PRIVACY AND TERMS OF USE
OWNERSHIP
The COWS, Inc Web site, its design, all text, graphics, and content are the property of COWS, Inc and its affiliates. None of the content found on this site may be reproduced, republished, distributed, displayed, sold or modified without the express written permission of COWS, Inc.
ACCURACY OF INFORMATION ON THIS WEB SITE
Every effort has been made to ensure the accuracy of the information presented on this Web site; however, we assume no responsibility for its accuracy and the information should not be relied upon as accurate, timely or fit for any particular purpose. Further, we assume no obligation to update the information contained on this Web site or to advise of any further developments concerning any topics mentioned. The information on this Web site may be changed at any time without notice.
OTHER LINKED SITES FOUND ON THIS WEB SITE
Links to other Web sites are provided for your reference and convenience only. We assume no responsibility for the accuracy, appropriateness or views expressed on other linked Web sites. We are not acting as a publisher of any materials contained on other linked sites and do not seek to control the content of or maintain any type of editorial control over any linked sites. Links to other sites should not be construed to imply that this site is in any way affiliated or associated with, or is legally authorized to use any trade mark, trade name, logo or copyrighted symbol found in the link or link descriptions to other sites.
WHEN YOU LEAVE THIS SITE
This policy discloses the privacy practices for our Web site. However, our site contains links to other sites. Once you link to another site, you are subject to the privacy and security policies of the new site. We encourage you to read the privacy policies of all Web sites you visit, especially if you share any personal information
SECURITY POLICY
Users are prohibited from violating or attempting to violate the security of the site. By way of example, you are prohibited from (a) accessing data not intended for such user or logging onto a server or an account which the user is not authorized to access; (b) attempting to probe, scan or test the vulnerability of a system or network or to breach security without proper authorization; (c) attempting to interfere with service to any user, host or network; (d) sending unsolicited mail, including promotions and/or advertising of products or services.