INTECH SYSTEMS

PRIVACY & TERMS OF USE

This document outlines the terms and conditions that govern the usage of Intech System. You are the end user, referred to as (“User”). By signing up for the service, you accept all of the terms and conditions (“Terms and Conditions”) set forth below, as well as any addenda to this agreement, and authorize us to deliver the Services (as defined below) for the period agreed upon when making an order for the Services (the “Initial Term”).

PLEASE READ AND REVIEW THE TERMS AND CONDITIONS BEFORE USING THE EQUIPMENT OR SERVICE. BY USING THE SERVICES, YOU ARE BECOMING A PARTY TO THIS AGREEMENT AND AGREE TO BE BOUND BY IT. YOU FURTHER ACKNOWLEDGE THAT YOU HAVE READ AND UNDERSTAND THE TERMS AND CONDITIONS, AND YOU AGREE TO BE BOUND BY THE TERMS AND CONDITIONS IN EFFECT, AS UPDATE BY US FROM TIME TO TIME. Furthermore, by placing an order for the Services, you acknowledge that we will begin processing such order and incur expenses and obligations immediately. IF YOU DO NOT AGREE TO BE BOUND BY THESE TERMS AND CONDITIONS, DO NOT USE THE SERVICES AND CANCEL YOUR ORDER. If you don’t agree to being

THE TERMS AND CONDITIONS ARE SUBJECT TO REVISION FROM TIME TO TIME.

IMPORTANT! THE HOTEL WIRELESS NETWORK YOU ARE USING IS UNSECURED. YOU SHOULD USE PROPER SECURITY MEASURES SUCH AS A VPN CONNECTION, A PERSONAL FIREWALL, AND KEEP YOUR OPERATING SYSTEM UP TO DATE WITH SECURITY PATCHES, ETC.

Here are some security recommendations:

Disable the wireless cards’ ad hoc (peer-to-peer) mode. This can be done using the adapter’s tools or in Windows XP. If you’re working offline, remove or disable your wifi card. Install a personal firewall. Windows XP includes a rudimentary firewall, but a more complex personal firewall can keep outsiders from accessing a laptop. Install your personal antivirus program. Make use of the email client’s security capabilities, namely digital signatures and email encryption. Digital signatures validate your identity to receivers and prevent messages from being tampered with. Make sure to only send credit card information to SSL-secured websites (look for httpss:// in the address bar). Keep your operating system and software up to date with security patches.

Computer Equipment

The user agrees to acquire network access services (“Services”) from us. We or our contractor provides User with documentation outlining the minimum hardware and operating system requirements for using the Services. User represents and acknowledges that they have examined those materials and that the machine on which the Equipment will be installed satisfies the minimal requirements.

Equipment Provided

We, or our agent or contractor, may provide User with a radio, an antenna, and software (the “Equipment”). We may also give a user manual that includes instructions for configuring and operating the Equipment. The Equipment provided by us, when properly installed and operated, allows the User to access and use the services.

Services

Services provided by us are for the User’s sole use and are not for resale without our prior written authorization, which may be granted in its sole discretion. If the User attempts to resell the Services, we may, in our discretion, increase the fees associated with the Services or cancel the Services.

Intended Use of the Services

User understands and accepts that the Services are for personal use only and will not use them in any way that is prohibited by federal or state law or regulation. User further agrees to follow our Acceptable Use Policy (“AUP”), which is available on our Account Management page. Transmission of any material in violation of federal or state law or regulation, including, but not limited to, any copyrighted material, material protected by a trade secret, or material or messages that are illegal, harassing, libelous, abusive, threatening, harmful, vulgar, obscene, or otherwise objectionable in any manner or nature, or that encourages conduct that could constitute a criminal offense, give rise to civil liability, or otherwise violate any applicable local. User agrees that there may be content on the Internet or otherwise available through the Services that is offensive or does not comply with all applicable local laws, regulations, and guidelines. We take no responsibility for and have no control over the content that appears on the Internet or is otherwise available through the Services. All content accessed or received by the User is used at the User’s own risk, and we and our employees assume no obligation for the User’s access or use of such content.

System and Network Security

Users must not attempt to circumvent user authentication or security of any host, network, or account (also known as “cracking”). This includes, but is not limited to, accessing data not intended for the User, entering into a server or account that the User is not expressly permitted to use, or testing the security of other networks. Users may not attempt to disrupt service to another user, host, or network (“denial of service attacks”). This includes, but is not limited to, “flooding” networks, deliberate attempts to overwhelm a service, and attempts to “crash” a server. Users may not use any program/script/command or send any message meant to disrupt a user’s terminal session, whether locally or via the Internet. Users who violate system or network security may face criminal or civil liability. We shall fully cooperate with investigations of system or network security infractions at other sites, including working with law enforcement agencies to investigate potential criminal violations.

Disclaimer of Liability

Our services are provided “as is.” WE MAKE NO WARRANTY OF ANY KIND, EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT, AS WELL AS WARRANTIES OF RELIABILITY OR SUITABILITY FOR A PARTICULAR PURPOSE OF OUR SERVICES. USER UNDERSTANDS AND ACKNOWLEDGES THAT WE HAVE NO CONTROL OVER THE NATURE, CONTENT, OR RELIABILITY OF THE INFORMATION AND/OR DATA TRANSFERRED THROUGH OUR NETWORK. NO ORAL OR WRITTEN INFORMATION OR ADVICE GIVEN BY US, ITS DEALERS, AGENTS, OR EMPLOYEES WILL CREATE A WARRANTY, AND THE USER SHOULD NOT RELY ON ANY SUCH INFORMATION OR ADVICE. WE MAKES NO WARRANTY OF ANY KIND, EXPRESSED OR IMPLIED, AS TO THE QUALITY, ACCURACY, OR VALIDITY OF THE INFORMATION AND/OR DATA RESIDING ON OR PASSING THROUGH ANY NETWORK.
THE USE OF ANY INFORMATION OR DATA OBTAINED FROM OR THROUGH SERVICES PROVIDED BY US IS AT THE USER’S OWN RISK. USER ACKNOWLEDGES THAT WE ARE NOT LIABLE FOR ANY ERRORS OR INTERRUPTIONS IN THE INSTALLATION PROCESS OR IN THE PROVISION OF SERVICES, WHETHER WITHIN OR OUTSIDE OF OUR CONTROL.

UNDER NO CIRCUMSTANCES SHALL THE USER HOLD US OR ANY OF OUR AGENTS, CONTRACTORS, OR REPRESENTATIVES RESPONSIBLE FOR ANY FORM OF DAMAGES OR LOSSES (INCLUDING WITHOUT LIMITATION ANY DIRECT, INDIRECT, CONSEQUENTIAL OR INCIDENTAL DAMAGES OR LOSSES) SUFFERED FROM, BUT NOT LIMITED TO ERRORS, DELAYS, LOSS OF INFORMATION, DELAYS IN THE INSTALLATION OR PROVISIONING PROCESS, OR INTERRUPTIONS IN THE SERVICES CAUSED BY THE USER, US, OR A THIRD PARTY

Additional Terms and Conditions

We may, from time to time, send e-mail messages or other forms of contact to Users including advertising, promotions, and other information provided by third parties. We make no representations or warranties about the content of any such third-party communications or the goods or services obtained in response to such communications, and User agrees that we will have no liability for them, nor will any such messages amend the Terms and Conditions unless we specifically agree to it in writing. In addition, our website may contain links to websites maintained by parties other than us. These links are provided for your convenience only. We have no control over such websites and accept no responsibility for their content. Our inclusion of links to such Web sites does not imply an endorsement of the content or an affiliation with their operators.

BEST NETWORK CONNECTIONS

Unlock the Power of Total Unified Technology Solutions with INTECH—Reach Out Today!

Thank you for considering INTECH Hospitality for your technology solutions! To serve you better, we’d like to learn more about your specific needs in the hospitality industry.

Your Form Submited Successfully

It sounds like you’re confirming that a contact form submission was successfully sent to Intech Systems for a quote request. That’s great news! If you have any further questions or need assistance with anything else, feel free to let me know.

We appreciate your inquiry! Our team will be in touch with you shortly to discuss further details. Thank you for reaching out to us.