Terms & Conditions

Lake City RV Resort

Check-in: 12:00pm

Check-out: 11:00am

Late check-outs must be approved with an additional fee.

Quiet Time: Sun - Thurs 10:00pm - 8:00am; Fri and Sat 11:00pm - 8:00am.  Strictly enforced.  Please be courteous.

Site Area: Self-contained RV only.  No tents allowed.  1 RV per site.  NO CLOTHESLINES on any site.  See office for additional parking needs.  Contact office before repairing or washing vehicles. NO open or ground fires allowed.  Please do not hang laundry. Washers and dryers are available.  No dumping of waste water on ground. Sewer connectors must be used.  do not infringe on or restrct exit or access to other sites.  Please, always be courteous to your fellow rv'ers. 

Buildings: No smoking and no pets in any building.  Notify management of any unclean or unsafe conditions.

Damages: Parking is at your own risk.  The resort is not responsible for any RV or vehicle damage from falling limbs or trees.  The resort is not responsible for damage caused by electrical surges.  Anyone defacing or destroying property will be held liable for damages and will incur charges to guest credit card on file.

General: Children 14 and under must be under adult supervision at all times.  Do not feed the wildlife.  No swimming in ponds. Motorized bikes and scooters must be kept on the roads (16 years old minimum age). Golf carts allowed only with a licensed cart and driver. 

Propane: Propane is usually available during normal business hours.

Pricing: subject to change.

Pet Rules:

At this time we do not charge extra for pets.  Please help us keep it that way.

Pets must be "inside" pets.  No kennels, dog houeses, cages, stake outs or fences are allowed outside the RV.

Pets must be on a hand-held leash at all times and under the control of the owner.

A fenced in dog-run is available.

Pets cannot be left unattended.

Pets must be well-behaved at all times.

Pets must be walked in the designated areas only.  Do not allow your pet to "go-to-the-bathroom" on any of the RV sites or areas outside of those designated.

Pet owners MUST pick up after their pets and properly dispose of the droppings.

Pets that are noisy, disruptive, intimidating, or dangerous will not be allowed to remain in the resort.

No American Pit Bulls, Rottweilers, or Standard Doberman dogs or mix thereof allowed.

Failure to abide by these rules and policies may result in the pet owner being asked to either board the pet outside of the resort or to check out of the resort with no refund. 

Owners of dogs shall be liable for any damage done by their dogs to a person or to any animal.

Complimentary WiFi Terms and Conditions

By using our internet service, you hereby expressly acknowledge and agree that there are significant security, privacy and confidentiality risks inherent in accessing or transmitting information through the internet, whether the connection is facilitated through wired or wireless technology.  Security issues include, without limitation, interception of transmissions, loss of data, and the introduction or viruses and other programs that can corrupt or damage your computer.

Accordingly, you agree that the owner and/or provider of this network is NOT liable for any interception or transmissions, computer worms or viruses, loss of data, file corruption, hacking or damage to your computer or other devices that result from the transmission or download of information or materials through the internet service provided.

Use of the wireless network is subject to the general restrictions outlined below. If abnormal, illegal, or unauthorized behavior is detected, including heay consumption of bandwidth, the network provider reserves the right to permanently disconnect the offending device from the wireless network.

Examples of Illegal Uses

The following are representative examples only and do not comprise a comprehensive list of illegal uses:

1. Spamming and invasion of privacy - Sending of unsolicited bulk and/or commercial messages over the Internet using the Service or using the Service for activities that invade another's privacy.
2. Intellectual property right violations - Engaging in any activity that infringes or misappropriates the intellectual property rights of other, including patents, copyrights, trademarks, service marks, trade secrets, or any other proprietary right of any third kind.
3. Accessing illegally or without authorization computers, accounts, equipment or networks belonging to another party, or attempting to penetrate/circumvent security measures of another system. This includes any activity that may be used as a precursor to an attempted system penetration, including, but not limited to, port scans, stealth scans, or other information gathering activity.
4. The transfer of technology, software, or other materials in violation of applicable export laws and regulations.
5. Export Control Violations
6. Using the Service in violation of applicable law and regulation, including but not limited to, advertising, transmitting, or otherwise making available ponzi schemes, pyramid schemes, fraudulently charging credit cards, pirating software, or making fraudulent offers to sell or buy products, items, or services.
7. Uttering threats;
8. Distribution of pronographic materials to minors;
9. and Child pornography

Examples of Unacceptable Uses

The following are representative examples only and do not comprise a comprehensive list of unacceptable uses:

1. High bandwidth operations, such as large file transfers and media sharing with peer-to-peer programs (i.e. torrents)
2. Obscene or indecent speech or materials
3. Defamatory or abusive language
4. Using the Service to transmit, post, upload or otherwise making available defamatory, harassing, abusive, or threatening material or language that encourages bodily harm, destruction of property or harasses another.
5. Forging or misrepresenting message headers, whether in whole or in part, to mask the originator of the message.
6. Facilitating a Violation of these Terms of Use
7. Hacking
8.Distribution of Internet viruses, Trojan horses, or other destructive activities
9. Distributing information regarding the creation of and sending Internet viruses, worms, Trojan horses, pinging, flooding, mail-bombing, or denial of service attacks. Also, activities that disrupt the use of or interfere with the ability of others to effectively use the node or any connected network, system, service, or equipment
10. Advertising, transmitting, or otherwise making available any software product, product, or service that is designated to violate these Terms of Use, which includes the facilitation of the means to spam, initiation of pinging, flooding, mail-bombing, denial of service attacks, and piracy of software.
11. The sale, transfer, or rental of the Service to Customers, Clients or other third parties, either directly or as part of a service or product created for resale.
12. Seeking information on passwords or data belonging to another user.
13. Making unauthorized copies of proprietary software, or offering unauthorized copies of proprietary software to others.
14. Intercepting or examining the content of messages, files or communciations in transit on a data network.

By agreeing to our term and conditions, you also agree to our WiFi terms and conditions stated above.