PLEASE READ AND REVIEW THE TERMS AND CONDITIONS BEFORE USING THE EQUIPMENT OR SERVICE. BY USING THE SERVICES, YOU ARE BECOMING A PARTY TO THIS AGREEMENT AND AGREE TO BE BOUND BY IT. YOU FURTHER ACKNOWLEDGE THAT YOU HAVE READ AND UNDERSTAND THE TERMS AND CONDITIONS, AND YOU AGREE TO BE BOUND BY THE TERMS AND CONDITIONS IN EFFECT, AS UPDATE BY US FROM TIME TO TIME. Furthermore, by placing an order for the Services, you acknowledge that we will begin processing such order and incur expenses and obligations immediately. IF YOU DO NOT AGREE TO BE BOUND BY THESE TERMS AND CONDITIONS, DO NOT USE THE SERVICES AND CANCEL YOUR ORDER. If you don’t agree to being
IMPORTANT! THE HOTEL WIRELESS NETWORK YOU ARE USING IS UNSECURED. YOU SHOULD USE PROPER SECURITY MEASURES SUCH AS A VPN CONNECTION, A PERSONAL FIREWALL, AND KEEP YOUR OPERATING SYSTEM UP TO DATE WITH SECURITY PATCHES, ETC.
Disable the wireless cards’ ad hoc (peer-to-peer) mode. This can be done using the adapter’s tools or in Windows XP. If you’re working offline, remove or disable your wifi card.
Install a personal firewall. Windows XP includes a rudimentary firewall, but a more complex personal firewall can keep outsiders from accessing a laptop. Install your personal antivirus program.
Make use of the email client’s security capabilities, namely digital signatures and email encryption. Digital signatures validate your identity to receivers and prevent messages from being tampered with. Make sure to only send credit card information to SSL-secured websites (look for httpss:// in the address bar). Keep your operating system and software up to date with security patches.
The user agrees to acquire network access services (“Services”) from us. We or our contractor provides User with documentation outlining the minimum hardware and operating system requirements for using the Services. User represents and acknowledges that they have examined those materials and that the machine on which the Equipment will be installed satisfies the minimal requirements.
We, or our agent or contractor, may provide User with a radio, an antenna, and software (the “Equipment”). We may also give a user manual that includes instructions for configuring and operating the Equipment. The Equipment provided by us, when properly installed and operated, allows the User to access and use the services.
Services provided by us are for the User’s sole use and are not for resale without our prior written authorization, which may be granted in its sole discretion. If the User attempts to resell the Services, we may, in our discretion, increase the fees associated with the Services or cancel the Services.
User understands and accepts that the Services are for personal use only and will not use them in any way that is prohibited by federal or state law or regulation. User further agrees to follow our Acceptable Use Policy (“AUP”), which is available on our Account Management page.
Transmission of any material in violation of federal or state law or regulation, including, but not limited to, any copyrighted material, material protected by a trade secret, or material or messages that are illegal, harassing, libelous, abusive, threatening, harmful, vulgar, obscene, or otherwise objectionable in any manner or nature, or that encourages conduct that could constitute a criminal offense, give rise to civil liability, or otherwise violate any applicable local.
User agrees that there may be content on the Internet or otherwise available through the Services that is offensive or does not comply with all applicable local laws, regulations, and guidelines. We take no responsibility for and have no control over the content that appears on the Internet or is otherwise available through the Services. All content accessed or received by the User is used at the User’s own risk, and we and our employees assume no obligation for the User’s access or use of such content.
Users must not attempt to circumvent user authentication or security of any host, network, or account (also known as “cracking”). This includes, but is not limited to, accessing data not intended for the User, entering into a server or account that the User is not expressly permitted to use, or testing the security of other networks.
Users may not attempt to disrupt service to another user, host, or network (“denial of service attacks”). This includes, but is not limited to, “flooding” networks, deliberate attempts to overwhelm a service, and attempts to “crash” a server.
Users may not use any program/script/command or send any message meant to disrupt a user’s terminal session, whether locally or via the Internet.
Users who violate system or network security may face criminal or civil liability. We shall fully cooperate with investigations of system or network security infractions at other sites, including working with law enforcement agencies to investigate potential criminal violations.
We may, from time to time, send e-mail messages or other forms of contact to Users including advertising, promotions, and other information provided by third parties. We make no representations or warranties about the content of any such third-party communications or the goods or services obtained in response to such communications, and User agrees that we will have no liability for them, nor will any such messages amend the Terms and Conditions unless we specifically agree to it in writing. In addition, our website may contain links to websites maintained by parties other than us.
These links are provided for your convenience only. We have no control over such websites and accept no responsibility for their content. Our inclusion of links to such Web sites does not imply an endorsement of the content or an affiliation with their operators.