Logo PHS 2015.001_edited_edited.png

Terms and Conditions

 

Please read these Terms and Conditions carefully. Proactive Health Solutions, LLC (PHS) reserves the authority to change these Terms and Conditions on the site at any moment, and by utilizing the site, you are consenting, whether or not you have read them or are aware of changes, to the Terms and Conditions as described. If you ever disagree with these Terms and Conditions, please do not use the site, app, iPad, or and PHS services offered.

Site Consent and Use:

No matter how you use this site or in what context, you agree to specific terms that are outlined below.

This site is for users who are eighteen (18) years old or older. Utilization of the website by anyone under age 18 is unauthorized without the parent's or guardian's consent, and if unauthorized are in violation of these Terms of Use. By accessing our site, you signify and ensure that you are 18 years old or older, and you agree to and will abide by each of our conditions and terms.

 

Copyright Laws:

Content may not be solely owned by PHS, and may not have clear copyright laws. Thus, you are entirely responsible for how you use the information on the site and information offered through websites that are linked in one way or another to PHS. 

 

Security:

We take precautions to protect our users' information. If users submit sensitive information, it will be secured both offline and online. However, because of the nature of technology and the Internet, we cannot entirely ensure or guarantee the security of any data transmitted to PHS or through our services. Submitting data is performed at your own risk. PHS has security measures in place to prevent the misuse and loss of the information that is accepted from you, but we make no guarantees about our ability to deter any such misuse, loss, to you or another third party. Unauthorized attempts to defeat or bypass security features; to use the system for other than designated purposes; to decline service to authorized users; to access, alter, obtain, destroy, or damage information; or to otherwise impede with the system or its operation are forbidden. Evidence of before-mentioned acts may be disclosed to law enforcement authorities and could lead to criminal prosecution under the National Information Infrastructure Protection Act of 1996, as codified at Section 1030 of Title 18 of the United States Code, and the Computer Fraud and Abuse Act of 1986, or other applicable criminal laws.