Thursday, March 21, 2019
H2NO.org Legal Stuff.
Use of Content on the Site
You may view, download and print contents from the Site subject to the following conditions: (a) the content may be used solely for information purposes; and (b) the content may not be modified or altered in any way. You may not republish, distribute, prepare derivative works, or otherwise use the content other than as explicitly permitted herein.
You may not frame or utilize framing techniques to enclose any trademark, logo, or other proprietary information (including images, text, page layout, or form) of H2NO.org without the express written consent of CENLYT. You may not use any meta tags or any other "hidden text" utilizing CENLYT and/or H2NO.org name or trademarks without the express written consent of CENLYT Productions-ms designs. You may not use any CENLYT and/or H2NO.org logos or other proprietary graphic or trademark as part of the link without express written permission.
You do not acquire any ownership rights to any content in the Site. Any unauthorized use terminates the permission or license granted by CENLYT.
Use of Site Contact Information
All Contact Information contained on this Site and any Site controlled, operated and/or owned by us is provided for the convenience of our visitors for the sole purpose of making legitimate inquiries. No inquires shall contain software viruses, mass mailings, chain letters, or any form of "spam." You may not use a false e-mail address, impersonate any person or entity, or otherwise mislead as to the origin of the information. NO CONTACT INFORMATION, WHETHER POSTAL, TELEPHONE, FAX OR EMAIL, MAY BE USED FOR ANY SOLICITATION PURPOSES, PLACED ON ANY MAILING LIST OR USED FOR THE PURPOSE OF UNSOLICITED EMAIL, a.k.a. SPAM. EMAIL HARVESTING ROBOTS/SPIDERS ARE PROHIBITED FROM BEING USED ON THIS SITE. ALL VIOLATORS WILL BE PROSECUTED TO THE FULLEST EXTENT AS PROVIDED FOR BY LAW. WE CHARGE $500.00 PER OCCURRENCE FOR UNAUTHORIZED POSSESSION AND/OR USE OF OUR CONTACT INFORMATION.
Reviews, Comments, Communications, And Other Content
You may submit comments and provide other content so long as the content is not obscene, illegal, threatening, or defamatory and so long as the content does not invade the privacy or infringe the intellectual property of a third party. Further, such content may not contain software viruses, mass mailings, chain letters, or any form of "spam." You may not use a false e-mail address, impersonate any person or entity, or otherwise mislead as to the origin of the information.
By submitting information, you grant CENLYT a nonexclusive, royalty-free, perpetual, irrevocable and fully sub-licensable right to reproduce, use, modify, publish, adapt, translate, create derivative works from, distribute and display such content throughout the world in any media. By submitting information you also represent and warrant that that the content is accurate; you own or have permission to use the content that you submit; and that use of the content will not cause injury to any person or entity.
CENLYT respects the intellectual property of others. If you believe that your work has been copied in a way that constitutes copyright infringement, please follow our Notice and Procedure for Making Claims of Copyright Infringement.
CENLYT marks, graphics, logos, page headers, button icons, scripts noted on the Site are CENLYT service marks, trademarks and trade dress and are the sole and exclusive property of CENLYT. CENLYT service marks, trademarks and trade dress may not be used in any manner that is likely to cause confusion among visitors, in any manner that disparages or discredits CENLYT and in connection with any service or product that is not sponsored, endorsed or produced by CENLYT. All other trademarks not owned by CENLYT or its contributors that appear on this site are the property of their respective owners, who may or may not be affiliated with, connected to, or sponsored by CENLYT or its contributors.
Third Party Web Sites and Information
The Site may provide hyperlinks to third party Web sites or access to third party content. CENLYT does not control, endorse, or guarantee content found in such sites. You agree that CENLYT is not responsible for any content, associated links, resources, or services associated with a third party site. You further agree that CENLYT shall not be liable for any loss or damage of any sort associated with your use of third party content. Links and access to these sites are provided for your convenience only.
EXCEPT AS EXPRESSLY STATED IN AN AGREEMENT BETWEEN YOU AND CENLYT, ALL CONTENT, SERVICES, PRODUCTS AND SOFTWARE PROVIDED ON THIS WEB SITE ARE PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED. CENLYT AND ITS CONTRIBUTORS AND LICENSORS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. YOU ARE SOLELY RESPONSIBLE FOR THE APPROPRIATENESS OF THE SITE, ITS CONTENT, AND THE PRODUCTS AND SERVICES OFFERED BY CENLYT ON THE SITE FOR YOUR INTENDED APPLICATION AND USE. CENLYT DOES NOT WARRANT THAT THE SITE, ITS CONTENT, OR THE PRODUCTS AND SERVICES IT OFFERS ON THE SITE MEET YOUR REQUIREMENTS OR ARE FREE FROM DEFECTS, ERRORS OR VIRUSES. SUBJECT TO THE TERMS OF ANY AGREEMENT BETWEEN YOU AND CENLYT, CENLYT, ITS CONTRIBUTORS AND LICENSORS SHALL NOT BE LIABLE FOR ANY DIRECT, INDIRECT, SPECIAL, CONSEQUENTIAL, INCIDENTAL, OR PUNITIVE DAMAGES, EVEN IF CENLYT, ITS CONTRIBUTORS OR LICENSORS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. CERTAIN STATE LAWS DO NOT ALLOW LIMITATIONS ON IMPLIED WARRANTIES OR THE EXCLUSION OR LIMITATION OF CERTAIN DAMAGES. IF THESE LAWS APPLY TO YOU, SOME OR ALL OF THE ABOVE DISCLAIMERS, EXCLUSIONS, OR LIMITATIONS MAY NOT APPLY TO YOU, AND YOU MIGHT HAVE ADDITIONAL RIGHTS.
You agree to defend, indemnify, and hold harmless CENLYT, employees, attorneys and agents ("Indemnities") against all claims, expenses, liabilities, losses, costs and damages, including reasonable attorney's fees, that the Indemnities may incur (i) in connection with your use of the Site or any hyperlinked Web site or (ii) resulting from content you supply.
All matters relating to your access to and use of the Site shall be governed by U.S. federal law or the laws of the Commonwealth of Pennsylvania. Any legal action or proceeding relating to your access to or use of the Site shall be instituted in the Commonwealth of Pennsylvania or a federal court located in the Commonwealth of Pennsylvania.
contact CENLYT Productions-ms
If you believe that you hold a claim of copyright infringement against CENLYT, submit notice of your claim to the following Designated Agent:
Service Provider: Cenlyt productions-ms designs.
Designated Agent: Webmaster
Address to Which Notification Should Be Sent:
422 Point Street
Saltsburg, Pennsylvania 15681
Telephone Number: 1-724-639-3957
To be effective, the notification of your claim of copyright infringement should be written and should include the following:
1. A statement that you are the owner of the exclusive right you claim has been infringed, or a statement that you are authorized to act on behalf of the owner of an exclusive right that has allegedly been infringed.
2. A statement, under penalty of perjury, that the information in the notification is accurate.
3. Your signature. (The signature may be either physical or electronic.)
4. The identification of the copyrighted work you claim has been infringed. (If you claim that multiple copyrighted works have been infringed you can submit one notification with a list of the allegedly infringed works.)
5. Identification of the material that you claim to be infringing and information reasonably sufficient to permit CENLYT to locate the material.
6. Information reasonably sufficient to permit CENLYT to contact you, including your address, telephone number, fax number and, if available, an electronic mail address. You can provide contact information for the owner of the exclusive right that you claim has been infringed if you are not the owner, but rather authorized to act on behalf of the owner.
7. A statement you have a good-faith belief that use of the material in the manner complained of is not authorized by the copyright owner, its agent, or the law.
- Server Logs
- Use Of Web Beacons a.k.a Web Bugs
- Posted Information
- Protectingyour Email Address
- Links To Other Sites
- Submissions by Email - Solicited and Unsolicited
- Contact Information
If you have any questions or complaints regarding our Privacy Policies, please Contact Us.
Our Server Logs automatically collect specific information every time you visit our site. This includes: Date and Time of visit, IP Address, Browser Type, Operating Platform, duration of visit and Pages Viewed. The information is logged both per-session and aggregate total. The per-session log includes all the aforementioned information. It is kept in a password protected directory and only accessible by CENLYT. It is not shared or made available to the public. The aggregate information EXCEPT Date, Time and IP Address is kept indefinitely. The information about your Browser type and Operating Platform is used so that we may keep the site compatible with as many formats as possible. The Duration and Pages Viewed information is made available to our advertisers for the purposes of establishing effectiveness and costs for ads. NO PERSONAL, IDENTIFIABLE INFORMATION IS MADE AVAILABLE FROM THESE LOGS, INCLUDING YOUR IP ADDRESS.
Web Beacons, also known as Web Bugs, are invisible images (usually 1 pixel by 1 pixel) placed on a web page to collect information similar to that gathered by banner advertisements, but users cannot detect the presence of bugs without looking at the source code or using special software (visit www.bugnosis.org to download free detection software). CENLYT does not use Web Bugs/Web Beacons.
Any information posted with CENLYT becomes public information and access to and use thereof is beyond our control. This includes, but is not limited to, any Email address posted.
We do not give out Email addresses to anyone without your consent. However, as there are programs which employ the use of "spiders" to search Web Sites for Email addresses, for your security, when you post your Email address to any Web site, we recommend that you use either use an alternate Email address rather than your personal address, or enter the address in such a manner that it cannot be automatically used by others, ie. username@yourdomain.REMOVE(net. com, etc.) with a note telling users to delete the "REMOVE" from the address. While this disables the option to Click On the address to send an Email, it also drastically reduces your chances of having your Email address added to a mailing list via the use of spiders. And since the majority of these spiders are building mailing lists for Spaming purposes, losing the ability to "click on" your Email address is a small price to pay to avoid Spam.
Due to the increase in Email related viruses and worms, CENLYT does not accept any unsolicited Emails with attachments nor Emails with attachments with file extensions including, but not limited to: ".exe", ".vbs", ".vbe", "js", "doc", "cfm", "htm or html" or any other extension which can automatically engage or run a plug-in, program or script or which is unfamiliar or known to contain or potentially contain a virus or worm - They will automatically be returned. If you would like to post information, the information must be contained in the body of the Email. Thank You.