Conditions of Use

These conditions of use are an agreement between this seller and you. Please read them. They apply to all the items you purchase from our site or receive by any other electronic means from us, unless the purchase comes with separate terms ("Third Party License"). If so the terms of the Third Party License will apply. This agreement also applies to any updates and supplements to the purchases, unless other terms accompany those items. If so, those terms apply.
BY PURCHASING AN ITEM, YOU HAVE ACCEPTED THESE TERMS. IF YOU DO NOT INTEND TO ACCEPT THEM, YOU HAVE NO RIGHT TO (AND MUST NOT) PURCHASE OR USE THE ITEMS.
Except for the above, if the purchased item enables access to any Internet-based services, your use of those services will be subject to the separately-provided terms of use.
In this agreement "Purchase Provider" means the entity selling the ITEM to you, as identified on their web site. If the ITEM is licensed to you by Microsoft, then the Purchase Provider is Microsoft (or based on where you live, one of its affiliates).

If you comply with these conditions of use terms, you have the rights below:

INTERNET-BASED SERVICES.

Your purchase may provide Internet-based services with the ITEM. In addition to the following, your use of those services is subject to the terms provided to you by the purchase provider and/or your wireless carrier.

Consent for Internet-Based or Wireless Services.

The ITEM may connect to computer systems over an Internet-based and/or wireless network. In some cases, you will not receive a separate notice when they connect. Using the ITEM operates as your consent to the transmission of standard device information (including but not limited to technical information about your device, system and application software, and peripherals) for Internet-based and/or wireless services.

Misuse of Internet-based Services.

You may not use any Internet-based service in any way that could harm it or impair anyone else's use of it or the wireless network. You also may not use any Internet-based service to try to gain unauthorized access to any service, data, account, or network by any means.