WiFi Club

Bldg 1600
Edwards AFB
Help
3 min ago

Complete User Registration To Manage Your WiFi Club Account


Bldg 1600 WiFi Club is currently only available to ENI/MXI (812th AITS) personnel. If you are not part of ENI/MXI, please contact administrator for more information before attempting to register
Waiting for reCAPTCHA to load... If not loaded in 10 seconds (common issue on NIPRNET machines), try pressing CTL+F5
Register

Purpose of the Wi-Fi Club

The intent of this service is to provide users with a connection to the internet for such things as checking personal email, streaming audio, social media, VOIP calls, surfing the web, etc. Additionally, this connection should be faster and more reliable than using cellular service. High bandwidth activities such as downloading large files or streaming high definition, feature length movies are not acceptable uses of this service, since they can quickly render the connection very slow for all users.

Terms and Conditions

The first of each month is when the monthly payment is due. If payment is not received by the 14th, the user’s account will be deleted. A new password and certificate may be generated after receipt of payment. Dues will not be prorated as part of joining or leaving the club. If the user joins by the 14th, their payment will cover that month, whereas if they join on the 15th or later, the payment will be applied to the next month. Regarding departures, the credit balance in the account will be returned. Paying in advance is encouraged to help ensure continuous service.

By accepting this Wi-Fi Club User Agreement, you agree to safeguard your credentials (i. e. username, password, and certificate) for logging into the Wi-Fi Club network. While this means you shall not provide your credentials to other users, you may use those credentials on as many of your devices as you wish. You also hereby expressly acknowledge and agree that there are significant security, privacy and confidentiality risks inherent in accessing or transmitting information through the internet, whether the connection is facilitated through wired or wireless technology. Security issues include, without limitation, interception of transmissions, loss of data, and the introduction of viruses and other programs that can corrupt or damage your device/computer.

Accordingly, you agree that the owner and/or provider of this network is NOT liable for any interception or transmissions, computer worms or viruses, loss of data, file corruption, hacking or damage to your computer or other devices that result from the transmission or download of information or materials through the internet service provided.

Use of the wireless network is subject to the general restrictions outlined below. If abnormal, illegal, or unauthorized behavior is detected, including heavy consumption of bandwidth, the network provider reserves the right to permanently ban the user from the wireless network.

This User Agreement is subject to change without prior notice. Existing users will receive new versions via email, and have 14 calendar days to provide feedback. If no feedback is received after 14 calendar days, the new version shall be considered acknowledged by the user.

Examples of Illegal Uses

The following are representative examples only and do not comprise a comprehensive list of illegal uses:

  1. Spamming and invasion of privacy - Sending of unsolicited bulk and/or commercial messages over the Internet using the Service or using the Service for activities that invade another's privacy.
  2. Intellectual property right violations - Engaging in any activity that infringes or misappropriates the intellectual property rights of others, including patents, copyrights, trademarks, service marks, trade secrets, or any other proprietary right of any third party.
  3. Accessing illegally or without authorization computers, accounts, equipment or networks belonging to another party, or attempting to penetrate/circumvent security measures of another system. This includes any activity that may be used as a precursor to an attempted system penetration, including, but not limited to, port scans, stealth scans, or other information gathering activity.
  4. The transfer of technology, software, or other materials in violation of applicable export laws and regulations.
  5. Export Control Violations
  6. Using the Service in violation of applicable law and regulation, including, but not limited to, advertising, transmitting, or otherwise making available ponzi schemes, pyramid schemes, fraudulently charging credit cards, pirating software, or making fraudulent offers to sell or buy products, items, or services.
  7. Uttering threats
  8. Distribution of pornographic materials to minors
  9. Child pornography

Examples of Unacceptable Uses

The following are representative examples only and do not comprise a comprehensive list of unacceptable uses:

  1. Transmitting or intentional reception of any form of information that is FOUO, unless in compliance with the policies and procedures of your employer
  2. Transfer data to or from any government equipment, except equipment that is specifically designed to connect to the open internet (i. e. TDY laptops)
  3. Use that interferes with work
  4. High bandwidth operations, such as large file transfers, media sharing with peer-to-peer programs (i. e. torrents), and streaming high definition, feature length movies.
  5. Obscene or indecent speech or materials
  6. Defamatory or abusive language
  7. Transmit, post, upload, or otherwise making available defamatory, harassing, abusive, or threatening material or language that encourages bodily harm, destruction of property or harasses another
  8. Forging or misrepresenting message headers, whether in whole or in part, to mask the originator of the message
  9. Facilitating a violation of these Terms of Use
  10. Hacking
  11. Distribution of internet viruses, trojan horses, or other destructive activities
  12. Distributing information regarding the creation of and sending Internet viruses, worms, Trojan horses, pinging, flooding, mail-bombing, or denial of service attacks. Also, activities that disrupt the use of or interfere with the ability of others to effectively use the node or any connected network, system, service, or equipment
  13. Advertising, transmitting, or otherwise making available any software product, product, or service that is designed to violate these Terms of Use, which includes the facilitation of the means to spam, initiation of pinging, flooding, mailbombing, denial of service attacks, and piracy of software
  14. The sale, transfer, or rental of the Service to customers, clients or other third parties, either directly or as part of a service or product created for resale
  15. Seeking information on passwords or data belonging to another user
  16. Making unauthorized copies of proprietary software, or offering unauthorized copies of proprietary software to others
  17. Intercepting or examining the content of messages, files, or communications in transit on a data network

Last updated: 12 December 2019


Contact an administrator (Justin or Chris) at
si.wificlub@gmail.com