Guest Wi-Fi logonGuest Wireless Access Acceptable Use Policy |
This Policy is a guide to the acceptable use of the Guest Wireless network facilities and services. |
Any individual connected to the Guest Wireless Network in order to use it directly or to connect to any other network(s), must comply with this policy, the stated purposes and Acceptable Use policies of any other network(s) or host(s) used, and all applicable laws, rules, and regulations. |
WE MAKE NO REPRESENTATIONS OR WARRANTIES CONCERNING THE AVAILABILITY OR SECURITY OF THE GUEST WIRELESS NETWORK, AND ALL USE IS PROVIDED ON AN AS-IS BASIS. BY USING THE GUEST WIRELESS NETWORK YOU AGREE TO DEFEND, INDEMNIFY, AND HOLD US HARMLESS FOR ANY LOSSES OR DAMAGES THAT MAY RESULT FROM YOUR USE OF THE GUEST WIRELESS NETWORK. |
We take no responsibility and assumes no liability for any content uploaded, shared, transmitted, or downloaded by you or any third party, or for anything you may encounter or any data that may be lost or compromised while connected to the Guest Wireless Network. |
We reserve the right to disconnect any user at any time and for any reason. The Guest Wireless Network is provided as a courtesy to allow our guests access to the internet. Users are not authorized to access the Intranet or to install any software on our Infrastructure. |
Inappropriate use of the Guest Wireless Network is not permitted. This policy does not enumerate all possible inappropriate uses but rather
presents some guidelines (listed below) that we may at any time use to make a determination that a particular use is inappropriate:
|
This computer system including all related equipment and network devices are provided for authorized use only. All computer systems may be monitored to ensure lawful use and for network management, security reviews and testing. During monitoring, information may be examined, recorded, copied and used for authorized purposes. |
All information including personal information, placed on or sent over this system may be monitored. Evidence of unauthorized use gathered during monitoring may be used for criminal, civil, or disciplinary action. Use of this system, authorized or unauthorized, constitutes consent to monitoring of this system. |
CLICK ON THE BUTTON BELOW TO ACCEPT THE ABOVE POLICY TERMS.
|