T3 is committed to privacy, with respect to the use of user information provided to us over the Internet. For this reason, we are disclosing to you our practices in gathering and using information, which you provide us.
In general, you can visit T3 via our website www.t3com.com without telling us who you are or revealing any personal information about yourself. Our Web servers collect our visitor’s domain names and IP addresses, but not personal e-mail addresses. This information is used to diagnose problems with our server, measure the number of visits and number of pages viewed, and register methods by which our site was found, and methods used for viewing our site. T3 will use this information to evaluate how you use our Web site and how we improve the content of the site.
Your IP address is also used to help identify you to gather broad demographic information.
Our online forms ask visitors for contact information (like their e-mail address), unique identifiers (like their names), and demographic information (like their zip code, age, or income level). We use such data from our forms to track the demographic information we receive and to log the user’s identity. This information is not given out to third parties, and not used to send the user any un-requested correspondence. When requested, T3 will contact or send materials to you for marketing or other purposes. However, we will not make user-specific information gathered on our site available to unaffiliated organizations for commercial purposes.
T3 may make use of “cookies” in order to provide you with tailored information and for identification purposes. A cookie is a small piece of data that a Web site can send to your browser, which may then be stored on your hard drive so we can recognize you when you return.
The T3 Web site may contain links to other sites. T3 is not responsible for the content or the privacy practices employed by other sites.
Please do not send us any proprietary or confidential information. Any data, answers, questions, comments, ideas, suggestions, or the like which you send to us will be treated as being non-confidential and nonproprietary. We assume no obligation to protect such information from disclosure and will be free to reproduce, use, and distribute the information to others without restriction, permission, or license. We will also be free to use any ideas, techniques, concepts, or know-how contained in information that you send us for any purpose whatsoever including, but not limited to, developing and marketing products or services incorporating such information.
Because of the evolving nature of the technologies that we use and the way that we conduct business, we may amend this policy from time to time. We will post any revisions on this site.
Acceptable Use Policy
This AUP is intended to protect T3’s customers and the Internet community from the inappropriate use of the Internet and other telecommunications services. Use of T3’s services constitutes acceptance of this AUP. T3 reserves the right to revise and update this AUP from time to time. The customer is responsible for keeping himself informed of the current AUP in effect, including any revisions or updates, and for abiding by the terms of this AUP.
- T3 services may only be used for lawful purposes, and customer shall bear the burden of establishing that such use complies with all applicable laws. The customer is responsible for all use of T3 services, with or without the knowledge or consent of the customer.
- T3 reserves the right, at its sole discretion, with or without notice, to remove or refuse to post material that violates this AUP or to suspend or terminate service provided to any customer if the customer or any end-user using customer’s services or facilities, directly or indirectly:
- Violates the rules, regulations and policies applicable to any network, server, computer database, web site or newsgroup that customer or other user of customer end-user accesses;
- Sends or facilitates the sending of, unsolicited bulk mail messages (“email spam”) or telephone calls to any person or system in a way that could be expected to adversely impact T3′s network or facilities; or sends mail-bombs (masses of email or other data) to any person or system, propagates or replies to mail-bombs, or uses a T3 website address or hosted web account to collect responses from unsolicited commercial email;
- Posting messages to a USENET group where the posting is not appropriate as defined in the group’s charter, or mass postings in unreasonable numbers of USENET groups, or where there is repeated requests by group USERS or administrator to cease such posting;
- Uses services in a manner which is intended to abuse or to violate the property rights of others, including, without limitation, activities which result in denial of service or the distribution of viruses, worms, or other destructive activities;
- Violates any law or regulation (including without limitation the laws and regulations governing criminal activity, export control, unfair competition, anti-discrimination or false advertising);
- Publishes or communicates material that is obscene, defamatory, trade libelous, unlawfully threatening or unlawfully harassing;
- Uses services to attempt to break security, or in fact, breaks security of any computer network, or to access an account without authorization;
- Employs any method in connection with the transmission of e-mail or telephone services used to disguise or mislead any user name or the source or quantity of transmissions;
- Impersonating other users by forging one’s email address, caller ID or similar means of identification is prohibited;
- Relays email or telephone calls through any third-party systems without authority;
- Systems configured to permit third party mail or news relay;
- Uses services to conduct any other activities which T3 determines are injurious to its customers, operations, or reputation;
- Provides false information on a T3 service application, contract or on-line application, including, but not limited to, fraudulent credit card information;
- Attempts to or resells T3 services without T3′s express authorization; or
- Uses bandwidth or disk space in excess of limits permitted in service descriptions.