PLEASE READ THE FOLLOWING PARAGRAPH CAREFULLY. DO NOT USE THE SERVICES IF YOU DO NOT WISH TO COMPLY:
- By either filling out our contact form or providing contact information as part of a travel related prospective or final booking or reservation, you give us express written consent to contact you by phone, or e-mail, or text messages to (i) provide notices regarding your bookings and travel itineraries, (ii) investigate or prevent fraud, or (iii) collect a debt owed to us. You agree that we may contact you using autodialed or prerecorded message calls, emails, social media, and text messages to carry out the purposes we have identified above. We will not share your phone number(s) with third parties for their own purposes without your consent. Standard telephone minute and text charges may apply. We will not use autodialed or prerecorded message calls or texts to contact you for marketing purposes at the telephone number(s) you designate unless we receive your prior express written consent. You do not have to consent to receive autodialed or prerecorded message calls or texts in order to use the Services. YOU EXPRESSLY AGREE THAT WE MAY CONTACT YOU EVEN IF YOU HAVE PREVIOUSLY REGISTERED YOUR PHONE WITH A FEDERAL OR STATE “DO NOT CALL” REGISTRY. You have the right to withdraw your consent and may opt-out of receiving phone calls by contacting us in any of the methods listed in the “Contact” section of the Website. In addition, you may opt-out of emails by clicking the “unsubscribe” link in any email we send to you, and may opt-out of text messages by replying “STOP” to text messages you receive from us. If you opt-out and then re-enable any of these services, you will be deemed to have again given us your express written consent to contact you via any services you re-enable.
PRIVACY POLICY. Our privacy policy is located in the footer of the Website, and is incorporated herein by reference.
ACCEPTABLE USE
- For purposes of these Terms of Use, “Content” means information, text, graphics, logos, photographs, images, moving images, sound, illustrations and other materials made available, displayed or transmitted over, by, or in connection with the Services (including information made available by means of an Internet “hyperlink”, a third party Web posting, e-mail, or similar means), including all trademarks, trade names service marks and domain names contained therein, as well as the contents of any mobile applications, websites, social media, bulletin boards, chat forums, and all updates, upgrades, modifications, and other version of any of the foregoing.
- With regard to the use of the Services, including any and all Content that you upload, send, post, e-mail, or otherwise transmit while using the Services, you represent and warrant that (i) you are the true owner of or have and will have at all times sufficient rights, without limitation, to upload the Content; (ii) the Content does not and will not violate: (a) the copyrights, patents, trade secrets, trademarks, service marks or other intellectual property rights; (b) any other property rights; (c) privacy rights; or (d) any other proprietary rights of any other person, business, or entity; and (iii) the transmission of the Content does not and will not violate any laws or breach any licenses or other agreements to which you are a party. Except as specifically permitted by law, you may not post, modify, distribute, or reproduce in any way copyrighted or other proprietary materials without obtaining the prior written consent of the copyright owner of such materials.
- You acknowledge that all Content, whether posted publicly or transmitted privately over, by, or in connection with the Services is the sole responsibility of the person from whom such Content originated. You agree and acknowledge that (i) we do not control or endorse the Content and (ii) that we cannot guarantee the accuracy, integrity or quality of such Content. You further agree and acknowledge that by using the Services you may be exposed to Content that is inaccurate, offensive or indecent. You agree that the Company will not be liable whatsoever for any Content or for any loss or damage of any kind resulting, directly or indirectly, from the use of or reliance on any Content transmitted via the Services and you hereby assume and agree to bear all risks associated with the use of any Content, including any reliance on the accuracy or completeness of such Content.
- In using the Services, you agree not to upload, send, post, e-mail, or otherwise transmit via the Services any Content that (i) contains viruses other code or software that damages, destroys or interferes with (or is intended to damage, destroy, or interfere with) the communications networks or computer systems of Company, or our employees, contractors, affiliates, or customers, (ii) contains unlawful, tortious, libelous, defamatory, abusive, racist, harassing, or threatening material, or is invasive of another’s privacy, another’s right of publicity, is pornographic (including but not limited to child pornography), or otherwise objectionable as determined by us in our sole discretion, or (iii) constitutes unsolicited commercial bulk email (spam), or is prohibited by the CAN-SPAM Act of 2003, or any other applicable law regulating e-mail services.
- We have the right, at our sole discretion, to remove any material that breaches these Terms of Service or is (in our sole reasonable opinion) otherwise objectionable.
- You may not use the Services, either manually or by means of an automated tool, to collect the contact information or personally identifiable information of other users of the Services for any purpose (other than using the Services) including, but not limited to, collection of such information for advertising or direct marketing to users of the Services outside of the Services.
- You may not use the Services to interfere with, gain unauthorized access to, or otherwise violate the security of our (or another party’s) network, servers, computers, other control devices, software, or data, or to attempt to do any of the foregoing. Examples of system or network security violations include but are not limited to:
- Unauthorized monitoring, scanning or probing of networks or systems or any other action aimed at the unauthorized interception of data or the harvesting of email addresses;
- Use any forged, false or misleading number identity, email header, invalid or non-existent domain names in email or postings nor employ techniques to hide, obscure or counterfeit the source of e-mail or other posting;
- Hacking, attacking, gaining access to, breaching, circumventing or testing the vulnerability of the user authentication or security of any host, network, server, personal computer, network access and control devices, software or data without express authorization of the owner of the system or network;
- Impersonating others, phishing, or secretly or deceptively obtaining personal information of third parties; or
- Using any program, file, script, command or transmission of any message or content of any kind, designed to interfere with a terminal session, the access to or use of the Internet or any other means of communication; except in the case of authorized legitimate network security operations, distributing or using tools designed to compromise security (including but not limited to SNMP tools), including cracking tools, password guessing programs, packet sniffers or network probing tools; or programs that may damage the operation of another’s network, system, computer or other property.