspend or terminate your account if, in our sole and exclusive discretion, you or an End User is engaging in activities that jeopardize our security, the security of other customers, or of the Internet in general. You may not be provided with advance notice that we are taking such action.
Network Management Practices Policy
Pursuant to the Federal Communications Commission’s Open Internet Rules found in Parts 1, 8 and 20 of Title 47 of the Code of Federal Regulations, the policies of Nunn Telephone Company (“Provider”) regarding network management practices, performance characteristics, and commercial terms are provided in entirety so that Provider’s current customers, prospective customers, third-party content providers and other interested parties can make informed choices regarding the broadband Internet access services offered by Provider, and the extent Provider’s network management practices may affect those services.
Network Management Practices
In the interest of providing the best online experience possible for all of Provider’s customers, Provider utilizes reasonable network management practices tailored to achieve legitimate network management purposes. Because bandwidth is a limited resource for broadband Internet service providers, it is essential that Provider reasonably manages its network to promote the use and enjoyment of the Internet by all of Provider’s customers. By engaging in reasonable and responsible network management,
Provider prevents its customers from being subjected to the negative effects of spam, viruses, security attacks, network congestion, and other risks that threaten to degrade service. The network management practices employed by Provider are consistent with industry standards.
It is possible that a relatively small number of customers may place a disproportionate demand on the network bandwidth resources, causing network congestion and an overall degradation in service quality for other end users. For this reason, if Provider’s network nears a state of congestion, Provider may use congestion management practices to ensure all of Provider’s customers retain access to a “fair share” of bandwidth resources.
When Provider’s network nears a state of congestion, the congestion management tools, practices and/or software employed by Provider will identify segments of the Provider network which have a predetermined, aggregated level of bandwidth usage. From there, the congestion management tools will ascertain which customer account in the identified network segment is using a disproportionate share of the bandwidth. The Internet traffic of the identified customer account may be temporarily managed until the period of network congestion passes. Customers whose Internet traffic is temporarily managed by Provider will still be able to access online content, and many activities will be unaffected; however, these customers may experience slower downloads and uploads and Internet/website response times.
The congestion management practices utilized by Provider are “protocol-agnostic” meaning that the network does not manage congestion based on the online activities, protocols or applications a customer uses. Rather, Provider’s congestion management practices focus only on the heaviest bandwidth users in real time.
Provider does not make use of any application-specific network management practices. Provider does not modify protocol fields in ways not prescribed by the protocol standard. Provider does not inhibit or favor certain applications or classes of applications. Provider does not block or rate-control specific protocols or protocol ports, with the exception of malformed or non-standard protocol traffic as identified by Provider and outbound Simple Mail Transfer Protocol (“SMTP”) as a protection and security control mechanism against unsolicited commercial email (“UCE”).
Device Attachment Rules
Customer-provided DSL, FTTH, and Cable Modem Customer Premise Equipment (“CPE”) are incompatible with Provider’s network due to customization of service activation processes by the Provider. Provider deploys compatible CPE device to customer upon service activation and remains the property of the Provider after service deactivation. In order for a device to be approved for use on the Provider’s network, the device must conform to publicly available industry standards, be non-harmful to Provider’s network, and be connected on the local area network (“LAN” or “private side”) of the above mentioned CPE.
Provider offers its customers unrestricted access to all of the lawful content, services, and applications available on the Internet. Provider uses industry standard tools and generally accepted best practices and policies to protect our customers from spam, phishing, and other unwanted or harmful online content and activities. In the instances where these tools and policies identify online content as harmful or unwanted, the content may be prevented from reaching customers, or customers may be permitted to identify or inspect content to determine if it is harmful or unwanted.
The security measures employed by Provider to prevent the spread of viruses, malware, spam, harmful and unwanted content or other threats to consumers do not prevent end-users from running certain applications.
Provider offers broadband Internet access service via a Digital Subscriber Line (“DSL”), or Fiber to the Home (“FTTH”). DSL is a wireline transmission technology that transmits data faster over traditional copper telephone lines already installed to homes and businesses. FTTH utilizes fiber optic cable to deliver telephone, data and video services to customer locations.
The advertised speed of Provider’s Internet service is the maximum speed achievable with the technology utilized by Provider. While the maximum advertised speed is attainable for end users, several factors may affect the actual speed of Provider’s Internet service offerings, including, but not limited to: the distance of the consumer’s home or office from Provider’s central office (i.e., the further away the customer is from the central office, the slower the broadband speed), the end user’s computer, modem or router, activity during peak usage periods, and other Internet traffic.
Based on internal RFC2544 back-to-back testing measuring throughput and latency, the expected mean upload and download access speeds are typically plus or minus 15% of the advertised access speeds during peak usage periods (i.e., between 7:00 p.m. and 11:00 p.m. on weeknights) with a mean round trip latency of 10ms.
The actual speeds achieved with Provider’s Internet service offering may not make Provider’s Internet service suitable for real-time applications, such as Voice over Internet Protocol (“VoIP”). Some real-time services may require more stringent protocol performance metrics including low latency, low jitter, and high throughput. Customer may choose to query Provider to be better informed about their specific performance requirements before purchasing real-time services.
Provider does not offer any specialized services. Please click here to see our service offerings.
In order to meet the usage and budgetary needs of all of our customers, Provider offers a wide selection of broadband Internet access plan options, including promotional offerings and bundled service choices.
To see Provider’s current promotions and pricing on broadband Internet access service, please visit our website or call 970-897-2200 to speak with a customer service representative.
For network security purposes, businesses and/or other customers utilizing Provider’s network, but not Provider’s email service with the corresponding security measures, may be required to purchase a Static Internet Protocol (“IP”) address for an additional monthly fee.
Early Termination Fees
If a customer previously entered into a service agreement with Provider for broadband Internet access service for a defined service term, and customer desires to terminate the service agreement prior to the expiration of that term, Provider may charge a reasonable early termination fee if such fee is clearly indicated in the service agreement.
Upon service deactivation, failure to return Provider-owned equipment such as DSL Modem or FTTH ONT devices will result in a fee charged to the customer.
Customers may call 970-897-2200 to speak with a customer service representative about Early Termination Fees in the event of service deactivation with the Provider.
Provider’s Internet service is priced on a flat-fee basis (plus taxes). Provider does not charge end users a usage-based fee for Internet service at this time.
Provider affords full access to all lawful content, services and applications available on the Internet and does not routinely monitor, inspect or store the network activity and traffic of its Internet service users. However, Provider reserves the right to monitor bandwidth, usage, transmissions and content for purposes of protecting the integrity of the network and Provider’s Internet access service through reasonable network management practices.
For troubleshooting purposes, Provider may collect equipment information to identify the equipment customer is using on the network, including, but not limited to: equipment type, serial number, settings, configuration and software. Provider may also collect performance information to examine the operation of the equipment, services and applications the customer may use on the network, including, but not limited to: IP addresses, URLs, data transmission rates and latencies, location information, security characteristics, and information about the amount of bandwidth and other network resources customer is using in connections with uploading, downloading or streaming data to and from the Internet.
Network traffic, activity, performance information, and equipment information monitored or collected by Provider is done so for the sole purpose of reasonable network management purposes.
Provider is required to comply with relevant laws, regulations and governmental requests, including supplying relevant information to law enforcement agencies which may be collected as part of network management practice outlined above. Provider does not distribute information on network activity and/or traffic to any other third party, or use network traffic information for any non-network management purpose.
Provider strives to respect a customer’s desire for privacy and therefore obtains and uses individual customer information for business purposes only. The information is used to enable Provider to provide customers with the best service possible. Customer information may also be used to protect customers, employees, and property against fraud, theft, or abuse and to maintain good customer relations. All Provider personnel are aware of and protect the privacy of all forms of customer communications and information.
No personal information obtained on-line is released outside of Provider or by its authorized agent, except with the customer’s permission, as required by law, for safety reasons, or to survey customer satisfaction. Provider uses the information provided when placing an order to complete that order. Any information asked for on our website will only be used to process a customer’s request. Provider does not sell customer information to any outside party.
Customer Proprietary Network Information (CPNI). It is Provider’s policy to maintain and protect the confidential and proprietary network information we possess of our customers. Unless required to do so by law or unless such information will assist us in providing telecommunications services, no customer confidential or proprietary information will be given to any third parties. For the purposes of this policy, “customer confidential or proprietary information” does not include any information published in any telephone directory.
An individual can visit and use Provider’s website with complete privacy. A web site visitor can choose to provide customer-specific information by ordering a product or service, sending Provider an email or using our convenient on-line tools. Any information provided by a web site visitor is held strictly confidential and will not be sold or provided to any other organization or business, Provider web sites may contain links to other web sites. Provider is not responsible for the content or privacy policies of other sites. Even though Provider will use its best efforts to assure privacy and confidentiality, material on the web, e-mail, or other electronic communications cannot be guaranteed to be protected against access by unauthorized persons.
The Provider’s network management practices as discussed herein are intended solely to provide the best online experience possible for all of Provider’s customers by safeguarding our network and its users from spam, viruses, phishing, and other unwanted or harmful online content and activities. Provider’s network management practices are not intended, nor implemented, to block consumers from accessing the content and applications of their choice, deprive consumers of their entitlement to competition, or discriminate against or in favor of certain network traffic. End users with questions, concerns or complaints regarding Provider’s network management practices are encouraged to contact Provider for issue resolution.
If you have any questions regarding Providers Network Management Practices Policy or would like to file a complaint with Provider regarding its network management practices, please contact Provider at:
Nunn Telephone Company
Attn: Adam Rislov, Manager
PO Box 249, 285 Logan Avenue, Nunn, Colorado 80648
970-897-2200 / firstname.lastname@example.org
Further, if you believe that Provider is in violation of the FCC’s Open Internet Rules, you may file either an informal or formal complaint with the FCC. www.consumercomplaints.fcc.gov
FCC Establishes Portal for ISP Transparency Disclosures
On May 21, 2018, the FCC released a Public Notice announcing the establishment of a portal for Internet service provider (ISP) transparency disclosures. The portal will be available for both ISPs submitting their disclosures to the FCC and consumers searching for any disclosures submitted to the FCC on May 29, 2018. The Restoring Internet Freedom Order, wherein the FCC adopted ISP transparency reporting requirements, becomes effective on June 11, 2018.
The revised transparency rule – 47 CFR § 8.3 – requires ISPs to publicly disclose information about their service in one of two ways – by providing the disclosure on a publicly available, easily accessible website or by submitting it to the FCC for posting. ISPs choosing to submit their required disclosures to the FCC should do so electronically, in a format that is accessible to people with disabilities, through https://www.fcc.gov/isp-disclosures.
An ISP that does not submit its required disclosure to the FCC through this portal will be deemed as having elected to provide it on a publicly available, easily accessible website of its choosing. An ISP that submits its required disclosure to the FCC and later elects to provide it on a publicly available, easily accessible website of its choosing should inform the FCC of this change by filing via the FCC portal a clear statement of the change, including the website where consumers can find the required disclosure.
The Open Internet Rules, as adopted, and Provider’s Network Management Practices Policy are not intended to affect, alter or otherwise supersede the legal status of cooperative efforts by broadband Internet access service providers and other service providers that are designed to curtail infringement in response to information provided by rights holders in a manner that is timely, effective, and accommodates the legitimate interests of providers, rights holders, and end users.
Furthermore, the Open Internet Rules, as adopted, and Provider’s Network Management Practices Policy do not prohibit Provider from making reasonable efforts to address the transfer of unlawful content or unlawful transfers of content.
For additional information, please review Provider’s Acceptable Internet Use Policy/Subscriber Agreement at: https://www.goldenwest.com/support/policies-and-information/acceptable-use-policy/
EzLink Internet Access agrees to provide and the User agrees to receive access to the Internet service according to the following terms and conditions:
- All provisions of EzLink’s Service Agreement (“Agreement”) apply to the User’s Principal Account and all Associate Accounts billed to the Principal Account.
- The benefits of or rights conferred by this agreement are non-transferable. Use of EzLink accounts is expressly limited to the individual or business whose name appears on the account and dependents of the account holder living at the same address. This is to include the User re-selling of the services provided by EzLink without the express written consent of EzLink.
- EzLink may enter into, upon and over user’s service premises periodically during the term of this Agreement to install connect, inspect, maintain, repair, alter, disconnect and remove our facilities and equipment used to provide service. To the extent the same is consistent with your ownership of the premises, you grant EzLink a temporary and permanent easement to construct, install, maintain, and/or replace service facilities and to install, connect, inspect, maintain, repair, alter, disconnect, and remove all facilities and equipment necessary to provide Service. In the event you are not the owner of the premises upon which installation is requested, you warrant to EzLink that you have obtained the consent of the owner of the premises for us to install and maintain facilities and equipment as contemplated herein. User shall ensure that the service premises is a safe working environment, free from Hazardous Materials or obstructions, interference from persons or pets, and reasonably suitable for the services. All pets, poultry, and livestock at the premises must be properly restrained prior to EzLink entry.
- User agrees to use the service in a manner consistent with any and all applicable laws.
- User agrees to follow the Acceptable Use Policy of any network that a user connects to, including EzLink’s system. Furthermore, the user agrees to hold harmless and indemnify EzLink for violations of any AUP policy by the User and/or any actions taken by EzLink in response to such violations.
- If User is less than 18 years of age, this Agreement must be signed by a parent or legal guardian, who is responsible for all charges related to the use of the User’s account(s).
- Use of EzLink for advertising or promotion of a commercial product or service without the express, written consent of EzLink is expressly prohibited. This includes and is not limited to the designed personal home pages site, ftp site, email or another service provided by EzLink.
- The User is responsible for all use of the User’s account(s) and confidentiality of password(s). EzLink will suspend access or change password(s) for access to the User’s account(s) immediately upon notification by User that his/her password has been lost, stolen or otherwise compromised.
- User is responsible for all local or long-distance telephone charges for connecting to EzLink.
- The User agrees to pay EzLink all charges relating to the use of the User’s account(s) according to rates and prices published online at the time the service is used. Online rates and prices are incorporated into this agreement by reference. The User is also responsible for monthly storage charges as described online.
- Access is subject to credit limits established by the issuer of User’s credit card and/or by EzLink. A credit limit is applied to all accounts. User’s access to service may be suspended if User exceeds his/her credit limit unless prior arrangements have been made.
- The User is responsible for charges at the time the service is used and EzLink may apply the amount due to the User’s credit card at any time.
- EzLink reserves the right to suspend access to service for a User’s account(s) upon an indication of credit problems including delinquent payments or rejection of any credit card charges.
- EzLink reserves the right to change prices on 30 days’ notice as published online.
- THE EzLink SERVICE IS PROVIDED ON AN “AS IS, AS AVAILABLE” BASIS. NO WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO THOSE OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, ARE MADE WITH RESPECT TO EzLink OR ANY INFORMATION OR SOFTWARE THEREIN.THIS “NO WARRANTY” EXPRESSLY INCLUDES ANY REIMBURSEMENT FOR LOSSES OF INCOME DUE TO DISRUPTION OF SERVICE BY EzLink OR ITS PROVIDERS.
- TO THE EXTENT PERMITTED BY LAW, EzLink’s TOTAL LIABILITY FOR ANY CLAIM CONCERNING SERVICES OR EQUIPMENT PROVIDED TO CUSTOMER, INCLUDING FOR ANY EXPRESS OR IMPLIED WARRANTIES, IS LIMITED TO THE EQUIVALENT OF THREE MONTH’S PAYMENT FOR THE AFFECTED SERVICES OR EQUPMENT WE PROVIDED, WHETHER SUCH CLAIM OR REMEDY IS SOUGHT IN CONTRACT OR TORT, INCLUDING NEGLIGENCE, STRICT LIABILITY OR OTHERWISE. TO THE EXTENT PERMITTED BY LAW, THE COMPANY SHALL NOT BE LIABLE FOR ANY CONSEQUENTIAL, INCIDENTIAL, INDIRECT, PUNITIVE, SPECIAL OR TREBLED OR ENHANCED DAMAGES, INCLUDING, BUT NOT LIMITED TO LOST PROFITS, LOST BUSINESS, OR OTHER COMMERICIAL OR ECONOMIC LOSS, WHETHER SUCH DAMAGES ARE CLAIMED FOR BREACH OF CONTRACT, NEGLIGENCE OR OTHERWISE AND WHETHER OR NOT WE HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
- Neither EzLink nor its Information Providers are responsible for any damages arising from the User’s use of EzLink Internet services, or by the User’s inability to use EzLink ‘s access services.
- EzLink reserves the right to change without notice the EzLink service, including, but not limited to, access procedures, hours of operation, menu structures, commands, documentation, vendors, and services offered.
- EzLink is not responsible for the User’s personal files residing on EzLink. The User is responsible for independent backup of his/her data stored on EzLink.
- EzLink reserves the right to delete User’s personal files after one or both parties terminate this agreement.
- EzLink reserves the right in its sole discretion to delete any information entered into EzLink by User. EzLink and its authorized representatives shall have the right, but shall not be obligated, to edit publicly viewable information.
- THE USER HEREBY AGREES THAT ANY MATERIAL SUBMITTED FOR PUBLICATION ON EzLink THROUGH USER’S ACCOUNT(S) DOES NOT VIOLATE OR INFRINGE ANY COPYRIGHT, TRADEMARK, PATENT, STATUTORY, COMMON LAW OR PROPRIETARY RIGHTS OF OTHERS, OR CONTAIN ANYTHING OBSCENE OR LIBELOUS.
- EzLink, at its sole business judgment, may terminate this Agreement immediately or suspend the User’s access to the service upon any breach of this Agreement by the User, including, but not limited to, refusal or failure to pay for services provided or by sole judgement of EzLink that the User may be performing activities harmful to EzLink or its Users, employees, vendors, business relationships, or any other users of the Internet.
- Due to the public nature of the Internet, all email is considered publicly accessible and important information should be treated carefully. EzLink is not liable for protection or privacy of electronic mail and information transferred through the Internet.
- EzLink reserves the right to terminate access to service for any User account which has been inactive for 6 months.
- This Agreement shall be governed by the laws of the State of Colorado.
- EzLink may modify these terms and conditions upon notice published online via EzLink. The User’s use of EzLink services after such notice shall constitute User’s acceptance of the modifications to this Agreement.
- Non-enforcement of any section of this Agreement does not constitute consent and EzLink reserves the right to enforce this Agreement at its sole discretion.
- If any one or more paragraphs in this Agreement is found to be unenforceable or invalid, User’s and EzLink’s agreement on all other paragraphs shall remain valid.
- Web pages included in accounts are specifically designated and shall be monitored by EzLink for compliance. EzLink reserves the right to assess appropriate account type fees in the event the user publishes pages contrary to the stated account web page type, e.g., personal pages used in a commercial manner.
- EzLink provides unlimited access accounts to only one user at a time. If a user has logins that occur at the same time while being an unlimited account holder, this violates the condition of: one user, one account, one login at a time. Such violations will be detailed by date and time of each violation and the user may be responsible for payment of additional accounts to cover the additional or simultaneous logins for all month(s) applicable.
- DSL/Wireless/Broadband/ISDN services are provided to the user under the following terms and conditions related to said services. a. Stated speeds, up and down, published per each service is not and cannot be guaranteed. b. All security needs, provisions and safeguards are the user’s full responsibility. c. Resale of access services is strictly prohibited unless there is written authorization duly executed between the user and provider.
- Copyright Infringement – We are registered with the United States Copyright Office pursuant to the Digital Millennium Copyright Act (DMCA). If your site has been copied by our customer, or an End User, in a way that falls within the terms of the DMCA, you must provide us with proper notice of such an infringement. The DMCA contains very specific guidelines of what your notice must contain. Click here to view our DMCA policy.