Legal Terms

TERMS AND CONDITIONS APPLICABLE TO CYBERSPYDER, INC. PRODUCTS AND SERVICES The following Services Agreement governs all CyberSpyder, Inc. products and services: Services Agreement The following Service Descriptions (and additional terms and conditions) further govern those particular CyberSpyder, Inc. products and services: COPYRIGHT NOTICE The contents of this Web site are copyright © 2015, CyberSpyder, Inc. All rights reserved. TRADEMARK NOTICES CyberSpyder, Inc., the CyberSpyder, Inc. logo, and certain other marks in this Website are the trademarks, trade names, and service marks of CyberSpyder, Inc. (“CyberSpyder, Inc.”). Any use of such marks without the prior written consent of CyberSpyder, Inc. is prohibited. Other trademarks and logos are the property of the parties to whom they are attributed. CYBERSPYDER, INC. ACCEPTABLE USE POLICY (Updated November 10, 2015) 1.   Scope This Acceptable Use Policy (hereinafter referred to as the “Acceptable Use Policy”, the “Policy” and/or the “AUP”) governs the usage of all products and services (collectively, the “Services”) offered by CyberSpyder, Inc. (along with all subsidiaries, affiliates, successors and assigns thereof, referred to hereinafter collectively as “CyberSpyder, Inc.”, “Company”, “we”, “our” and/or “us”). This Policy is incorporated by reference into each agreement between Company and each of our customers (“Customer”) for the purchase and sale of the Services (the “Service Agreement”). The Service Agreement and other terms and conditions applicable to the Services, as well as additional applicable rules and policies can be found on our website. This Policy is also incorporated by reference into the Terms of Use applicable to our website. We may modify this Policy at any time immediately by posting the modified policy on our website, which will qualify as adequate and complete notice to you. 2.   Purpose The purpose of this Policy is to enhance the quality of the Services, and to protect the Company’s customers and the Internet community as a whole, from illegal, irresponsible, or disruptive Internet activities. This Policy applies to visitors to our Website and to each Customer and its employees, agents, contractors or other users who obtain Services from Company on behalf of the Customer (collectively, “Users”). Users should use common sense and good judgment in connection with Website and the Services. Parents or guardians should always supervise minors in using the Internet. Parents and guardians should remain aware at all times of what is on the Internet and how the minors under their care are using the Services and the Internet. 3.   Prohibited Uses Users may not:    1.   Utilize the Services to send unsolicited e-mail to third parties. Furthermore, Users may use the Services or software programs provided by Company to send e-mail only if Users ensure that such transmissions fully comply with all applicable regulations, rules, and laws, including, without limitation, the U.S. CAN-SPAM Act of 2003.    2.   Utilize the Services in connection with any illegal activity or any activity that would otherwise violate any applicable regulations, rules or laws. Without limiting the general application of this rule, Users may not:
  • utilize the Services to copy material from third parties (including text, graphics, music, videos, or other copyrightable material) without proper authorization;
  • utilize the Services to misappropriate or infringe the patents, copyrights, trademarks or other intellectual property rights of any third party;
  • utilize the Services to traffic in illegal drugs, illegal gambling, obscene materials, or other any products or services that are prohibited under applicable law;
  • utilize the Services to export encryption software to points outside the United States in violation of applicable export control laws; or
  • utilize the Services in any manner that violates any applicable regulation, rule or law
   3.   Utilize the Services in connection with any tortious or actionable activity. Without limiting the general application of this rule, Users may not:
  • utilize the Services to publish or disseminate information that (1) constitutes slander, libel or defamation, (2) publicizes the personal information or likeness of a person without that person’s consent, or (3) otherwise violates the privacy rights of any person; or
  • utilize the Services to threaten persons with bodily harm, to make harassing or abusive statements or messages, or to solicit the performance of acts or services that are illegal under applicable law.
   4.   Utilize the Services in connection with any other offensive, disruptive, abusive, or questionable activity. Without limiting the general application of this rule, Users may not:
  • utilize the Services to cause denial of service attacks against Company or other network hosts or Internet users or to otherwise degrade or impair the operation of Company’s servers and facilities or the servers and facilities of other network hosts or Internet users;
  • post messages or software programs that consume excessive CPU time or storage space;
  • utilize the Services to offer mail services, mail forwarding capabilities, POP accounts or autoresponders other than for the User’s own account;
  • utilize the Services to resell access to CGI scripts installed on Company’s servers;
  • utilize the Services to subvert, or assist others in subverting, the security or integrity of any Company systems, facilities or equipment;
  • utilize the Services to gain unauthorized access to the computer networks of Company or any other person;
  • utilize the Services to provide passwords or access codes to persons not authorized to receive such materials by the operator of the system requiring the password or access code;
  • utilize the Services to (1) forge the signature or other identifying mark or code of any other person, (2) impersonate or assume the identity or any other person, or (3) engage in any other activity (including “spoofing”) to attempt to deceive or mislead other persons regarding the true identity of the User (excluding the use of anonymous remailers or Internet nicknames);
  • utilize the Services to distribute or post any virus, worm, Trojan horse, adware or spyware, malware, corrupted data, or computer code intended to disrupt services, destroy data, destroy or damage equipment, or disrupt the operation of the Services;
  • utilize the Services to conduct port scans or other invasive procedures against any server (except any server for which the User is an authorized system administrator);
  • utilize the Services to distribute, advertise or promote software or services that have the primary purpose of encouraging or facilitating unsolicited commercial e-mail or spam;
  • utilize the Services to solicit or collect, or distribute, advertise or promote, e-mail address lists for the purpose of encouraging or facilitating unsolicited commercial e-mail or spam;
  • utilize the Services in any manner deemed, in Company’s sole discretion, to be violent or encouraging violence;
  • utilize the Services in a manner deemed, in Company’s sole discretion, to display bigotry, racism, discrimination, or hatred in any manner whatsoever;
  • utilize the Services in any manner that might subject Company to unfavorable regulatory action, subject Company to any liability for any reason, or adversely affect Company’s public image, reputation or goodwill, including, without limitation, sending, displaying or distributing sexually explicit, hateful, vulgar, racially, ethnically or otherwise objectionable materials as determined by Company in its sole discretion;
  • hold Company or its employees, shareholders, or affiliates up to public scorn, ridicule, or defamation;
  • use any third party software that impairs, disrupts, destroys, or otherwise damages or has potential to damage Company’s servers and facilities or the servers and facilities of other network hosts or Internet users;
  • utilize the Services in any manner that exceeds any Company data transfer, bandwidth or storage space limits or otherwise use any such data transfer, bandwidth or storage space in an excessive or abusive manner; or
  • utilize the Services in any other manner to interrupt or interfere with the Internet or services usage of other persons.
4.   Remedies If Company learns of or in its reasonable estimation believes there is a violation of this Policy, Company may, in Company’s sole discretion, take one or more of the following actions, with or without notice to Customer:
  • warn the Customer;
  • suspend the Services or the offending Customer from the Services;
  • terminate the Services or the offending Customer from the Services;
  • impose fees or charges on the offending Customer account;
  • remove any offending content;
  • take any other action in accordance with this Policy, the applicable service agreement or applicable law; or
  • take any other action deemed appropriate in Company’s sole discretion.
5.   Disclaimer Company expressly disclaims any obligation to monitor its Customers and other Users with respect to violations of this Policy. Company has no liability or responsibility for the actions of any of its Customers or other Users or any content any User may post on any website. 6.   Reservation of Rights Company reserves the right to cooperate with appropriate legal authorities in investigations of claims of illegal activity involving Company’s Services, Customers and other Users. Company reserves all other rights to respond to violations of this Policy to the extent of applicable law and in accordance with any applicable contractual obligations. Company may utilize technical means to monitor communications into, and out of, its network facilities to prevent the introduction of viruses or other hostile code, to prevent intrusions and otherwise to enforce this Policy and each Customer agrees that Company is authorized to monitor its communications through Company’s network for such purposes. Any failure by Company to enforce any of its rights under this Policy or any applicable laws shall not constitute a waiver of such right. 7.   Abuse, Violations and Complaints    1.   Reporting Copyright Violations. Company complies with the Digital Millennium Copyright Act (“DMCA”). Company encourages Users to report an alleged copyright infringement involving a user by sending a notice that complies with the DMCA to [email protected]. Users may also send a notice by mail to:

CyberSpyder, Inc. PO Box 180933 Fort Smith, Arkansas 72918

Company reserves the right to suspend or terminate any Customer pursuant to any valid DMCA complaint. Furthermore, Company, in its sole discretion, may suspend or terminate, without notice, any User that Company determines is a repeat infringer.    2.   Reporting Illegal Activity and Non-Copyright Violations. Company encourages Users to report illegal activity and non-copyright violations of this Policy by e-mail to [email protected], including in any such report the name of the offending domain (for example, xyz.com) and the type of abuse (for example, spam, illegal acts, harassment, etc.) in the “subject” field of the e-mail. You may also report any such illegal activity by calling 479-782-0005. Upon receipt of any such claim, Company shall reasonably investigate and track any such claim, and shall take such action as Company, in its sole discretion, feels is necessary.    3.   Reporting Customer Concerns and Other Complaints. CyberSpyder, Inc. strives to provide excellent customer service. For concerns or complaints related to our services, you may contact us via our website, the applicable online account manager, the telephone number located on our website, or by emailing us at [email protected], whereby we endeavor to respond to all email requests within five (5) business days. In the event that you are not satisfied with any such response, you may request that your matter be escalated for further review. TELEPHONE MONITORING To ensure CyberSpyder, Inc. customers receive quality service, CyberSpyder, Inc. may randomly select phone calls for monitoring. These calls, between CyberSpyder, Inc. customers and employees, may be evaluated by supervisors. This is to guarantee that prompt, consistent assistance and accurate information is delivered in a professional manner. POLICY ON THIRD PARTY LEGAL PROCEEDINGS It is CyberSpyder, Inc.’s policy to respond with reasonable promptness to subpoenas and other legal process served on CyberSpyder, Inc. or its subsidiaries that seek information, documents or other business records. Third parties wishing to serve such process on CyberSpyder, Inc. may do so in writing to CyberSpyder, Inc., PO Box 180933, Fort Smith, AR  72918. CyberSpyder, Inc. will evaluate each such request based upon the applicable law and facts. An administrative fee of Seventy-Five dollars ($75.00) will be charged for each request to cover CyberSpyder, Inc.’s fees and expenses in responding to the request. CyberSpyder, Inc. may require the requesting party to pay the applicable hourly rate for requests that require significant engineering or technical support. CyberSpyder, Inc. may also charge additional amounts for requests that require substantial photocopying, third party charges or other expenses. CyberSpyder, Inc. expressly reserves any rights under applicable law in connection with its receipt, evaluation and any response to, any third party requests or legal process. SECURITIES LAW COMPLIANCE This website may contain forward-looking statements by CyberSpyder, Inc. management, which are based on current expectations. These forward-looking statements are subject to numerous risks and uncertainties. As a result, actual results may differ materially from what is expected. CyberSpyder, Inc. assumes no obligation to update CyberSpyder, Inc.’s forward-looking statements. UPDATED: November 10, 2015  

Marketing That Grows Your Business