Terms & Conditions
1. Terms and Conditions Deinitions
These Terms and Conditions apply to all transactions with vektor UK ltd. Please read them carefully. They do not affect your statutory rights. We may change these terms and conditions at any time. You will be asked to agree to the terms and conditions each time you place an order. Please ensure that you are familiar with our current terms and conditions.
“The Company” is Vektor UK Ltd.
“Facilities” are computer hardware, computer software, and other systems access to which is provided to a user by the Company.
“Resources” are particular elements of the Facilities to which access is granted to individual users.
An “Account” is granted to a particular user, and constitutes authorisation to use certain Facilities and Resources in conjunction with an agreement between the Company and that user.
“Login Information” means any login name, password, cryptographic key or other credential or means of identification by which a user may gain access to Facilities.
“User Data” is computer data stored by a user using the Facilities.
“Suspension” of an Account means action taken by the Company in order to temporarily prevent the use of any Resources which would normally be available in conjunction with the account, including, but not limited to, changing or suspension of Login Information, prohibiting access to User Data, and preventing any software from being run in conjunction with the Account.
An “Internet Server” is software which accepts connections and/or reads data from other users, or another connected host or network, using any Internet Protocol or any other means.
“Internet Relay Chat” is the peer-to-peer communications protocol described in RFC 1459.
A “Mailing List” is a management system for a list of email recipients, used for the discussion of particular topics. No person shall be subscribed to any Mailing List without their consent.
A “Web Server” is the software and internet URL associated with a particular set of information available for download via the Hypertext Transfer Protocol described in RFC 2068 and other documents.
“Bandwidth” means the amount of data transferred between the Facilities and any connected hosts, by means of any Internet Protocol or other means.
The “Price List” is the list of charges for services.
Documents referenced as “RFC” and a number are Internet Requests For Comments, and are available from the Internet Engineering Task Force at http://www.ietf.org and elsewhere. Such documents specify the protocols and describe the operation of services on the Internet.
2. Our Contract
2.1 Website Orders:
You will have an opportunity to check and correct any input errors in your order up until the moment you submit your order (by clicking the CONFIRM button on the page titled ‘PLEASE CHECK YOUR ORDER’). After submitting an order to us we will give you an Order Reference Number and details of the products you have ordered. Please note that this information is an acknowledgement, not acceptance of your order. You will receive an email from ourselves to confirm the contents of your order.
2.2 Off line Orders:
After submitting an order to vektor. UK Ltd, artwork will be requested from you. We will only confirm your order once we have received artwork.
2.3 We may decline all or part of your order for any reason, in which case we will contact you as soon as we can to let you know. When deciding whether or not to accept your order we or our payment processing partner may use certain information about you, including any received from credit reference and fraud detection agencies. This helps to protect you and us against fraudulent transactions. We will tell you if your payment details cannot be authorised for any reason and may invite you to pay by another method.
3. Prices and Payment
All prices and charges on this site are shown in UK pounds sterling. They include any VAT payable, but exclude delivery charges (for details see ?Delivery? below). The total cost of your order is the price of the products you order plus the applicable delivery charge. All costs and discounts will be set out clearly before you submit your order. Prices, offers and products are subject to availability and may change before (but not after) we accept your order. If something becomes unavailable we may offer you an alternative. We try very hard to ensure that all information on this site is accurate. However, occasionally, errors can occur. If we discover an error in the price or description of a product you have ordered, we will tell you and ask you whether you wish to continue with your order or cancel it.
4. Age Requirements
If you order a product with a minimum age requirement, by ordering you confirm that you are of the required age.
Delivery must be to the address at which your payment card is registered, which must be in the United Kingdom. Normally, deliveries will take between 2 and 5 working days. We do everything we can to meet the delivery times specified in this section. However, occasionally delivery times may be affected by factors beyond our control and therefore they cannot be guaranteed. Please allow extra time for deliveries to Scottish islands. Some deliveries may need to be signed for (except items sent by post and which are small enough to be put through your letterbox). It is your responsibility to ensure you are home or able to collect the item if the courier was unable to find you at home. If you are not at home and delivery was not possible, we reserve the right the right to apply further delivery charges should you require us to re-send your item. Please make sure you keep the receipt enclosed with your goods.
6. Delivery fees
We make every effort to keep our delivery charges as low as possible. Our charge depends on the weight of your order. Once you have added products to your Shopping Basket, the appropriate charge will be added automatically and shown on the subsequent invoice page. You will always be able to see this charge before submitting your order. If you add additional items, please double check the delivery charge by clicking ?Re-calculate?.
7. Missing, Damaged or Incorrect Orders
We try very hard to ensure that you receive your order in pristine condition. If you do not receive all your products or in the unlikely event that a product arrives damaged or faulty, please call us for use the contact link under customer care.
8. This Website
vektor. and its suppliers own the copyright, trademarks and all other intellectual property rights in all material and content on this website, which you may use, download, copy, publish, transmit or otherwise make available by any other means only for your own personal, non-commercial use. Any other use or reproduction of the material or content is strictly prohibited.
10. Design Variation
Whilst vektor. makes every effort to ensure that goods supplied correspond to in every respect with the sample, specification or description, provided as the case maybe, vektor. is not responsible for the minor variations in specification, colour or other design features, and in the case of business purchasers no such minor variation shall entitle the Purchaser to withdraw the contract or shall be the subject of any claim against vektor. by the Purchaser.
11. Obligations of vektor. UK Ltd
In the event that any Purchaser submits any Order to vektor. UK Ltd or uses any or all of the Services in such a way as may in vektor. UK Ltd’s opinion expose vektor. UK Ltd to the risk of legal or other proceedings or expose vektor. UK Ltd to loss or damage of any kind or being of a nature that contradicts the religious beliefs held by vektor. UK Ltd’s board, vektor. UK Ltd reserves the right to refuse to process or continue processing any Order or to withdraw, suspend or cancel the Services or take any other action it sees fit with no further liability.
12. Returns and Refunds
If we fail to deliver the correct product that you have ordered or your purchase arrives damaged or becomes faulty (within 3 months of purchase) we will arrange to replace the item or refund you. We will not accept returns or offer refunds for any other reason. With this in mind please choose your product carefully and ensure that it is as you require checking important factors such as its size. Please be aware all shipping costs to return an order are at the cost of the consumer. Products maliciously damaged will not be refunded.
12. Use Of Facilities
Not all Resources are available for the use of all users. Users shall not attempt to gain access to Resources which are not explicitly made available with their Account.
The Facilities are provided only for registered users who hold Accounts, with the exception of:
(a) Web Servers which provide files and information to the public;
(b) Mailing Lists to which any individual may subscribe;
(c) Cases where an Account provides the facility to offer services to other individuals, as in the case of certain virtual mail facilities.
The Facilities shall not be used in a manner that contravenes the Acceptable Use Policies or other relevant conditions of use of any network or resource to which they are used to connect; nor shall they be used in a manner which contravenes local law for any connected networks or resources. It is the user’s responsibility to assess how these conditions affect their activities or proposed activities.
The Company reserves the right to audit any user software which can be executed by another person, or processes data which is sent to or from another user or another connected host or network (including, but not limited to, CGI scripts and other dynamic web content, and mail filtering software), in order to ensure that it does not compromise the stability and security of the Facilities. Where an audit of the source code is not possible (for instance, where such code cannot be made available for copyright reasons), or if the user does not wish to have the code audited, such software must be removed from the Facilities unless explicit permission is granted by the Company to the contrary. Such permission may include additional conditions on the use of the software designed to ensure that such software is used in a secure manner.
Where an email address is provided to a user, the user shall read email sent to this address regularly, since important information may be communicated by the Company and its personnel to users via email.
The Company reserves the right to shut down or prevent execution of any user software which is causing difficulties for other users or where the effects of running the software are in breach of this Acceptable Use Policy.
13. Misuse Of Facilities
The Facilities shall not be used to attempt to gain access to any computer system or network other than those to which the user has legitimate access.
The Facilities shall not be used in any activity which is intended to inconvenience another user of the Facilities or of any other computer or to prevent them from making use of any resources to which they have legitimate access.
No user shall engage in activity which is likely to damage, render unuseable, impose an unacceptable load on, or in any other way detrimentally affect the Facilities.
No user shall attempt to impersonate another user, or the Company or any of its personnel; nor shall the Facilities be used to impersonate any other individual or corporation.
No user shall attempt to run their own Internet Server using the Facilities except where permission to do so has been explicitly granted by the Company.
14. Internet Relay Chat
The Facilities shall not be used to connect any software – including, but not limited to, conventional “chat” clients, automatic “bots” and all other forms of client and server – to any Internet Relay Chat network.
15. Unsolicited And Bulk Email
The Facilities shall not be used to send unsolicited or bulk email.
Correctly configured Mailing Lists shall not be considered “bulk email” for the purposes of 5.1 above.
16. Automated Processing Of Email
Where an Account provides Resources for the automated processing of incoming or outgoing email (such as procmail or exim filtering scripts), a User shall take every care to ensure that under no circumstances could such automated processing lead to the emission of extremely large number of emails, of excessively long emails, of emails which loop through any system repeatedly, or of unsolicited emails.
17. Privacy And Security
The Company and its personnel shall not view, modify or copy User Data, except with the permission of the user, or
(a) where pursuant to tracing a system fault or security problem, both in relation to the Facilities and where there is cause to believe that an Account is being used to compromise the security of another computer or network;
(b) where there is cause to believe that the terms of this Acceptable Use Policy are being broken or have been broken;
(c) at the instigation of a competent law enforcement agency;
(d) following an order by a competent court;
(e) where such action is judged necessary to prevent the development of problems in the future;
(f) in connection with activities described in 2.4 above.
Note that certain files which are used routinely and automatically by system software (such as .forward files and configuration files for ssh) may be checked from time to time without notice as in (e) above. This action is necessary to ensure smooth running of the Services.
Users consent to certain information about their activities (including, but not limited to, name, email address and times and durations of logins to the system) to be made available to other users on a day-to-day basis (for example, by use of the “last” or “who” commands for shell accounts). Users may individually consent to information about them being made available by the “finger” service to users on other hosts.
Users consent to day-to-day logging of their usage of the Facilities for the purposes of accounting, fault prevention, and maintaining system security, as deemed appropriate by the Company and its personnel. Such logged information shall be treated as User Data for the purposes of the provisions in 7.1 above, except where the logged information is needed for routine checks on the Facilities not covered there, and will be kept secret from users except as in 7.2 above.
Users shall not attempt to gain access to the Data stored by other Users, except where that data is made available to others explicitly or implicitly, for instance by being made available on a public HTTP server. It should be noted that leaving files or directories readable to others on a shared computer does not constitute implicit permission for the purposes of this provision.
No Login Information shall be given by a user to any other party, except with the permission of the Company. Certain Resources enable a user to set Login Information for others, for instance some virtual email services and password-protected content on a Web Server. In these cases, permission may be taken as granted to set, reset and distribute such Login Information as the user sees fit; the account holder shall be responsible for ensuring that the activities of persons holding such Login Information fall within this Acceptable Use Policy.
The Company reserves the right to suspend or invalidate Login Information at any time, if it believes it to have been compromised, disclosed without permission to another party, or where there is reason to believe that it is being used in conjunction with activities in breach of this Acceptable Use Policy. Such withdrawal or invalidation shall extend only to the Login Information, and not to the associated Account itself.
18. User Data, Quotas And Backups
Company facilities shall not be used to store or process data in contravention of applicable national law, or in connection with any activity which would itself contravene this Acceptable Use Policy. Particular attention is drawn to the relevant legislation on Data Protection, Computer Misuse, and Copyright; this should not, however, be taken as an exhaustive list.
An Account may have imposed upon it a “quota” of disk space. Users shall not attempt to store more data than is allowed by their quota. This quota extends to data in files in a home directory and other directories, data which constitutes user email in transit, and data stored in any database by the user. Exceeding a quota for longer than the allowed “grace” period may incur additional charges.
Separate quotas may, at the Company’s option, be applied to the use of other resources such as computer time used and bandwidth. Such quotas ensure that the Facilities are available for use by all authorised users.
The backup of User Data data stored on an Account is the responsibility of the owner of the account. The Company may not routinely make backups of User Data. If any backup of User Data is made in the course of routine or other system maintenance, then the data will not be read except as in 7.1 above. Such backups will be destroyed after they cease to be pertinent.
19. Use Of Bandwidth
Bandwidth usage is chargeable as per the terms in the Price List, and must be paid for quarterly in arrears except by specific agreement.
Bandwidth usage is monitored by the Company. All traffic, both incoming and outgoing, is chargeable, including that used for email, shell access, web serving, and any other purpose.
The Company reserves the right to suspend any Account which it has reason to believe is being used in connection with excessive bandwidth usage.
Where a user expects the usage of bandwidth for any Account to rise by a factor of five or more over normal levels, they shall inform the Company in advance. Such bandwidth usage shall be deemed excessive if such notice has not been given, and this may incur additional charges and/or lead to the Suspension of the Account.
20. Withdrawal/termination Of Service
A user may not attempt to gain access to the Facilities if their access has been terminated or suspended.
The Company reserves the right to terminate service to any user, including removal of Account, withdrawal or invalidation of Login Information, and deletion of User Data, in the event that
(a) the user is deliberately acting in breach of this Acceptable Use Policy;
(b) charges payable are overdue.
The Company reserves the right to Suspend an account temporarily, wherever there exists reason to believe that a breach of this Acceptable Use Policy is taking place or has taken place.
21. Limitation Of Liability
The Company shall not be held liable for any damages or injuries resulting from non-availability of service, either announced interruptions or unannounced ones resulting from causes beyond the Company’s control.
22. Exceptions And Exclusions
The Company may make specific exceptions or exclusions to this Acceptable Use Policy under such circumstances determined at the discretion of the Company and in agreement with the User concerned.
The Company may amend this Acceptable Use Policy from time to time. Such amendments will be communicated to all users by means of email, and displayed publically on the Company’s Web Server.
Users’ activities are always governed by the most recent version of the Acceptable Use Policy.