By accessing “JASON ISAACS -- THE LOST GIRLS” (hereinafter “we”, “us”, “our”, “JASON ISAACS -- THE LOST GIRLS”, “http://www.jasonisaacsonline.com/phpBB”), you agree to be legally bound by the following terms. If you do not agree to be legally bound by all of the following terms then please do not access and/or use “JASON ISAACS -- THE LOST GIRLS”. We may change these at any time and we’ll do our utmost in informing you, though it would be prudent to review this regularly yourself as your continued usage of “JASON ISAACS -- THE LOST GIRLS” after changes mean you agree to be legally bound by these terms as they are updated and/or amended.
Our forums are powered by phpBB (hereinafter “they”, “them”, “their”, “phpBB software”, “www.phpbb.com”, “phpBB Limited”, “phpBB Teams”) which is a bulletin board solution released under the “GNU General Public License v2” (hereinafter “GPL”) and can be downloaded from www.phpbb.com. The phpBB software only facilitates internet based discussions; phpBB Limited is not responsible for what we allow and/or disallow as permissible content and/or conduct. For further information about phpBB, please see: https://www.phpbb.com/.
You agree not to post any abusive, obscene, vulgar, slanderous, hateful, threatening, sexually-orientated or any other material that may violate any laws be it of your country, the country where “JASON ISAACS -- THE LOST GIRLS” is hosted or International Law. Doing so may lead to you being immediately and permanently banned, with notification of your Internet Service Provider if deemed required by us. The IP address of all posts are recorded to aid in enforcing these conditions. You agree that “JASON ISAACS -- THE LOST GIRLS” have the right to remove, edit, move or close any topic at any time should we see fit. As a user you agree to any information you have entered to being stored in a database. While this information will not be disclosed to any third party without your consent, neither “JASON ISAACS -- THE LOST GIRLS” nor phpBB shall be held responsible for any hacking attempt that may lead to the data being compromised.