Triple H IT Solutions is committed to protecting the security of your information. We utilize a variety of security technologies and procedures to help protect your personal information from unauthorized access, use or disclosure. We store the personal information you provide in computer servers with limited access that are located in controlled facilities. When we transmit sensitive information (for example: logging into triplehgroup.online) over the Internet, we protect it through the use of encryption, such as the Secure Socket Layer (SSL) protocol, among other security techniques.
Triple H IT Solutions only requires customers to provide information through confidential contracts in order to enable Triple H IT Solutions to provide services. Additional information is provided by our customers through direct contact with Triple H IT Solutions staff, as well as through our online management tools (triplehgroup.online).
Deliver service monitoring and maintenance service notification in which you can subscribe/unsubscribe to at your convenience.
Alert you about new Triple H IT Solutions products, services and updated information, if you so request.
Triple H IT Solutions reserves the right to modify this statement at any time.
No copyrighted material will be stored or cached on any device owned or operated by Triple H IT Solutions without permission of the holder or within allowances prescribed by the Digital Millennium Copyright Act (DMCA).
Any properly submitted notice for takedown by the copyright holder or agent for the copyright holder to remove materials from a Triple H IT Solutions owned or managed device will be promptly honored.
Triple H IT Solutions will honor the protection offered to the customer as prescribed by the DMCA.
For materials stored on non-Triple H IT Solutions owned and managed devices, Triple H IT Solutions will forward any Notice of Takedown to the end user.
If necessary, Triple H IT Solutions will respond to recognized subpoenas and provide end user information as ordered by the appropriate courts.
Sending unsolicited commercial electronic mail messages is explicitly prohibited. Triple H IT Solutions will not hesitate to take steps, which may include immediate suspension of service. This includes unintended sending of unsolicited commercial electronic mail messages due to unsecured devices including, but not limited to: open email relay, proxy, and other possible exploits.
Triple H IT Solutions customers shall use Triple H IT Solutions services in accordance with all applicable local laws, including but not limited to, obscenity laws. Customers shall not use Triple H IT Solutions services to conduct any business or activity or solicit the performance of any activity that is prohibited by law, nor shall the customer's use of the Triple H IT Solutions services impinge upon the use of Triple H IT Solutions systems by other customers.
Intended: Attempts to exploit other devices or services on and off of the Triple H IT Solutions network without the permission or implied permission of that party are not permitted. Violations of system or network security may result in criminal and civil liability. Triple H IT Solutions will cooperate with law enforcement if a criminal violation is suspected. Triple H IT Solutions will limit any traffic from the offending device or network immediately.
Unintended: Triple H IT Solutions will notify customers of an exploited device being used for potential malicious activity. If the activity is causing severe damage or strain to other devices or networks, Triple H IT Solutions will limit traffic to and from that device immediately. Otherwise Triple H IT Solutions will notify the customer and give a reasonable amount of time to secure the device before limiting traffic to and from that device.
Triple H IT Solutions will cooperate with law enforcement in cases where Triple H IT Solutions services or devices are being used for any suspected illegal activity.
Reselling of any services provided by Triple H IT Solutions is explicitly prohibited without expressed consent of Triple H IT Solutions.
Failure to comply with Triple H IT Solutions Acceptable Use Policy may result in the immediate termination of services, responding to law enforcement requests, or any other action deemed necessary by Triple H IT Solutions in order to protect its network, customer relationships, and commitment to the highest possible quality of service.
In the event that Triple H IT Solutions determines that Customer has violated or will violate any of these policies, Triple H IT Solutions may take such action as deemed to be appropriate under the circumstances as known to Triple H IT Solutions at the time such action was taken to eliminate or preclude such violation. Triple H IT Solutions shall not be liable for any damages of any nature suffered by any Customer, Client, or third party resulting in whole or in part from its exercise of its rights under these policies. Customer is responsible for any charges resulting from the violation of these policies including but not limited to charges resulting from the compromise of any Customer secure password.Reporting Violations of the Triple H IT Solutions Acceptable Use Policy:
Triple H IT Solutions customers shall report to Triple H IT Solutions any information customers may have concerning instances in which the conditions set forth herein have been or are being violated. When Triple H IT Solutions becomes aware of any possible violations, Triple H IT Solutions will initiate an investigation.
To report violations of Triple H IT Solutions Acceptable Use Policy, send any and all documentation supporting the complaint to email@example.com
Triple H IT Solutions reserves the right to modify this policy at any time.