Twig \ Error \ RuntimeError
An exception has been thrown during the rendering of a template ("Product not found").
Previous exceptions
  • Product not found (0)
Twig\Error\RuntimeError thrown with message "An exception has been thrown during the rendering of a template ("Product not found")." Stacktrace: #34 Twig\Error\RuntimeError in /home/philwebd/public_html/billing/modules/Orderbutton/html_client/mod_orderbutton_product_configuration.html.twig:2 #33 Box\Mod\Order\Controller\Client:get_products in [internal]:0 #32 FOSSBilling\Exception in /home/philwebd/public_html/billing/modules/Product/Api/Guest.php:82 #31 Box\Mod\Product\Api\Guest:get in /home/philwebd/public_html/billing/library/Api/Handler.php:103 #30 Api_Handler:__call in /home/philwebd/public_html/billing/vendor/twig/twig/src/Extension/CoreExtension.php:1635 #29 twig_get_attribute in /home/philwebd/public_html/billing/data/cache/b0/b05f88d86b541772089c5144ab827716.php:40 #28 __TwigTemplate_1559be173faa4689f2b5d0785b8907eb:doDisplay in /home/philwebd/public_html/billing/vendor/twig/twig/src/Template.php:394 #27 Twig\Template:displayWithErrorHandling in /home/philwebd/public_html/billing/vendor/twig/twig/src/Template.php:367 #26 Twig\Template:display in /home/philwebd/public_html/billing/data/cache/67/67d9fa319b2c24aa5b7e34d09cde494d.php:77 #25 __TwigTemplate_48f67a13f3994ad241545cc961e85472:block_body in /home/philwebd/public_html/billing/vendor/twig/twig/src/Template.php:171 #24 Twig\Template:displayBlock in /home/philwebd/public_html/billing/data/cache/ba/ba376a34af7ceaaf6bc723540e6ac9ee.php:121 #23 __TwigTemplate_114d7837338fd58c992f957ebe1e034b:doDisplay in /home/philwebd/public_html/billing/vendor/twig/twig/src/Template.php:394 #22 Twig\Template:displayWithErrorHandling in /home/philwebd/public_html/billing/vendor/twig/twig/src/Template.php:367 #21 Twig\Template:display in /home/philwebd/public_html/billing/data/cache/67/67d9fa319b2c24aa5b7e34d09cde494d.php:49 #20 __TwigTemplate_48f67a13f3994ad241545cc961e85472:doDisplay in /home/philwebd/public_html/billing/vendor/twig/twig/src/Template.php:394 #19 Twig\Template:displayWithErrorHandling in /home/philwebd/public_html/billing/vendor/twig/twig/src/Template.php:367 #18 Twig\Template:display in /home/philwebd/public_html/billing/data/cache/64/6439ab2a2bd83cff369a4f16ecb2d6e0.php:117 #17 __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8:block_content in /home/philwebd/public_html/billing/vendor/twig/twig/src/Template.php:171 #16 Twig\Template:displayBlock in /home/philwebd/public_html/billing/data/cache/d8/d830f004c1e3b0369b2a8dd53ccb3a68.php:520 #15 __TwigTemplate_1218b162b0557026e91ff8225d515b58:block_body in /home/philwebd/public_html/billing/vendor/twig/twig/src/Template.php:171 #14 Twig\Template:displayBlock in /home/philwebd/public_html/billing/data/cache/d8/d830f004c1e3b0369b2a8dd53ccb3a68.php:135 #13 __TwigTemplate_1218b162b0557026e91ff8225d515b58:doDisplay in /home/philwebd/public_html/billing/vendor/twig/twig/src/Template.php:394 #12 Twig\Template:displayWithErrorHandling in /home/philwebd/public_html/billing/vendor/twig/twig/src/Template.php:367 #11 Twig\Template:display in /home/philwebd/public_html/billing/data/cache/64/6439ab2a2bd83cff369a4f16ecb2d6e0.php:54 #10 __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8:doDisplay in /home/philwebd/public_html/billing/vendor/twig/twig/src/Template.php:394 #9 Twig\Template:displayWithErrorHandling in /home/philwebd/public_html/billing/vendor/twig/twig/src/Template.php:367 #8 Twig\Template:display in /home/philwebd/public_html/billing/vendor/twig/twig/src/Template.php:379 #7 Twig\Template:render in /home/philwebd/public_html/billing/vendor/twig/twig/src/TemplateWrapper.php:38 #6 Twig\TemplateWrapper:render in /home/philwebd/public_html/billing/library/Box/AppClient.php:96 #5 Box_AppClient:render in /home/philwebd/public_html/billing/modules/Order/Controller/Client.php:38 #4 Box\Mod\Order\Controller\Client:get_products in [internal]:0 #3 ReflectionMethod:invokeArgs in /home/philwebd/public_html/billing/library/Box/App.php:187 #2 Box_App:executeShared in /home/philwebd/public_html/billing/library/Box/App.php:318 #1 Box_App:processRequest in /home/philwebd/public_html/billing/library/Box/App.php:129 #0 Box_App:run in /home/philwebd/public_html/billing/index.php:94
Stack frames (35)
34
Twig\Error\RuntimeError
/modules/Orderbutton/html_client/mod_orderbutton_product_configuration.html.twig2
33
Box\Mod\Order\Controller\Client get_products
[internal]0
32
FOSSBilling\Exception
/modules/Product/Api/Guest.php82
31
Box\Mod\Product\Api\Guest get
/library/Api/Handler.php103
30
Api_Handler __call
/vendor/twig/twig/src/Extension/CoreExtension.php1635
29
twig_get_attribute
/data/cache/b0/b05f88d86b541772089c5144ab827716.php40
28
__TwigTemplate_1559be173faa4689f2b5d0785b8907eb doDisplay
/vendor/twig/twig/src/Template.php394
27
Twig\Template displayWithErrorHandling
/vendor/twig/twig/src/Template.php367
26
Twig\Template display
/data/cache/67/67d9fa319b2c24aa5b7e34d09cde494d.php77
25
__TwigTemplate_48f67a13f3994ad241545cc961e85472 block_body
/vendor/twig/twig/src/Template.php171
24
Twig\Template displayBlock
/data/cache/ba/ba376a34af7ceaaf6bc723540e6ac9ee.php121
23
__TwigTemplate_114d7837338fd58c992f957ebe1e034b doDisplay
/vendor/twig/twig/src/Template.php394
22
Twig\Template displayWithErrorHandling
/vendor/twig/twig/src/Template.php367
21
Twig\Template display
/data/cache/67/67d9fa319b2c24aa5b7e34d09cde494d.php49
20
__TwigTemplate_48f67a13f3994ad241545cc961e85472 doDisplay
/vendor/twig/twig/src/Template.php394
19
Twig\Template displayWithErrorHandling
/vendor/twig/twig/src/Template.php367
18
Twig\Template display
/data/cache/64/6439ab2a2bd83cff369a4f16ecb2d6e0.php117
17
__TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 block_content
/vendor/twig/twig/src/Template.php171
16
Twig\Template displayBlock
/data/cache/d8/d830f004c1e3b0369b2a8dd53ccb3a68.php520
15
__TwigTemplate_1218b162b0557026e91ff8225d515b58 block_body
/vendor/twig/twig/src/Template.php171
14
Twig\Template displayBlock
/data/cache/d8/d830f004c1e3b0369b2a8dd53ccb3a68.php135
13
__TwigTemplate_1218b162b0557026e91ff8225d515b58 doDisplay
/vendor/twig/twig/src/Template.php394
12
Twig\Template displayWithErrorHandling
/vendor/twig/twig/src/Template.php367
11
Twig\Template display
/data/cache/64/6439ab2a2bd83cff369a4f16ecb2d6e0.php54
10
__TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 doDisplay
/vendor/twig/twig/src/Template.php394
9
Twig\Template displayWithErrorHandling
/vendor/twig/twig/src/Template.php367
8
Twig\Template display
/vendor/twig/twig/src/Template.php379
7
Twig\Template render
/vendor/twig/twig/src/TemplateWrapper.php38
6
Twig\TemplateWrapper render
/library/Box/AppClient.php96
5
Box_AppClient render
/modules/Order/Controller/Client.php38
4
Box\Mod\Order\Controller\Client get_products
[internal]0
3
ReflectionMethod invokeArgs
/library/Box/App.php187
2
Box_App executeShared
/library/Box/App.php318
1
Box_App processRequest
/library/Box/App.php129
0
Box_App run
/index.php94
/home/philwebd/public_html/billing/modules/Orderbutton/html_client/mod_orderbutton_product_configuration.html.twig
{% if not product %}
    {% set product = request.product ? guest.product_get({"id":request.product}) : null %}
{% endif %}
<div class="accordion-item">
    <h2 class="accordion-header">
        <button class="accordion-button {% if not product %}collapsed{%endif%}" type="button" data-bs-toggle="collapse" data-bs-target="#order" aria-expanded="true" aria-controls="order">
            <svg class="svg-icon me-2" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24"><path d="M12,8A4,4 0 0,1 16,12A4,4 0 0,1 12,16A4,4 0 0,1 8,12A4,4 0 0,1 12,8M12,10A2,2 0 0,0 10,12A2,2 0 0,0 12,14A2,2 0 0,0 14,12A2,2 0 0,0 12,10M10,22C9.75,22 9.54,21.82 9.5,21.58L9.13,18.93C8.5,18.68 7.96,18.34 7.44,17.94L4.95,18.95C4.73,19.03 4.46,18.95 4.34,18.73L2.34,15.27C2.21,15.05 2.27,14.78 2.46,14.63L4.57,12.97L4.5,12L4.57,11L2.46,9.37C2.27,9.22 2.21,8.95 2.34,8.73L4.34,5.27C4.46,5.05 4.73,4.96 4.95,5.05L7.44,6.05C7.96,5.66 8.5,5.32 9.13,5.07L9.5,2.42C9.54,2.18 9.75,2 10,2H14C14.25,2 14.46,2.18 14.5,2.42L14.87,5.07C15.5,5.32 16.04,5.66 16.56,6.05L19.05,5.05C19.27,4.96 19.54,5.05 19.66,5.27L21.66,8.73C21.79,8.95 21.73,9.22 21.54,9.37L19.43,11L19.5,12L19.43,13L21.54,14.63C21.73,14.78 21.79,15.05 21.66,15.27L19.66,18.73C19.54,18.95 19.27,19.04 19.05,18.95L16.56,17.95C16.04,18.34 15.5,18.68 14.87,18.93L14.5,21.58C14.46,21.82 14.25,22 14,22H10M11.25,4L10.88,6.61C9.68,6.86 8.62,7.5 7.85,8.39L5.44,7.35L4.69,8.65L6.8,10.2C6.4,11.37 6.4,12.64 6.8,13.8L4.68,15.36L5.43,16.66L7.86,15.62C8.63,16.5 9.68,17.14 10.87,17.38L11.24,20H12.76L13.13,17.39C14.32,17.14 15.37,16.5 16.14,15.62L18.57,16.66L19.32,15.36L17.2,13.81C17.6,12.64 17.6,11.37 17.2,10.2L19.31,8.65L18.56,7.35L16.15,8.39C15.38,7.5 14.32,6.86 13.12,6.62L12.75,4H11.25Z" /></svg>
            {{ 'Product Configuration'|trans }}
        </button>
    </h2>
    {% if product %}
    <div id="order" class="accordion-collapse collapse {% if product %}show{%endif%}" data-bs-parent="#orderManager">
        <div class="accordion-body">
            <div class="accordion-inner">
                <form method="post" style="background:none;" class="api-form form-{{ product.form_id ? guest.formbuilder_get( {"id":product.form_id}).style.type : 0 }}"
                    action="{{ 'api/guest/cart/add_item'|link }}" data-api-msg="{{ 'Product was added to shopping cart'|trans }}"
                    data-api-redirect="{{ 'order'|link({ 'checkout' : 1 }) }}" + "{% if request.show_custom_form_values %}&show_custom_form_values=1{% endif %}">
                    <input type="hidden" name="CSRFToken" value="{{ CSRFToken }}"/>
                    {% set product_details %}
                        <div class="well">
                            <strong>{{ product.title }}</strong>
                            {{ product.description | markdown }}
 
                            {% if product.pricing.type == 'recurrent' %}
                                {% set periods = guest.system_periods %}
                                <select class="form-select" name="period" id="period-selector">
                                    {% for code,prices in product.pricing.recurrent %}
                                        {% if prices.enabled %}
                                            <option value="{{code}}" data-bb-price="{{ prices.price | money_convert }}" name="period">{{ periods[code] }} - {{ prices.price | money_convert }}</option>
                                        {% endif %}
                                    {% endfor %}
                                </select>
                            {% elseif product.pricing.type == 'free' %}
                                <span class="badge bg-success">{{ 'FREE'|trans }}</span>
                            {% else %}
                                <span class="badge bg-success">{{ product.pricing.once.price | money_convert }}</span>
                            {% endif %}
                        </div>
                    {% endset %}
 
Arguments
  1. "An exception has been thrown during the rendering of a template ("Product not found")."
    
[internal]
Arguments
  1. Box_AppClient {#144}
    
/home/philwebd/public_html/billing/modules/Product/Api/Guest.php
     * @throws \FOSSBilling\Exception
     */
    public function get($data)
    {
        if (!isset($data['id']) && !isset($data['slug'])) {
            throw new \FOSSBilling\Exception('Product ID or slug is missing');
        }
 
        $id = $data['id'] ?? null;
        $slug = $data['slug'] ?? null;
 
        $service = $this->getService();
        if ($id) {
            $model = $service->findOneActiveById($id);
        } else {
            $model = $service->findOneActiveBySlug($slug);
        }
 
        if (!$model instanceof \Model_Product) {
            throw new \FOSSBilling\Exception('Product not found');
        }
 
        return $service->toApiArray($model);
    }
 
    /**
     * Get paginated list of product categories.
     *
     * @return array
     */
    public function category_get_list($data)
    {
        $data['status'] = 'enabled';
        $service = $this->getService();
        [$sql, $params] = $service->getProductCategorySearchQuery($data);
        $per_page = $data['per_page'] ?? $this->di['pager']->getPer_page();
        $pager = $this->di['pager']->getAdvancedResultSet($sql, $params, $per_page);
        foreach ($pager['list'] as $key => $item) {
            $category = $this->di['db']->getExistingModelById('ProductCategory', $item['id'], 'Product category not found');
            $pager['list'][$key] = $this->getService()->toProductCategoryApiArray($category, true, $this->getIdentity());
Arguments
  1. "Product not found"
    
Exception message: Product not found
/home/philwebd/public_html/billing/library/Api/Handler.php
            throw new FOSSBilling\Exception('Api class must be an instance of Api_Abstract', null, 730);
        }
 
        $bb_mod = $this->di['mod']($mod);
 
        $api->setDi($this->di);
        $api->setMod($bb_mod);
        $api->setIdentity($this->identity);
        $api->setIp($this->di['request']->getClientAddress());
        if ($bb_mod->hasService()) {
            $api->setService($this->di['mod_service']($mod));
        }
 
        if (!method_exists($api, $method_name) || !is_callable([$api, $method_name])) {
            $reflector = new ReflectionClass($api);
            if (!$reflector->hasMethod('__call')) {
                throw new FOSSBilling\Exception(':type API call :method does not exist in module :module', [':type' => ucfirst($this->type), ':method' => $method_name, ':module' => $mod], 740);
            }
        }
        $res = $api->{$method_name}($arguments);
 
        return $res;
    }
}
 
Arguments
  1. array:1 [
      "id" => "7"
    ]
    
/home/philwebd/public_html/billing/vendor/twig/twig/src/Extension/CoreExtension.php
 
        if ($ignoreStrictCheck || !$env->isStrictVariables()) {
            return;
        }
 
        throw new RuntimeError(sprintf('Neither the property "%1$s" nor one of the methods "%1$s()", "get%1$s()"/"is%1$s()"/"has%1$s()" or "__call()" exist and have public access in class "%2$s".', $item, $class), $lineno, $source);
    }
 
    if ($isDefinedTest) {
        return true;
    }
 
    if ($sandboxed) {
        $env->getExtension(SandboxExtension::class)->checkMethodAllowed($object, $method, $lineno, $source);
    }
 
    // Some objects throw exceptions when they have __call, and the method we try
    // to call is not supported. If ignoreStrictCheck is true, we should return null.
    try {
        $ret = $object->$method(...$arguments);
    } catch (\BadMethodCallException $e) {
        if ($call && ($ignoreStrictCheck || !$env->isStrictVariables())) {
            return;
        }
        throw $e;
    }
 
    return $ret;
}
 
/**
 * Returns the values from a single column in the input array.
 *
 * <pre>
 *  {% set items = [{ 'fruit' : 'apple'}, {'fruit' : 'orange' }] %}
 *
 *  {% set fruits = items|column('fruit') %}
 *
 *  {# fruits now contains ['apple', 'orange'] #}
 * </pre>
Arguments
  1. "product_get"
    
  2. array:1 [
      "id" => "7"
    ]
    
/home/philwebd/public_html/billing/data/cache/b0/b05f88d86b541772089c5144ab827716.php
    public function __construct(Environment $env)
    {
        parent::__construct($env);
 
        $this->source = $this->getSourceContext();
 
        $this->parent = false;
 
        $this->blocks = [
        ];
    }
 
    protected function doDisplay(array $context, array $blocks = [])
    {
        $macros = $this->macros;
        // line 1
        if ( !($context["product"] ?? null)) {
            // line 2
            echo "    ";
            $context["product"] = ((twig_get_attribute($this->env, $this->source, ($context["request"] ?? null), "product", [], "any", false, false, false, 2)) ? (twig_get_attribute($this->env, $this->source, ($context["guest"] ?? null), "product_get", [["id" => twig_get_attribute($this->env, $this->source, ($context["request"] ?? null), "product", [], "any", false, false, false, 2)]], "method", false, false, false, 2)) : (null));
        }
        // line 4
        echo "<div class=\"accordion-item\">
    <h2 class=\"accordion-header\">
        <button class=\"accordion-button ";
        // line 6
        if ( !($context["product"] ?? null)) {
            echo "collapsed";
        }
        echo "\" type=\"button\" data-bs-toggle=\"collapse\" data-bs-target=\"#order\" aria-expanded=\"true\" aria-controls=\"order\">
            <svg class=\"svg-icon me-2\" xmlns=\"http://www.w3.org/2000/svg\" viewBox=\"0 0 24 24\"><path d=\"M12,8A4,4 0 0,1 16,12A4,4 0 0,1 12,16A4,4 0 0,1 8,12A4,4 0 0,1 12,8M12,10A2,2 0 0,0 10,12A2,2 0 0,0 12,14A2,2 0 0,0 14,12A2,2 0 0,0 12,10M10,22C9.75,22 9.54,21.82 9.5,21.58L9.13,18.93C8.5,18.68 7.96,18.34 7.44,17.94L4.95,18.95C4.73,19.03 4.46,18.95 4.34,18.73L2.34,15.27C2.21,15.05 2.27,14.78 2.46,14.63L4.57,12.97L4.5,12L4.57,11L2.46,9.37C2.27,9.22 2.21,8.95 2.34,8.73L4.34,5.27C4.46,5.05 4.73,4.96 4.95,5.05L7.44,6.05C7.96,5.66 8.5,5.32 9.13,5.07L9.5,2.42C9.54,2.18 9.75,2 10,2H14C14.25,2 14.46,2.18 14.5,2.42L14.87,5.07C15.5,5.32 16.04,5.66 16.56,6.05L19.05,5.05C19.27,4.96 19.54,5.05 19.66,5.27L21.66,8.73C21.79,8.95 21.73,9.22 21.54,9.37L19.43,11L19.5,12L19.43,13L21.54,14.63C21.73,14.78 21.79,15.05 21.66,15.27L19.66,18.73C19.54,18.95 19.27,19.04 19.05,18.95L16.56,17.95C16.04,18.34 15.5,18.68 14.87,18.93L14.5,21.58C14.46,21.82 14.25,22 14,22H10M11.25,4L10.88,6.61C9.68,6.86 8.62,7.5 7.85,8.39L5.44,7.35L4.69,8.65L6.8,10.2C6.4,11.37 6.4,12.64 6.8,13.8L4.68,15.36L5.43,16.66L7.86,15.62C8.63,16.5 9.68,17.14 10.87,17.38L11.24,20H12.76L13.13,17.39C14.32,17.14 15.37,16.5 16.14,15.62L18.57,16.66L19.32,15.36L17.2,13.81C17.6,12.64 17.6,11.37 17.2,10.2L19.31,8.65L18.56,7.35L16.15,8.39C15.38,7.5 14.32,6.86 13.12,6.62L12.75,4H11.25Z\" /></svg>
            ";
        // line 8
        echo twig_escape_filter($this->env, __trans("Product Configuration"), "html", null, true);
        echo "
        </button>
    </h2>
    ";
        // line 11
        if (($context["product"] ?? null)) {
Arguments
  1. Twig\Environment {#156}
    
  2. Twig\Source {#1098}
    
  3. Api_Handler {#175}
    
  4. "product_get"
    
  5. array:1 [
      0 => array:1 [
        "id" => "7"
      ]
    ]
    
  6. "method"
    
  7. false
    
  8. false
    
  9. false
    
  10. 2
    
/home/philwebd/public_html/billing/vendor/twig/twig/src/Template.php
        } else {
            ob_start(function () { return ''; });
        }
        try {
            $this->display($context);
        } catch (\Throwable $e) {
            while (ob_get_level() > $level) {
                ob_end_clean();
            }
 
            throw $e;
        }
 
        return ob_get_clean();
    }
 
    protected function displayWithErrorHandling(array $context, array $blocks = [])
    {
        try {
            $this->doDisplay($context, $blocks);
        } catch (Error $e) {
            if (!$e->getSourceContext()) {
                $e->setSourceContext($this->getSourceContext());
            }
 
            // this is mostly useful for \Twig\Error\LoaderError exceptions
            // see \Twig\Error\LoaderError
            if (-1 === $e->getTemplateLine()) {
                $e->guess();
            }
 
            throw $e;
        } catch (\Throwable $e) {
            $e = new RuntimeError(sprintf('An exception has been thrown during the rendering of a template ("%s").', $e->getMessage()), -1, $this->getSourceContext(), $e);
            $e->guess();
 
            throw $e;
        }
    }
 
Arguments
  1. array:11 [
      "CSRFToken" => "6921348dc90961df5535dfa8a24e50f2"
      "request" => array:2 [
        "_url" => "/order"
        "product" => "7"
      ]
      "guest" => Api_Handler {#175}
      "FOSSBillingVersion" => "0.6.20"
      "current_theme" => "huraga"
      "settings" => array:57 [
        "CSRFToken" => "3f10ff5d59184687b9efad79ebd8597e"
        "color_scheme" => "green"
        "show_page_header" => "1"
        "show_company_logo" => "1"
        "show_company_name" => "0"
        "show_client_details" => "1"
        "sidebar_balance_enabled" => "1"
        "top_menu_dashboard" => "1"
        "top_menu_profile" => "1"
        "top_menu_signout" => "1"
        "login_page_show_logo" => "1"
        "login_page_logo_url" => "/"
        "show_password_reset_link" => "1"
        "show_signup_link" => "0"
        "login_page_show_remember_me" => "1"
        "show_breadcrumb" => "1"
        "hide_dashboard_breadcrumb" => "1"
        "require_login" => "1"
        "showcase_enabled" => "0"
        "showcase_size" => "3"
        "showcase_text" => "Showcase text"
        "showcase_button_title" => "Showcase button title"
        "showcase_button_url" => "Showcase link URL"
        "side_menu_dashboard" => "1"
        "side_menu_order" => "1"
        "side_menu_support" => "1"
        "side_menu_services" => "1"
        "side_menu_invoices" => "1"
        "side_menu_emails" => "1"
        "side_menu_payments" => "1"
        "side_menu_news" => "1"
        "side_menu_kb" => "1"
        "sidebar_note_enabled" => "0"
        "sidebar_note_title" => "Note title"
        "sidebar_note_content" => "Note content"
        "meta_title" => ""
        "meta_description" => "Members area"
        "meta_keywords" => "members area"
        "meta_robots" => "noindex, nofollow"
        "meta_author" => "PhilWebDev"
        "footer_enabled" => "1"
        "footer_to_top_enabled" => "1"
        "footer_signature" => ""
        "footer_link_1_enabled" => "on"
        "footer_link_1_title" => "About us"
        "footer_link_1_page" => "about-us"
        "footer_link_2_enabled" => "on"
        "footer_link_2_title" => "Terms and conditions"
        "footer_link_2_page" => "tos"
        "footer_link_3_enabled" => "on"
        "footer_link_3_title" => "Privacy policy"
        "footer_link_3_page" => "privacy-policy"
        "footer_link_4_title" => ""
        "footer_link_4_page" => ""
        "footer_link_5_title" => ""
        "footer_link_5_page" => ""
        "inject_javascript" => ""
      ]
      "loader_nr" => "8"
      "loader_url" => "img/assets/loaders/loader8.gif"
      "company" => array:11 [
        "www" => "https://billing.philwebdev.com/"
        "name" => "XWDV Information Technology Solutions"
        "signature" => """
          Regards,\n
          \n
          XWDV Information Technology Solutions\n
          https://www.philwebdev.com\n
          \n
          \n
          """
        "logo_url" => "https://www.philwebdev.com/billing/logod.svg"
        "logo_url_dark" => "https://www.philwebdev.com/billing/logow.svg"
        "favicon_url" => "https://www.philwebdev.com/billing/themes/huraga/assets/favicon.ico"
        "display_bank_info" => "0"
        "bank_info_pagebottom" => null
        "note" => ""
        "privacy_policy" => """
          This Privacy Policy describes the policies and procedures of PhilWebDev Domain and Business Hosting Solution, in association with - LiquidNet US LLC, a US company headquartered in Fort Lauderdale, Florida, and LiquidNet Ltd., a UK company headquartered in London, UK, on the collection, use and disclosure of your information. Legal details about the two companies can be found in the 'Contact Us' section of this document.\n
          \n
          For the sake of brevity, PhilWebDev Domain and Business Hosting Solution, LiquidNet US LLC and LiquidNet Ltd. will be referred to as 'We', 'Us', 'Our' and 'Service Provider' in this document.\n
          \n
          This Privacy Policy does not apply to information our customers may process when using our services.\n
          \n
          \---\n
          \n
          Privacy and security are of utmost importance to the Service Provider and we strive to ensure that our technical and organizational measures in place respect your data protection rights.\n
          \n
          **COLLECTION OF PERSONAL DATA**  \n
          "Personal data" refers to any information relating to an identifiable individual or his or her personal identity.\n
          \n
          Personal data is collected on our website by LiquidNet US LLC., a US company headquartered in Fort Lauderdale, Florida.\n
          \n
          The personally identifiable information that LiquidNet US LLC may collect from you when registering for an account includes: first and last name, postal address, phone number, email and IP address.\n
          \n
          If you want to use your Social Media account as a means to log in to your hosting account, you will also have to provide your Social Media ID.\n
          \n
          Your information will be needed for the following purposes:\n
          \n
          *   provision of our services to you;\n
          *   prevention of fraudulent transactions;\n
          *   billing/invoicing operations;\n
          *   provision of a sales/technical support service;\n
          *   maintenance of your account with us;\n
          *   dispute resolution cases;\n
          *   enforcement of our Terms of Service, or other legal rights, or as may be required by applicable laws and regulations or requested by any judicial process or governmental agency;\n
          *   collection of aggregate statistics about use of our services;\n
          \n
          Much of the data collected is aggregated or statistical data about how individuals use our Services, and is not linked to any personal data, but to the extent it is itself personal data, or is linked or linkable to personal data, we treat it accordingly.\n
          \n
          The Service Provider will NOT send you any unsolicited information, including emails, except as mentioned hereby.\n
          \n
          New customers will receive a welcome email containing information about the features provided by the Service, as well as WHCP (Web Hosting Control Panel) and FTP login details.\n
          \n
          The Service Provider may also send system notifications upon need, related to any upgrade, maintenance or other service issues concerning your hosting account.\n
          \n
          If you contact us directly, we may receive additional information about you such as your name, email address, phone number, the contents of the message and/or attachments you may send us, and any other information you may choose to provide. We may also receive a confirmation when you open an email from us.\n
          \n
          The Service Provider will keep your personally identifiable information private and will NOT share it with any unauthorized third parties.\n
          \n
          When you use our services, we may collect information about your engagement with and utilization of our services, such as processor and memory usage, storage capacity, navigation of our services, and system-level metrics. We use this data to operate the services, maintain and improve the performance and utilization of the services, develop new features, protect the security and safety of our services and our customers, and provide customer support. We also use this data to develop aggregate analysis and business intelligence that enable us to operate, protect, make informed decisions, and report on the performance of our business.\n
          \n
          **LEGAL BASIS FOR PROCESSING OF PERSONAL DATA**  \n
          We collect personal information from you only when:\n
          \n
          you give your consent for us to so,\n
          \n
          we need your personal information to perform a contract with you (e.g. to deliver the services you have requested), or,\n
          \n
          the processing is in our legitimate interests and not overridden by your rights;\n
          \n
          We have a legitimate interest in operating our services and communicating with you as necessary to provide these services, for example when responding to your queries, improving our platform, undertaking marketing, or for the purposes of detecting or preventing illegal activities.\n
          \n
          Please note that in most cases, if you do not submit the requested information, the Service Provider will not be able to provide the requested service to you.\n
          \n
          In some cases, we may also have a legal obligation to collect personal information from you, or may otherwise need that information to protect your vital interests or those of some other person's.\n
          \n
          If we ask you to provide personal information to comply with a legal requirement or to perform a contract with you, we will make this clear at the relevant time and advise you whether the provision of your personal information is mandatory or not (as well as of the possible consequences if you do not provide your personal information).\n
          \n
          **ACCESS TO YOUR PERSONAL DATA**  \n
          You may access and update your personal Information at any time from your Web Hosting Control Panel - > My Account - > Change Contact Details section.\n
          \n
          **SECURITY OF YOUR PERSONAL DATA**  \n
          The Service Provider is committed to protecting the security of customer collected personal information. To do so, we use technical security measures to prevent the loss, misuse, alternation or unauthorized disclosure of information under our control. We use security measures including and not limited to: physical, electronic and managerial procedures to safeguard and secure the information we collect online. However, please keep in mind that the Internet cannot be guaranteed to be 100% secure.\n
          \n
          If the Service Provider learns of a security system breach, we may attempt to notify you and send you any available protective information to the email address that you have provided to us or by posting a notice in your WHCP.\n
          \n
          **SHARING YOUR PERSONAL DATA WITH THIRD PARTIES**  \n
          We may share the information we collect in various ways, including the following:\n
          \n
          _Service Providers_  \n
          We may share information with third-party service providers that provide services on our behalf, such as helping to provide our services and to provide you with information relevant to you such as product announcements, service upgrades, special offers, or other information.\n
          \n
          _As Required By Law and Similar Disclosures_  \n
          We may also share information to (i) satisfy any applicable law, regulation, legal process, or governmental request; (ii) enforce this Privacy Policy and our Terms of Service, including investigation of potential violations hereof; (iii) detect, prevent, or otherwise address fraud, security, or technical issues; (iv) respond to your requests; or (v) protect our rights, property or safety, our users and the public. This includes exchanging information with other companies and organizations for fraud protection and spam/malware prevention.\n
          \n
          **THIRD-PARTY SERVICES**  \n
          You may access other third-party services through our services, for example by clicking on links to those third-party services from within our services. We are not responsible for the privacy policies and/or practices of these third-party services, and we encourage you to carefully review their privacy policies.\n
          \n
          **PRIVACY OF YOUR PAYMENT DETAILS**  \n
          We use third-party payment processing companies who collect and store financial information, such as your payment method (valid credit card number, type, expiration date or other financial information), and their use and storage of that information is governed by the payment processors' applicable terms of service and privacy policy. Collected billing information is used for the purposes of processing payments and fraud detection.\n
          \n
          We do not store your financial account information on our systems; however, we have access to, and may retain, subscriber information through our third-party payment processor.\n
          \n
          All PayPal transactions are subject to the [PayPal Privacy Policy](https://www.paypal.com/en/webapps/mpp/ua/privacy-full).\n
          \n
          **PRIVACY OF YOUR ACCOUNT**  \n
          We consider your registration data and the content of all your messages private and confidential. The header of the messages that you send will contain your name (e-mail address) and Internet Protocol (IP) address. We will not intentionally monitor or disclose any of your e-mail content or registration data unless we are required to do so:\n
          \n
          to enforce these Terms and Conditions,\n
          \n
          by law,\n
          \n
          to defend ourselves in any legal action,\n
          \n
          to protect our property.\n
          \n
          Since your password is essential for protecting your privacy, we encourage you to NOT share it with anyone and change it frequently. Additionally, you agree to respect the privacy and confidentiality of others.\n
          \n
          **AGE RESTRICTIONS**  \n
          We offer services only to people who are 18+. Our services are not targeted to, intended to be consumed by or designed to entice individuals under the age of 18. If we learn that we have collected the personal information of a child under the age of 18, we will take steps to delete that information as soon as possible.\n
          \n
          If you know of or have reason to believe that anyone under the age of 18 has provided us with any personal data, please contact us.\n
          \n
          **LOG FILES**  \n
          We use IP addresses to analyze trends, administer our site and servers, track access, and gather broad demographic information for aggregate use. IP addresses are not linked to personally identifiable information. It is possible that personal information about a customer may be included in the log files due to the normal functions of IP addresses and Web browsing.\n
          \n
          **COOKIES**  \n
          We use different cookies on our website to make it as useful to you as possible. Cookies are small text files that we put on your computer or mobile device to tell us what you want to use on our site but they do not tell us who you are.\n
          \n
          [Here](http://www.aboutcookies.org/) you can learn more about cookies and how to [control](http://www.aboutcookies.org/how-to-control-cookies/) or [delete](http://www.aboutcookies.org/how-to-delete-cookies/) them.\n
          \n
          Here are the cookies that we use on our site:\n
          \n
          _Essential cookies_  \n
          We use a cookie to remember your login for you and what you’ve put in the shop cart. Also, we set a cookie to help you choose a preferred font size for using the site. These cookies we consider essential for the operation of our website.\n
          \n
          _External web services_  \n
          We use an external live chat service (using cookies to remember your session name) to deliver real-time support to you should you want to.\n
          \n
          _Analytics_  \n
          We use Google Analytics and Facebook cookies to monitor visitor activity on our website. No personally identifying data is included in this type of reporting. We do not share information about this analysis with any third parties.\n
          \n
          Visitors can [opt out of Google's advertising tracking cookie](https://policies.google.com/technologies/ads) or [install a browser plugin](https://tools.google.com/dlpage/gaoptout?hl=en) to opt out of all Google Analytics tracking software. More information about Facebook's analytics cookie is available [here](https://www.facebook.com/policies/cookies/?utm_referrer=https://www.cloudflare.com/privacypolicy/).\n
          \n
          We assume you are happy with this usage of cookies on this website. If you are not happy, then you should either not use this site, or delete the cookies (you can check out how to do that according to your browser [here](http://www.aboutcookies.org/how-to-delete-cookies/)), or browse the site using your browser’s anonymous usage setting (named “Incognito” in Chrome, “InPrivate” for Internet Explorer, "Private Browsing" in Firefox and Safari etc.).\n
          \n
          We currently do not alter our practices when we receive a "Do Not Track" signal from a visitor's browser.\n
          \n
          Please remember that if you choose to delete the cookies or use the browser anonymously, you may find that certain sections of this website do not work properly.\n
          \n
          **YOUR RIGHTS UNDER THE GENERAL DATA PROTECTION REGULATION (GDPR)**\n
          \n
          If you are a resident of the European Economic Area (EEA), you have the following data protection rights:\n
          \n
          _Managing Your Information_  \n
          You may access and update some of your information through the "Change Contact Details" section in the WHCP. If you have chosen to connect your account to a third-party application like Facebook, Google or Twitter, you can change your settings and remove permission for the app from the "Linked Social Accounts" section in the WHCP. You are responsible for keeping your personal information up to date.\n
          \n
          _Rectification of Inaccurate or Incomplete Information_  \n
          You have the right to ask us to correct any inaccurate or incomplete personal information concerning you if you cannot update it yourself from within your account.\n
          \n
          _Data Access and Portability_  \n
          In some jurisdictions, the applicable law may entitle you to request copies of your personal information held by us. You may also be entitled to request copies of personal information that you have provided to us in a structured, commonly used, and machine-readable format and/or request us to transmit this information to another service provider (where technically feasible).\n
          \n
          _Opt-out of marketing communications_  \n
          You have the right to opt-out of marketing communications we send you at any time. You can exercise this right by clicking on the "unsubscribe" or "opt-out" link in the marketing emails we send you.\n
          \n
          _Data Retention and Erasure_  \n
          We generally retain your personal information for as long as is necessary for the performance of the contract between you and us and to comply with our legal obligations. If you no longer want us to use your information to provide the contracted services to you, you can request that we erase your personal information and close your account. Please note that if you request the erasure of your personal information:\n
          \n
          We may retain some of your personal information so as to detect and prevent fraud and enhance safety. For example, if we suspend an account for security reasons, we may retain certain information from that account to prevent that customer from opening a new account in the future.\n
          \n
          We may retain and use your personal information to the extent necessary to comply with our legal obligations. For example, we may keep some of your information for tax, legal reporting and auditing purposes.\n
          \n
          Because we maintain our platform to protect it from accidental or malicious loss and destruction, residual copies of your personal information may not be removed from our backup systems for a limited period of time.\n
          \n
          In cases where fraudulent or otherwise illegal activity has been deemed to have occurred as determined by law enforcement or management, the information may remain in our database indefinitely in order to help facilitate the prevention of repeated abuse in the future from the offending party.\n
          \n
          _Withdrawing Consent and Restriction of Processing_  \n
          If you have provided your consent to the processing of your personal information, you may withdraw it at any time by sending us a communication specifying which consent you are withdrawing. Please note that the withdrawal of your consent does not affect the lawfulness of any processing activities based on such consent before its withdrawal. Additionally, in some jurisdictions, applicable law may give you the right to limit the ways in which we use your personal information, in particular where (i) you contest the accuracy of your personal information; (ii) the processing is unlawful and you oppose the erasure of your personal information; (iii) we no longer need your personal information for the purposes of the processing, but you require the information for the establishment, exercise or defence of legal claims; or (iv) you have objected to the processing and pending the verification whether the Service Provider's legitimate grounds override your own.\n
          \n
          _Objection to Processing_  \n
          In some jurisdictions, applicable law may entitle you to require us not to process your personal information for certain specific purposes (including profiling) where such processing is based on legitimate interest. If you object to such processing, we will no longer process your personal information for these purposes unless we can demonstrate compelling legitimate grounds for such processing or such processing is required for the establishment, exercise or defence of legal claims.\n
          \n
          By default, customers do receive any system updates, such as the newsletters, invoices and service email notifications. Customers cannot opt out of possibly receiving important system notifications, since the latter are deemed necessary for the performance of our contractual obligations to you.\n
          \n
          _Lodging Complaints_  \n
          If you want to make a complaint about the way we are processing your data, you can contact us using the contact details below.\n
          \n
          You have the right to complain to a data protection authority about our collection and use of your personal information. For more information, please contact your local data protection authority.\n
          \n
          \---\n
          \n
          We respond to all requests we receive from individuals wishing to exercise their data protection rights in accordance with applicable data protection laws.\n
          \n
          **INTERNATIONAL TRANSFERS OF INFORMATION WE COLLECT**  \n
          We collect information globally and primarily store that information in the United States. We transfer, process and store your information outside of your country of residence. Whenever we transfer your information, we take steps to protect it.\n
          \n
          To facilitate our global operations, we transfer information to the United States and allow access to that information from countries in which we and associated companies have operations for the purposes described in this policy. These countries may not have equivalent privacy and data protection laws, certainly not equivalent to the laws of many of the countries where our customers and users are based. When we share information about you, we make use of Standard Contractual Clauses (SCCs) for data transfers between EU and non-EU countries, which have been approved by the European Commission.\n
          \n
          A copy of your personal data will also be stored in the data center you have selected when signing up for our services. This is done so that the Service Provider can deliver the contracted service in the location specified by the customer.\n
          \n
          **COMPLIANCE WITH LAWS AND LAW ENFORCEMENT**  \n
          The Service Provider cooperates with government and law enforcement officials to enforce and comply with the law. We will disclose any information about Users upon valid request by government or law officials as we, in our sole discretion, believe necessary or appropriate to respond to claims and legal process (including without limitation subpoenas), to protect your property and rights, or the property and rights of a third party, to protect the safety of the public or any person, or stop activity we consider illegal or unethical.\n
          \n
          **CHANGES TO PRIVACY POLICY**  \n
          Any changes to our Privacy Policy will be placed here and will supersede this version of our Policy. We will take reasonable steps to draw your attention to any changes in our Policy. However, to be on the safe side, we suggest that you read this document each time you use the website to ensure that it still meets with your approval.\n
          \n
          **CONTACT US**  \n
          If you have any questions about our Privacy Policy, or if you want to know what information we have collected about you, please use our Contact Us form.\n
          \n
          Postal Address:\n
          \n
          LiquidNet US LLC  \n
          6750 North Andrews Ave  \n
          Suite 200  \n
          Fort Lauderdale, FL 33309  \n
          United States of America\n
          \n
          LiquidNet Ltd.  \n
          13 Craigleith  \n
          7 Kersfield Road  \n
          Putney, London SW15 3HN  \n
          United Kingdom
          """
        "tos" => """
          An Acceptable Use Policy (AUP) is a set of rules and conditions compiled by a network, system, or a website owner. These rules explicitly define and restrict the ways in which the respective network, system or website may be used.\n
          \n
          The **AUP of the Service Provider** aims to clearly outline the purposes for which our customers CANNOT utilize our hosting services and position data on our network servers.\n
          \n
          This Acceptable Use Policy (AUP) is an integral part of the [Web Hosting Terms of Service](https://www.philwebdev.com/terms-and-conditions-2/web-hosting-terms-of-service-3/) which each customer agrees to abide by when signing up for an account with our web hosting company. Any violation of this AUP will be deemed a violation of our Web Hosting Terms of Service.\n
          \n
          We, at our own discretion, shall determine whether an act constitutes a breach of this AUP terms and misuse of our services. We reserve our right to be the sole arbiter in determining the sufficiency of the presented evidences. We will respond accordingly, and/or immediately terminate the provision of the services, shall we receive the report, and/or have sufficient proof, of any prohibited conduct outlined in this AUP, or any other activity threatening the security of our hosting environment and/or our network of hosting servers.\n
          \n
          In order to protect our company’s reputation and responsibilities, and guarantee state-of-the-art and reliable hosting services to all our customers, as well as privacy and security for all users, we – the Service Provider - hereby outline the following AUP rules and conditions to come into force for each customer signing up for a web hosting account with our company:\n
          \n
          1\. [System Abuse](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#SYSTEM_ABUSE)\n
          \n
          2\. [Spam and Spamvertizing](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#SPAM_AND_SPAMVERTIZING)\n
          \n
          3\. [Inappropriate or Unlawful Content](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#INAPPROPRIATE_OR_UNLAWFUL_CONTENT_)\n
          \n
          4\. [Copyrights](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#COPYRIGHTS)\n
          \n
          5\. [Corrective Actions](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#CORRECTIVE_ACTIONS)\n
          \n
          6\. [Reporting Violtaions](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#REPORTING_VIOLATIONS)\n
          \n
          7\. [Revisions](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#REVISIONS)\n
          \n
          **1\. SYSTEM ABUSE**\n
          \n
          Any customer in violation of our system or network security is subject to criminal and civil liability, as well as immediate account termination. Examples include, but are not limited to the following:\n
          \n
          Unauthorized access, use, probe, or scan of our system’s security, authentication measures, data, or traffic. Interference with the service to any user, host or network including, but not limited to: e-mail bombing, flooding, deliberate attempts to overload the system and broadcast attacks, forging of any TCP/IP packet header or any part of the header information in an e-mail or newsgroup posting.\n
          \n
          Any attempt at doing harm to a server or a customer of our web hosting services:\n
          \n
          the Service Provider will immediately and resolutely react to any attempt at misuse of an Internet account or computer, or any attempt to gain access to an Internet account or computer by a Service Provider's customer unauthorized by the account/computer owner. Such attempts include, but are not limited to the following: 'Internet scamming' (tricking other people into releasing their passwords, etc.), password robbery, security hole scanning, running proxy - proxy lists and any kind of proxy scripts (including, but not limited to PHP proxy and mph proxy), introducing of any computer programs (viruses, Trojan horses, trap doors, back doors, worms, time bombs, packet bombs, cancelbots, etc.) that are intended to negatively interfere with, intercept, irreversibly damage or take hold of any system, data or personal information. It WILL NOT matter whether the attacked account or computer belongs or not to the Service Provider's services. The fraud will be subject to actions based on the very nature of the attack and those may represent a warning, an account suspension or cancellation, and/or civil or criminal legal actions.\n
          \n
          Background operations/programs on servers:\n
          \n
          ‘Background process’ is a program that runs in the background of the operating system. What is specific for a background process is that, once started, it runs simultaneously with other foreground processes. This means that, the shell executing the background operation does not wait for it to finish or terminate, as it does with foreground processes, but is free to start executing more operations along with the background one. Typical background processes are ircd, irc bot, bnc, and many others.\n
          \n
          Background processes are not permitted on any of our shared hosting servers, as they usually lead to CPU overload and can be used for malicious and/or illegal actions. As our primary task is to provide highest quality web hosting service to all our customers, we cannot permit any background processes to be executed and threaten the performance of our server network. Our shared hosting system does not allow a big multitude of users to simultaneously use the system memory and processing time of our servers.\n
          \n
          Excessive use of system resources:\n
          \n
          In order to ensure higher server performance and quality of hosting service all shared hosting plans are subject to certain resource limitations concerning, but not limited to, server CPU usage, Memory usage, disk-space and traffic. If a hosting account exceeds the allowed amount of system resources the account owner will be immediately notified to take actions in order to reduce the usage. If such action is not instantly taken by the owner the account will be suspended. If an excessive CPU usage is detected the account owner will be suggested to place an order for a CPU usage upgrade or upgrade to a plan which allows higher CPU usage.\n
          \n
          If any hosting account is found to be causing degradation of the server and/or our hosting network’s performance, regardless of the reason, the account will be subject to suspension or immediate removal, depending on the situation. The Service Provider will be the sole arbiter in determining whether a given account is excessively using the server resources and/or causing a server degradation.\n
          \n
          **2\. SPAM AND SPAMVERTIZING**\n
          \n
          SPAMMING IS PROHIBITED. Users MAY NOT utilize our web hosting services to transmit, distribute or deliver any unsolicited bulk or commercial messages over the Internet (an action known as "spam" or "spamming").\n
          \n
          Spamming is a violation of ethic norms and will be interpreted as an infringement. the Service Provider will not tolerate the sending of unsolicited bulk or commercial messages through our services, as well as through another service that is mentioning, in some way, our customer’s domain name or implies the utilization of our network or our e-mail services for sending the unsolicited bulk or messages.\n
          \n
          SPAMVERTISING IS PROHIBITED. 'Spamvertizing’ refers to the practice of sending unsolicited spam messages for the purpose of advertising a particular website.\n
          \n
          If such e-mails are relayed through 3rd party (e-mail spoofing) and/or are promoting a domain hosted on our servers, this will lead to immediate account suspension unless an evidence of legitimacy for non-involvement of the domain owner in the particular illegal action is provided.\n
          \n
          ’E-mail spoofing’ is a fraudulent e-mail activity in which the sender’s (3td party) e-mail address and other parts of the e-mail header are changed so as to appear that the e-mail has been sent from a different source (e-mail address owner/server).\n
          \n
          'Unsolicited message’ is a message that is sent against the privacy policy of a newsgroup, or is sent to a recipient without their explicit permission. We, at our sole discretion, shall determine whether any of the messages you are sending is spam or spamvertizing. For your information, spamming generally includes, but is not limited to the following\n
          \n
          Sending of unsolicited messages in bulk, or sending of unsolicited e-mails, which provoke complaints from recipients;\n
          \n
          Sending of junk mail;\n
          \n
          Use of distribution lists that include people who have not given prior explicit permission to be involved in such a distribution process;\n
          \n
          Posting commercial ads to USENET newsgroups that do not permit it;\n
          \n
          Posting articles containing binary encoded data to non-binary newsgroups;\n
          \n
          Excessive and repeated posting of off-topic messages to newsgroups;\n
          \n
          Excessive and repeated cross-posting;\n
          \n
          E-mail harassment of another Internet Customer or Customers, including but not limited to, transmitting of any threatening, libellous or obscene material, or material of any nature that may be deemed offensive;\n
          \n
          E-mailing of age-inappropriate communications or content to anyone under the age of 18.\n
          \n
          **3\. INAPPROPRIATE OR UNLAWFUL CONTENT**\n
          \n
          CONTENT published or transmitted via the Service Provider’s hosting services includes website content, email content, forum/blog postings, chat content, and/or any other type of content hosted on our servers, published online or transmitted through our network’s services.\n
          \n
          The user of our services is NOT permitted to post online content or have links to content that:\n
          \n
          is defamatory, abusive or obscene, violates a person’s reputation/privacy, is reasonably deemed offensive by the web community, is anti-religious or anti-human rights, or contains any type of threatening or hate speech, encourages harassment or physical harm to any group or individual, or is otherwise malicious/fraudulent and may result in complaints/liabilities/or retaliation against the Service Provider by offended viewers;\n
          \n
          promotes or encourages illegal activities (e.g. illegal drugs, illegal gambling, arms trafficking, etc.) or violates any applicable law, statute, ordinance or regulation, including but not limited to the laws and regulations governing export control, unfair competition, false advertising, consumer protection, etc.\n
          \n
          represents pornography – any type of pornographic/adult material, including child pornography, or advertisements of pornographic websites;\n
          \n
          represents infringement on copyright, patents, trademarks, trade secrets, or third party's intellectual property or proprietary rights, including pirated computer programs, hacking/phreaking software, warez or any type of software/content (including also ROMs, ROM Emulators, media files – MP3, AVI, .RM, etc., torrent files, and others) that is copyrighted, is NOT uploaded in compliance with its license agreement or is NOT freely available for distribution.\n
          \n
          **4\. COPYRIGHTS**\n
          \n
          Copyrighted material must not be placed on customers' accounts without the explicit permission of the copyright owner or a person explicitly authorized to give such permission by the copyright owner. Upon receipt of a claim for copyright infringement, or a notice of such violation, we will immediately run full investigation and, upon confirmation, will promptly remove the infringing material from the Services. Further procedures (in accordance with our stated below corrective measures) will be carried out if necessary. We will assume no liability to any Customer of the Services for the removal of any such material.\n
          \n
          **5\. CORRECTIVE ACTIONS**\n
          \n
          We reserve our right to be the sole arbiter in determining the seriousness of each infringement and to immediately take corrective actions.\n
          \n
          We will disable the customer's account if we deem necessary, at our sole discretion. Upon closing of the customer’s account we will send an e-mail notification to the customer, stating the reason for the termination and quoting our terms’ chapter that has been violated. The customer will be given an opportunity to respond and take measures to remedy the situation should he/she consider him/herself abused by a third party. Upon fulfilling of this obligation, we may re-activate the customer’s account, if we find, at our own discretion, sufficient evidence pro customer’s side.\n
          \n
          Closed accounts due to repeated violations will not be re-activated. A backup may be requested, however it will be subject to certain penalty fees imposed according to the breach of this AUP terms. The final penalty fee will be determined by the type and frequency of the violations.\n
          \n
          **6\. REPORTING VIOLATIONS**\n
          \n
          If you need to report a violation of this AUP agreement or believe that you or your system has been subject to attack originating from our web hosting system, please contact us immediately. Our professional team will investigate the situation and provide you with full assistance.\n
          \n
          **7\. REVISIONS**\n
          \n
          We reserve our right to change this AUP at any time, without prior notice. We encourage our users to periodically review this Acceptable Use Policy and our Web Hosting Terms of Service.
          """
      ]
      "logo_url" => "https://www.philwebdev.com/billing/logod.svg"
      "languages" => array:2 [
        0 => array:3 [
          "locale" => "en_US"
          "title" => "English(en_US)"
          "name" => "English"
        ]
        1 => array:3 [
          "locale" => "hr_HR"
          "title" => "hr_HR(hr_HR)"
          "name" => "hr_HR"
        ]
      ]
    ]
    
  2. []
    
/home/philwebd/public_html/billing/vendor/twig/twig/src/Template.php
    {
        return $this;
    }
 
    /**
     * Returns all blocks.
     *
     * This method is for internal use only and should never be called
     * directly.
     *
     * @return array An array of blocks
     */
    public function getBlocks()
    {
        return $this->blocks;
    }
 
    public function display(array $context, array $blocks = [])
    {
        $this->displayWithErrorHandling($this->env->mergeGlobals($context), array_merge($this->blocks, $blocks));
    }
 
    public function render(array $context)
    {
        $level = ob_get_level();
        if ($this->env->isDebug()) {
            ob_start();
        } else {
            ob_start(function () { return ''; });
        }
        try {
            $this->display($context);
        } catch (\Throwable $e) {
            while (ob_get_level() > $level) {
                ob_end_clean();
            }
 
            throw $e;
        }
 
Arguments
  1. array:11 [
      "CSRFToken" => "6921348dc90961df5535dfa8a24e50f2"
      "request" => array:2 [
        "_url" => "/order"
        "product" => "7"
      ]
      "guest" => Api_Handler {#175}
      "FOSSBillingVersion" => "0.6.20"
      "current_theme" => "huraga"
      "settings" => array:57 [
        "CSRFToken" => "3f10ff5d59184687b9efad79ebd8597e"
        "color_scheme" => "green"
        "show_page_header" => "1"
        "show_company_logo" => "1"
        "show_company_name" => "0"
        "show_client_details" => "1"
        "sidebar_balance_enabled" => "1"
        "top_menu_dashboard" => "1"
        "top_menu_profile" => "1"
        "top_menu_signout" => "1"
        "login_page_show_logo" => "1"
        "login_page_logo_url" => "/"
        "show_password_reset_link" => "1"
        "show_signup_link" => "0"
        "login_page_show_remember_me" => "1"
        "show_breadcrumb" => "1"
        "hide_dashboard_breadcrumb" => "1"
        "require_login" => "1"
        "showcase_enabled" => "0"
        "showcase_size" => "3"
        "showcase_text" => "Showcase text"
        "showcase_button_title" => "Showcase button title"
        "showcase_button_url" => "Showcase link URL"
        "side_menu_dashboard" => "1"
        "side_menu_order" => "1"
        "side_menu_support" => "1"
        "side_menu_services" => "1"
        "side_menu_invoices" => "1"
        "side_menu_emails" => "1"
        "side_menu_payments" => "1"
        "side_menu_news" => "1"
        "side_menu_kb" => "1"
        "sidebar_note_enabled" => "0"
        "sidebar_note_title" => "Note title"
        "sidebar_note_content" => "Note content"
        "meta_title" => ""
        "meta_description" => "Members area"
        "meta_keywords" => "members area"
        "meta_robots" => "noindex, nofollow"
        "meta_author" => "PhilWebDev"
        "footer_enabled" => "1"
        "footer_to_top_enabled" => "1"
        "footer_signature" => ""
        "footer_link_1_enabled" => "on"
        "footer_link_1_title" => "About us"
        "footer_link_1_page" => "about-us"
        "footer_link_2_enabled" => "on"
        "footer_link_2_title" => "Terms and conditions"
        "footer_link_2_page" => "tos"
        "footer_link_3_enabled" => "on"
        "footer_link_3_title" => "Privacy policy"
        "footer_link_3_page" => "privacy-policy"
        "footer_link_4_title" => ""
        "footer_link_4_page" => ""
        "footer_link_5_title" => ""
        "footer_link_5_page" => ""
        "inject_javascript" => ""
      ]
      "loader_nr" => "8"
      "loader_url" => "img/assets/loaders/loader8.gif"
      "company" => array:11 [
        "www" => "https://billing.philwebdev.com/"
        "name" => "XWDV Information Technology Solutions"
        "signature" => """
          Regards,\n
          \n
          XWDV Information Technology Solutions\n
          https://www.philwebdev.com\n
          \n
          \n
          """
        "logo_url" => "https://www.philwebdev.com/billing/logod.svg"
        "logo_url_dark" => "https://www.philwebdev.com/billing/logow.svg"
        "favicon_url" => "https://www.philwebdev.com/billing/themes/huraga/assets/favicon.ico"
        "display_bank_info" => "0"
        "bank_info_pagebottom" => null
        "note" => ""
        "privacy_policy" => """
          This Privacy Policy describes the policies and procedures of PhilWebDev Domain and Business Hosting Solution, in association with - LiquidNet US LLC, a US company headquartered in Fort Lauderdale, Florida, and LiquidNet Ltd., a UK company headquartered in London, UK, on the collection, use and disclosure of your information. Legal details about the two companies can be found in the 'Contact Us' section of this document.\n
          \n
          For the sake of brevity, PhilWebDev Domain and Business Hosting Solution, LiquidNet US LLC and LiquidNet Ltd. will be referred to as 'We', 'Us', 'Our' and 'Service Provider' in this document.\n
          \n
          This Privacy Policy does not apply to information our customers may process when using our services.\n
          \n
          \---\n
          \n
          Privacy and security are of utmost importance to the Service Provider and we strive to ensure that our technical and organizational measures in place respect your data protection rights.\n
          \n
          **COLLECTION OF PERSONAL DATA**  \n
          "Personal data" refers to any information relating to an identifiable individual or his or her personal identity.\n
          \n
          Personal data is collected on our website by LiquidNet US LLC., a US company headquartered in Fort Lauderdale, Florida.\n
          \n
          The personally identifiable information that LiquidNet US LLC may collect from you when registering for an account includes: first and last name, postal address, phone number, email and IP address.\n
          \n
          If you want to use your Social Media account as a means to log in to your hosting account, you will also have to provide your Social Media ID.\n
          \n
          Your information will be needed for the following purposes:\n
          \n
          *   provision of our services to you;\n
          *   prevention of fraudulent transactions;\n
          *   billing/invoicing operations;\n
          *   provision of a sales/technical support service;\n
          *   maintenance of your account with us;\n
          *   dispute resolution cases;\n
          *   enforcement of our Terms of Service, or other legal rights, or as may be required by applicable laws and regulations or requested by any judicial process or governmental agency;\n
          *   collection of aggregate statistics about use of our services;\n
          \n
          Much of the data collected is aggregated or statistical data about how individuals use our Services, and is not linked to any personal data, but to the extent it is itself personal data, or is linked or linkable to personal data, we treat it accordingly.\n
          \n
          The Service Provider will NOT send you any unsolicited information, including emails, except as mentioned hereby.\n
          \n
          New customers will receive a welcome email containing information about the features provided by the Service, as well as WHCP (Web Hosting Control Panel) and FTP login details.\n
          \n
          The Service Provider may also send system notifications upon need, related to any upgrade, maintenance or other service issues concerning your hosting account.\n
          \n
          If you contact us directly, we may receive additional information about you such as your name, email address, phone number, the contents of the message and/or attachments you may send us, and any other information you may choose to provide. We may also receive a confirmation when you open an email from us.\n
          \n
          The Service Provider will keep your personally identifiable information private and will NOT share it with any unauthorized third parties.\n
          \n
          When you use our services, we may collect information about your engagement with and utilization of our services, such as processor and memory usage, storage capacity, navigation of our services, and system-level metrics. We use this data to operate the services, maintain and improve the performance and utilization of the services, develop new features, protect the security and safety of our services and our customers, and provide customer support. We also use this data to develop aggregate analysis and business intelligence that enable us to operate, protect, make informed decisions, and report on the performance of our business.\n
          \n
          **LEGAL BASIS FOR PROCESSING OF PERSONAL DATA**  \n
          We collect personal information from you only when:\n
          \n
          you give your consent for us to so,\n
          \n
          we need your personal information to perform a contract with you (e.g. to deliver the services you have requested), or,\n
          \n
          the processing is in our legitimate interests and not overridden by your rights;\n
          \n
          We have a legitimate interest in operating our services and communicating with you as necessary to provide these services, for example when responding to your queries, improving our platform, undertaking marketing, or for the purposes of detecting or preventing illegal activities.\n
          \n
          Please note that in most cases, if you do not submit the requested information, the Service Provider will not be able to provide the requested service to you.\n
          \n
          In some cases, we may also have a legal obligation to collect personal information from you, or may otherwise need that information to protect your vital interests or those of some other person's.\n
          \n
          If we ask you to provide personal information to comply with a legal requirement or to perform a contract with you, we will make this clear at the relevant time and advise you whether the provision of your personal information is mandatory or not (as well as of the possible consequences if you do not provide your personal information).\n
          \n
          **ACCESS TO YOUR PERSONAL DATA**  \n
          You may access and update your personal Information at any time from your Web Hosting Control Panel - > My Account - > Change Contact Details section.\n
          \n
          **SECURITY OF YOUR PERSONAL DATA**  \n
          The Service Provider is committed to protecting the security of customer collected personal information. To do so, we use technical security measures to prevent the loss, misuse, alternation or unauthorized disclosure of information under our control. We use security measures including and not limited to: physical, electronic and managerial procedures to safeguard and secure the information we collect online. However, please keep in mind that the Internet cannot be guaranteed to be 100% secure.\n
          \n
          If the Service Provider learns of a security system breach, we may attempt to notify you and send you any available protective information to the email address that you have provided to us or by posting a notice in your WHCP.\n
          \n
          **SHARING YOUR PERSONAL DATA WITH THIRD PARTIES**  \n
          We may share the information we collect in various ways, including the following:\n
          \n
          _Service Providers_  \n
          We may share information with third-party service providers that provide services on our behalf, such as helping to provide our services and to provide you with information relevant to you such as product announcements, service upgrades, special offers, or other information.\n
          \n
          _As Required By Law and Similar Disclosures_  \n
          We may also share information to (i) satisfy any applicable law, regulation, legal process, or governmental request; (ii) enforce this Privacy Policy and our Terms of Service, including investigation of potential violations hereof; (iii) detect, prevent, or otherwise address fraud, security, or technical issues; (iv) respond to your requests; or (v) protect our rights, property or safety, our users and the public. This includes exchanging information with other companies and organizations for fraud protection and spam/malware prevention.\n
          \n
          **THIRD-PARTY SERVICES**  \n
          You may access other third-party services through our services, for example by clicking on links to those third-party services from within our services. We are not responsible for the privacy policies and/or practices of these third-party services, and we encourage you to carefully review their privacy policies.\n
          \n
          **PRIVACY OF YOUR PAYMENT DETAILS**  \n
          We use third-party payment processing companies who collect and store financial information, such as your payment method (valid credit card number, type, expiration date or other financial information), and their use and storage of that information is governed by the payment processors' applicable terms of service and privacy policy. Collected billing information is used for the purposes of processing payments and fraud detection.\n
          \n
          We do not store your financial account information on our systems; however, we have access to, and may retain, subscriber information through our third-party payment processor.\n
          \n
          All PayPal transactions are subject to the [PayPal Privacy Policy](https://www.paypal.com/en/webapps/mpp/ua/privacy-full).\n
          \n
          **PRIVACY OF YOUR ACCOUNT**  \n
          We consider your registration data and the content of all your messages private and confidential. The header of the messages that you send will contain your name (e-mail address) and Internet Protocol (IP) address. We will not intentionally monitor or disclose any of your e-mail content or registration data unless we are required to do so:\n
          \n
          to enforce these Terms and Conditions,\n
          \n
          by law,\n
          \n
          to defend ourselves in any legal action,\n
          \n
          to protect our property.\n
          \n
          Since your password is essential for protecting your privacy, we encourage you to NOT share it with anyone and change it frequently. Additionally, you agree to respect the privacy and confidentiality of others.\n
          \n
          **AGE RESTRICTIONS**  \n
          We offer services only to people who are 18+. Our services are not targeted to, intended to be consumed by or designed to entice individuals under the age of 18. If we learn that we have collected the personal information of a child under the age of 18, we will take steps to delete that information as soon as possible.\n
          \n
          If you know of or have reason to believe that anyone under the age of 18 has provided us with any personal data, please contact us.\n
          \n
          **LOG FILES**  \n
          We use IP addresses to analyze trends, administer our site and servers, track access, and gather broad demographic information for aggregate use. IP addresses are not linked to personally identifiable information. It is possible that personal information about a customer may be included in the log files due to the normal functions of IP addresses and Web browsing.\n
          \n
          **COOKIES**  \n
          We use different cookies on our website to make it as useful to you as possible. Cookies are small text files that we put on your computer or mobile device to tell us what you want to use on our site but they do not tell us who you are.\n
          \n
          [Here](http://www.aboutcookies.org/) you can learn more about cookies and how to [control](http://www.aboutcookies.org/how-to-control-cookies/) or [delete](http://www.aboutcookies.org/how-to-delete-cookies/) them.\n
          \n
          Here are the cookies that we use on our site:\n
          \n
          _Essential cookies_  \n
          We use a cookie to remember your login for you and what you’ve put in the shop cart. Also, we set a cookie to help you choose a preferred font size for using the site. These cookies we consider essential for the operation of our website.\n
          \n
          _External web services_  \n
          We use an external live chat service (using cookies to remember your session name) to deliver real-time support to you should you want to.\n
          \n
          _Analytics_  \n
          We use Google Analytics and Facebook cookies to monitor visitor activity on our website. No personally identifying data is included in this type of reporting. We do not share information about this analysis with any third parties.\n
          \n
          Visitors can [opt out of Google's advertising tracking cookie](https://policies.google.com/technologies/ads) or [install a browser plugin](https://tools.google.com/dlpage/gaoptout?hl=en) to opt out of all Google Analytics tracking software. More information about Facebook's analytics cookie is available [here](https://www.facebook.com/policies/cookies/?utm_referrer=https://www.cloudflare.com/privacypolicy/).\n
          \n
          We assume you are happy with this usage of cookies on this website. If you are not happy, then you should either not use this site, or delete the cookies (you can check out how to do that according to your browser [here](http://www.aboutcookies.org/how-to-delete-cookies/)), or browse the site using your browser’s anonymous usage setting (named “Incognito” in Chrome, “InPrivate” for Internet Explorer, "Private Browsing" in Firefox and Safari etc.).\n
          \n
          We currently do not alter our practices when we receive a "Do Not Track" signal from a visitor's browser.\n
          \n
          Please remember that if you choose to delete the cookies or use the browser anonymously, you may find that certain sections of this website do not work properly.\n
          \n
          **YOUR RIGHTS UNDER THE GENERAL DATA PROTECTION REGULATION (GDPR)**\n
          \n
          If you are a resident of the European Economic Area (EEA), you have the following data protection rights:\n
          \n
          _Managing Your Information_  \n
          You may access and update some of your information through the "Change Contact Details" section in the WHCP. If you have chosen to connect your account to a third-party application like Facebook, Google or Twitter, you can change your settings and remove permission for the app from the "Linked Social Accounts" section in the WHCP. You are responsible for keeping your personal information up to date.\n
          \n
          _Rectification of Inaccurate or Incomplete Information_  \n
          You have the right to ask us to correct any inaccurate or incomplete personal information concerning you if you cannot update it yourself from within your account.\n
          \n
          _Data Access and Portability_  \n
          In some jurisdictions, the applicable law may entitle you to request copies of your personal information held by us. You may also be entitled to request copies of personal information that you have provided to us in a structured, commonly used, and machine-readable format and/or request us to transmit this information to another service provider (where technically feasible).\n
          \n
          _Opt-out of marketing communications_  \n
          You have the right to opt-out of marketing communications we send you at any time. You can exercise this right by clicking on the "unsubscribe" or "opt-out" link in the marketing emails we send you.\n
          \n
          _Data Retention and Erasure_  \n
          We generally retain your personal information for as long as is necessary for the performance of the contract between you and us and to comply with our legal obligations. If you no longer want us to use your information to provide the contracted services to you, you can request that we erase your personal information and close your account. Please note that if you request the erasure of your personal information:\n
          \n
          We may retain some of your personal information so as to detect and prevent fraud and enhance safety. For example, if we suspend an account for security reasons, we may retain certain information from that account to prevent that customer from opening a new account in the future.\n
          \n
          We may retain and use your personal information to the extent necessary to comply with our legal obligations. For example, we may keep some of your information for tax, legal reporting and auditing purposes.\n
          \n
          Because we maintain our platform to protect it from accidental or malicious loss and destruction, residual copies of your personal information may not be removed from our backup systems for a limited period of time.\n
          \n
          In cases where fraudulent or otherwise illegal activity has been deemed to have occurred as determined by law enforcement or management, the information may remain in our database indefinitely in order to help facilitate the prevention of repeated abuse in the future from the offending party.\n
          \n
          _Withdrawing Consent and Restriction of Processing_  \n
          If you have provided your consent to the processing of your personal information, you may withdraw it at any time by sending us a communication specifying which consent you are withdrawing. Please note that the withdrawal of your consent does not affect the lawfulness of any processing activities based on such consent before its withdrawal. Additionally, in some jurisdictions, applicable law may give you the right to limit the ways in which we use your personal information, in particular where (i) you contest the accuracy of your personal information; (ii) the processing is unlawful and you oppose the erasure of your personal information; (iii) we no longer need your personal information for the purposes of the processing, but you require the information for the establishment, exercise or defence of legal claims; or (iv) you have objected to the processing and pending the verification whether the Service Provider's legitimate grounds override your own.\n
          \n
          _Objection to Processing_  \n
          In some jurisdictions, applicable law may entitle you to require us not to process your personal information for certain specific purposes (including profiling) where such processing is based on legitimate interest. If you object to such processing, we will no longer process your personal information for these purposes unless we can demonstrate compelling legitimate grounds for such processing or such processing is required for the establishment, exercise or defence of legal claims.\n
          \n
          By default, customers do receive any system updates, such as the newsletters, invoices and service email notifications. Customers cannot opt out of possibly receiving important system notifications, since the latter are deemed necessary for the performance of our contractual obligations to you.\n
          \n
          _Lodging Complaints_  \n
          If you want to make a complaint about the way we are processing your data, you can contact us using the contact details below.\n
          \n
          You have the right to complain to a data protection authority about our collection and use of your personal information. For more information, please contact your local data protection authority.\n
          \n
          \---\n
          \n
          We respond to all requests we receive from individuals wishing to exercise their data protection rights in accordance with applicable data protection laws.\n
          \n
          **INTERNATIONAL TRANSFERS OF INFORMATION WE COLLECT**  \n
          We collect information globally and primarily store that information in the United States. We transfer, process and store your information outside of your country of residence. Whenever we transfer your information, we take steps to protect it.\n
          \n
          To facilitate our global operations, we transfer information to the United States and allow access to that information from countries in which we and associated companies have operations for the purposes described in this policy. These countries may not have equivalent privacy and data protection laws, certainly not equivalent to the laws of many of the countries where our customers and users are based. When we share information about you, we make use of Standard Contractual Clauses (SCCs) for data transfers between EU and non-EU countries, which have been approved by the European Commission.\n
          \n
          A copy of your personal data will also be stored in the data center you have selected when signing up for our services. This is done so that the Service Provider can deliver the contracted service in the location specified by the customer.\n
          \n
          **COMPLIANCE WITH LAWS AND LAW ENFORCEMENT**  \n
          The Service Provider cooperates with government and law enforcement officials to enforce and comply with the law. We will disclose any information about Users upon valid request by government or law officials as we, in our sole discretion, believe necessary or appropriate to respond to claims and legal process (including without limitation subpoenas), to protect your property and rights, or the property and rights of a third party, to protect the safety of the public or any person, or stop activity we consider illegal or unethical.\n
          \n
          **CHANGES TO PRIVACY POLICY**  \n
          Any changes to our Privacy Policy will be placed here and will supersede this version of our Policy. We will take reasonable steps to draw your attention to any changes in our Policy. However, to be on the safe side, we suggest that you read this document each time you use the website to ensure that it still meets with your approval.\n
          \n
          **CONTACT US**  \n
          If you have any questions about our Privacy Policy, or if you want to know what information we have collected about you, please use our Contact Us form.\n
          \n
          Postal Address:\n
          \n
          LiquidNet US LLC  \n
          6750 North Andrews Ave  \n
          Suite 200  \n
          Fort Lauderdale, FL 33309  \n
          United States of America\n
          \n
          LiquidNet Ltd.  \n
          13 Craigleith  \n
          7 Kersfield Road  \n
          Putney, London SW15 3HN  \n
          United Kingdom
          """
        "tos" => """
          An Acceptable Use Policy (AUP) is a set of rules and conditions compiled by a network, system, or a website owner. These rules explicitly define and restrict the ways in which the respective network, system or website may be used.\n
          \n
          The **AUP of the Service Provider** aims to clearly outline the purposes for which our customers CANNOT utilize our hosting services and position data on our network servers.\n
          \n
          This Acceptable Use Policy (AUP) is an integral part of the [Web Hosting Terms of Service](https://www.philwebdev.com/terms-and-conditions-2/web-hosting-terms-of-service-3/) which each customer agrees to abide by when signing up for an account with our web hosting company. Any violation of this AUP will be deemed a violation of our Web Hosting Terms of Service.\n
          \n
          We, at our own discretion, shall determine whether an act constitutes a breach of this AUP terms and misuse of our services. We reserve our right to be the sole arbiter in determining the sufficiency of the presented evidences. We will respond accordingly, and/or immediately terminate the provision of the services, shall we receive the report, and/or have sufficient proof, of any prohibited conduct outlined in this AUP, or any other activity threatening the security of our hosting environment and/or our network of hosting servers.\n
          \n
          In order to protect our company’s reputation and responsibilities, and guarantee state-of-the-art and reliable hosting services to all our customers, as well as privacy and security for all users, we – the Service Provider - hereby outline the following AUP rules and conditions to come into force for each customer signing up for a web hosting account with our company:\n
          \n
          1\. [System Abuse](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#SYSTEM_ABUSE)\n
          \n
          2\. [Spam and Spamvertizing](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#SPAM_AND_SPAMVERTIZING)\n
          \n
          3\. [Inappropriate or Unlawful Content](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#INAPPROPRIATE_OR_UNLAWFUL_CONTENT_)\n
          \n
          4\. [Copyrights](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#COPYRIGHTS)\n
          \n
          5\. [Corrective Actions](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#CORRECTIVE_ACTIONS)\n
          \n
          6\. [Reporting Violtaions](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#REPORTING_VIOLATIONS)\n
          \n
          7\. [Revisions](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#REVISIONS)\n
          \n
          **1\. SYSTEM ABUSE**\n
          \n
          Any customer in violation of our system or network security is subject to criminal and civil liability, as well as immediate account termination. Examples include, but are not limited to the following:\n
          \n
          Unauthorized access, use, probe, or scan of our system’s security, authentication measures, data, or traffic. Interference with the service to any user, host or network including, but not limited to: e-mail bombing, flooding, deliberate attempts to overload the system and broadcast attacks, forging of any TCP/IP packet header or any part of the header information in an e-mail or newsgroup posting.\n
          \n
          Any attempt at doing harm to a server or a customer of our web hosting services:\n
          \n
          the Service Provider will immediately and resolutely react to any attempt at misuse of an Internet account or computer, or any attempt to gain access to an Internet account or computer by a Service Provider's customer unauthorized by the account/computer owner. Such attempts include, but are not limited to the following: 'Internet scamming' (tricking other people into releasing their passwords, etc.), password robbery, security hole scanning, running proxy - proxy lists and any kind of proxy scripts (including, but not limited to PHP proxy and mph proxy), introducing of any computer programs (viruses, Trojan horses, trap doors, back doors, worms, time bombs, packet bombs, cancelbots, etc.) that are intended to negatively interfere with, intercept, irreversibly damage or take hold of any system, data or personal information. It WILL NOT matter whether the attacked account or computer belongs or not to the Service Provider's services. The fraud will be subject to actions based on the very nature of the attack and those may represent a warning, an account suspension or cancellation, and/or civil or criminal legal actions.\n
          \n
          Background operations/programs on servers:\n
          \n
          ‘Background process’ is a program that runs in the background of the operating system. What is specific for a background process is that, once started, it runs simultaneously with other foreground processes. This means that, the shell executing the background operation does not wait for it to finish or terminate, as it does with foreground processes, but is free to start executing more operations along with the background one. Typical background processes are ircd, irc bot, bnc, and many others.\n
          \n
          Background processes are not permitted on any of our shared hosting servers, as they usually lead to CPU overload and can be used for malicious and/or illegal actions. As our primary task is to provide highest quality web hosting service to all our customers, we cannot permit any background processes to be executed and threaten the performance of our server network. Our shared hosting system does not allow a big multitude of users to simultaneously use the system memory and processing time of our servers.\n
          \n
          Excessive use of system resources:\n
          \n
          In order to ensure higher server performance and quality of hosting service all shared hosting plans are subject to certain resource limitations concerning, but not limited to, server CPU usage, Memory usage, disk-space and traffic. If a hosting account exceeds the allowed amount of system resources the account owner will be immediately notified to take actions in order to reduce the usage. If such action is not instantly taken by the owner the account will be suspended. If an excessive CPU usage is detected the account owner will be suggested to place an order for a CPU usage upgrade or upgrade to a plan which allows higher CPU usage.\n
          \n
          If any hosting account is found to be causing degradation of the server and/or our hosting network’s performance, regardless of the reason, the account will be subject to suspension or immediate removal, depending on the situation. The Service Provider will be the sole arbiter in determining whether a given account is excessively using the server resources and/or causing a server degradation.\n
          \n
          **2\. SPAM AND SPAMVERTIZING**\n
          \n
          SPAMMING IS PROHIBITED. Users MAY NOT utilize our web hosting services to transmit, distribute or deliver any unsolicited bulk or commercial messages over the Internet (an action known as "spam" or "spamming").\n
          \n
          Spamming is a violation of ethic norms and will be interpreted as an infringement. the Service Provider will not tolerate the sending of unsolicited bulk or commercial messages through our services, as well as through another service that is mentioning, in some way, our customer’s domain name or implies the utilization of our network or our e-mail services for sending the unsolicited bulk or messages.\n
          \n
          SPAMVERTISING IS PROHIBITED. 'Spamvertizing’ refers to the practice of sending unsolicited spam messages for the purpose of advertising a particular website.\n
          \n
          If such e-mails are relayed through 3rd party (e-mail spoofing) and/or are promoting a domain hosted on our servers, this will lead to immediate account suspension unless an evidence of legitimacy for non-involvement of the domain owner in the particular illegal action is provided.\n
          \n
          ’E-mail spoofing’ is a fraudulent e-mail activity in which the sender’s (3td party) e-mail address and other parts of the e-mail header are changed so as to appear that the e-mail has been sent from a different source (e-mail address owner/server).\n
          \n
          'Unsolicited message’ is a message that is sent against the privacy policy of a newsgroup, or is sent to a recipient without their explicit permission. We, at our sole discretion, shall determine whether any of the messages you are sending is spam or spamvertizing. For your information, spamming generally includes, but is not limited to the following\n
          \n
          Sending of unsolicited messages in bulk, or sending of unsolicited e-mails, which provoke complaints from recipients;\n
          \n
          Sending of junk mail;\n
          \n
          Use of distribution lists that include people who have not given prior explicit permission to be involved in such a distribution process;\n
          \n
          Posting commercial ads to USENET newsgroups that do not permit it;\n
          \n
          Posting articles containing binary encoded data to non-binary newsgroups;\n
          \n
          Excessive and repeated posting of off-topic messages to newsgroups;\n
          \n
          Excessive and repeated cross-posting;\n
          \n
          E-mail harassment of another Internet Customer or Customers, including but not limited to, transmitting of any threatening, libellous or obscene material, or material of any nature that may be deemed offensive;\n
          \n
          E-mailing of age-inappropriate communications or content to anyone under the age of 18.\n
          \n
          **3\. INAPPROPRIATE OR UNLAWFUL CONTENT**\n
          \n
          CONTENT published or transmitted via the Service Provider’s hosting services includes website content, email content, forum/blog postings, chat content, and/or any other type of content hosted on our servers, published online or transmitted through our network’s services.\n
          \n
          The user of our services is NOT permitted to post online content or have links to content that:\n
          \n
          is defamatory, abusive or obscene, violates a person’s reputation/privacy, is reasonably deemed offensive by the web community, is anti-religious or anti-human rights, or contains any type of threatening or hate speech, encourages harassment or physical harm to any group or individual, or is otherwise malicious/fraudulent and may result in complaints/liabilities/or retaliation against the Service Provider by offended viewers;\n
          \n
          promotes or encourages illegal activities (e.g. illegal drugs, illegal gambling, arms trafficking, etc.) or violates any applicable law, statute, ordinance or regulation, including but not limited to the laws and regulations governing export control, unfair competition, false advertising, consumer protection, etc.\n
          \n
          represents pornography – any type of pornographic/adult material, including child pornography, or advertisements of pornographic websites;\n
          \n
          represents infringement on copyright, patents, trademarks, trade secrets, or third party's intellectual property or proprietary rights, including pirated computer programs, hacking/phreaking software, warez or any type of software/content (including also ROMs, ROM Emulators, media files – MP3, AVI, .RM, etc., torrent files, and others) that is copyrighted, is NOT uploaded in compliance with its license agreement or is NOT freely available for distribution.\n
          \n
          **4\. COPYRIGHTS**\n
          \n
          Copyrighted material must not be placed on customers' accounts without the explicit permission of the copyright owner or a person explicitly authorized to give such permission by the copyright owner. Upon receipt of a claim for copyright infringement, or a notice of such violation, we will immediately run full investigation and, upon confirmation, will promptly remove the infringing material from the Services. Further procedures (in accordance with our stated below corrective measures) will be carried out if necessary. We will assume no liability to any Customer of the Services for the removal of any such material.\n
          \n
          **5\. CORRECTIVE ACTIONS**\n
          \n
          We reserve our right to be the sole arbiter in determining the seriousness of each infringement and to immediately take corrective actions.\n
          \n
          We will disable the customer's account if we deem necessary, at our sole discretion. Upon closing of the customer’s account we will send an e-mail notification to the customer, stating the reason for the termination and quoting our terms’ chapter that has been violated. The customer will be given an opportunity to respond and take measures to remedy the situation should he/she consider him/herself abused by a third party. Upon fulfilling of this obligation, we may re-activate the customer’s account, if we find, at our own discretion, sufficient evidence pro customer’s side.\n
          \n
          Closed accounts due to repeated violations will not be re-activated. A backup may be requested, however it will be subject to certain penalty fees imposed according to the breach of this AUP terms. The final penalty fee will be determined by the type and frequency of the violations.\n
          \n
          **6\. REPORTING VIOLATIONS**\n
          \n
          If you need to report a violation of this AUP agreement or believe that you or your system has been subject to attack originating from our web hosting system, please contact us immediately. Our professional team will investigate the situation and provide you with full assistance.\n
          \n
          **7\. REVISIONS**\n
          \n
          We reserve our right to change this AUP at any time, without prior notice. We encourage our users to periodically review this Acceptable Use Policy and our Web Hosting Terms of Service.
          """
      ]
      "logo_url" => "https://www.philwebdev.com/billing/logod.svg"
      "languages" => array:2 [
        0 => array:3 [
          "locale" => "en_US"
          "title" => "English(en_US)"
          "name" => "English"
        ]
        1 => array:3 [
          "locale" => "hr_HR"
          "title" => "hr_HR(hr_HR)"
          "name" => "hr_HR"
        ]
      ]
    ]
    
  2. []
    
/home/philwebd/public_html/billing/data/cache/67/67d9fa319b2c24aa5b7e34d09cde494d.php
 
    // line 6
    public function block_body($context, array $blocks = [])
    {
        $macros = $this->macros;
        // line 7
        echo "<div class=\"row\">
    <div class=\"col-md-12\">
        <div class=\"card border-0\" id=\"orderbutton\" style=\"margin-bottom: 0\">
            <div class=\"card-body p-1\">
                <div id=\"orderManager\" class=\"accordion\">
 
                    ";
        // line 13
        $this->loadTemplate("mod_orderbutton_choose_product.html.twig", "mod_orderbutton_index.html.twig", 13)->display($context);
        // line 14
        echo "
                    ";
        // line 15
        $this->loadTemplate("mod_orderbutton_product_configuration.html.twig", "mod_orderbutton_index.html.twig", 15)->display($context);
        // line 16
        echo "
                    ";
        // line 17
        if ( !($context["client"] ?? null)) {
            // line 18
            echo "                        ";
            $this->loadTemplate("mod_orderbutton_client.html.twig", "mod_orderbutton_index.html.twig", 18)->display($context);
            // line 19
            echo "                    ";
        }
        // line 20
        echo "
                    ";
        // line 21
        $this->loadTemplate("mod_orderbutton_checkout.html.twig", "mod_orderbutton_index.html.twig", 21)->display($context);
        // line 22
        echo "
                    <div class=\"accordion-item\">
                        <h2 class=\"accordion-header\">
Arguments
  1. array:11 [
      "CSRFToken" => "6921348dc90961df5535dfa8a24e50f2"
      "request" => array:2 [
        "_url" => "/order"
        "product" => "7"
      ]
      "guest" => Api_Handler {#175}
      "FOSSBillingVersion" => "0.6.20"
      "current_theme" => "huraga"
      "settings" => array:57 [
        "CSRFToken" => "3f10ff5d59184687b9efad79ebd8597e"
        "color_scheme" => "green"
        "show_page_header" => "1"
        "show_company_logo" => "1"
        "show_company_name" => "0"
        "show_client_details" => "1"
        "sidebar_balance_enabled" => "1"
        "top_menu_dashboard" => "1"
        "top_menu_profile" => "1"
        "top_menu_signout" => "1"
        "login_page_show_logo" => "1"
        "login_page_logo_url" => "/"
        "show_password_reset_link" => "1"
        "show_signup_link" => "0"
        "login_page_show_remember_me" => "1"
        "show_breadcrumb" => "1"
        "hide_dashboard_breadcrumb" => "1"
        "require_login" => "1"
        "showcase_enabled" => "0"
        "showcase_size" => "3"
        "showcase_text" => "Showcase text"
        "showcase_button_title" => "Showcase button title"
        "showcase_button_url" => "Showcase link URL"
        "side_menu_dashboard" => "1"
        "side_menu_order" => "1"
        "side_menu_support" => "1"
        "side_menu_services" => "1"
        "side_menu_invoices" => "1"
        "side_menu_emails" => "1"
        "side_menu_payments" => "1"
        "side_menu_news" => "1"
        "side_menu_kb" => "1"
        "sidebar_note_enabled" => "0"
        "sidebar_note_title" => "Note title"
        "sidebar_note_content" => "Note content"
        "meta_title" => ""
        "meta_description" => "Members area"
        "meta_keywords" => "members area"
        "meta_robots" => "noindex, nofollow"
        "meta_author" => "PhilWebDev"
        "footer_enabled" => "1"
        "footer_to_top_enabled" => "1"
        "footer_signature" => ""
        "footer_link_1_enabled" => "on"
        "footer_link_1_title" => "About us"
        "footer_link_1_page" => "about-us"
        "footer_link_2_enabled" => "on"
        "footer_link_2_title" => "Terms and conditions"
        "footer_link_2_page" => "tos"
        "footer_link_3_enabled" => "on"
        "footer_link_3_title" => "Privacy policy"
        "footer_link_3_page" => "privacy-policy"
        "footer_link_4_title" => ""
        "footer_link_4_page" => ""
        "footer_link_5_title" => ""
        "footer_link_5_page" => ""
        "inject_javascript" => ""
      ]
      "loader_nr" => "8"
      "loader_url" => "img/assets/loaders/loader8.gif"
      "company" => array:11 [
        "www" => "https://billing.philwebdev.com/"
        "name" => "XWDV Information Technology Solutions"
        "signature" => """
          Regards,\n
          \n
          XWDV Information Technology Solutions\n
          https://www.philwebdev.com\n
          \n
          \n
          """
        "logo_url" => "https://www.philwebdev.com/billing/logod.svg"
        "logo_url_dark" => "https://www.philwebdev.com/billing/logow.svg"
        "favicon_url" => "https://www.philwebdev.com/billing/themes/huraga/assets/favicon.ico"
        "display_bank_info" => "0"
        "bank_info_pagebottom" => null
        "note" => ""
        "privacy_policy" => """
          This Privacy Policy describes the policies and procedures of PhilWebDev Domain and Business Hosting Solution, in association with - LiquidNet US LLC, a US company headquartered in Fort Lauderdale, Florida, and LiquidNet Ltd., a UK company headquartered in London, UK, on the collection, use and disclosure of your information. Legal details about the two companies can be found in the 'Contact Us' section of this document.\n
          \n
          For the sake of brevity, PhilWebDev Domain and Business Hosting Solution, LiquidNet US LLC and LiquidNet Ltd. will be referred to as 'We', 'Us', 'Our' and 'Service Provider' in this document.\n
          \n
          This Privacy Policy does not apply to information our customers may process when using our services.\n
          \n
          \---\n
          \n
          Privacy and security are of utmost importance to the Service Provider and we strive to ensure that our technical and organizational measures in place respect your data protection rights.\n
          \n
          **COLLECTION OF PERSONAL DATA**  \n
          "Personal data" refers to any information relating to an identifiable individual or his or her personal identity.\n
          \n
          Personal data is collected on our website by LiquidNet US LLC., a US company headquartered in Fort Lauderdale, Florida.\n
          \n
          The personally identifiable information that LiquidNet US LLC may collect from you when registering for an account includes: first and last name, postal address, phone number, email and IP address.\n
          \n
          If you want to use your Social Media account as a means to log in to your hosting account, you will also have to provide your Social Media ID.\n
          \n
          Your information will be needed for the following purposes:\n
          \n
          *   provision of our services to you;\n
          *   prevention of fraudulent transactions;\n
          *   billing/invoicing operations;\n
          *   provision of a sales/technical support service;\n
          *   maintenance of your account with us;\n
          *   dispute resolution cases;\n
          *   enforcement of our Terms of Service, or other legal rights, or as may be required by applicable laws and regulations or requested by any judicial process or governmental agency;\n
          *   collection of aggregate statistics about use of our services;\n
          \n
          Much of the data collected is aggregated or statistical data about how individuals use our Services, and is not linked to any personal data, but to the extent it is itself personal data, or is linked or linkable to personal data, we treat it accordingly.\n
          \n
          The Service Provider will NOT send you any unsolicited information, including emails, except as mentioned hereby.\n
          \n
          New customers will receive a welcome email containing information about the features provided by the Service, as well as WHCP (Web Hosting Control Panel) and FTP login details.\n
          \n
          The Service Provider may also send system notifications upon need, related to any upgrade, maintenance or other service issues concerning your hosting account.\n
          \n
          If you contact us directly, we may receive additional information about you such as your name, email address, phone number, the contents of the message and/or attachments you may send us, and any other information you may choose to provide. We may also receive a confirmation when you open an email from us.\n
          \n
          The Service Provider will keep your personally identifiable information private and will NOT share it with any unauthorized third parties.\n
          \n
          When you use our services, we may collect information about your engagement with and utilization of our services, such as processor and memory usage, storage capacity, navigation of our services, and system-level metrics. We use this data to operate the services, maintain and improve the performance and utilization of the services, develop new features, protect the security and safety of our services and our customers, and provide customer support. We also use this data to develop aggregate analysis and business intelligence that enable us to operate, protect, make informed decisions, and report on the performance of our business.\n
          \n
          **LEGAL BASIS FOR PROCESSING OF PERSONAL DATA**  \n
          We collect personal information from you only when:\n
          \n
          you give your consent for us to so,\n
          \n
          we need your personal information to perform a contract with you (e.g. to deliver the services you have requested), or,\n
          \n
          the processing is in our legitimate interests and not overridden by your rights;\n
          \n
          We have a legitimate interest in operating our services and communicating with you as necessary to provide these services, for example when responding to your queries, improving our platform, undertaking marketing, or for the purposes of detecting or preventing illegal activities.\n
          \n
          Please note that in most cases, if you do not submit the requested information, the Service Provider will not be able to provide the requested service to you.\n
          \n
          In some cases, we may also have a legal obligation to collect personal information from you, or may otherwise need that information to protect your vital interests or those of some other person's.\n
          \n
          If we ask you to provide personal information to comply with a legal requirement or to perform a contract with you, we will make this clear at the relevant time and advise you whether the provision of your personal information is mandatory or not (as well as of the possible consequences if you do not provide your personal information).\n
          \n
          **ACCESS TO YOUR PERSONAL DATA**  \n
          You may access and update your personal Information at any time from your Web Hosting Control Panel - > My Account - > Change Contact Details section.\n
          \n
          **SECURITY OF YOUR PERSONAL DATA**  \n
          The Service Provider is committed to protecting the security of customer collected personal information. To do so, we use technical security measures to prevent the loss, misuse, alternation or unauthorized disclosure of information under our control. We use security measures including and not limited to: physical, electronic and managerial procedures to safeguard and secure the information we collect online. However, please keep in mind that the Internet cannot be guaranteed to be 100% secure.\n
          \n
          If the Service Provider learns of a security system breach, we may attempt to notify you and send you any available protective information to the email address that you have provided to us or by posting a notice in your WHCP.\n
          \n
          **SHARING YOUR PERSONAL DATA WITH THIRD PARTIES**  \n
          We may share the information we collect in various ways, including the following:\n
          \n
          _Service Providers_  \n
          We may share information with third-party service providers that provide services on our behalf, such as helping to provide our services and to provide you with information relevant to you such as product announcements, service upgrades, special offers, or other information.\n
          \n
          _As Required By Law and Similar Disclosures_  \n
          We may also share information to (i) satisfy any applicable law, regulation, legal process, or governmental request; (ii) enforce this Privacy Policy and our Terms of Service, including investigation of potential violations hereof; (iii) detect, prevent, or otherwise address fraud, security, or technical issues; (iv) respond to your requests; or (v) protect our rights, property or safety, our users and the public. This includes exchanging information with other companies and organizations for fraud protection and spam/malware prevention.\n
          \n
          **THIRD-PARTY SERVICES**  \n
          You may access other third-party services through our services, for example by clicking on links to those third-party services from within our services. We are not responsible for the privacy policies and/or practices of these third-party services, and we encourage you to carefully review their privacy policies.\n
          \n
          **PRIVACY OF YOUR PAYMENT DETAILS**  \n
          We use third-party payment processing companies who collect and store financial information, such as your payment method (valid credit card number, type, expiration date or other financial information), and their use and storage of that information is governed by the payment processors' applicable terms of service and privacy policy. Collected billing information is used for the purposes of processing payments and fraud detection.\n
          \n
          We do not store your financial account information on our systems; however, we have access to, and may retain, subscriber information through our third-party payment processor.\n
          \n
          All PayPal transactions are subject to the [PayPal Privacy Policy](https://www.paypal.com/en/webapps/mpp/ua/privacy-full).\n
          \n
          **PRIVACY OF YOUR ACCOUNT**  \n
          We consider your registration data and the content of all your messages private and confidential. The header of the messages that you send will contain your name (e-mail address) and Internet Protocol (IP) address. We will not intentionally monitor or disclose any of your e-mail content or registration data unless we are required to do so:\n
          \n
          to enforce these Terms and Conditions,\n
          \n
          by law,\n
          \n
          to defend ourselves in any legal action,\n
          \n
          to protect our property.\n
          \n
          Since your password is essential for protecting your privacy, we encourage you to NOT share it with anyone and change it frequently. Additionally, you agree to respect the privacy and confidentiality of others.\n
          \n
          **AGE RESTRICTIONS**  \n
          We offer services only to people who are 18+. Our services are not targeted to, intended to be consumed by or designed to entice individuals under the age of 18. If we learn that we have collected the personal information of a child under the age of 18, we will take steps to delete that information as soon as possible.\n
          \n
          If you know of or have reason to believe that anyone under the age of 18 has provided us with any personal data, please contact us.\n
          \n
          **LOG FILES**  \n
          We use IP addresses to analyze trends, administer our site and servers, track access, and gather broad demographic information for aggregate use. IP addresses are not linked to personally identifiable information. It is possible that personal information about a customer may be included in the log files due to the normal functions of IP addresses and Web browsing.\n
          \n
          **COOKIES**  \n
          We use different cookies on our website to make it as useful to you as possible. Cookies are small text files that we put on your computer or mobile device to tell us what you want to use on our site but they do not tell us who you are.\n
          \n
          [Here](http://www.aboutcookies.org/) you can learn more about cookies and how to [control](http://www.aboutcookies.org/how-to-control-cookies/) or [delete](http://www.aboutcookies.org/how-to-delete-cookies/) them.\n
          \n
          Here are the cookies that we use on our site:\n
          \n
          _Essential cookies_  \n
          We use a cookie to remember your login for you and what you’ve put in the shop cart. Also, we set a cookie to help you choose a preferred font size for using the site. These cookies we consider essential for the operation of our website.\n
          \n
          _External web services_  \n
          We use an external live chat service (using cookies to remember your session name) to deliver real-time support to you should you want to.\n
          \n
          _Analytics_  \n
          We use Google Analytics and Facebook cookies to monitor visitor activity on our website. No personally identifying data is included in this type of reporting. We do not share information about this analysis with any third parties.\n
          \n
          Visitors can [opt out of Google's advertising tracking cookie](https://policies.google.com/technologies/ads) or [install a browser plugin](https://tools.google.com/dlpage/gaoptout?hl=en) to opt out of all Google Analytics tracking software. More information about Facebook's analytics cookie is available [here](https://www.facebook.com/policies/cookies/?utm_referrer=https://www.cloudflare.com/privacypolicy/).\n
          \n
          We assume you are happy with this usage of cookies on this website. If you are not happy, then you should either not use this site, or delete the cookies (you can check out how to do that according to your browser [here](http://www.aboutcookies.org/how-to-delete-cookies/)), or browse the site using your browser’s anonymous usage setting (named “Incognito” in Chrome, “InPrivate” for Internet Explorer, "Private Browsing" in Firefox and Safari etc.).\n
          \n
          We currently do not alter our practices when we receive a "Do Not Track" signal from a visitor's browser.\n
          \n
          Please remember that if you choose to delete the cookies or use the browser anonymously, you may find that certain sections of this website do not work properly.\n
          \n
          **YOUR RIGHTS UNDER THE GENERAL DATA PROTECTION REGULATION (GDPR)**\n
          \n
          If you are a resident of the European Economic Area (EEA), you have the following data protection rights:\n
          \n
          _Managing Your Information_  \n
          You may access and update some of your information through the "Change Contact Details" section in the WHCP. If you have chosen to connect your account to a third-party application like Facebook, Google or Twitter, you can change your settings and remove permission for the app from the "Linked Social Accounts" section in the WHCP. You are responsible for keeping your personal information up to date.\n
          \n
          _Rectification of Inaccurate or Incomplete Information_  \n
          You have the right to ask us to correct any inaccurate or incomplete personal information concerning you if you cannot update it yourself from within your account.\n
          \n
          _Data Access and Portability_  \n
          In some jurisdictions, the applicable law may entitle you to request copies of your personal information held by us. You may also be entitled to request copies of personal information that you have provided to us in a structured, commonly used, and machine-readable format and/or request us to transmit this information to another service provider (where technically feasible).\n
          \n
          _Opt-out of marketing communications_  \n
          You have the right to opt-out of marketing communications we send you at any time. You can exercise this right by clicking on the "unsubscribe" or "opt-out" link in the marketing emails we send you.\n
          \n
          _Data Retention and Erasure_  \n
          We generally retain your personal information for as long as is necessary for the performance of the contract between you and us and to comply with our legal obligations. If you no longer want us to use your information to provide the contracted services to you, you can request that we erase your personal information and close your account. Please note that if you request the erasure of your personal information:\n
          \n
          We may retain some of your personal information so as to detect and prevent fraud and enhance safety. For example, if we suspend an account for security reasons, we may retain certain information from that account to prevent that customer from opening a new account in the future.\n
          \n
          We may retain and use your personal information to the extent necessary to comply with our legal obligations. For example, we may keep some of your information for tax, legal reporting and auditing purposes.\n
          \n
          Because we maintain our platform to protect it from accidental or malicious loss and destruction, residual copies of your personal information may not be removed from our backup systems for a limited period of time.\n
          \n
          In cases where fraudulent or otherwise illegal activity has been deemed to have occurred as determined by law enforcement or management, the information may remain in our database indefinitely in order to help facilitate the prevention of repeated abuse in the future from the offending party.\n
          \n
          _Withdrawing Consent and Restriction of Processing_  \n
          If you have provided your consent to the processing of your personal information, you may withdraw it at any time by sending us a communication specifying which consent you are withdrawing. Please note that the withdrawal of your consent does not affect the lawfulness of any processing activities based on such consent before its withdrawal. Additionally, in some jurisdictions, applicable law may give you the right to limit the ways in which we use your personal information, in particular where (i) you contest the accuracy of your personal information; (ii) the processing is unlawful and you oppose the erasure of your personal information; (iii) we no longer need your personal information for the purposes of the processing, but you require the information for the establishment, exercise or defence of legal claims; or (iv) you have objected to the processing and pending the verification whether the Service Provider's legitimate grounds override your own.\n
          \n
          _Objection to Processing_  \n
          In some jurisdictions, applicable law may entitle you to require us not to process your personal information for certain specific purposes (including profiling) where such processing is based on legitimate interest. If you object to such processing, we will no longer process your personal information for these purposes unless we can demonstrate compelling legitimate grounds for such processing or such processing is required for the establishment, exercise or defence of legal claims.\n
          \n
          By default, customers do receive any system updates, such as the newsletters, invoices and service email notifications. Customers cannot opt out of possibly receiving important system notifications, since the latter are deemed necessary for the performance of our contractual obligations to you.\n
          \n
          _Lodging Complaints_  \n
          If you want to make a complaint about the way we are processing your data, you can contact us using the contact details below.\n
          \n
          You have the right to complain to a data protection authority about our collection and use of your personal information. For more information, please contact your local data protection authority.\n
          \n
          \---\n
          \n
          We respond to all requests we receive from individuals wishing to exercise their data protection rights in accordance with applicable data protection laws.\n
          \n
          **INTERNATIONAL TRANSFERS OF INFORMATION WE COLLECT**  \n
          We collect information globally and primarily store that information in the United States. We transfer, process and store your information outside of your country of residence. Whenever we transfer your information, we take steps to protect it.\n
          \n
          To facilitate our global operations, we transfer information to the United States and allow access to that information from countries in which we and associated companies have operations for the purposes described in this policy. These countries may not have equivalent privacy and data protection laws, certainly not equivalent to the laws of many of the countries where our customers and users are based. When we share information about you, we make use of Standard Contractual Clauses (SCCs) for data transfers between EU and non-EU countries, which have been approved by the European Commission.\n
          \n
          A copy of your personal data will also be stored in the data center you have selected when signing up for our services. This is done so that the Service Provider can deliver the contracted service in the location specified by the customer.\n
          \n
          **COMPLIANCE WITH LAWS AND LAW ENFORCEMENT**  \n
          The Service Provider cooperates with government and law enforcement officials to enforce and comply with the law. We will disclose any information about Users upon valid request by government or law officials as we, in our sole discretion, believe necessary or appropriate to respond to claims and legal process (including without limitation subpoenas), to protect your property and rights, or the property and rights of a third party, to protect the safety of the public or any person, or stop activity we consider illegal or unethical.\n
          \n
          **CHANGES TO PRIVACY POLICY**  \n
          Any changes to our Privacy Policy will be placed here and will supersede this version of our Policy. We will take reasonable steps to draw your attention to any changes in our Policy. However, to be on the safe side, we suggest that you read this document each time you use the website to ensure that it still meets with your approval.\n
          \n
          **CONTACT US**  \n
          If you have any questions about our Privacy Policy, or if you want to know what information we have collected about you, please use our Contact Us form.\n
          \n
          Postal Address:\n
          \n
          LiquidNet US LLC  \n
          6750 North Andrews Ave  \n
          Suite 200  \n
          Fort Lauderdale, FL 33309  \n
          United States of America\n
          \n
          LiquidNet Ltd.  \n
          13 Craigleith  \n
          7 Kersfield Road  \n
          Putney, London SW15 3HN  \n
          United Kingdom
          """
        "tos" => """
          An Acceptable Use Policy (AUP) is a set of rules and conditions compiled by a network, system, or a website owner. These rules explicitly define and restrict the ways in which the respective network, system or website may be used.\n
          \n
          The **AUP of the Service Provider** aims to clearly outline the purposes for which our customers CANNOT utilize our hosting services and position data on our network servers.\n
          \n
          This Acceptable Use Policy (AUP) is an integral part of the [Web Hosting Terms of Service](https://www.philwebdev.com/terms-and-conditions-2/web-hosting-terms-of-service-3/) which each customer agrees to abide by when signing up for an account with our web hosting company. Any violation of this AUP will be deemed a violation of our Web Hosting Terms of Service.\n
          \n
          We, at our own discretion, shall determine whether an act constitutes a breach of this AUP terms and misuse of our services. We reserve our right to be the sole arbiter in determining the sufficiency of the presented evidences. We will respond accordingly, and/or immediately terminate the provision of the services, shall we receive the report, and/or have sufficient proof, of any prohibited conduct outlined in this AUP, or any other activity threatening the security of our hosting environment and/or our network of hosting servers.\n
          \n
          In order to protect our company’s reputation and responsibilities, and guarantee state-of-the-art and reliable hosting services to all our customers, as well as privacy and security for all users, we – the Service Provider - hereby outline the following AUP rules and conditions to come into force for each customer signing up for a web hosting account with our company:\n
          \n
          1\. [System Abuse](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#SYSTEM_ABUSE)\n
          \n
          2\. [Spam and Spamvertizing](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#SPAM_AND_SPAMVERTIZING)\n
          \n
          3\. [Inappropriate or Unlawful Content](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#INAPPROPRIATE_OR_UNLAWFUL_CONTENT_)\n
          \n
          4\. [Copyrights](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#COPYRIGHTS)\n
          \n
          5\. [Corrective Actions](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#CORRECTIVE_ACTIONS)\n
          \n
          6\. [Reporting Violtaions](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#REPORTING_VIOLATIONS)\n
          \n
          7\. [Revisions](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#REVISIONS)\n
          \n
          **1\. SYSTEM ABUSE**\n
          \n
          Any customer in violation of our system or network security is subject to criminal and civil liability, as well as immediate account termination. Examples include, but are not limited to the following:\n
          \n
          Unauthorized access, use, probe, or scan of our system’s security, authentication measures, data, or traffic. Interference with the service to any user, host or network including, but not limited to: e-mail bombing, flooding, deliberate attempts to overload the system and broadcast attacks, forging of any TCP/IP packet header or any part of the header information in an e-mail or newsgroup posting.\n
          \n
          Any attempt at doing harm to a server or a customer of our web hosting services:\n
          \n
          the Service Provider will immediately and resolutely react to any attempt at misuse of an Internet account or computer, or any attempt to gain access to an Internet account or computer by a Service Provider's customer unauthorized by the account/computer owner. Such attempts include, but are not limited to the following: 'Internet scamming' (tricking other people into releasing their passwords, etc.), password robbery, security hole scanning, running proxy - proxy lists and any kind of proxy scripts (including, but not limited to PHP proxy and mph proxy), introducing of any computer programs (viruses, Trojan horses, trap doors, back doors, worms, time bombs, packet bombs, cancelbots, etc.) that are intended to negatively interfere with, intercept, irreversibly damage or take hold of any system, data or personal information. It WILL NOT matter whether the attacked account or computer belongs or not to the Service Provider's services. The fraud will be subject to actions based on the very nature of the attack and those may represent a warning, an account suspension or cancellation, and/or civil or criminal legal actions.\n
          \n
          Background operations/programs on servers:\n
          \n
          ‘Background process’ is a program that runs in the background of the operating system. What is specific for a background process is that, once started, it runs simultaneously with other foreground processes. This means that, the shell executing the background operation does not wait for it to finish or terminate, as it does with foreground processes, but is free to start executing more operations along with the background one. Typical background processes are ircd, irc bot, bnc, and many others.\n
          \n
          Background processes are not permitted on any of our shared hosting servers, as they usually lead to CPU overload and can be used for malicious and/or illegal actions. As our primary task is to provide highest quality web hosting service to all our customers, we cannot permit any background processes to be executed and threaten the performance of our server network. Our shared hosting system does not allow a big multitude of users to simultaneously use the system memory and processing time of our servers.\n
          \n
          Excessive use of system resources:\n
          \n
          In order to ensure higher server performance and quality of hosting service all shared hosting plans are subject to certain resource limitations concerning, but not limited to, server CPU usage, Memory usage, disk-space and traffic. If a hosting account exceeds the allowed amount of system resources the account owner will be immediately notified to take actions in order to reduce the usage. If such action is not instantly taken by the owner the account will be suspended. If an excessive CPU usage is detected the account owner will be suggested to place an order for a CPU usage upgrade or upgrade to a plan which allows higher CPU usage.\n
          \n
          If any hosting account is found to be causing degradation of the server and/or our hosting network’s performance, regardless of the reason, the account will be subject to suspension or immediate removal, depending on the situation. The Service Provider will be the sole arbiter in determining whether a given account is excessively using the server resources and/or causing a server degradation.\n
          \n
          **2\. SPAM AND SPAMVERTIZING**\n
          \n
          SPAMMING IS PROHIBITED. Users MAY NOT utilize our web hosting services to transmit, distribute or deliver any unsolicited bulk or commercial messages over the Internet (an action known as "spam" or "spamming").\n
          \n
          Spamming is a violation of ethic norms and will be interpreted as an infringement. the Service Provider will not tolerate the sending of unsolicited bulk or commercial messages through our services, as well as through another service that is mentioning, in some way, our customer’s domain name or implies the utilization of our network or our e-mail services for sending the unsolicited bulk or messages.\n
          \n
          SPAMVERTISING IS PROHIBITED. 'Spamvertizing’ refers to the practice of sending unsolicited spam messages for the purpose of advertising a particular website.\n
          \n
          If such e-mails are relayed through 3rd party (e-mail spoofing) and/or are promoting a domain hosted on our servers, this will lead to immediate account suspension unless an evidence of legitimacy for non-involvement of the domain owner in the particular illegal action is provided.\n
          \n
          ’E-mail spoofing’ is a fraudulent e-mail activity in which the sender’s (3td party) e-mail address and other parts of the e-mail header are changed so as to appear that the e-mail has been sent from a different source (e-mail address owner/server).\n
          \n
          'Unsolicited message’ is a message that is sent against the privacy policy of a newsgroup, or is sent to a recipient without their explicit permission. We, at our sole discretion, shall determine whether any of the messages you are sending is spam or spamvertizing. For your information, spamming generally includes, but is not limited to the following\n
          \n
          Sending of unsolicited messages in bulk, or sending of unsolicited e-mails, which provoke complaints from recipients;\n
          \n
          Sending of junk mail;\n
          \n
          Use of distribution lists that include people who have not given prior explicit permission to be involved in such a distribution process;\n
          \n
          Posting commercial ads to USENET newsgroups that do not permit it;\n
          \n
          Posting articles containing binary encoded data to non-binary newsgroups;\n
          \n
          Excessive and repeated posting of off-topic messages to newsgroups;\n
          \n
          Excessive and repeated cross-posting;\n
          \n
          E-mail harassment of another Internet Customer or Customers, including but not limited to, transmitting of any threatening, libellous or obscene material, or material of any nature that may be deemed offensive;\n
          \n
          E-mailing of age-inappropriate communications or content to anyone under the age of 18.\n
          \n
          **3\. INAPPROPRIATE OR UNLAWFUL CONTENT**\n
          \n
          CONTENT published or transmitted via the Service Provider’s hosting services includes website content, email content, forum/blog postings, chat content, and/or any other type of content hosted on our servers, published online or transmitted through our network’s services.\n
          \n
          The user of our services is NOT permitted to post online content or have links to content that:\n
          \n
          is defamatory, abusive or obscene, violates a person’s reputation/privacy, is reasonably deemed offensive by the web community, is anti-religious or anti-human rights, or contains any type of threatening or hate speech, encourages harassment or physical harm to any group or individual, or is otherwise malicious/fraudulent and may result in complaints/liabilities/or retaliation against the Service Provider by offended viewers;\n
          \n
          promotes or encourages illegal activities (e.g. illegal drugs, illegal gambling, arms trafficking, etc.) or violates any applicable law, statute, ordinance or regulation, including but not limited to the laws and regulations governing export control, unfair competition, false advertising, consumer protection, etc.\n
          \n
          represents pornography – any type of pornographic/adult material, including child pornography, or advertisements of pornographic websites;\n
          \n
          represents infringement on copyright, patents, trademarks, trade secrets, or third party's intellectual property or proprietary rights, including pirated computer programs, hacking/phreaking software, warez or any type of software/content (including also ROMs, ROM Emulators, media files – MP3, AVI, .RM, etc., torrent files, and others) that is copyrighted, is NOT uploaded in compliance with its license agreement or is NOT freely available for distribution.\n
          \n
          **4\. COPYRIGHTS**\n
          \n
          Copyrighted material must not be placed on customers' accounts without the explicit permission of the copyright owner or a person explicitly authorized to give such permission by the copyright owner. Upon receipt of a claim for copyright infringement, or a notice of such violation, we will immediately run full investigation and, upon confirmation, will promptly remove the infringing material from the Services. Further procedures (in accordance with our stated below corrective measures) will be carried out if necessary. We will assume no liability to any Customer of the Services for the removal of any such material.\n
          \n
          **5\. CORRECTIVE ACTIONS**\n
          \n
          We reserve our right to be the sole arbiter in determining the seriousness of each infringement and to immediately take corrective actions.\n
          \n
          We will disable the customer's account if we deem necessary, at our sole discretion. Upon closing of the customer’s account we will send an e-mail notification to the customer, stating the reason for the termination and quoting our terms’ chapter that has been violated. The customer will be given an opportunity to respond and take measures to remedy the situation should he/she consider him/herself abused by a third party. Upon fulfilling of this obligation, we may re-activate the customer’s account, if we find, at our own discretion, sufficient evidence pro customer’s side.\n
          \n
          Closed accounts due to repeated violations will not be re-activated. A backup may be requested, however it will be subject to certain penalty fees imposed according to the breach of this AUP terms. The final penalty fee will be determined by the type and frequency of the violations.\n
          \n
          **6\. REPORTING VIOLATIONS**\n
          \n
          If you need to report a violation of this AUP agreement or believe that you or your system has been subject to attack originating from our web hosting system, please contact us immediately. Our professional team will investigate the situation and provide you with full assistance.\n
          \n
          **7\. REVISIONS**\n
          \n
          We reserve our right to change this AUP at any time, without prior notice. We encourage our users to periodically review this Acceptable Use Policy and our Web Hosting Terms of Service.
          """
      ]
      "logo_url" => "https://www.philwebdev.com/billing/logod.svg"
      "languages" => array:2 [
        0 => array:3 [
          "locale" => "en_US"
          "title" => "English(en_US)"
          "name" => "English"
        ]
        1 => array:3 [
          "locale" => "hr_HR"
          "title" => "hr_HR(hr_HR)"
          "name" => "hr_HR"
        ]
      ]
    ]
    
/home/philwebd/public_html/billing/vendor/twig/twig/src/Template.php
    {
        if ($useBlocks && isset($blocks[$name])) {
            $template = $blocks[$name][0];
            $block = $blocks[$name][1];
        } elseif (isset($this->blocks[$name])) {
            $template = $this->blocks[$name][0];
            $block = $this->blocks[$name][1];
        } else {
            $template = null;
            $block = null;
        }
 
        // avoid RCEs when sandbox is enabled
        if (null !== $template && !$template instanceof self) {
            throw new \LogicException('A block must be a method on a \Twig\Template instance.');
        }
 
        if (null !== $template) {
            try {
                $template->$block($context, $blocks);
            } catch (Error $e) {
                if (!$e->getSourceContext()) {
                    $e->setSourceContext($template->getSourceContext());
                }
 
                // this is mostly useful for \Twig\Error\LoaderError exceptions
                // see \Twig\Error\LoaderError
                if (-1 === $e->getTemplateLine()) {
                    $e->guess();
                }
 
                throw $e;
            } catch (\Throwable $e) {
                $e = new RuntimeError(sprintf('An exception has been thrown during the rendering of a template ("%s").', $e->getMessage()), -1, $template->getSourceContext(), $e);
                $e->guess();
 
                throw $e;
            }
        } elseif (false !== $parent = $this->getParent($context)) {
            $parent->displayBlock($name, $context, array_merge($this->blocks, $blocks), false, $templateContext ?? $this);
Arguments
  1. array:11 [
      "CSRFToken" => "6921348dc90961df5535dfa8a24e50f2"
      "request" => array:2 [
        "_url" => "/order"
        "product" => "7"
      ]
      "guest" => Api_Handler {#175}
      "FOSSBillingVersion" => "0.6.20"
      "current_theme" => "huraga"
      "settings" => array:57 [
        "CSRFToken" => "3f10ff5d59184687b9efad79ebd8597e"
        "color_scheme" => "green"
        "show_page_header" => "1"
        "show_company_logo" => "1"
        "show_company_name" => "0"
        "show_client_details" => "1"
        "sidebar_balance_enabled" => "1"
        "top_menu_dashboard" => "1"
        "top_menu_profile" => "1"
        "top_menu_signout" => "1"
        "login_page_show_logo" => "1"
        "login_page_logo_url" => "/"
        "show_password_reset_link" => "1"
        "show_signup_link" => "0"
        "login_page_show_remember_me" => "1"
        "show_breadcrumb" => "1"
        "hide_dashboard_breadcrumb" => "1"
        "require_login" => "1"
        "showcase_enabled" => "0"
        "showcase_size" => "3"
        "showcase_text" => "Showcase text"
        "showcase_button_title" => "Showcase button title"
        "showcase_button_url" => "Showcase link URL"
        "side_menu_dashboard" => "1"
        "side_menu_order" => "1"
        "side_menu_support" => "1"
        "side_menu_services" => "1"
        "side_menu_invoices" => "1"
        "side_menu_emails" => "1"
        "side_menu_payments" => "1"
        "side_menu_news" => "1"
        "side_menu_kb" => "1"
        "sidebar_note_enabled" => "0"
        "sidebar_note_title" => "Note title"
        "sidebar_note_content" => "Note content"
        "meta_title" => ""
        "meta_description" => "Members area"
        "meta_keywords" => "members area"
        "meta_robots" => "noindex, nofollow"
        "meta_author" => "PhilWebDev"
        "footer_enabled" => "1"
        "footer_to_top_enabled" => "1"
        "footer_signature" => ""
        "footer_link_1_enabled" => "on"
        "footer_link_1_title" => "About us"
        "footer_link_1_page" => "about-us"
        "footer_link_2_enabled" => "on"
        "footer_link_2_title" => "Terms and conditions"
        "footer_link_2_page" => "tos"
        "footer_link_3_enabled" => "on"
        "footer_link_3_title" => "Privacy policy"
        "footer_link_3_page" => "privacy-policy"
        "footer_link_4_title" => ""
        "footer_link_4_page" => ""
        "footer_link_5_title" => ""
        "footer_link_5_page" => ""
        "inject_javascript" => ""
      ]
      "loader_nr" => "8"
      "loader_url" => "img/assets/loaders/loader8.gif"
      "company" => array:11 [
        "www" => "https://billing.philwebdev.com/"
        "name" => "XWDV Information Technology Solutions"
        "signature" => """
          Regards,\n
          \n
          XWDV Information Technology Solutions\n
          https://www.philwebdev.com\n
          \n
          \n
          """
        "logo_url" => "https://www.philwebdev.com/billing/logod.svg"
        "logo_url_dark" => "https://www.philwebdev.com/billing/logow.svg"
        "favicon_url" => "https://www.philwebdev.com/billing/themes/huraga/assets/favicon.ico"
        "display_bank_info" => "0"
        "bank_info_pagebottom" => null
        "note" => ""
        "privacy_policy" => """
          This Privacy Policy describes the policies and procedures of PhilWebDev Domain and Business Hosting Solution, in association with - LiquidNet US LLC, a US company headquartered in Fort Lauderdale, Florida, and LiquidNet Ltd., a UK company headquartered in London, UK, on the collection, use and disclosure of your information. Legal details about the two companies can be found in the 'Contact Us' section of this document.\n
          \n
          For the sake of brevity, PhilWebDev Domain and Business Hosting Solution, LiquidNet US LLC and LiquidNet Ltd. will be referred to as 'We', 'Us', 'Our' and 'Service Provider' in this document.\n
          \n
          This Privacy Policy does not apply to information our customers may process when using our services.\n
          \n
          \---\n
          \n
          Privacy and security are of utmost importance to the Service Provider and we strive to ensure that our technical and organizational measures in place respect your data protection rights.\n
          \n
          **COLLECTION OF PERSONAL DATA**  \n
          "Personal data" refers to any information relating to an identifiable individual or his or her personal identity.\n
          \n
          Personal data is collected on our website by LiquidNet US LLC., a US company headquartered in Fort Lauderdale, Florida.\n
          \n
          The personally identifiable information that LiquidNet US LLC may collect from you when registering for an account includes: first and last name, postal address, phone number, email and IP address.\n
          \n
          If you want to use your Social Media account as a means to log in to your hosting account, you will also have to provide your Social Media ID.\n
          \n
          Your information will be needed for the following purposes:\n
          \n
          *   provision of our services to you;\n
          *   prevention of fraudulent transactions;\n
          *   billing/invoicing operations;\n
          *   provision of a sales/technical support service;\n
          *   maintenance of your account with us;\n
          *   dispute resolution cases;\n
          *   enforcement of our Terms of Service, or other legal rights, or as may be required by applicable laws and regulations or requested by any judicial process or governmental agency;\n
          *   collection of aggregate statistics about use of our services;\n
          \n
          Much of the data collected is aggregated or statistical data about how individuals use our Services, and is not linked to any personal data, but to the extent it is itself personal data, or is linked or linkable to personal data, we treat it accordingly.\n
          \n
          The Service Provider will NOT send you any unsolicited information, including emails, except as mentioned hereby.\n
          \n
          New customers will receive a welcome email containing information about the features provided by the Service, as well as WHCP (Web Hosting Control Panel) and FTP login details.\n
          \n
          The Service Provider may also send system notifications upon need, related to any upgrade, maintenance or other service issues concerning your hosting account.\n
          \n
          If you contact us directly, we may receive additional information about you such as your name, email address, phone number, the contents of the message and/or attachments you may send us, and any other information you may choose to provide. We may also receive a confirmation when you open an email from us.\n
          \n
          The Service Provider will keep your personally identifiable information private and will NOT share it with any unauthorized third parties.\n
          \n
          When you use our services, we may collect information about your engagement with and utilization of our services, such as processor and memory usage, storage capacity, navigation of our services, and system-level metrics. We use this data to operate the services, maintain and improve the performance and utilization of the services, develop new features, protect the security and safety of our services and our customers, and provide customer support. We also use this data to develop aggregate analysis and business intelligence that enable us to operate, protect, make informed decisions, and report on the performance of our business.\n
          \n
          **LEGAL BASIS FOR PROCESSING OF PERSONAL DATA**  \n
          We collect personal information from you only when:\n
          \n
          you give your consent for us to so,\n
          \n
          we need your personal information to perform a contract with you (e.g. to deliver the services you have requested), or,\n
          \n
          the processing is in our legitimate interests and not overridden by your rights;\n
          \n
          We have a legitimate interest in operating our services and communicating with you as necessary to provide these services, for example when responding to your queries, improving our platform, undertaking marketing, or for the purposes of detecting or preventing illegal activities.\n
          \n
          Please note that in most cases, if you do not submit the requested information, the Service Provider will not be able to provide the requested service to you.\n
          \n
          In some cases, we may also have a legal obligation to collect personal information from you, or may otherwise need that information to protect your vital interests or those of some other person's.\n
          \n
          If we ask you to provide personal information to comply with a legal requirement or to perform a contract with you, we will make this clear at the relevant time and advise you whether the provision of your personal information is mandatory or not (as well as of the possible consequences if you do not provide your personal information).\n
          \n
          **ACCESS TO YOUR PERSONAL DATA**  \n
          You may access and update your personal Information at any time from your Web Hosting Control Panel - > My Account - > Change Contact Details section.\n
          \n
          **SECURITY OF YOUR PERSONAL DATA**  \n
          The Service Provider is committed to protecting the security of customer collected personal information. To do so, we use technical security measures to prevent the loss, misuse, alternation or unauthorized disclosure of information under our control. We use security measures including and not limited to: physical, electronic and managerial procedures to safeguard and secure the information we collect online. However, please keep in mind that the Internet cannot be guaranteed to be 100% secure.\n
          \n
          If the Service Provider learns of a security system breach, we may attempt to notify you and send you any available protective information to the email address that you have provided to us or by posting a notice in your WHCP.\n
          \n
          **SHARING YOUR PERSONAL DATA WITH THIRD PARTIES**  \n
          We may share the information we collect in various ways, including the following:\n
          \n
          _Service Providers_  \n
          We may share information with third-party service providers that provide services on our behalf, such as helping to provide our services and to provide you with information relevant to you such as product announcements, service upgrades, special offers, or other information.\n
          \n
          _As Required By Law and Similar Disclosures_  \n
          We may also share information to (i) satisfy any applicable law, regulation, legal process, or governmental request; (ii) enforce this Privacy Policy and our Terms of Service, including investigation of potential violations hereof; (iii) detect, prevent, or otherwise address fraud, security, or technical issues; (iv) respond to your requests; or (v) protect our rights, property or safety, our users and the public. This includes exchanging information with other companies and organizations for fraud protection and spam/malware prevention.\n
          \n
          **THIRD-PARTY SERVICES**  \n
          You may access other third-party services through our services, for example by clicking on links to those third-party services from within our services. We are not responsible for the privacy policies and/or practices of these third-party services, and we encourage you to carefully review their privacy policies.\n
          \n
          **PRIVACY OF YOUR PAYMENT DETAILS**  \n
          We use third-party payment processing companies who collect and store financial information, such as your payment method (valid credit card number, type, expiration date or other financial information), and their use and storage of that information is governed by the payment processors' applicable terms of service and privacy policy. Collected billing information is used for the purposes of processing payments and fraud detection.\n
          \n
          We do not store your financial account information on our systems; however, we have access to, and may retain, subscriber information through our third-party payment processor.\n
          \n
          All PayPal transactions are subject to the [PayPal Privacy Policy](https://www.paypal.com/en/webapps/mpp/ua/privacy-full).\n
          \n
          **PRIVACY OF YOUR ACCOUNT**  \n
          We consider your registration data and the content of all your messages private and confidential. The header of the messages that you send will contain your name (e-mail address) and Internet Protocol (IP) address. We will not intentionally monitor or disclose any of your e-mail content or registration data unless we are required to do so:\n
          \n
          to enforce these Terms and Conditions,\n
          \n
          by law,\n
          \n
          to defend ourselves in any legal action,\n
          \n
          to protect our property.\n
          \n
          Since your password is essential for protecting your privacy, we encourage you to NOT share it with anyone and change it frequently. Additionally, you agree to respect the privacy and confidentiality of others.\n
          \n
          **AGE RESTRICTIONS**  \n
          We offer services only to people who are 18+. Our services are not targeted to, intended to be consumed by or designed to entice individuals under the age of 18. If we learn that we have collected the personal information of a child under the age of 18, we will take steps to delete that information as soon as possible.\n
          \n
          If you know of or have reason to believe that anyone under the age of 18 has provided us with any personal data, please contact us.\n
          \n
          **LOG FILES**  \n
          We use IP addresses to analyze trends, administer our site and servers, track access, and gather broad demographic information for aggregate use. IP addresses are not linked to personally identifiable information. It is possible that personal information about a customer may be included in the log files due to the normal functions of IP addresses and Web browsing.\n
          \n
          **COOKIES**  \n
          We use different cookies on our website to make it as useful to you as possible. Cookies are small text files that we put on your computer or mobile device to tell us what you want to use on our site but they do not tell us who you are.\n
          \n
          [Here](http://www.aboutcookies.org/) you can learn more about cookies and how to [control](http://www.aboutcookies.org/how-to-control-cookies/) or [delete](http://www.aboutcookies.org/how-to-delete-cookies/) them.\n
          \n
          Here are the cookies that we use on our site:\n
          \n
          _Essential cookies_  \n
          We use a cookie to remember your login for you and what you’ve put in the shop cart. Also, we set a cookie to help you choose a preferred font size for using the site. These cookies we consider essential for the operation of our website.\n
          \n
          _External web services_  \n
          We use an external live chat service (using cookies to remember your session name) to deliver real-time support to you should you want to.\n
          \n
          _Analytics_  \n
          We use Google Analytics and Facebook cookies to monitor visitor activity on our website. No personally identifying data is included in this type of reporting. We do not share information about this analysis with any third parties.\n
          \n
          Visitors can [opt out of Google's advertising tracking cookie](https://policies.google.com/technologies/ads) or [install a browser plugin](https://tools.google.com/dlpage/gaoptout?hl=en) to opt out of all Google Analytics tracking software. More information about Facebook's analytics cookie is available [here](https://www.facebook.com/policies/cookies/?utm_referrer=https://www.cloudflare.com/privacypolicy/).\n
          \n
          We assume you are happy with this usage of cookies on this website. If you are not happy, then you should either not use this site, or delete the cookies (you can check out how to do that according to your browser [here](http://www.aboutcookies.org/how-to-delete-cookies/)), or browse the site using your browser’s anonymous usage setting (named “Incognito” in Chrome, “InPrivate” for Internet Explorer, "Private Browsing" in Firefox and Safari etc.).\n
          \n
          We currently do not alter our practices when we receive a "Do Not Track" signal from a visitor's browser.\n
          \n
          Please remember that if you choose to delete the cookies or use the browser anonymously, you may find that certain sections of this website do not work properly.\n
          \n
          **YOUR RIGHTS UNDER THE GENERAL DATA PROTECTION REGULATION (GDPR)**\n
          \n
          If you are a resident of the European Economic Area (EEA), you have the following data protection rights:\n
          \n
          _Managing Your Information_  \n
          You may access and update some of your information through the "Change Contact Details" section in the WHCP. If you have chosen to connect your account to a third-party application like Facebook, Google or Twitter, you can change your settings and remove permission for the app from the "Linked Social Accounts" section in the WHCP. You are responsible for keeping your personal information up to date.\n
          \n
          _Rectification of Inaccurate or Incomplete Information_  \n
          You have the right to ask us to correct any inaccurate or incomplete personal information concerning you if you cannot update it yourself from within your account.\n
          \n
          _Data Access and Portability_  \n
          In some jurisdictions, the applicable law may entitle you to request copies of your personal information held by us. You may also be entitled to request copies of personal information that you have provided to us in a structured, commonly used, and machine-readable format and/or request us to transmit this information to another service provider (where technically feasible).\n
          \n
          _Opt-out of marketing communications_  \n
          You have the right to opt-out of marketing communications we send you at any time. You can exercise this right by clicking on the "unsubscribe" or "opt-out" link in the marketing emails we send you.\n
          \n
          _Data Retention and Erasure_  \n
          We generally retain your personal information for as long as is necessary for the performance of the contract between you and us and to comply with our legal obligations. If you no longer want us to use your information to provide the contracted services to you, you can request that we erase your personal information and close your account. Please note that if you request the erasure of your personal information:\n
          \n
          We may retain some of your personal information so as to detect and prevent fraud and enhance safety. For example, if we suspend an account for security reasons, we may retain certain information from that account to prevent that customer from opening a new account in the future.\n
          \n
          We may retain and use your personal information to the extent necessary to comply with our legal obligations. For example, we may keep some of your information for tax, legal reporting and auditing purposes.\n
          \n
          Because we maintain our platform to protect it from accidental or malicious loss and destruction, residual copies of your personal information may not be removed from our backup systems for a limited period of time.\n
          \n
          In cases where fraudulent or otherwise illegal activity has been deemed to have occurred as determined by law enforcement or management, the information may remain in our database indefinitely in order to help facilitate the prevention of repeated abuse in the future from the offending party.\n
          \n
          _Withdrawing Consent and Restriction of Processing_  \n
          If you have provided your consent to the processing of your personal information, you may withdraw it at any time by sending us a communication specifying which consent you are withdrawing. Please note that the withdrawal of your consent does not affect the lawfulness of any processing activities based on such consent before its withdrawal. Additionally, in some jurisdictions, applicable law may give you the right to limit the ways in which we use your personal information, in particular where (i) you contest the accuracy of your personal information; (ii) the processing is unlawful and you oppose the erasure of your personal information; (iii) we no longer need your personal information for the purposes of the processing, but you require the information for the establishment, exercise or defence of legal claims; or (iv) you have objected to the processing and pending the verification whether the Service Provider's legitimate grounds override your own.\n
          \n
          _Objection to Processing_  \n
          In some jurisdictions, applicable law may entitle you to require us not to process your personal information for certain specific purposes (including profiling) where such processing is based on legitimate interest. If you object to such processing, we will no longer process your personal information for these purposes unless we can demonstrate compelling legitimate grounds for such processing or such processing is required for the establishment, exercise or defence of legal claims.\n
          \n
          By default, customers do receive any system updates, such as the newsletters, invoices and service email notifications. Customers cannot opt out of possibly receiving important system notifications, since the latter are deemed necessary for the performance of our contractual obligations to you.\n
          \n
          _Lodging Complaints_  \n
          If you want to make a complaint about the way we are processing your data, you can contact us using the contact details below.\n
          \n
          You have the right to complain to a data protection authority about our collection and use of your personal information. For more information, please contact your local data protection authority.\n
          \n
          \---\n
          \n
          We respond to all requests we receive from individuals wishing to exercise their data protection rights in accordance with applicable data protection laws.\n
          \n
          **INTERNATIONAL TRANSFERS OF INFORMATION WE COLLECT**  \n
          We collect information globally and primarily store that information in the United States. We transfer, process and store your information outside of your country of residence. Whenever we transfer your information, we take steps to protect it.\n
          \n
          To facilitate our global operations, we transfer information to the United States and allow access to that information from countries in which we and associated companies have operations for the purposes described in this policy. These countries may not have equivalent privacy and data protection laws, certainly not equivalent to the laws of many of the countries where our customers and users are based. When we share information about you, we make use of Standard Contractual Clauses (SCCs) for data transfers between EU and non-EU countries, which have been approved by the European Commission.\n
          \n
          A copy of your personal data will also be stored in the data center you have selected when signing up for our services. This is done so that the Service Provider can deliver the contracted service in the location specified by the customer.\n
          \n
          **COMPLIANCE WITH LAWS AND LAW ENFORCEMENT**  \n
          The Service Provider cooperates with government and law enforcement officials to enforce and comply with the law. We will disclose any information about Users upon valid request by government or law officials as we, in our sole discretion, believe necessary or appropriate to respond to claims and legal process (including without limitation subpoenas), to protect your property and rights, or the property and rights of a third party, to protect the safety of the public or any person, or stop activity we consider illegal or unethical.\n
          \n
          **CHANGES TO PRIVACY POLICY**  \n
          Any changes to our Privacy Policy will be placed here and will supersede this version of our Policy. We will take reasonable steps to draw your attention to any changes in our Policy. However, to be on the safe side, we suggest that you read this document each time you use the website to ensure that it still meets with your approval.\n
          \n
          **CONTACT US**  \n
          If you have any questions about our Privacy Policy, or if you want to know what information we have collected about you, please use our Contact Us form.\n
          \n
          Postal Address:\n
          \n
          LiquidNet US LLC  \n
          6750 North Andrews Ave  \n
          Suite 200  \n
          Fort Lauderdale, FL 33309  \n
          United States of America\n
          \n
          LiquidNet Ltd.  \n
          13 Craigleith  \n
          7 Kersfield Road  \n
          Putney, London SW15 3HN  \n
          United Kingdom
          """
        "tos" => """
          An Acceptable Use Policy (AUP) is a set of rules and conditions compiled by a network, system, or a website owner. These rules explicitly define and restrict the ways in which the respective network, system or website may be used.\n
          \n
          The **AUP of the Service Provider** aims to clearly outline the purposes for which our customers CANNOT utilize our hosting services and position data on our network servers.\n
          \n
          This Acceptable Use Policy (AUP) is an integral part of the [Web Hosting Terms of Service](https://www.philwebdev.com/terms-and-conditions-2/web-hosting-terms-of-service-3/) which each customer agrees to abide by when signing up for an account with our web hosting company. Any violation of this AUP will be deemed a violation of our Web Hosting Terms of Service.\n
          \n
          We, at our own discretion, shall determine whether an act constitutes a breach of this AUP terms and misuse of our services. We reserve our right to be the sole arbiter in determining the sufficiency of the presented evidences. We will respond accordingly, and/or immediately terminate the provision of the services, shall we receive the report, and/or have sufficient proof, of any prohibited conduct outlined in this AUP, or any other activity threatening the security of our hosting environment and/or our network of hosting servers.\n
          \n
          In order to protect our company’s reputation and responsibilities, and guarantee state-of-the-art and reliable hosting services to all our customers, as well as privacy and security for all users, we – the Service Provider - hereby outline the following AUP rules and conditions to come into force for each customer signing up for a web hosting account with our company:\n
          \n
          1\. [System Abuse](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#SYSTEM_ABUSE)\n
          \n
          2\. [Spam and Spamvertizing](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#SPAM_AND_SPAMVERTIZING)\n
          \n
          3\. [Inappropriate or Unlawful Content](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#INAPPROPRIATE_OR_UNLAWFUL_CONTENT_)\n
          \n
          4\. [Copyrights](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#COPYRIGHTS)\n
          \n
          5\. [Corrective Actions](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#CORRECTIVE_ACTIONS)\n
          \n
          6\. [Reporting Violtaions](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#REPORTING_VIOLATIONS)\n
          \n
          7\. [Revisions](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#REVISIONS)\n
          \n
          **1\. SYSTEM ABUSE**\n
          \n
          Any customer in violation of our system or network security is subject to criminal and civil liability, as well as immediate account termination. Examples include, but are not limited to the following:\n
          \n
          Unauthorized access, use, probe, or scan of our system’s security, authentication measures, data, or traffic. Interference with the service to any user, host or network including, but not limited to: e-mail bombing, flooding, deliberate attempts to overload the system and broadcast attacks, forging of any TCP/IP packet header or any part of the header information in an e-mail or newsgroup posting.\n
          \n
          Any attempt at doing harm to a server or a customer of our web hosting services:\n
          \n
          the Service Provider will immediately and resolutely react to any attempt at misuse of an Internet account or computer, or any attempt to gain access to an Internet account or computer by a Service Provider's customer unauthorized by the account/computer owner. Such attempts include, but are not limited to the following: 'Internet scamming' (tricking other people into releasing their passwords, etc.), password robbery, security hole scanning, running proxy - proxy lists and any kind of proxy scripts (including, but not limited to PHP proxy and mph proxy), introducing of any computer programs (viruses, Trojan horses, trap doors, back doors, worms, time bombs, packet bombs, cancelbots, etc.) that are intended to negatively interfere with, intercept, irreversibly damage or take hold of any system, data or personal information. It WILL NOT matter whether the attacked account or computer belongs or not to the Service Provider's services. The fraud will be subject to actions based on the very nature of the attack and those may represent a warning, an account suspension or cancellation, and/or civil or criminal legal actions.\n
          \n
          Background operations/programs on servers:\n
          \n
          ‘Background process’ is a program that runs in the background of the operating system. What is specific for a background process is that, once started, it runs simultaneously with other foreground processes. This means that, the shell executing the background operation does not wait for it to finish or terminate, as it does with foreground processes, but is free to start executing more operations along with the background one. Typical background processes are ircd, irc bot, bnc, and many others.\n
          \n
          Background processes are not permitted on any of our shared hosting servers, as they usually lead to CPU overload and can be used for malicious and/or illegal actions. As our primary task is to provide highest quality web hosting service to all our customers, we cannot permit any background processes to be executed and threaten the performance of our server network. Our shared hosting system does not allow a big multitude of users to simultaneously use the system memory and processing time of our servers.\n
          \n
          Excessive use of system resources:\n
          \n
          In order to ensure higher server performance and quality of hosting service all shared hosting plans are subject to certain resource limitations concerning, but not limited to, server CPU usage, Memory usage, disk-space and traffic. If a hosting account exceeds the allowed amount of system resources the account owner will be immediately notified to take actions in order to reduce the usage. If such action is not instantly taken by the owner the account will be suspended. If an excessive CPU usage is detected the account owner will be suggested to place an order for a CPU usage upgrade or upgrade to a plan which allows higher CPU usage.\n
          \n
          If any hosting account is found to be causing degradation of the server and/or our hosting network’s performance, regardless of the reason, the account will be subject to suspension or immediate removal, depending on the situation. The Service Provider will be the sole arbiter in determining whether a given account is excessively using the server resources and/or causing a server degradation.\n
          \n
          **2\. SPAM AND SPAMVERTIZING**\n
          \n
          SPAMMING IS PROHIBITED. Users MAY NOT utilize our web hosting services to transmit, distribute or deliver any unsolicited bulk or commercial messages over the Internet (an action known as "spam" or "spamming").\n
          \n
          Spamming is a violation of ethic norms and will be interpreted as an infringement. the Service Provider will not tolerate the sending of unsolicited bulk or commercial messages through our services, as well as through another service that is mentioning, in some way, our customer’s domain name or implies the utilization of our network or our e-mail services for sending the unsolicited bulk or messages.\n
          \n
          SPAMVERTISING IS PROHIBITED. 'Spamvertizing’ refers to the practice of sending unsolicited spam messages for the purpose of advertising a particular website.\n
          \n
          If such e-mails are relayed through 3rd party (e-mail spoofing) and/or are promoting a domain hosted on our servers, this will lead to immediate account suspension unless an evidence of legitimacy for non-involvement of the domain owner in the particular illegal action is provided.\n
          \n
          ’E-mail spoofing’ is a fraudulent e-mail activity in which the sender’s (3td party) e-mail address and other parts of the e-mail header are changed so as to appear that the e-mail has been sent from a different source (e-mail address owner/server).\n
          \n
          'Unsolicited message’ is a message that is sent against the privacy policy of a newsgroup, or is sent to a recipient without their explicit permission. We, at our sole discretion, shall determine whether any of the messages you are sending is spam or spamvertizing. For your information, spamming generally includes, but is not limited to the following\n
          \n
          Sending of unsolicited messages in bulk, or sending of unsolicited e-mails, which provoke complaints from recipients;\n
          \n
          Sending of junk mail;\n
          \n
          Use of distribution lists that include people who have not given prior explicit permission to be involved in such a distribution process;\n
          \n
          Posting commercial ads to USENET newsgroups that do not permit it;\n
          \n
          Posting articles containing binary encoded data to non-binary newsgroups;\n
          \n
          Excessive and repeated posting of off-topic messages to newsgroups;\n
          \n
          Excessive and repeated cross-posting;\n
          \n
          E-mail harassment of another Internet Customer or Customers, including but not limited to, transmitting of any threatening, libellous or obscene material, or material of any nature that may be deemed offensive;\n
          \n
          E-mailing of age-inappropriate communications or content to anyone under the age of 18.\n
          \n
          **3\. INAPPROPRIATE OR UNLAWFUL CONTENT**\n
          \n
          CONTENT published or transmitted via the Service Provider’s hosting services includes website content, email content, forum/blog postings, chat content, and/or any other type of content hosted on our servers, published online or transmitted through our network’s services.\n
          \n
          The user of our services is NOT permitted to post online content or have links to content that:\n
          \n
          is defamatory, abusive or obscene, violates a person’s reputation/privacy, is reasonably deemed offensive by the web community, is anti-religious or anti-human rights, or contains any type of threatening or hate speech, encourages harassment or physical harm to any group or individual, or is otherwise malicious/fraudulent and may result in complaints/liabilities/or retaliation against the Service Provider by offended viewers;\n
          \n
          promotes or encourages illegal activities (e.g. illegal drugs, illegal gambling, arms trafficking, etc.) or violates any applicable law, statute, ordinance or regulation, including but not limited to the laws and regulations governing export control, unfair competition, false advertising, consumer protection, etc.\n
          \n
          represents pornography – any type of pornographic/adult material, including child pornography, or advertisements of pornographic websites;\n
          \n
          represents infringement on copyright, patents, trademarks, trade secrets, or third party's intellectual property or proprietary rights, including pirated computer programs, hacking/phreaking software, warez or any type of software/content (including also ROMs, ROM Emulators, media files – MP3, AVI, .RM, etc., torrent files, and others) that is copyrighted, is NOT uploaded in compliance with its license agreement or is NOT freely available for distribution.\n
          \n
          **4\. COPYRIGHTS**\n
          \n
          Copyrighted material must not be placed on customers' accounts without the explicit permission of the copyright owner or a person explicitly authorized to give such permission by the copyright owner. Upon receipt of a claim for copyright infringement, or a notice of such violation, we will immediately run full investigation and, upon confirmation, will promptly remove the infringing material from the Services. Further procedures (in accordance with our stated below corrective measures) will be carried out if necessary. We will assume no liability to any Customer of the Services for the removal of any such material.\n
          \n
          **5\. CORRECTIVE ACTIONS**\n
          \n
          We reserve our right to be the sole arbiter in determining the seriousness of each infringement and to immediately take corrective actions.\n
          \n
          We will disable the customer's account if we deem necessary, at our sole discretion. Upon closing of the customer’s account we will send an e-mail notification to the customer, stating the reason for the termination and quoting our terms’ chapter that has been violated. The customer will be given an opportunity to respond and take measures to remedy the situation should he/she consider him/herself abused by a third party. Upon fulfilling of this obligation, we may re-activate the customer’s account, if we find, at our own discretion, sufficient evidence pro customer’s side.\n
          \n
          Closed accounts due to repeated violations will not be re-activated. A backup may be requested, however it will be subject to certain penalty fees imposed according to the breach of this AUP terms. The final penalty fee will be determined by the type and frequency of the violations.\n
          \n
          **6\. REPORTING VIOLATIONS**\n
          \n
          If you need to report a violation of this AUP agreement or believe that you or your system has been subject to attack originating from our web hosting system, please contact us immediately. Our professional team will investigate the situation and provide you with full assistance.\n
          \n
          **7\. REVISIONS**\n
          \n
          We reserve our right to change this AUP at any time, without prior notice. We encourage our users to periodically review this Acceptable Use Policy and our Web Hosting Terms of Service.
          """
      ]
      "logo_url" => "https://www.philwebdev.com/billing/logod.svg"
      "languages" => array:2 [
        0 => array:3 [
          "locale" => "en_US"
          "title" => "English(en_US)"
          "name" => "English"
        ]
        1 => array:3 [
          "locale" => "hr_HR"
          "title" => "hr_HR(hr_HR)"
          "name" => "hr_HR"
        ]
      ]
    ]
    
  2. array:6 [
      "meta_title" => array:2 [
        0 => __TwigTemplate_48f67a13f3994ad241545cc961e85472 {#361}
        1 => "block_meta_title"
      ]
      "meta_description" => array:2 [
        0 => __TwigTemplate_114d7837338fd58c992f957ebe1e034b {#343}
        1 => "block_meta_description"
      ]
      "opengraph" => array:2 [
        0 => __TwigTemplate_114d7837338fd58c992f957ebe1e034b {#343}
        1 => "block_opengraph"
      ]
      "head" => array:2 [
        0 => __TwigTemplate_114d7837338fd58c992f957ebe1e034b {#343}
        1 => "block_head"
      ]
      "js" => array:2 [
        0 => __TwigTemplate_48f67a13f3994ad241545cc961e85472 {#361}
        1 => "block_js"
      ]
      "body" => array:2 [
        0 => __TwigTemplate_48f67a13f3994ad241545cc961e85472 {#361}
        1 => "block_body"
      ]
    ]
    
/home/philwebd/public_html/billing/data/cache/ba/ba376a34af7ceaaf6bc723540e6ac9ee.php
    ";
        // line 24
        echo $this->extensions['Box_TwigExtensions']->twig_script_tag($this->extensions['Box_TwigExtensions']->twig_library_url("Api/API.js"));
        echo "
    ";
        // line 25
        echo $this->env->getFunction('encore_entry_script_tags')->getCallable()("huraga");
        echo "
    ";
        // line 26
        $this->displayBlock('head', $context, $blocks);
        // line 27
        echo "    ";
        $this->displayBlock('js', $context, $blocks);
        // line 28
        echo "</head>
<body>
    ";
        // line 30
        $this->displayBlock('body', $context, $blocks);
        // line 31
        echo "    <div aria-live=\"polite\" aria-atomic=\"true\" class=\"position-relative\">
        <div class=\"toast-container position-fixed bottom-0 end-0 p-3\" style=\"z-index: 1070;\"></div>
    </div>
    ";
        // line 34
        $__internal_compile_0 = null;
        try {
            $__internal_compile_0 =             $this->loadTemplate("partial_pending_messages.html.twig", "layout_public.html.twig", 34);
        } catch (LoaderError $e) {
            // ignore missing template
        }
        if ($__internal_compile_0) {
            $__internal_compile_0->display($context);
        }
        // line 35
        echo "</body>
</html>
";
    }
Arguments
  1. "body"
    
  2. array:11 [
      "CSRFToken" => "6921348dc90961df5535dfa8a24e50f2"
      "request" => array:2 [
        "_url" => "/order"
        "product" => "7"
      ]
      "guest" => Api_Handler {#175}
      "FOSSBillingVersion" => "0.6.20"
      "current_theme" => "huraga"
      "settings" => array:57 [
        "CSRFToken" => "3f10ff5d59184687b9efad79ebd8597e"
        "color_scheme" => "green"
        "show_page_header" => "1"
        "show_company_logo" => "1"
        "show_company_name" => "0"
        "show_client_details" => "1"
        "sidebar_balance_enabled" => "1"
        "top_menu_dashboard" => "1"
        "top_menu_profile" => "1"
        "top_menu_signout" => "1"
        "login_page_show_logo" => "1"
        "login_page_logo_url" => "/"
        "show_password_reset_link" => "1"
        "show_signup_link" => "0"
        "login_page_show_remember_me" => "1"
        "show_breadcrumb" => "1"
        "hide_dashboard_breadcrumb" => "1"
        "require_login" => "1"
        "showcase_enabled" => "0"
        "showcase_size" => "3"
        "showcase_text" => "Showcase text"
        "showcase_button_title" => "Showcase button title"
        "showcase_button_url" => "Showcase link URL"
        "side_menu_dashboard" => "1"
        "side_menu_order" => "1"
        "side_menu_support" => "1"
        "side_menu_services" => "1"
        "side_menu_invoices" => "1"
        "side_menu_emails" => "1"
        "side_menu_payments" => "1"
        "side_menu_news" => "1"
        "side_menu_kb" => "1"
        "sidebar_note_enabled" => "0"
        "sidebar_note_title" => "Note title"
        "sidebar_note_content" => "Note content"
        "meta_title" => ""
        "meta_description" => "Members area"
        "meta_keywords" => "members area"
        "meta_robots" => "noindex, nofollow"
        "meta_author" => "PhilWebDev"
        "footer_enabled" => "1"
        "footer_to_top_enabled" => "1"
        "footer_signature" => ""
        "footer_link_1_enabled" => "on"
        "footer_link_1_title" => "About us"
        "footer_link_1_page" => "about-us"
        "footer_link_2_enabled" => "on"
        "footer_link_2_title" => "Terms and conditions"
        "footer_link_2_page" => "tos"
        "footer_link_3_enabled" => "on"
        "footer_link_3_title" => "Privacy policy"
        "footer_link_3_page" => "privacy-policy"
        "footer_link_4_title" => ""
        "footer_link_4_page" => ""
        "footer_link_5_title" => ""
        "footer_link_5_page" => ""
        "inject_javascript" => ""
      ]
      "loader_nr" => "8"
      "loader_url" => "img/assets/loaders/loader8.gif"
      "company" => array:11 [
        "www" => "https://billing.philwebdev.com/"
        "name" => "XWDV Information Technology Solutions"
        "signature" => """
          Regards,\n
          \n
          XWDV Information Technology Solutions\n
          https://www.philwebdev.com\n
          \n
          \n
          """
        "logo_url" => "https://www.philwebdev.com/billing/logod.svg"
        "logo_url_dark" => "https://www.philwebdev.com/billing/logow.svg"
        "favicon_url" => "https://www.philwebdev.com/billing/themes/huraga/assets/favicon.ico"
        "display_bank_info" => "0"
        "bank_info_pagebottom" => null
        "note" => ""
        "privacy_policy" => """
          This Privacy Policy describes the policies and procedures of PhilWebDev Domain and Business Hosting Solution, in association with - LiquidNet US LLC, a US company headquartered in Fort Lauderdale, Florida, and LiquidNet Ltd., a UK company headquartered in London, UK, on the collection, use and disclosure of your information. Legal details about the two companies can be found in the 'Contact Us' section of this document.\n
          \n
          For the sake of brevity, PhilWebDev Domain and Business Hosting Solution, LiquidNet US LLC and LiquidNet Ltd. will be referred to as 'We', 'Us', 'Our' and 'Service Provider' in this document.\n
          \n
          This Privacy Policy does not apply to information our customers may process when using our services.\n
          \n
          \---\n
          \n
          Privacy and security are of utmost importance to the Service Provider and we strive to ensure that our technical and organizational measures in place respect your data protection rights.\n
          \n
          **COLLECTION OF PERSONAL DATA**  \n
          "Personal data" refers to any information relating to an identifiable individual or his or her personal identity.\n
          \n
          Personal data is collected on our website by LiquidNet US LLC., a US company headquartered in Fort Lauderdale, Florida.\n
          \n
          The personally identifiable information that LiquidNet US LLC may collect from you when registering for an account includes: first and last name, postal address, phone number, email and IP address.\n
          \n
          If you want to use your Social Media account as a means to log in to your hosting account, you will also have to provide your Social Media ID.\n
          \n
          Your information will be needed for the following purposes:\n
          \n
          *   provision of our services to you;\n
          *   prevention of fraudulent transactions;\n
          *   billing/invoicing operations;\n
          *   provision of a sales/technical support service;\n
          *   maintenance of your account with us;\n
          *   dispute resolution cases;\n
          *   enforcement of our Terms of Service, or other legal rights, or as may be required by applicable laws and regulations or requested by any judicial process or governmental agency;\n
          *   collection of aggregate statistics about use of our services;\n
          \n
          Much of the data collected is aggregated or statistical data about how individuals use our Services, and is not linked to any personal data, but to the extent it is itself personal data, or is linked or linkable to personal data, we treat it accordingly.\n
          \n
          The Service Provider will NOT send you any unsolicited information, including emails, except as mentioned hereby.\n
          \n
          New customers will receive a welcome email containing information about the features provided by the Service, as well as WHCP (Web Hosting Control Panel) and FTP login details.\n
          \n
          The Service Provider may also send system notifications upon need, related to any upgrade, maintenance or other service issues concerning your hosting account.\n
          \n
          If you contact us directly, we may receive additional information about you such as your name, email address, phone number, the contents of the message and/or attachments you may send us, and any other information you may choose to provide. We may also receive a confirmation when you open an email from us.\n
          \n
          The Service Provider will keep your personally identifiable information private and will NOT share it with any unauthorized third parties.\n
          \n
          When you use our services, we may collect information about your engagement with and utilization of our services, such as processor and memory usage, storage capacity, navigation of our services, and system-level metrics. We use this data to operate the services, maintain and improve the performance and utilization of the services, develop new features, protect the security and safety of our services and our customers, and provide customer support. We also use this data to develop aggregate analysis and business intelligence that enable us to operate, protect, make informed decisions, and report on the performance of our business.\n
          \n
          **LEGAL BASIS FOR PROCESSING OF PERSONAL DATA**  \n
          We collect personal information from you only when:\n
          \n
          you give your consent for us to so,\n
          \n
          we need your personal information to perform a contract with you (e.g. to deliver the services you have requested), or,\n
          \n
          the processing is in our legitimate interests and not overridden by your rights;\n
          \n
          We have a legitimate interest in operating our services and communicating with you as necessary to provide these services, for example when responding to your queries, improving our platform, undertaking marketing, or for the purposes of detecting or preventing illegal activities.\n
          \n
          Please note that in most cases, if you do not submit the requested information, the Service Provider will not be able to provide the requested service to you.\n
          \n
          In some cases, we may also have a legal obligation to collect personal information from you, or may otherwise need that information to protect your vital interests or those of some other person's.\n
          \n
          If we ask you to provide personal information to comply with a legal requirement or to perform a contract with you, we will make this clear at the relevant time and advise you whether the provision of your personal information is mandatory or not (as well as of the possible consequences if you do not provide your personal information).\n
          \n
          **ACCESS TO YOUR PERSONAL DATA**  \n
          You may access and update your personal Information at any time from your Web Hosting Control Panel - > My Account - > Change Contact Details section.\n
          \n
          **SECURITY OF YOUR PERSONAL DATA**  \n
          The Service Provider is committed to protecting the security of customer collected personal information. To do so, we use technical security measures to prevent the loss, misuse, alternation or unauthorized disclosure of information under our control. We use security measures including and not limited to: physical, electronic and managerial procedures to safeguard and secure the information we collect online. However, please keep in mind that the Internet cannot be guaranteed to be 100% secure.\n
          \n
          If the Service Provider learns of a security system breach, we may attempt to notify you and send you any available protective information to the email address that you have provided to us or by posting a notice in your WHCP.\n
          \n
          **SHARING YOUR PERSONAL DATA WITH THIRD PARTIES**  \n
          We may share the information we collect in various ways, including the following:\n
          \n
          _Service Providers_  \n
          We may share information with third-party service providers that provide services on our behalf, such as helping to provide our services and to provide you with information relevant to you such as product announcements, service upgrades, special offers, or other information.\n
          \n
          _As Required By Law and Similar Disclosures_  \n
          We may also share information to (i) satisfy any applicable law, regulation, legal process, or governmental request; (ii) enforce this Privacy Policy and our Terms of Service, including investigation of potential violations hereof; (iii) detect, prevent, or otherwise address fraud, security, or technical issues; (iv) respond to your requests; or (v) protect our rights, property or safety, our users and the public. This includes exchanging information with other companies and organizations for fraud protection and spam/malware prevention.\n
          \n
          **THIRD-PARTY SERVICES**  \n
          You may access other third-party services through our services, for example by clicking on links to those third-party services from within our services. We are not responsible for the privacy policies and/or practices of these third-party services, and we encourage you to carefully review their privacy policies.\n
          \n
          **PRIVACY OF YOUR PAYMENT DETAILS**  \n
          We use third-party payment processing companies who collect and store financial information, such as your payment method (valid credit card number, type, expiration date or other financial information), and their use and storage of that information is governed by the payment processors' applicable terms of service and privacy policy. Collected billing information is used for the purposes of processing payments and fraud detection.\n
          \n
          We do not store your financial account information on our systems; however, we have access to, and may retain, subscriber information through our third-party payment processor.\n
          \n
          All PayPal transactions are subject to the [PayPal Privacy Policy](https://www.paypal.com/en/webapps/mpp/ua/privacy-full).\n
          \n
          **PRIVACY OF YOUR ACCOUNT**  \n
          We consider your registration data and the content of all your messages private and confidential. The header of the messages that you send will contain your name (e-mail address) and Internet Protocol (IP) address. We will not intentionally monitor or disclose any of your e-mail content or registration data unless we are required to do so:\n
          \n
          to enforce these Terms and Conditions,\n
          \n
          by law,\n
          \n
          to defend ourselves in any legal action,\n
          \n
          to protect our property.\n
          \n
          Since your password is essential for protecting your privacy, we encourage you to NOT share it with anyone and change it frequently. Additionally, you agree to respect the privacy and confidentiality of others.\n
          \n
          **AGE RESTRICTIONS**  \n
          We offer services only to people who are 18+. Our services are not targeted to, intended to be consumed by or designed to entice individuals under the age of 18. If we learn that we have collected the personal information of a child under the age of 18, we will take steps to delete that information as soon as possible.\n
          \n
          If you know of or have reason to believe that anyone under the age of 18 has provided us with any personal data, please contact us.\n
          \n
          **LOG FILES**  \n
          We use IP addresses to analyze trends, administer our site and servers, track access, and gather broad demographic information for aggregate use. IP addresses are not linked to personally identifiable information. It is possible that personal information about a customer may be included in the log files due to the normal functions of IP addresses and Web browsing.\n
          \n
          **COOKIES**  \n
          We use different cookies on our website to make it as useful to you as possible. Cookies are small text files that we put on your computer or mobile device to tell us what you want to use on our site but they do not tell us who you are.\n
          \n
          [Here](http://www.aboutcookies.org/) you can learn more about cookies and how to [control](http://www.aboutcookies.org/how-to-control-cookies/) or [delete](http://www.aboutcookies.org/how-to-delete-cookies/) them.\n
          \n
          Here are the cookies that we use on our site:\n
          \n
          _Essential cookies_  \n
          We use a cookie to remember your login for you and what you’ve put in the shop cart. Also, we set a cookie to help you choose a preferred font size for using the site. These cookies we consider essential for the operation of our website.\n
          \n
          _External web services_  \n
          We use an external live chat service (using cookies to remember your session name) to deliver real-time support to you should you want to.\n
          \n
          _Analytics_  \n
          We use Google Analytics and Facebook cookies to monitor visitor activity on our website. No personally identifying data is included in this type of reporting. We do not share information about this analysis with any third parties.\n
          \n
          Visitors can [opt out of Google's advertising tracking cookie](https://policies.google.com/technologies/ads) or [install a browser plugin](https://tools.google.com/dlpage/gaoptout?hl=en) to opt out of all Google Analytics tracking software. More information about Facebook's analytics cookie is available [here](https://www.facebook.com/policies/cookies/?utm_referrer=https://www.cloudflare.com/privacypolicy/).\n
          \n
          We assume you are happy with this usage of cookies on this website. If you are not happy, then you should either not use this site, or delete the cookies (you can check out how to do that according to your browser [here](http://www.aboutcookies.org/how-to-delete-cookies/)), or browse the site using your browser’s anonymous usage setting (named “Incognito” in Chrome, “InPrivate” for Internet Explorer, "Private Browsing" in Firefox and Safari etc.).\n
          \n
          We currently do not alter our practices when we receive a "Do Not Track" signal from a visitor's browser.\n
          \n
          Please remember that if you choose to delete the cookies or use the browser anonymously, you may find that certain sections of this website do not work properly.\n
          \n
          **YOUR RIGHTS UNDER THE GENERAL DATA PROTECTION REGULATION (GDPR)**\n
          \n
          If you are a resident of the European Economic Area (EEA), you have the following data protection rights:\n
          \n
          _Managing Your Information_  \n
          You may access and update some of your information through the "Change Contact Details" section in the WHCP. If you have chosen to connect your account to a third-party application like Facebook, Google or Twitter, you can change your settings and remove permission for the app from the "Linked Social Accounts" section in the WHCP. You are responsible for keeping your personal information up to date.\n
          \n
          _Rectification of Inaccurate or Incomplete Information_  \n
          You have the right to ask us to correct any inaccurate or incomplete personal information concerning you if you cannot update it yourself from within your account.\n
          \n
          _Data Access and Portability_  \n
          In some jurisdictions, the applicable law may entitle you to request copies of your personal information held by us. You may also be entitled to request copies of personal information that you have provided to us in a structured, commonly used, and machine-readable format and/or request us to transmit this information to another service provider (where technically feasible).\n
          \n
          _Opt-out of marketing communications_  \n
          You have the right to opt-out of marketing communications we send you at any time. You can exercise this right by clicking on the "unsubscribe" or "opt-out" link in the marketing emails we send you.\n
          \n
          _Data Retention and Erasure_  \n
          We generally retain your personal information for as long as is necessary for the performance of the contract between you and us and to comply with our legal obligations. If you no longer want us to use your information to provide the contracted services to you, you can request that we erase your personal information and close your account. Please note that if you request the erasure of your personal information:\n
          \n
          We may retain some of your personal information so as to detect and prevent fraud and enhance safety. For example, if we suspend an account for security reasons, we may retain certain information from that account to prevent that customer from opening a new account in the future.\n
          \n
          We may retain and use your personal information to the extent necessary to comply with our legal obligations. For example, we may keep some of your information for tax, legal reporting and auditing purposes.\n
          \n
          Because we maintain our platform to protect it from accidental or malicious loss and destruction, residual copies of your personal information may not be removed from our backup systems for a limited period of time.\n
          \n
          In cases where fraudulent or otherwise illegal activity has been deemed to have occurred as determined by law enforcement or management, the information may remain in our database indefinitely in order to help facilitate the prevention of repeated abuse in the future from the offending party.\n
          \n
          _Withdrawing Consent and Restriction of Processing_  \n
          If you have provided your consent to the processing of your personal information, you may withdraw it at any time by sending us a communication specifying which consent you are withdrawing. Please note that the withdrawal of your consent does not affect the lawfulness of any processing activities based on such consent before its withdrawal. Additionally, in some jurisdictions, applicable law may give you the right to limit the ways in which we use your personal information, in particular where (i) you contest the accuracy of your personal information; (ii) the processing is unlawful and you oppose the erasure of your personal information; (iii) we no longer need your personal information for the purposes of the processing, but you require the information for the establishment, exercise or defence of legal claims; or (iv) you have objected to the processing and pending the verification whether the Service Provider's legitimate grounds override your own.\n
          \n
          _Objection to Processing_  \n
          In some jurisdictions, applicable law may entitle you to require us not to process your personal information for certain specific purposes (including profiling) where such processing is based on legitimate interest. If you object to such processing, we will no longer process your personal information for these purposes unless we can demonstrate compelling legitimate grounds for such processing or such processing is required for the establishment, exercise or defence of legal claims.\n
          \n
          By default, customers do receive any system updates, such as the newsletters, invoices and service email notifications. Customers cannot opt out of possibly receiving important system notifications, since the latter are deemed necessary for the performance of our contractual obligations to you.\n
          \n
          _Lodging Complaints_  \n
          If you want to make a complaint about the way we are processing your data, you can contact us using the contact details below.\n
          \n
          You have the right to complain to a data protection authority about our collection and use of your personal information. For more information, please contact your local data protection authority.\n
          \n
          \---\n
          \n
          We respond to all requests we receive from individuals wishing to exercise their data protection rights in accordance with applicable data protection laws.\n
          \n
          **INTERNATIONAL TRANSFERS OF INFORMATION WE COLLECT**  \n
          We collect information globally and primarily store that information in the United States. We transfer, process and store your information outside of your country of residence. Whenever we transfer your information, we take steps to protect it.\n
          \n
          To facilitate our global operations, we transfer information to the United States and allow access to that information from countries in which we and associated companies have operations for the purposes described in this policy. These countries may not have equivalent privacy and data protection laws, certainly not equivalent to the laws of many of the countries where our customers and users are based. When we share information about you, we make use of Standard Contractual Clauses (SCCs) for data transfers between EU and non-EU countries, which have been approved by the European Commission.\n
          \n
          A copy of your personal data will also be stored in the data center you have selected when signing up for our services. This is done so that the Service Provider can deliver the contracted service in the location specified by the customer.\n
          \n
          **COMPLIANCE WITH LAWS AND LAW ENFORCEMENT**  \n
          The Service Provider cooperates with government and law enforcement officials to enforce and comply with the law. We will disclose any information about Users upon valid request by government or law officials as we, in our sole discretion, believe necessary or appropriate to respond to claims and legal process (including without limitation subpoenas), to protect your property and rights, or the property and rights of a third party, to protect the safety of the public or any person, or stop activity we consider illegal or unethical.\n
          \n
          **CHANGES TO PRIVACY POLICY**  \n
          Any changes to our Privacy Policy will be placed here and will supersede this version of our Policy. We will take reasonable steps to draw your attention to any changes in our Policy. However, to be on the safe side, we suggest that you read this document each time you use the website to ensure that it still meets with your approval.\n
          \n
          **CONTACT US**  \n
          If you have any questions about our Privacy Policy, or if you want to know what information we have collected about you, please use our Contact Us form.\n
          \n
          Postal Address:\n
          \n
          LiquidNet US LLC  \n
          6750 North Andrews Ave  \n
          Suite 200  \n
          Fort Lauderdale, FL 33309  \n
          United States of America\n
          \n
          LiquidNet Ltd.  \n
          13 Craigleith  \n
          7 Kersfield Road  \n
          Putney, London SW15 3HN  \n
          United Kingdom
          """
        "tos" => """
          An Acceptable Use Policy (AUP) is a set of rules and conditions compiled by a network, system, or a website owner. These rules explicitly define and restrict the ways in which the respective network, system or website may be used.\n
          \n
          The **AUP of the Service Provider** aims to clearly outline the purposes for which our customers CANNOT utilize our hosting services and position data on our network servers.\n
          \n
          This Acceptable Use Policy (AUP) is an integral part of the [Web Hosting Terms of Service](https://www.philwebdev.com/terms-and-conditions-2/web-hosting-terms-of-service-3/) which each customer agrees to abide by when signing up for an account with our web hosting company. Any violation of this AUP will be deemed a violation of our Web Hosting Terms of Service.\n
          \n
          We, at our own discretion, shall determine whether an act constitutes a breach of this AUP terms and misuse of our services. We reserve our right to be the sole arbiter in determining the sufficiency of the presented evidences. We will respond accordingly, and/or immediately terminate the provision of the services, shall we receive the report, and/or have sufficient proof, of any prohibited conduct outlined in this AUP, or any other activity threatening the security of our hosting environment and/or our network of hosting servers.\n
          \n
          In order to protect our company’s reputation and responsibilities, and guarantee state-of-the-art and reliable hosting services to all our customers, as well as privacy and security for all users, we – the Service Provider - hereby outline the following AUP rules and conditions to come into force for each customer signing up for a web hosting account with our company:\n
          \n
          1\. [System Abuse](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#SYSTEM_ABUSE)\n
          \n
          2\. [Spam and Spamvertizing](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#SPAM_AND_SPAMVERTIZING)\n
          \n
          3\. [Inappropriate or Unlawful Content](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#INAPPROPRIATE_OR_UNLAWFUL_CONTENT_)\n
          \n
          4\. [Copyrights](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#COPYRIGHTS)\n
          \n
          5\. [Corrective Actions](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#CORRECTIVE_ACTIONS)\n
          \n
          6\. [Reporting Violtaions](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#REPORTING_VIOLATIONS)\n
          \n
          7\. [Revisions](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#REVISIONS)\n
          \n
          **1\. SYSTEM ABUSE**\n
          \n
          Any customer in violation of our system or network security is subject to criminal and civil liability, as well as immediate account termination. Examples include, but are not limited to the following:\n
          \n
          Unauthorized access, use, probe, or scan of our system’s security, authentication measures, data, or traffic. Interference with the service to any user, host or network including, but not limited to: e-mail bombing, flooding, deliberate attempts to overload the system and broadcast attacks, forging of any TCP/IP packet header or any part of the header information in an e-mail or newsgroup posting.\n
          \n
          Any attempt at doing harm to a server or a customer of our web hosting services:\n
          \n
          the Service Provider will immediately and resolutely react to any attempt at misuse of an Internet account or computer, or any attempt to gain access to an Internet account or computer by a Service Provider's customer unauthorized by the account/computer owner. Such attempts include, but are not limited to the following: 'Internet scamming' (tricking other people into releasing their passwords, etc.), password robbery, security hole scanning, running proxy - proxy lists and any kind of proxy scripts (including, but not limited to PHP proxy and mph proxy), introducing of any computer programs (viruses, Trojan horses, trap doors, back doors, worms, time bombs, packet bombs, cancelbots, etc.) that are intended to negatively interfere with, intercept, irreversibly damage or take hold of any system, data or personal information. It WILL NOT matter whether the attacked account or computer belongs or not to the Service Provider's services. The fraud will be subject to actions based on the very nature of the attack and those may represent a warning, an account suspension or cancellation, and/or civil or criminal legal actions.\n
          \n
          Background operations/programs on servers:\n
          \n
          ‘Background process’ is a program that runs in the background of the operating system. What is specific for a background process is that, once started, it runs simultaneously with other foreground processes. This means that, the shell executing the background operation does not wait for it to finish or terminate, as it does with foreground processes, but is free to start executing more operations along with the background one. Typical background processes are ircd, irc bot, bnc, and many others.\n
          \n
          Background processes are not permitted on any of our shared hosting servers, as they usually lead to CPU overload and can be used for malicious and/or illegal actions. As our primary task is to provide highest quality web hosting service to all our customers, we cannot permit any background processes to be executed and threaten the performance of our server network. Our shared hosting system does not allow a big multitude of users to simultaneously use the system memory and processing time of our servers.\n
          \n
          Excessive use of system resources:\n
          \n
          In order to ensure higher server performance and quality of hosting service all shared hosting plans are subject to certain resource limitations concerning, but not limited to, server CPU usage, Memory usage, disk-space and traffic. If a hosting account exceeds the allowed amount of system resources the account owner will be immediately notified to take actions in order to reduce the usage. If such action is not instantly taken by the owner the account will be suspended. If an excessive CPU usage is detected the account owner will be suggested to place an order for a CPU usage upgrade or upgrade to a plan which allows higher CPU usage.\n
          \n
          If any hosting account is found to be causing degradation of the server and/or our hosting network’s performance, regardless of the reason, the account will be subject to suspension or immediate removal, depending on the situation. The Service Provider will be the sole arbiter in determining whether a given account is excessively using the server resources and/or causing a server degradation.\n
          \n
          **2\. SPAM AND SPAMVERTIZING**\n
          \n
          SPAMMING IS PROHIBITED. Users MAY NOT utilize our web hosting services to transmit, distribute or deliver any unsolicited bulk or commercial messages over the Internet (an action known as "spam" or "spamming").\n
          \n
          Spamming is a violation of ethic norms and will be interpreted as an infringement. the Service Provider will not tolerate the sending of unsolicited bulk or commercial messages through our services, as well as through another service that is mentioning, in some way, our customer’s domain name or implies the utilization of our network or our e-mail services for sending the unsolicited bulk or messages.\n
          \n
          SPAMVERTISING IS PROHIBITED. 'Spamvertizing’ refers to the practice of sending unsolicited spam messages for the purpose of advertising a particular website.\n
          \n
          If such e-mails are relayed through 3rd party (e-mail spoofing) and/or are promoting a domain hosted on our servers, this will lead to immediate account suspension unless an evidence of legitimacy for non-involvement of the domain owner in the particular illegal action is provided.\n
          \n
          ’E-mail spoofing’ is a fraudulent e-mail activity in which the sender’s (3td party) e-mail address and other parts of the e-mail header are changed so as to appear that the e-mail has been sent from a different source (e-mail address owner/server).\n
          \n
          'Unsolicited message’ is a message that is sent against the privacy policy of a newsgroup, or is sent to a recipient without their explicit permission. We, at our sole discretion, shall determine whether any of the messages you are sending is spam or spamvertizing. For your information, spamming generally includes, but is not limited to the following\n
          \n
          Sending of unsolicited messages in bulk, or sending of unsolicited e-mails, which provoke complaints from recipients;\n
          \n
          Sending of junk mail;\n
          \n
          Use of distribution lists that include people who have not given prior explicit permission to be involved in such a distribution process;\n
          \n
          Posting commercial ads to USENET newsgroups that do not permit it;\n
          \n
          Posting articles containing binary encoded data to non-binary newsgroups;\n
          \n
          Excessive and repeated posting of off-topic messages to newsgroups;\n
          \n
          Excessive and repeated cross-posting;\n
          \n
          E-mail harassment of another Internet Customer or Customers, including but not limited to, transmitting of any threatening, libellous or obscene material, or material of any nature that may be deemed offensive;\n
          \n
          E-mailing of age-inappropriate communications or content to anyone under the age of 18.\n
          \n
          **3\. INAPPROPRIATE OR UNLAWFUL CONTENT**\n
          \n
          CONTENT published or transmitted via the Service Provider’s hosting services includes website content, email content, forum/blog postings, chat content, and/or any other type of content hosted on our servers, published online or transmitted through our network’s services.\n
          \n
          The user of our services is NOT permitted to post online content or have links to content that:\n
          \n
          is defamatory, abusive or obscene, violates a person’s reputation/privacy, is reasonably deemed offensive by the web community, is anti-religious or anti-human rights, or contains any type of threatening or hate speech, encourages harassment or physical harm to any group or individual, or is otherwise malicious/fraudulent and may result in complaints/liabilities/or retaliation against the Service Provider by offended viewers;\n
          \n
          promotes or encourages illegal activities (e.g. illegal drugs, illegal gambling, arms trafficking, etc.) or violates any applicable law, statute, ordinance or regulation, including but not limited to the laws and regulations governing export control, unfair competition, false advertising, consumer protection, etc.\n
          \n
          represents pornography – any type of pornographic/adult material, including child pornography, or advertisements of pornographic websites;\n
          \n
          represents infringement on copyright, patents, trademarks, trade secrets, or third party's intellectual property or proprietary rights, including pirated computer programs, hacking/phreaking software, warez or any type of software/content (including also ROMs, ROM Emulators, media files – MP3, AVI, .RM, etc., torrent files, and others) that is copyrighted, is NOT uploaded in compliance with its license agreement or is NOT freely available for distribution.\n
          \n
          **4\. COPYRIGHTS**\n
          \n
          Copyrighted material must not be placed on customers' accounts without the explicit permission of the copyright owner or a person explicitly authorized to give such permission by the copyright owner. Upon receipt of a claim for copyright infringement, or a notice of such violation, we will immediately run full investigation and, upon confirmation, will promptly remove the infringing material from the Services. Further procedures (in accordance with our stated below corrective measures) will be carried out if necessary. We will assume no liability to any Customer of the Services for the removal of any such material.\n
          \n
          **5\. CORRECTIVE ACTIONS**\n
          \n
          We reserve our right to be the sole arbiter in determining the seriousness of each infringement and to immediately take corrective actions.\n
          \n
          We will disable the customer's account if we deem necessary, at our sole discretion. Upon closing of the customer’s account we will send an e-mail notification to the customer, stating the reason for the termination and quoting our terms’ chapter that has been violated. The customer will be given an opportunity to respond and take measures to remedy the situation should he/she consider him/herself abused by a third party. Upon fulfilling of this obligation, we may re-activate the customer’s account, if we find, at our own discretion, sufficient evidence pro customer’s side.\n
          \n
          Closed accounts due to repeated violations will not be re-activated. A backup may be requested, however it will be subject to certain penalty fees imposed according to the breach of this AUP terms. The final penalty fee will be determined by the type and frequency of the violations.\n
          \n
          **6\. REPORTING VIOLATIONS**\n
          \n
          If you need to report a violation of this AUP agreement or believe that you or your system has been subject to attack originating from our web hosting system, please contact us immediately. Our professional team will investigate the situation and provide you with full assistance.\n
          \n
          **7\. REVISIONS**\n
          \n
          We reserve our right to change this AUP at any time, without prior notice. We encourage our users to periodically review this Acceptable Use Policy and our Web Hosting Terms of Service.
          """
      ]
      "logo_url" => "https://www.philwebdev.com/billing/logod.svg"
      "languages" => array:2 [
        0 => array:3 [
          "locale" => "en_US"
          "title" => "English(en_US)"
          "name" => "English"
        ]
        1 => array:3 [
          "locale" => "hr_HR"
          "title" => "hr_HR(hr_HR)"
          "name" => "hr_HR"
        ]
      ]
    ]
    
  3. array:6 [
      "meta_title" => array:2 [
        0 => __TwigTemplate_48f67a13f3994ad241545cc961e85472 {#361}
        1 => "block_meta_title"
      ]
      "meta_description" => array:2 [
        0 => __TwigTemplate_114d7837338fd58c992f957ebe1e034b {#343}
        1 => "block_meta_description"
      ]
      "opengraph" => array:2 [
        0 => __TwigTemplate_114d7837338fd58c992f957ebe1e034b {#343}
        1 => "block_opengraph"
      ]
      "head" => array:2 [
        0 => __TwigTemplate_114d7837338fd58c992f957ebe1e034b {#343}
        1 => "block_head"
      ]
      "js" => array:2 [
        0 => __TwigTemplate_48f67a13f3994ad241545cc961e85472 {#361}
        1 => "block_js"
      ]
      "body" => array:2 [
        0 => __TwigTemplate_48f67a13f3994ad241545cc961e85472 {#361}
        1 => "block_body"
      ]
    ]
    
/home/philwebd/public_html/billing/vendor/twig/twig/src/Template.php
        } else {
            ob_start(function () { return ''; });
        }
        try {
            $this->display($context);
        } catch (\Throwable $e) {
            while (ob_get_level() > $level) {
                ob_end_clean();
            }
 
            throw $e;
        }
 
        return ob_get_clean();
    }
 
    protected function displayWithErrorHandling(array $context, array $blocks = [])
    {
        try {
            $this->doDisplay($context, $blocks);
        } catch (Error $e) {
            if (!$e->getSourceContext()) {
                $e->setSourceContext($this->getSourceContext());
            }
 
            // this is mostly useful for \Twig\Error\LoaderError exceptions
            // see \Twig\Error\LoaderError
            if (-1 === $e->getTemplateLine()) {
                $e->guess();
            }
 
            throw $e;
        } catch (\Throwable $e) {
            $e = new RuntimeError(sprintf('An exception has been thrown during the rendering of a template ("%s").', $e->getMessage()), -1, $this->getSourceContext(), $e);
            $e->guess();
 
            throw $e;
        }
    }
 
Arguments
  1. array:11 [
      "CSRFToken" => "6921348dc90961df5535dfa8a24e50f2"
      "request" => array:2 [
        "_url" => "/order"
        "product" => "7"
      ]
      "guest" => Api_Handler {#175}
      "FOSSBillingVersion" => "0.6.20"
      "current_theme" => "huraga"
      "settings" => array:57 [
        "CSRFToken" => "3f10ff5d59184687b9efad79ebd8597e"
        "color_scheme" => "green"
        "show_page_header" => "1"
        "show_company_logo" => "1"
        "show_company_name" => "0"
        "show_client_details" => "1"
        "sidebar_balance_enabled" => "1"
        "top_menu_dashboard" => "1"
        "top_menu_profile" => "1"
        "top_menu_signout" => "1"
        "login_page_show_logo" => "1"
        "login_page_logo_url" => "/"
        "show_password_reset_link" => "1"
        "show_signup_link" => "0"
        "login_page_show_remember_me" => "1"
        "show_breadcrumb" => "1"
        "hide_dashboard_breadcrumb" => "1"
        "require_login" => "1"
        "showcase_enabled" => "0"
        "showcase_size" => "3"
        "showcase_text" => "Showcase text"
        "showcase_button_title" => "Showcase button title"
        "showcase_button_url" => "Showcase link URL"
        "side_menu_dashboard" => "1"
        "side_menu_order" => "1"
        "side_menu_support" => "1"
        "side_menu_services" => "1"
        "side_menu_invoices" => "1"
        "side_menu_emails" => "1"
        "side_menu_payments" => "1"
        "side_menu_news" => "1"
        "side_menu_kb" => "1"
        "sidebar_note_enabled" => "0"
        "sidebar_note_title" => "Note title"
        "sidebar_note_content" => "Note content"
        "meta_title" => ""
        "meta_description" => "Members area"
        "meta_keywords" => "members area"
        "meta_robots" => "noindex, nofollow"
        "meta_author" => "PhilWebDev"
        "footer_enabled" => "1"
        "footer_to_top_enabled" => "1"
        "footer_signature" => ""
        "footer_link_1_enabled" => "on"
        "footer_link_1_title" => "About us"
        "footer_link_1_page" => "about-us"
        "footer_link_2_enabled" => "on"
        "footer_link_2_title" => "Terms and conditions"
        "footer_link_2_page" => "tos"
        "footer_link_3_enabled" => "on"
        "footer_link_3_title" => "Privacy policy"
        "footer_link_3_page" => "privacy-policy"
        "footer_link_4_title" => ""
        "footer_link_4_page" => ""
        "footer_link_5_title" => ""
        "footer_link_5_page" => ""
        "inject_javascript" => ""
      ]
      "loader_nr" => "8"
      "loader_url" => "img/assets/loaders/loader8.gif"
      "company" => array:11 [
        "www" => "https://billing.philwebdev.com/"
        "name" => "XWDV Information Technology Solutions"
        "signature" => """
          Regards,\n
          \n
          XWDV Information Technology Solutions\n
          https://www.philwebdev.com\n
          \n
          \n
          """
        "logo_url" => "https://www.philwebdev.com/billing/logod.svg"
        "logo_url_dark" => "https://www.philwebdev.com/billing/logow.svg"
        "favicon_url" => "https://www.philwebdev.com/billing/themes/huraga/assets/favicon.ico"
        "display_bank_info" => "0"
        "bank_info_pagebottom" => null
        "note" => ""
        "privacy_policy" => """
          This Privacy Policy describes the policies and procedures of PhilWebDev Domain and Business Hosting Solution, in association with - LiquidNet US LLC, a US company headquartered in Fort Lauderdale, Florida, and LiquidNet Ltd., a UK company headquartered in London, UK, on the collection, use and disclosure of your information. Legal details about the two companies can be found in the 'Contact Us' section of this document.\n
          \n
          For the sake of brevity, PhilWebDev Domain and Business Hosting Solution, LiquidNet US LLC and LiquidNet Ltd. will be referred to as 'We', 'Us', 'Our' and 'Service Provider' in this document.\n
          \n
          This Privacy Policy does not apply to information our customers may process when using our services.\n
          \n
          \---\n
          \n
          Privacy and security are of utmost importance to the Service Provider and we strive to ensure that our technical and organizational measures in place respect your data protection rights.\n
          \n
          **COLLECTION OF PERSONAL DATA**  \n
          "Personal data" refers to any information relating to an identifiable individual or his or her personal identity.\n
          \n
          Personal data is collected on our website by LiquidNet US LLC., a US company headquartered in Fort Lauderdale, Florida.\n
          \n
          The personally identifiable information that LiquidNet US LLC may collect from you when registering for an account includes: first and last name, postal address, phone number, email and IP address.\n
          \n
          If you want to use your Social Media account as a means to log in to your hosting account, you will also have to provide your Social Media ID.\n
          \n
          Your information will be needed for the following purposes:\n
          \n
          *   provision of our services to you;\n
          *   prevention of fraudulent transactions;\n
          *   billing/invoicing operations;\n
          *   provision of a sales/technical support service;\n
          *   maintenance of your account with us;\n
          *   dispute resolution cases;\n
          *   enforcement of our Terms of Service, or other legal rights, or as may be required by applicable laws and regulations or requested by any judicial process or governmental agency;\n
          *   collection of aggregate statistics about use of our services;\n
          \n
          Much of the data collected is aggregated or statistical data about how individuals use our Services, and is not linked to any personal data, but to the extent it is itself personal data, or is linked or linkable to personal data, we treat it accordingly.\n
          \n
          The Service Provider will NOT send you any unsolicited information, including emails, except as mentioned hereby.\n
          \n
          New customers will receive a welcome email containing information about the features provided by the Service, as well as WHCP (Web Hosting Control Panel) and FTP login details.\n
          \n
          The Service Provider may also send system notifications upon need, related to any upgrade, maintenance or other service issues concerning your hosting account.\n
          \n
          If you contact us directly, we may receive additional information about you such as your name, email address, phone number, the contents of the message and/or attachments you may send us, and any other information you may choose to provide. We may also receive a confirmation when you open an email from us.\n
          \n
          The Service Provider will keep your personally identifiable information private and will NOT share it with any unauthorized third parties.\n
          \n
          When you use our services, we may collect information about your engagement with and utilization of our services, such as processor and memory usage, storage capacity, navigation of our services, and system-level metrics. We use this data to operate the services, maintain and improve the performance and utilization of the services, develop new features, protect the security and safety of our services and our customers, and provide customer support. We also use this data to develop aggregate analysis and business intelligence that enable us to operate, protect, make informed decisions, and report on the performance of our business.\n
          \n
          **LEGAL BASIS FOR PROCESSING OF PERSONAL DATA**  \n
          We collect personal information from you only when:\n
          \n
          you give your consent for us to so,\n
          \n
          we need your personal information to perform a contract with you (e.g. to deliver the services you have requested), or,\n
          \n
          the processing is in our legitimate interests and not overridden by your rights;\n
          \n
          We have a legitimate interest in operating our services and communicating with you as necessary to provide these services, for example when responding to your queries, improving our platform, undertaking marketing, or for the purposes of detecting or preventing illegal activities.\n
          \n
          Please note that in most cases, if you do not submit the requested information, the Service Provider will not be able to provide the requested service to you.\n
          \n
          In some cases, we may also have a legal obligation to collect personal information from you, or may otherwise need that information to protect your vital interests or those of some other person's.\n
          \n
          If we ask you to provide personal information to comply with a legal requirement or to perform a contract with you, we will make this clear at the relevant time and advise you whether the provision of your personal information is mandatory or not (as well as of the possible consequences if you do not provide your personal information).\n
          \n
          **ACCESS TO YOUR PERSONAL DATA**  \n
          You may access and update your personal Information at any time from your Web Hosting Control Panel - > My Account - > Change Contact Details section.\n
          \n
          **SECURITY OF YOUR PERSONAL DATA**  \n
          The Service Provider is committed to protecting the security of customer collected personal information. To do so, we use technical security measures to prevent the loss, misuse, alternation or unauthorized disclosure of information under our control. We use security measures including and not limited to: physical, electronic and managerial procedures to safeguard and secure the information we collect online. However, please keep in mind that the Internet cannot be guaranteed to be 100% secure.\n
          \n
          If the Service Provider learns of a security system breach, we may attempt to notify you and send you any available protective information to the email address that you have provided to us or by posting a notice in your WHCP.\n
          \n
          **SHARING YOUR PERSONAL DATA WITH THIRD PARTIES**  \n
          We may share the information we collect in various ways, including the following:\n
          \n
          _Service Providers_  \n
          We may share information with third-party service providers that provide services on our behalf, such as helping to provide our services and to provide you with information relevant to you such as product announcements, service upgrades, special offers, or other information.\n
          \n
          _As Required By Law and Similar Disclosures_  \n
          We may also share information to (i) satisfy any applicable law, regulation, legal process, or governmental request; (ii) enforce this Privacy Policy and our Terms of Service, including investigation of potential violations hereof; (iii) detect, prevent, or otherwise address fraud, security, or technical issues; (iv) respond to your requests; or (v) protect our rights, property or safety, our users and the public. This includes exchanging information with other companies and organizations for fraud protection and spam/malware prevention.\n
          \n
          **THIRD-PARTY SERVICES**  \n
          You may access other third-party services through our services, for example by clicking on links to those third-party services from within our services. We are not responsible for the privacy policies and/or practices of these third-party services, and we encourage you to carefully review their privacy policies.\n
          \n
          **PRIVACY OF YOUR PAYMENT DETAILS**  \n
          We use third-party payment processing companies who collect and store financial information, such as your payment method (valid credit card number, type, expiration date or other financial information), and their use and storage of that information is governed by the payment processors' applicable terms of service and privacy policy. Collected billing information is used for the purposes of processing payments and fraud detection.\n
          \n
          We do not store your financial account information on our systems; however, we have access to, and may retain, subscriber information through our third-party payment processor.\n
          \n
          All PayPal transactions are subject to the [PayPal Privacy Policy](https://www.paypal.com/en/webapps/mpp/ua/privacy-full).\n
          \n
          **PRIVACY OF YOUR ACCOUNT**  \n
          We consider your registration data and the content of all your messages private and confidential. The header of the messages that you send will contain your name (e-mail address) and Internet Protocol (IP) address. We will not intentionally monitor or disclose any of your e-mail content or registration data unless we are required to do so:\n
          \n
          to enforce these Terms and Conditions,\n
          \n
          by law,\n
          \n
          to defend ourselves in any legal action,\n
          \n
          to protect our property.\n
          \n
          Since your password is essential for protecting your privacy, we encourage you to NOT share it with anyone and change it frequently. Additionally, you agree to respect the privacy and confidentiality of others.\n
          \n
          **AGE RESTRICTIONS**  \n
          We offer services only to people who are 18+. Our services are not targeted to, intended to be consumed by or designed to entice individuals under the age of 18. If we learn that we have collected the personal information of a child under the age of 18, we will take steps to delete that information as soon as possible.\n
          \n
          If you know of or have reason to believe that anyone under the age of 18 has provided us with any personal data, please contact us.\n
          \n
          **LOG FILES**  \n
          We use IP addresses to analyze trends, administer our site and servers, track access, and gather broad demographic information for aggregate use. IP addresses are not linked to personally identifiable information. It is possible that personal information about a customer may be included in the log files due to the normal functions of IP addresses and Web browsing.\n
          \n
          **COOKIES**  \n
          We use different cookies on our website to make it as useful to you as possible. Cookies are small text files that we put on your computer or mobile device to tell us what you want to use on our site but they do not tell us who you are.\n
          \n
          [Here](http://www.aboutcookies.org/) you can learn more about cookies and how to [control](http://www.aboutcookies.org/how-to-control-cookies/) or [delete](http://www.aboutcookies.org/how-to-delete-cookies/) them.\n
          \n
          Here are the cookies that we use on our site:\n
          \n
          _Essential cookies_  \n
          We use a cookie to remember your login for you and what you’ve put in the shop cart. Also, we set a cookie to help you choose a preferred font size for using the site. These cookies we consider essential for the operation of our website.\n
          \n
          _External web services_  \n
          We use an external live chat service (using cookies to remember your session name) to deliver real-time support to you should you want to.\n
          \n
          _Analytics_  \n
          We use Google Analytics and Facebook cookies to monitor visitor activity on our website. No personally identifying data is included in this type of reporting. We do not share information about this analysis with any third parties.\n
          \n
          Visitors can [opt out of Google's advertising tracking cookie](https://policies.google.com/technologies/ads) or [install a browser plugin](https://tools.google.com/dlpage/gaoptout?hl=en) to opt out of all Google Analytics tracking software. More information about Facebook's analytics cookie is available [here](https://www.facebook.com/policies/cookies/?utm_referrer=https://www.cloudflare.com/privacypolicy/).\n
          \n
          We assume you are happy with this usage of cookies on this website. If you are not happy, then you should either not use this site, or delete the cookies (you can check out how to do that according to your browser [here](http://www.aboutcookies.org/how-to-delete-cookies/)), or browse the site using your browser’s anonymous usage setting (named “Incognito” in Chrome, “InPrivate” for Internet Explorer, "Private Browsing" in Firefox and Safari etc.).\n
          \n
          We currently do not alter our practices when we receive a "Do Not Track" signal from a visitor's browser.\n
          \n
          Please remember that if you choose to delete the cookies or use the browser anonymously, you may find that certain sections of this website do not work properly.\n
          \n
          **YOUR RIGHTS UNDER THE GENERAL DATA PROTECTION REGULATION (GDPR)**\n
          \n
          If you are a resident of the European Economic Area (EEA), you have the following data protection rights:\n
          \n
          _Managing Your Information_  \n
          You may access and update some of your information through the "Change Contact Details" section in the WHCP. If you have chosen to connect your account to a third-party application like Facebook, Google or Twitter, you can change your settings and remove permission for the app from the "Linked Social Accounts" section in the WHCP. You are responsible for keeping your personal information up to date.\n
          \n
          _Rectification of Inaccurate or Incomplete Information_  \n
          You have the right to ask us to correct any inaccurate or incomplete personal information concerning you if you cannot update it yourself from within your account.\n
          \n
          _Data Access and Portability_  \n
          In some jurisdictions, the applicable law may entitle you to request copies of your personal information held by us. You may also be entitled to request copies of personal information that you have provided to us in a structured, commonly used, and machine-readable format and/or request us to transmit this information to another service provider (where technically feasible).\n
          \n
          _Opt-out of marketing communications_  \n
          You have the right to opt-out of marketing communications we send you at any time. You can exercise this right by clicking on the "unsubscribe" or "opt-out" link in the marketing emails we send you.\n
          \n
          _Data Retention and Erasure_  \n
          We generally retain your personal information for as long as is necessary for the performance of the contract between you and us and to comply with our legal obligations. If you no longer want us to use your information to provide the contracted services to you, you can request that we erase your personal information and close your account. Please note that if you request the erasure of your personal information:\n
          \n
          We may retain some of your personal information so as to detect and prevent fraud and enhance safety. For example, if we suspend an account for security reasons, we may retain certain information from that account to prevent that customer from opening a new account in the future.\n
          \n
          We may retain and use your personal information to the extent necessary to comply with our legal obligations. For example, we may keep some of your information for tax, legal reporting and auditing purposes.\n
          \n
          Because we maintain our platform to protect it from accidental or malicious loss and destruction, residual copies of your personal information may not be removed from our backup systems for a limited period of time.\n
          \n
          In cases where fraudulent or otherwise illegal activity has been deemed to have occurred as determined by law enforcement or management, the information may remain in our database indefinitely in order to help facilitate the prevention of repeated abuse in the future from the offending party.\n
          \n
          _Withdrawing Consent and Restriction of Processing_  \n
          If you have provided your consent to the processing of your personal information, you may withdraw it at any time by sending us a communication specifying which consent you are withdrawing. Please note that the withdrawal of your consent does not affect the lawfulness of any processing activities based on such consent before its withdrawal. Additionally, in some jurisdictions, applicable law may give you the right to limit the ways in which we use your personal information, in particular where (i) you contest the accuracy of your personal information; (ii) the processing is unlawful and you oppose the erasure of your personal information; (iii) we no longer need your personal information for the purposes of the processing, but you require the information for the establishment, exercise or defence of legal claims; or (iv) you have objected to the processing and pending the verification whether the Service Provider's legitimate grounds override your own.\n
          \n
          _Objection to Processing_  \n
          In some jurisdictions, applicable law may entitle you to require us not to process your personal information for certain specific purposes (including profiling) where such processing is based on legitimate interest. If you object to such processing, we will no longer process your personal information for these purposes unless we can demonstrate compelling legitimate grounds for such processing or such processing is required for the establishment, exercise or defence of legal claims.\n
          \n
          By default, customers do receive any system updates, such as the newsletters, invoices and service email notifications. Customers cannot opt out of possibly receiving important system notifications, since the latter are deemed necessary for the performance of our contractual obligations to you.\n
          \n
          _Lodging Complaints_  \n
          If you want to make a complaint about the way we are processing your data, you can contact us using the contact details below.\n
          \n
          You have the right to complain to a data protection authority about our collection and use of your personal information. For more information, please contact your local data protection authority.\n
          \n
          \---\n
          \n
          We respond to all requests we receive from individuals wishing to exercise their data protection rights in accordance with applicable data protection laws.\n
          \n
          **INTERNATIONAL TRANSFERS OF INFORMATION WE COLLECT**  \n
          We collect information globally and primarily store that information in the United States. We transfer, process and store your information outside of your country of residence. Whenever we transfer your information, we take steps to protect it.\n
          \n
          To facilitate our global operations, we transfer information to the United States and allow access to that information from countries in which we and associated companies have operations for the purposes described in this policy. These countries may not have equivalent privacy and data protection laws, certainly not equivalent to the laws of many of the countries where our customers and users are based. When we share information about you, we make use of Standard Contractual Clauses (SCCs) for data transfers between EU and non-EU countries, which have been approved by the European Commission.\n
          \n
          A copy of your personal data will also be stored in the data center you have selected when signing up for our services. This is done so that the Service Provider can deliver the contracted service in the location specified by the customer.\n
          \n
          **COMPLIANCE WITH LAWS AND LAW ENFORCEMENT**  \n
          The Service Provider cooperates with government and law enforcement officials to enforce and comply with the law. We will disclose any information about Users upon valid request by government or law officials as we, in our sole discretion, believe necessary or appropriate to respond to claims and legal process (including without limitation subpoenas), to protect your property and rights, or the property and rights of a third party, to protect the safety of the public or any person, or stop activity we consider illegal or unethical.\n
          \n
          **CHANGES TO PRIVACY POLICY**  \n
          Any changes to our Privacy Policy will be placed here and will supersede this version of our Policy. We will take reasonable steps to draw your attention to any changes in our Policy. However, to be on the safe side, we suggest that you read this document each time you use the website to ensure that it still meets with your approval.\n
          \n
          **CONTACT US**  \n
          If you have any questions about our Privacy Policy, or if you want to know what information we have collected about you, please use our Contact Us form.\n
          \n
          Postal Address:\n
          \n
          LiquidNet US LLC  \n
          6750 North Andrews Ave  \n
          Suite 200  \n
          Fort Lauderdale, FL 33309  \n
          United States of America\n
          \n
          LiquidNet Ltd.  \n
          13 Craigleith  \n
          7 Kersfield Road  \n
          Putney, London SW15 3HN  \n
          United Kingdom
          """
        "tos" => """
          An Acceptable Use Policy (AUP) is a set of rules and conditions compiled by a network, system, or a website owner. These rules explicitly define and restrict the ways in which the respective network, system or website may be used.\n
          \n
          The **AUP of the Service Provider** aims to clearly outline the purposes for which our customers CANNOT utilize our hosting services and position data on our network servers.\n
          \n
          This Acceptable Use Policy (AUP) is an integral part of the [Web Hosting Terms of Service](https://www.philwebdev.com/terms-and-conditions-2/web-hosting-terms-of-service-3/) which each customer agrees to abide by when signing up for an account with our web hosting company. Any violation of this AUP will be deemed a violation of our Web Hosting Terms of Service.\n
          \n
          We, at our own discretion, shall determine whether an act constitutes a breach of this AUP terms and misuse of our services. We reserve our right to be the sole arbiter in determining the sufficiency of the presented evidences. We will respond accordingly, and/or immediately terminate the provision of the services, shall we receive the report, and/or have sufficient proof, of any prohibited conduct outlined in this AUP, or any other activity threatening the security of our hosting environment and/or our network of hosting servers.\n
          \n
          In order to protect our company’s reputation and responsibilities, and guarantee state-of-the-art and reliable hosting services to all our customers, as well as privacy and security for all users, we – the Service Provider - hereby outline the following AUP rules and conditions to come into force for each customer signing up for a web hosting account with our company:\n
          \n
          1\. [System Abuse](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#SYSTEM_ABUSE)\n
          \n
          2\. [Spam and Spamvertizing](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#SPAM_AND_SPAMVERTIZING)\n
          \n
          3\. [Inappropriate or Unlawful Content](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#INAPPROPRIATE_OR_UNLAWFUL_CONTENT_)\n
          \n
          4\. [Copyrights](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#COPYRIGHTS)\n
          \n
          5\. [Corrective Actions](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#CORRECTIVE_ACTIONS)\n
          \n
          6\. [Reporting Violtaions](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#REPORTING_VIOLATIONS)\n
          \n
          7\. [Revisions](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#REVISIONS)\n
          \n
          **1\. SYSTEM ABUSE**\n
          \n
          Any customer in violation of our system or network security is subject to criminal and civil liability, as well as immediate account termination. Examples include, but are not limited to the following:\n
          \n
          Unauthorized access, use, probe, or scan of our system’s security, authentication measures, data, or traffic. Interference with the service to any user, host or network including, but not limited to: e-mail bombing, flooding, deliberate attempts to overload the system and broadcast attacks, forging of any TCP/IP packet header or any part of the header information in an e-mail or newsgroup posting.\n
          \n
          Any attempt at doing harm to a server or a customer of our web hosting services:\n
          \n
          the Service Provider will immediately and resolutely react to any attempt at misuse of an Internet account or computer, or any attempt to gain access to an Internet account or computer by a Service Provider's customer unauthorized by the account/computer owner. Such attempts include, but are not limited to the following: 'Internet scamming' (tricking other people into releasing their passwords, etc.), password robbery, security hole scanning, running proxy - proxy lists and any kind of proxy scripts (including, but not limited to PHP proxy and mph proxy), introducing of any computer programs (viruses, Trojan horses, trap doors, back doors, worms, time bombs, packet bombs, cancelbots, etc.) that are intended to negatively interfere with, intercept, irreversibly damage or take hold of any system, data or personal information. It WILL NOT matter whether the attacked account or computer belongs or not to the Service Provider's services. The fraud will be subject to actions based on the very nature of the attack and those may represent a warning, an account suspension or cancellation, and/or civil or criminal legal actions.\n
          \n
          Background operations/programs on servers:\n
          \n
          ‘Background process’ is a program that runs in the background of the operating system. What is specific for a background process is that, once started, it runs simultaneously with other foreground processes. This means that, the shell executing the background operation does not wait for it to finish or terminate, as it does with foreground processes, but is free to start executing more operations along with the background one. Typical background processes are ircd, irc bot, bnc, and many others.\n
          \n
          Background processes are not permitted on any of our shared hosting servers, as they usually lead to CPU overload and can be used for malicious and/or illegal actions. As our primary task is to provide highest quality web hosting service to all our customers, we cannot permit any background processes to be executed and threaten the performance of our server network. Our shared hosting system does not allow a big multitude of users to simultaneously use the system memory and processing time of our servers.\n
          \n
          Excessive use of system resources:\n
          \n
          In order to ensure higher server performance and quality of hosting service all shared hosting plans are subject to certain resource limitations concerning, but not limited to, server CPU usage, Memory usage, disk-space and traffic. If a hosting account exceeds the allowed amount of system resources the account owner will be immediately notified to take actions in order to reduce the usage. If such action is not instantly taken by the owner the account will be suspended. If an excessive CPU usage is detected the account owner will be suggested to place an order for a CPU usage upgrade or upgrade to a plan which allows higher CPU usage.\n
          \n
          If any hosting account is found to be causing degradation of the server and/or our hosting network’s performance, regardless of the reason, the account will be subject to suspension or immediate removal, depending on the situation. The Service Provider will be the sole arbiter in determining whether a given account is excessively using the server resources and/or causing a server degradation.\n
          \n
          **2\. SPAM AND SPAMVERTIZING**\n
          \n
          SPAMMING IS PROHIBITED. Users MAY NOT utilize our web hosting services to transmit, distribute or deliver any unsolicited bulk or commercial messages over the Internet (an action known as "spam" or "spamming").\n
          \n
          Spamming is a violation of ethic norms and will be interpreted as an infringement. the Service Provider will not tolerate the sending of unsolicited bulk or commercial messages through our services, as well as through another service that is mentioning, in some way, our customer’s domain name or implies the utilization of our network or our e-mail services for sending the unsolicited bulk or messages.\n
          \n
          SPAMVERTISING IS PROHIBITED. 'Spamvertizing’ refers to the practice of sending unsolicited spam messages for the purpose of advertising a particular website.\n
          \n
          If such e-mails are relayed through 3rd party (e-mail spoofing) and/or are promoting a domain hosted on our servers, this will lead to immediate account suspension unless an evidence of legitimacy for non-involvement of the domain owner in the particular illegal action is provided.\n
          \n
          ’E-mail spoofing’ is a fraudulent e-mail activity in which the sender’s (3td party) e-mail address and other parts of the e-mail header are changed so as to appear that the e-mail has been sent from a different source (e-mail address owner/server).\n
          \n
          'Unsolicited message’ is a message that is sent against the privacy policy of a newsgroup, or is sent to a recipient without their explicit permission. We, at our sole discretion, shall determine whether any of the messages you are sending is spam or spamvertizing. For your information, spamming generally includes, but is not limited to the following\n
          \n
          Sending of unsolicited messages in bulk, or sending of unsolicited e-mails, which provoke complaints from recipients;\n
          \n
          Sending of junk mail;\n
          \n
          Use of distribution lists that include people who have not given prior explicit permission to be involved in such a distribution process;\n
          \n
          Posting commercial ads to USENET newsgroups that do not permit it;\n
          \n
          Posting articles containing binary encoded data to non-binary newsgroups;\n
          \n
          Excessive and repeated posting of off-topic messages to newsgroups;\n
          \n
          Excessive and repeated cross-posting;\n
          \n
          E-mail harassment of another Internet Customer or Customers, including but not limited to, transmitting of any threatening, libellous or obscene material, or material of any nature that may be deemed offensive;\n
          \n
          E-mailing of age-inappropriate communications or content to anyone under the age of 18.\n
          \n
          **3\. INAPPROPRIATE OR UNLAWFUL CONTENT**\n
          \n
          CONTENT published or transmitted via the Service Provider’s hosting services includes website content, email content, forum/blog postings, chat content, and/or any other type of content hosted on our servers, published online or transmitted through our network’s services.\n
          \n
          The user of our services is NOT permitted to post online content or have links to content that:\n
          \n
          is defamatory, abusive or obscene, violates a person’s reputation/privacy, is reasonably deemed offensive by the web community, is anti-religious or anti-human rights, or contains any type of threatening or hate speech, encourages harassment or physical harm to any group or individual, or is otherwise malicious/fraudulent and may result in complaints/liabilities/or retaliation against the Service Provider by offended viewers;\n
          \n
          promotes or encourages illegal activities (e.g. illegal drugs, illegal gambling, arms trafficking, etc.) or violates any applicable law, statute, ordinance or regulation, including but not limited to the laws and regulations governing export control, unfair competition, false advertising, consumer protection, etc.\n
          \n
          represents pornography – any type of pornographic/adult material, including child pornography, or advertisements of pornographic websites;\n
          \n
          represents infringement on copyright, patents, trademarks, trade secrets, or third party's intellectual property or proprietary rights, including pirated computer programs, hacking/phreaking software, warez or any type of software/content (including also ROMs, ROM Emulators, media files – MP3, AVI, .RM, etc., torrent files, and others) that is copyrighted, is NOT uploaded in compliance with its license agreement or is NOT freely available for distribution.\n
          \n
          **4\. COPYRIGHTS**\n
          \n
          Copyrighted material must not be placed on customers' accounts without the explicit permission of the copyright owner or a person explicitly authorized to give such permission by the copyright owner. Upon receipt of a claim for copyright infringement, or a notice of such violation, we will immediately run full investigation and, upon confirmation, will promptly remove the infringing material from the Services. Further procedures (in accordance with our stated below corrective measures) will be carried out if necessary. We will assume no liability to any Customer of the Services for the removal of any such material.\n
          \n
          **5\. CORRECTIVE ACTIONS**\n
          \n
          We reserve our right to be the sole arbiter in determining the seriousness of each infringement and to immediately take corrective actions.\n
          \n
          We will disable the customer's account if we deem necessary, at our sole discretion. Upon closing of the customer’s account we will send an e-mail notification to the customer, stating the reason for the termination and quoting our terms’ chapter that has been violated. The customer will be given an opportunity to respond and take measures to remedy the situation should he/she consider him/herself abused by a third party. Upon fulfilling of this obligation, we may re-activate the customer’s account, if we find, at our own discretion, sufficient evidence pro customer’s side.\n
          \n
          Closed accounts due to repeated violations will not be re-activated. A backup may be requested, however it will be subject to certain penalty fees imposed according to the breach of this AUP terms. The final penalty fee will be determined by the type and frequency of the violations.\n
          \n
          **6\. REPORTING VIOLATIONS**\n
          \n
          If you need to report a violation of this AUP agreement or believe that you or your system has been subject to attack originating from our web hosting system, please contact us immediately. Our professional team will investigate the situation and provide you with full assistance.\n
          \n
          **7\. REVISIONS**\n
          \n
          We reserve our right to change this AUP at any time, without prior notice. We encourage our users to periodically review this Acceptable Use Policy and our Web Hosting Terms of Service.
          """
      ]
      "logo_url" => "https://www.philwebdev.com/billing/logod.svg"
      "languages" => array:2 [
        0 => array:3 [
          "locale" => "en_US"
          "title" => "English(en_US)"
          "name" => "English"
        ]
        1 => array:3 [
          "locale" => "hr_HR"
          "title" => "hr_HR(hr_HR)"
          "name" => "hr_HR"
        ]
      ]
    ]
    
  2. array:6 [
      "meta_title" => array:2 [
        0 => __TwigTemplate_48f67a13f3994ad241545cc961e85472 {#361}
        1 => "block_meta_title"
      ]
      "meta_description" => array:2 [
        0 => __TwigTemplate_114d7837338fd58c992f957ebe1e034b {#343}
        1 => "block_meta_description"
      ]
      "opengraph" => array:2 [
        0 => __TwigTemplate_114d7837338fd58c992f957ebe1e034b {#343}
        1 => "block_opengraph"
      ]
      "head" => array:2 [
        0 => __TwigTemplate_114d7837338fd58c992f957ebe1e034b {#343}
        1 => "block_head"
      ]
      "js" => array:2 [
        0 => __TwigTemplate_48f67a13f3994ad241545cc961e85472 {#361}
        1 => "block_js"
      ]
      "body" => array:2 [
        0 => __TwigTemplate_48f67a13f3994ad241545cc961e85472 {#361}
        1 => "block_body"
      ]
    ]
    
/home/philwebd/public_html/billing/vendor/twig/twig/src/Template.php
    {
        return $this;
    }
 
    /**
     * Returns all blocks.
     *
     * This method is for internal use only and should never be called
     * directly.
     *
     * @return array An array of blocks
     */
    public function getBlocks()
    {
        return $this->blocks;
    }
 
    public function display(array $context, array $blocks = [])
    {
        $this->displayWithErrorHandling($this->env->mergeGlobals($context), array_merge($this->blocks, $blocks));
    }
 
    public function render(array $context)
    {
        $level = ob_get_level();
        if ($this->env->isDebug()) {
            ob_start();
        } else {
            ob_start(function () { return ''; });
        }
        try {
            $this->display($context);
        } catch (\Throwable $e) {
            while (ob_get_level() > $level) {
                ob_end_clean();
            }
 
            throw $e;
        }
 
Arguments
  1. array:11 [
      "CSRFToken" => "6921348dc90961df5535dfa8a24e50f2"
      "request" => array:2 [
        "_url" => "/order"
        "product" => "7"
      ]
      "guest" => Api_Handler {#175}
      "FOSSBillingVersion" => "0.6.20"
      "current_theme" => "huraga"
      "settings" => array:57 [
        "CSRFToken" => "3f10ff5d59184687b9efad79ebd8597e"
        "color_scheme" => "green"
        "show_page_header" => "1"
        "show_company_logo" => "1"
        "show_company_name" => "0"
        "show_client_details" => "1"
        "sidebar_balance_enabled" => "1"
        "top_menu_dashboard" => "1"
        "top_menu_profile" => "1"
        "top_menu_signout" => "1"
        "login_page_show_logo" => "1"
        "login_page_logo_url" => "/"
        "show_password_reset_link" => "1"
        "show_signup_link" => "0"
        "login_page_show_remember_me" => "1"
        "show_breadcrumb" => "1"
        "hide_dashboard_breadcrumb" => "1"
        "require_login" => "1"
        "showcase_enabled" => "0"
        "showcase_size" => "3"
        "showcase_text" => "Showcase text"
        "showcase_button_title" => "Showcase button title"
        "showcase_button_url" => "Showcase link URL"
        "side_menu_dashboard" => "1"
        "side_menu_order" => "1"
        "side_menu_support" => "1"
        "side_menu_services" => "1"
        "side_menu_invoices" => "1"
        "side_menu_emails" => "1"
        "side_menu_payments" => "1"
        "side_menu_news" => "1"
        "side_menu_kb" => "1"
        "sidebar_note_enabled" => "0"
        "sidebar_note_title" => "Note title"
        "sidebar_note_content" => "Note content"
        "meta_title" => ""
        "meta_description" => "Members area"
        "meta_keywords" => "members area"
        "meta_robots" => "noindex, nofollow"
        "meta_author" => "PhilWebDev"
        "footer_enabled" => "1"
        "footer_to_top_enabled" => "1"
        "footer_signature" => ""
        "footer_link_1_enabled" => "on"
        "footer_link_1_title" => "About us"
        "footer_link_1_page" => "about-us"
        "footer_link_2_enabled" => "on"
        "footer_link_2_title" => "Terms and conditions"
        "footer_link_2_page" => "tos"
        "footer_link_3_enabled" => "on"
        "footer_link_3_title" => "Privacy policy"
        "footer_link_3_page" => "privacy-policy"
        "footer_link_4_title" => ""
        "footer_link_4_page" => ""
        "footer_link_5_title" => ""
        "footer_link_5_page" => ""
        "inject_javascript" => ""
      ]
      "loader_nr" => "8"
      "loader_url" => "img/assets/loaders/loader8.gif"
      "company" => array:11 [
        "www" => "https://billing.philwebdev.com/"
        "name" => "XWDV Information Technology Solutions"
        "signature" => """
          Regards,\n
          \n
          XWDV Information Technology Solutions\n
          https://www.philwebdev.com\n
          \n
          \n
          """
        "logo_url" => "https://www.philwebdev.com/billing/logod.svg"
        "logo_url_dark" => "https://www.philwebdev.com/billing/logow.svg"
        "favicon_url" => "https://www.philwebdev.com/billing/themes/huraga/assets/favicon.ico"
        "display_bank_info" => "0"
        "bank_info_pagebottom" => null
        "note" => ""
        "privacy_policy" => """
          This Privacy Policy describes the policies and procedures of PhilWebDev Domain and Business Hosting Solution, in association with - LiquidNet US LLC, a US company headquartered in Fort Lauderdale, Florida, and LiquidNet Ltd., a UK company headquartered in London, UK, on the collection, use and disclosure of your information. Legal details about the two companies can be found in the 'Contact Us' section of this document.\n
          \n
          For the sake of brevity, PhilWebDev Domain and Business Hosting Solution, LiquidNet US LLC and LiquidNet Ltd. will be referred to as 'We', 'Us', 'Our' and 'Service Provider' in this document.\n
          \n
          This Privacy Policy does not apply to information our customers may process when using our services.\n
          \n
          \---\n
          \n
          Privacy and security are of utmost importance to the Service Provider and we strive to ensure that our technical and organizational measures in place respect your data protection rights.\n
          \n
          **COLLECTION OF PERSONAL DATA**  \n
          "Personal data" refers to any information relating to an identifiable individual or his or her personal identity.\n
          \n
          Personal data is collected on our website by LiquidNet US LLC., a US company headquartered in Fort Lauderdale, Florida.\n
          \n
          The personally identifiable information that LiquidNet US LLC may collect from you when registering for an account includes: first and last name, postal address, phone number, email and IP address.\n
          \n
          If you want to use your Social Media account as a means to log in to your hosting account, you will also have to provide your Social Media ID.\n
          \n
          Your information will be needed for the following purposes:\n
          \n
          *   provision of our services to you;\n
          *   prevention of fraudulent transactions;\n
          *   billing/invoicing operations;\n
          *   provision of a sales/technical support service;\n
          *   maintenance of your account with us;\n
          *   dispute resolution cases;\n
          *   enforcement of our Terms of Service, or other legal rights, or as may be required by applicable laws and regulations or requested by any judicial process or governmental agency;\n
          *   collection of aggregate statistics about use of our services;\n
          \n
          Much of the data collected is aggregated or statistical data about how individuals use our Services, and is not linked to any personal data, but to the extent it is itself personal data, or is linked or linkable to personal data, we treat it accordingly.\n
          \n
          The Service Provider will NOT send you any unsolicited information, including emails, except as mentioned hereby.\n
          \n
          New customers will receive a welcome email containing information about the features provided by the Service, as well as WHCP (Web Hosting Control Panel) and FTP login details.\n
          \n
          The Service Provider may also send system notifications upon need, related to any upgrade, maintenance or other service issues concerning your hosting account.\n
          \n
          If you contact us directly, we may receive additional information about you such as your name, email address, phone number, the contents of the message and/or attachments you may send us, and any other information you may choose to provide. We may also receive a confirmation when you open an email from us.\n
          \n
          The Service Provider will keep your personally identifiable information private and will NOT share it with any unauthorized third parties.\n
          \n
          When you use our services, we may collect information about your engagement with and utilization of our services, such as processor and memory usage, storage capacity, navigation of our services, and system-level metrics. We use this data to operate the services, maintain and improve the performance and utilization of the services, develop new features, protect the security and safety of our services and our customers, and provide customer support. We also use this data to develop aggregate analysis and business intelligence that enable us to operate, protect, make informed decisions, and report on the performance of our business.\n
          \n
          **LEGAL BASIS FOR PROCESSING OF PERSONAL DATA**  \n
          We collect personal information from you only when:\n
          \n
          you give your consent for us to so,\n
          \n
          we need your personal information to perform a contract with you (e.g. to deliver the services you have requested), or,\n
          \n
          the processing is in our legitimate interests and not overridden by your rights;\n
          \n
          We have a legitimate interest in operating our services and communicating with you as necessary to provide these services, for example when responding to your queries, improving our platform, undertaking marketing, or for the purposes of detecting or preventing illegal activities.\n
          \n
          Please note that in most cases, if you do not submit the requested information, the Service Provider will not be able to provide the requested service to you.\n
          \n
          In some cases, we may also have a legal obligation to collect personal information from you, or may otherwise need that information to protect your vital interests or those of some other person's.\n
          \n
          If we ask you to provide personal information to comply with a legal requirement or to perform a contract with you, we will make this clear at the relevant time and advise you whether the provision of your personal information is mandatory or not (as well as of the possible consequences if you do not provide your personal information).\n
          \n
          **ACCESS TO YOUR PERSONAL DATA**  \n
          You may access and update your personal Information at any time from your Web Hosting Control Panel - > My Account - > Change Contact Details section.\n
          \n
          **SECURITY OF YOUR PERSONAL DATA**  \n
          The Service Provider is committed to protecting the security of customer collected personal information. To do so, we use technical security measures to prevent the loss, misuse, alternation or unauthorized disclosure of information under our control. We use security measures including and not limited to: physical, electronic and managerial procedures to safeguard and secure the information we collect online. However, please keep in mind that the Internet cannot be guaranteed to be 100% secure.\n
          \n
          If the Service Provider learns of a security system breach, we may attempt to notify you and send you any available protective information to the email address that you have provided to us or by posting a notice in your WHCP.\n
          \n
          **SHARING YOUR PERSONAL DATA WITH THIRD PARTIES**  \n
          We may share the information we collect in various ways, including the following:\n
          \n
          _Service Providers_  \n
          We may share information with third-party service providers that provide services on our behalf, such as helping to provide our services and to provide you with information relevant to you such as product announcements, service upgrades, special offers, or other information.\n
          \n
          _As Required By Law and Similar Disclosures_  \n
          We may also share information to (i) satisfy any applicable law, regulation, legal process, or governmental request; (ii) enforce this Privacy Policy and our Terms of Service, including investigation of potential violations hereof; (iii) detect, prevent, or otherwise address fraud, security, or technical issues; (iv) respond to your requests; or (v) protect our rights, property or safety, our users and the public. This includes exchanging information with other companies and organizations for fraud protection and spam/malware prevention.\n
          \n
          **THIRD-PARTY SERVICES**  \n
          You may access other third-party services through our services, for example by clicking on links to those third-party services from within our services. We are not responsible for the privacy policies and/or practices of these third-party services, and we encourage you to carefully review their privacy policies.\n
          \n
          **PRIVACY OF YOUR PAYMENT DETAILS**  \n
          We use third-party payment processing companies who collect and store financial information, such as your payment method (valid credit card number, type, expiration date or other financial information), and their use and storage of that information is governed by the payment processors' applicable terms of service and privacy policy. Collected billing information is used for the purposes of processing payments and fraud detection.\n
          \n
          We do not store your financial account information on our systems; however, we have access to, and may retain, subscriber information through our third-party payment processor.\n
          \n
          All PayPal transactions are subject to the [PayPal Privacy Policy](https://www.paypal.com/en/webapps/mpp/ua/privacy-full).\n
          \n
          **PRIVACY OF YOUR ACCOUNT**  \n
          We consider your registration data and the content of all your messages private and confidential. The header of the messages that you send will contain your name (e-mail address) and Internet Protocol (IP) address. We will not intentionally monitor or disclose any of your e-mail content or registration data unless we are required to do so:\n
          \n
          to enforce these Terms and Conditions,\n
          \n
          by law,\n
          \n
          to defend ourselves in any legal action,\n
          \n
          to protect our property.\n
          \n
          Since your password is essential for protecting your privacy, we encourage you to NOT share it with anyone and change it frequently. Additionally, you agree to respect the privacy and confidentiality of others.\n
          \n
          **AGE RESTRICTIONS**  \n
          We offer services only to people who are 18+. Our services are not targeted to, intended to be consumed by or designed to entice individuals under the age of 18. If we learn that we have collected the personal information of a child under the age of 18, we will take steps to delete that information as soon as possible.\n
          \n
          If you know of or have reason to believe that anyone under the age of 18 has provided us with any personal data, please contact us.\n
          \n
          **LOG FILES**  \n
          We use IP addresses to analyze trends, administer our site and servers, track access, and gather broad demographic information for aggregate use. IP addresses are not linked to personally identifiable information. It is possible that personal information about a customer may be included in the log files due to the normal functions of IP addresses and Web browsing.\n
          \n
          **COOKIES**  \n
          We use different cookies on our website to make it as useful to you as possible. Cookies are small text files that we put on your computer or mobile device to tell us what you want to use on our site but they do not tell us who you are.\n
          \n
          [Here](http://www.aboutcookies.org/) you can learn more about cookies and how to [control](http://www.aboutcookies.org/how-to-control-cookies/) or [delete](http://www.aboutcookies.org/how-to-delete-cookies/) them.\n
          \n
          Here are the cookies that we use on our site:\n
          \n
          _Essential cookies_  \n
          We use a cookie to remember your login for you and what you’ve put in the shop cart. Also, we set a cookie to help you choose a preferred font size for using the site. These cookies we consider essential for the operation of our website.\n
          \n
          _External web services_  \n
          We use an external live chat service (using cookies to remember your session name) to deliver real-time support to you should you want to.\n
          \n
          _Analytics_  \n
          We use Google Analytics and Facebook cookies to monitor visitor activity on our website. No personally identifying data is included in this type of reporting. We do not share information about this analysis with any third parties.\n
          \n
          Visitors can [opt out of Google's advertising tracking cookie](https://policies.google.com/technologies/ads) or [install a browser plugin](https://tools.google.com/dlpage/gaoptout?hl=en) to opt out of all Google Analytics tracking software. More information about Facebook's analytics cookie is available [here](https://www.facebook.com/policies/cookies/?utm_referrer=https://www.cloudflare.com/privacypolicy/).\n
          \n
          We assume you are happy with this usage of cookies on this website. If you are not happy, then you should either not use this site, or delete the cookies (you can check out how to do that according to your browser [here](http://www.aboutcookies.org/how-to-delete-cookies/)), or browse the site using your browser’s anonymous usage setting (named “Incognito” in Chrome, “InPrivate” for Internet Explorer, "Private Browsing" in Firefox and Safari etc.).\n
          \n
          We currently do not alter our practices when we receive a "Do Not Track" signal from a visitor's browser.\n
          \n
          Please remember that if you choose to delete the cookies or use the browser anonymously, you may find that certain sections of this website do not work properly.\n
          \n
          **YOUR RIGHTS UNDER THE GENERAL DATA PROTECTION REGULATION (GDPR)**\n
          \n
          If you are a resident of the European Economic Area (EEA), you have the following data protection rights:\n
          \n
          _Managing Your Information_  \n
          You may access and update some of your information through the "Change Contact Details" section in the WHCP. If you have chosen to connect your account to a third-party application like Facebook, Google or Twitter, you can change your settings and remove permission for the app from the "Linked Social Accounts" section in the WHCP. You are responsible for keeping your personal information up to date.\n
          \n
          _Rectification of Inaccurate or Incomplete Information_  \n
          You have the right to ask us to correct any inaccurate or incomplete personal information concerning you if you cannot update it yourself from within your account.\n
          \n
          _Data Access and Portability_  \n
          In some jurisdictions, the applicable law may entitle you to request copies of your personal information held by us. You may also be entitled to request copies of personal information that you have provided to us in a structured, commonly used, and machine-readable format and/or request us to transmit this information to another service provider (where technically feasible).\n
          \n
          _Opt-out of marketing communications_  \n
          You have the right to opt-out of marketing communications we send you at any time. You can exercise this right by clicking on the "unsubscribe" or "opt-out" link in the marketing emails we send you.\n
          \n
          _Data Retention and Erasure_  \n
          We generally retain your personal information for as long as is necessary for the performance of the contract between you and us and to comply with our legal obligations. If you no longer want us to use your information to provide the contracted services to you, you can request that we erase your personal information and close your account. Please note that if you request the erasure of your personal information:\n
          \n
          We may retain some of your personal information so as to detect and prevent fraud and enhance safety. For example, if we suspend an account for security reasons, we may retain certain information from that account to prevent that customer from opening a new account in the future.\n
          \n
          We may retain and use your personal information to the extent necessary to comply with our legal obligations. For example, we may keep some of your information for tax, legal reporting and auditing purposes.\n
          \n
          Because we maintain our platform to protect it from accidental or malicious loss and destruction, residual copies of your personal information may not be removed from our backup systems for a limited period of time.\n
          \n
          In cases where fraudulent or otherwise illegal activity has been deemed to have occurred as determined by law enforcement or management, the information may remain in our database indefinitely in order to help facilitate the prevention of repeated abuse in the future from the offending party.\n
          \n
          _Withdrawing Consent and Restriction of Processing_  \n
          If you have provided your consent to the processing of your personal information, you may withdraw it at any time by sending us a communication specifying which consent you are withdrawing. Please note that the withdrawal of your consent does not affect the lawfulness of any processing activities based on such consent before its withdrawal. Additionally, in some jurisdictions, applicable law may give you the right to limit the ways in which we use your personal information, in particular where (i) you contest the accuracy of your personal information; (ii) the processing is unlawful and you oppose the erasure of your personal information; (iii) we no longer need your personal information for the purposes of the processing, but you require the information for the establishment, exercise or defence of legal claims; or (iv) you have objected to the processing and pending the verification whether the Service Provider's legitimate grounds override your own.\n
          \n
          _Objection to Processing_  \n
          In some jurisdictions, applicable law may entitle you to require us not to process your personal information for certain specific purposes (including profiling) where such processing is based on legitimate interest. If you object to such processing, we will no longer process your personal information for these purposes unless we can demonstrate compelling legitimate grounds for such processing or such processing is required for the establishment, exercise or defence of legal claims.\n
          \n
          By default, customers do receive any system updates, such as the newsletters, invoices and service email notifications. Customers cannot opt out of possibly receiving important system notifications, since the latter are deemed necessary for the performance of our contractual obligations to you.\n
          \n
          _Lodging Complaints_  \n
          If you want to make a complaint about the way we are processing your data, you can contact us using the contact details below.\n
          \n
          You have the right to complain to a data protection authority about our collection and use of your personal information. For more information, please contact your local data protection authority.\n
          \n
          \---\n
          \n
          We respond to all requests we receive from individuals wishing to exercise their data protection rights in accordance with applicable data protection laws.\n
          \n
          **INTERNATIONAL TRANSFERS OF INFORMATION WE COLLECT**  \n
          We collect information globally and primarily store that information in the United States. We transfer, process and store your information outside of your country of residence. Whenever we transfer your information, we take steps to protect it.\n
          \n
          To facilitate our global operations, we transfer information to the United States and allow access to that information from countries in which we and associated companies have operations for the purposes described in this policy. These countries may not have equivalent privacy and data protection laws, certainly not equivalent to the laws of many of the countries where our customers and users are based. When we share information about you, we make use of Standard Contractual Clauses (SCCs) for data transfers between EU and non-EU countries, which have been approved by the European Commission.\n
          \n
          A copy of your personal data will also be stored in the data center you have selected when signing up for our services. This is done so that the Service Provider can deliver the contracted service in the location specified by the customer.\n
          \n
          **COMPLIANCE WITH LAWS AND LAW ENFORCEMENT**  \n
          The Service Provider cooperates with government and law enforcement officials to enforce and comply with the law. We will disclose any information about Users upon valid request by government or law officials as we, in our sole discretion, believe necessary or appropriate to respond to claims and legal process (including without limitation subpoenas), to protect your property and rights, or the property and rights of a third party, to protect the safety of the public or any person, or stop activity we consider illegal or unethical.\n
          \n
          **CHANGES TO PRIVACY POLICY**  \n
          Any changes to our Privacy Policy will be placed here and will supersede this version of our Policy. We will take reasonable steps to draw your attention to any changes in our Policy. However, to be on the safe side, we suggest that you read this document each time you use the website to ensure that it still meets with your approval.\n
          \n
          **CONTACT US**  \n
          If you have any questions about our Privacy Policy, or if you want to know what information we have collected about you, please use our Contact Us form.\n
          \n
          Postal Address:\n
          \n
          LiquidNet US LLC  \n
          6750 North Andrews Ave  \n
          Suite 200  \n
          Fort Lauderdale, FL 33309  \n
          United States of America\n
          \n
          LiquidNet Ltd.  \n
          13 Craigleith  \n
          7 Kersfield Road  \n
          Putney, London SW15 3HN  \n
          United Kingdom
          """
        "tos" => """
          An Acceptable Use Policy (AUP) is a set of rules and conditions compiled by a network, system, or a website owner. These rules explicitly define and restrict the ways in which the respective network, system or website may be used.\n
          \n
          The **AUP of the Service Provider** aims to clearly outline the purposes for which our customers CANNOT utilize our hosting services and position data on our network servers.\n
          \n
          This Acceptable Use Policy (AUP) is an integral part of the [Web Hosting Terms of Service](https://www.philwebdev.com/terms-and-conditions-2/web-hosting-terms-of-service-3/) which each customer agrees to abide by when signing up for an account with our web hosting company. Any violation of this AUP will be deemed a violation of our Web Hosting Terms of Service.\n
          \n
          We, at our own discretion, shall determine whether an act constitutes a breach of this AUP terms and misuse of our services. We reserve our right to be the sole arbiter in determining the sufficiency of the presented evidences. We will respond accordingly, and/or immediately terminate the provision of the services, shall we receive the report, and/or have sufficient proof, of any prohibited conduct outlined in this AUP, or any other activity threatening the security of our hosting environment and/or our network of hosting servers.\n
          \n
          In order to protect our company’s reputation and responsibilities, and guarantee state-of-the-art and reliable hosting services to all our customers, as well as privacy and security for all users, we – the Service Provider - hereby outline the following AUP rules and conditions to come into force for each customer signing up for a web hosting account with our company:\n
          \n
          1\. [System Abuse](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#SYSTEM_ABUSE)\n
          \n
          2\. [Spam and Spamvertizing](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#SPAM_AND_SPAMVERTIZING)\n
          \n
          3\. [Inappropriate or Unlawful Content](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#INAPPROPRIATE_OR_UNLAWFUL_CONTENT_)\n
          \n
          4\. [Copyrights](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#COPYRIGHTS)\n
          \n
          5\. [Corrective Actions](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#CORRECTIVE_ACTIONS)\n
          \n
          6\. [Reporting Violtaions](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#REPORTING_VIOLATIONS)\n
          \n
          7\. [Revisions](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#REVISIONS)\n
          \n
          **1\. SYSTEM ABUSE**\n
          \n
          Any customer in violation of our system or network security is subject to criminal and civil liability, as well as immediate account termination. Examples include, but are not limited to the following:\n
          \n
          Unauthorized access, use, probe, or scan of our system’s security, authentication measures, data, or traffic. Interference with the service to any user, host or network including, but not limited to: e-mail bombing, flooding, deliberate attempts to overload the system and broadcast attacks, forging of any TCP/IP packet header or any part of the header information in an e-mail or newsgroup posting.\n
          \n
          Any attempt at doing harm to a server or a customer of our web hosting services:\n
          \n
          the Service Provider will immediately and resolutely react to any attempt at misuse of an Internet account or computer, or any attempt to gain access to an Internet account or computer by a Service Provider's customer unauthorized by the account/computer owner. Such attempts include, but are not limited to the following: 'Internet scamming' (tricking other people into releasing their passwords, etc.), password robbery, security hole scanning, running proxy - proxy lists and any kind of proxy scripts (including, but not limited to PHP proxy and mph proxy), introducing of any computer programs (viruses, Trojan horses, trap doors, back doors, worms, time bombs, packet bombs, cancelbots, etc.) that are intended to negatively interfere with, intercept, irreversibly damage or take hold of any system, data or personal information. It WILL NOT matter whether the attacked account or computer belongs or not to the Service Provider's services. The fraud will be subject to actions based on the very nature of the attack and those may represent a warning, an account suspension or cancellation, and/or civil or criminal legal actions.\n
          \n
          Background operations/programs on servers:\n
          \n
          ‘Background process’ is a program that runs in the background of the operating system. What is specific for a background process is that, once started, it runs simultaneously with other foreground processes. This means that, the shell executing the background operation does not wait for it to finish or terminate, as it does with foreground processes, but is free to start executing more operations along with the background one. Typical background processes are ircd, irc bot, bnc, and many others.\n
          \n
          Background processes are not permitted on any of our shared hosting servers, as they usually lead to CPU overload and can be used for malicious and/or illegal actions. As our primary task is to provide highest quality web hosting service to all our customers, we cannot permit any background processes to be executed and threaten the performance of our server network. Our shared hosting system does not allow a big multitude of users to simultaneously use the system memory and processing time of our servers.\n
          \n
          Excessive use of system resources:\n
          \n
          In order to ensure higher server performance and quality of hosting service all shared hosting plans are subject to certain resource limitations concerning, but not limited to, server CPU usage, Memory usage, disk-space and traffic. If a hosting account exceeds the allowed amount of system resources the account owner will be immediately notified to take actions in order to reduce the usage. If such action is not instantly taken by the owner the account will be suspended. If an excessive CPU usage is detected the account owner will be suggested to place an order for a CPU usage upgrade or upgrade to a plan which allows higher CPU usage.\n
          \n
          If any hosting account is found to be causing degradation of the server and/or our hosting network’s performance, regardless of the reason, the account will be subject to suspension or immediate removal, depending on the situation. The Service Provider will be the sole arbiter in determining whether a given account is excessively using the server resources and/or causing a server degradation.\n
          \n
          **2\. SPAM AND SPAMVERTIZING**\n
          \n
          SPAMMING IS PROHIBITED. Users MAY NOT utilize our web hosting services to transmit, distribute or deliver any unsolicited bulk or commercial messages over the Internet (an action known as "spam" or "spamming").\n
          \n
          Spamming is a violation of ethic norms and will be interpreted as an infringement. the Service Provider will not tolerate the sending of unsolicited bulk or commercial messages through our services, as well as through another service that is mentioning, in some way, our customer’s domain name or implies the utilization of our network or our e-mail services for sending the unsolicited bulk or messages.\n
          \n
          SPAMVERTISING IS PROHIBITED. 'Spamvertizing’ refers to the practice of sending unsolicited spam messages for the purpose of advertising a particular website.\n
          \n
          If such e-mails are relayed through 3rd party (e-mail spoofing) and/or are promoting a domain hosted on our servers, this will lead to immediate account suspension unless an evidence of legitimacy for non-involvement of the domain owner in the particular illegal action is provided.\n
          \n
          ’E-mail spoofing’ is a fraudulent e-mail activity in which the sender’s (3td party) e-mail address and other parts of the e-mail header are changed so as to appear that the e-mail has been sent from a different source (e-mail address owner/server).\n
          \n
          'Unsolicited message’ is a message that is sent against the privacy policy of a newsgroup, or is sent to a recipient without their explicit permission. We, at our sole discretion, shall determine whether any of the messages you are sending is spam or spamvertizing. For your information, spamming generally includes, but is not limited to the following\n
          \n
          Sending of unsolicited messages in bulk, or sending of unsolicited e-mails, which provoke complaints from recipients;\n
          \n
          Sending of junk mail;\n
          \n
          Use of distribution lists that include people who have not given prior explicit permission to be involved in such a distribution process;\n
          \n
          Posting commercial ads to USENET newsgroups that do not permit it;\n
          \n
          Posting articles containing binary encoded data to non-binary newsgroups;\n
          \n
          Excessive and repeated posting of off-topic messages to newsgroups;\n
          \n
          Excessive and repeated cross-posting;\n
          \n
          E-mail harassment of another Internet Customer or Customers, including but not limited to, transmitting of any threatening, libellous or obscene material, or material of any nature that may be deemed offensive;\n
          \n
          E-mailing of age-inappropriate communications or content to anyone under the age of 18.\n
          \n
          **3\. INAPPROPRIATE OR UNLAWFUL CONTENT**\n
          \n
          CONTENT published or transmitted via the Service Provider’s hosting services includes website content, email content, forum/blog postings, chat content, and/or any other type of content hosted on our servers, published online or transmitted through our network’s services.\n
          \n
          The user of our services is NOT permitted to post online content or have links to content that:\n
          \n
          is defamatory, abusive or obscene, violates a person’s reputation/privacy, is reasonably deemed offensive by the web community, is anti-religious or anti-human rights, or contains any type of threatening or hate speech, encourages harassment or physical harm to any group or individual, or is otherwise malicious/fraudulent and may result in complaints/liabilities/or retaliation against the Service Provider by offended viewers;\n
          \n
          promotes or encourages illegal activities (e.g. illegal drugs, illegal gambling, arms trafficking, etc.) or violates any applicable law, statute, ordinance or regulation, including but not limited to the laws and regulations governing export control, unfair competition, false advertising, consumer protection, etc.\n
          \n
          represents pornography – any type of pornographic/adult material, including child pornography, or advertisements of pornographic websites;\n
          \n
          represents infringement on copyright, patents, trademarks, trade secrets, or third party's intellectual property or proprietary rights, including pirated computer programs, hacking/phreaking software, warez or any type of software/content (including also ROMs, ROM Emulators, media files – MP3, AVI, .RM, etc., torrent files, and others) that is copyrighted, is NOT uploaded in compliance with its license agreement or is NOT freely available for distribution.\n
          \n
          **4\. COPYRIGHTS**\n
          \n
          Copyrighted material must not be placed on customers' accounts without the explicit permission of the copyright owner or a person explicitly authorized to give such permission by the copyright owner. Upon receipt of a claim for copyright infringement, or a notice of such violation, we will immediately run full investigation and, upon confirmation, will promptly remove the infringing material from the Services. Further procedures (in accordance with our stated below corrective measures) will be carried out if necessary. We will assume no liability to any Customer of the Services for the removal of any such material.\n
          \n
          **5\. CORRECTIVE ACTIONS**\n
          \n
          We reserve our right to be the sole arbiter in determining the seriousness of each infringement and to immediately take corrective actions.\n
          \n
          We will disable the customer's account if we deem necessary, at our sole discretion. Upon closing of the customer’s account we will send an e-mail notification to the customer, stating the reason for the termination and quoting our terms’ chapter that has been violated. The customer will be given an opportunity to respond and take measures to remedy the situation should he/she consider him/herself abused by a third party. Upon fulfilling of this obligation, we may re-activate the customer’s account, if we find, at our own discretion, sufficient evidence pro customer’s side.\n
          \n
          Closed accounts due to repeated violations will not be re-activated. A backup may be requested, however it will be subject to certain penalty fees imposed according to the breach of this AUP terms. The final penalty fee will be determined by the type and frequency of the violations.\n
          \n
          **6\. REPORTING VIOLATIONS**\n
          \n
          If you need to report a violation of this AUP agreement or believe that you or your system has been subject to attack originating from our web hosting system, please contact us immediately. Our professional team will investigate the situation and provide you with full assistance.\n
          \n
          **7\. REVISIONS**\n
          \n
          We reserve our right to change this AUP at any time, without prior notice. We encourage our users to periodically review this Acceptable Use Policy and our Web Hosting Terms of Service.
          """
      ]
      "logo_url" => "https://www.philwebdev.com/billing/logod.svg"
      "languages" => array:2 [
        0 => array:3 [
          "locale" => "en_US"
          "title" => "English(en_US)"
          "name" => "English"
        ]
        1 => array:3 [
          "locale" => "hr_HR"
          "title" => "hr_HR(hr_HR)"
          "name" => "hr_HR"
        ]
      ]
    ]
    
  2. array:6 [
      "meta_title" => array:2 [
        0 => __TwigTemplate_48f67a13f3994ad241545cc961e85472 {#361}
        1 => "block_meta_title"
      ]
      "meta_description" => array:2 [
        0 => __TwigTemplate_114d7837338fd58c992f957ebe1e034b {#343}
        1 => "block_meta_description"
      ]
      "opengraph" => array:2 [
        0 => __TwigTemplate_114d7837338fd58c992f957ebe1e034b {#343}
        1 => "block_opengraph"
      ]
      "head" => array:2 [
        0 => __TwigTemplate_114d7837338fd58c992f957ebe1e034b {#343}
        1 => "block_head"
      ]
      "js" => array:2 [
        0 => __TwigTemplate_48f67a13f3994ad241545cc961e85472 {#361}
        1 => "block_js"
      ]
      "body" => array:2 [
        0 => __TwigTemplate_48f67a13f3994ad241545cc961e85472 {#361}
        1 => "block_body"
      ]
    ]
    
/home/philwebd/public_html/billing/data/cache/67/67d9fa319b2c24aa5b7e34d09cde494d.php
            'js' => [$this, 'block_js'],
        ];
    }
 
    protected function doGetParent(array $context)
    {
        // line 1
        return "layout_public.html.twig";
    }
 
    protected function doDisplay(array $context, array $blocks = [])
    {
        $macros = $this->macros;
        // line 2
        $context["loader_nr"] = ((twig_get_attribute($this->env, $this->source, ($context["request"] ?? null), "loader", [], "any", true, true, false, 2)) ? (_twig_default_filter(twig_get_attribute($this->env, $this->source, ($context["request"] ?? null), "loader", [], "any", false, false, false, 2), "8")) : ("8"));
        // line 3
        $context["loader_url"] = (("img/assets/loaders/loader" . ($context["loader_nr"] ?? null)) . ".gif");
        // line 1
        $this->parent = $this->loadTemplate("layout_public.html.twig", "mod_orderbutton_index.html.twig", 1);
        $this->parent->display($context, array_merge($this->blocks, $blocks));
    }
 
    // line 4
    public function block_meta_title($context, array $blocks = [])
    {
        $macros = $this->macros;
        echo twig_escape_filter($this->env, __trans("Order"), "html", null, true);
    }
 
    // line 6
    public function block_body($context, array $blocks = [])
    {
        $macros = $this->macros;
        // line 7
        echo "<div class=\"row\">
    <div class=\"col-md-12\">
        <div class=\"card border-0\" id=\"orderbutton\" style=\"margin-bottom: 0\">
            <div class=\"card-body p-1\">
                <div id=\"orderManager\" class=\"accordion\">
 
Arguments
  1. array:11 [
      "CSRFToken" => "6921348dc90961df5535dfa8a24e50f2"
      "request" => array:2 [
        "_url" => "/order"
        "product" => "7"
      ]
      "guest" => Api_Handler {#175}
      "FOSSBillingVersion" => "0.6.20"
      "current_theme" => "huraga"
      "settings" => array:57 [
        "CSRFToken" => "3f10ff5d59184687b9efad79ebd8597e"
        "color_scheme" => "green"
        "show_page_header" => "1"
        "show_company_logo" => "1"
        "show_company_name" => "0"
        "show_client_details" => "1"
        "sidebar_balance_enabled" => "1"
        "top_menu_dashboard" => "1"
        "top_menu_profile" => "1"
        "top_menu_signout" => "1"
        "login_page_show_logo" => "1"
        "login_page_logo_url" => "/"
        "show_password_reset_link" => "1"
        "show_signup_link" => "0"
        "login_page_show_remember_me" => "1"
        "show_breadcrumb" => "1"
        "hide_dashboard_breadcrumb" => "1"
        "require_login" => "1"
        "showcase_enabled" => "0"
        "showcase_size" => "3"
        "showcase_text" => "Showcase text"
        "showcase_button_title" => "Showcase button title"
        "showcase_button_url" => "Showcase link URL"
        "side_menu_dashboard" => "1"
        "side_menu_order" => "1"
        "side_menu_support" => "1"
        "side_menu_services" => "1"
        "side_menu_invoices" => "1"
        "side_menu_emails" => "1"
        "side_menu_payments" => "1"
        "side_menu_news" => "1"
        "side_menu_kb" => "1"
        "sidebar_note_enabled" => "0"
        "sidebar_note_title" => "Note title"
        "sidebar_note_content" => "Note content"
        "meta_title" => ""
        "meta_description" => "Members area"
        "meta_keywords" => "members area"
        "meta_robots" => "noindex, nofollow"
        "meta_author" => "PhilWebDev"
        "footer_enabled" => "1"
        "footer_to_top_enabled" => "1"
        "footer_signature" => ""
        "footer_link_1_enabled" => "on"
        "footer_link_1_title" => "About us"
        "footer_link_1_page" => "about-us"
        "footer_link_2_enabled" => "on"
        "footer_link_2_title" => "Terms and conditions"
        "footer_link_2_page" => "tos"
        "footer_link_3_enabled" => "on"
        "footer_link_3_title" => "Privacy policy"
        "footer_link_3_page" => "privacy-policy"
        "footer_link_4_title" => ""
        "footer_link_4_page" => ""
        "footer_link_5_title" => ""
        "footer_link_5_page" => ""
        "inject_javascript" => ""
      ]
      "loader_nr" => "8"
      "loader_url" => "img/assets/loaders/loader8.gif"
      "company" => array:11 [
        "www" => "https://billing.philwebdev.com/"
        "name" => "XWDV Information Technology Solutions"
        "signature" => """
          Regards,\n
          \n
          XWDV Information Technology Solutions\n
          https://www.philwebdev.com\n
          \n
          \n
          """
        "logo_url" => "https://www.philwebdev.com/billing/logod.svg"
        "logo_url_dark" => "https://www.philwebdev.com/billing/logow.svg"
        "favicon_url" => "https://www.philwebdev.com/billing/themes/huraga/assets/favicon.ico"
        "display_bank_info" => "0"
        "bank_info_pagebottom" => null
        "note" => ""
        "privacy_policy" => """
          This Privacy Policy describes the policies and procedures of PhilWebDev Domain and Business Hosting Solution, in association with - LiquidNet US LLC, a US company headquartered in Fort Lauderdale, Florida, and LiquidNet Ltd., a UK company headquartered in London, UK, on the collection, use and disclosure of your information. Legal details about the two companies can be found in the 'Contact Us' section of this document.\n
          \n
          For the sake of brevity, PhilWebDev Domain and Business Hosting Solution, LiquidNet US LLC and LiquidNet Ltd. will be referred to as 'We', 'Us', 'Our' and 'Service Provider' in this document.\n
          \n
          This Privacy Policy does not apply to information our customers may process when using our services.\n
          \n
          \---\n
          \n
          Privacy and security are of utmost importance to the Service Provider and we strive to ensure that our technical and organizational measures in place respect your data protection rights.\n
          \n
          **COLLECTION OF PERSONAL DATA**  \n
          "Personal data" refers to any information relating to an identifiable individual or his or her personal identity.\n
          \n
          Personal data is collected on our website by LiquidNet US LLC., a US company headquartered in Fort Lauderdale, Florida.\n
          \n
          The personally identifiable information that LiquidNet US LLC may collect from you when registering for an account includes: first and last name, postal address, phone number, email and IP address.\n
          \n
          If you want to use your Social Media account as a means to log in to your hosting account, you will also have to provide your Social Media ID.\n
          \n
          Your information will be needed for the following purposes:\n
          \n
          *   provision of our services to you;\n
          *   prevention of fraudulent transactions;\n
          *   billing/invoicing operations;\n
          *   provision of a sales/technical support service;\n
          *   maintenance of your account with us;\n
          *   dispute resolution cases;\n
          *   enforcement of our Terms of Service, or other legal rights, or as may be required by applicable laws and regulations or requested by any judicial process or governmental agency;\n
          *   collection of aggregate statistics about use of our services;\n
          \n
          Much of the data collected is aggregated or statistical data about how individuals use our Services, and is not linked to any personal data, but to the extent it is itself personal data, or is linked or linkable to personal data, we treat it accordingly.\n
          \n
          The Service Provider will NOT send you any unsolicited information, including emails, except as mentioned hereby.\n
          \n
          New customers will receive a welcome email containing information about the features provided by the Service, as well as WHCP (Web Hosting Control Panel) and FTP login details.\n
          \n
          The Service Provider may also send system notifications upon need, related to any upgrade, maintenance or other service issues concerning your hosting account.\n
          \n
          If you contact us directly, we may receive additional information about you such as your name, email address, phone number, the contents of the message and/or attachments you may send us, and any other information you may choose to provide. We may also receive a confirmation when you open an email from us.\n
          \n
          The Service Provider will keep your personally identifiable information private and will NOT share it with any unauthorized third parties.\n
          \n
          When you use our services, we may collect information about your engagement with and utilization of our services, such as processor and memory usage, storage capacity, navigation of our services, and system-level metrics. We use this data to operate the services, maintain and improve the performance and utilization of the services, develop new features, protect the security and safety of our services and our customers, and provide customer support. We also use this data to develop aggregate analysis and business intelligence that enable us to operate, protect, make informed decisions, and report on the performance of our business.\n
          \n
          **LEGAL BASIS FOR PROCESSING OF PERSONAL DATA**  \n
          We collect personal information from you only when:\n
          \n
          you give your consent for us to so,\n
          \n
          we need your personal information to perform a contract with you (e.g. to deliver the services you have requested), or,\n
          \n
          the processing is in our legitimate interests and not overridden by your rights;\n
          \n
          We have a legitimate interest in operating our services and communicating with you as necessary to provide these services, for example when responding to your queries, improving our platform, undertaking marketing, or for the purposes of detecting or preventing illegal activities.\n
          \n
          Please note that in most cases, if you do not submit the requested information, the Service Provider will not be able to provide the requested service to you.\n
          \n
          In some cases, we may also have a legal obligation to collect personal information from you, or may otherwise need that information to protect your vital interests or those of some other person's.\n
          \n
          If we ask you to provide personal information to comply with a legal requirement or to perform a contract with you, we will make this clear at the relevant time and advise you whether the provision of your personal information is mandatory or not (as well as of the possible consequences if you do not provide your personal information).\n
          \n
          **ACCESS TO YOUR PERSONAL DATA**  \n
          You may access and update your personal Information at any time from your Web Hosting Control Panel - > My Account - > Change Contact Details section.\n
          \n
          **SECURITY OF YOUR PERSONAL DATA**  \n
          The Service Provider is committed to protecting the security of customer collected personal information. To do so, we use technical security measures to prevent the loss, misuse, alternation or unauthorized disclosure of information under our control. We use security measures including and not limited to: physical, electronic and managerial procedures to safeguard and secure the information we collect online. However, please keep in mind that the Internet cannot be guaranteed to be 100% secure.\n
          \n
          If the Service Provider learns of a security system breach, we may attempt to notify you and send you any available protective information to the email address that you have provided to us or by posting a notice in your WHCP.\n
          \n
          **SHARING YOUR PERSONAL DATA WITH THIRD PARTIES**  \n
          We may share the information we collect in various ways, including the following:\n
          \n
          _Service Providers_  \n
          We may share information with third-party service providers that provide services on our behalf, such as helping to provide our services and to provide you with information relevant to you such as product announcements, service upgrades, special offers, or other information.\n
          \n
          _As Required By Law and Similar Disclosures_  \n
          We may also share information to (i) satisfy any applicable law, regulation, legal process, or governmental request; (ii) enforce this Privacy Policy and our Terms of Service, including investigation of potential violations hereof; (iii) detect, prevent, or otherwise address fraud, security, or technical issues; (iv) respond to your requests; or (v) protect our rights, property or safety, our users and the public. This includes exchanging information with other companies and organizations for fraud protection and spam/malware prevention.\n
          \n
          **THIRD-PARTY SERVICES**  \n
          You may access other third-party services through our services, for example by clicking on links to those third-party services from within our services. We are not responsible for the privacy policies and/or practices of these third-party services, and we encourage you to carefully review their privacy policies.\n
          \n
          **PRIVACY OF YOUR PAYMENT DETAILS**  \n
          We use third-party payment processing companies who collect and store financial information, such as your payment method (valid credit card number, type, expiration date or other financial information), and their use and storage of that information is governed by the payment processors' applicable terms of service and privacy policy. Collected billing information is used for the purposes of processing payments and fraud detection.\n
          \n
          We do not store your financial account information on our systems; however, we have access to, and may retain, subscriber information through our third-party payment processor.\n
          \n
          All PayPal transactions are subject to the [PayPal Privacy Policy](https://www.paypal.com/en/webapps/mpp/ua/privacy-full).\n
          \n
          **PRIVACY OF YOUR ACCOUNT**  \n
          We consider your registration data and the content of all your messages private and confidential. The header of the messages that you send will contain your name (e-mail address) and Internet Protocol (IP) address. We will not intentionally monitor or disclose any of your e-mail content or registration data unless we are required to do so:\n
          \n
          to enforce these Terms and Conditions,\n
          \n
          by law,\n
          \n
          to defend ourselves in any legal action,\n
          \n
          to protect our property.\n
          \n
          Since your password is essential for protecting your privacy, we encourage you to NOT share it with anyone and change it frequently. Additionally, you agree to respect the privacy and confidentiality of others.\n
          \n
          **AGE RESTRICTIONS**  \n
          We offer services only to people who are 18+. Our services are not targeted to, intended to be consumed by or designed to entice individuals under the age of 18. If we learn that we have collected the personal information of a child under the age of 18, we will take steps to delete that information as soon as possible.\n
          \n
          If you know of or have reason to believe that anyone under the age of 18 has provided us with any personal data, please contact us.\n
          \n
          **LOG FILES**  \n
          We use IP addresses to analyze trends, administer our site and servers, track access, and gather broad demographic information for aggregate use. IP addresses are not linked to personally identifiable information. It is possible that personal information about a customer may be included in the log files due to the normal functions of IP addresses and Web browsing.\n
          \n
          **COOKIES**  \n
          We use different cookies on our website to make it as useful to you as possible. Cookies are small text files that we put on your computer or mobile device to tell us what you want to use on our site but they do not tell us who you are.\n
          \n
          [Here](http://www.aboutcookies.org/) you can learn more about cookies and how to [control](http://www.aboutcookies.org/how-to-control-cookies/) or [delete](http://www.aboutcookies.org/how-to-delete-cookies/) them.\n
          \n
          Here are the cookies that we use on our site:\n
          \n
          _Essential cookies_  \n
          We use a cookie to remember your login for you and what you’ve put in the shop cart. Also, we set a cookie to help you choose a preferred font size for using the site. These cookies we consider essential for the operation of our website.\n
          \n
          _External web services_  \n
          We use an external live chat service (using cookies to remember your session name) to deliver real-time support to you should you want to.\n
          \n
          _Analytics_  \n
          We use Google Analytics and Facebook cookies to monitor visitor activity on our website. No personally identifying data is included in this type of reporting. We do not share information about this analysis with any third parties.\n
          \n
          Visitors can [opt out of Google's advertising tracking cookie](https://policies.google.com/technologies/ads) or [install a browser plugin](https://tools.google.com/dlpage/gaoptout?hl=en) to opt out of all Google Analytics tracking software. More information about Facebook's analytics cookie is available [here](https://www.facebook.com/policies/cookies/?utm_referrer=https://www.cloudflare.com/privacypolicy/).\n
          \n
          We assume you are happy with this usage of cookies on this website. If you are not happy, then you should either not use this site, or delete the cookies (you can check out how to do that according to your browser [here](http://www.aboutcookies.org/how-to-delete-cookies/)), or browse the site using your browser’s anonymous usage setting (named “Incognito” in Chrome, “InPrivate” for Internet Explorer, "Private Browsing" in Firefox and Safari etc.).\n
          \n
          We currently do not alter our practices when we receive a "Do Not Track" signal from a visitor's browser.\n
          \n
          Please remember that if you choose to delete the cookies or use the browser anonymously, you may find that certain sections of this website do not work properly.\n
          \n
          **YOUR RIGHTS UNDER THE GENERAL DATA PROTECTION REGULATION (GDPR)**\n
          \n
          If you are a resident of the European Economic Area (EEA), you have the following data protection rights:\n
          \n
          _Managing Your Information_  \n
          You may access and update some of your information through the "Change Contact Details" section in the WHCP. If you have chosen to connect your account to a third-party application like Facebook, Google or Twitter, you can change your settings and remove permission for the app from the "Linked Social Accounts" section in the WHCP. You are responsible for keeping your personal information up to date.\n
          \n
          _Rectification of Inaccurate or Incomplete Information_  \n
          You have the right to ask us to correct any inaccurate or incomplete personal information concerning you if you cannot update it yourself from within your account.\n
          \n
          _Data Access and Portability_  \n
          In some jurisdictions, the applicable law may entitle you to request copies of your personal information held by us. You may also be entitled to request copies of personal information that you have provided to us in a structured, commonly used, and machine-readable format and/or request us to transmit this information to another service provider (where technically feasible).\n
          \n
          _Opt-out of marketing communications_  \n
          You have the right to opt-out of marketing communications we send you at any time. You can exercise this right by clicking on the "unsubscribe" or "opt-out" link in the marketing emails we send you.\n
          \n
          _Data Retention and Erasure_  \n
          We generally retain your personal information for as long as is necessary for the performance of the contract between you and us and to comply with our legal obligations. If you no longer want us to use your information to provide the contracted services to you, you can request that we erase your personal information and close your account. Please note that if you request the erasure of your personal information:\n
          \n
          We may retain some of your personal information so as to detect and prevent fraud and enhance safety. For example, if we suspend an account for security reasons, we may retain certain information from that account to prevent that customer from opening a new account in the future.\n
          \n
          We may retain and use your personal information to the extent necessary to comply with our legal obligations. For example, we may keep some of your information for tax, legal reporting and auditing purposes.\n
          \n
          Because we maintain our platform to protect it from accidental or malicious loss and destruction, residual copies of your personal information may not be removed from our backup systems for a limited period of time.\n
          \n
          In cases where fraudulent or otherwise illegal activity has been deemed to have occurred as determined by law enforcement or management, the information may remain in our database indefinitely in order to help facilitate the prevention of repeated abuse in the future from the offending party.\n
          \n
          _Withdrawing Consent and Restriction of Processing_  \n
          If you have provided your consent to the processing of your personal information, you may withdraw it at any time by sending us a communication specifying which consent you are withdrawing. Please note that the withdrawal of your consent does not affect the lawfulness of any processing activities based on such consent before its withdrawal. Additionally, in some jurisdictions, applicable law may give you the right to limit the ways in which we use your personal information, in particular where (i) you contest the accuracy of your personal information; (ii) the processing is unlawful and you oppose the erasure of your personal information; (iii) we no longer need your personal information for the purposes of the processing, but you require the information for the establishment, exercise or defence of legal claims; or (iv) you have objected to the processing and pending the verification whether the Service Provider's legitimate grounds override your own.\n
          \n
          _Objection to Processing_  \n
          In some jurisdictions, applicable law may entitle you to require us not to process your personal information for certain specific purposes (including profiling) where such processing is based on legitimate interest. If you object to such processing, we will no longer process your personal information for these purposes unless we can demonstrate compelling legitimate grounds for such processing or such processing is required for the establishment, exercise or defence of legal claims.\n
          \n
          By default, customers do receive any system updates, such as the newsletters, invoices and service email notifications. Customers cannot opt out of possibly receiving important system notifications, since the latter are deemed necessary for the performance of our contractual obligations to you.\n
          \n
          _Lodging Complaints_  \n
          If you want to make a complaint about the way we are processing your data, you can contact us using the contact details below.\n
          \n
          You have the right to complain to a data protection authority about our collection and use of your personal information. For more information, please contact your local data protection authority.\n
          \n
          \---\n
          \n
          We respond to all requests we receive from individuals wishing to exercise their data protection rights in accordance with applicable data protection laws.\n
          \n
          **INTERNATIONAL TRANSFERS OF INFORMATION WE COLLECT**  \n
          We collect information globally and primarily store that information in the United States. We transfer, process and store your information outside of your country of residence. Whenever we transfer your information, we take steps to protect it.\n
          \n
          To facilitate our global operations, we transfer information to the United States and allow access to that information from countries in which we and associated companies have operations for the purposes described in this policy. These countries may not have equivalent privacy and data protection laws, certainly not equivalent to the laws of many of the countries where our customers and users are based. When we share information about you, we make use of Standard Contractual Clauses (SCCs) for data transfers between EU and non-EU countries, which have been approved by the European Commission.\n
          \n
          A copy of your personal data will also be stored in the data center you have selected when signing up for our services. This is done so that the Service Provider can deliver the contracted service in the location specified by the customer.\n
          \n
          **COMPLIANCE WITH LAWS AND LAW ENFORCEMENT**  \n
          The Service Provider cooperates with government and law enforcement officials to enforce and comply with the law. We will disclose any information about Users upon valid request by government or law officials as we, in our sole discretion, believe necessary or appropriate to respond to claims and legal process (including without limitation subpoenas), to protect your property and rights, or the property and rights of a third party, to protect the safety of the public or any person, or stop activity we consider illegal or unethical.\n
          \n
          **CHANGES TO PRIVACY POLICY**  \n
          Any changes to our Privacy Policy will be placed here and will supersede this version of our Policy. We will take reasonable steps to draw your attention to any changes in our Policy. However, to be on the safe side, we suggest that you read this document each time you use the website to ensure that it still meets with your approval.\n
          \n
          **CONTACT US**  \n
          If you have any questions about our Privacy Policy, or if you want to know what information we have collected about you, please use our Contact Us form.\n
          \n
          Postal Address:\n
          \n
          LiquidNet US LLC  \n
          6750 North Andrews Ave  \n
          Suite 200  \n
          Fort Lauderdale, FL 33309  \n
          United States of America\n
          \n
          LiquidNet Ltd.  \n
          13 Craigleith  \n
          7 Kersfield Road  \n
          Putney, London SW15 3HN  \n
          United Kingdom
          """
        "tos" => """
          An Acceptable Use Policy (AUP) is a set of rules and conditions compiled by a network, system, or a website owner. These rules explicitly define and restrict the ways in which the respective network, system or website may be used.\n
          \n
          The **AUP of the Service Provider** aims to clearly outline the purposes for which our customers CANNOT utilize our hosting services and position data on our network servers.\n
          \n
          This Acceptable Use Policy (AUP) is an integral part of the [Web Hosting Terms of Service](https://www.philwebdev.com/terms-and-conditions-2/web-hosting-terms-of-service-3/) which each customer agrees to abide by when signing up for an account with our web hosting company. Any violation of this AUP will be deemed a violation of our Web Hosting Terms of Service.\n
          \n
          We, at our own discretion, shall determine whether an act constitutes a breach of this AUP terms and misuse of our services. We reserve our right to be the sole arbiter in determining the sufficiency of the presented evidences. We will respond accordingly, and/or immediately terminate the provision of the services, shall we receive the report, and/or have sufficient proof, of any prohibited conduct outlined in this AUP, or any other activity threatening the security of our hosting environment and/or our network of hosting servers.\n
          \n
          In order to protect our company’s reputation and responsibilities, and guarantee state-of-the-art and reliable hosting services to all our customers, as well as privacy and security for all users, we – the Service Provider - hereby outline the following AUP rules and conditions to come into force for each customer signing up for a web hosting account with our company:\n
          \n
          1\. [System Abuse](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#SYSTEM_ABUSE)\n
          \n
          2\. [Spam and Spamvertizing](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#SPAM_AND_SPAMVERTIZING)\n
          \n
          3\. [Inappropriate or Unlawful Content](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#INAPPROPRIATE_OR_UNLAWFUL_CONTENT_)\n
          \n
          4\. [Copyrights](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#COPYRIGHTS)\n
          \n
          5\. [Corrective Actions](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#CORRECTIVE_ACTIONS)\n
          \n
          6\. [Reporting Violtaions](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#REPORTING_VIOLATIONS)\n
          \n
          7\. [Revisions](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#REVISIONS)\n
          \n
          **1\. SYSTEM ABUSE**\n
          \n
          Any customer in violation of our system or network security is subject to criminal and civil liability, as well as immediate account termination. Examples include, but are not limited to the following:\n
          \n
          Unauthorized access, use, probe, or scan of our system’s security, authentication measures, data, or traffic. Interference with the service to any user, host or network including, but not limited to: e-mail bombing, flooding, deliberate attempts to overload the system and broadcast attacks, forging of any TCP/IP packet header or any part of the header information in an e-mail or newsgroup posting.\n
          \n
          Any attempt at doing harm to a server or a customer of our web hosting services:\n
          \n
          the Service Provider will immediately and resolutely react to any attempt at misuse of an Internet account or computer, or any attempt to gain access to an Internet account or computer by a Service Provider's customer unauthorized by the account/computer owner. Such attempts include, but are not limited to the following: 'Internet scamming' (tricking other people into releasing their passwords, etc.), password robbery, security hole scanning, running proxy - proxy lists and any kind of proxy scripts (including, but not limited to PHP proxy and mph proxy), introducing of any computer programs (viruses, Trojan horses, trap doors, back doors, worms, time bombs, packet bombs, cancelbots, etc.) that are intended to negatively interfere with, intercept, irreversibly damage or take hold of any system, data or personal information. It WILL NOT matter whether the attacked account or computer belongs or not to the Service Provider's services. The fraud will be subject to actions based on the very nature of the attack and those may represent a warning, an account suspension or cancellation, and/or civil or criminal legal actions.\n
          \n
          Background operations/programs on servers:\n
          \n
          ‘Background process’ is a program that runs in the background of the operating system. What is specific for a background process is that, once started, it runs simultaneously with other foreground processes. This means that, the shell executing the background operation does not wait for it to finish or terminate, as it does with foreground processes, but is free to start executing more operations along with the background one. Typical background processes are ircd, irc bot, bnc, and many others.\n
          \n
          Background processes are not permitted on any of our shared hosting servers, as they usually lead to CPU overload and can be used for malicious and/or illegal actions. As our primary task is to provide highest quality web hosting service to all our customers, we cannot permit any background processes to be executed and threaten the performance of our server network. Our shared hosting system does not allow a big multitude of users to simultaneously use the system memory and processing time of our servers.\n
          \n
          Excessive use of system resources:\n
          \n
          In order to ensure higher server performance and quality of hosting service all shared hosting plans are subject to certain resource limitations concerning, but not limited to, server CPU usage, Memory usage, disk-space and traffic. If a hosting account exceeds the allowed amount of system resources the account owner will be immediately notified to take actions in order to reduce the usage. If such action is not instantly taken by the owner the account will be suspended. If an excessive CPU usage is detected the account owner will be suggested to place an order for a CPU usage upgrade or upgrade to a plan which allows higher CPU usage.\n
          \n
          If any hosting account is found to be causing degradation of the server and/or our hosting network’s performance, regardless of the reason, the account will be subject to suspension or immediate removal, depending on the situation. The Service Provider will be the sole arbiter in determining whether a given account is excessively using the server resources and/or causing a server degradation.\n
          \n
          **2\. SPAM AND SPAMVERTIZING**\n
          \n
          SPAMMING IS PROHIBITED. Users MAY NOT utilize our web hosting services to transmit, distribute or deliver any unsolicited bulk or commercial messages over the Internet (an action known as "spam" or "spamming").\n
          \n
          Spamming is a violation of ethic norms and will be interpreted as an infringement. the Service Provider will not tolerate the sending of unsolicited bulk or commercial messages through our services, as well as through another service that is mentioning, in some way, our customer’s domain name or implies the utilization of our network or our e-mail services for sending the unsolicited bulk or messages.\n
          \n
          SPAMVERTISING IS PROHIBITED. 'Spamvertizing’ refers to the practice of sending unsolicited spam messages for the purpose of advertising a particular website.\n
          \n
          If such e-mails are relayed through 3rd party (e-mail spoofing) and/or are promoting a domain hosted on our servers, this will lead to immediate account suspension unless an evidence of legitimacy for non-involvement of the domain owner in the particular illegal action is provided.\n
          \n
          ’E-mail spoofing’ is a fraudulent e-mail activity in which the sender’s (3td party) e-mail address and other parts of the e-mail header are changed so as to appear that the e-mail has been sent from a different source (e-mail address owner/server).\n
          \n
          'Unsolicited message’ is a message that is sent against the privacy policy of a newsgroup, or is sent to a recipient without their explicit permission. We, at our sole discretion, shall determine whether any of the messages you are sending is spam or spamvertizing. For your information, spamming generally includes, but is not limited to the following\n
          \n
          Sending of unsolicited messages in bulk, or sending of unsolicited e-mails, which provoke complaints from recipients;\n
          \n
          Sending of junk mail;\n
          \n
          Use of distribution lists that include people who have not given prior explicit permission to be involved in such a distribution process;\n
          \n
          Posting commercial ads to USENET newsgroups that do not permit it;\n
          \n
          Posting articles containing binary encoded data to non-binary newsgroups;\n
          \n
          Excessive and repeated posting of off-topic messages to newsgroups;\n
          \n
          Excessive and repeated cross-posting;\n
          \n
          E-mail harassment of another Internet Customer or Customers, including but not limited to, transmitting of any threatening, libellous or obscene material, or material of any nature that may be deemed offensive;\n
          \n
          E-mailing of age-inappropriate communications or content to anyone under the age of 18.\n
          \n
          **3\. INAPPROPRIATE OR UNLAWFUL CONTENT**\n
          \n
          CONTENT published or transmitted via the Service Provider’s hosting services includes website content, email content, forum/blog postings, chat content, and/or any other type of content hosted on our servers, published online or transmitted through our network’s services.\n
          \n
          The user of our services is NOT permitted to post online content or have links to content that:\n
          \n
          is defamatory, abusive or obscene, violates a person’s reputation/privacy, is reasonably deemed offensive by the web community, is anti-religious or anti-human rights, or contains any type of threatening or hate speech, encourages harassment or physical harm to any group or individual, or is otherwise malicious/fraudulent and may result in complaints/liabilities/or retaliation against the Service Provider by offended viewers;\n
          \n
          promotes or encourages illegal activities (e.g. illegal drugs, illegal gambling, arms trafficking, etc.) or violates any applicable law, statute, ordinance or regulation, including but not limited to the laws and regulations governing export control, unfair competition, false advertising, consumer protection, etc.\n
          \n
          represents pornography – any type of pornographic/adult material, including child pornography, or advertisements of pornographic websites;\n
          \n
          represents infringement on copyright, patents, trademarks, trade secrets, or third party's intellectual property or proprietary rights, including pirated computer programs, hacking/phreaking software, warez or any type of software/content (including also ROMs, ROM Emulators, media files – MP3, AVI, .RM, etc., torrent files, and others) that is copyrighted, is NOT uploaded in compliance with its license agreement or is NOT freely available for distribution.\n
          \n
          **4\. COPYRIGHTS**\n
          \n
          Copyrighted material must not be placed on customers' accounts without the explicit permission of the copyright owner or a person explicitly authorized to give such permission by the copyright owner. Upon receipt of a claim for copyright infringement, or a notice of such violation, we will immediately run full investigation and, upon confirmation, will promptly remove the infringing material from the Services. Further procedures (in accordance with our stated below corrective measures) will be carried out if necessary. We will assume no liability to any Customer of the Services for the removal of any such material.\n
          \n
          **5\. CORRECTIVE ACTIONS**\n
          \n
          We reserve our right to be the sole arbiter in determining the seriousness of each infringement and to immediately take corrective actions.\n
          \n
          We will disable the customer's account if we deem necessary, at our sole discretion. Upon closing of the customer’s account we will send an e-mail notification to the customer, stating the reason for the termination and quoting our terms’ chapter that has been violated. The customer will be given an opportunity to respond and take measures to remedy the situation should he/she consider him/herself abused by a third party. Upon fulfilling of this obligation, we may re-activate the customer’s account, if we find, at our own discretion, sufficient evidence pro customer’s side.\n
          \n
          Closed accounts due to repeated violations will not be re-activated. A backup may be requested, however it will be subject to certain penalty fees imposed according to the breach of this AUP terms. The final penalty fee will be determined by the type and frequency of the violations.\n
          \n
          **6\. REPORTING VIOLATIONS**\n
          \n
          If you need to report a violation of this AUP agreement or believe that you or your system has been subject to attack originating from our web hosting system, please contact us immediately. Our professional team will investigate the situation and provide you with full assistance.\n
          \n
          **7\. REVISIONS**\n
          \n
          We reserve our right to change this AUP at any time, without prior notice. We encourage our users to periodically review this Acceptable Use Policy and our Web Hosting Terms of Service.
          """
      ]
      "logo_url" => "https://www.philwebdev.com/billing/logod.svg"
      "languages" => array:2 [
        0 => array:3 [
          "locale" => "en_US"
          "title" => "English(en_US)"
          "name" => "English"
        ]
        1 => array:3 [
          "locale" => "hr_HR"
          "title" => "hr_HR(hr_HR)"
          "name" => "hr_HR"
        ]
      ]
    ]
    
  2. array:3 [
      "meta_title" => array:2 [
        0 => __TwigTemplate_48f67a13f3994ad241545cc961e85472 {#361}
        1 => "block_meta_title"
      ]
      "body" => array:2 [
        0 => __TwigTemplate_48f67a13f3994ad241545cc961e85472 {#361}
        1 => "block_body"
      ]
      "js" => array:2 [
        0 => __TwigTemplate_48f67a13f3994ad241545cc961e85472 {#361}
        1 => "block_js"
      ]
    ]
    
/home/philwebd/public_html/billing/vendor/twig/twig/src/Template.php
        } else {
            ob_start(function () { return ''; });
        }
        try {
            $this->display($context);
        } catch (\Throwable $e) {
            while (ob_get_level() > $level) {
                ob_end_clean();
            }
 
            throw $e;
        }
 
        return ob_get_clean();
    }
 
    protected function displayWithErrorHandling(array $context, array $blocks = [])
    {
        try {
            $this->doDisplay($context, $blocks);
        } catch (Error $e) {
            if (!$e->getSourceContext()) {
                $e->setSourceContext($this->getSourceContext());
            }
 
            // this is mostly useful for \Twig\Error\LoaderError exceptions
            // see \Twig\Error\LoaderError
            if (-1 === $e->getTemplateLine()) {
                $e->guess();
            }
 
            throw $e;
        } catch (\Throwable $e) {
            $e = new RuntimeError(sprintf('An exception has been thrown during the rendering of a template ("%s").', $e->getMessage()), -1, $this->getSourceContext(), $e);
            $e->guess();
 
            throw $e;
        }
    }
 
Arguments
  1. array:11 [
      "CSRFToken" => "6921348dc90961df5535dfa8a24e50f2"
      "request" => array:2 [
        "_url" => "/order"
        "product" => "7"
      ]
      "guest" => Api_Handler {#175}
      "FOSSBillingVersion" => "0.6.20"
      "current_theme" => "huraga"
      "settings" => array:57 [
        "CSRFToken" => "3f10ff5d59184687b9efad79ebd8597e"
        "color_scheme" => "green"
        "show_page_header" => "1"
        "show_company_logo" => "1"
        "show_company_name" => "0"
        "show_client_details" => "1"
        "sidebar_balance_enabled" => "1"
        "top_menu_dashboard" => "1"
        "top_menu_profile" => "1"
        "top_menu_signout" => "1"
        "login_page_show_logo" => "1"
        "login_page_logo_url" => "/"
        "show_password_reset_link" => "1"
        "show_signup_link" => "0"
        "login_page_show_remember_me" => "1"
        "show_breadcrumb" => "1"
        "hide_dashboard_breadcrumb" => "1"
        "require_login" => "1"
        "showcase_enabled" => "0"
        "showcase_size" => "3"
        "showcase_text" => "Showcase text"
        "showcase_button_title" => "Showcase button title"
        "showcase_button_url" => "Showcase link URL"
        "side_menu_dashboard" => "1"
        "side_menu_order" => "1"
        "side_menu_support" => "1"
        "side_menu_services" => "1"
        "side_menu_invoices" => "1"
        "side_menu_emails" => "1"
        "side_menu_payments" => "1"
        "side_menu_news" => "1"
        "side_menu_kb" => "1"
        "sidebar_note_enabled" => "0"
        "sidebar_note_title" => "Note title"
        "sidebar_note_content" => "Note content"
        "meta_title" => ""
        "meta_description" => "Members area"
        "meta_keywords" => "members area"
        "meta_robots" => "noindex, nofollow"
        "meta_author" => "PhilWebDev"
        "footer_enabled" => "1"
        "footer_to_top_enabled" => "1"
        "footer_signature" => ""
        "footer_link_1_enabled" => "on"
        "footer_link_1_title" => "About us"
        "footer_link_1_page" => "about-us"
        "footer_link_2_enabled" => "on"
        "footer_link_2_title" => "Terms and conditions"
        "footer_link_2_page" => "tos"
        "footer_link_3_enabled" => "on"
        "footer_link_3_title" => "Privacy policy"
        "footer_link_3_page" => "privacy-policy"
        "footer_link_4_title" => ""
        "footer_link_4_page" => ""
        "footer_link_5_title" => ""
        "footer_link_5_page" => ""
        "inject_javascript" => ""
      ]
      "loader_nr" => "8"
      "loader_url" => "img/assets/loaders/loader8.gif"
      "company" => array:11 [
        "www" => "https://billing.philwebdev.com/"
        "name" => "XWDV Information Technology Solutions"
        "signature" => """
          Regards,\n
          \n
          XWDV Information Technology Solutions\n
          https://www.philwebdev.com\n
          \n
          \n
          """
        "logo_url" => "https://www.philwebdev.com/billing/logod.svg"
        "logo_url_dark" => "https://www.philwebdev.com/billing/logow.svg"
        "favicon_url" => "https://www.philwebdev.com/billing/themes/huraga/assets/favicon.ico"
        "display_bank_info" => "0"
        "bank_info_pagebottom" => null
        "note" => ""
        "privacy_policy" => """
          This Privacy Policy describes the policies and procedures of PhilWebDev Domain and Business Hosting Solution, in association with - LiquidNet US LLC, a US company headquartered in Fort Lauderdale, Florida, and LiquidNet Ltd., a UK company headquartered in London, UK, on the collection, use and disclosure of your information. Legal details about the two companies can be found in the 'Contact Us' section of this document.\n
          \n
          For the sake of brevity, PhilWebDev Domain and Business Hosting Solution, LiquidNet US LLC and LiquidNet Ltd. will be referred to as 'We', 'Us', 'Our' and 'Service Provider' in this document.\n
          \n
          This Privacy Policy does not apply to information our customers may process when using our services.\n
          \n
          \---\n
          \n
          Privacy and security are of utmost importance to the Service Provider and we strive to ensure that our technical and organizational measures in place respect your data protection rights.\n
          \n
          **COLLECTION OF PERSONAL DATA**  \n
          "Personal data" refers to any information relating to an identifiable individual or his or her personal identity.\n
          \n
          Personal data is collected on our website by LiquidNet US LLC., a US company headquartered in Fort Lauderdale, Florida.\n
          \n
          The personally identifiable information that LiquidNet US LLC may collect from you when registering for an account includes: first and last name, postal address, phone number, email and IP address.\n
          \n
          If you want to use your Social Media account as a means to log in to your hosting account, you will also have to provide your Social Media ID.\n
          \n
          Your information will be needed for the following purposes:\n
          \n
          *   provision of our services to you;\n
          *   prevention of fraudulent transactions;\n
          *   billing/invoicing operations;\n
          *   provision of a sales/technical support service;\n
          *   maintenance of your account with us;\n
          *   dispute resolution cases;\n
          *   enforcement of our Terms of Service, or other legal rights, or as may be required by applicable laws and regulations or requested by any judicial process or governmental agency;\n
          *   collection of aggregate statistics about use of our services;\n
          \n
          Much of the data collected is aggregated or statistical data about how individuals use our Services, and is not linked to any personal data, but to the extent it is itself personal data, or is linked or linkable to personal data, we treat it accordingly.\n
          \n
          The Service Provider will NOT send you any unsolicited information, including emails, except as mentioned hereby.\n
          \n
          New customers will receive a welcome email containing information about the features provided by the Service, as well as WHCP (Web Hosting Control Panel) and FTP login details.\n
          \n
          The Service Provider may also send system notifications upon need, related to any upgrade, maintenance or other service issues concerning your hosting account.\n
          \n
          If you contact us directly, we may receive additional information about you such as your name, email address, phone number, the contents of the message and/or attachments you may send us, and any other information you may choose to provide. We may also receive a confirmation when you open an email from us.\n
          \n
          The Service Provider will keep your personally identifiable information private and will NOT share it with any unauthorized third parties.\n
          \n
          When you use our services, we may collect information about your engagement with and utilization of our services, such as processor and memory usage, storage capacity, navigation of our services, and system-level metrics. We use this data to operate the services, maintain and improve the performance and utilization of the services, develop new features, protect the security and safety of our services and our customers, and provide customer support. We also use this data to develop aggregate analysis and business intelligence that enable us to operate, protect, make informed decisions, and report on the performance of our business.\n
          \n
          **LEGAL BASIS FOR PROCESSING OF PERSONAL DATA**  \n
          We collect personal information from you only when:\n
          \n
          you give your consent for us to so,\n
          \n
          we need your personal information to perform a contract with you (e.g. to deliver the services you have requested), or,\n
          \n
          the processing is in our legitimate interests and not overridden by your rights;\n
          \n
          We have a legitimate interest in operating our services and communicating with you as necessary to provide these services, for example when responding to your queries, improving our platform, undertaking marketing, or for the purposes of detecting or preventing illegal activities.\n
          \n
          Please note that in most cases, if you do not submit the requested information, the Service Provider will not be able to provide the requested service to you.\n
          \n
          In some cases, we may also have a legal obligation to collect personal information from you, or may otherwise need that information to protect your vital interests or those of some other person's.\n
          \n
          If we ask you to provide personal information to comply with a legal requirement or to perform a contract with you, we will make this clear at the relevant time and advise you whether the provision of your personal information is mandatory or not (as well as of the possible consequences if you do not provide your personal information).\n
          \n
          **ACCESS TO YOUR PERSONAL DATA**  \n
          You may access and update your personal Information at any time from your Web Hosting Control Panel - > My Account - > Change Contact Details section.\n
          \n
          **SECURITY OF YOUR PERSONAL DATA**  \n
          The Service Provider is committed to protecting the security of customer collected personal information. To do so, we use technical security measures to prevent the loss, misuse, alternation or unauthorized disclosure of information under our control. We use security measures including and not limited to: physical, electronic and managerial procedures to safeguard and secure the information we collect online. However, please keep in mind that the Internet cannot be guaranteed to be 100% secure.\n
          \n
          If the Service Provider learns of a security system breach, we may attempt to notify you and send you any available protective information to the email address that you have provided to us or by posting a notice in your WHCP.\n
          \n
          **SHARING YOUR PERSONAL DATA WITH THIRD PARTIES**  \n
          We may share the information we collect in various ways, including the following:\n
          \n
          _Service Providers_  \n
          We may share information with third-party service providers that provide services on our behalf, such as helping to provide our services and to provide you with information relevant to you such as product announcements, service upgrades, special offers, or other information.\n
          \n
          _As Required By Law and Similar Disclosures_  \n
          We may also share information to (i) satisfy any applicable law, regulation, legal process, or governmental request; (ii) enforce this Privacy Policy and our Terms of Service, including investigation of potential violations hereof; (iii) detect, prevent, or otherwise address fraud, security, or technical issues; (iv) respond to your requests; or (v) protect our rights, property or safety, our users and the public. This includes exchanging information with other companies and organizations for fraud protection and spam/malware prevention.\n
          \n
          **THIRD-PARTY SERVICES**  \n
          You may access other third-party services through our services, for example by clicking on links to those third-party services from within our services. We are not responsible for the privacy policies and/or practices of these third-party services, and we encourage you to carefully review their privacy policies.\n
          \n
          **PRIVACY OF YOUR PAYMENT DETAILS**  \n
          We use third-party payment processing companies who collect and store financial information, such as your payment method (valid credit card number, type, expiration date or other financial information), and their use and storage of that information is governed by the payment processors' applicable terms of service and privacy policy. Collected billing information is used for the purposes of processing payments and fraud detection.\n
          \n
          We do not store your financial account information on our systems; however, we have access to, and may retain, subscriber information through our third-party payment processor.\n
          \n
          All PayPal transactions are subject to the [PayPal Privacy Policy](https://www.paypal.com/en/webapps/mpp/ua/privacy-full).\n
          \n
          **PRIVACY OF YOUR ACCOUNT**  \n
          We consider your registration data and the content of all your messages private and confidential. The header of the messages that you send will contain your name (e-mail address) and Internet Protocol (IP) address. We will not intentionally monitor or disclose any of your e-mail content or registration data unless we are required to do so:\n
          \n
          to enforce these Terms and Conditions,\n
          \n
          by law,\n
          \n
          to defend ourselves in any legal action,\n
          \n
          to protect our property.\n
          \n
          Since your password is essential for protecting your privacy, we encourage you to NOT share it with anyone and change it frequently. Additionally, you agree to respect the privacy and confidentiality of others.\n
          \n
          **AGE RESTRICTIONS**  \n
          We offer services only to people who are 18+. Our services are not targeted to, intended to be consumed by or designed to entice individuals under the age of 18. If we learn that we have collected the personal information of a child under the age of 18, we will take steps to delete that information as soon as possible.\n
          \n
          If you know of or have reason to believe that anyone under the age of 18 has provided us with any personal data, please contact us.\n
          \n
          **LOG FILES**  \n
          We use IP addresses to analyze trends, administer our site and servers, track access, and gather broad demographic information for aggregate use. IP addresses are not linked to personally identifiable information. It is possible that personal information about a customer may be included in the log files due to the normal functions of IP addresses and Web browsing.\n
          \n
          **COOKIES**  \n
          We use different cookies on our website to make it as useful to you as possible. Cookies are small text files that we put on your computer or mobile device to tell us what you want to use on our site but they do not tell us who you are.\n
          \n
          [Here](http://www.aboutcookies.org/) you can learn more about cookies and how to [control](http://www.aboutcookies.org/how-to-control-cookies/) or [delete](http://www.aboutcookies.org/how-to-delete-cookies/) them.\n
          \n
          Here are the cookies that we use on our site:\n
          \n
          _Essential cookies_  \n
          We use a cookie to remember your login for you and what you’ve put in the shop cart. Also, we set a cookie to help you choose a preferred font size for using the site. These cookies we consider essential for the operation of our website.\n
          \n
          _External web services_  \n
          We use an external live chat service (using cookies to remember your session name) to deliver real-time support to you should you want to.\n
          \n
          _Analytics_  \n
          We use Google Analytics and Facebook cookies to monitor visitor activity on our website. No personally identifying data is included in this type of reporting. We do not share information about this analysis with any third parties.\n
          \n
          Visitors can [opt out of Google's advertising tracking cookie](https://policies.google.com/technologies/ads) or [install a browser plugin](https://tools.google.com/dlpage/gaoptout?hl=en) to opt out of all Google Analytics tracking software. More information about Facebook's analytics cookie is available [here](https://www.facebook.com/policies/cookies/?utm_referrer=https://www.cloudflare.com/privacypolicy/).\n
          \n
          We assume you are happy with this usage of cookies on this website. If you are not happy, then you should either not use this site, or delete the cookies (you can check out how to do that according to your browser [here](http://www.aboutcookies.org/how-to-delete-cookies/)), or browse the site using your browser’s anonymous usage setting (named “Incognito” in Chrome, “InPrivate” for Internet Explorer, "Private Browsing" in Firefox and Safari etc.).\n
          \n
          We currently do not alter our practices when we receive a "Do Not Track" signal from a visitor's browser.\n
          \n
          Please remember that if you choose to delete the cookies or use the browser anonymously, you may find that certain sections of this website do not work properly.\n
          \n
          **YOUR RIGHTS UNDER THE GENERAL DATA PROTECTION REGULATION (GDPR)**\n
          \n
          If you are a resident of the European Economic Area (EEA), you have the following data protection rights:\n
          \n
          _Managing Your Information_  \n
          You may access and update some of your information through the "Change Contact Details" section in the WHCP. If you have chosen to connect your account to a third-party application like Facebook, Google or Twitter, you can change your settings and remove permission for the app from the "Linked Social Accounts" section in the WHCP. You are responsible for keeping your personal information up to date.\n
          \n
          _Rectification of Inaccurate or Incomplete Information_  \n
          You have the right to ask us to correct any inaccurate or incomplete personal information concerning you if you cannot update it yourself from within your account.\n
          \n
          _Data Access and Portability_  \n
          In some jurisdictions, the applicable law may entitle you to request copies of your personal information held by us. You may also be entitled to request copies of personal information that you have provided to us in a structured, commonly used, and machine-readable format and/or request us to transmit this information to another service provider (where technically feasible).\n
          \n
          _Opt-out of marketing communications_  \n
          You have the right to opt-out of marketing communications we send you at any time. You can exercise this right by clicking on the "unsubscribe" or "opt-out" link in the marketing emails we send you.\n
          \n
          _Data Retention and Erasure_  \n
          We generally retain your personal information for as long as is necessary for the performance of the contract between you and us and to comply with our legal obligations. If you no longer want us to use your information to provide the contracted services to you, you can request that we erase your personal information and close your account. Please note that if you request the erasure of your personal information:\n
          \n
          We may retain some of your personal information so as to detect and prevent fraud and enhance safety. For example, if we suspend an account for security reasons, we may retain certain information from that account to prevent that customer from opening a new account in the future.\n
          \n
          We may retain and use your personal information to the extent necessary to comply with our legal obligations. For example, we may keep some of your information for tax, legal reporting and auditing purposes.\n
          \n
          Because we maintain our platform to protect it from accidental or malicious loss and destruction, residual copies of your personal information may not be removed from our backup systems for a limited period of time.\n
          \n
          In cases where fraudulent or otherwise illegal activity has been deemed to have occurred as determined by law enforcement or management, the information may remain in our database indefinitely in order to help facilitate the prevention of repeated abuse in the future from the offending party.\n
          \n
          _Withdrawing Consent and Restriction of Processing_  \n
          If you have provided your consent to the processing of your personal information, you may withdraw it at any time by sending us a communication specifying which consent you are withdrawing. Please note that the withdrawal of your consent does not affect the lawfulness of any processing activities based on such consent before its withdrawal. Additionally, in some jurisdictions, applicable law may give you the right to limit the ways in which we use your personal information, in particular where (i) you contest the accuracy of your personal information; (ii) the processing is unlawful and you oppose the erasure of your personal information; (iii) we no longer need your personal information for the purposes of the processing, but you require the information for the establishment, exercise or defence of legal claims; or (iv) you have objected to the processing and pending the verification whether the Service Provider's legitimate grounds override your own.\n
          \n
          _Objection to Processing_  \n
          In some jurisdictions, applicable law may entitle you to require us not to process your personal information for certain specific purposes (including profiling) where such processing is based on legitimate interest. If you object to such processing, we will no longer process your personal information for these purposes unless we can demonstrate compelling legitimate grounds for such processing or such processing is required for the establishment, exercise or defence of legal claims.\n
          \n
          By default, customers do receive any system updates, such as the newsletters, invoices and service email notifications. Customers cannot opt out of possibly receiving important system notifications, since the latter are deemed necessary for the performance of our contractual obligations to you.\n
          \n
          _Lodging Complaints_  \n
          If you want to make a complaint about the way we are processing your data, you can contact us using the contact details below.\n
          \n
          You have the right to complain to a data protection authority about our collection and use of your personal information. For more information, please contact your local data protection authority.\n
          \n
          \---\n
          \n
          We respond to all requests we receive from individuals wishing to exercise their data protection rights in accordance with applicable data protection laws.\n
          \n
          **INTERNATIONAL TRANSFERS OF INFORMATION WE COLLECT**  \n
          We collect information globally and primarily store that information in the United States. We transfer, process and store your information outside of your country of residence. Whenever we transfer your information, we take steps to protect it.\n
          \n
          To facilitate our global operations, we transfer information to the United States and allow access to that information from countries in which we and associated companies have operations for the purposes described in this policy. These countries may not have equivalent privacy and data protection laws, certainly not equivalent to the laws of many of the countries where our customers and users are based. When we share information about you, we make use of Standard Contractual Clauses (SCCs) for data transfers between EU and non-EU countries, which have been approved by the European Commission.\n
          \n
          A copy of your personal data will also be stored in the data center you have selected when signing up for our services. This is done so that the Service Provider can deliver the contracted service in the location specified by the customer.\n
          \n
          **COMPLIANCE WITH LAWS AND LAW ENFORCEMENT**  \n
          The Service Provider cooperates with government and law enforcement officials to enforce and comply with the law. We will disclose any information about Users upon valid request by government or law officials as we, in our sole discretion, believe necessary or appropriate to respond to claims and legal process (including without limitation subpoenas), to protect your property and rights, or the property and rights of a third party, to protect the safety of the public or any person, or stop activity we consider illegal or unethical.\n
          \n
          **CHANGES TO PRIVACY POLICY**  \n
          Any changes to our Privacy Policy will be placed here and will supersede this version of our Policy. We will take reasonable steps to draw your attention to any changes in our Policy. However, to be on the safe side, we suggest that you read this document each time you use the website to ensure that it still meets with your approval.\n
          \n
          **CONTACT US**  \n
          If you have any questions about our Privacy Policy, or if you want to know what information we have collected about you, please use our Contact Us form.\n
          \n
          Postal Address:\n
          \n
          LiquidNet US LLC  \n
          6750 North Andrews Ave  \n
          Suite 200  \n
          Fort Lauderdale, FL 33309  \n
          United States of America\n
          \n
          LiquidNet Ltd.  \n
          13 Craigleith  \n
          7 Kersfield Road  \n
          Putney, London SW15 3HN  \n
          United Kingdom
          """
        "tos" => """
          An Acceptable Use Policy (AUP) is a set of rules and conditions compiled by a network, system, or a website owner. These rules explicitly define and restrict the ways in which the respective network, system or website may be used.\n
          \n
          The **AUP of the Service Provider** aims to clearly outline the purposes for which our customers CANNOT utilize our hosting services and position data on our network servers.\n
          \n
          This Acceptable Use Policy (AUP) is an integral part of the [Web Hosting Terms of Service](https://www.philwebdev.com/terms-and-conditions-2/web-hosting-terms-of-service-3/) which each customer agrees to abide by when signing up for an account with our web hosting company. Any violation of this AUP will be deemed a violation of our Web Hosting Terms of Service.\n
          \n
          We, at our own discretion, shall determine whether an act constitutes a breach of this AUP terms and misuse of our services. We reserve our right to be the sole arbiter in determining the sufficiency of the presented evidences. We will respond accordingly, and/or immediately terminate the provision of the services, shall we receive the report, and/or have sufficient proof, of any prohibited conduct outlined in this AUP, or any other activity threatening the security of our hosting environment and/or our network of hosting servers.\n
          \n
          In order to protect our company’s reputation and responsibilities, and guarantee state-of-the-art and reliable hosting services to all our customers, as well as privacy and security for all users, we – the Service Provider - hereby outline the following AUP rules and conditions to come into force for each customer signing up for a web hosting account with our company:\n
          \n
          1\. [System Abuse](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#SYSTEM_ABUSE)\n
          \n
          2\. [Spam and Spamvertizing](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#SPAM_AND_SPAMVERTIZING)\n
          \n
          3\. [Inappropriate or Unlawful Content](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#INAPPROPRIATE_OR_UNLAWFUL_CONTENT_)\n
          \n
          4\. [Copyrights](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#COPYRIGHTS)\n
          \n
          5\. [Corrective Actions](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#CORRECTIVE_ACTIONS)\n
          \n
          6\. [Reporting Violtaions](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#REPORTING_VIOLATIONS)\n
          \n
          7\. [Revisions](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#REVISIONS)\n
          \n
          **1\. SYSTEM ABUSE**\n
          \n
          Any customer in violation of our system or network security is subject to criminal and civil liability, as well as immediate account termination. Examples include, but are not limited to the following:\n
          \n
          Unauthorized access, use, probe, or scan of our system’s security, authentication measures, data, or traffic. Interference with the service to any user, host or network including, but not limited to: e-mail bombing, flooding, deliberate attempts to overload the system and broadcast attacks, forging of any TCP/IP packet header or any part of the header information in an e-mail or newsgroup posting.\n
          \n
          Any attempt at doing harm to a server or a customer of our web hosting services:\n
          \n
          the Service Provider will immediately and resolutely react to any attempt at misuse of an Internet account or computer, or any attempt to gain access to an Internet account or computer by a Service Provider's customer unauthorized by the account/computer owner. Such attempts include, but are not limited to the following: 'Internet scamming' (tricking other people into releasing their passwords, etc.), password robbery, security hole scanning, running proxy - proxy lists and any kind of proxy scripts (including, but not limited to PHP proxy and mph proxy), introducing of any computer programs (viruses, Trojan horses, trap doors, back doors, worms, time bombs, packet bombs, cancelbots, etc.) that are intended to negatively interfere with, intercept, irreversibly damage or take hold of any system, data or personal information. It WILL NOT matter whether the attacked account or computer belongs or not to the Service Provider's services. The fraud will be subject to actions based on the very nature of the attack and those may represent a warning, an account suspension or cancellation, and/or civil or criminal legal actions.\n
          \n
          Background operations/programs on servers:\n
          \n
          ‘Background process’ is a program that runs in the background of the operating system. What is specific for a background process is that, once started, it runs simultaneously with other foreground processes. This means that, the shell executing the background operation does not wait for it to finish or terminate, as it does with foreground processes, but is free to start executing more operations along with the background one. Typical background processes are ircd, irc bot, bnc, and many others.\n
          \n
          Background processes are not permitted on any of our shared hosting servers, as they usually lead to CPU overload and can be used for malicious and/or illegal actions. As our primary task is to provide highest quality web hosting service to all our customers, we cannot permit any background processes to be executed and threaten the performance of our server network. Our shared hosting system does not allow a big multitude of users to simultaneously use the system memory and processing time of our servers.\n
          \n
          Excessive use of system resources:\n
          \n
          In order to ensure higher server performance and quality of hosting service all shared hosting plans are subject to certain resource limitations concerning, but not limited to, server CPU usage, Memory usage, disk-space and traffic. If a hosting account exceeds the allowed amount of system resources the account owner will be immediately notified to take actions in order to reduce the usage. If such action is not instantly taken by the owner the account will be suspended. If an excessive CPU usage is detected the account owner will be suggested to place an order for a CPU usage upgrade or upgrade to a plan which allows higher CPU usage.\n
          \n
          If any hosting account is found to be causing degradation of the server and/or our hosting network’s performance, regardless of the reason, the account will be subject to suspension or immediate removal, depending on the situation. The Service Provider will be the sole arbiter in determining whether a given account is excessively using the server resources and/or causing a server degradation.\n
          \n
          **2\. SPAM AND SPAMVERTIZING**\n
          \n
          SPAMMING IS PROHIBITED. Users MAY NOT utilize our web hosting services to transmit, distribute or deliver any unsolicited bulk or commercial messages over the Internet (an action known as "spam" or "spamming").\n
          \n
          Spamming is a violation of ethic norms and will be interpreted as an infringement. the Service Provider will not tolerate the sending of unsolicited bulk or commercial messages through our services, as well as through another service that is mentioning, in some way, our customer’s domain name or implies the utilization of our network or our e-mail services for sending the unsolicited bulk or messages.\n
          \n
          SPAMVERTISING IS PROHIBITED. 'Spamvertizing’ refers to the practice of sending unsolicited spam messages for the purpose of advertising a particular website.\n
          \n
          If such e-mails are relayed through 3rd party (e-mail spoofing) and/or are promoting a domain hosted on our servers, this will lead to immediate account suspension unless an evidence of legitimacy for non-involvement of the domain owner in the particular illegal action is provided.\n
          \n
          ’E-mail spoofing’ is a fraudulent e-mail activity in which the sender’s (3td party) e-mail address and other parts of the e-mail header are changed so as to appear that the e-mail has been sent from a different source (e-mail address owner/server).\n
          \n
          'Unsolicited message’ is a message that is sent against the privacy policy of a newsgroup, or is sent to a recipient without their explicit permission. We, at our sole discretion, shall determine whether any of the messages you are sending is spam or spamvertizing. For your information, spamming generally includes, but is not limited to the following\n
          \n
          Sending of unsolicited messages in bulk, or sending of unsolicited e-mails, which provoke complaints from recipients;\n
          \n
          Sending of junk mail;\n
          \n
          Use of distribution lists that include people who have not given prior explicit permission to be involved in such a distribution process;\n
          \n
          Posting commercial ads to USENET newsgroups that do not permit it;\n
          \n
          Posting articles containing binary encoded data to non-binary newsgroups;\n
          \n
          Excessive and repeated posting of off-topic messages to newsgroups;\n
          \n
          Excessive and repeated cross-posting;\n
          \n
          E-mail harassment of another Internet Customer or Customers, including but not limited to, transmitting of any threatening, libellous or obscene material, or material of any nature that may be deemed offensive;\n
          \n
          E-mailing of age-inappropriate communications or content to anyone under the age of 18.\n
          \n
          **3\. INAPPROPRIATE OR UNLAWFUL CONTENT**\n
          \n
          CONTENT published or transmitted via the Service Provider’s hosting services includes website content, email content, forum/blog postings, chat content, and/or any other type of content hosted on our servers, published online or transmitted through our network’s services.\n
          \n
          The user of our services is NOT permitted to post online content or have links to content that:\n
          \n
          is defamatory, abusive or obscene, violates a person’s reputation/privacy, is reasonably deemed offensive by the web community, is anti-religious or anti-human rights, or contains any type of threatening or hate speech, encourages harassment or physical harm to any group or individual, or is otherwise malicious/fraudulent and may result in complaints/liabilities/or retaliation against the Service Provider by offended viewers;\n
          \n
          promotes or encourages illegal activities (e.g. illegal drugs, illegal gambling, arms trafficking, etc.) or violates any applicable law, statute, ordinance or regulation, including but not limited to the laws and regulations governing export control, unfair competition, false advertising, consumer protection, etc.\n
          \n
          represents pornography – any type of pornographic/adult material, including child pornography, or advertisements of pornographic websites;\n
          \n
          represents infringement on copyright, patents, trademarks, trade secrets, or third party's intellectual property or proprietary rights, including pirated computer programs, hacking/phreaking software, warez or any type of software/content (including also ROMs, ROM Emulators, media files – MP3, AVI, .RM, etc., torrent files, and others) that is copyrighted, is NOT uploaded in compliance with its license agreement or is NOT freely available for distribution.\n
          \n
          **4\. COPYRIGHTS**\n
          \n
          Copyrighted material must not be placed on customers' accounts without the explicit permission of the copyright owner or a person explicitly authorized to give such permission by the copyright owner. Upon receipt of a claim for copyright infringement, or a notice of such violation, we will immediately run full investigation and, upon confirmation, will promptly remove the infringing material from the Services. Further procedures (in accordance with our stated below corrective measures) will be carried out if necessary. We will assume no liability to any Customer of the Services for the removal of any such material.\n
          \n
          **5\. CORRECTIVE ACTIONS**\n
          \n
          We reserve our right to be the sole arbiter in determining the seriousness of each infringement and to immediately take corrective actions.\n
          \n
          We will disable the customer's account if we deem necessary, at our sole discretion. Upon closing of the customer’s account we will send an e-mail notification to the customer, stating the reason for the termination and quoting our terms’ chapter that has been violated. The customer will be given an opportunity to respond and take measures to remedy the situation should he/she consider him/herself abused by a third party. Upon fulfilling of this obligation, we may re-activate the customer’s account, if we find, at our own discretion, sufficient evidence pro customer’s side.\n
          \n
          Closed accounts due to repeated violations will not be re-activated. A backup may be requested, however it will be subject to certain penalty fees imposed according to the breach of this AUP terms. The final penalty fee will be determined by the type and frequency of the violations.\n
          \n
          **6\. REPORTING VIOLATIONS**\n
          \n
          If you need to report a violation of this AUP agreement or believe that you or your system has been subject to attack originating from our web hosting system, please contact us immediately. Our professional team will investigate the situation and provide you with full assistance.\n
          \n
          **7\. REVISIONS**\n
          \n
          We reserve our right to change this AUP at any time, without prior notice. We encourage our users to periodically review this Acceptable Use Policy and our Web Hosting Terms of Service.
          """
      ]
      "logo_url" => "https://www.philwebdev.com/billing/logod.svg"
      "languages" => array:2 [
        0 => array:3 [
          "locale" => "en_US"
          "title" => "English(en_US)"
          "name" => "English"
        ]
        1 => array:3 [
          "locale" => "hr_HR"
          "title" => "hr_HR(hr_HR)"
          "name" => "hr_HR"
        ]
      ]
    ]
    
  2. array:3 [
      "meta_title" => array:2 [
        0 => __TwigTemplate_48f67a13f3994ad241545cc961e85472 {#361}
        1 => "block_meta_title"
      ]
      "body" => array:2 [
        0 => __TwigTemplate_48f67a13f3994ad241545cc961e85472 {#361}
        1 => "block_body"
      ]
      "js" => array:2 [
        0 => __TwigTemplate_48f67a13f3994ad241545cc961e85472 {#361}
        1 => "block_js"
      ]
    ]
    
/home/philwebd/public_html/billing/vendor/twig/twig/src/Template.php
    {
        return $this;
    }
 
    /**
     * Returns all blocks.
     *
     * This method is for internal use only and should never be called
     * directly.
     *
     * @return array An array of blocks
     */
    public function getBlocks()
    {
        return $this->blocks;
    }
 
    public function display(array $context, array $blocks = [])
    {
        $this->displayWithErrorHandling($this->env->mergeGlobals($context), array_merge($this->blocks, $blocks));
    }
 
    public function render(array $context)
    {
        $level = ob_get_level();
        if ($this->env->isDebug()) {
            ob_start();
        } else {
            ob_start(function () { return ''; });
        }
        try {
            $this->display($context);
        } catch (\Throwable $e) {
            while (ob_get_level() > $level) {
                ob_end_clean();
            }
 
            throw $e;
        }
 
Arguments
  1. array:11 [
      "CSRFToken" => "6921348dc90961df5535dfa8a24e50f2"
      "request" => array:2 [
        "_url" => "/order"
        "product" => "7"
      ]
      "guest" => Api_Handler {#175}
      "FOSSBillingVersion" => "0.6.20"
      "current_theme" => "huraga"
      "settings" => array:57 [
        "CSRFToken" => "3f10ff5d59184687b9efad79ebd8597e"
        "color_scheme" => "green"
        "show_page_header" => "1"
        "show_company_logo" => "1"
        "show_company_name" => "0"
        "show_client_details" => "1"
        "sidebar_balance_enabled" => "1"
        "top_menu_dashboard" => "1"
        "top_menu_profile" => "1"
        "top_menu_signout" => "1"
        "login_page_show_logo" => "1"
        "login_page_logo_url" => "/"
        "show_password_reset_link" => "1"
        "show_signup_link" => "0"
        "login_page_show_remember_me" => "1"
        "show_breadcrumb" => "1"
        "hide_dashboard_breadcrumb" => "1"
        "require_login" => "1"
        "showcase_enabled" => "0"
        "showcase_size" => "3"
        "showcase_text" => "Showcase text"
        "showcase_button_title" => "Showcase button title"
        "showcase_button_url" => "Showcase link URL"
        "side_menu_dashboard" => "1"
        "side_menu_order" => "1"
        "side_menu_support" => "1"
        "side_menu_services" => "1"
        "side_menu_invoices" => "1"
        "side_menu_emails" => "1"
        "side_menu_payments" => "1"
        "side_menu_news" => "1"
        "side_menu_kb" => "1"
        "sidebar_note_enabled" => "0"
        "sidebar_note_title" => "Note title"
        "sidebar_note_content" => "Note content"
        "meta_title" => ""
        "meta_description" => "Members area"
        "meta_keywords" => "members area"
        "meta_robots" => "noindex, nofollow"
        "meta_author" => "PhilWebDev"
        "footer_enabled" => "1"
        "footer_to_top_enabled" => "1"
        "footer_signature" => ""
        "footer_link_1_enabled" => "on"
        "footer_link_1_title" => "About us"
        "footer_link_1_page" => "about-us"
        "footer_link_2_enabled" => "on"
        "footer_link_2_title" => "Terms and conditions"
        "footer_link_2_page" => "tos"
        "footer_link_3_enabled" => "on"
        "footer_link_3_title" => "Privacy policy"
        "footer_link_3_page" => "privacy-policy"
        "footer_link_4_title" => ""
        "footer_link_4_page" => ""
        "footer_link_5_title" => ""
        "footer_link_5_page" => ""
        "inject_javascript" => ""
      ]
      "loader_nr" => "8"
      "loader_url" => "img/assets/loaders/loader8.gif"
      "company" => array:11 [
        "www" => "https://billing.philwebdev.com/"
        "name" => "XWDV Information Technology Solutions"
        "signature" => """
          Regards,\n
          \n
          XWDV Information Technology Solutions\n
          https://www.philwebdev.com\n
          \n
          \n
          """
        "logo_url" => "https://www.philwebdev.com/billing/logod.svg"
        "logo_url_dark" => "https://www.philwebdev.com/billing/logow.svg"
        "favicon_url" => "https://www.philwebdev.com/billing/themes/huraga/assets/favicon.ico"
        "display_bank_info" => "0"
        "bank_info_pagebottom" => null
        "note" => ""
        "privacy_policy" => """
          This Privacy Policy describes the policies and procedures of PhilWebDev Domain and Business Hosting Solution, in association with - LiquidNet US LLC, a US company headquartered in Fort Lauderdale, Florida, and LiquidNet Ltd., a UK company headquartered in London, UK, on the collection, use and disclosure of your information. Legal details about the two companies can be found in the 'Contact Us' section of this document.\n
          \n
          For the sake of brevity, PhilWebDev Domain and Business Hosting Solution, LiquidNet US LLC and LiquidNet Ltd. will be referred to as 'We', 'Us', 'Our' and 'Service Provider' in this document.\n
          \n
          This Privacy Policy does not apply to information our customers may process when using our services.\n
          \n
          \---\n
          \n
          Privacy and security are of utmost importance to the Service Provider and we strive to ensure that our technical and organizational measures in place respect your data protection rights.\n
          \n
          **COLLECTION OF PERSONAL DATA**  \n
          "Personal data" refers to any information relating to an identifiable individual or his or her personal identity.\n
          \n
          Personal data is collected on our website by LiquidNet US LLC., a US company headquartered in Fort Lauderdale, Florida.\n
          \n
          The personally identifiable information that LiquidNet US LLC may collect from you when registering for an account includes: first and last name, postal address, phone number, email and IP address.\n
          \n
          If you want to use your Social Media account as a means to log in to your hosting account, you will also have to provide your Social Media ID.\n
          \n
          Your information will be needed for the following purposes:\n
          \n
          *   provision of our services to you;\n
          *   prevention of fraudulent transactions;\n
          *   billing/invoicing operations;\n
          *   provision of a sales/technical support service;\n
          *   maintenance of your account with us;\n
          *   dispute resolution cases;\n
          *   enforcement of our Terms of Service, or other legal rights, or as may be required by applicable laws and regulations or requested by any judicial process or governmental agency;\n
          *   collection of aggregate statistics about use of our services;\n
          \n
          Much of the data collected is aggregated or statistical data about how individuals use our Services, and is not linked to any personal data, but to the extent it is itself personal data, or is linked or linkable to personal data, we treat it accordingly.\n
          \n
          The Service Provider will NOT send you any unsolicited information, including emails, except as mentioned hereby.\n
          \n
          New customers will receive a welcome email containing information about the features provided by the Service, as well as WHCP (Web Hosting Control Panel) and FTP login details.\n
          \n
          The Service Provider may also send system notifications upon need, related to any upgrade, maintenance or other service issues concerning your hosting account.\n
          \n
          If you contact us directly, we may receive additional information about you such as your name, email address, phone number, the contents of the message and/or attachments you may send us, and any other information you may choose to provide. We may also receive a confirmation when you open an email from us.\n
          \n
          The Service Provider will keep your personally identifiable information private and will NOT share it with any unauthorized third parties.\n
          \n
          When you use our services, we may collect information about your engagement with and utilization of our services, such as processor and memory usage, storage capacity, navigation of our services, and system-level metrics. We use this data to operate the services, maintain and improve the performance and utilization of the services, develop new features, protect the security and safety of our services and our customers, and provide customer support. We also use this data to develop aggregate analysis and business intelligence that enable us to operate, protect, make informed decisions, and report on the performance of our business.\n
          \n
          **LEGAL BASIS FOR PROCESSING OF PERSONAL DATA**  \n
          We collect personal information from you only when:\n
          \n
          you give your consent for us to so,\n
          \n
          we need your personal information to perform a contract with you (e.g. to deliver the services you have requested), or,\n
          \n
          the processing is in our legitimate interests and not overridden by your rights;\n
          \n
          We have a legitimate interest in operating our services and communicating with you as necessary to provide these services, for example when responding to your queries, improving our platform, undertaking marketing, or for the purposes of detecting or preventing illegal activities.\n
          \n
          Please note that in most cases, if you do not submit the requested information, the Service Provider will not be able to provide the requested service to you.\n
          \n
          In some cases, we may also have a legal obligation to collect personal information from you, or may otherwise need that information to protect your vital interests or those of some other person's.\n
          \n
          If we ask you to provide personal information to comply with a legal requirement or to perform a contract with you, we will make this clear at the relevant time and advise you whether the provision of your personal information is mandatory or not (as well as of the possible consequences if you do not provide your personal information).\n
          \n
          **ACCESS TO YOUR PERSONAL DATA**  \n
          You may access and update your personal Information at any time from your Web Hosting Control Panel - > My Account - > Change Contact Details section.\n
          \n
          **SECURITY OF YOUR PERSONAL DATA**  \n
          The Service Provider is committed to protecting the security of customer collected personal information. To do so, we use technical security measures to prevent the loss, misuse, alternation or unauthorized disclosure of information under our control. We use security measures including and not limited to: physical, electronic and managerial procedures to safeguard and secure the information we collect online. However, please keep in mind that the Internet cannot be guaranteed to be 100% secure.\n
          \n
          If the Service Provider learns of a security system breach, we may attempt to notify you and send you any available protective information to the email address that you have provided to us or by posting a notice in your WHCP.\n
          \n
          **SHARING YOUR PERSONAL DATA WITH THIRD PARTIES**  \n
          We may share the information we collect in various ways, including the following:\n
          \n
          _Service Providers_  \n
          We may share information with third-party service providers that provide services on our behalf, such as helping to provide our services and to provide you with information relevant to you such as product announcements, service upgrades, special offers, or other information.\n
          \n
          _As Required By Law and Similar Disclosures_  \n
          We may also share information to (i) satisfy any applicable law, regulation, legal process, or governmental request; (ii) enforce this Privacy Policy and our Terms of Service, including investigation of potential violations hereof; (iii) detect, prevent, or otherwise address fraud, security, or technical issues; (iv) respond to your requests; or (v) protect our rights, property or safety, our users and the public. This includes exchanging information with other companies and organizations for fraud protection and spam/malware prevention.\n
          \n
          **THIRD-PARTY SERVICES**  \n
          You may access other third-party services through our services, for example by clicking on links to those third-party services from within our services. We are not responsible for the privacy policies and/or practices of these third-party services, and we encourage you to carefully review their privacy policies.\n
          \n
          **PRIVACY OF YOUR PAYMENT DETAILS**  \n
          We use third-party payment processing companies who collect and store financial information, such as your payment method (valid credit card number, type, expiration date or other financial information), and their use and storage of that information is governed by the payment processors' applicable terms of service and privacy policy. Collected billing information is used for the purposes of processing payments and fraud detection.\n
          \n
          We do not store your financial account information on our systems; however, we have access to, and may retain, subscriber information through our third-party payment processor.\n
          \n
          All PayPal transactions are subject to the [PayPal Privacy Policy](https://www.paypal.com/en/webapps/mpp/ua/privacy-full).\n
          \n
          **PRIVACY OF YOUR ACCOUNT**  \n
          We consider your registration data and the content of all your messages private and confidential. The header of the messages that you send will contain your name (e-mail address) and Internet Protocol (IP) address. We will not intentionally monitor or disclose any of your e-mail content or registration data unless we are required to do so:\n
          \n
          to enforce these Terms and Conditions,\n
          \n
          by law,\n
          \n
          to defend ourselves in any legal action,\n
          \n
          to protect our property.\n
          \n
          Since your password is essential for protecting your privacy, we encourage you to NOT share it with anyone and change it frequently. Additionally, you agree to respect the privacy and confidentiality of others.\n
          \n
          **AGE RESTRICTIONS**  \n
          We offer services only to people who are 18+. Our services are not targeted to, intended to be consumed by or designed to entice individuals under the age of 18. If we learn that we have collected the personal information of a child under the age of 18, we will take steps to delete that information as soon as possible.\n
          \n
          If you know of or have reason to believe that anyone under the age of 18 has provided us with any personal data, please contact us.\n
          \n
          **LOG FILES**  \n
          We use IP addresses to analyze trends, administer our site and servers, track access, and gather broad demographic information for aggregate use. IP addresses are not linked to personally identifiable information. It is possible that personal information about a customer may be included in the log files due to the normal functions of IP addresses and Web browsing.\n
          \n
          **COOKIES**  \n
          We use different cookies on our website to make it as useful to you as possible. Cookies are small text files that we put on your computer or mobile device to tell us what you want to use on our site but they do not tell us who you are.\n
          \n
          [Here](http://www.aboutcookies.org/) you can learn more about cookies and how to [control](http://www.aboutcookies.org/how-to-control-cookies/) or [delete](http://www.aboutcookies.org/how-to-delete-cookies/) them.\n
          \n
          Here are the cookies that we use on our site:\n
          \n
          _Essential cookies_  \n
          We use a cookie to remember your login for you and what you’ve put in the shop cart. Also, we set a cookie to help you choose a preferred font size for using the site. These cookies we consider essential for the operation of our website.\n
          \n
          _External web services_  \n
          We use an external live chat service (using cookies to remember your session name) to deliver real-time support to you should you want to.\n
          \n
          _Analytics_  \n
          We use Google Analytics and Facebook cookies to monitor visitor activity on our website. No personally identifying data is included in this type of reporting. We do not share information about this analysis with any third parties.\n
          \n
          Visitors can [opt out of Google's advertising tracking cookie](https://policies.google.com/technologies/ads) or [install a browser plugin](https://tools.google.com/dlpage/gaoptout?hl=en) to opt out of all Google Analytics tracking software. More information about Facebook's analytics cookie is available [here](https://www.facebook.com/policies/cookies/?utm_referrer=https://www.cloudflare.com/privacypolicy/).\n
          \n
          We assume you are happy with this usage of cookies on this website. If you are not happy, then you should either not use this site, or delete the cookies (you can check out how to do that according to your browser [here](http://www.aboutcookies.org/how-to-delete-cookies/)), or browse the site using your browser’s anonymous usage setting (named “Incognito” in Chrome, “InPrivate” for Internet Explorer, "Private Browsing" in Firefox and Safari etc.).\n
          \n
          We currently do not alter our practices when we receive a "Do Not Track" signal from a visitor's browser.\n
          \n
          Please remember that if you choose to delete the cookies or use the browser anonymously, you may find that certain sections of this website do not work properly.\n
          \n
          **YOUR RIGHTS UNDER THE GENERAL DATA PROTECTION REGULATION (GDPR)**\n
          \n
          If you are a resident of the European Economic Area (EEA), you have the following data protection rights:\n
          \n
          _Managing Your Information_  \n
          You may access and update some of your information through the "Change Contact Details" section in the WHCP. If you have chosen to connect your account to a third-party application like Facebook, Google or Twitter, you can change your settings and remove permission for the app from the "Linked Social Accounts" section in the WHCP. You are responsible for keeping your personal information up to date.\n
          \n
          _Rectification of Inaccurate or Incomplete Information_  \n
          You have the right to ask us to correct any inaccurate or incomplete personal information concerning you if you cannot update it yourself from within your account.\n
          \n
          _Data Access and Portability_  \n
          In some jurisdictions, the applicable law may entitle you to request copies of your personal information held by us. You may also be entitled to request copies of personal information that you have provided to us in a structured, commonly used, and machine-readable format and/or request us to transmit this information to another service provider (where technically feasible).\n
          \n
          _Opt-out of marketing communications_  \n
          You have the right to opt-out of marketing communications we send you at any time. You can exercise this right by clicking on the "unsubscribe" or "opt-out" link in the marketing emails we send you.\n
          \n
          _Data Retention and Erasure_  \n
          We generally retain your personal information for as long as is necessary for the performance of the contract between you and us and to comply with our legal obligations. If you no longer want us to use your information to provide the contracted services to you, you can request that we erase your personal information and close your account. Please note that if you request the erasure of your personal information:\n
          \n
          We may retain some of your personal information so as to detect and prevent fraud and enhance safety. For example, if we suspend an account for security reasons, we may retain certain information from that account to prevent that customer from opening a new account in the future.\n
          \n
          We may retain and use your personal information to the extent necessary to comply with our legal obligations. For example, we may keep some of your information for tax, legal reporting and auditing purposes.\n
          \n
          Because we maintain our platform to protect it from accidental or malicious loss and destruction, residual copies of your personal information may not be removed from our backup systems for a limited period of time.\n
          \n
          In cases where fraudulent or otherwise illegal activity has been deemed to have occurred as determined by law enforcement or management, the information may remain in our database indefinitely in order to help facilitate the prevention of repeated abuse in the future from the offending party.\n
          \n
          _Withdrawing Consent and Restriction of Processing_  \n
          If you have provided your consent to the processing of your personal information, you may withdraw it at any time by sending us a communication specifying which consent you are withdrawing. Please note that the withdrawal of your consent does not affect the lawfulness of any processing activities based on such consent before its withdrawal. Additionally, in some jurisdictions, applicable law may give you the right to limit the ways in which we use your personal information, in particular where (i) you contest the accuracy of your personal information; (ii) the processing is unlawful and you oppose the erasure of your personal information; (iii) we no longer need your personal information for the purposes of the processing, but you require the information for the establishment, exercise or defence of legal claims; or (iv) you have objected to the processing and pending the verification whether the Service Provider's legitimate grounds override your own.\n
          \n
          _Objection to Processing_  \n
          In some jurisdictions, applicable law may entitle you to require us not to process your personal information for certain specific purposes (including profiling) where such processing is based on legitimate interest. If you object to such processing, we will no longer process your personal information for these purposes unless we can demonstrate compelling legitimate grounds for such processing or such processing is required for the establishment, exercise or defence of legal claims.\n
          \n
          By default, customers do receive any system updates, such as the newsletters, invoices and service email notifications. Customers cannot opt out of possibly receiving important system notifications, since the latter are deemed necessary for the performance of our contractual obligations to you.\n
          \n
          _Lodging Complaints_  \n
          If you want to make a complaint about the way we are processing your data, you can contact us using the contact details below.\n
          \n
          You have the right to complain to a data protection authority about our collection and use of your personal information. For more information, please contact your local data protection authority.\n
          \n
          \---\n
          \n
          We respond to all requests we receive from individuals wishing to exercise their data protection rights in accordance with applicable data protection laws.\n
          \n
          **INTERNATIONAL TRANSFERS OF INFORMATION WE COLLECT**  \n
          We collect information globally and primarily store that information in the United States. We transfer, process and store your information outside of your country of residence. Whenever we transfer your information, we take steps to protect it.\n
          \n
          To facilitate our global operations, we transfer information to the United States and allow access to that information from countries in which we and associated companies have operations for the purposes described in this policy. These countries may not have equivalent privacy and data protection laws, certainly not equivalent to the laws of many of the countries where our customers and users are based. When we share information about you, we make use of Standard Contractual Clauses (SCCs) for data transfers between EU and non-EU countries, which have been approved by the European Commission.\n
          \n
          A copy of your personal data will also be stored in the data center you have selected when signing up for our services. This is done so that the Service Provider can deliver the contracted service in the location specified by the customer.\n
          \n
          **COMPLIANCE WITH LAWS AND LAW ENFORCEMENT**  \n
          The Service Provider cooperates with government and law enforcement officials to enforce and comply with the law. We will disclose any information about Users upon valid request by government or law officials as we, in our sole discretion, believe necessary or appropriate to respond to claims and legal process (including without limitation subpoenas), to protect your property and rights, or the property and rights of a third party, to protect the safety of the public or any person, or stop activity we consider illegal or unethical.\n
          \n
          **CHANGES TO PRIVACY POLICY**  \n
          Any changes to our Privacy Policy will be placed here and will supersede this version of our Policy. We will take reasonable steps to draw your attention to any changes in our Policy. However, to be on the safe side, we suggest that you read this document each time you use the website to ensure that it still meets with your approval.\n
          \n
          **CONTACT US**  \n
          If you have any questions about our Privacy Policy, or if you want to know what information we have collected about you, please use our Contact Us form.\n
          \n
          Postal Address:\n
          \n
          LiquidNet US LLC  \n
          6750 North Andrews Ave  \n
          Suite 200  \n
          Fort Lauderdale, FL 33309  \n
          United States of America\n
          \n
          LiquidNet Ltd.  \n
          13 Craigleith  \n
          7 Kersfield Road  \n
          Putney, London SW15 3HN  \n
          United Kingdom
          """
        "tos" => """
          An Acceptable Use Policy (AUP) is a set of rules and conditions compiled by a network, system, or a website owner. These rules explicitly define and restrict the ways in which the respective network, system or website may be used.\n
          \n
          The **AUP of the Service Provider** aims to clearly outline the purposes for which our customers CANNOT utilize our hosting services and position data on our network servers.\n
          \n
          This Acceptable Use Policy (AUP) is an integral part of the [Web Hosting Terms of Service](https://www.philwebdev.com/terms-and-conditions-2/web-hosting-terms-of-service-3/) which each customer agrees to abide by when signing up for an account with our web hosting company. Any violation of this AUP will be deemed a violation of our Web Hosting Terms of Service.\n
          \n
          We, at our own discretion, shall determine whether an act constitutes a breach of this AUP terms and misuse of our services. We reserve our right to be the sole arbiter in determining the sufficiency of the presented evidences. We will respond accordingly, and/or immediately terminate the provision of the services, shall we receive the report, and/or have sufficient proof, of any prohibited conduct outlined in this AUP, or any other activity threatening the security of our hosting environment and/or our network of hosting servers.\n
          \n
          In order to protect our company’s reputation and responsibilities, and guarantee state-of-the-art and reliable hosting services to all our customers, as well as privacy and security for all users, we – the Service Provider - hereby outline the following AUP rules and conditions to come into force for each customer signing up for a web hosting account with our company:\n
          \n
          1\. [System Abuse](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#SYSTEM_ABUSE)\n
          \n
          2\. [Spam and Spamvertizing](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#SPAM_AND_SPAMVERTIZING)\n
          \n
          3\. [Inappropriate or Unlawful Content](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#INAPPROPRIATE_OR_UNLAWFUL_CONTENT_)\n
          \n
          4\. [Copyrights](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#COPYRIGHTS)\n
          \n
          5\. [Corrective Actions](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#CORRECTIVE_ACTIONS)\n
          \n
          6\. [Reporting Violtaions](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#REPORTING_VIOLATIONS)\n
          \n
          7\. [Revisions](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#REVISIONS)\n
          \n
          **1\. SYSTEM ABUSE**\n
          \n
          Any customer in violation of our system or network security is subject to criminal and civil liability, as well as immediate account termination. Examples include, but are not limited to the following:\n
          \n
          Unauthorized access, use, probe, or scan of our system’s security, authentication measures, data, or traffic. Interference with the service to any user, host or network including, but not limited to: e-mail bombing, flooding, deliberate attempts to overload the system and broadcast attacks, forging of any TCP/IP packet header or any part of the header information in an e-mail or newsgroup posting.\n
          \n
          Any attempt at doing harm to a server or a customer of our web hosting services:\n
          \n
          the Service Provider will immediately and resolutely react to any attempt at misuse of an Internet account or computer, or any attempt to gain access to an Internet account or computer by a Service Provider's customer unauthorized by the account/computer owner. Such attempts include, but are not limited to the following: 'Internet scamming' (tricking other people into releasing their passwords, etc.), password robbery, security hole scanning, running proxy - proxy lists and any kind of proxy scripts (including, but not limited to PHP proxy and mph proxy), introducing of any computer programs (viruses, Trojan horses, trap doors, back doors, worms, time bombs, packet bombs, cancelbots, etc.) that are intended to negatively interfere with, intercept, irreversibly damage or take hold of any system, data or personal information. It WILL NOT matter whether the attacked account or computer belongs or not to the Service Provider's services. The fraud will be subject to actions based on the very nature of the attack and those may represent a warning, an account suspension or cancellation, and/or civil or criminal legal actions.\n
          \n
          Background operations/programs on servers:\n
          \n
          ‘Background process’ is a program that runs in the background of the operating system. What is specific for a background process is that, once started, it runs simultaneously with other foreground processes. This means that, the shell executing the background operation does not wait for it to finish or terminate, as it does with foreground processes, but is free to start executing more operations along with the background one. Typical background processes are ircd, irc bot, bnc, and many others.\n
          \n
          Background processes are not permitted on any of our shared hosting servers, as they usually lead to CPU overload and can be used for malicious and/or illegal actions. As our primary task is to provide highest quality web hosting service to all our customers, we cannot permit any background processes to be executed and threaten the performance of our server network. Our shared hosting system does not allow a big multitude of users to simultaneously use the system memory and processing time of our servers.\n
          \n
          Excessive use of system resources:\n
          \n
          In order to ensure higher server performance and quality of hosting service all shared hosting plans are subject to certain resource limitations concerning, but not limited to, server CPU usage, Memory usage, disk-space and traffic. If a hosting account exceeds the allowed amount of system resources the account owner will be immediately notified to take actions in order to reduce the usage. If such action is not instantly taken by the owner the account will be suspended. If an excessive CPU usage is detected the account owner will be suggested to place an order for a CPU usage upgrade or upgrade to a plan which allows higher CPU usage.\n
          \n
          If any hosting account is found to be causing degradation of the server and/or our hosting network’s performance, regardless of the reason, the account will be subject to suspension or immediate removal, depending on the situation. The Service Provider will be the sole arbiter in determining whether a given account is excessively using the server resources and/or causing a server degradation.\n
          \n
          **2\. SPAM AND SPAMVERTIZING**\n
          \n
          SPAMMING IS PROHIBITED. Users MAY NOT utilize our web hosting services to transmit, distribute or deliver any unsolicited bulk or commercial messages over the Internet (an action known as "spam" or "spamming").\n
          \n
          Spamming is a violation of ethic norms and will be interpreted as an infringement. the Service Provider will not tolerate the sending of unsolicited bulk or commercial messages through our services, as well as through another service that is mentioning, in some way, our customer’s domain name or implies the utilization of our network or our e-mail services for sending the unsolicited bulk or messages.\n
          \n
          SPAMVERTISING IS PROHIBITED. 'Spamvertizing’ refers to the practice of sending unsolicited spam messages for the purpose of advertising a particular website.\n
          \n
          If such e-mails are relayed through 3rd party (e-mail spoofing) and/or are promoting a domain hosted on our servers, this will lead to immediate account suspension unless an evidence of legitimacy for non-involvement of the domain owner in the particular illegal action is provided.\n
          \n
          ’E-mail spoofing’ is a fraudulent e-mail activity in which the sender’s (3td party) e-mail address and other parts of the e-mail header are changed so as to appear that the e-mail has been sent from a different source (e-mail address owner/server).\n
          \n
          'Unsolicited message’ is a message that is sent against the privacy policy of a newsgroup, or is sent to a recipient without their explicit permission. We, at our sole discretion, shall determine whether any of the messages you are sending is spam or spamvertizing. For your information, spamming generally includes, but is not limited to the following\n
          \n
          Sending of unsolicited messages in bulk, or sending of unsolicited e-mails, which provoke complaints from recipients;\n
          \n
          Sending of junk mail;\n
          \n
          Use of distribution lists that include people who have not given prior explicit permission to be involved in such a distribution process;\n
          \n
          Posting commercial ads to USENET newsgroups that do not permit it;\n
          \n
          Posting articles containing binary encoded data to non-binary newsgroups;\n
          \n
          Excessive and repeated posting of off-topic messages to newsgroups;\n
          \n
          Excessive and repeated cross-posting;\n
          \n
          E-mail harassment of another Internet Customer or Customers, including but not limited to, transmitting of any threatening, libellous or obscene material, or material of any nature that may be deemed offensive;\n
          \n
          E-mailing of age-inappropriate communications or content to anyone under the age of 18.\n
          \n
          **3\. INAPPROPRIATE OR UNLAWFUL CONTENT**\n
          \n
          CONTENT published or transmitted via the Service Provider’s hosting services includes website content, email content, forum/blog postings, chat content, and/or any other type of content hosted on our servers, published online or transmitted through our network’s services.\n
          \n
          The user of our services is NOT permitted to post online content or have links to content that:\n
          \n
          is defamatory, abusive or obscene, violates a person’s reputation/privacy, is reasonably deemed offensive by the web community, is anti-religious or anti-human rights, or contains any type of threatening or hate speech, encourages harassment or physical harm to any group or individual, or is otherwise malicious/fraudulent and may result in complaints/liabilities/or retaliation against the Service Provider by offended viewers;\n
          \n
          promotes or encourages illegal activities (e.g. illegal drugs, illegal gambling, arms trafficking, etc.) or violates any applicable law, statute, ordinance or regulation, including but not limited to the laws and regulations governing export control, unfair competition, false advertising, consumer protection, etc.\n
          \n
          represents pornography – any type of pornographic/adult material, including child pornography, or advertisements of pornographic websites;\n
          \n
          represents infringement on copyright, patents, trademarks, trade secrets, or third party's intellectual property or proprietary rights, including pirated computer programs, hacking/phreaking software, warez or any type of software/content (including also ROMs, ROM Emulators, media files – MP3, AVI, .RM, etc., torrent files, and others) that is copyrighted, is NOT uploaded in compliance with its license agreement or is NOT freely available for distribution.\n
          \n
          **4\. COPYRIGHTS**\n
          \n
          Copyrighted material must not be placed on customers' accounts without the explicit permission of the copyright owner or a person explicitly authorized to give such permission by the copyright owner. Upon receipt of a claim for copyright infringement, or a notice of such violation, we will immediately run full investigation and, upon confirmation, will promptly remove the infringing material from the Services. Further procedures (in accordance with our stated below corrective measures) will be carried out if necessary. We will assume no liability to any Customer of the Services for the removal of any such material.\n
          \n
          **5\. CORRECTIVE ACTIONS**\n
          \n
          We reserve our right to be the sole arbiter in determining the seriousness of each infringement and to immediately take corrective actions.\n
          \n
          We will disable the customer's account if we deem necessary, at our sole discretion. Upon closing of the customer’s account we will send an e-mail notification to the customer, stating the reason for the termination and quoting our terms’ chapter that has been violated. The customer will be given an opportunity to respond and take measures to remedy the situation should he/she consider him/herself abused by a third party. Upon fulfilling of this obligation, we may re-activate the customer’s account, if we find, at our own discretion, sufficient evidence pro customer’s side.\n
          \n
          Closed accounts due to repeated violations will not be re-activated. A backup may be requested, however it will be subject to certain penalty fees imposed according to the breach of this AUP terms. The final penalty fee will be determined by the type and frequency of the violations.\n
          \n
          **6\. REPORTING VIOLATIONS**\n
          \n
          If you need to report a violation of this AUP agreement or believe that you or your system has been subject to attack originating from our web hosting system, please contact us immediately. Our professional team will investigate the situation and provide you with full assistance.\n
          \n
          **7\. REVISIONS**\n
          \n
          We reserve our right to change this AUP at any time, without prior notice. We encourage our users to periodically review this Acceptable Use Policy and our Web Hosting Terms of Service.
          """
      ]
      "logo_url" => "https://www.philwebdev.com/billing/logod.svg"
      "languages" => array:2 [
        0 => array:3 [
          "locale" => "en_US"
          "title" => "English(en_US)"
          "name" => "English"
        ]
        1 => array:3 [
          "locale" => "hr_HR"
          "title" => "hr_HR(hr_HR)"
          "name" => "hr_HR"
        ]
      ]
    ]
    
  2. array:3 [
      "meta_title" => array:2 [
        0 => __TwigTemplate_48f67a13f3994ad241545cc961e85472 {#361}
        1 => "block_meta_title"
      ]
      "body" => array:2 [
        0 => __TwigTemplate_48f67a13f3994ad241545cc961e85472 {#361}
        1 => "block_body"
      ]
      "js" => array:2 [
        0 => __TwigTemplate_48f67a13f3994ad241545cc961e85472 {#361}
        1 => "block_js"
      ]
    ]
    
/home/philwebd/public_html/billing/data/cache/64/6439ab2a2bd83cff369a4f16ecb2d6e0.php
                        <div class=\"w-100\">
                            <h5 class=\"mb-1\">";
        // line 23
        echo twig_escape_filter($this->env, __trans("Order Product"), "html", null, true);
        echo "</h5>
                            <span class=\"small text-muted row ms-2\">";
        // line 24
        echo twig_escape_filter($this->env, __trans("Choose products we offer for selling"), "html", null, true);
        echo "</span>
                            ";
        // line 25
        $this->loadTemplate("mod_orderbutton_currency.html.twig", "mod_order_index.html.twig", 25)->display($context);
        // line 26
        echo "                        </div>
                    </div>
                </div>
                <div class=\"card-body overflow-hidden\">
                    ";
        // line 30
        $this->loadTemplate("mod_orderbutton_index.html.twig", "mod_order_index.html.twig", 30)->display($context);
        // line 31
        echo "                </div>
            </div>
        </div>
    </div>
";
    }
 
    // line 37
    public function block_sidebar2($context, array $blocks = [])
    {
        $macros = $this->macros;
        // line 38
        echo "    ";
        $this->loadTemplate("partial_currency.html.twig", "mod_order_index.html.twig", 38)->display($context);
    }
 
    // line 41
    public function block_js($context, array $blocks = [])
    {
Arguments
  1. array:11 [
      "CSRFToken" => "6921348dc90961df5535dfa8a24e50f2"
      "request" => array:2 [
        "_url" => "/order"
        "product" => "7"
      ]
      "guest" => Api_Handler {#175}
      "FOSSBillingVersion" => "0.6.20"
      "current_theme" => "huraga"
      "settings" => array:57 [
        "CSRFToken" => "3f10ff5d59184687b9efad79ebd8597e"
        "color_scheme" => "green"
        "show_page_header" => "1"
        "show_company_logo" => "1"
        "show_company_name" => "0"
        "show_client_details" => "1"
        "sidebar_balance_enabled" => "1"
        "top_menu_dashboard" => "1"
        "top_menu_profile" => "1"
        "top_menu_signout" => "1"
        "login_page_show_logo" => "1"
        "login_page_logo_url" => "/"
        "show_password_reset_link" => "1"
        "show_signup_link" => "0"
        "login_page_show_remember_me" => "1"
        "show_breadcrumb" => "1"
        "hide_dashboard_breadcrumb" => "1"
        "require_login" => "1"
        "showcase_enabled" => "0"
        "showcase_size" => "3"
        "showcase_text" => "Showcase text"
        "showcase_button_title" => "Showcase button title"
        "showcase_button_url" => "Showcase link URL"
        "side_menu_dashboard" => "1"
        "side_menu_order" => "1"
        "side_menu_support" => "1"
        "side_menu_services" => "1"
        "side_menu_invoices" => "1"
        "side_menu_emails" => "1"
        "side_menu_payments" => "1"
        "side_menu_news" => "1"
        "side_menu_kb" => "1"
        "sidebar_note_enabled" => "0"
        "sidebar_note_title" => "Note title"
        "sidebar_note_content" => "Note content"
        "meta_title" => ""
        "meta_description" => "Members area"
        "meta_keywords" => "members area"
        "meta_robots" => "noindex, nofollow"
        "meta_author" => "PhilWebDev"
        "footer_enabled" => "1"
        "footer_to_top_enabled" => "1"
        "footer_signature" => ""
        "footer_link_1_enabled" => "on"
        "footer_link_1_title" => "About us"
        "footer_link_1_page" => "about-us"
        "footer_link_2_enabled" => "on"
        "footer_link_2_title" => "Terms and conditions"
        "footer_link_2_page" => "tos"
        "footer_link_3_enabled" => "on"
        "footer_link_3_title" => "Privacy policy"
        "footer_link_3_page" => "privacy-policy"
        "footer_link_4_title" => ""
        "footer_link_4_page" => ""
        "footer_link_5_title" => ""
        "footer_link_5_page" => ""
        "inject_javascript" => ""
      ]
      "loader_nr" => "8"
      "loader_url" => "img/assets/loaders/loader8.gif"
      "company" => array:11 [
        "www" => "https://billing.philwebdev.com/"
        "name" => "XWDV Information Technology Solutions"
        "signature" => """
          Regards,\n
          \n
          XWDV Information Technology Solutions\n
          https://www.philwebdev.com\n
          \n
          \n
          """
        "logo_url" => "https://www.philwebdev.com/billing/logod.svg"
        "logo_url_dark" => "https://www.philwebdev.com/billing/logow.svg"
        "favicon_url" => "https://www.philwebdev.com/billing/themes/huraga/assets/favicon.ico"
        "display_bank_info" => "0"
        "bank_info_pagebottom" => null
        "note" => ""
        "privacy_policy" => """
          This Privacy Policy describes the policies and procedures of PhilWebDev Domain and Business Hosting Solution, in association with - LiquidNet US LLC, a US company headquartered in Fort Lauderdale, Florida, and LiquidNet Ltd., a UK company headquartered in London, UK, on the collection, use and disclosure of your information. Legal details about the two companies can be found in the 'Contact Us' section of this document.\n
          \n
          For the sake of brevity, PhilWebDev Domain and Business Hosting Solution, LiquidNet US LLC and LiquidNet Ltd. will be referred to as 'We', 'Us', 'Our' and 'Service Provider' in this document.\n
          \n
          This Privacy Policy does not apply to information our customers may process when using our services.\n
          \n
          \---\n
          \n
          Privacy and security are of utmost importance to the Service Provider and we strive to ensure that our technical and organizational measures in place respect your data protection rights.\n
          \n
          **COLLECTION OF PERSONAL DATA**  \n
          "Personal data" refers to any information relating to an identifiable individual or his or her personal identity.\n
          \n
          Personal data is collected on our website by LiquidNet US LLC., a US company headquartered in Fort Lauderdale, Florida.\n
          \n
          The personally identifiable information that LiquidNet US LLC may collect from you when registering for an account includes: first and last name, postal address, phone number, email and IP address.\n
          \n
          If you want to use your Social Media account as a means to log in to your hosting account, you will also have to provide your Social Media ID.\n
          \n
          Your information will be needed for the following purposes:\n
          \n
          *   provision of our services to you;\n
          *   prevention of fraudulent transactions;\n
          *   billing/invoicing operations;\n
          *   provision of a sales/technical support service;\n
          *   maintenance of your account with us;\n
          *   dispute resolution cases;\n
          *   enforcement of our Terms of Service, or other legal rights, or as may be required by applicable laws and regulations or requested by any judicial process or governmental agency;\n
          *   collection of aggregate statistics about use of our services;\n
          \n
          Much of the data collected is aggregated or statistical data about how individuals use our Services, and is not linked to any personal data, but to the extent it is itself personal data, or is linked or linkable to personal data, we treat it accordingly.\n
          \n
          The Service Provider will NOT send you any unsolicited information, including emails, except as mentioned hereby.\n
          \n
          New customers will receive a welcome email containing information about the features provided by the Service, as well as WHCP (Web Hosting Control Panel) and FTP login details.\n
          \n
          The Service Provider may also send system notifications upon need, related to any upgrade, maintenance or other service issues concerning your hosting account.\n
          \n
          If you contact us directly, we may receive additional information about you such as your name, email address, phone number, the contents of the message and/or attachments you may send us, and any other information you may choose to provide. We may also receive a confirmation when you open an email from us.\n
          \n
          The Service Provider will keep your personally identifiable information private and will NOT share it with any unauthorized third parties.\n
          \n
          When you use our services, we may collect information about your engagement with and utilization of our services, such as processor and memory usage, storage capacity, navigation of our services, and system-level metrics. We use this data to operate the services, maintain and improve the performance and utilization of the services, develop new features, protect the security and safety of our services and our customers, and provide customer support. We also use this data to develop aggregate analysis and business intelligence that enable us to operate, protect, make informed decisions, and report on the performance of our business.\n
          \n
          **LEGAL BASIS FOR PROCESSING OF PERSONAL DATA**  \n
          We collect personal information from you only when:\n
          \n
          you give your consent for us to so,\n
          \n
          we need your personal information to perform a contract with you (e.g. to deliver the services you have requested), or,\n
          \n
          the processing is in our legitimate interests and not overridden by your rights;\n
          \n
          We have a legitimate interest in operating our services and communicating with you as necessary to provide these services, for example when responding to your queries, improving our platform, undertaking marketing, or for the purposes of detecting or preventing illegal activities.\n
          \n
          Please note that in most cases, if you do not submit the requested information, the Service Provider will not be able to provide the requested service to you.\n
          \n
          In some cases, we may also have a legal obligation to collect personal information from you, or may otherwise need that information to protect your vital interests or those of some other person's.\n
          \n
          If we ask you to provide personal information to comply with a legal requirement or to perform a contract with you, we will make this clear at the relevant time and advise you whether the provision of your personal information is mandatory or not (as well as of the possible consequences if you do not provide your personal information).\n
          \n
          **ACCESS TO YOUR PERSONAL DATA**  \n
          You may access and update your personal Information at any time from your Web Hosting Control Panel - > My Account - > Change Contact Details section.\n
          \n
          **SECURITY OF YOUR PERSONAL DATA**  \n
          The Service Provider is committed to protecting the security of customer collected personal information. To do so, we use technical security measures to prevent the loss, misuse, alternation or unauthorized disclosure of information under our control. We use security measures including and not limited to: physical, electronic and managerial procedures to safeguard and secure the information we collect online. However, please keep in mind that the Internet cannot be guaranteed to be 100% secure.\n
          \n
          If the Service Provider learns of a security system breach, we may attempt to notify you and send you any available protective information to the email address that you have provided to us or by posting a notice in your WHCP.\n
          \n
          **SHARING YOUR PERSONAL DATA WITH THIRD PARTIES**  \n
          We may share the information we collect in various ways, including the following:\n
          \n
          _Service Providers_  \n
          We may share information with third-party service providers that provide services on our behalf, such as helping to provide our services and to provide you with information relevant to you such as product announcements, service upgrades, special offers, or other information.\n
          \n
          _As Required By Law and Similar Disclosures_  \n
          We may also share information to (i) satisfy any applicable law, regulation, legal process, or governmental request; (ii) enforce this Privacy Policy and our Terms of Service, including investigation of potential violations hereof; (iii) detect, prevent, or otherwise address fraud, security, or technical issues; (iv) respond to your requests; or (v) protect our rights, property or safety, our users and the public. This includes exchanging information with other companies and organizations for fraud protection and spam/malware prevention.\n
          \n
          **THIRD-PARTY SERVICES**  \n
          You may access other third-party services through our services, for example by clicking on links to those third-party services from within our services. We are not responsible for the privacy policies and/or practices of these third-party services, and we encourage you to carefully review their privacy policies.\n
          \n
          **PRIVACY OF YOUR PAYMENT DETAILS**  \n
          We use third-party payment processing companies who collect and store financial information, such as your payment method (valid credit card number, type, expiration date or other financial information), and their use and storage of that information is governed by the payment processors' applicable terms of service and privacy policy. Collected billing information is used for the purposes of processing payments and fraud detection.\n
          \n
          We do not store your financial account information on our systems; however, we have access to, and may retain, subscriber information through our third-party payment processor.\n
          \n
          All PayPal transactions are subject to the [PayPal Privacy Policy](https://www.paypal.com/en/webapps/mpp/ua/privacy-full).\n
          \n
          **PRIVACY OF YOUR ACCOUNT**  \n
          We consider your registration data and the content of all your messages private and confidential. The header of the messages that you send will contain your name (e-mail address) and Internet Protocol (IP) address. We will not intentionally monitor or disclose any of your e-mail content or registration data unless we are required to do so:\n
          \n
          to enforce these Terms and Conditions,\n
          \n
          by law,\n
          \n
          to defend ourselves in any legal action,\n
          \n
          to protect our property.\n
          \n
          Since your password is essential for protecting your privacy, we encourage you to NOT share it with anyone and change it frequently. Additionally, you agree to respect the privacy and confidentiality of others.\n
          \n
          **AGE RESTRICTIONS**  \n
          We offer services only to people who are 18+. Our services are not targeted to, intended to be consumed by or designed to entice individuals under the age of 18. If we learn that we have collected the personal information of a child under the age of 18, we will take steps to delete that information as soon as possible.\n
          \n
          If you know of or have reason to believe that anyone under the age of 18 has provided us with any personal data, please contact us.\n
          \n
          **LOG FILES**  \n
          We use IP addresses to analyze trends, administer our site and servers, track access, and gather broad demographic information for aggregate use. IP addresses are not linked to personally identifiable information. It is possible that personal information about a customer may be included in the log files due to the normal functions of IP addresses and Web browsing.\n
          \n
          **COOKIES**  \n
          We use different cookies on our website to make it as useful to you as possible. Cookies are small text files that we put on your computer or mobile device to tell us what you want to use on our site but they do not tell us who you are.\n
          \n
          [Here](http://www.aboutcookies.org/) you can learn more about cookies and how to [control](http://www.aboutcookies.org/how-to-control-cookies/) or [delete](http://www.aboutcookies.org/how-to-delete-cookies/) them.\n
          \n
          Here are the cookies that we use on our site:\n
          \n
          _Essential cookies_  \n
          We use a cookie to remember your login for you and what you’ve put in the shop cart. Also, we set a cookie to help you choose a preferred font size for using the site. These cookies we consider essential for the operation of our website.\n
          \n
          _External web services_  \n
          We use an external live chat service (using cookies to remember your session name) to deliver real-time support to you should you want to.\n
          \n
          _Analytics_  \n
          We use Google Analytics and Facebook cookies to monitor visitor activity on our website. No personally identifying data is included in this type of reporting. We do not share information about this analysis with any third parties.\n
          \n
          Visitors can [opt out of Google's advertising tracking cookie](https://policies.google.com/technologies/ads) or [install a browser plugin](https://tools.google.com/dlpage/gaoptout?hl=en) to opt out of all Google Analytics tracking software. More information about Facebook's analytics cookie is available [here](https://www.facebook.com/policies/cookies/?utm_referrer=https://www.cloudflare.com/privacypolicy/).\n
          \n
          We assume you are happy with this usage of cookies on this website. If you are not happy, then you should either not use this site, or delete the cookies (you can check out how to do that according to your browser [here](http://www.aboutcookies.org/how-to-delete-cookies/)), or browse the site using your browser’s anonymous usage setting (named “Incognito” in Chrome, “InPrivate” for Internet Explorer, "Private Browsing" in Firefox and Safari etc.).\n
          \n
          We currently do not alter our practices when we receive a "Do Not Track" signal from a visitor's browser.\n
          \n
          Please remember that if you choose to delete the cookies or use the browser anonymously, you may find that certain sections of this website do not work properly.\n
          \n
          **YOUR RIGHTS UNDER THE GENERAL DATA PROTECTION REGULATION (GDPR)**\n
          \n
          If you are a resident of the European Economic Area (EEA), you have the following data protection rights:\n
          \n
          _Managing Your Information_  \n
          You may access and update some of your information through the "Change Contact Details" section in the WHCP. If you have chosen to connect your account to a third-party application like Facebook, Google or Twitter, you can change your settings and remove permission for the app from the "Linked Social Accounts" section in the WHCP. You are responsible for keeping your personal information up to date.\n
          \n
          _Rectification of Inaccurate or Incomplete Information_  \n
          You have the right to ask us to correct any inaccurate or incomplete personal information concerning you if you cannot update it yourself from within your account.\n
          \n
          _Data Access and Portability_  \n
          In some jurisdictions, the applicable law may entitle you to request copies of your personal information held by us. You may also be entitled to request copies of personal information that you have provided to us in a structured, commonly used, and machine-readable format and/or request us to transmit this information to another service provider (where technically feasible).\n
          \n
          _Opt-out of marketing communications_  \n
          You have the right to opt-out of marketing communications we send you at any time. You can exercise this right by clicking on the "unsubscribe" or "opt-out" link in the marketing emails we send you.\n
          \n
          _Data Retention and Erasure_  \n
          We generally retain your personal information for as long as is necessary for the performance of the contract between you and us and to comply with our legal obligations. If you no longer want us to use your information to provide the contracted services to you, you can request that we erase your personal information and close your account. Please note that if you request the erasure of your personal information:\n
          \n
          We may retain some of your personal information so as to detect and prevent fraud and enhance safety. For example, if we suspend an account for security reasons, we may retain certain information from that account to prevent that customer from opening a new account in the future.\n
          \n
          We may retain and use your personal information to the extent necessary to comply with our legal obligations. For example, we may keep some of your information for tax, legal reporting and auditing purposes.\n
          \n
          Because we maintain our platform to protect it from accidental or malicious loss and destruction, residual copies of your personal information may not be removed from our backup systems for a limited period of time.\n
          \n
          In cases where fraudulent or otherwise illegal activity has been deemed to have occurred as determined by law enforcement or management, the information may remain in our database indefinitely in order to help facilitate the prevention of repeated abuse in the future from the offending party.\n
          \n
          _Withdrawing Consent and Restriction of Processing_  \n
          If you have provided your consent to the processing of your personal information, you may withdraw it at any time by sending us a communication specifying which consent you are withdrawing. Please note that the withdrawal of your consent does not affect the lawfulness of any processing activities based on such consent before its withdrawal. Additionally, in some jurisdictions, applicable law may give you the right to limit the ways in which we use your personal information, in particular where (i) you contest the accuracy of your personal information; (ii) the processing is unlawful and you oppose the erasure of your personal information; (iii) we no longer need your personal information for the purposes of the processing, but you require the information for the establishment, exercise or defence of legal claims; or (iv) you have objected to the processing and pending the verification whether the Service Provider's legitimate grounds override your own.\n
          \n
          _Objection to Processing_  \n
          In some jurisdictions, applicable law may entitle you to require us not to process your personal information for certain specific purposes (including profiling) where such processing is based on legitimate interest. If you object to such processing, we will no longer process your personal information for these purposes unless we can demonstrate compelling legitimate grounds for such processing or such processing is required for the establishment, exercise or defence of legal claims.\n
          \n
          By default, customers do receive any system updates, such as the newsletters, invoices and service email notifications. Customers cannot opt out of possibly receiving important system notifications, since the latter are deemed necessary for the performance of our contractual obligations to you.\n
          \n
          _Lodging Complaints_  \n
          If you want to make a complaint about the way we are processing your data, you can contact us using the contact details below.\n
          \n
          You have the right to complain to a data protection authority about our collection and use of your personal information. For more information, please contact your local data protection authority.\n
          \n
          \---\n
          \n
          We respond to all requests we receive from individuals wishing to exercise their data protection rights in accordance with applicable data protection laws.\n
          \n
          **INTERNATIONAL TRANSFERS OF INFORMATION WE COLLECT**  \n
          We collect information globally and primarily store that information in the United States. We transfer, process and store your information outside of your country of residence. Whenever we transfer your information, we take steps to protect it.\n
          \n
          To facilitate our global operations, we transfer information to the United States and allow access to that information from countries in which we and associated companies have operations for the purposes described in this policy. These countries may not have equivalent privacy and data protection laws, certainly not equivalent to the laws of many of the countries where our customers and users are based. When we share information about you, we make use of Standard Contractual Clauses (SCCs) for data transfers between EU and non-EU countries, which have been approved by the European Commission.\n
          \n
          A copy of your personal data will also be stored in the data center you have selected when signing up for our services. This is done so that the Service Provider can deliver the contracted service in the location specified by the customer.\n
          \n
          **COMPLIANCE WITH LAWS AND LAW ENFORCEMENT**  \n
          The Service Provider cooperates with government and law enforcement officials to enforce and comply with the law. We will disclose any information about Users upon valid request by government or law officials as we, in our sole discretion, believe necessary or appropriate to respond to claims and legal process (including without limitation subpoenas), to protect your property and rights, or the property and rights of a third party, to protect the safety of the public or any person, or stop activity we consider illegal or unethical.\n
          \n
          **CHANGES TO PRIVACY POLICY**  \n
          Any changes to our Privacy Policy will be placed here and will supersede this version of our Policy. We will take reasonable steps to draw your attention to any changes in our Policy. However, to be on the safe side, we suggest that you read this document each time you use the website to ensure that it still meets with your approval.\n
          \n
          **CONTACT US**  \n
          If you have any questions about our Privacy Policy, or if you want to know what information we have collected about you, please use our Contact Us form.\n
          \n
          Postal Address:\n
          \n
          LiquidNet US LLC  \n
          6750 North Andrews Ave  \n
          Suite 200  \n
          Fort Lauderdale, FL 33309  \n
          United States of America\n
          \n
          LiquidNet Ltd.  \n
          13 Craigleith  \n
          7 Kersfield Road  \n
          Putney, London SW15 3HN  \n
          United Kingdom
          """
        "tos" => """
          An Acceptable Use Policy (AUP) is a set of rules and conditions compiled by a network, system, or a website owner. These rules explicitly define and restrict the ways in which the respective network, system or website may be used.\n
          \n
          The **AUP of the Service Provider** aims to clearly outline the purposes for which our customers CANNOT utilize our hosting services and position data on our network servers.\n
          \n
          This Acceptable Use Policy (AUP) is an integral part of the [Web Hosting Terms of Service](https://www.philwebdev.com/terms-and-conditions-2/web-hosting-terms-of-service-3/) which each customer agrees to abide by when signing up for an account with our web hosting company. Any violation of this AUP will be deemed a violation of our Web Hosting Terms of Service.\n
          \n
          We, at our own discretion, shall determine whether an act constitutes a breach of this AUP terms and misuse of our services. We reserve our right to be the sole arbiter in determining the sufficiency of the presented evidences. We will respond accordingly, and/or immediately terminate the provision of the services, shall we receive the report, and/or have sufficient proof, of any prohibited conduct outlined in this AUP, or any other activity threatening the security of our hosting environment and/or our network of hosting servers.\n
          \n
          In order to protect our company’s reputation and responsibilities, and guarantee state-of-the-art and reliable hosting services to all our customers, as well as privacy and security for all users, we – the Service Provider - hereby outline the following AUP rules and conditions to come into force for each customer signing up for a web hosting account with our company:\n
          \n
          1\. [System Abuse](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#SYSTEM_ABUSE)\n
          \n
          2\. [Spam and Spamvertizing](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#SPAM_AND_SPAMVERTIZING)\n
          \n
          3\. [Inappropriate or Unlawful Content](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#INAPPROPRIATE_OR_UNLAWFUL_CONTENT_)\n
          \n
          4\. [Copyrights](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#COPYRIGHTS)\n
          \n
          5\. [Corrective Actions](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#CORRECTIVE_ACTIONS)\n
          \n
          6\. [Reporting Violtaions](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#REPORTING_VIOLATIONS)\n
          \n
          7\. [Revisions](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#REVISIONS)\n
          \n
          **1\. SYSTEM ABUSE**\n
          \n
          Any customer in violation of our system or network security is subject to criminal and civil liability, as well as immediate account termination. Examples include, but are not limited to the following:\n
          \n
          Unauthorized access, use, probe, or scan of our system’s security, authentication measures, data, or traffic. Interference with the service to any user, host or network including, but not limited to: e-mail bombing, flooding, deliberate attempts to overload the system and broadcast attacks, forging of any TCP/IP packet header or any part of the header information in an e-mail or newsgroup posting.\n
          \n
          Any attempt at doing harm to a server or a customer of our web hosting services:\n
          \n
          the Service Provider will immediately and resolutely react to any attempt at misuse of an Internet account or computer, or any attempt to gain access to an Internet account or computer by a Service Provider's customer unauthorized by the account/computer owner. Such attempts include, but are not limited to the following: 'Internet scamming' (tricking other people into releasing their passwords, etc.), password robbery, security hole scanning, running proxy - proxy lists and any kind of proxy scripts (including, but not limited to PHP proxy and mph proxy), introducing of any computer programs (viruses, Trojan horses, trap doors, back doors, worms, time bombs, packet bombs, cancelbots, etc.) that are intended to negatively interfere with, intercept, irreversibly damage or take hold of any system, data or personal information. It WILL NOT matter whether the attacked account or computer belongs or not to the Service Provider's services. The fraud will be subject to actions based on the very nature of the attack and those may represent a warning, an account suspension or cancellation, and/or civil or criminal legal actions.\n
          \n
          Background operations/programs on servers:\n
          \n
          ‘Background process’ is a program that runs in the background of the operating system. What is specific for a background process is that, once started, it runs simultaneously with other foreground processes. This means that, the shell executing the background operation does not wait for it to finish or terminate, as it does with foreground processes, but is free to start executing more operations along with the background one. Typical background processes are ircd, irc bot, bnc, and many others.\n
          \n
          Background processes are not permitted on any of our shared hosting servers, as they usually lead to CPU overload and can be used for malicious and/or illegal actions. As our primary task is to provide highest quality web hosting service to all our customers, we cannot permit any background processes to be executed and threaten the performance of our server network. Our shared hosting system does not allow a big multitude of users to simultaneously use the system memory and processing time of our servers.\n
          \n
          Excessive use of system resources:\n
          \n
          In order to ensure higher server performance and quality of hosting service all shared hosting plans are subject to certain resource limitations concerning, but not limited to, server CPU usage, Memory usage, disk-space and traffic. If a hosting account exceeds the allowed amount of system resources the account owner will be immediately notified to take actions in order to reduce the usage. If such action is not instantly taken by the owner the account will be suspended. If an excessive CPU usage is detected the account owner will be suggested to place an order for a CPU usage upgrade or upgrade to a plan which allows higher CPU usage.\n
          \n
          If any hosting account is found to be causing degradation of the server and/or our hosting network’s performance, regardless of the reason, the account will be subject to suspension or immediate removal, depending on the situation. The Service Provider will be the sole arbiter in determining whether a given account is excessively using the server resources and/or causing a server degradation.\n
          \n
          **2\. SPAM AND SPAMVERTIZING**\n
          \n
          SPAMMING IS PROHIBITED. Users MAY NOT utilize our web hosting services to transmit, distribute or deliver any unsolicited bulk or commercial messages over the Internet (an action known as "spam" or "spamming").\n
          \n
          Spamming is a violation of ethic norms and will be interpreted as an infringement. the Service Provider will not tolerate the sending of unsolicited bulk or commercial messages through our services, as well as through another service that is mentioning, in some way, our customer’s domain name or implies the utilization of our network or our e-mail services for sending the unsolicited bulk or messages.\n
          \n
          SPAMVERTISING IS PROHIBITED. 'Spamvertizing’ refers to the practice of sending unsolicited spam messages for the purpose of advertising a particular website.\n
          \n
          If such e-mails are relayed through 3rd party (e-mail spoofing) and/or are promoting a domain hosted on our servers, this will lead to immediate account suspension unless an evidence of legitimacy for non-involvement of the domain owner in the particular illegal action is provided.\n
          \n
          ’E-mail spoofing’ is a fraudulent e-mail activity in which the sender’s (3td party) e-mail address and other parts of the e-mail header are changed so as to appear that the e-mail has been sent from a different source (e-mail address owner/server).\n
          \n
          'Unsolicited message’ is a message that is sent against the privacy policy of a newsgroup, or is sent to a recipient without their explicit permission. We, at our sole discretion, shall determine whether any of the messages you are sending is spam or spamvertizing. For your information, spamming generally includes, but is not limited to the following\n
          \n
          Sending of unsolicited messages in bulk, or sending of unsolicited e-mails, which provoke complaints from recipients;\n
          \n
          Sending of junk mail;\n
          \n
          Use of distribution lists that include people who have not given prior explicit permission to be involved in such a distribution process;\n
          \n
          Posting commercial ads to USENET newsgroups that do not permit it;\n
          \n
          Posting articles containing binary encoded data to non-binary newsgroups;\n
          \n
          Excessive and repeated posting of off-topic messages to newsgroups;\n
          \n
          Excessive and repeated cross-posting;\n
          \n
          E-mail harassment of another Internet Customer or Customers, including but not limited to, transmitting of any threatening, libellous or obscene material, or material of any nature that may be deemed offensive;\n
          \n
          E-mailing of age-inappropriate communications or content to anyone under the age of 18.\n
          \n
          **3\. INAPPROPRIATE OR UNLAWFUL CONTENT**\n
          \n
          CONTENT published or transmitted via the Service Provider’s hosting services includes website content, email content, forum/blog postings, chat content, and/or any other type of content hosted on our servers, published online or transmitted through our network’s services.\n
          \n
          The user of our services is NOT permitted to post online content or have links to content that:\n
          \n
          is defamatory, abusive or obscene, violates a person’s reputation/privacy, is reasonably deemed offensive by the web community, is anti-religious or anti-human rights, or contains any type of threatening or hate speech, encourages harassment or physical harm to any group or individual, or is otherwise malicious/fraudulent and may result in complaints/liabilities/or retaliation against the Service Provider by offended viewers;\n
          \n
          promotes or encourages illegal activities (e.g. illegal drugs, illegal gambling, arms trafficking, etc.) or violates any applicable law, statute, ordinance or regulation, including but not limited to the laws and regulations governing export control, unfair competition, false advertising, consumer protection, etc.\n
          \n
          represents pornography – any type of pornographic/adult material, including child pornography, or advertisements of pornographic websites;\n
          \n
          represents infringement on copyright, patents, trademarks, trade secrets, or third party's intellectual property or proprietary rights, including pirated computer programs, hacking/phreaking software, warez or any type of software/content (including also ROMs, ROM Emulators, media files – MP3, AVI, .RM, etc., torrent files, and others) that is copyrighted, is NOT uploaded in compliance with its license agreement or is NOT freely available for distribution.\n
          \n
          **4\. COPYRIGHTS**\n
          \n
          Copyrighted material must not be placed on customers' accounts without the explicit permission of the copyright owner or a person explicitly authorized to give such permission by the copyright owner. Upon receipt of a claim for copyright infringement, or a notice of such violation, we will immediately run full investigation and, upon confirmation, will promptly remove the infringing material from the Services. Further procedures (in accordance with our stated below corrective measures) will be carried out if necessary. We will assume no liability to any Customer of the Services for the removal of any such material.\n
          \n
          **5\. CORRECTIVE ACTIONS**\n
          \n
          We reserve our right to be the sole arbiter in determining the seriousness of each infringement and to immediately take corrective actions.\n
          \n
          We will disable the customer's account if we deem necessary, at our sole discretion. Upon closing of the customer’s account we will send an e-mail notification to the customer, stating the reason for the termination and quoting our terms’ chapter that has been violated. The customer will be given an opportunity to respond and take measures to remedy the situation should he/she consider him/herself abused by a third party. Upon fulfilling of this obligation, we may re-activate the customer’s account, if we find, at our own discretion, sufficient evidence pro customer’s side.\n
          \n
          Closed accounts due to repeated violations will not be re-activated. A backup may be requested, however it will be subject to certain penalty fees imposed according to the breach of this AUP terms. The final penalty fee will be determined by the type and frequency of the violations.\n
          \n
          **6\. REPORTING VIOLATIONS**\n
          \n
          If you need to report a violation of this AUP agreement or believe that you or your system has been subject to attack originating from our web hosting system, please contact us immediately. Our professional team will investigate the situation and provide you with full assistance.\n
          \n
          **7\. REVISIONS**\n
          \n
          We reserve our right to change this AUP at any time, without prior notice. We encourage our users to periodically review this Acceptable Use Policy and our Web Hosting Terms of Service.
          """
      ]
      "logo_url" => "https://www.philwebdev.com/billing/logod.svg"
      "languages" => array:2 [
        0 => array:3 [
          "locale" => "en_US"
          "title" => "English(en_US)"
          "name" => "English"
        ]
        1 => array:3 [
          "locale" => "hr_HR"
          "title" => "hr_HR(hr_HR)"
          "name" => "hr_HR"
        ]
      ]
    ]
    
/home/philwebd/public_html/billing/vendor/twig/twig/src/Template.php
    {
        if ($useBlocks && isset($blocks[$name])) {
            $template = $blocks[$name][0];
            $block = $blocks[$name][1];
        } elseif (isset($this->blocks[$name])) {
            $template = $this->blocks[$name][0];
            $block = $this->blocks[$name][1];
        } else {
            $template = null;
            $block = null;
        }
 
        // avoid RCEs when sandbox is enabled
        if (null !== $template && !$template instanceof self) {
            throw new \LogicException('A block must be a method on a \Twig\Template instance.');
        }
 
        if (null !== $template) {
            try {
                $template->$block($context, $blocks);
            } catch (Error $e) {
                if (!$e->getSourceContext()) {
                    $e->setSourceContext($template->getSourceContext());
                }
 
                // this is mostly useful for \Twig\Error\LoaderError exceptions
                // see \Twig\Error\LoaderError
                if (-1 === $e->getTemplateLine()) {
                    $e->guess();
                }
 
                throw $e;
            } catch (\Throwable $e) {
                $e = new RuntimeError(sprintf('An exception has been thrown during the rendering of a template ("%s").', $e->getMessage()), -1, $template->getSourceContext(), $e);
                $e->guess();
 
                throw $e;
            }
        } elseif (false !== $parent = $this->getParent($context)) {
            $parent->displayBlock($name, $context, array_merge($this->blocks, $blocks), false, $templateContext ?? $this);
Arguments
  1. array:11 [
      "CSRFToken" => "6921348dc90961df5535dfa8a24e50f2"
      "request" => array:2 [
        "_url" => "/order"
        "product" => "7"
      ]
      "guest" => Api_Handler {#175}
      "FOSSBillingVersion" => "0.6.20"
      "current_theme" => "huraga"
      "settings" => array:57 [
        "CSRFToken" => "3f10ff5d59184687b9efad79ebd8597e"
        "color_scheme" => "green"
        "show_page_header" => "1"
        "show_company_logo" => "1"
        "show_company_name" => "0"
        "show_client_details" => "1"
        "sidebar_balance_enabled" => "1"
        "top_menu_dashboard" => "1"
        "top_menu_profile" => "1"
        "top_menu_signout" => "1"
        "login_page_show_logo" => "1"
        "login_page_logo_url" => "/"
        "show_password_reset_link" => "1"
        "show_signup_link" => "0"
        "login_page_show_remember_me" => "1"
        "show_breadcrumb" => "1"
        "hide_dashboard_breadcrumb" => "1"
        "require_login" => "1"
        "showcase_enabled" => "0"
        "showcase_size" => "3"
        "showcase_text" => "Showcase text"
        "showcase_button_title" => "Showcase button title"
        "showcase_button_url" => "Showcase link URL"
        "side_menu_dashboard" => "1"
        "side_menu_order" => "1"
        "side_menu_support" => "1"
        "side_menu_services" => "1"
        "side_menu_invoices" => "1"
        "side_menu_emails" => "1"
        "side_menu_payments" => "1"
        "side_menu_news" => "1"
        "side_menu_kb" => "1"
        "sidebar_note_enabled" => "0"
        "sidebar_note_title" => "Note title"
        "sidebar_note_content" => "Note content"
        "meta_title" => ""
        "meta_description" => "Members area"
        "meta_keywords" => "members area"
        "meta_robots" => "noindex, nofollow"
        "meta_author" => "PhilWebDev"
        "footer_enabled" => "1"
        "footer_to_top_enabled" => "1"
        "footer_signature" => ""
        "footer_link_1_enabled" => "on"
        "footer_link_1_title" => "About us"
        "footer_link_1_page" => "about-us"
        "footer_link_2_enabled" => "on"
        "footer_link_2_title" => "Terms and conditions"
        "footer_link_2_page" => "tos"
        "footer_link_3_enabled" => "on"
        "footer_link_3_title" => "Privacy policy"
        "footer_link_3_page" => "privacy-policy"
        "footer_link_4_title" => ""
        "footer_link_4_page" => ""
        "footer_link_5_title" => ""
        "footer_link_5_page" => ""
        "inject_javascript" => ""
      ]
      "loader_nr" => "8"
      "loader_url" => "img/assets/loaders/loader8.gif"
      "company" => array:11 [
        "www" => "https://billing.philwebdev.com/"
        "name" => "XWDV Information Technology Solutions"
        "signature" => """
          Regards,\n
          \n
          XWDV Information Technology Solutions\n
          https://www.philwebdev.com\n
          \n
          \n
          """
        "logo_url" => "https://www.philwebdev.com/billing/logod.svg"
        "logo_url_dark" => "https://www.philwebdev.com/billing/logow.svg"
        "favicon_url" => "https://www.philwebdev.com/billing/themes/huraga/assets/favicon.ico"
        "display_bank_info" => "0"
        "bank_info_pagebottom" => null
        "note" => ""
        "privacy_policy" => """
          This Privacy Policy describes the policies and procedures of PhilWebDev Domain and Business Hosting Solution, in association with - LiquidNet US LLC, a US company headquartered in Fort Lauderdale, Florida, and LiquidNet Ltd., a UK company headquartered in London, UK, on the collection, use and disclosure of your information. Legal details about the two companies can be found in the 'Contact Us' section of this document.\n
          \n
          For the sake of brevity, PhilWebDev Domain and Business Hosting Solution, LiquidNet US LLC and LiquidNet Ltd. will be referred to as 'We', 'Us', 'Our' and 'Service Provider' in this document.\n
          \n
          This Privacy Policy does not apply to information our customers may process when using our services.\n
          \n
          \---\n
          \n
          Privacy and security are of utmost importance to the Service Provider and we strive to ensure that our technical and organizational measures in place respect your data protection rights.\n
          \n
          **COLLECTION OF PERSONAL DATA**  \n
          "Personal data" refers to any information relating to an identifiable individual or his or her personal identity.\n
          \n
          Personal data is collected on our website by LiquidNet US LLC., a US company headquartered in Fort Lauderdale, Florida.\n
          \n
          The personally identifiable information that LiquidNet US LLC may collect from you when registering for an account includes: first and last name, postal address, phone number, email and IP address.\n
          \n
          If you want to use your Social Media account as a means to log in to your hosting account, you will also have to provide your Social Media ID.\n
          \n
          Your information will be needed for the following purposes:\n
          \n
          *   provision of our services to you;\n
          *   prevention of fraudulent transactions;\n
          *   billing/invoicing operations;\n
          *   provision of a sales/technical support service;\n
          *   maintenance of your account with us;\n
          *   dispute resolution cases;\n
          *   enforcement of our Terms of Service, or other legal rights, or as may be required by applicable laws and regulations or requested by any judicial process or governmental agency;\n
          *   collection of aggregate statistics about use of our services;\n
          \n
          Much of the data collected is aggregated or statistical data about how individuals use our Services, and is not linked to any personal data, but to the extent it is itself personal data, or is linked or linkable to personal data, we treat it accordingly.\n
          \n
          The Service Provider will NOT send you any unsolicited information, including emails, except as mentioned hereby.\n
          \n
          New customers will receive a welcome email containing information about the features provided by the Service, as well as WHCP (Web Hosting Control Panel) and FTP login details.\n
          \n
          The Service Provider may also send system notifications upon need, related to any upgrade, maintenance or other service issues concerning your hosting account.\n
          \n
          If you contact us directly, we may receive additional information about you such as your name, email address, phone number, the contents of the message and/or attachments you may send us, and any other information you may choose to provide. We may also receive a confirmation when you open an email from us.\n
          \n
          The Service Provider will keep your personally identifiable information private and will NOT share it with any unauthorized third parties.\n
          \n
          When you use our services, we may collect information about your engagement with and utilization of our services, such as processor and memory usage, storage capacity, navigation of our services, and system-level metrics. We use this data to operate the services, maintain and improve the performance and utilization of the services, develop new features, protect the security and safety of our services and our customers, and provide customer support. We also use this data to develop aggregate analysis and business intelligence that enable us to operate, protect, make informed decisions, and report on the performance of our business.\n
          \n
          **LEGAL BASIS FOR PROCESSING OF PERSONAL DATA**  \n
          We collect personal information from you only when:\n
          \n
          you give your consent for us to so,\n
          \n
          we need your personal information to perform a contract with you (e.g. to deliver the services you have requested), or,\n
          \n
          the processing is in our legitimate interests and not overridden by your rights;\n
          \n
          We have a legitimate interest in operating our services and communicating with you as necessary to provide these services, for example when responding to your queries, improving our platform, undertaking marketing, or for the purposes of detecting or preventing illegal activities.\n
          \n
          Please note that in most cases, if you do not submit the requested information, the Service Provider will not be able to provide the requested service to you.\n
          \n
          In some cases, we may also have a legal obligation to collect personal information from you, or may otherwise need that information to protect your vital interests or those of some other person's.\n
          \n
          If we ask you to provide personal information to comply with a legal requirement or to perform a contract with you, we will make this clear at the relevant time and advise you whether the provision of your personal information is mandatory or not (as well as of the possible consequences if you do not provide your personal information).\n
          \n
          **ACCESS TO YOUR PERSONAL DATA**  \n
          You may access and update your personal Information at any time from your Web Hosting Control Panel - > My Account - > Change Contact Details section.\n
          \n
          **SECURITY OF YOUR PERSONAL DATA**  \n
          The Service Provider is committed to protecting the security of customer collected personal information. To do so, we use technical security measures to prevent the loss, misuse, alternation or unauthorized disclosure of information under our control. We use security measures including and not limited to: physical, electronic and managerial procedures to safeguard and secure the information we collect online. However, please keep in mind that the Internet cannot be guaranteed to be 100% secure.\n
          \n
          If the Service Provider learns of a security system breach, we may attempt to notify you and send you any available protective information to the email address that you have provided to us or by posting a notice in your WHCP.\n
          \n
          **SHARING YOUR PERSONAL DATA WITH THIRD PARTIES**  \n
          We may share the information we collect in various ways, including the following:\n
          \n
          _Service Providers_  \n
          We may share information with third-party service providers that provide services on our behalf, such as helping to provide our services and to provide you with information relevant to you such as product announcements, service upgrades, special offers, or other information.\n
          \n
          _As Required By Law and Similar Disclosures_  \n
          We may also share information to (i) satisfy any applicable law, regulation, legal process, or governmental request; (ii) enforce this Privacy Policy and our Terms of Service, including investigation of potential violations hereof; (iii) detect, prevent, or otherwise address fraud, security, or technical issues; (iv) respond to your requests; or (v) protect our rights, property or safety, our users and the public. This includes exchanging information with other companies and organizations for fraud protection and spam/malware prevention.\n
          \n
          **THIRD-PARTY SERVICES**  \n
          You may access other third-party services through our services, for example by clicking on links to those third-party services from within our services. We are not responsible for the privacy policies and/or practices of these third-party services, and we encourage you to carefully review their privacy policies.\n
          \n
          **PRIVACY OF YOUR PAYMENT DETAILS**  \n
          We use third-party payment processing companies who collect and store financial information, such as your payment method (valid credit card number, type, expiration date or other financial information), and their use and storage of that information is governed by the payment processors' applicable terms of service and privacy policy. Collected billing information is used for the purposes of processing payments and fraud detection.\n
          \n
          We do not store your financial account information on our systems; however, we have access to, and may retain, subscriber information through our third-party payment processor.\n
          \n
          All PayPal transactions are subject to the [PayPal Privacy Policy](https://www.paypal.com/en/webapps/mpp/ua/privacy-full).\n
          \n
          **PRIVACY OF YOUR ACCOUNT**  \n
          We consider your registration data and the content of all your messages private and confidential. The header of the messages that you send will contain your name (e-mail address) and Internet Protocol (IP) address. We will not intentionally monitor or disclose any of your e-mail content or registration data unless we are required to do so:\n
          \n
          to enforce these Terms and Conditions,\n
          \n
          by law,\n
          \n
          to defend ourselves in any legal action,\n
          \n
          to protect our property.\n
          \n
          Since your password is essential for protecting your privacy, we encourage you to NOT share it with anyone and change it frequently. Additionally, you agree to respect the privacy and confidentiality of others.\n
          \n
          **AGE RESTRICTIONS**  \n
          We offer services only to people who are 18+. Our services are not targeted to, intended to be consumed by or designed to entice individuals under the age of 18. If we learn that we have collected the personal information of a child under the age of 18, we will take steps to delete that information as soon as possible.\n
          \n
          If you know of or have reason to believe that anyone under the age of 18 has provided us with any personal data, please contact us.\n
          \n
          **LOG FILES**  \n
          We use IP addresses to analyze trends, administer our site and servers, track access, and gather broad demographic information for aggregate use. IP addresses are not linked to personally identifiable information. It is possible that personal information about a customer may be included in the log files due to the normal functions of IP addresses and Web browsing.\n
          \n
          **COOKIES**  \n
          We use different cookies on our website to make it as useful to you as possible. Cookies are small text files that we put on your computer or mobile device to tell us what you want to use on our site but they do not tell us who you are.\n
          \n
          [Here](http://www.aboutcookies.org/) you can learn more about cookies and how to [control](http://www.aboutcookies.org/how-to-control-cookies/) or [delete](http://www.aboutcookies.org/how-to-delete-cookies/) them.\n
          \n
          Here are the cookies that we use on our site:\n
          \n
          _Essential cookies_  \n
          We use a cookie to remember your login for you and what you’ve put in the shop cart. Also, we set a cookie to help you choose a preferred font size for using the site. These cookies we consider essential for the operation of our website.\n
          \n
          _External web services_  \n
          We use an external live chat service (using cookies to remember your session name) to deliver real-time support to you should you want to.\n
          \n
          _Analytics_  \n
          We use Google Analytics and Facebook cookies to monitor visitor activity on our website. No personally identifying data is included in this type of reporting. We do not share information about this analysis with any third parties.\n
          \n
          Visitors can [opt out of Google's advertising tracking cookie](https://policies.google.com/technologies/ads) or [install a browser plugin](https://tools.google.com/dlpage/gaoptout?hl=en) to opt out of all Google Analytics tracking software. More information about Facebook's analytics cookie is available [here](https://www.facebook.com/policies/cookies/?utm_referrer=https://www.cloudflare.com/privacypolicy/).\n
          \n
          We assume you are happy with this usage of cookies on this website. If you are not happy, then you should either not use this site, or delete the cookies (you can check out how to do that according to your browser [here](http://www.aboutcookies.org/how-to-delete-cookies/)), or browse the site using your browser’s anonymous usage setting (named “Incognito” in Chrome, “InPrivate” for Internet Explorer, "Private Browsing" in Firefox and Safari etc.).\n
          \n
          We currently do not alter our practices when we receive a "Do Not Track" signal from a visitor's browser.\n
          \n
          Please remember that if you choose to delete the cookies or use the browser anonymously, you may find that certain sections of this website do not work properly.\n
          \n
          **YOUR RIGHTS UNDER THE GENERAL DATA PROTECTION REGULATION (GDPR)**\n
          \n
          If you are a resident of the European Economic Area (EEA), you have the following data protection rights:\n
          \n
          _Managing Your Information_  \n
          You may access and update some of your information through the "Change Contact Details" section in the WHCP. If you have chosen to connect your account to a third-party application like Facebook, Google or Twitter, you can change your settings and remove permission for the app from the "Linked Social Accounts" section in the WHCP. You are responsible for keeping your personal information up to date.\n
          \n
          _Rectification of Inaccurate or Incomplete Information_  \n
          You have the right to ask us to correct any inaccurate or incomplete personal information concerning you if you cannot update it yourself from within your account.\n
          \n
          _Data Access and Portability_  \n
          In some jurisdictions, the applicable law may entitle you to request copies of your personal information held by us. You may also be entitled to request copies of personal information that you have provided to us in a structured, commonly used, and machine-readable format and/or request us to transmit this information to another service provider (where technically feasible).\n
          \n
          _Opt-out of marketing communications_  \n
          You have the right to opt-out of marketing communications we send you at any time. You can exercise this right by clicking on the "unsubscribe" or "opt-out" link in the marketing emails we send you.\n
          \n
          _Data Retention and Erasure_  \n
          We generally retain your personal information for as long as is necessary for the performance of the contract between you and us and to comply with our legal obligations. If you no longer want us to use your information to provide the contracted services to you, you can request that we erase your personal information and close your account. Please note that if you request the erasure of your personal information:\n
          \n
          We may retain some of your personal information so as to detect and prevent fraud and enhance safety. For example, if we suspend an account for security reasons, we may retain certain information from that account to prevent that customer from opening a new account in the future.\n
          \n
          We may retain and use your personal information to the extent necessary to comply with our legal obligations. For example, we may keep some of your information for tax, legal reporting and auditing purposes.\n
          \n
          Because we maintain our platform to protect it from accidental or malicious loss and destruction, residual copies of your personal information may not be removed from our backup systems for a limited period of time.\n
          \n
          In cases where fraudulent or otherwise illegal activity has been deemed to have occurred as determined by law enforcement or management, the information may remain in our database indefinitely in order to help facilitate the prevention of repeated abuse in the future from the offending party.\n
          \n
          _Withdrawing Consent and Restriction of Processing_  \n
          If you have provided your consent to the processing of your personal information, you may withdraw it at any time by sending us a communication specifying which consent you are withdrawing. Please note that the withdrawal of your consent does not affect the lawfulness of any processing activities based on such consent before its withdrawal. Additionally, in some jurisdictions, applicable law may give you the right to limit the ways in which we use your personal information, in particular where (i) you contest the accuracy of your personal information; (ii) the processing is unlawful and you oppose the erasure of your personal information; (iii) we no longer need your personal information for the purposes of the processing, but you require the information for the establishment, exercise or defence of legal claims; or (iv) you have objected to the processing and pending the verification whether the Service Provider's legitimate grounds override your own.\n
          \n
          _Objection to Processing_  \n
          In some jurisdictions, applicable law may entitle you to require us not to process your personal information for certain specific purposes (including profiling) where such processing is based on legitimate interest. If you object to such processing, we will no longer process your personal information for these purposes unless we can demonstrate compelling legitimate grounds for such processing or such processing is required for the establishment, exercise or defence of legal claims.\n
          \n
          By default, customers do receive any system updates, such as the newsletters, invoices and service email notifications. Customers cannot opt out of possibly receiving important system notifications, since the latter are deemed necessary for the performance of our contractual obligations to you.\n
          \n
          _Lodging Complaints_  \n
          If you want to make a complaint about the way we are processing your data, you can contact us using the contact details below.\n
          \n
          You have the right to complain to a data protection authority about our collection and use of your personal information. For more information, please contact your local data protection authority.\n
          \n
          \---\n
          \n
          We respond to all requests we receive from individuals wishing to exercise their data protection rights in accordance with applicable data protection laws.\n
          \n
          **INTERNATIONAL TRANSFERS OF INFORMATION WE COLLECT**  \n
          We collect information globally and primarily store that information in the United States. We transfer, process and store your information outside of your country of residence. Whenever we transfer your information, we take steps to protect it.\n
          \n
          To facilitate our global operations, we transfer information to the United States and allow access to that information from countries in which we and associated companies have operations for the purposes described in this policy. These countries may not have equivalent privacy and data protection laws, certainly not equivalent to the laws of many of the countries where our customers and users are based. When we share information about you, we make use of Standard Contractual Clauses (SCCs) for data transfers between EU and non-EU countries, which have been approved by the European Commission.\n
          \n
          A copy of your personal data will also be stored in the data center you have selected when signing up for our services. This is done so that the Service Provider can deliver the contracted service in the location specified by the customer.\n
          \n
          **COMPLIANCE WITH LAWS AND LAW ENFORCEMENT**  \n
          The Service Provider cooperates with government and law enforcement officials to enforce and comply with the law. We will disclose any information about Users upon valid request by government or law officials as we, in our sole discretion, believe necessary or appropriate to respond to claims and legal process (including without limitation subpoenas), to protect your property and rights, or the property and rights of a third party, to protect the safety of the public or any person, or stop activity we consider illegal or unethical.\n
          \n
          **CHANGES TO PRIVACY POLICY**  \n
          Any changes to our Privacy Policy will be placed here and will supersede this version of our Policy. We will take reasonable steps to draw your attention to any changes in our Policy. However, to be on the safe side, we suggest that you read this document each time you use the website to ensure that it still meets with your approval.\n
          \n
          **CONTACT US**  \n
          If you have any questions about our Privacy Policy, or if you want to know what information we have collected about you, please use our Contact Us form.\n
          \n
          Postal Address:\n
          \n
          LiquidNet US LLC  \n
          6750 North Andrews Ave  \n
          Suite 200  \n
          Fort Lauderdale, FL 33309  \n
          United States of America\n
          \n
          LiquidNet Ltd.  \n
          13 Craigleith  \n
          7 Kersfield Road  \n
          Putney, London SW15 3HN  \n
          United Kingdom
          """
        "tos" => """
          An Acceptable Use Policy (AUP) is a set of rules and conditions compiled by a network, system, or a website owner. These rules explicitly define and restrict the ways in which the respective network, system or website may be used.\n
          \n
          The **AUP of the Service Provider** aims to clearly outline the purposes for which our customers CANNOT utilize our hosting services and position data on our network servers.\n
          \n
          This Acceptable Use Policy (AUP) is an integral part of the [Web Hosting Terms of Service](https://www.philwebdev.com/terms-and-conditions-2/web-hosting-terms-of-service-3/) which each customer agrees to abide by when signing up for an account with our web hosting company. Any violation of this AUP will be deemed a violation of our Web Hosting Terms of Service.\n
          \n
          We, at our own discretion, shall determine whether an act constitutes a breach of this AUP terms and misuse of our services. We reserve our right to be the sole arbiter in determining the sufficiency of the presented evidences. We will respond accordingly, and/or immediately terminate the provision of the services, shall we receive the report, and/or have sufficient proof, of any prohibited conduct outlined in this AUP, or any other activity threatening the security of our hosting environment and/or our network of hosting servers.\n
          \n
          In order to protect our company’s reputation and responsibilities, and guarantee state-of-the-art and reliable hosting services to all our customers, as well as privacy and security for all users, we – the Service Provider - hereby outline the following AUP rules and conditions to come into force for each customer signing up for a web hosting account with our company:\n
          \n
          1\. [System Abuse](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#SYSTEM_ABUSE)\n
          \n
          2\. [Spam and Spamvertizing](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#SPAM_AND_SPAMVERTIZING)\n
          \n
          3\. [Inappropriate or Unlawful Content](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#INAPPROPRIATE_OR_UNLAWFUL_CONTENT_)\n
          \n
          4\. [Copyrights](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#COPYRIGHTS)\n
          \n
          5\. [Corrective Actions](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#CORRECTIVE_ACTIONS)\n
          \n
          6\. [Reporting Violtaions](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#REPORTING_VIOLATIONS)\n
          \n
          7\. [Revisions](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#REVISIONS)\n
          \n
          **1\. SYSTEM ABUSE**\n
          \n
          Any customer in violation of our system or network security is subject to criminal and civil liability, as well as immediate account termination. Examples include, but are not limited to the following:\n
          \n
          Unauthorized access, use, probe, or scan of our system’s security, authentication measures, data, or traffic. Interference with the service to any user, host or network including, but not limited to: e-mail bombing, flooding, deliberate attempts to overload the system and broadcast attacks, forging of any TCP/IP packet header or any part of the header information in an e-mail or newsgroup posting.\n
          \n
          Any attempt at doing harm to a server or a customer of our web hosting services:\n
          \n
          the Service Provider will immediately and resolutely react to any attempt at misuse of an Internet account or computer, or any attempt to gain access to an Internet account or computer by a Service Provider's customer unauthorized by the account/computer owner. Such attempts include, but are not limited to the following: 'Internet scamming' (tricking other people into releasing their passwords, etc.), password robbery, security hole scanning, running proxy - proxy lists and any kind of proxy scripts (including, but not limited to PHP proxy and mph proxy), introducing of any computer programs (viruses, Trojan horses, trap doors, back doors, worms, time bombs, packet bombs, cancelbots, etc.) that are intended to negatively interfere with, intercept, irreversibly damage or take hold of any system, data or personal information. It WILL NOT matter whether the attacked account or computer belongs or not to the Service Provider's services. The fraud will be subject to actions based on the very nature of the attack and those may represent a warning, an account suspension or cancellation, and/or civil or criminal legal actions.\n
          \n
          Background operations/programs on servers:\n
          \n
          ‘Background process’ is a program that runs in the background of the operating system. What is specific for a background process is that, once started, it runs simultaneously with other foreground processes. This means that, the shell executing the background operation does not wait for it to finish or terminate, as it does with foreground processes, but is free to start executing more operations along with the background one. Typical background processes are ircd, irc bot, bnc, and many others.\n
          \n
          Background processes are not permitted on any of our shared hosting servers, as they usually lead to CPU overload and can be used for malicious and/or illegal actions. As our primary task is to provide highest quality web hosting service to all our customers, we cannot permit any background processes to be executed and threaten the performance of our server network. Our shared hosting system does not allow a big multitude of users to simultaneously use the system memory and processing time of our servers.\n
          \n
          Excessive use of system resources:\n
          \n
          In order to ensure higher server performance and quality of hosting service all shared hosting plans are subject to certain resource limitations concerning, but not limited to, server CPU usage, Memory usage, disk-space and traffic. If a hosting account exceeds the allowed amount of system resources the account owner will be immediately notified to take actions in order to reduce the usage. If such action is not instantly taken by the owner the account will be suspended. If an excessive CPU usage is detected the account owner will be suggested to place an order for a CPU usage upgrade or upgrade to a plan which allows higher CPU usage.\n
          \n
          If any hosting account is found to be causing degradation of the server and/or our hosting network’s performance, regardless of the reason, the account will be subject to suspension or immediate removal, depending on the situation. The Service Provider will be the sole arbiter in determining whether a given account is excessively using the server resources and/or causing a server degradation.\n
          \n
          **2\. SPAM AND SPAMVERTIZING**\n
          \n
          SPAMMING IS PROHIBITED. Users MAY NOT utilize our web hosting services to transmit, distribute or deliver any unsolicited bulk or commercial messages over the Internet (an action known as "spam" or "spamming").\n
          \n
          Spamming is a violation of ethic norms and will be interpreted as an infringement. the Service Provider will not tolerate the sending of unsolicited bulk or commercial messages through our services, as well as through another service that is mentioning, in some way, our customer’s domain name or implies the utilization of our network or our e-mail services for sending the unsolicited bulk or messages.\n
          \n
          SPAMVERTISING IS PROHIBITED. 'Spamvertizing’ refers to the practice of sending unsolicited spam messages for the purpose of advertising a particular website.\n
          \n
          If such e-mails are relayed through 3rd party (e-mail spoofing) and/or are promoting a domain hosted on our servers, this will lead to immediate account suspension unless an evidence of legitimacy for non-involvement of the domain owner in the particular illegal action is provided.\n
          \n
          ’E-mail spoofing’ is a fraudulent e-mail activity in which the sender’s (3td party) e-mail address and other parts of the e-mail header are changed so as to appear that the e-mail has been sent from a different source (e-mail address owner/server).\n
          \n
          'Unsolicited message’ is a message that is sent against the privacy policy of a newsgroup, or is sent to a recipient without their explicit permission. We, at our sole discretion, shall determine whether any of the messages you are sending is spam or spamvertizing. For your information, spamming generally includes, but is not limited to the following\n
          \n
          Sending of unsolicited messages in bulk, or sending of unsolicited e-mails, which provoke complaints from recipients;\n
          \n
          Sending of junk mail;\n
          \n
          Use of distribution lists that include people who have not given prior explicit permission to be involved in such a distribution process;\n
          \n
          Posting commercial ads to USENET newsgroups that do not permit it;\n
          \n
          Posting articles containing binary encoded data to non-binary newsgroups;\n
          \n
          Excessive and repeated posting of off-topic messages to newsgroups;\n
          \n
          Excessive and repeated cross-posting;\n
          \n
          E-mail harassment of another Internet Customer or Customers, including but not limited to, transmitting of any threatening, libellous or obscene material, or material of any nature that may be deemed offensive;\n
          \n
          E-mailing of age-inappropriate communications or content to anyone under the age of 18.\n
          \n
          **3\. INAPPROPRIATE OR UNLAWFUL CONTENT**\n
          \n
          CONTENT published or transmitted via the Service Provider’s hosting services includes website content, email content, forum/blog postings, chat content, and/or any other type of content hosted on our servers, published online or transmitted through our network’s services.\n
          \n
          The user of our services is NOT permitted to post online content or have links to content that:\n
          \n
          is defamatory, abusive or obscene, violates a person’s reputation/privacy, is reasonably deemed offensive by the web community, is anti-religious or anti-human rights, or contains any type of threatening or hate speech, encourages harassment or physical harm to any group or individual, or is otherwise malicious/fraudulent and may result in complaints/liabilities/or retaliation against the Service Provider by offended viewers;\n
          \n
          promotes or encourages illegal activities (e.g. illegal drugs, illegal gambling, arms trafficking, etc.) or violates any applicable law, statute, ordinance or regulation, including but not limited to the laws and regulations governing export control, unfair competition, false advertising, consumer protection, etc.\n
          \n
          represents pornography – any type of pornographic/adult material, including child pornography, or advertisements of pornographic websites;\n
          \n
          represents infringement on copyright, patents, trademarks, trade secrets, or third party's intellectual property or proprietary rights, including pirated computer programs, hacking/phreaking software, warez or any type of software/content (including also ROMs, ROM Emulators, media files – MP3, AVI, .RM, etc., torrent files, and others) that is copyrighted, is NOT uploaded in compliance with its license agreement or is NOT freely available for distribution.\n
          \n
          **4\. COPYRIGHTS**\n
          \n
          Copyrighted material must not be placed on customers' accounts without the explicit permission of the copyright owner or a person explicitly authorized to give such permission by the copyright owner. Upon receipt of a claim for copyright infringement, or a notice of such violation, we will immediately run full investigation and, upon confirmation, will promptly remove the infringing material from the Services. Further procedures (in accordance with our stated below corrective measures) will be carried out if necessary. We will assume no liability to any Customer of the Services for the removal of any such material.\n
          \n
          **5\. CORRECTIVE ACTIONS**\n
          \n
          We reserve our right to be the sole arbiter in determining the seriousness of each infringement and to immediately take corrective actions.\n
          \n
          We will disable the customer's account if we deem necessary, at our sole discretion. Upon closing of the customer’s account we will send an e-mail notification to the customer, stating the reason for the termination and quoting our terms’ chapter that has been violated. The customer will be given an opportunity to respond and take measures to remedy the situation should he/she consider him/herself abused by a third party. Upon fulfilling of this obligation, we may re-activate the customer’s account, if we find, at our own discretion, sufficient evidence pro customer’s side.\n
          \n
          Closed accounts due to repeated violations will not be re-activated. A backup may be requested, however it will be subject to certain penalty fees imposed according to the breach of this AUP terms. The final penalty fee will be determined by the type and frequency of the violations.\n
          \n
          **6\. REPORTING VIOLATIONS**\n
          \n
          If you need to report a violation of this AUP agreement or believe that you or your system has been subject to attack originating from our web hosting system, please contact us immediately. Our professional team will investigate the situation and provide you with full assistance.\n
          \n
          **7\. REVISIONS**\n
          \n
          We reserve our right to change this AUP at any time, without prior notice. We encourage our users to periodically review this Acceptable Use Policy and our Web Hosting Terms of Service.
          """
      ]
      "logo_url" => "https://www.philwebdev.com/billing/logod.svg"
      "languages" => array:2 [
        0 => array:3 [
          "locale" => "en_US"
          "title" => "English(en_US)"
          "name" => "English"
        ]
        1 => array:3 [
          "locale" => "hr_HR"
          "title" => "hr_HR(hr_HR)"
          "name" => "hr_HR"
        ]
      ]
    ]
    
  2. array:13 [
      "meta_title" => array:2 [
        0 => __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 {#178}
        1 => "block_meta_title"
      ]
      "meta_description" => array:2 [
        0 => __TwigTemplate_1218b162b0557026e91ff8225d515b58 {#181}
        1 => "block_meta_description"
      ]
      "opengraph" => array:2 [
        0 => __TwigTemplate_1218b162b0557026e91ff8225d515b58 {#181}
        1 => "block_opengraph"
      ]
      "head" => array:2 [
        0 => __TwigTemplate_1218b162b0557026e91ff8225d515b58 {#181}
        1 => "block_head"
      ]
      "js" => array:2 [
        0 => __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 {#178}
        1 => "block_js"
      ]
      "body_class" => array:2 [
        0 => __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 {#178}
        1 => "block_body_class"
      ]
      "body" => array:2 [
        0 => __TwigTemplate_1218b162b0557026e91ff8225d515b58 {#181}
        1 => "block_body"
      ]
      "content_before" => array:2 [
        0 => __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 {#178}
        1 => "block_content_before"
      ]
      "breadcrumbs" => array:2 [
        0 => __TwigTemplate_1218b162b0557026e91ff8225d515b58 {#181}
        1 => "block_breadcrumbs"
      ]
      "breadcrumb" => array:2 [
        0 => __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 {#178}
        1 => "block_breadcrumb"
      ]
      "content" => array:2 [
        0 => __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 {#178}
        1 => "block_content"
      ]
      "content_after" => array:2 [
        0 => __TwigTemplate_1218b162b0557026e91ff8225d515b58 {#181}
        1 => "block_content_after"
      ]
      "sidebar2" => array:2 [
        0 => __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 {#178}
        1 => "block_sidebar2"
      ]
    ]
    
/home/philwebd/public_html/billing/data/cache/d8/d830f004c1e3b0369b2a8dd53ccb3a68.php
                    <section role=\"main\">
                        ";
        // line 149
        $this->displayBlock('content_before', $context, $blocks);
        // line 150
        echo "                        <div class=\"content-block\" role=\"main\">
                            ";
        // line 151
        if (twig_get_attribute($this->env, $this->source, ($context["settings"] ?? null), "show_breadcrumb", [], "any", false, false, false, 151)) {
            // line 152
            echo "                                ";
            $this->displayBlock('breadcrumbs', $context, $blocks);
            // line 163
            echo "                            ";
        }
        // line 164
        echo "
                            ";
        // line 165
        $this->displayBlock('content', $context, $blocks);
        // line 166
        echo "
                            ";
        // line 167
        $this->loadTemplate("partial_message.html.twig", "layout_default.html.twig", 167)->display($context);
        // line 168
        echo "
                            ";
        // line 169
        $this->displayBlock('content_after', $context, $blocks);
        // line 170
        echo "                        </div>
                    </section>
                    <div id=\"push\"></div>
                </div>
 
                ";
        // line 175
        if (twig_get_attribute($this->env, $this->source, ($context["settings"] ?? null), "footer_enabled", [], "any", false, false, false, 175)) {
            // line 176
Arguments
  1. "content"
    
  2. array:11 [
      "CSRFToken" => "6921348dc90961df5535dfa8a24e50f2"
      "request" => array:2 [
        "_url" => "/order"
        "product" => "7"
      ]
      "guest" => Api_Handler {#175}
      "FOSSBillingVersion" => "0.6.20"
      "current_theme" => "huraga"
      "settings" => array:57 [
        "CSRFToken" => "3f10ff5d59184687b9efad79ebd8597e"
        "color_scheme" => "green"
        "show_page_header" => "1"
        "show_company_logo" => "1"
        "show_company_name" => "0"
        "show_client_details" => "1"
        "sidebar_balance_enabled" => "1"
        "top_menu_dashboard" => "1"
        "top_menu_profile" => "1"
        "top_menu_signout" => "1"
        "login_page_show_logo" => "1"
        "login_page_logo_url" => "/"
        "show_password_reset_link" => "1"
        "show_signup_link" => "0"
        "login_page_show_remember_me" => "1"
        "show_breadcrumb" => "1"
        "hide_dashboard_breadcrumb" => "1"
        "require_login" => "1"
        "showcase_enabled" => "0"
        "showcase_size" => "3"
        "showcase_text" => "Showcase text"
        "showcase_button_title" => "Showcase button title"
        "showcase_button_url" => "Showcase link URL"
        "side_menu_dashboard" => "1"
        "side_menu_order" => "1"
        "side_menu_support" => "1"
        "side_menu_services" => "1"
        "side_menu_invoices" => "1"
        "side_menu_emails" => "1"
        "side_menu_payments" => "1"
        "side_menu_news" => "1"
        "side_menu_kb" => "1"
        "sidebar_note_enabled" => "0"
        "sidebar_note_title" => "Note title"
        "sidebar_note_content" => "Note content"
        "meta_title" => ""
        "meta_description" => "Members area"
        "meta_keywords" => "members area"
        "meta_robots" => "noindex, nofollow"
        "meta_author" => "PhilWebDev"
        "footer_enabled" => "1"
        "footer_to_top_enabled" => "1"
        "footer_signature" => ""
        "footer_link_1_enabled" => "on"
        "footer_link_1_title" => "About us"
        "footer_link_1_page" => "about-us"
        "footer_link_2_enabled" => "on"
        "footer_link_2_title" => "Terms and conditions"
        "footer_link_2_page" => "tos"
        "footer_link_3_enabled" => "on"
        "footer_link_3_title" => "Privacy policy"
        "footer_link_3_page" => "privacy-policy"
        "footer_link_4_title" => ""
        "footer_link_4_page" => ""
        "footer_link_5_title" => ""
        "footer_link_5_page" => ""
        "inject_javascript" => ""
      ]
      "loader_nr" => "8"
      "loader_url" => "img/assets/loaders/loader8.gif"
      "company" => array:11 [
        "www" => "https://billing.philwebdev.com/"
        "name" => "XWDV Information Technology Solutions"
        "signature" => """
          Regards,\n
          \n
          XWDV Information Technology Solutions\n
          https://www.philwebdev.com\n
          \n
          \n
          """
        "logo_url" => "https://www.philwebdev.com/billing/logod.svg"
        "logo_url_dark" => "https://www.philwebdev.com/billing/logow.svg"
        "favicon_url" => "https://www.philwebdev.com/billing/themes/huraga/assets/favicon.ico"
        "display_bank_info" => "0"
        "bank_info_pagebottom" => null
        "note" => ""
        "privacy_policy" => """
          This Privacy Policy describes the policies and procedures of PhilWebDev Domain and Business Hosting Solution, in association with - LiquidNet US LLC, a US company headquartered in Fort Lauderdale, Florida, and LiquidNet Ltd., a UK company headquartered in London, UK, on the collection, use and disclosure of your information. Legal details about the two companies can be found in the 'Contact Us' section of this document.\n
          \n
          For the sake of brevity, PhilWebDev Domain and Business Hosting Solution, LiquidNet US LLC and LiquidNet Ltd. will be referred to as 'We', 'Us', 'Our' and 'Service Provider' in this document.\n
          \n
          This Privacy Policy does not apply to information our customers may process when using our services.\n
          \n
          \---\n
          \n
          Privacy and security are of utmost importance to the Service Provider and we strive to ensure that our technical and organizational measures in place respect your data protection rights.\n
          \n
          **COLLECTION OF PERSONAL DATA**  \n
          "Personal data" refers to any information relating to an identifiable individual or his or her personal identity.\n
          \n
          Personal data is collected on our website by LiquidNet US LLC., a US company headquartered in Fort Lauderdale, Florida.\n
          \n
          The personally identifiable information that LiquidNet US LLC may collect from you when registering for an account includes: first and last name, postal address, phone number, email and IP address.\n
          \n
          If you want to use your Social Media account as a means to log in to your hosting account, you will also have to provide your Social Media ID.\n
          \n
          Your information will be needed for the following purposes:\n
          \n
          *   provision of our services to you;\n
          *   prevention of fraudulent transactions;\n
          *   billing/invoicing operations;\n
          *   provision of a sales/technical support service;\n
          *   maintenance of your account with us;\n
          *   dispute resolution cases;\n
          *   enforcement of our Terms of Service, or other legal rights, or as may be required by applicable laws and regulations or requested by any judicial process or governmental agency;\n
          *   collection of aggregate statistics about use of our services;\n
          \n
          Much of the data collected is aggregated or statistical data about how individuals use our Services, and is not linked to any personal data, but to the extent it is itself personal data, or is linked or linkable to personal data, we treat it accordingly.\n
          \n
          The Service Provider will NOT send you any unsolicited information, including emails, except as mentioned hereby.\n
          \n
          New customers will receive a welcome email containing information about the features provided by the Service, as well as WHCP (Web Hosting Control Panel) and FTP login details.\n
          \n
          The Service Provider may also send system notifications upon need, related to any upgrade, maintenance or other service issues concerning your hosting account.\n
          \n
          If you contact us directly, we may receive additional information about you such as your name, email address, phone number, the contents of the message and/or attachments you may send us, and any other information you may choose to provide. We may also receive a confirmation when you open an email from us.\n
          \n
          The Service Provider will keep your personally identifiable information private and will NOT share it with any unauthorized third parties.\n
          \n
          When you use our services, we may collect information about your engagement with and utilization of our services, such as processor and memory usage, storage capacity, navigation of our services, and system-level metrics. We use this data to operate the services, maintain and improve the performance and utilization of the services, develop new features, protect the security and safety of our services and our customers, and provide customer support. We also use this data to develop aggregate analysis and business intelligence that enable us to operate, protect, make informed decisions, and report on the performance of our business.\n
          \n
          **LEGAL BASIS FOR PROCESSING OF PERSONAL DATA**  \n
          We collect personal information from you only when:\n
          \n
          you give your consent for us to so,\n
          \n
          we need your personal information to perform a contract with you (e.g. to deliver the services you have requested), or,\n
          \n
          the processing is in our legitimate interests and not overridden by your rights;\n
          \n
          We have a legitimate interest in operating our services and communicating with you as necessary to provide these services, for example when responding to your queries, improving our platform, undertaking marketing, or for the purposes of detecting or preventing illegal activities.\n
          \n
          Please note that in most cases, if you do not submit the requested information, the Service Provider will not be able to provide the requested service to you.\n
          \n
          In some cases, we may also have a legal obligation to collect personal information from you, or may otherwise need that information to protect your vital interests or those of some other person's.\n
          \n
          If we ask you to provide personal information to comply with a legal requirement or to perform a contract with you, we will make this clear at the relevant time and advise you whether the provision of your personal information is mandatory or not (as well as of the possible consequences if you do not provide your personal information).\n
          \n
          **ACCESS TO YOUR PERSONAL DATA**  \n
          You may access and update your personal Information at any time from your Web Hosting Control Panel - > My Account - > Change Contact Details section.\n
          \n
          **SECURITY OF YOUR PERSONAL DATA**  \n
          The Service Provider is committed to protecting the security of customer collected personal information. To do so, we use technical security measures to prevent the loss, misuse, alternation or unauthorized disclosure of information under our control. We use security measures including and not limited to: physical, electronic and managerial procedures to safeguard and secure the information we collect online. However, please keep in mind that the Internet cannot be guaranteed to be 100% secure.\n
          \n
          If the Service Provider learns of a security system breach, we may attempt to notify you and send you any available protective information to the email address that you have provided to us or by posting a notice in your WHCP.\n
          \n
          **SHARING YOUR PERSONAL DATA WITH THIRD PARTIES**  \n
          We may share the information we collect in various ways, including the following:\n
          \n
          _Service Providers_  \n
          We may share information with third-party service providers that provide services on our behalf, such as helping to provide our services and to provide you with information relevant to you such as product announcements, service upgrades, special offers, or other information.\n
          \n
          _As Required By Law and Similar Disclosures_  \n
          We may also share information to (i) satisfy any applicable law, regulation, legal process, or governmental request; (ii) enforce this Privacy Policy and our Terms of Service, including investigation of potential violations hereof; (iii) detect, prevent, or otherwise address fraud, security, or technical issues; (iv) respond to your requests; or (v) protect our rights, property or safety, our users and the public. This includes exchanging information with other companies and organizations for fraud protection and spam/malware prevention.\n
          \n
          **THIRD-PARTY SERVICES**  \n
          You may access other third-party services through our services, for example by clicking on links to those third-party services from within our services. We are not responsible for the privacy policies and/or practices of these third-party services, and we encourage you to carefully review their privacy policies.\n
          \n
          **PRIVACY OF YOUR PAYMENT DETAILS**  \n
          We use third-party payment processing companies who collect and store financial information, such as your payment method (valid credit card number, type, expiration date or other financial information), and their use and storage of that information is governed by the payment processors' applicable terms of service and privacy policy. Collected billing information is used for the purposes of processing payments and fraud detection.\n
          \n
          We do not store your financial account information on our systems; however, we have access to, and may retain, subscriber information through our third-party payment processor.\n
          \n
          All PayPal transactions are subject to the [PayPal Privacy Policy](https://www.paypal.com/en/webapps/mpp/ua/privacy-full).\n
          \n
          **PRIVACY OF YOUR ACCOUNT**  \n
          We consider your registration data and the content of all your messages private and confidential. The header of the messages that you send will contain your name (e-mail address) and Internet Protocol (IP) address. We will not intentionally monitor or disclose any of your e-mail content or registration data unless we are required to do so:\n
          \n
          to enforce these Terms and Conditions,\n
          \n
          by law,\n
          \n
          to defend ourselves in any legal action,\n
          \n
          to protect our property.\n
          \n
          Since your password is essential for protecting your privacy, we encourage you to NOT share it with anyone and change it frequently. Additionally, you agree to respect the privacy and confidentiality of others.\n
          \n
          **AGE RESTRICTIONS**  \n
          We offer services only to people who are 18+. Our services are not targeted to, intended to be consumed by or designed to entice individuals under the age of 18. If we learn that we have collected the personal information of a child under the age of 18, we will take steps to delete that information as soon as possible.\n
          \n
          If you know of or have reason to believe that anyone under the age of 18 has provided us with any personal data, please contact us.\n
          \n
          **LOG FILES**  \n
          We use IP addresses to analyze trends, administer our site and servers, track access, and gather broad demographic information for aggregate use. IP addresses are not linked to personally identifiable information. It is possible that personal information about a customer may be included in the log files due to the normal functions of IP addresses and Web browsing.\n
          \n
          **COOKIES**  \n
          We use different cookies on our website to make it as useful to you as possible. Cookies are small text files that we put on your computer or mobile device to tell us what you want to use on our site but they do not tell us who you are.\n
          \n
          [Here](http://www.aboutcookies.org/) you can learn more about cookies and how to [control](http://www.aboutcookies.org/how-to-control-cookies/) or [delete](http://www.aboutcookies.org/how-to-delete-cookies/) them.\n
          \n
          Here are the cookies that we use on our site:\n
          \n
          _Essential cookies_  \n
          We use a cookie to remember your login for you and what you’ve put in the shop cart. Also, we set a cookie to help you choose a preferred font size for using the site. These cookies we consider essential for the operation of our website.\n
          \n
          _External web services_  \n
          We use an external live chat service (using cookies to remember your session name) to deliver real-time support to you should you want to.\n
          \n
          _Analytics_  \n
          We use Google Analytics and Facebook cookies to monitor visitor activity on our website. No personally identifying data is included in this type of reporting. We do not share information about this analysis with any third parties.\n
          \n
          Visitors can [opt out of Google's advertising tracking cookie](https://policies.google.com/technologies/ads) or [install a browser plugin](https://tools.google.com/dlpage/gaoptout?hl=en) to opt out of all Google Analytics tracking software. More information about Facebook's analytics cookie is available [here](https://www.facebook.com/policies/cookies/?utm_referrer=https://www.cloudflare.com/privacypolicy/).\n
          \n
          We assume you are happy with this usage of cookies on this website. If you are not happy, then you should either not use this site, or delete the cookies (you can check out how to do that according to your browser [here](http://www.aboutcookies.org/how-to-delete-cookies/)), or browse the site using your browser’s anonymous usage setting (named “Incognito” in Chrome, “InPrivate” for Internet Explorer, "Private Browsing" in Firefox and Safari etc.).\n
          \n
          We currently do not alter our practices when we receive a "Do Not Track" signal from a visitor's browser.\n
          \n
          Please remember that if you choose to delete the cookies or use the browser anonymously, you may find that certain sections of this website do not work properly.\n
          \n
          **YOUR RIGHTS UNDER THE GENERAL DATA PROTECTION REGULATION (GDPR)**\n
          \n
          If you are a resident of the European Economic Area (EEA), you have the following data protection rights:\n
          \n
          _Managing Your Information_  \n
          You may access and update some of your information through the "Change Contact Details" section in the WHCP. If you have chosen to connect your account to a third-party application like Facebook, Google or Twitter, you can change your settings and remove permission for the app from the "Linked Social Accounts" section in the WHCP. You are responsible for keeping your personal information up to date.\n
          \n
          _Rectification of Inaccurate or Incomplete Information_  \n
          You have the right to ask us to correct any inaccurate or incomplete personal information concerning you if you cannot update it yourself from within your account.\n
          \n
          _Data Access and Portability_  \n
          In some jurisdictions, the applicable law may entitle you to request copies of your personal information held by us. You may also be entitled to request copies of personal information that you have provided to us in a structured, commonly used, and machine-readable format and/or request us to transmit this information to another service provider (where technically feasible).\n
          \n
          _Opt-out of marketing communications_  \n
          You have the right to opt-out of marketing communications we send you at any time. You can exercise this right by clicking on the "unsubscribe" or "opt-out" link in the marketing emails we send you.\n
          \n
          _Data Retention and Erasure_  \n
          We generally retain your personal information for as long as is necessary for the performance of the contract between you and us and to comply with our legal obligations. If you no longer want us to use your information to provide the contracted services to you, you can request that we erase your personal information and close your account. Please note that if you request the erasure of your personal information:\n
          \n
          We may retain some of your personal information so as to detect and prevent fraud and enhance safety. For example, if we suspend an account for security reasons, we may retain certain information from that account to prevent that customer from opening a new account in the future.\n
          \n
          We may retain and use your personal information to the extent necessary to comply with our legal obligations. For example, we may keep some of your information for tax, legal reporting and auditing purposes.\n
          \n
          Because we maintain our platform to protect it from accidental or malicious loss and destruction, residual copies of your personal information may not be removed from our backup systems for a limited period of time.\n
          \n
          In cases where fraudulent or otherwise illegal activity has been deemed to have occurred as determined by law enforcement or management, the information may remain in our database indefinitely in order to help facilitate the prevention of repeated abuse in the future from the offending party.\n
          \n
          _Withdrawing Consent and Restriction of Processing_  \n
          If you have provided your consent to the processing of your personal information, you may withdraw it at any time by sending us a communication specifying which consent you are withdrawing. Please note that the withdrawal of your consent does not affect the lawfulness of any processing activities based on such consent before its withdrawal. Additionally, in some jurisdictions, applicable law may give you the right to limit the ways in which we use your personal information, in particular where (i) you contest the accuracy of your personal information; (ii) the processing is unlawful and you oppose the erasure of your personal information; (iii) we no longer need your personal information for the purposes of the processing, but you require the information for the establishment, exercise or defence of legal claims; or (iv) you have objected to the processing and pending the verification whether the Service Provider's legitimate grounds override your own.\n
          \n
          _Objection to Processing_  \n
          In some jurisdictions, applicable law may entitle you to require us not to process your personal information for certain specific purposes (including profiling) where such processing is based on legitimate interest. If you object to such processing, we will no longer process your personal information for these purposes unless we can demonstrate compelling legitimate grounds for such processing or such processing is required for the establishment, exercise or defence of legal claims.\n
          \n
          By default, customers do receive any system updates, such as the newsletters, invoices and service email notifications. Customers cannot opt out of possibly receiving important system notifications, since the latter are deemed necessary for the performance of our contractual obligations to you.\n
          \n
          _Lodging Complaints_  \n
          If you want to make a complaint about the way we are processing your data, you can contact us using the contact details below.\n
          \n
          You have the right to complain to a data protection authority about our collection and use of your personal information. For more information, please contact your local data protection authority.\n
          \n
          \---\n
          \n
          We respond to all requests we receive from individuals wishing to exercise their data protection rights in accordance with applicable data protection laws.\n
          \n
          **INTERNATIONAL TRANSFERS OF INFORMATION WE COLLECT**  \n
          We collect information globally and primarily store that information in the United States. We transfer, process and store your information outside of your country of residence. Whenever we transfer your information, we take steps to protect it.\n
          \n
          To facilitate our global operations, we transfer information to the United States and allow access to that information from countries in which we and associated companies have operations for the purposes described in this policy. These countries may not have equivalent privacy and data protection laws, certainly not equivalent to the laws of many of the countries where our customers and users are based. When we share information about you, we make use of Standard Contractual Clauses (SCCs) for data transfers between EU and non-EU countries, which have been approved by the European Commission.\n
          \n
          A copy of your personal data will also be stored in the data center you have selected when signing up for our services. This is done so that the Service Provider can deliver the contracted service in the location specified by the customer.\n
          \n
          **COMPLIANCE WITH LAWS AND LAW ENFORCEMENT**  \n
          The Service Provider cooperates with government and law enforcement officials to enforce and comply with the law. We will disclose any information about Users upon valid request by government or law officials as we, in our sole discretion, believe necessary or appropriate to respond to claims and legal process (including without limitation subpoenas), to protect your property and rights, or the property and rights of a third party, to protect the safety of the public or any person, or stop activity we consider illegal or unethical.\n
          \n
          **CHANGES TO PRIVACY POLICY**  \n
          Any changes to our Privacy Policy will be placed here and will supersede this version of our Policy. We will take reasonable steps to draw your attention to any changes in our Policy. However, to be on the safe side, we suggest that you read this document each time you use the website to ensure that it still meets with your approval.\n
          \n
          **CONTACT US**  \n
          If you have any questions about our Privacy Policy, or if you want to know what information we have collected about you, please use our Contact Us form.\n
          \n
          Postal Address:\n
          \n
          LiquidNet US LLC  \n
          6750 North Andrews Ave  \n
          Suite 200  \n
          Fort Lauderdale, FL 33309  \n
          United States of America\n
          \n
          LiquidNet Ltd.  \n
          13 Craigleith  \n
          7 Kersfield Road  \n
          Putney, London SW15 3HN  \n
          United Kingdom
          """
        "tos" => """
          An Acceptable Use Policy (AUP) is a set of rules and conditions compiled by a network, system, or a website owner. These rules explicitly define and restrict the ways in which the respective network, system or website may be used.\n
          \n
          The **AUP of the Service Provider** aims to clearly outline the purposes for which our customers CANNOT utilize our hosting services and position data on our network servers.\n
          \n
          This Acceptable Use Policy (AUP) is an integral part of the [Web Hosting Terms of Service](https://www.philwebdev.com/terms-and-conditions-2/web-hosting-terms-of-service-3/) which each customer agrees to abide by when signing up for an account with our web hosting company. Any violation of this AUP will be deemed a violation of our Web Hosting Terms of Service.\n
          \n
          We, at our own discretion, shall determine whether an act constitutes a breach of this AUP terms and misuse of our services. We reserve our right to be the sole arbiter in determining the sufficiency of the presented evidences. We will respond accordingly, and/or immediately terminate the provision of the services, shall we receive the report, and/or have sufficient proof, of any prohibited conduct outlined in this AUP, or any other activity threatening the security of our hosting environment and/or our network of hosting servers.\n
          \n
          In order to protect our company’s reputation and responsibilities, and guarantee state-of-the-art and reliable hosting services to all our customers, as well as privacy and security for all users, we – the Service Provider - hereby outline the following AUP rules and conditions to come into force for each customer signing up for a web hosting account with our company:\n
          \n
          1\. [System Abuse](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#SYSTEM_ABUSE)\n
          \n
          2\. [Spam and Spamvertizing](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#SPAM_AND_SPAMVERTIZING)\n
          \n
          3\. [Inappropriate or Unlawful Content](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#INAPPROPRIATE_OR_UNLAWFUL_CONTENT_)\n
          \n
          4\. [Copyrights](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#COPYRIGHTS)\n
          \n
          5\. [Corrective Actions](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#CORRECTIVE_ACTIONS)\n
          \n
          6\. [Reporting Violtaions](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#REPORTING_VIOLATIONS)\n
          \n
          7\. [Revisions](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#REVISIONS)\n
          \n
          **1\. SYSTEM ABUSE**\n
          \n
          Any customer in violation of our system or network security is subject to criminal and civil liability, as well as immediate account termination. Examples include, but are not limited to the following:\n
          \n
          Unauthorized access, use, probe, or scan of our system’s security, authentication measures, data, or traffic. Interference with the service to any user, host or network including, but not limited to: e-mail bombing, flooding, deliberate attempts to overload the system and broadcast attacks, forging of any TCP/IP packet header or any part of the header information in an e-mail or newsgroup posting.\n
          \n
          Any attempt at doing harm to a server or a customer of our web hosting services:\n
          \n
          the Service Provider will immediately and resolutely react to any attempt at misuse of an Internet account or computer, or any attempt to gain access to an Internet account or computer by a Service Provider's customer unauthorized by the account/computer owner. Such attempts include, but are not limited to the following: 'Internet scamming' (tricking other people into releasing their passwords, etc.), password robbery, security hole scanning, running proxy - proxy lists and any kind of proxy scripts (including, but not limited to PHP proxy and mph proxy), introducing of any computer programs (viruses, Trojan horses, trap doors, back doors, worms, time bombs, packet bombs, cancelbots, etc.) that are intended to negatively interfere with, intercept, irreversibly damage or take hold of any system, data or personal information. It WILL NOT matter whether the attacked account or computer belongs or not to the Service Provider's services. The fraud will be subject to actions based on the very nature of the attack and those may represent a warning, an account suspension or cancellation, and/or civil or criminal legal actions.\n
          \n
          Background operations/programs on servers:\n
          \n
          ‘Background process’ is a program that runs in the background of the operating system. What is specific for a background process is that, once started, it runs simultaneously with other foreground processes. This means that, the shell executing the background operation does not wait for it to finish or terminate, as it does with foreground processes, but is free to start executing more operations along with the background one. Typical background processes are ircd, irc bot, bnc, and many others.\n
          \n
          Background processes are not permitted on any of our shared hosting servers, as they usually lead to CPU overload and can be used for malicious and/or illegal actions. As our primary task is to provide highest quality web hosting service to all our customers, we cannot permit any background processes to be executed and threaten the performance of our server network. Our shared hosting system does not allow a big multitude of users to simultaneously use the system memory and processing time of our servers.\n
          \n
          Excessive use of system resources:\n
          \n
          In order to ensure higher server performance and quality of hosting service all shared hosting plans are subject to certain resource limitations concerning, but not limited to, server CPU usage, Memory usage, disk-space and traffic. If a hosting account exceeds the allowed amount of system resources the account owner will be immediately notified to take actions in order to reduce the usage. If such action is not instantly taken by the owner the account will be suspended. If an excessive CPU usage is detected the account owner will be suggested to place an order for a CPU usage upgrade or upgrade to a plan which allows higher CPU usage.\n
          \n
          If any hosting account is found to be causing degradation of the server and/or our hosting network’s performance, regardless of the reason, the account will be subject to suspension or immediate removal, depending on the situation. The Service Provider will be the sole arbiter in determining whether a given account is excessively using the server resources and/or causing a server degradation.\n
          \n
          **2\. SPAM AND SPAMVERTIZING**\n
          \n
          SPAMMING IS PROHIBITED. Users MAY NOT utilize our web hosting services to transmit, distribute or deliver any unsolicited bulk or commercial messages over the Internet (an action known as "spam" or "spamming").\n
          \n
          Spamming is a violation of ethic norms and will be interpreted as an infringement. the Service Provider will not tolerate the sending of unsolicited bulk or commercial messages through our services, as well as through another service that is mentioning, in some way, our customer’s domain name or implies the utilization of our network or our e-mail services for sending the unsolicited bulk or messages.\n
          \n
          SPAMVERTISING IS PROHIBITED. 'Spamvertizing’ refers to the practice of sending unsolicited spam messages for the purpose of advertising a particular website.\n
          \n
          If such e-mails are relayed through 3rd party (e-mail spoofing) and/or are promoting a domain hosted on our servers, this will lead to immediate account suspension unless an evidence of legitimacy for non-involvement of the domain owner in the particular illegal action is provided.\n
          \n
          ’E-mail spoofing’ is a fraudulent e-mail activity in which the sender’s (3td party) e-mail address and other parts of the e-mail header are changed so as to appear that the e-mail has been sent from a different source (e-mail address owner/server).\n
          \n
          'Unsolicited message’ is a message that is sent against the privacy policy of a newsgroup, or is sent to a recipient without their explicit permission. We, at our sole discretion, shall determine whether any of the messages you are sending is spam or spamvertizing. For your information, spamming generally includes, but is not limited to the following\n
          \n
          Sending of unsolicited messages in bulk, or sending of unsolicited e-mails, which provoke complaints from recipients;\n
          \n
          Sending of junk mail;\n
          \n
          Use of distribution lists that include people who have not given prior explicit permission to be involved in such a distribution process;\n
          \n
          Posting commercial ads to USENET newsgroups that do not permit it;\n
          \n
          Posting articles containing binary encoded data to non-binary newsgroups;\n
          \n
          Excessive and repeated posting of off-topic messages to newsgroups;\n
          \n
          Excessive and repeated cross-posting;\n
          \n
          E-mail harassment of another Internet Customer or Customers, including but not limited to, transmitting of any threatening, libellous or obscene material, or material of any nature that may be deemed offensive;\n
          \n
          E-mailing of age-inappropriate communications or content to anyone under the age of 18.\n
          \n
          **3\. INAPPROPRIATE OR UNLAWFUL CONTENT**\n
          \n
          CONTENT published or transmitted via the Service Provider’s hosting services includes website content, email content, forum/blog postings, chat content, and/or any other type of content hosted on our servers, published online or transmitted through our network’s services.\n
          \n
          The user of our services is NOT permitted to post online content or have links to content that:\n
          \n
          is defamatory, abusive or obscene, violates a person’s reputation/privacy, is reasonably deemed offensive by the web community, is anti-religious or anti-human rights, or contains any type of threatening or hate speech, encourages harassment or physical harm to any group or individual, or is otherwise malicious/fraudulent and may result in complaints/liabilities/or retaliation against the Service Provider by offended viewers;\n
          \n
          promotes or encourages illegal activities (e.g. illegal drugs, illegal gambling, arms trafficking, etc.) or violates any applicable law, statute, ordinance or regulation, including but not limited to the laws and regulations governing export control, unfair competition, false advertising, consumer protection, etc.\n
          \n
          represents pornography – any type of pornographic/adult material, including child pornography, or advertisements of pornographic websites;\n
          \n
          represents infringement on copyright, patents, trademarks, trade secrets, or third party's intellectual property or proprietary rights, including pirated computer programs, hacking/phreaking software, warez or any type of software/content (including also ROMs, ROM Emulators, media files – MP3, AVI, .RM, etc., torrent files, and others) that is copyrighted, is NOT uploaded in compliance with its license agreement or is NOT freely available for distribution.\n
          \n
          **4\. COPYRIGHTS**\n
          \n
          Copyrighted material must not be placed on customers' accounts without the explicit permission of the copyright owner or a person explicitly authorized to give such permission by the copyright owner. Upon receipt of a claim for copyright infringement, or a notice of such violation, we will immediately run full investigation and, upon confirmation, will promptly remove the infringing material from the Services. Further procedures (in accordance with our stated below corrective measures) will be carried out if necessary. We will assume no liability to any Customer of the Services for the removal of any such material.\n
          \n
          **5\. CORRECTIVE ACTIONS**\n
          \n
          We reserve our right to be the sole arbiter in determining the seriousness of each infringement and to immediately take corrective actions.\n
          \n
          We will disable the customer's account if we deem necessary, at our sole discretion. Upon closing of the customer’s account we will send an e-mail notification to the customer, stating the reason for the termination and quoting our terms’ chapter that has been violated. The customer will be given an opportunity to respond and take measures to remedy the situation should he/she consider him/herself abused by a third party. Upon fulfilling of this obligation, we may re-activate the customer’s account, if we find, at our own discretion, sufficient evidence pro customer’s side.\n
          \n
          Closed accounts due to repeated violations will not be re-activated. A backup may be requested, however it will be subject to certain penalty fees imposed according to the breach of this AUP terms. The final penalty fee will be determined by the type and frequency of the violations.\n
          \n
          **6\. REPORTING VIOLATIONS**\n
          \n
          If you need to report a violation of this AUP agreement or believe that you or your system has been subject to attack originating from our web hosting system, please contact us immediately. Our professional team will investigate the situation and provide you with full assistance.\n
          \n
          **7\. REVISIONS**\n
          \n
          We reserve our right to change this AUP at any time, without prior notice. We encourage our users to periodically review this Acceptable Use Policy and our Web Hosting Terms of Service.
          """
      ]
      "logo_url" => "https://www.philwebdev.com/billing/logod.svg"
      "languages" => array:2 [
        0 => array:3 [
          "locale" => "en_US"
          "title" => "English(en_US)"
          "name" => "English"
        ]
        1 => array:3 [
          "locale" => "hr_HR"
          "title" => "hr_HR(hr_HR)"
          "name" => "hr_HR"
        ]
      ]
    ]
    
  3. array:13 [
      "meta_title" => array:2 [
        0 => __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 {#178}
        1 => "block_meta_title"
      ]
      "meta_description" => array:2 [
        0 => __TwigTemplate_1218b162b0557026e91ff8225d515b58 {#181}
        1 => "block_meta_description"
      ]
      "opengraph" => array:2 [
        0 => __TwigTemplate_1218b162b0557026e91ff8225d515b58 {#181}
        1 => "block_opengraph"
      ]
      "head" => array:2 [
        0 => __TwigTemplate_1218b162b0557026e91ff8225d515b58 {#181}
        1 => "block_head"
      ]
      "js" => array:2 [
        0 => __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 {#178}
        1 => "block_js"
      ]
      "body_class" => array:2 [
        0 => __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 {#178}
        1 => "block_body_class"
      ]
      "body" => array:2 [
        0 => __TwigTemplate_1218b162b0557026e91ff8225d515b58 {#181}
        1 => "block_body"
      ]
      "content_before" => array:2 [
        0 => __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 {#178}
        1 => "block_content_before"
      ]
      "breadcrumbs" => array:2 [
        0 => __TwigTemplate_1218b162b0557026e91ff8225d515b58 {#181}
        1 => "block_breadcrumbs"
      ]
      "breadcrumb" => array:2 [
        0 => __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 {#178}
        1 => "block_breadcrumb"
      ]
      "content" => array:2 [
        0 => __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 {#178}
        1 => "block_content"
      ]
      "content_after" => array:2 [
        0 => __TwigTemplate_1218b162b0557026e91ff8225d515b58 {#181}
        1 => "block_content_after"
      ]
      "sidebar2" => array:2 [
        0 => __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 {#178}
        1 => "block_sidebar2"
      ]
    ]
    
/home/philwebd/public_html/billing/vendor/twig/twig/src/Template.php
    {
        if ($useBlocks && isset($blocks[$name])) {
            $template = $blocks[$name][0];
            $block = $blocks[$name][1];
        } elseif (isset($this->blocks[$name])) {
            $template = $this->blocks[$name][0];
            $block = $this->blocks[$name][1];
        } else {
            $template = null;
            $block = null;
        }
 
        // avoid RCEs when sandbox is enabled
        if (null !== $template && !$template instanceof self) {
            throw new \LogicException('A block must be a method on a \Twig\Template instance.');
        }
 
        if (null !== $template) {
            try {
                $template->$block($context, $blocks);
            } catch (Error $e) {
                if (!$e->getSourceContext()) {
                    $e->setSourceContext($template->getSourceContext());
                }
 
                // this is mostly useful for \Twig\Error\LoaderError exceptions
                // see \Twig\Error\LoaderError
                if (-1 === $e->getTemplateLine()) {
                    $e->guess();
                }
 
                throw $e;
            } catch (\Throwable $e) {
                $e = new RuntimeError(sprintf('An exception has been thrown during the rendering of a template ("%s").', $e->getMessage()), -1, $template->getSourceContext(), $e);
                $e->guess();
 
                throw $e;
            }
        } elseif (false !== $parent = $this->getParent($context)) {
            $parent->displayBlock($name, $context, array_merge($this->blocks, $blocks), false, $templateContext ?? $this);
Arguments
  1. array:11 [
      "CSRFToken" => "6921348dc90961df5535dfa8a24e50f2"
      "request" => array:2 [
        "_url" => "/order"
        "product" => "7"
      ]
      "guest" => Api_Handler {#175}
      "FOSSBillingVersion" => "0.6.20"
      "current_theme" => "huraga"
      "settings" => array:57 [
        "CSRFToken" => "3f10ff5d59184687b9efad79ebd8597e"
        "color_scheme" => "green"
        "show_page_header" => "1"
        "show_company_logo" => "1"
        "show_company_name" => "0"
        "show_client_details" => "1"
        "sidebar_balance_enabled" => "1"
        "top_menu_dashboard" => "1"
        "top_menu_profile" => "1"
        "top_menu_signout" => "1"
        "login_page_show_logo" => "1"
        "login_page_logo_url" => "/"
        "show_password_reset_link" => "1"
        "show_signup_link" => "0"
        "login_page_show_remember_me" => "1"
        "show_breadcrumb" => "1"
        "hide_dashboard_breadcrumb" => "1"
        "require_login" => "1"
        "showcase_enabled" => "0"
        "showcase_size" => "3"
        "showcase_text" => "Showcase text"
        "showcase_button_title" => "Showcase button title"
        "showcase_button_url" => "Showcase link URL"
        "side_menu_dashboard" => "1"
        "side_menu_order" => "1"
        "side_menu_support" => "1"
        "side_menu_services" => "1"
        "side_menu_invoices" => "1"
        "side_menu_emails" => "1"
        "side_menu_payments" => "1"
        "side_menu_news" => "1"
        "side_menu_kb" => "1"
        "sidebar_note_enabled" => "0"
        "sidebar_note_title" => "Note title"
        "sidebar_note_content" => "Note content"
        "meta_title" => ""
        "meta_description" => "Members area"
        "meta_keywords" => "members area"
        "meta_robots" => "noindex, nofollow"
        "meta_author" => "PhilWebDev"
        "footer_enabled" => "1"
        "footer_to_top_enabled" => "1"
        "footer_signature" => ""
        "footer_link_1_enabled" => "on"
        "footer_link_1_title" => "About us"
        "footer_link_1_page" => "about-us"
        "footer_link_2_enabled" => "on"
        "footer_link_2_title" => "Terms and conditions"
        "footer_link_2_page" => "tos"
        "footer_link_3_enabled" => "on"
        "footer_link_3_title" => "Privacy policy"
        "footer_link_3_page" => "privacy-policy"
        "footer_link_4_title" => ""
        "footer_link_4_page" => ""
        "footer_link_5_title" => ""
        "footer_link_5_page" => ""
        "inject_javascript" => ""
      ]
      "loader_nr" => "8"
      "loader_url" => "img/assets/loaders/loader8.gif"
      "company" => array:11 [
        "www" => "https://billing.philwebdev.com/"
        "name" => "XWDV Information Technology Solutions"
        "signature" => """
          Regards,\n
          \n
          XWDV Information Technology Solutions\n
          https://www.philwebdev.com\n
          \n
          \n
          """
        "logo_url" => "https://www.philwebdev.com/billing/logod.svg"
        "logo_url_dark" => "https://www.philwebdev.com/billing/logow.svg"
        "favicon_url" => "https://www.philwebdev.com/billing/themes/huraga/assets/favicon.ico"
        "display_bank_info" => "0"
        "bank_info_pagebottom" => null
        "note" => ""
        "privacy_policy" => """
          This Privacy Policy describes the policies and procedures of PhilWebDev Domain and Business Hosting Solution, in association with - LiquidNet US LLC, a US company headquartered in Fort Lauderdale, Florida, and LiquidNet Ltd., a UK company headquartered in London, UK, on the collection, use and disclosure of your information. Legal details about the two companies can be found in the 'Contact Us' section of this document.\n
          \n
          For the sake of brevity, PhilWebDev Domain and Business Hosting Solution, LiquidNet US LLC and LiquidNet Ltd. will be referred to as 'We', 'Us', 'Our' and 'Service Provider' in this document.\n
          \n
          This Privacy Policy does not apply to information our customers may process when using our services.\n
          \n
          \---\n
          \n
          Privacy and security are of utmost importance to the Service Provider and we strive to ensure that our technical and organizational measures in place respect your data protection rights.\n
          \n
          **COLLECTION OF PERSONAL DATA**  \n
          "Personal data" refers to any information relating to an identifiable individual or his or her personal identity.\n
          \n
          Personal data is collected on our website by LiquidNet US LLC., a US company headquartered in Fort Lauderdale, Florida.\n
          \n
          The personally identifiable information that LiquidNet US LLC may collect from you when registering for an account includes: first and last name, postal address, phone number, email and IP address.\n
          \n
          If you want to use your Social Media account as a means to log in to your hosting account, you will also have to provide your Social Media ID.\n
          \n
          Your information will be needed for the following purposes:\n
          \n
          *   provision of our services to you;\n
          *   prevention of fraudulent transactions;\n
          *   billing/invoicing operations;\n
          *   provision of a sales/technical support service;\n
          *   maintenance of your account with us;\n
          *   dispute resolution cases;\n
          *   enforcement of our Terms of Service, or other legal rights, or as may be required by applicable laws and regulations or requested by any judicial process or governmental agency;\n
          *   collection of aggregate statistics about use of our services;\n
          \n
          Much of the data collected is aggregated or statistical data about how individuals use our Services, and is not linked to any personal data, but to the extent it is itself personal data, or is linked or linkable to personal data, we treat it accordingly.\n
          \n
          The Service Provider will NOT send you any unsolicited information, including emails, except as mentioned hereby.\n
          \n
          New customers will receive a welcome email containing information about the features provided by the Service, as well as WHCP (Web Hosting Control Panel) and FTP login details.\n
          \n
          The Service Provider may also send system notifications upon need, related to any upgrade, maintenance or other service issues concerning your hosting account.\n
          \n
          If you contact us directly, we may receive additional information about you such as your name, email address, phone number, the contents of the message and/or attachments you may send us, and any other information you may choose to provide. We may also receive a confirmation when you open an email from us.\n
          \n
          The Service Provider will keep your personally identifiable information private and will NOT share it with any unauthorized third parties.\n
          \n
          When you use our services, we may collect information about your engagement with and utilization of our services, such as processor and memory usage, storage capacity, navigation of our services, and system-level metrics. We use this data to operate the services, maintain and improve the performance and utilization of the services, develop new features, protect the security and safety of our services and our customers, and provide customer support. We also use this data to develop aggregate analysis and business intelligence that enable us to operate, protect, make informed decisions, and report on the performance of our business.\n
          \n
          **LEGAL BASIS FOR PROCESSING OF PERSONAL DATA**  \n
          We collect personal information from you only when:\n
          \n
          you give your consent for us to so,\n
          \n
          we need your personal information to perform a contract with you (e.g. to deliver the services you have requested), or,\n
          \n
          the processing is in our legitimate interests and not overridden by your rights;\n
          \n
          We have a legitimate interest in operating our services and communicating with you as necessary to provide these services, for example when responding to your queries, improving our platform, undertaking marketing, or for the purposes of detecting or preventing illegal activities.\n
          \n
          Please note that in most cases, if you do not submit the requested information, the Service Provider will not be able to provide the requested service to you.\n
          \n
          In some cases, we may also have a legal obligation to collect personal information from you, or may otherwise need that information to protect your vital interests or those of some other person's.\n
          \n
          If we ask you to provide personal information to comply with a legal requirement or to perform a contract with you, we will make this clear at the relevant time and advise you whether the provision of your personal information is mandatory or not (as well as of the possible consequences if you do not provide your personal information).\n
          \n
          **ACCESS TO YOUR PERSONAL DATA**  \n
          You may access and update your personal Information at any time from your Web Hosting Control Panel - > My Account - > Change Contact Details section.\n
          \n
          **SECURITY OF YOUR PERSONAL DATA**  \n
          The Service Provider is committed to protecting the security of customer collected personal information. To do so, we use technical security measures to prevent the loss, misuse, alternation or unauthorized disclosure of information under our control. We use security measures including and not limited to: physical, electronic and managerial procedures to safeguard and secure the information we collect online. However, please keep in mind that the Internet cannot be guaranteed to be 100% secure.\n
          \n
          If the Service Provider learns of a security system breach, we may attempt to notify you and send you any available protective information to the email address that you have provided to us or by posting a notice in your WHCP.\n
          \n
          **SHARING YOUR PERSONAL DATA WITH THIRD PARTIES**  \n
          We may share the information we collect in various ways, including the following:\n
          \n
          _Service Providers_  \n
          We may share information with third-party service providers that provide services on our behalf, such as helping to provide our services and to provide you with information relevant to you such as product announcements, service upgrades, special offers, or other information.\n
          \n
          _As Required By Law and Similar Disclosures_  \n
          We may also share information to (i) satisfy any applicable law, regulation, legal process, or governmental request; (ii) enforce this Privacy Policy and our Terms of Service, including investigation of potential violations hereof; (iii) detect, prevent, or otherwise address fraud, security, or technical issues; (iv) respond to your requests; or (v) protect our rights, property or safety, our users and the public. This includes exchanging information with other companies and organizations for fraud protection and spam/malware prevention.\n
          \n
          **THIRD-PARTY SERVICES**  \n
          You may access other third-party services through our services, for example by clicking on links to those third-party services from within our services. We are not responsible for the privacy policies and/or practices of these third-party services, and we encourage you to carefully review their privacy policies.\n
          \n
          **PRIVACY OF YOUR PAYMENT DETAILS**  \n
          We use third-party payment processing companies who collect and store financial information, such as your payment method (valid credit card number, type, expiration date or other financial information), and their use and storage of that information is governed by the payment processors' applicable terms of service and privacy policy. Collected billing information is used for the purposes of processing payments and fraud detection.\n
          \n
          We do not store your financial account information on our systems; however, we have access to, and may retain, subscriber information through our third-party payment processor.\n
          \n
          All PayPal transactions are subject to the [PayPal Privacy Policy](https://www.paypal.com/en/webapps/mpp/ua/privacy-full).\n
          \n
          **PRIVACY OF YOUR ACCOUNT**  \n
          We consider your registration data and the content of all your messages private and confidential. The header of the messages that you send will contain your name (e-mail address) and Internet Protocol (IP) address. We will not intentionally monitor or disclose any of your e-mail content or registration data unless we are required to do so:\n
          \n
          to enforce these Terms and Conditions,\n
          \n
          by law,\n
          \n
          to defend ourselves in any legal action,\n
          \n
          to protect our property.\n
          \n
          Since your password is essential for protecting your privacy, we encourage you to NOT share it with anyone and change it frequently. Additionally, you agree to respect the privacy and confidentiality of others.\n
          \n
          **AGE RESTRICTIONS**  \n
          We offer services only to people who are 18+. Our services are not targeted to, intended to be consumed by or designed to entice individuals under the age of 18. If we learn that we have collected the personal information of a child under the age of 18, we will take steps to delete that information as soon as possible.\n
          \n
          If you know of or have reason to believe that anyone under the age of 18 has provided us with any personal data, please contact us.\n
          \n
          **LOG FILES**  \n
          We use IP addresses to analyze trends, administer our site and servers, track access, and gather broad demographic information for aggregate use. IP addresses are not linked to personally identifiable information. It is possible that personal information about a customer may be included in the log files due to the normal functions of IP addresses and Web browsing.\n
          \n
          **COOKIES**  \n
          We use different cookies on our website to make it as useful to you as possible. Cookies are small text files that we put on your computer or mobile device to tell us what you want to use on our site but they do not tell us who you are.\n
          \n
          [Here](http://www.aboutcookies.org/) you can learn more about cookies and how to [control](http://www.aboutcookies.org/how-to-control-cookies/) or [delete](http://www.aboutcookies.org/how-to-delete-cookies/) them.\n
          \n
          Here are the cookies that we use on our site:\n
          \n
          _Essential cookies_  \n
          We use a cookie to remember your login for you and what you’ve put in the shop cart. Also, we set a cookie to help you choose a preferred font size for using the site. These cookies we consider essential for the operation of our website.\n
          \n
          _External web services_  \n
          We use an external live chat service (using cookies to remember your session name) to deliver real-time support to you should you want to.\n
          \n
          _Analytics_  \n
          We use Google Analytics and Facebook cookies to monitor visitor activity on our website. No personally identifying data is included in this type of reporting. We do not share information about this analysis with any third parties.\n
          \n
          Visitors can [opt out of Google's advertising tracking cookie](https://policies.google.com/technologies/ads) or [install a browser plugin](https://tools.google.com/dlpage/gaoptout?hl=en) to opt out of all Google Analytics tracking software. More information about Facebook's analytics cookie is available [here](https://www.facebook.com/policies/cookies/?utm_referrer=https://www.cloudflare.com/privacypolicy/).\n
          \n
          We assume you are happy with this usage of cookies on this website. If you are not happy, then you should either not use this site, or delete the cookies (you can check out how to do that according to your browser [here](http://www.aboutcookies.org/how-to-delete-cookies/)), or browse the site using your browser’s anonymous usage setting (named “Incognito” in Chrome, “InPrivate” for Internet Explorer, "Private Browsing" in Firefox and Safari etc.).\n
          \n
          We currently do not alter our practices when we receive a "Do Not Track" signal from a visitor's browser.\n
          \n
          Please remember that if you choose to delete the cookies or use the browser anonymously, you may find that certain sections of this website do not work properly.\n
          \n
          **YOUR RIGHTS UNDER THE GENERAL DATA PROTECTION REGULATION (GDPR)**\n
          \n
          If you are a resident of the European Economic Area (EEA), you have the following data protection rights:\n
          \n
          _Managing Your Information_  \n
          You may access and update some of your information through the "Change Contact Details" section in the WHCP. If you have chosen to connect your account to a third-party application like Facebook, Google or Twitter, you can change your settings and remove permission for the app from the "Linked Social Accounts" section in the WHCP. You are responsible for keeping your personal information up to date.\n
          \n
          _Rectification of Inaccurate or Incomplete Information_  \n
          You have the right to ask us to correct any inaccurate or incomplete personal information concerning you if you cannot update it yourself from within your account.\n
          \n
          _Data Access and Portability_  \n
          In some jurisdictions, the applicable law may entitle you to request copies of your personal information held by us. You may also be entitled to request copies of personal information that you have provided to us in a structured, commonly used, and machine-readable format and/or request us to transmit this information to another service provider (where technically feasible).\n
          \n
          _Opt-out of marketing communications_  \n
          You have the right to opt-out of marketing communications we send you at any time. You can exercise this right by clicking on the "unsubscribe" or "opt-out" link in the marketing emails we send you.\n
          \n
          _Data Retention and Erasure_  \n
          We generally retain your personal information for as long as is necessary for the performance of the contract between you and us and to comply with our legal obligations. If you no longer want us to use your information to provide the contracted services to you, you can request that we erase your personal information and close your account. Please note that if you request the erasure of your personal information:\n
          \n
          We may retain some of your personal information so as to detect and prevent fraud and enhance safety. For example, if we suspend an account for security reasons, we may retain certain information from that account to prevent that customer from opening a new account in the future.\n
          \n
          We may retain and use your personal information to the extent necessary to comply with our legal obligations. For example, we may keep some of your information for tax, legal reporting and auditing purposes.\n
          \n
          Because we maintain our platform to protect it from accidental or malicious loss and destruction, residual copies of your personal information may not be removed from our backup systems for a limited period of time.\n
          \n
          In cases where fraudulent or otherwise illegal activity has been deemed to have occurred as determined by law enforcement or management, the information may remain in our database indefinitely in order to help facilitate the prevention of repeated abuse in the future from the offending party.\n
          \n
          _Withdrawing Consent and Restriction of Processing_  \n
          If you have provided your consent to the processing of your personal information, you may withdraw it at any time by sending us a communication specifying which consent you are withdrawing. Please note that the withdrawal of your consent does not affect the lawfulness of any processing activities based on such consent before its withdrawal. Additionally, in some jurisdictions, applicable law may give you the right to limit the ways in which we use your personal information, in particular where (i) you contest the accuracy of your personal information; (ii) the processing is unlawful and you oppose the erasure of your personal information; (iii) we no longer need your personal information for the purposes of the processing, but you require the information for the establishment, exercise or defence of legal claims; or (iv) you have objected to the processing and pending the verification whether the Service Provider's legitimate grounds override your own.\n
          \n
          _Objection to Processing_  \n
          In some jurisdictions, applicable law may entitle you to require us not to process your personal information for certain specific purposes (including profiling) where such processing is based on legitimate interest. If you object to such processing, we will no longer process your personal information for these purposes unless we can demonstrate compelling legitimate grounds for such processing or such processing is required for the establishment, exercise or defence of legal claims.\n
          \n
          By default, customers do receive any system updates, such as the newsletters, invoices and service email notifications. Customers cannot opt out of possibly receiving important system notifications, since the latter are deemed necessary for the performance of our contractual obligations to you.\n
          \n
          _Lodging Complaints_  \n
          If you want to make a complaint about the way we are processing your data, you can contact us using the contact details below.\n
          \n
          You have the right to complain to a data protection authority about our collection and use of your personal information. For more information, please contact your local data protection authority.\n
          \n
          \---\n
          \n
          We respond to all requests we receive from individuals wishing to exercise their data protection rights in accordance with applicable data protection laws.\n
          \n
          **INTERNATIONAL TRANSFERS OF INFORMATION WE COLLECT**  \n
          We collect information globally and primarily store that information in the United States. We transfer, process and store your information outside of your country of residence. Whenever we transfer your information, we take steps to protect it.\n
          \n
          To facilitate our global operations, we transfer information to the United States and allow access to that information from countries in which we and associated companies have operations for the purposes described in this policy. These countries may not have equivalent privacy and data protection laws, certainly not equivalent to the laws of many of the countries where our customers and users are based. When we share information about you, we make use of Standard Contractual Clauses (SCCs) for data transfers between EU and non-EU countries, which have been approved by the European Commission.\n
          \n
          A copy of your personal data will also be stored in the data center you have selected when signing up for our services. This is done so that the Service Provider can deliver the contracted service in the location specified by the customer.\n
          \n
          **COMPLIANCE WITH LAWS AND LAW ENFORCEMENT**  \n
          The Service Provider cooperates with government and law enforcement officials to enforce and comply with the law. We will disclose any information about Users upon valid request by government or law officials as we, in our sole discretion, believe necessary or appropriate to respond to claims and legal process (including without limitation subpoenas), to protect your property and rights, or the property and rights of a third party, to protect the safety of the public or any person, or stop activity we consider illegal or unethical.\n
          \n
          **CHANGES TO PRIVACY POLICY**  \n
          Any changes to our Privacy Policy will be placed here and will supersede this version of our Policy. We will take reasonable steps to draw your attention to any changes in our Policy. However, to be on the safe side, we suggest that you read this document each time you use the website to ensure that it still meets with your approval.\n
          \n
          **CONTACT US**  \n
          If you have any questions about our Privacy Policy, or if you want to know what information we have collected about you, please use our Contact Us form.\n
          \n
          Postal Address:\n
          \n
          LiquidNet US LLC  \n
          6750 North Andrews Ave  \n
          Suite 200  \n
          Fort Lauderdale, FL 33309  \n
          United States of America\n
          \n
          LiquidNet Ltd.  \n
          13 Craigleith  \n
          7 Kersfield Road  \n
          Putney, London SW15 3HN  \n
          United Kingdom
          """
        "tos" => """
          An Acceptable Use Policy (AUP) is a set of rules and conditions compiled by a network, system, or a website owner. These rules explicitly define and restrict the ways in which the respective network, system or website may be used.\n
          \n
          The **AUP of the Service Provider** aims to clearly outline the purposes for which our customers CANNOT utilize our hosting services and position data on our network servers.\n
          \n
          This Acceptable Use Policy (AUP) is an integral part of the [Web Hosting Terms of Service](https://www.philwebdev.com/terms-and-conditions-2/web-hosting-terms-of-service-3/) which each customer agrees to abide by when signing up for an account with our web hosting company. Any violation of this AUP will be deemed a violation of our Web Hosting Terms of Service.\n
          \n
          We, at our own discretion, shall determine whether an act constitutes a breach of this AUP terms and misuse of our services. We reserve our right to be the sole arbiter in determining the sufficiency of the presented evidences. We will respond accordingly, and/or immediately terminate the provision of the services, shall we receive the report, and/or have sufficient proof, of any prohibited conduct outlined in this AUP, or any other activity threatening the security of our hosting environment and/or our network of hosting servers.\n
          \n
          In order to protect our company’s reputation and responsibilities, and guarantee state-of-the-art and reliable hosting services to all our customers, as well as privacy and security for all users, we – the Service Provider - hereby outline the following AUP rules and conditions to come into force for each customer signing up for a web hosting account with our company:\n
          \n
          1\. [System Abuse](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#SYSTEM_ABUSE)\n
          \n
          2\. [Spam and Spamvertizing](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#SPAM_AND_SPAMVERTIZING)\n
          \n
          3\. [Inappropriate or Unlawful Content](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#INAPPROPRIATE_OR_UNLAWFUL_CONTENT_)\n
          \n
          4\. [Copyrights](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#COPYRIGHTS)\n
          \n
          5\. [Corrective Actions](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#CORRECTIVE_ACTIONS)\n
          \n
          6\. [Reporting Violtaions](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#REPORTING_VIOLATIONS)\n
          \n
          7\. [Revisions](https://www.philwebdev.com/terms-and-conditions-2/acceptable-use-policy-3/#REVISIONS)\n
          \n
          **1\. SYSTEM ABUSE**\n
          \n
          Any customer in violation of our system or network security is subject to criminal and civil liability, as well as immediate account termination. Examples include, but are not limited to the following:\n
          \n
          Unauthorized access, use, probe, or scan of our system’s security, authentication measures, data, or traffic. Interference with the service to any user, host or network including, but not limited to: e-mail bombing, flooding, deliberate attempts to overload the system and broadcast attacks, forging of any TCP/IP packet header or any part of the header information in an e-mail or newsgroup posting.\n
          \n
          Any attempt at doing harm to a server or a customer of our web hosting services:\n
          \n
          the Service Provider will immediately and resolutely react to any attempt at misuse of an Internet account or computer, or any attempt to gain access to an Internet account or computer by a Service Provider's customer unauthorized by the account/computer owner. Such attempts include, but are not limited to the following: 'Internet scamming' (tricking other people into releasing their passwords, etc.), password robbery, security hole scanning, running proxy - proxy lists and any kind of proxy scripts (including, but not limited to PHP proxy and mph proxy), introducing of any computer programs (viruses, Trojan horses, trap doors, back doors, worms, time bombs, packet bombs, cancelbots, etc.) that are intended to negatively interfere with, intercept, irreversibly damage or take hold of any system, data or personal information. It WILL NOT matter whether the attacked account or computer belongs or not to the Service Provider's services. The fraud will be subject to actions based on the very nature of the attack and those may represent a warning, an account suspension or cancellation, and/or civil or criminal legal actions.\n
          \n
          Background operations/programs on servers:\n
          \n
          ‘Background process’ is a program that runs in the background of the operating system. What is specific for a background process is that, once started, it runs simultaneously with other foreground processes. This means that, the shell executing the background operation does not wait for it to finish or terminate, as it does with foreground processes, but is free to start executing more operations along with the background one. Typical background processes are ircd, irc bot, bnc, and many others.\n
          \n
          Background processes are not permitted on any of our shared hosting servers, as they usually lead to CPU overload and can be used for malicious and/or illegal actions. As our primary task is to provide highest quality web hosting service to all our customers, we cannot permit any background processes to be executed and threaten the performance of our server network. Our shared hosting system does not allow a big multitude of users to simultaneously use the system memory and processing time of our servers.\n
          \n
          Excessive use of system resources:\n
          \n
          In order to ensure higher server performance and quality of hosting service all shared hosting plans are subject to certain resource limitations concerning, but not limited to, server CPU usage, Memory usage, disk-space and traffic. If a hosting account exceeds the allowed amount of system resources the account owner will be immediately notified to take actions in order to reduce the usage. If such action is not instantly taken by the owner the account will be suspended. If an excessive CPU usage is detected the account owner will be suggested to place an order for a CPU usage upgrade or upgrade to a plan which allows higher CPU usage.\n
          \n
          If any hosting account is found to be causing degradation of the server and/or our hosting network’s performance, regardless of the reason, the account will be subject to suspension or immediate removal, depending on the situation. The Service Provider will be the sole arbiter in determining whether a given account is excessively using the server resources and/or causing a server degradation.\n
          \n
          **2\. SPAM AND SPAMVERTIZING**\n
          \n
          SPAMMING IS PROHIBITED. Users MAY NOT utilize our web hosting services to transmit, distribute or deliver any unsolicited bulk or commercial messages over the Internet (an action known as "spam" or "spamming").\n
          \n
          Spamming is a violation of ethic norms and will be interpreted as an infringement. the Service Provider will not tolerate the sending of unsolicited bulk or commercial messages through our services, as well as through another service that is mentioning, in some way, our customer’s domain name or implies the utilization of our network or our e-mail services for sending the unsolicited bulk or messages.\n
          \n
          SPAMVERTISING IS PROHIBITED. 'Spamvertizing’ refers to the practice of sending unsolicited spam messages for the purpose of advertising a particular website.\n
          \n
          If such e-mails are relayed through 3rd party (e-mail spoofing) and/or are promoting a domain hosted on our servers, this will lead to immediate account suspension unless an evidence of legitimacy for non-involvement of the domain owner in the particular illegal action is provided.\n
          \n
          ’E-mail spoofing’ is a fraudulent e-mail activity in which the sender’s (3td party) e-mail address and other parts of the e-mail header are changed so as to appear that the e-mail has been sent from a different source (e-mail address owner/server).\n
          \n
          'Unsolicited message’ is a message that is sent against the privacy policy of a newsgroup, or is sent to a recipient without their explicit permission. We, at our sole discretion, shall determine whether any of the messages you are sending is spam or spamvertizing. For your information, spamming generally includes, but is not limited to the following\n
          \n
          Sending of unsolicited messages in bulk, or sending of unsolicited e-mails, which provoke complaints from recipients;\n
          \n
          Sending of junk mail;\n
          \n
          Use of distribution lists that include people who have not given prior explicit permission to be involved in such a distribution process;\n
          \n
          Posting commercial ads to USENET newsgroups that do not permit it;\n
          \n
          Posting articles containing binary encoded data to non-binary newsgroups;\n
          \n
          Excessive and repeated posting of off-topic messages to newsgroups;\n
          \n
          Excessive and repeated cross-posting;\n
          \n
          E-mail harassment of another Internet Customer or Customers, including but not limited to, transmitting of any threatening, libellous or obscene material, or material of any nature that may be deemed offensive;\n
          \n
          E-mailing of age-inappropriate communications or content to anyone under the age of 18.\n
          \n
          **3\. INAPPROPRIATE OR UNLAWFUL CONTENT**\n
          \n
          CONTENT published or transmitted via the Service Provider’s hosting services includes website content, email content, forum/blog postings, chat content, and/or any other type of content hosted on our servers, published online or transmitted through our network’s services.\n
          \n
          The user of our services is NOT permitted to post online content or have links to content that:\n
          \n
          is defamatory, abusive or obscene, violates a person’s reputation/privacy, is reasonably deemed offensive by the web community, is anti-religious or anti-human rights, or contains any type of threatening or hate speech, encourages harassment or physical harm to any group or individual, or is otherwise malicious/fraudulent and may result in complaints/liabilities/or retaliation against the Service Provider by offended viewers;\n
          \n
          promotes or encourages illegal activities (e.g. illegal drugs, illegal gambling, arms trafficking, etc.) or violates any applicable law, statute, ordinance or regulation, including but not limited to the laws and regulations governing export control, unfair competition, false advertising, consumer protection, etc.\n
          \n
          represents pornography – any type of pornographic/adult material, including child pornography, or advertisements of pornographic websites;\n
          \n
          represents infringement on copyright, patents, trademarks, trade secrets, or third party's intellectual property or proprietary rights, including pirated computer programs, hacking/phreaking software, warez or any type of software/content (including also ROMs, ROM Emulators, media files – MP3, AVI, .RM, etc., torrent files, and others) that is copyrighted, is NOT uploaded in compliance with its license agreement or is NOT freely available for distribution.\n
          \n
          **4\. COPYRIGHTS**\n
          \n
          Copyrighted material must not be placed on customers' accounts without the explicit permission of the copyright owner or a person explicitly authorized to give such permission by the copyright owner. Upon receipt of a claim for copyright infringement, or a notice of such violation, we will immediately run full investigation and, upon confirmation, will promptly remove the infringing material from the Services. Further procedures (in accordance with our stated below corrective measures) will be carried out if necessary. We will assume no liability to any Customer of the Services for the removal of any such material.\n
          \n
          **5\. CORRECTIVE ACTIONS**\n
          \n
          We reserve our right to be the sole arbiter in determining the seriousness of each infringement and to immediately take corrective actions.\n
          \n
          We will disable the customer's account if we deem necessary, at our sole discretion. Upon closing of the customer’s account we will send an e-mail notification to the customer, stating the reason for the termination and quoting our terms’ chapter that has been violated. The customer will be given an opportunity to respond and take measures to remedy the situation should he/she consider him/herself abused by a third party. Upon fulfilling of this obligation, we may re-activate the customer’s account, if we find, at our own discretion, sufficient evidence pro customer’s side.\n
          \n
          Closed accounts due to repeated violations will not be re-activated. A backup may be requested, however it will be subject to certain penalty fees imposed according to the breach of this AUP terms. The final penalty fee will be determined by the type and frequency of the violations.\n
          \n
          **6\. REPORTING VIOLATIONS**\n
          \n
          If you need to report a violation of this AUP agreement or believe that you or your system has been subject to attack originating from our web hosting system, please contact us immediately. Our professional team will investigate the situation and provide you with full assistance.\n
          \n
          **7\. REVISIONS**\n
          \n
          We reserve our right to change this AUP at any time, without prior notice. We encourage our users to periodically review this Acceptable Use Policy and our Web Hosting Terms of Service.
          """
      ]
      "logo_url" => "https://www.philwebdev.com/billing/logod.svg"
      "languages" => array:2 [
        0 => array:3 [
          "locale" => "en_US"
          "title" => "English(en_US)"
          "name" => "English"
        ]
        1 => array:3 [
          "locale" => "hr_HR"
          "title" => "hr_HR(hr_HR)"
          "name" => "hr_HR"
        ]
      ]
    ]
    
  2. array:13 [
      "meta_title" => array:2 [
        0 => __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 {#178}
        1 => "block_meta_title"
      ]
      "meta_description" => array:2 [
        0 => __TwigTemplate_1218b162b0557026e91ff8225d515b58 {#181}
        1 => "block_meta_description"
      ]
      "opengraph" => array:2 [
        0 => __TwigTemplate_1218b162b0557026e91ff8225d515b58 {#181}
        1 => "block_opengraph"
      ]
      "head" => array:2 [
        0 => __TwigTemplate_1218b162b0557026e91ff8225d515b58 {#181}
        1 => "block_head"
      ]
      "js" => array:2 [
        0 => __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 {#178}
        1 => "block_js"
      ]
      "body_class" => array:2 [
        0 => __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 {#178}
        1 => "block_body_class"
      ]
      "body" => array:2 [
        0 => __TwigTemplate_1218b162b0557026e91ff8225d515b58 {#181}
        1 => "block_body"
      ]
      "content_before" => array:2 [
        0 => __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 {#178}
        1 => "block_content_before"
      ]
      "breadcrumbs" => array:2 [
        0 => __TwigTemplate_1218b162b0557026e91ff8225d515b58 {#181}
        1 => "block_breadcrumbs"
      ]
      "breadcrumb" => array:2 [
        0 => __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 {#178}
        1 => "block_breadcrumb"
      ]
      "content" => array:2 [
        0 => __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 {#178}
        1 => "block_content"
      ]
      "content_after" => array:2 [
        0 => __TwigTemplate_1218b162b0557026e91ff8225d515b58 {#181}
        1 => "block_content_after"
      ]
      "sidebar2" => array:2 [
        0 => __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 {#178}
        1 => "block_sidebar2"
      ]
    ]
    
/home/philwebd/public_html/billing/data/cache/d8/d830f004c1e3b0369b2a8dd53ccb3a68.php
        echo $this->extensions['FOSSBilling\TwigExtensions\DebugBar']->renderHead();
        echo "
 
    ";
        // line 27
        $this->displayBlock('head', $context, $blocks);
        // line 28
        echo "    ";
        $this->displayBlock('js', $context, $blocks);
        // line 29
        echo "</head>
 
<body class=\"";
        // line 31
        $this->displayBlock('body_class', $context, $blocks);
        echo "\">
 
";
        // line 33
        $this->displayBlock('body', $context, $blocks);
        // line 253
        echo "
    ";
        // line 254
        if (twig_get_attribute($this->env, $this->source, ($context["settings"] ?? null), "inject_javascript", [], "any", false, false, false, 254)) {
            // line 255
            echo "        ";
            echo twig_get_attribute($this->env, $this->source, ($context["settings"] ?? null), "inject_javascript", [], "any", false, false, false, 255);
            echo "
    ";
        }
        // line 257
        echo "    ";
        $__internal_compile_0 = null;
        try {
            $__internal_compile_0 =             $this->loadTemplate("partial_pending_messages.html.twig", "layout_default.html.twig", 257);
        } catch (LoaderError $e) {
            // ignore missing template
        }
        if ($__internal_compile_0) {
Arguments
  1. "body"
    
  2. array:8 [
      "CSRFToken" => "6921348dc90961df5535dfa8a24e50f2"
      "request" => array:2 [
        "_url" => "/order"
        "product" => "7"
      ]
      "guest" => Api_Handler {#175}
      "FOSSBillingVersion" => "0.6.20"
      "current_theme" => "huraga"
      "settings" => array:57 [
        "CSRFToken" => "3f10ff5d59184687b9efad79ebd8597e"
        "color_scheme" => "green"
        "show_page_header" => "1"
        "show_company_logo" => "1"
        "show_company_name" => "0"
        "show_client_details" => "1"
        "sidebar_balance_enabled" => "1"
        "top_menu_dashboard" => "1"
        "top_menu_profile" => "1"
        "top_menu_signout" => "1"
        "login_page_show_logo" => "1"
        "login_page_logo_url" => "/"
        "show_password_reset_link" => "1"
        "show_signup_link" => "0"
        "login_page_show_remember_me" => "1"
        "show_breadcrumb" => "1"
        "hide_dashboard_breadcrumb" => "1"
        "require_login" => "1"
        "showcase_enabled" => "0"
        "showcase_size" => "3"
        "showcase_text" => "Showcase text"
        "showcase_button_title" => "Showcase button title"
        "showcase_button_url" => "Showcase link URL"
        "side_menu_dashboard" => "1"
        "side_menu_order" => "1"
        "side_menu_support" => "1"
        "side_menu_services" => "1"
        "side_menu_invoices" => "1"
        "side_menu_emails" => "1"
        "side_menu_payments" => "1"
        "side_menu_news" => "1"
        "side_menu_kb" => "1"
        "sidebar_note_enabled" => "0"
        "sidebar_note_title" => "Note title"
        "sidebar_note_content" => "Note content"
        "meta_title" => ""
        "meta_description" => "Members area"
        "meta_keywords" => "members area"
        "meta_robots" => "noindex, nofollow"
        "meta_author" => "PhilWebDev"
        "footer_enabled" => "1"
        "footer_to_top_enabled" => "1"
        "footer_signature" => ""
        "footer_link_1_enabled" => "on"
        "footer_link_1_title" => "About us"
        "footer_link_1_page" => "about-us"
        "footer_link_2_enabled" => "on"
        "footer_link_2_title" => "Terms and conditions"
        "footer_link_2_page" => "tos"
        "footer_link_3_enabled" => "on"
        "footer_link_3_title" => "Privacy policy"
        "footer_link_3_page" => "privacy-policy"
        "footer_link_4_title" => ""
        "footer_link_4_page" => ""
        "footer_link_5_title" => ""
        "footer_link_5_page" => ""
        "inject_javascript" => ""
      ]
      "loader_nr" => "8"
      "loader_url" => "img/assets/loaders/loader8.gif"
    ]
    
  3. array:13 [
      "meta_title" => array:2 [
        0 => __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 {#178}
        1 => "block_meta_title"
      ]
      "meta_description" => array:2 [
        0 => __TwigTemplate_1218b162b0557026e91ff8225d515b58 {#181}
        1 => "block_meta_description"
      ]
      "opengraph" => array:2 [
        0 => __TwigTemplate_1218b162b0557026e91ff8225d515b58 {#181}
        1 => "block_opengraph"
      ]
      "head" => array:2 [
        0 => __TwigTemplate_1218b162b0557026e91ff8225d515b58 {#181}
        1 => "block_head"
      ]
      "js" => array:2 [
        0 => __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 {#178}
        1 => "block_js"
      ]
      "body_class" => array:2 [
        0 => __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 {#178}
        1 => "block_body_class"
      ]
      "body" => array:2 [
        0 => __TwigTemplate_1218b162b0557026e91ff8225d515b58 {#181}
        1 => "block_body"
      ]
      "content_before" => array:2 [
        0 => __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 {#178}
        1 => "block_content_before"
      ]
      "breadcrumbs" => array:2 [
        0 => __TwigTemplate_1218b162b0557026e91ff8225d515b58 {#181}
        1 => "block_breadcrumbs"
      ]
      "breadcrumb" => array:2 [
        0 => __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 {#178}
        1 => "block_breadcrumb"
      ]
      "content" => array:2 [
        0 => __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 {#178}
        1 => "block_content"
      ]
      "content_after" => array:2 [
        0 => __TwigTemplate_1218b162b0557026e91ff8225d515b58 {#181}
        1 => "block_content_after"
      ]
      "sidebar2" => array:2 [
        0 => __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 {#178}
        1 => "block_sidebar2"
      ]
    ]
    
/home/philwebd/public_html/billing/vendor/twig/twig/src/Template.php
        } else {
            ob_start(function () { return ''; });
        }
        try {
            $this->display($context);
        } catch (\Throwable $e) {
            while (ob_get_level() > $level) {
                ob_end_clean();
            }
 
            throw $e;
        }
 
        return ob_get_clean();
    }
 
    protected function displayWithErrorHandling(array $context, array $blocks = [])
    {
        try {
            $this->doDisplay($context, $blocks);
        } catch (Error $e) {
            if (!$e->getSourceContext()) {
                $e->setSourceContext($this->getSourceContext());
            }
 
            // this is mostly useful for \Twig\Error\LoaderError exceptions
            // see \Twig\Error\LoaderError
            if (-1 === $e->getTemplateLine()) {
                $e->guess();
            }
 
            throw $e;
        } catch (\Throwable $e) {
            $e = new RuntimeError(sprintf('An exception has been thrown during the rendering of a template ("%s").', $e->getMessage()), -1, $this->getSourceContext(), $e);
            $e->guess();
 
            throw $e;
        }
    }
 
Arguments
  1. array:8 [
      "CSRFToken" => "6921348dc90961df5535dfa8a24e50f2"
      "request" => array:2 [
        "_url" => "/order"
        "product" => "7"
      ]
      "guest" => Api_Handler {#175}
      "FOSSBillingVersion" => "0.6.20"
      "current_theme" => "huraga"
      "settings" => array:57 [
        "CSRFToken" => "3f10ff5d59184687b9efad79ebd8597e"
        "color_scheme" => "green"
        "show_page_header" => "1"
        "show_company_logo" => "1"
        "show_company_name" => "0"
        "show_client_details" => "1"
        "sidebar_balance_enabled" => "1"
        "top_menu_dashboard" => "1"
        "top_menu_profile" => "1"
        "top_menu_signout" => "1"
        "login_page_show_logo" => "1"
        "login_page_logo_url" => "/"
        "show_password_reset_link" => "1"
        "show_signup_link" => "0"
        "login_page_show_remember_me" => "1"
        "show_breadcrumb" => "1"
        "hide_dashboard_breadcrumb" => "1"
        "require_login" => "1"
        "showcase_enabled" => "0"
        "showcase_size" => "3"
        "showcase_text" => "Showcase text"
        "showcase_button_title" => "Showcase button title"
        "showcase_button_url" => "Showcase link URL"
        "side_menu_dashboard" => "1"
        "side_menu_order" => "1"
        "side_menu_support" => "1"
        "side_menu_services" => "1"
        "side_menu_invoices" => "1"
        "side_menu_emails" => "1"
        "side_menu_payments" => "1"
        "side_menu_news" => "1"
        "side_menu_kb" => "1"
        "sidebar_note_enabled" => "0"
        "sidebar_note_title" => "Note title"
        "sidebar_note_content" => "Note content"
        "meta_title" => ""
        "meta_description" => "Members area"
        "meta_keywords" => "members area"
        "meta_robots" => "noindex, nofollow"
        "meta_author" => "PhilWebDev"
        "footer_enabled" => "1"
        "footer_to_top_enabled" => "1"
        "footer_signature" => ""
        "footer_link_1_enabled" => "on"
        "footer_link_1_title" => "About us"
        "footer_link_1_page" => "about-us"
        "footer_link_2_enabled" => "on"
        "footer_link_2_title" => "Terms and conditions"
        "footer_link_2_page" => "tos"
        "footer_link_3_enabled" => "on"
        "footer_link_3_title" => "Privacy policy"
        "footer_link_3_page" => "privacy-policy"
        "footer_link_4_title" => ""
        "footer_link_4_page" => ""
        "footer_link_5_title" => ""
        "footer_link_5_page" => ""
        "inject_javascript" => ""
      ]
      "loader_nr" => "8"
      "loader_url" => "img/assets/loaders/loader8.gif"
    ]
    
  2. array:13 [
      "meta_title" => array:2 [
        0 => __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 {#178}
        1 => "block_meta_title"
      ]
      "meta_description" => array:2 [
        0 => __TwigTemplate_1218b162b0557026e91ff8225d515b58 {#181}
        1 => "block_meta_description"
      ]
      "opengraph" => array:2 [
        0 => __TwigTemplate_1218b162b0557026e91ff8225d515b58 {#181}
        1 => "block_opengraph"
      ]
      "head" => array:2 [
        0 => __TwigTemplate_1218b162b0557026e91ff8225d515b58 {#181}
        1 => "block_head"
      ]
      "js" => array:2 [
        0 => __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 {#178}
        1 => "block_js"
      ]
      "body_class" => array:2 [
        0 => __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 {#178}
        1 => "block_body_class"
      ]
      "body" => array:2 [
        0 => __TwigTemplate_1218b162b0557026e91ff8225d515b58 {#181}
        1 => "block_body"
      ]
      "content_before" => array:2 [
        0 => __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 {#178}
        1 => "block_content_before"
      ]
      "breadcrumbs" => array:2 [
        0 => __TwigTemplate_1218b162b0557026e91ff8225d515b58 {#181}
        1 => "block_breadcrumbs"
      ]
      "breadcrumb" => array:2 [
        0 => __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 {#178}
        1 => "block_breadcrumb"
      ]
      "content" => array:2 [
        0 => __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 {#178}
        1 => "block_content"
      ]
      "content_after" => array:2 [
        0 => __TwigTemplate_1218b162b0557026e91ff8225d515b58 {#181}
        1 => "block_content_after"
      ]
      "sidebar2" => array:2 [
        0 => __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 {#178}
        1 => "block_sidebar2"
      ]
    ]
    
/home/philwebd/public_html/billing/vendor/twig/twig/src/Template.php
    {
        return $this;
    }
 
    /**
     * Returns all blocks.
     *
     * This method is for internal use only and should never be called
     * directly.
     *
     * @return array An array of blocks
     */
    public function getBlocks()
    {
        return $this->blocks;
    }
 
    public function display(array $context, array $blocks = [])
    {
        $this->displayWithErrorHandling($this->env->mergeGlobals($context), array_merge($this->blocks, $blocks));
    }
 
    public function render(array $context)
    {
        $level = ob_get_level();
        if ($this->env->isDebug()) {
            ob_start();
        } else {
            ob_start(function () { return ''; });
        }
        try {
            $this->display($context);
        } catch (\Throwable $e) {
            while (ob_get_level() > $level) {
                ob_end_clean();
            }
 
            throw $e;
        }
 
Arguments
  1. array:8 [
      "CSRFToken" => "6921348dc90961df5535dfa8a24e50f2"
      "request" => array:2 [
        "_url" => "/order"
        "product" => "7"
      ]
      "guest" => Api_Handler {#175}
      "FOSSBillingVersion" => "0.6.20"
      "current_theme" => "huraga"
      "settings" => array:57 [
        "CSRFToken" => "3f10ff5d59184687b9efad79ebd8597e"
        "color_scheme" => "green"
        "show_page_header" => "1"
        "show_company_logo" => "1"
        "show_company_name" => "0"
        "show_client_details" => "1"
        "sidebar_balance_enabled" => "1"
        "top_menu_dashboard" => "1"
        "top_menu_profile" => "1"
        "top_menu_signout" => "1"
        "login_page_show_logo" => "1"
        "login_page_logo_url" => "/"
        "show_password_reset_link" => "1"
        "show_signup_link" => "0"
        "login_page_show_remember_me" => "1"
        "show_breadcrumb" => "1"
        "hide_dashboard_breadcrumb" => "1"
        "require_login" => "1"
        "showcase_enabled" => "0"
        "showcase_size" => "3"
        "showcase_text" => "Showcase text"
        "showcase_button_title" => "Showcase button title"
        "showcase_button_url" => "Showcase link URL"
        "side_menu_dashboard" => "1"
        "side_menu_order" => "1"
        "side_menu_support" => "1"
        "side_menu_services" => "1"
        "side_menu_invoices" => "1"
        "side_menu_emails" => "1"
        "side_menu_payments" => "1"
        "side_menu_news" => "1"
        "side_menu_kb" => "1"
        "sidebar_note_enabled" => "0"
        "sidebar_note_title" => "Note title"
        "sidebar_note_content" => "Note content"
        "meta_title" => ""
        "meta_description" => "Members area"
        "meta_keywords" => "members area"
        "meta_robots" => "noindex, nofollow"
        "meta_author" => "PhilWebDev"
        "footer_enabled" => "1"
        "footer_to_top_enabled" => "1"
        "footer_signature" => ""
        "footer_link_1_enabled" => "on"
        "footer_link_1_title" => "About us"
        "footer_link_1_page" => "about-us"
        "footer_link_2_enabled" => "on"
        "footer_link_2_title" => "Terms and conditions"
        "footer_link_2_page" => "tos"
        "footer_link_3_enabled" => "on"
        "footer_link_3_title" => "Privacy policy"
        "footer_link_3_page" => "privacy-policy"
        "footer_link_4_title" => ""
        "footer_link_4_page" => ""
        "footer_link_5_title" => ""
        "footer_link_5_page" => ""
        "inject_javascript" => ""
      ]
      "loader_nr" => "8"
      "loader_url" => "img/assets/loaders/loader8.gif"
    ]
    
  2. array:13 [
      "meta_title" => array:2 [
        0 => __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 {#178}
        1 => "block_meta_title"
      ]
      "meta_description" => array:2 [
        0 => __TwigTemplate_1218b162b0557026e91ff8225d515b58 {#181}
        1 => "block_meta_description"
      ]
      "opengraph" => array:2 [
        0 => __TwigTemplate_1218b162b0557026e91ff8225d515b58 {#181}
        1 => "block_opengraph"
      ]
      "head" => array:2 [
        0 => __TwigTemplate_1218b162b0557026e91ff8225d515b58 {#181}
        1 => "block_head"
      ]
      "js" => array:2 [
        0 => __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 {#178}
        1 => "block_js"
      ]
      "body_class" => array:2 [
        0 => __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 {#178}
        1 => "block_body_class"
      ]
      "body" => array:2 [
        0 => __TwigTemplate_1218b162b0557026e91ff8225d515b58 {#181}
        1 => "block_body"
      ]
      "content_before" => array:2 [
        0 => __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 {#178}
        1 => "block_content_before"
      ]
      "breadcrumbs" => array:2 [
        0 => __TwigTemplate_1218b162b0557026e91ff8225d515b58 {#181}
        1 => "block_breadcrumbs"
      ]
      "breadcrumb" => array:2 [
        0 => __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 {#178}
        1 => "block_breadcrumb"
      ]
      "content" => array:2 [
        0 => __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 {#178}
        1 => "block_content"
      ]
      "content_after" => array:2 [
        0 => __TwigTemplate_1218b162b0557026e91ff8225d515b58 {#181}
        1 => "block_content_after"
      ]
      "sidebar2" => array:2 [
        0 => __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 {#178}
        1 => "block_sidebar2"
      ]
    ]
    
/home/philwebd/public_html/billing/data/cache/64/6439ab2a2bd83cff369a4f16ecb2d6e0.php
        ];
    }
 
    protected function doGetParent(array $context)
    {
        // line 1
        return $this->loadTemplate(((twig_get_attribute($this->env, $this->source, ($context["request"] ?? null), "ajax", [], "any", false, false, false, 1)) ? ("layout_blank.html.twig") : ("layout_default.html.twig")), "mod_order_index.html.twig", 1);
    }
 
    protected function doDisplay(array $context, array $blocks = [])
    {
        $macros = $this->macros;
        // line 3
        $macros["mf"] = $this->macros["mf"] = $this->loadTemplate("macro_functions.html.twig", "mod_order_index.html.twig", 3)->unwrap();
        // line 7
        $context["loader_nr"] = ((twig_get_attribute($this->env, $this->source, ($context["request"] ?? null), "loader", [], "any", true, true, false, 7)) ? (_twig_default_filter(twig_get_attribute($this->env, $this->source, ($context["request"] ?? null), "loader", [], "any", false, false, false, 7), "8")) : ("8"));
        // line 8
        $context["loader_url"] = (("img/assets/loaders/loader" . ($context["loader_nr"] ?? null)) . ".gif");
        // line 1
        $this->getParent($context)->display($context, array_merge($this->blocks, $blocks));
    }
 
    // line 5
    public function block_meta_title($context, array $blocks = [])
    {
        $macros = $this->macros;
        echo twig_escape_filter($this->env, __trans("Order"), "html", null, true);
    }
 
    // line 10
    public function block_body_class($context, array $blocks = [])
    {
        $macros = $this->macros;
        echo "order-index";
    }
 
    // line 11
    public function block_breadcrumb($context, array $blocks = [])
    {
        $macros = $this->macros;
Arguments
  1. array:8 [
      "CSRFToken" => "6921348dc90961df5535dfa8a24e50f2"
      "request" => array:2 [
        "_url" => "/order"
        "product" => "7"
      ]
      "guest" => Api_Handler {#175}
      "FOSSBillingVersion" => "0.6.20"
      "current_theme" => "huraga"
      "settings" => array:57 [
        "CSRFToken" => "3f10ff5d59184687b9efad79ebd8597e"
        "color_scheme" => "green"
        "show_page_header" => "1"
        "show_company_logo" => "1"
        "show_company_name" => "0"
        "show_client_details" => "1"
        "sidebar_balance_enabled" => "1"
        "top_menu_dashboard" => "1"
        "top_menu_profile" => "1"
        "top_menu_signout" => "1"
        "login_page_show_logo" => "1"
        "login_page_logo_url" => "/"
        "show_password_reset_link" => "1"
        "show_signup_link" => "0"
        "login_page_show_remember_me" => "1"
        "show_breadcrumb" => "1"
        "hide_dashboard_breadcrumb" => "1"
        "require_login" => "1"
        "showcase_enabled" => "0"
        "showcase_size" => "3"
        "showcase_text" => "Showcase text"
        "showcase_button_title" => "Showcase button title"
        "showcase_button_url" => "Showcase link URL"
        "side_menu_dashboard" => "1"
        "side_menu_order" => "1"
        "side_menu_support" => "1"
        "side_menu_services" => "1"
        "side_menu_invoices" => "1"
        "side_menu_emails" => "1"
        "side_menu_payments" => "1"
        "side_menu_news" => "1"
        "side_menu_kb" => "1"
        "sidebar_note_enabled" => "0"
        "sidebar_note_title" => "Note title"
        "sidebar_note_content" => "Note content"
        "meta_title" => ""
        "meta_description" => "Members area"
        "meta_keywords" => "members area"
        "meta_robots" => "noindex, nofollow"
        "meta_author" => "PhilWebDev"
        "footer_enabled" => "1"
        "footer_to_top_enabled" => "1"
        "footer_signature" => ""
        "footer_link_1_enabled" => "on"
        "footer_link_1_title" => "About us"
        "footer_link_1_page" => "about-us"
        "footer_link_2_enabled" => "on"
        "footer_link_2_title" => "Terms and conditions"
        "footer_link_2_page" => "tos"
        "footer_link_3_enabled" => "on"
        "footer_link_3_title" => "Privacy policy"
        "footer_link_3_page" => "privacy-policy"
        "footer_link_4_title" => ""
        "footer_link_4_page" => ""
        "footer_link_5_title" => ""
        "footer_link_5_page" => ""
        "inject_javascript" => ""
      ]
      "loader_nr" => "8"
      "loader_url" => "img/assets/loaders/loader8.gif"
    ]
    
  2. array:7 [
      "meta_title" => array:2 [
        0 => __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 {#178}
        1 => "block_meta_title"
      ]
      "body_class" => array:2 [
        0 => __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 {#178}
        1 => "block_body_class"
      ]
      "breadcrumb" => array:2 [
        0 => __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 {#178}
        1 => "block_breadcrumb"
      ]
      "content_before" => array:2 [
        0 => __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 {#178}
        1 => "block_content_before"
      ]
      "content" => array:2 [
        0 => __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 {#178}
        1 => "block_content"
      ]
      "sidebar2" => array:2 [
        0 => __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 {#178}
        1 => "block_sidebar2"
      ]
      "js" => array:2 [
        0 => __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 {#178}
        1 => "block_js"
      ]
    ]
    
/home/philwebd/public_html/billing/vendor/twig/twig/src/Template.php
        } else {
            ob_start(function () { return ''; });
        }
        try {
            $this->display($context);
        } catch (\Throwable $e) {
            while (ob_get_level() > $level) {
                ob_end_clean();
            }
 
            throw $e;
        }
 
        return ob_get_clean();
    }
 
    protected function displayWithErrorHandling(array $context, array $blocks = [])
    {
        try {
            $this->doDisplay($context, $blocks);
        } catch (Error $e) {
            if (!$e->getSourceContext()) {
                $e->setSourceContext($this->getSourceContext());
            }
 
            // this is mostly useful for \Twig\Error\LoaderError exceptions
            // see \Twig\Error\LoaderError
            if (-1 === $e->getTemplateLine()) {
                $e->guess();
            }
 
            throw $e;
        } catch (\Throwable $e) {
            $e = new RuntimeError(sprintf('An exception has been thrown during the rendering of a template ("%s").', $e->getMessage()), -1, $this->getSourceContext(), $e);
            $e->guess();
 
            throw $e;
        }
    }
 
Arguments
  1. array:8 [
      "CSRFToken" => "6921348dc90961df5535dfa8a24e50f2"
      "request" => array:2 [
        "_url" => "/order"
        "product" => "7"
      ]
      "guest" => Api_Handler {#175}
      "FOSSBillingVersion" => "0.6.20"
      "current_theme" => "huraga"
      "settings" => array:57 [
        "CSRFToken" => "3f10ff5d59184687b9efad79ebd8597e"
        "color_scheme" => "green"
        "show_page_header" => "1"
        "show_company_logo" => "1"
        "show_company_name" => "0"
        "show_client_details" => "1"
        "sidebar_balance_enabled" => "1"
        "top_menu_dashboard" => "1"
        "top_menu_profile" => "1"
        "top_menu_signout" => "1"
        "login_page_show_logo" => "1"
        "login_page_logo_url" => "/"
        "show_password_reset_link" => "1"
        "show_signup_link" => "0"
        "login_page_show_remember_me" => "1"
        "show_breadcrumb" => "1"
        "hide_dashboard_breadcrumb" => "1"
        "require_login" => "1"
        "showcase_enabled" => "0"
        "showcase_size" => "3"
        "showcase_text" => "Showcase text"
        "showcase_button_title" => "Showcase button title"
        "showcase_button_url" => "Showcase link URL"
        "side_menu_dashboard" => "1"
        "side_menu_order" => "1"
        "side_menu_support" => "1"
        "side_menu_services" => "1"
        "side_menu_invoices" => "1"
        "side_menu_emails" => "1"
        "side_menu_payments" => "1"
        "side_menu_news" => "1"
        "side_menu_kb" => "1"
        "sidebar_note_enabled" => "0"
        "sidebar_note_title" => "Note title"
        "sidebar_note_content" => "Note content"
        "meta_title" => ""
        "meta_description" => "Members area"
        "meta_keywords" => "members area"
        "meta_robots" => "noindex, nofollow"
        "meta_author" => "PhilWebDev"
        "footer_enabled" => "1"
        "footer_to_top_enabled" => "1"
        "footer_signature" => ""
        "footer_link_1_enabled" => "on"
        "footer_link_1_title" => "About us"
        "footer_link_1_page" => "about-us"
        "footer_link_2_enabled" => "on"
        "footer_link_2_title" => "Terms and conditions"
        "footer_link_2_page" => "tos"
        "footer_link_3_enabled" => "on"
        "footer_link_3_title" => "Privacy policy"
        "footer_link_3_page" => "privacy-policy"
        "footer_link_4_title" => ""
        "footer_link_4_page" => ""
        "footer_link_5_title" => ""
        "footer_link_5_page" => ""
        "inject_javascript" => ""
      ]
      "loader_nr" => "8"
      "loader_url" => "img/assets/loaders/loader8.gif"
    ]
    
  2. array:7 [
      "meta_title" => array:2 [
        0 => __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 {#178}
        1 => "block_meta_title"
      ]
      "body_class" => array:2 [
        0 => __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 {#178}
        1 => "block_body_class"
      ]
      "breadcrumb" => array:2 [
        0 => __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 {#178}
        1 => "block_breadcrumb"
      ]
      "content_before" => array:2 [
        0 => __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 {#178}
        1 => "block_content_before"
      ]
      "content" => array:2 [
        0 => __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 {#178}
        1 => "block_content"
      ]
      "sidebar2" => array:2 [
        0 => __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 {#178}
        1 => "block_sidebar2"
      ]
      "js" => array:2 [
        0 => __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 {#178}
        1 => "block_js"
      ]
    ]
    
/home/philwebd/public_html/billing/vendor/twig/twig/src/Template.php
    {
        return $this;
    }
 
    /**
     * Returns all blocks.
     *
     * This method is for internal use only and should never be called
     * directly.
     *
     * @return array An array of blocks
     */
    public function getBlocks()
    {
        return $this->blocks;
    }
 
    public function display(array $context, array $blocks = [])
    {
        $this->displayWithErrorHandling($this->env->mergeGlobals($context), array_merge($this->blocks, $blocks));
    }
 
    public function render(array $context)
    {
        $level = ob_get_level();
        if ($this->env->isDebug()) {
            ob_start();
        } else {
            ob_start(function () { return ''; });
        }
        try {
            $this->display($context);
        } catch (\Throwable $e) {
            while (ob_get_level() > $level) {
                ob_end_clean();
            }
 
            throw $e;
        }
 
Arguments
  1. array:6 [
      "CSRFToken" => "6921348dc90961df5535dfa8a24e50f2"
      "request" => array:2 [
        "_url" => "/order"
        "product" => "7"
      ]
      "guest" => Api_Handler {#175}
      "FOSSBillingVersion" => "0.6.20"
      "current_theme" => "huraga"
      "settings" => array:57 [
        "CSRFToken" => "3f10ff5d59184687b9efad79ebd8597e"
        "color_scheme" => "green"
        "show_page_header" => "1"
        "show_company_logo" => "1"
        "show_company_name" => "0"
        "show_client_details" => "1"
        "sidebar_balance_enabled" => "1"
        "top_menu_dashboard" => "1"
        "top_menu_profile" => "1"
        "top_menu_signout" => "1"
        "login_page_show_logo" => "1"
        "login_page_logo_url" => "/"
        "show_password_reset_link" => "1"
        "show_signup_link" => "0"
        "login_page_show_remember_me" => "1"
        "show_breadcrumb" => "1"
        "hide_dashboard_breadcrumb" => "1"
        "require_login" => "1"
        "showcase_enabled" => "0"
        "showcase_size" => "3"
        "showcase_text" => "Showcase text"
        "showcase_button_title" => "Showcase button title"
        "showcase_button_url" => "Showcase link URL"
        "side_menu_dashboard" => "1"
        "side_menu_order" => "1"
        "side_menu_support" => "1"
        "side_menu_services" => "1"
        "side_menu_invoices" => "1"
        "side_menu_emails" => "1"
        "side_menu_payments" => "1"
        "side_menu_news" => "1"
        "side_menu_kb" => "1"
        "sidebar_note_enabled" => "0"
        "sidebar_note_title" => "Note title"
        "sidebar_note_content" => "Note content"
        "meta_title" => ""
        "meta_description" => "Members area"
        "meta_keywords" => "members area"
        "meta_robots" => "noindex, nofollow"
        "meta_author" => "PhilWebDev"
        "footer_enabled" => "1"
        "footer_to_top_enabled" => "1"
        "footer_signature" => ""
        "footer_link_1_enabled" => "on"
        "footer_link_1_title" => "About us"
        "footer_link_1_page" => "about-us"
        "footer_link_2_enabled" => "on"
        "footer_link_2_title" => "Terms and conditions"
        "footer_link_2_page" => "tos"
        "footer_link_3_enabled" => "on"
        "footer_link_3_title" => "Privacy policy"
        "footer_link_3_page" => "privacy-policy"
        "footer_link_4_title" => ""
        "footer_link_4_page" => ""
        "footer_link_5_title" => ""
        "footer_link_5_page" => ""
        "inject_javascript" => ""
      ]
    ]
    
  2. array:7 [
      "meta_title" => array:2 [
        0 => __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 {#178}
        1 => "block_meta_title"
      ]
      "body_class" => array:2 [
        0 => __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 {#178}
        1 => "block_body_class"
      ]
      "breadcrumb" => array:2 [
        0 => __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 {#178}
        1 => "block_breadcrumb"
      ]
      "content_before" => array:2 [
        0 => __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 {#178}
        1 => "block_content_before"
      ]
      "content" => array:2 [
        0 => __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 {#178}
        1 => "block_content"
      ]
      "sidebar2" => array:2 [
        0 => __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 {#178}
        1 => "block_sidebar2"
      ]
      "js" => array:2 [
        0 => __TwigTemplate_66ecf73b593bd51245d7351cae3d10f8 {#178}
        1 => "block_js"
      ]
    ]
    
/home/philwebd/public_html/billing/vendor/twig/twig/src/Template.php
    public function getBlocks()
    {
        return $this->blocks;
    }
 
    public function display(array $context, array $blocks = [])
    {
        $this->displayWithErrorHandling($this->env->mergeGlobals($context), array_merge($this->blocks, $blocks));
    }
 
    public function render(array $context)
    {
        $level = ob_get_level();
        if ($this->env->isDebug()) {
            ob_start();
        } else {
            ob_start(function () { return ''; });
        }
        try {
            $this->display($context);
        } catch (\Throwable $e) {
            while (ob_get_level() > $level) {
                ob_end_clean();
            }
 
            throw $e;
        }
 
        return ob_get_clean();
    }
 
    protected function displayWithErrorHandling(array $context, array $blocks = [])
    {
        try {
            $this->doDisplay($context, $blocks);
        } catch (Error $e) {
            if (!$e->getSourceContext()) {
                $e->setSourceContext($this->getSourceContext());
            }
 
Arguments
  1. []
    
/home/philwebd/public_html/billing/vendor/twig/twig/src/TemplateWrapper.php
final class TemplateWrapper
{
    private $env;
    private $template;
 
    /**
     * This method is for internal use only and should never be called
     * directly (use Twig\Environment::load() instead).
     *
     * @internal
     */
    public function __construct(Environment $env, Template $template)
    {
        $this->env = $env;
        $this->template = $template;
    }
 
    public function render(array $context = []): string
    {
        return $this->template->render($context);
    }
 
    public function display(array $context = [])
    {
        // using func_get_args() allows to not expose the blocks argument
        // as it should only be used by internal code
        $this->template->display($context, \func_get_args()[1] ?? []);
    }
 
    public function hasBlock(string $name, array $context = []): bool
    {
        return $this->template->hasBlock($name, $context);
    }
 
    /**
     * @return string[] An array of defined template block names
     */
    public function getBlockNames(array $context = []): array
    {
        return $this->template->getBlockNames($context);
Arguments
  1. []
    
/home/philwebd/public_html/billing/library/Box/AppClient.php
 
    /**
     * @param string $fileName
     */
    public function render($fileName, $variableArray = [], $ext = 'html.twig'): string
    {
        try {
            $template = $this->getTwig()->load($fileName . '.' . $ext);
        } catch (Twig\Error\LoaderError $e) {
            $this->di['logger']->setChannel('routing')->info($e->getMessage());
            http_response_code(404);
 
            throw new FOSSBilling\InformationException('Page not found', null, 404);
        }
 
        if ($fileName . '.' . $ext == 'mod_page_sitemap.xml') {
            header('Content-Type: application/xml');
        }
 
        return $template->render($variableArray);
    }
 
    protected function getTwig(): Twig\Environment
    {
        $service = $this->di['mod_service']('theme');
        $code = $service->getCurrentClientAreaThemeCode();
        $theme = $service->getTheme($code);
        $settings = $service->getThemeSettings($theme);
 
        $loader = new Box_TwigLoader(
            [
                'mods' => PATH_MODS,
                'theme' => PATH_THEMES . DIRECTORY_SEPARATOR . $code,
                'type' => 'client',
            ]
        );
 
        $twig = $this->di['twig'];
        $twig->setLoader($loader);
 
Arguments
  1. []
    
/home/philwebd/public_html/billing/modules/Order/Controller/Client.php
        $this->di = $di;
    }
 
    public function getDi(): ?\Pimple\Container
    {
        return $this->di;
    }
 
    public function register(\Box_App &$app)
    {
        $app->get('/order', 'get_products', [], static::class);
        $app->get('/order/service', 'get_orders', [], static::class);
        $app->get('/order/:id', 'get_configure_product', ['id' => '[0-9]+'], static::class);
        $app->get('/order/:slug', 'get_configure_product_by_slug', ['slug' => '[a-z0-9-]+'], static::class);
        $app->get('/order/service/manage/:id', 'get_order', ['id' => '[0-9]+'], static::class);
    }
 
    public function get_products(\Box_App $app)
    {
        return $app->render('mod_order_index');
    }
 
    public function get_configure_product_by_slug(\Box_App $app, $slug)
    {
        $api = $this->di['api_guest'];
        $product = $api->product_get(['slug' => $slug]);
        $tpl = 'mod_service' . $product['type'] . '_order';
        if ($api->system_template_exists(['file' => $tpl . '.html.twig'])) {
            return $app->render($tpl, ['product' => $product]);
        }
 
        return $app->render('mod_order_product', ['product' => $product]);
    }
 
    public function get_configure_product(\Box_App $app, $id)
    {
        $api = $this->di['api_guest'];
        $product = $api->product_get(['id' => $id]);
        $tpl = 'mod_service' . $product['type'] . '_order';
        if ($api->system_template_exists(['file' => $tpl . '.html.twig'])) {
Arguments
  1. "mod_order_index"
    
[internal]
Arguments
  1. Box_AppClient {#144}
    
/home/philwebd/public_html/billing/library/Box/App.php
    {
        $this->debugBar['time']->startMeasure('executeShared', 'Reflecting module controller (shared mapping)');
        $class = new $classname();
        if ($class instanceof InjectionAwareInterface) {
            $class->setDi($this->di);
        }
        $reflection = new ReflectionMethod($class::class, $methodName);
        $args = [];
        $args[] = $this; // first param always app instance
 
        foreach ($reflection->getParameters() as $param) {
            if (isset($params[$param->name])) {
                $args[$param->name] = $params[$param->name];
            } elseif ($param->isDefaultValueAvailable()) {
                $args[$param->name] = $param->getDefaultValue();
            }
        }
        $this->debugBar['time']->stopMeasure('executeShared');
 
        return $reflection->invokeArgs($class, $args);
    }
 
    protected function execute($methodName, $params, $classname = null): string
    {
        $this->debugBar['time']->startMeasure('execute', 'Reflecting module controller');
 
        $reflection = new ReflectionMethod(static::class, $methodName);
        $args = [];
 
        foreach ($reflection->getParameters() as $param) {
            if (isset($params[$param->name])) {
                $args[$param->name] = $params[$param->name];
            } elseif ($param->isDefaultValueAvailable()) {
                $args[$param->name] = $param->getDefaultValue();
            }
        }
 
        $this->debugBar['time']->stopMeasure('execute');
 
        $response = $reflection->invokeArgs($this, $args);
Arguments
  1. Box\Mod\Order\Controller\Client {#145}
    
  2. array:1 [
      0 => Box_AppClient {#144}
    ]
    
/home/philwebd/public_html/billing/library/Box/App.php
                    $exc = new FOSSBilling\InformationException('The system is undergoing maintenance. Please try again later', [], 503);
                    $apiController = new Box\Mod\Api\Controller\Client();
                    $apiController->setDi($this->di);
 
                    return $apiController->renderJson(null, $exc);
                } else {
                    return $this->render('mod_system_maintenance');
                }
            }
        }
 
        $this->debugBar['time']->startMeasure('sharedMapping', 'Checking shared mappings');
        $sharedCount = count($this->shared);
        for ($i = 0; $i < $sharedCount; ++$i) {
            $mapping = $this->shared[$i];
            $url = new Box_UrlHelper($mapping[0], $mapping[1], $mapping[3], $this->url);
            if ($url->match) {
                $this->debugBar['time']->stopMeasure('sharedMapping');
 
                return $this->executeShared($mapping[4], $mapping[2], $url->params);
            }
        }
        $this->debugBar['time']->stopMeasure('sharedMapping');
 
        // this class mappings
        $this->debugBar['time']->startMeasure('mapping', 'Checking mappings');
        $mappingsCount = count($this->mappings);
        for ($i = 0; $i < $mappingsCount; ++$i) {
            $mapping = $this->mappings[$i];
            $url = new Box_UrlHelper($mapping[0], $mapping[1], $mapping[3], $this->url);
            if ($url->match) {
                $this->debugBar['time']->stopMeasure('mapping');
 
                return $this->execute($mapping[2], $url->params);
            }
        }
        $this->debugBar['time']->stopMeasure('mapping');
 
        $e = new FOSSBilling\InformationException('Page :url not found', [':url' => $this->url], 404);
 
Arguments
  1. "Box\Mod\Order\Controller\Client"
    
  2. "get_products"
    
  3. []
    
/home/philwebd/public_html/billing/library/Box/App.php
    public function delete(string $url, string $methodName, ?array $conditions = [], string $class = null): void
    {
        $this->event('delete', $url, $methodName, $conditions, $class);
    }
 
    public function run(): string
    {
        $this->debugBar['time']->startMeasure('registerModule', 'Registering module routes');
        $this->registerModule();
        $this->debugBar['time']->stopMeasure('registerModule');
 
        $this->debugBar['time']->startMeasure('init', 'Initializing the app');
        $this->init();
        $this->debugBar['time']->stopMeasure('init');
 
        $this->debugBar['time']->startMeasure('checkperm', 'Checking access to module');
        $this->checkPermission();
        $this->debugBar['time']->stopMeasure('checkperm');
 
        return $this->processRequest();
    }
 
    /**
     * @param string $path
     */
    public function redirect($path): never
    {
        $location = $this->di['url']->link($path);
        header("Location: $location");
        exit;
    }
 
    public function render($fileName, $variableArray = []): string
    {
        return 'Rendering ' . $fileName;
    }
 
    public function sendFile($filename, $contentType, $path): false|int
    {
        header("Content-type: $contentType");
/home/philwebd/public_html/billing/index.php
 
// If HTTP error code has been passed, handle it.
if (!is_null($http_err_code)) {
    switch ($http_err_code) {
        case '404':
            $e = new FOSSBilling\Exception('Page :url not found', [':url' => $url], 404);
            echo $app->show404($e);
 
            break;
        default:
            $http_err_code = intval($http_err_code);
            http_response_code($http_err_code);
            $e = new FOSSBilling\Exception('HTTP Error :err_code occurred while attempting to load :url', [':err_code' => $http_err_code, ':url' => $url], $http_err_code);
            echo $app->render('error', ['exception' => $e]);
    }
    exit;
}
 
// If no HTTP error passed, run the app.
echo $app->run();
exit;
 

Environment & details:

Key Value
PHP Version
"8.2.18"
Error code
0
Instance ID
"6e2834ba-db0b-4e95-8240-c288e31341f9"
Key Value
_url
"/order"
product
"7"
empty
empty
Key Value
landingpage
"/"
empty
Key Value
USER
"philwebd"
HOME
"/home/philwebd"
SCRIPT_NAME
"/index.php"
REQUEST_URI
"/order?product=7"
QUERY_STRING
"_url=/order&product=7"
REQUEST_METHOD
"GET"
SERVER_PROTOCOL
"HTTP/1.1"
GATEWAY_INTERFACE
"CGI/1.1"
REDIRECT_QUERY_STRING
"_url=/order&product=7"
REDIRECT_URL
"/order"
REMOTE_PORT
"40402"
SCRIPT_FILENAME
"/home/philwebd/public_html/billing/index.php"
SERVER_ADMIN
"webmaster@billing.philwebdev.com"
CONTEXT_DOCUMENT_ROOT
"/home/philwebd/public_html/billing"
CONTEXT_PREFIX
""
REQUEST_SCHEME
"https"
DOCUMENT_ROOT
"/home/philwebd/public_html/billing"
REMOTE_ADDR
"3.147.43.190"
SERVER_PORT
"443"
SERVER_ADDR
"131.153.49.139"
SERVER_NAME
"billing.philwebdev.com"
SERVER_SOFTWARE
"Apache"
SERVER_SIGNATURE
""
PATH
"/usr/local/jdk/bin:/usr/kerberos/sbin:/usr/kerberos/bin:/usr/local/sbin:/usr/local/bin:/sbin:/bin:/usr/sbin:/usr/bin:/usr/X11R6/bin:/usr/local/bin:/usr/X11R6/bin:/root/bin:/opt/bin"
HTTP_COOKIE
"landingpage=%2F"
HTTP_USER_AGENT
"Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; +claudebot@anthropic.com)"
HTTP_ACCEPT
"*/*"
HTTP_X_REAL_IP
"::ffff:3.147.43.190"
HTTP_X_FORWARDED_SERVER
"billing.philwebdev.com"
HTTP_X_FORWARDED_PROTO
"https"
HTTP_X_FORWARDED_PORT
"443"
HTTP_X_FORWARDED_HOST
"billing.philwebdev.com"
HTTP_HOST
"billing.philwebdev.com"
proxy-nokeepalive
"1"
HTTPS
"on"
HTTP_AUTHORIZATION
""
UNIQUE_ID
"ZkoUaSU2aOyy4IWiafsQYAAAAEU"
REDIRECT_STATUS
"200"
REDIRECT_HTTPS
"on"
REDIRECT_HTTP_AUTHORIZATION
""
REDIRECT_UNIQUE_ID
"ZkoUaSU2aOyy4IWiafsQYAAAAEU"
FCGI_ROLE
"RESPONDER"
PHP_SELF
"/index.php"
REQUEST_TIME_FLOAT
1716130921.4909
REQUEST_TIME
1716130921
argv
array:1 [
  0 => "_url=/order&product=7"
]
argc
1
empty
0. Whoops\Handler\PrettyPageHandler