Privacy Policy and Acceptable Use Policy
Acceptable Use Policy
The following terms apply to your (which includes anyone who uses our Services) use of and access to any Empire Wireless Internet , together with our agents, (collectively "EWI" or "Empire Wireless Internet" ), owned or operated website ("Website") as well as any electronic transmission sent, received, posted, accessed, or stored via any network ("Network").
COVERAGE OF THIS POLICY AND AGREEMENT
In addition to other agreements between you and Empire Wireless Internet , these terms explain the policies that govern your access to and use of our Website and Network. By accessing or using our Website or Network, you agree to these terms (collectively the "Policy"), as Empire Wireless Internet may modify it from time to time. Modifications to this Policy are effective upon its posting on our Website. If you do not agree to accept and comply with the Policy, then do not access or use our Website or Network.
ILLEGAL OR HARMFUL USE
You may access and use our Website and Network only for lawful purposes. You are responsible for any transmission you send, receive, post, access, or store via our Network, including the content of any communication. Transmitting, distributing, or storing any material that violates any applicable law is prohibited. Additionally, the following non-exhaustive list details the kinds of illegal or harmful conduct that is prohibited:
◦ Infringement: Infringement of intellectual property rights or other proprietary rights including, without limitation, material protected by copyright, trademark, patent, trade secret, or other intellectual property right. Infringement may result from the unauthorized copying, distribution, and/or posting of pictures, logos, software, articles, musical works, and videos.
◦ Offensive Materials: Disseminating or posting material that is unlawful, libelous, defamatory, obscene, indecent, lewd, harassing, threatening, harmful, invasive of privacy or publicity rights, abusive, inflammatory, or otherwise objectionable. Without limiting the foregoing, you may not access or use our Website or Network in any manner for the transmission or dissemination of images containing child pornography.
◦ Excessive Utilization of Network Resources: Consuming a disproportionate amount of available Network resources resulting in the potential to disrupt or degrade the Network or Network usage by others. The determination of what constitutes excessive use depends on the specific state of the Network at any given time. Excessive use is determined by resource consumption relative to that of a typical individual user of the Network and not by the use of any particular application.
◦ Export Violations: Violations of export laws, regulations, and rules, including, without limitation, violations of the Export Administration Act and the Export Administration Regulations administered by the Department of Commerce.
◦ Fraudulent Conduct: (1) Conducting fraudulent business operations and practices; (2) offering or disseminating fraudulent goods, services, schemes, or promotions (e.g., make-money-fast schemes, chain letters, and pyramid schemes); and (3) individual or business representation as an authorized 3rd party affiliation or agent for a business entity (e.g., Empire Wireless Internet ) without the business' prior consent.
◦ Falsification/Impersonation: Using the Network to impersonate any person or entity; falsely state or otherwise misrepresent your affiliation with any person or entity; or create a false identity for the purpose of misleading others. Without limiting the foregoing, you may not use invalid or forged headers, invalid or non-existent domain names, or other means of deceptive addressing.
◦ Failure to Abide by Third-Party Network or Website Policies: Violating the rules, regulations, or policies that apply to any third-party network, server, computer database, or website that you access.
• Harmful Content: Disseminating or posting content that is harmful to the Network or other users of the Network including, without limitation, viruses, Trojan horses, worms, time bombs, zombies, cancelbots, or any other computer programming routines that may damage, interfere with, secretly intercept or seize any system, program, data, or personal information.
ELECTRONIC COMMUNICATIONS
You may not distribute, publish, or send through our Network: (1) any spam, including any unsolicited advertisements, solicitations, commercial e-mail messages, informational announcements, or promotional messages of any kind; (2) chain mail; (3) numerous copies of the same or substantially similar messages; (4) empty messages; (5) messages that contain no substantive content; (6) very large messages or files that disrupt a server, account, newsgroup, or chat service; or (7) any message that is categorized as “phishing.”
Likewise, you may not: (1) participate in spidering, harvesting, or any other unauthorized collection of e-mail addresses, screen names, or other identifiers of others or participate in using software (including "spyware") designed to facilitate such activity; (2) collect responses from unsolicited messages; or (3) use any of our mail servers or another site's mail server to relay mail without the express permission of the account holder or the site.
NETWORK SECURITY AND INTEGRITY
You may not violate the security of our Network in any way. Such violations may result in criminal or civil liability. Empire Wireless Internet may, but is not obligated to, investigate any violation of our Network. Empire Wireless Internet may cooperate with law enforcement where criminal or unauthorized activity is suspected. By using Empire Wireless Internet products and services or sending, receiving, posting, accessing, or storing any electronic transmission via our Network, you agree to cooperate in any such investigation. Examples of Network security violations include, without limitation:
◦ Hacking: Unauthorized access to or use of data, systems, or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without the express prior authorization of the owner of the system or network.
◦ Interception: Unauthorized monitoring of data or traffic on any network or system without the express prior authorization of the owner of the system or network.
◦ Intentional Interference: Interference with service to any user, host, or network including, without limitation, denial-of-service attacks, mail bombing, news bombing, other flooding techniques, deliberate attempts to overload a system, and broadcast attacks.
◦ Falsification of Origin or Routing Information: Using, selling, or distributing in conjunction with the Network, any computer program designed to conceal the source or routing information of electronic mail messages in a manner that falsifies an Internet domain, header information, date or time stamp, originating e-mail address, or other identifier.
• Avoiding System Restrictions: Using manual or electronic means to avoid any limitations established by Empire Wireless Internet or attempting to gain unauthorized access to, alter, or destroy any information that relates to any Empire Wireless Internet customer or other end-user. Empire Wireless Internet may, but is not obligated to, take any action it deems necessary to (1) protect its Network, its rights, or the rights of its customers or third parties, or (2) optimize or improve its Network, services, systems, and equipment. You acknowledge that such action may include, without limitation, employing methods, technologies, or procedures to filter or block messages sent through the Network. Empire Wireless Internet may, in its sole discretion and at any time, filter "spam" or prevent "hacking," "viruses," or other potential harms without regard to any preference you may have communicated to us.
INVESTIGATION AND ENFORCEMENT OF THIS POLICY
We have the right, but are not obligated, to strictly enforce this Policy through self-help, active investigation, litigation, and prosecution.
Empire Wireless Internet reserves the right to act immediately and without notice to restrict, suspend, or terminate your use of the Network if it reasonably determines that your conduct may: (1) expose Empire Wireless Internet to sanctions, prosecution, civil action, or other liability; (2) cause harm to or interfere with the integrity or normal operations of Empire Wireless Internet's Network or networks with which Empire Wireless Internet is interconnected; (3) interfere with another Empire Wireless Internet customer's use of the Network; (4) violate any applicable law, rule, or regulation; or (5) otherwise present an imminent risk of harm to Empire Wireless Internet or its customers.
Empire Wireless Internet has the right, but not the obligation, to monitor or restrict any uses of the Network that Empire Wireless Internet reasonably believes in its sole discretion violate this AUP. You are solely responsible for all content that you transmit or receive utilizing the Network, and you are responsible for abuse of your account by others.
We may also access and disclose any information (including transactional information) related to your access and use of our Network for any lawful reason, including but not limited to: (1) responding to emergencies; (2) complying with the law (e.g., a lawful subpoena); (3) protecting our rights or property and those of our customers; or (4) protecting users of those services and other carriers from fraudulent, abusive, or unlawful use of or subscription to such services. INDIRECT OR ATTEMPTED BREACHES OF THIS POLICY AND ACTUAL OR ATTEMPTED BREACHES BY A THIRD PARTY ON BEHALF OF A COMPANY, CUSTOMER, OR USER MAY BE CONSIDERED BREACHES OF THIS POLICY BY SUCH COMPANY, CUSTOMER, OR USER.
MISCELLANEOUS
Any failure to insist upon or enforce performance of any provision in this Policy will not be construed as a waiver of any provision or right. Neither the course of conduct between the parties nor trade practice will act to modify any provision in this Policy. Empire Wireless Internet may assign its rights and duties under these terms to any party at any time without notice to you. If any provision of this Policy is deemed unlawful, void, or for any reason unenforceable, then that provision will be deemed severable from these terms and conditions so that it does not affect the validity and enforceability of any remaining provisions.
Privacy Policy
This privacy policy has been compiled to better serve those who are concerned with how their 'Personally Identifiable Information' (PII) is being used online. PII, as described in US privacy law and information security, is information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context. Please read our privacy policy carefully to get a clear understanding of how we collect, use, protect or otherwise handle your Personally Identifiable Information in accordance with our website.
What personal information do we collect from the people that visit our blog, website or app?
When ordering or registering on our site, as appropriate, you may be asked to enter your name, email address, mailing address, phone number, credit card information or other details to help you with your experience.
When do we collect information?
We collect information from you when you place an order, Use Live Chat, Open a Support Ticket or enter information on our site.
How do we use your information?
We may use the information we collect from you when you register, make a purchase, sign up for our newsletter, respond to a survey or marketing communication, surf the website, or use certain other site features in the following ways:
• To personalize your experience and to allow us to deliver the type of content and product offerings in which you are most interested.
• To allow us to better service you in responding to your customer service requests.
• To quickly process your transactions.
How do we protect your information?
Our website is scanned on a regular basis for security holes and known vulnerabilities in order to make your visit to our site as safe as possible.
We use regular Malware Scanning.
Your personal information is contained behind secured networks and is only accessible by a limited number of persons who have special access rights to such systems, and are required to keep the information confidential. In addition, all sensitive/credit information you supply is encrypted via Secure Socket Layer (SSL) technology.
We implement a variety of security measures when a user places an order enters, submits, or accesses their information to maintain the safety of your personal information.
All transactions are processed through a gateway provider and are not stored or processed on our servers.
Do we use 'cookies'?
Yes. Cookies are small files that a site or its service provider transfers to your computer's hard drive through your Web browser (if you allow) that enables the site's or service provider's systems to recognize your browser and capture and remember certain information. For instance, we use cookies to help us remember and process the items in your shopping cart. They are also used to help us understand your preferences based on previous or current site activity, which enables us to provide you with improved services. We also use cookies to help us compile aggregate data about site traffic and site interaction so that we can offer better site experiences and tools in the future.
We use cookies to:
• Help remember and process the items in the shopping cart.
You can choose to have your computer warn you each time a cookie is being sent, or you can choose to turn off all cookies. You do this through your browser settings. Since browser is a little different, look at your browser's Help Menu to learn the correct way to modify your cookies.
If users disable cookies in their browser:
If you turn cookies off, Some of the features that make your site experience more efficient may not function properly.Some of the features that make your site experience more efficient and may not function properly.
Third-party disclosure
We do not sell, trade, or otherwise transfer to outside parties your Personally Identifiable Information.
Third-party links
We do not include or offer third-party products or services on our website.
Google's advertising requirements can be summed up by Google's Advertising Principles. They are put in place to provide a positive experience for users. https://support.google.com/adwordspolicy/answer/1316548?hl=en
We use Google AdSense Advertising on our website.
Google, as a third-party vendor, uses cookies to serve ads on our site. Google's use of the DART cookie enables it to serve ads to our users based on previous visits to our site and other sites on the Internet. Users may opt-out of the use of the DART cookie by visiting the Google Ad and Content Network privacy policy.
We have implemented the following:
• Google Display Network Impression Reporting
• Demographics and Interests Reporting
We, along with third-party vendors such as Google use first-party cookies (such as the Google Analytics cookies) and third-party cookies (such as the DoubleClick cookie) or other third-party identifiers together to compile data regarding user interactions with ad impressions and other ad service functions as they relate to our website.
Opting out:
Users can set preferences for how Google advertises to you using the Google Ad Settings page. Alternatively, you can opt out by visiting the Network Advertising Initiative Opt Out page or by using the Google Analytics Opt Out Browser add on.
California Online Privacy Protection Act
CalOPPA is the first state law in the nation to require commercial websites and online services to post a privacy policy. The law's reach stretches well beyond California to require any person or company in the United States (and conceivably the world) that operates websites collecting Personally Identifiable Information from California consumers to post a conspicuous privacy policy on its website stating exactly the information being collected and those individuals or companies with whom it is being shared. - See more at: http://consumercal.org/california-online-privacy-protection-act-caloppa/#sthash.0FdRbT51.dpuf
According to CalOPPA, we agree to the following:
Users can visit our site anonymously.
Once this privacy policy is created, we will add a link to it on our home page or as a minimum, on the first significant page after entering our website.
Our Privacy Policy link includes the word 'Privacy' and can easily be found on the page specified above.
You will be notified of any Privacy Policy changes:
• On our Privacy Policy Page
Can change your personal information:
• By emailing us
• By calling us
• By logging in to your account
• By chatting with us or by sending us a support ticket
How does our site handle Do Not Track signals?
We honor Do Not Track signals and Do Not Track, plant cookies, or use advertising when a Do Not Track (DNT) browser mechanism is in place.
Does our site allow third-party behavioral tracking?
It's also important to note that we allow third-party behavioral tracking
COPPA (Children Online Privacy Protection Act)
When it comes to the collection of personal information from children under the age of 13 years old, the Children's Online Privacy Protection Act (COPPA) puts parents in control. The Federal Trade Commission, United States' consumer protection agency, enforces the COPPA Rule, which spells out what operators of websites and online services must do to protect children's privacy and safety online.
We do not specifically market to children under the age of 13 years old.
Fair Information Practices
The Fair Information Practices Principles form the backbone of privacy law in the United States and the concepts they include have played a significant role in the development of data protection laws around the globe. Understanding the Fair Information Practice Principles and how they should be implemented is critical to comply with the various privacy laws that protect personal information.
In order to be in line with Fair Information Practices we will take the following responsive action, should a data breach occur:
We will notify you via email
• Within 7 business days
We also agree to the Individual Redress Principle which requires that individuals have the right to legally pursue enforceable rights against data collectors and processors who fail to adhere to the law. This principle requires not only that individuals have enforceable rights against data users, but also that individuals have recourse to courts or government agencies to investigate and/or prosecute non-compliance by data processors.
CAN SPAM Act
The CAN-SPAM Act is a law that sets the rules for commercial email, establishes requirements for commercial messages, gives recipients the right to have emails stopped from being sent to them, and spells out tough penalties for violations.
We collect your email address in order to:
• Send information, respond to inquiries, and/or other requests or questions
• Process orders and to send information and updates pertaining to orders.
• Send you additional information related to your product and/or service
To be in accordance with CANSPAM, we agree to the following:
• Not use false or misleading subjects or email addresses.
• Identify the message as an advertisement in some reasonable way.
• Include the physical address of our business or site headquarters.
• Monitor third-party email marketing services for compliance, if one is used.
• Honor opt-out/unsubscribe requests quickly.
• Allow users to unsubscribe by using the link at the bottom of each email.
If at any time you would like to unsubscribe from receiving future emails, you can email us at: support@empirewirelessinternet.com
• Follow the instructions at the bottom of each email.
and we will promptly remove you from ALL correspondence.