Welcome to Jetlink Solutions Inc (official address: 21 Royal Palm Way Unit 204, Boca Raton, FL 33432, EIN: 39-2599054) ("Jetlink Solutions", "Herdman", "we", "us" and "our")!
THESE TERMS OF USE CONSTITUTE A PUBLIC OFFER. BY MAKING PAYMENT FOR ANY OF OUR SERVICES OR PRODUCTS, YOU AUTOMATICALLY ACCEPT THIS OFFER AND ENTER INTO A BINDING AGREEMENT WITH JETLINK SOLUTIONS INC.
PLEASE READ THE TERMS OF USE CAREFULLY BEFORE USING THIS SITE OR MAKING ANY PAYMENT. BY ACCESSING AND USING THE SITE IN ANY MANNER: BROWSING THE SITE, USING ANY INFORMATION, CONTENT OR SERVICES, DOWNLOADING ANY SOFTWARE OR FILES, OR MAKING PAYMENT FOR PRODUCTS OR SERVICES, YOU ENTER INTO A LEGAL AGREEMENT WITH JETLINK SOLUTIONS INC AND HEREBY AGREE TO COMPLY WITH THESE TERMS IN FULL.
IF YOU DO NOT AGREE TO ALL THE TERMS AND CONDITIONS SET FORTH IN THESE TERMS OF USE, PLEASE DO NOT USE THE SITE IN ANY MANNER AND DO NOT MAKE ANY PAYMENTS.
These Terms of Use on this webpage govern your use of websites operating under the Jetlink Solutions and Herdman brands ("Site"). The information here concerns products, terms, intellectual property and compliance requirements. These Terms apply to all visitors, users (individuals or legal entities) and other persons wishing to access or use the service ("you" or "your").
ACCEPTANCE OF OFFER These Terms of Use constitute a public offer in accordance with applicable law. The offer is deemed accepted, and a binding agreement concluded at the moment you make payment for any Services or Products. No separate written agreement or contract is required. By making payment, you confirm that you have read, understood and agree to comply with all terms and conditions set forth herein.
Our Privacy Policy and Cookie Policy supplement these Terms of Use. We recommend carefully reading this information and periodically checking its content for updates.
SCOPE OF SERVICES Through this Site you may request access to the following services:
- Penetration testing services (full cycle)
- Vulnerability assessment and security testing
- Data breach monitoring and leak detection services with dedicated dashboard
- Anti-fraud system testing and assessment
- Custom software development
- Security consulting services
- Security audit reports and documentation
- Vulnerability remediation and mitigation services (available upon request)
- Other security services available upon request
HOW TO ORDER SERVICES IMPORTANT: Services cannot be purchased directly through the website. All services must be requested through the contact/request form available on our Site. Our ordering process is as follows:
- Submit a service request through the contact form on our website
- Initial consultation with our manager to understand your needs
- Mandatory company verification process (see "Company Verification Requirement" section below)
- Discussion and agreement on final scope of services and pricing
- Receipt of formal offer describing services and terms
- Upon agreement, we issue an invoice for payment
- After payment, services are activated and access is provided
This controlled process ensures security, proper verification and clarity regarding scope of services and pricing before any commitments are made.
DATA BREACH MONITORING DASHBOARD For our data breach monitoring and leak detection services, we provide a dedicated personal dashboard where all data breaches related to your company are consolidated. Key features include:
- Dedicated isolated server on a subdomain specific to your company (format: your_name.herdman.pro)
- Consolidated view of all identified data breaches related to your organization
- Continuous monitoring with automatic updates when new breaches are detected (marked as "NEW")
- Isolated environment separate from the main database to ensure security and confidentiality
- Detailed reports and analysis of each data breach incident
- Real-time notifications about newly discovered breaches
OUR APPROACH TO DATA BREACH MONITORING: We use industry best practices and maintain the highest standards of integrity. We never fabricate or exaggerate breach data. If no breaches are found in our database, we report this honestly. Our database contains approximately 70 billion records, and we conduct exhaustive searches, investigating all possible resources until our system stops returning further results. We conduct comprehensive searches, even for information that may have been accidentally omitted from initial specifications, ensuring complete coverage.
Access to the Data Breach Monitoring Dashboard is provided only after successful company verification and payment.
You may not use our Site for any unlawful purposes, and you may not violate any laws in your jurisdiction.
TERMS AND DEFINITIONS The following terms have the following meanings:
"Service" or "Services" — access to our Site, as well as user registration and any ordering of our services, products, applications, tools and features (individually "Service" or collectively "Services"), provided by our company Jetlink Solutions Inc together with our affiliates, officers, directors, employees, agents and subsidiaries;
"Product" or "Products" — goods or services available for request through the Site, such as penetration testing services, security assessments, software tools, digital files, software, reports and consulting services. All information and specifications regarding services can be found on respective pages or will be provided by our managers;
"Service Fee" means the fee payable by you for use of the Services as specified in the invoice.
SCOPE OF LICENSE Products are licensed, not sold to you. We grant you a non-exclusive, non-transferable, non-sublicensable, revocable, limited license to use the Products solely to perform those functions and tasks available to you as an End User of the Products.
This license does not permit you to use the Products on any device that you do not own or legally control. You may not distribute or make the Products available through a network where they could be used by multiple devices simultaneously. You may not rent, lease, lend, sell, redistribute or sublicense the Products. You may not copy, modify (except as expressly permitted by these Terms of Use or applicable license), decompile, reverse engineer, decrypt, disassemble, attempt to obtain source code, modify or create derivative works of the Products, any updates or any part thereof (except where any of the foregoing restrictions are prohibited by applicable law). Any attempt to do so violates our rights as Licensor. You may be subject to prosecution and damages if you violate this restriction.
INTELLECTUAL PROPERTY All intellectual property on the Service, including materials protected by copyright, trademark or patent laws, belongs to us or is licensed to us. All trademarks, service marks and trade names, including but not limited to "Jetlink Solutions" and "Herdman", are owned, registered and/or licensed by us. All content on the Service (excluding Personal Data), including but not limited to text, software, scripts, code, design, graphics, photographs, sounds, music, videos, applications, interactive features, reports, methodologies and all other content (collectively "Content") is our intellectual property; All rights reserved.
YOUR OBLIGATIONS AND WARRANTIES You shall not, directly or indirectly:
- reverse engineer, decompile, disassemble or otherwise attempt to discover source code, object code or underlying structure, ideas, know-how or algorithms related to the Services or any product, documentation or data related to the Services;
- modify, translate or create derivative works based on the Services or any Product;
- access all or any part of the Services or Product to create a product or service competing with the Services;
- use the Services to provide services to third parties without prior written consent from Jetlink Solutions Inc;
- license, sell, rent, lease, transfer, assign, distribute, display, disclose or otherwise commercially exploit or otherwise make the Services available to any third party, except employees or agents authorized by Jetlink Solutions Inc;
- use the Services or any Product in a manner that is unlawful or causes damage or harm to any person or property;
- use the Services or Products for any unauthorized security testing, hacking or penetration testing activities against third parties without proper authorization;
- access, store, distribute or use while using the Services any malware or any material that (i) is unlawful, harmful, threatening, defamatory, obscene, infringing, abusive or racially or ethnically offensive; (ii) facilitates illegal activity; (iii) depicts sexually explicit images; (iv) promotes unlawful violence; or (v) is discriminatory based on race, gender, color, religious belief, sexual orientation, disability;
- use any information, tools or methodologies obtained through our Services for malicious purposes or to cause harm;
- attempt to gain or assist third parties in gaining unauthorized access to the Services or any systems tested through our Services.
The above list of prohibited behavior/use is not exhaustive. We reserve the right to determine what behavior we consider to violate these Terms of Use or to be improper, and the appropriate measures to take.
As a user, you agree that you are responsible for complying with any applicable local laws that may apply to your use of our Site and Services, including but not limited to laws governing cybersecurity, data protection and authorized security testing.
If we determine or receive information from third parties or law enforcement about any of the above prohibited uses or other illegal activities on your part, we may terminate your access to the Personal Dashboard and our Site due to your violation of these Terms of Use. You agree to reimburse us for any expenses or costs, including consequential damages, that we or anyone else may incur as a result of such violation or illegal action.
At our sole discretion and determination for any reason, we reserve the right to remove or modify any Content or any other Service information that you post that does not comply with or violates these Terms of Use, without prior notice or permission from you.
SECURITY TESTING AUTHORIZATION When ordering our penetration testing or security assessment services, you represent and warrant that:
- You have full authority and legal right to authorize security testing of target systems, networks or applications;
- You will provide all necessary written permissions and authorizations before testing begins;
- You understand that our testing services may include simulated attacks and security assessments that may affect system availability or performance;
- You will not hold Jetlink Solutions Inc liable for any system failures that occur as a result of authorized testing activities conducted in accordance with the agreed scope of work.
OUR PENETRATION TESTING SERVICE GUARANTEES For penetration testing services, we guarantee:
COMPREHENSIVE TESTING: We test everything. Our methodology is exhaustive - even if information about certain assets was accidentally omitted from the initial scope of work, we will continue searching and testing all discoverable assets until our systems stop returning further results.
COMPETENCE AND QUALITY: We guarantee our professional competence and the quality of our work. We apply industry best practices and maintain the highest standards of security testing.
HONEST REPORTING: We never fabricate vulnerabilities. If no vulnerabilities are found, we report this honestly. Our integrity is paramount.
DETAILED ANALYSIS: We provide comprehensive reports with all findings, analysis and conclusions. The client's responsibility is to remediate identified vulnerabilities. We provide analysis and identification of security issues, not their remediation, unless remediation services are specifically ordered.
COMPANY VERIFICATION REQUIREMENT To prevent abuse of our services and ensure they are not used as an attack vector by malicious actors, we require mandatory company verification before providing any services. This process occurs before pricing discussions and service provision.
The verification process includes:
- Verification of company registration and legal status
- Confirmation of authorized representative's identity and authority
- Validation of ownership rights or authorization for systems to be tested
- Verification of intended use and scope of services
- In some cases, execution of a Non-Disclosure Agreement (NDA)
All service requests and communications must originate from official company sources. We do not process requests from unofficial or unverified channels.
Access to services and the Data Breach Monitoring Dashboard (your_name.herdman.pro) will be provided only after successful completion of verification and payment. We reserve the right to refuse service to any legal entity that does not pass verification or that, in our reasonable opinion, may use our services for malicious purposes.
You acknowledge that this verification requirement is a critical security measure and agree to provide all requested documentation and information in a timely manner.
PERSONAL DASHBOARD CREATION AND MANAGEMENT IMPORTANT: Personal Dashboards are created only by Jetlink Solutions Inc personnel, not by users themselves. This is a critical security measure.
Dashboard creation process: After successful verification and payment, we will create a Personal Dashboard for you. This process includes:
- Generation of secure credentials in accordance with security best practices
- Creation of your dedicated dashboard on a subdomain (where applicable): your_name.herdman.pro
- Delivery of access credentials through secure channels
- Initial dashboard setup and configuration
You will receive your login credentials from our authorized personnel. Information you provide in the verification process must be accurate, truthful, current and complete.
Password management: If you lose or forget your Personal Dashboard password, we will generate a new password for you. Password reset requests must be submitted from official company sources and will be verified before processing. We do not offer self-service password reset functionality for security reasons.
Dashboard security: You are responsible for maintaining the confidentiality of your access credentials after receiving them. You must immediately notify us if you become aware that your Personal Dashboard or Data Breach Monitoring Dashboard has been hacked or compromised. You are responsible for all transactions conducted through your Personal Dashboard at any time prior to notification at info@jetlink-s.com.
Dashboard deletion: You may request deletion of your Personal Dashboard at any time by contacting us at info@jetlink-s.com. However, these Terms of Use survive deletion or other termination of the Personal Dashboard with respect to any rights or benefits obtained by Jetlink Solutions Inc, as well as any right to damages or other remedies that Jetlink Solutions Inc may have.
Communications: By having a Personal Dashboard, you agree to receive service communications, security notifications and important updates. You may opt out of marketing communications by following the unsubscribe instructions in emails, but you cannot opt out of critical service communications.
MINIMUM USER AGE You represent and warrant that you are at least 18 (eighteen) years old. If you are under 18 (eighteen) years old, then you may not under any circumstances or for any reason use the Service.
If your country of residence provides for age requirements more stringent than those set forth in the preceding provision, you must comply with the appropriate age requirements of your country of residence.
At our sole discretion, we may refuse to offer the Service to any person or legal entity and change eligibility criteria for using the Service at any time. The right to access the Service is revoked where these Terms of Use or use of the Service are prohibited or to the extent offering, sale or provision of the Service conflicts with any applicable law, rule or regulation. Furthermore, the Service is offered only for your use, and not for the use or benefit of any third party.
INTERNATIONAL ACCESS The Service is operated by Jetlink Solutions Inc from its office in the United States of America. If the Service or any resources available on the Service are illegal or legally invalid in your country, please do not use the Service. If you access the Service from outside the United States, you are responsible for compliance with local laws.
PRIVACY We respect your privacy. By accessing and using our Site and Service and providing us with your personal data, you agree to comply with our Privacy Policy. Please refer to our Privacy and Cookie Policy to learn our policies regarding your confidential information and how we protect it.
DATA CONFIDENTIALITY During provision of Services, especially penetration testing and security assessments, we may gain access to confidential information about your systems, networks, vulnerabilities and security posture. We commit to:
- Maintain strict confidentiality of all information obtained during service provision;
- Use such information solely for purposes of providing contracted Services;
- Not disclose any vulnerabilities, security findings or confidential information to third parties without your explicit written consent;
- Apply appropriate security measures to protect your confidential information;
- Provide detailed reports only to authorized personnel designated by you.
In some cases, we may execute a Non-Disclosure Agreement (NDA) to further formalize confidentiality obligations.
You agree to treat all reports, findings, methodologies and tools provided by us as confidential and proprietary information.
ACCESS CREDENTIALS AND SERVICE ACTIVATION To use our Services, especially the Data Breach Monitoring Dashboard and security testing services, you must complete our company verification process and make payment.
After successful verification and payment, Jetlink Solutions Inc will provide you with access credentials to your dedicated services, including your personalized dashboard on a subdomain (your_name.herdman.pro), where applicable.
Credential generation: All access credentials are generated by Jetlink Solutions Inc in accordance with security best practices. We use secure methods to create strong, unique credentials for each dashboard.
You are obligated to:
- Keep all access credentials confidential and secure
- Not transfer, distribute or transmit access credentials to unauthorized persons
- Use access credentials only for authorized purposes in accordance with these Terms of Use
- Immediately notify us if credentials are compromised or used without authorization
You have no right to distribute, publish, publicly display or otherwise disseminate access credentials, reports or data from the Data Breach Monitoring Dashboard to other persons, organizations, legal entities, newsgroups, places and/or sites without proper authorization.
Unauthorized access, credential sharing or abuse of our services constitutes a material breach of these Terms of Use and may result in immediate termination of service access and potential legal action.
DELIVERY AND PAYMENT TERMS These Terms of Use constitute a public offer. Payment for Services serves as your acceptance of this offer and creates a binding agreement between you and Jetlink Solutions Inc. No separate contract is required.
Service request and ordering process:
- Submit service request through contact form on website
- Initial consultation with our manager
- Company verification process
- Agreement on scope of services and pricing
- Receipt of formal offer
- Receipt of invoice for payment
- Payment of invoice
- Service activation and credential delivery
Services will be provided in accordance with specifications indicated in the offer and invoice. Access to the Data Breach Monitoring Dashboard and security services will be provided after successful company verification and payment. Reports and results will be provided through your dedicated dashboard or secure communication channels.
Access to the Service is deemed provided by Jetlink Solutions Inc when:
- Payment is received in full (which constitutes acceptance of this offer)
- Company verification is successfully completed
- Access credentials are generated and delivered to authorized personnel
- Your dedicated subdomain (your_name.herdman.pro) is activated, where applicable
Payment terms are specified in the invoice. All service subscriptions are provided for a specific period of time established in advance. After this period expires, access will be suspended unless renewed.
Pricing for Services is determined after verification and consultation with our managers. Pricing may be based on standard rates or individual offers depending on required scope of services.
You acknowledge and agree that all payments may be processed using third parties - payment systems. We do not control and are not responsible for the security or performance of payment systems.
Payment must be made by bank transfer in accordance with instructions in the invoice from info@jetlink-s.com. You acknowledge and agree that Jetlink Solutions Inc may change the fee for Services at any time with reasonable notice for future service periods. You must independently pay all applicable taxes in accordance with applicable law when purchasing Services.
REFUND/CANCELLATION POLICY For services (penetration testing, assessments, consulting):
- Cancellations made more than 7 days before scheduled start date may be eligible for full refund minus administrative fees;
- Cancellations made less than 7 days before scheduled start date are non-refundable;
- After service provision begins, no refunds are provided.
For ongoing service subscriptions (data breach monitoring):
- Services are paid for specific periods
- Cancellation requests must be submitted before the next billing period
- No refunds for partial service periods
For software products and licenses:
- All payments are final and you will not be entitled to any refund unless required by applicable law.
Jetlink Solutions Inc reserves the right to issue refunds at its discretion.
Any cancellation request after order processing must be submitted in writing to the following email address: info@jetlink-s.com
TERM AND TERMINATIONThe agreement created by your acceptance of this offer (by payment) takes effect from the date of payment. The agreement remains in effect for the paid service period or while you maintain a Personal Dashboard with us.
In case of material breach of these Terms of Use or in case of action with fraudulent intent, Jetlink Solutions Inc has the right to suspend your access to the website and services immediately and indefinitely. You will be notified in writing (email is sufficient). Suspicion of material breach is sufficient for suspension pending investigation.
TECHNICAL SUPPORT When using the Services, you may request technical assistance and consultation on technical and other matters. Support requests should be sent to info@jetlink-s.com. Jetlink Solutions Inc will make reasonable efforts to provide you with quality and timely support, but does not guarantee specific response times or that your requests or issues will be resolved within specific timeframes.
CLIENT RESPONSIBILITY REGARDING FINDINGS When we provide penetration testing services, security assessments or data breach monitoring, we provide comprehensive reports with all findings, analysis and conclusions. These reports identify security vulnerabilities, breaches and risks.
IMPORTANT: The sole responsibility of the client is to remediate, correct or otherwise address any vulnerabilities, breaches or security issues identified in our reports. We provide analysis and identification services, not remediation services, unless remediation and mitigation services are specifically ordered as an additional service.
If you fail to remediate identified security issues and subsequently suffer losses, damages or breaches, you acknowledge that this failure is your responsibility. Our service is to identify and report issues; your obligation is to properly address them.
DISCLAIMER OF WARRANTIES YOU EXPRESSLY ACKNOWLEDGE THAT USE OF THE SITE, SERVICES OR PRODUCT IS AT YOUR OWN RISK, EXCEPT WHERE WE HAVE PROVIDED SPECIFIC GUARANTEES FOR PENETRATION TESTING SERVICES AS SET FORTH IN THE "OUR PENETRATION TESTING SERVICE GUARANTEES" SECTION.
JETLINK SOLUTIONS INC EXPRESSLY DISCLAIMS ANY WARRANTIES REGARDING PRODUCTS AND SERVICES, EXCEPT AS SPECIFICALLY STATED. THE SITE, SERVICES, PRODUCTS AND ANY RELATED DOCUMENTATION ARE PROVIDED "AS IS" WITHOUT ANY WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, EXCEPT FOR OUR SPECIFIC GUARANTEES REGARDING COMPETENCE AND COMPREHENSIVENESS OF PENETRATION TESTING.
WHILE WE GUARANTEE OUR COMPETENCE AND COMPREHENSIVE APPROACH TO PENETRATION TESTING, WE DO NOT GUARANTEE THAT THE SERVICES WILL IDENTIFY ALL POSSIBLE VULNERABILITIES OR THAT SYSTEMS WILL BE COMPLETELY SECURE AFTER OUR TESTING. SECURITY IS AN ONGOING PROCESS, AND NEW VULNERABILITIES MAY EMERGE AFTER OUR ASSESSMENT.
THE SITE MAY NOT BE AVAILABLE IN ALL LANGUAGES OR IN ALL COUNTRIES. WE DO NOT REPRESENT THAT SITE OR SERVICES FUNCTIONALITY WILL BE APPROPRIATE, ACCURATE OR AVAILABLE FOR USE IN ANY PARTICULAR LOCATION. AVAILABILITY, PRICES AND PAYMENT TERMS FOR THE SITE AND SERVICES MAY CHANGE.
LIMITATION OF LIABILITY TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, WE ARE NOT LIABLE FOR SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING FROM OWNERSHIP, USE OR MALFUNCTION OF THE SITE, SERVICES OR PRODUCT, INCLUDING BUT NOT LIMITED TO PROPERTY DAMAGE, LOSS OF GOODWILL, COMPUTER FAILURE OR MALFUNCTION, SYSTEM DOWNTIME RESULTING FROM AUTHORIZED SECURITY TESTING, AND, TO THE EXTENT PERMITTED BY LAW, DAMAGES FOR PERSONAL INJURY, PROPERTY DAMAGE OR LOST PROFITS, OR PUNITIVE DAMAGES FROM ANY CAUSE OF ACTION ARISING OUT OF OR RELATED TO THIS AGREEMENT, SITE, SERVICES OR PRODUCT, WHETHER ARISING IN TORT (INCLUDING NEGLIGENCE), CONTRACT, STRICT LIABILITY OR OTHERWISE, REGARDLESS OF WHETHER WE WERE NOTIFIED OF THE POSSIBILITY OF SUCH DAMAGES.
WE ARE NOT LIABLE FOR DAMAGES ARISING FROM YOUR FAILURE TO REMEDIATE VULNERABILITIES OR SECURITY ISSUES IDENTIFIED IN OUR REPORTS.
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, OUR LIABILITY FOR ALL DAMAGES SHALL NOT (EXCEPT AS REQUIRED BY APPLICABLE LAW) EXCEED THE ACTUAL PRICE PAID BY YOU FOR USE OF SERVICES DURING THE TWELVE (12) MONTHS PRECEDING THE EVENT GIVING RISE TO LIABILITY.
Under no circumstances shall Jetlink Solutions Inc and its partners, officers, directors, employees or agents be liable for any indirect, consequential, special, punitive or incidental damages arising out of or related to these Terms of Use, including but not limited to:
- any loss of profit, business, contracts, anticipated savings, goodwill or revenue; or
- any loss or damage to software or data; or
- any loss of use of equipment, software or data; or
- any security breaches or data compromises occurring outside the scope of our contracted services; or
- any damages arising from failure to remediate identified vulnerabilities.
EXCEPTIONS AND LIMITATIONS Some jurisdictions do not allow exclusion of certain warranties or limitation or exclusion of liability for certain damages. Accordingly, some of the above disclaimers and limitations of liability may not apply to you.
To the extent that Jetlink Solutions Inc cannot, in accordance with applicable law, disclaim any implied warranty or limit its liability, the scope and duration of such warranty and the extent of Jetlink Solutions Inc's liability shall be the minimum permitted under such applicable law.
LINKS The Service may contain links to websites, applications or other products or services operated by other companies ("Third Party Services"). We do not endorse, control or monitor these Third Party Services, which have separate terms of use and privacy policies. We are not responsible for the content or policies of Third Party Services, and you access such Third Party Services at your own risk.
THIRD PARTY PROGRAMS The Product may contain third party programs ("Third Party Programs") available under open source licenses or free software licenses and distributed, embedded or linked with the Product or recommended in connection with its installation and/or use. These Terms of Use do not modify any rights or obligations you may have under these open source or free software licenses. Notwithstanding anything to the contrary contained in such licenses, the warranty disclaimer and limitation of liability provisions in these Terms of Use apply to such Third Party Programs.
SEVERABILITY If any provision of these Terms of Use is found to be unenforceable by a court or other tribunal of competent jurisdiction, then such provisions shall be modified, limited or eliminated to the minimum extent necessary so that these Terms of Service otherwise remain in full force and effect.
CHOICE OF LAW AND DISPUTE RESOLUTION These Terms of Use and any non-contractual obligations arising out of or in connection with them are governed by and construed in accordance with the laws of the State of Florida, United States of America, excluding conflict of law provisions.
Any dispute arising out of or relating to these Terms of Use shall be resolved through negotiations in good faith. If negotiations within 30 (thirty) calendar days do not resolve the matter, the dispute shall be submitted to binding arbitration in accordance with the rules of the American Arbitration Association, with arbitration to take place in Boca Raton, Florida. Each party bears its own arbitration costs.
UPDATES TO TERMS OF USE At our sole discretion and determination, we reserve the right to change and update any part of these Terms of Use without prior notice.
Terms of Use take effect after they are posted on the Site. We recommend regularly returning to the Terms of Use to stay informed after we post updated Terms of Use online. Your continued use of the Service means that you solely accept these updates.
CONTACT US Any notice or other communication under these Terms of Use must be in writing and is deemed provided and received when sent by email, text message or notifications. The language of communication is English.
Notices relating to these Terms of Use may be sent to you by email. Please send any notices to us relating to these Terms of Use by email to info@jetlink-s.com.
For all inquiries (sales, technical support, general questions, service requests): info@jetlink-s.com
To request services, please use the contact form on our website. All service requests must originate from official company sources.
Company Information:
Jetlink Solutions Inc
Operating Brands: Jetlink and Hirdman
21 Royal Palm Way Unit 204 Boca Raton, FL 33432 United States of America EIN: 39-2599054
Email: info@jetlink-s.com