TrulsZK Guest Network Terms and Conditions
<- Back HomeLast updated: 17 September 2022
Terminology
These Terms and Conditions ("Terms", "Terms and Conditions") govern your relationship with TrulsZK Guest Network service (the "Service", or "Network") operated by TrulsZK ("we", "our", us", or "TrulsZK").
1. Consent
1.1 Please read these Terms and Conditions carefully before using the Service.
1.2 Your access to and use of the Service is conditioned on your acceptance of and compliance with these Terms. These Terms apply to all visitors, users and others who access or use the Service.
1.3 By accessing or using the Service you agree to be bound by these Terms. If you disagree with any part of the Terms then you may not access the Service.
2. Network Access
2.1 When and as available, we will allow You non-exclusive network connectivity while on Our premises. However, we do not guarantee You an internet connection; the bandwidth/speed provided shall be at our sole discretion and Your usage may be terminated by Us at anytime without further notice.
2.2 While we may agree to troubleshoot any connectivity problems on our network, We will not provide technical assistance for any devices not owned by Us. Any assistance you might receive from us is strictly on an as is basis, without any warranties or representations.
2.3 The Services may be used for lawful purposes only. Internet access through Our Service is filtered, may be monitored, and We may block or restrict access to certain websites, or the user of certain TCP, or UDP ports based upon Our security policies in place from time to time.
3. Limitations of Use
3.1 You agree to not use the Service to:
-
(a) transmit any material that is unlawful, threatening, abusive, harassing, tortious, defamator, obscene, libelous, invasive of another’s privacy, racially, ethnically or otherwise objectionable;
-
(b) harm, or attempt to harm, minors in any way;
-
(c) impersonate any person, entity, electronic identifier or identity, or falsely state or otherwise misrepresent your affiliation with a person or entity; forge headers or otherwise manipulate identifiers in order to disguise the origin of any material transmitted through the Service;
-
(d) violate any applicable law and/or regulation, including, but not limited to, advertising, transmitting, or otherwise making available ponzi schemes, pyramid schemes, fraudulently charging credit cards, pirating software, or making fraudulent offers to sell or buy products, items, or services;
-
(e) transmit any material that infringes any patent, trademark, trade secret, copyright or other proprietary rights of any party;
-
(f) transmit any unsolicited or unauthorised advertising, promotional materials, "junk mail," "spam," "chain letters," "pyramid schemes" or any other form of solicitation;
-
(g) transmit any material that contains software viruses or any other computer code, files or programs designed to interrupt, destroy or limit the functionality of any computer software or hardware or telecommunications equipment;
-
(h) access illegally or without authorisation computers, accounts, equipment or networks belonging to another party, or attempting to penetrate/circumvent security measures of another system. This includes any activity that may be used as a precursor to an attempted system penetration, including, but not limited to, port scans, stealth scans, or other information gathering activity.
-
(i) high bandwidth operations, such as large file transfers and media sharing with og without peer-to-peer programs (i.e. torrents);
-
(j) obscene or indecent speech or materials;
-
(k) defamatory or abusive language;
-
(l) transmit, post, upload, or otherwise making available defamatory, harassing, abusive, or threatening material or language that encourages bodily harm, destruction of property or harasses another.
-
(m) forging or misrepresenting message headers, whether in whole or in part, to mask the originator of the message.
-
(n) facilitating a Violation of these Terms and Conditions
-
(o) attempt to get unauthorised access, hacking, exploit of security holes;
-
(p) distribution of Internet viruses, Trojan horses, or other destructive activities
-
(q) distributing information regarding the creation of and sending Internet viruses, worms, Trojan horses, pinging, flooding, mail-bombing, or denial of service attacks. Also, activities that disrupt the use of or interfere with the ability of others to effectively use the node or any connected network, system, service, or equipment.
-
(r) advertising, transmitting, or otherwise making available any software product, product, or service that is designed to violate these Terms of Use, which includes the facilitation of the means to spam, initiation of pinging, flooding, mail-bombing, denial of service attacks, and piracy of software.
-
(s) the sale, transfer, or rental of the Service to customers, clients or other third parties, either directly or as part of a service or product created for resale.
-
(t) Seeking information on passwords or data belonging to another user.
-
(u) making unauthorised copies of proprietary software, or offering unauthorised copies of proprietary software to others.
-
(v) intercepting or examining the content of messages, files or communications in transit on a data network.
4. Data traffic
4.1. From time to time We may monitor the exchange of content through a Guests Device as part of an investigation regarding the content and/or activities of internet usage.
4.2. Using Our Service, You may download and upload content to and from Your Device. You expressly acknowledge and agree that there are significant security, privacy and confidentiality risks inherent in accessing or transmitting information through the Internet, whether the connection to the Internet is facilitated through wired or wireless technology. These security issues range from interception of transmissions, loss of data, or the introduction of viruses or other programs that can damage your computer or network.
4.3 Accordingly, you agree that We shall not be liable for any interception of transmissions, loss of data, file corruption, hacking or damage to your computer or network that results from the transmission or download of information or materials through the service.
4.4 We are not responsible for Your content whether it is personal and/or corporate in nature, and You assume sole responsibility for any theft, loss or corruption of Your device or content.
4.5 By agreeing to these Terms and Conditions you expressly understand that we may monitor all traffic in and out of our gateway and therefore may gain access to and/or gain knowledge of content transmitted to or by you while connected to our services.
5. Limitation Of Liability
5.1 In no event shall TrulsZK, nor its directors, employees, partners, agents, suppliers, or affiliates, be liable for any special, direct, indirect, consequential, punitive, or incidental damages or any other damages or losses of any kind whatsoever, including but not limited to, loss of access, profits, data, use, goodwill, or other intangible losses, resulting from a( your access to or use of or inability or failure to access or use the Service; b( any conduct or content of any third party on the Service; c( any content or data obtained from the Service; and d( unauthorised access, use or alteration of your transmissions or content, whether based on warranty, contract, tort (including negligence) or any other legal theory, whether or not we have been informed of the possibility of such damage, and even if a remedy set forth herein is found to have failed of its essential purpose.
6. Disclaimer
6.1 Your use of the Service is at your sole risk. The Service is provided on an "AS IS" and "AS AVAILABLE" basis. The Service is provided without warranties of any kind, whether express or implied, including, but not limited to, implied warranties of merchantability, fitness for a particular purpose, non-infringement or course of performance.
6.2 TrulsZK its subsidiaries, affiliates, and its licensors do not warrant that a( the Service will function uninterrupted, secure or available at any particular time or location; b( any errors or defects will be corrected; c( the Service is free of viruses or other harmful components; d( the content, service, or information is correct, current, accurate, and/or up-to-date, or e( the results of using the Service will meet your requirements.
7. Governing Law
7.1 These Terms shall be governed and construed in accordance with the laws of Norway, without regard to its conflict of law provisions.
7.2 Our failure to enforce our rights and/or your obligations or provision of these Terms will not be considered a waiver of those rights.
7.3 If any provision of these Terms is held to be invalid or unenforceable by a court, the unenforceable part shall be replaced by a valid, enforceable term that most closely matches the intent of the original term, and the remaining terms shall be enforced.
7.4 These Terms constitute the entire agreement between us regarding our Service, and supersede and replace any prior agreements we might have between us regarding the Service.
8. Changes
8.1 We reserve the right, at our sole discretion, to modify or replace these Terms at any time. If a change is material and/or significantly affect your rights and/or obligations we will try to provide at least 14 days notice prior to any new terms taking effect. What constitutes such a change will be determined at our sole discretion.
8.2 You are advised to review these Terms and Conditions periodically for any changes. Changes to this Privacy Policy are effective when they are posted on this page.
8.3 By continuing to access or use our Service after those revisions become effective, you agree to be bound by the revised terms. If you do not agree to the new terms, please stop using the Service.
9. Contact Us
9.1 If you have any questions about these Terms and Conditions, please contact us.
<- Back Home
Back to Top