TERMS OF SERVICE

Default Terms of Service on Checkout Page

This simple template addition replaces the Terms of Service link on the checkout page with a text box into which you can paste your company's wording so that your clients can read it without navigating away from the order form. Clients are still required to tick the checkbox to indicate they have read the terms.

Open templates/orderforms/*your active template*/viewcart.tpl

Find:
Code:
  {if $accepttos}
  <p align="center">
    <input type="checkbox" name="accepttos" id="accepttos" />
    <label for="accepttos">{$LANG.ordertosagreement} <a href="{$tosurl}" target="_blank">{$LANG.ordertos}</a></label>
  <p> {/if}
Replace with:
Code:
  {if $accepttos}
  <p align="center">
<textarea rows="10" cols="100" readonly="readonly">

***INSERT YOUR TERMS AND CONDITIONS HERE IN PLAIN TEXT***


</textarea>
</p><p align="center">
    <input type="checkbox" name="accepttos" id="accepttos" />
    <label for="accepttos">{$LANG.ordertosagreement} {$LANG.ordertos} above.</label>
  </p> {/if}
Replace "***INSERT YOUR TERMS AND CONDITIONS HERE IN PLAIN TEXT***" with your own terms of service wording.
Upload and you're done!


Update: 24/05/2010 - Text area is no longer editable by the visitor. (Thanks to gs-liam).
Attached Thumbnails Attached ThumbnailsClick image for larger version. 

Name:	tosbox.jpg 
Views:	628 
Size:	61.5 KB 
ID:	1500  
  • 0 Korisnici koji smatraju članak korisnim
Je li Vam ovaj odgovor pomogao?

Related Articles

WHMCS FREE ADDONS

http://whmcsaddon.comFREE LIVE CHAT FREE TWO FACTOR AUTHENTICATION 

WHMCS TICKET EXPLOIT

Please familiarise yourself and beware of these things. Rogue tickets in your system may be a...

WHMCS HACKER CAUGHT USING EXPLOITS

Known information about a hacker going around Hacking into WHMCS Systems. Going by the name...

WHMCS OATH / TWO FACTOR AUTHENTICATION

https://bitbucket.org/Doctor_McKay/whmcs-oath-addon/src/tip/README.mdDOWNLOAD HERE...

Petition to WHMCS reblogged

Thread: Petition to WHMCS - Please rewrite using good code! Thread Tools...