Purpose of the Wi-Fi Club
The intent of this service is to provide users with a connection to
the internet for such things as checking personal email, streaming
audio, social media, VOIP calls, surfing the web, etc. Additionally,
this connection should be faster and more reliable than using
cellular service. High bandwidth activities such as downloading
large files or streaming high definition, feature length movies are
not acceptable uses of this service, since they can quickly render
the connection very slow for all users.
Terms and Conditions
The first of each month is when the monthly payment is due. If
payment is not received by the 14th, the user’s account will be
deleted. A new password and certificate may be generated after receipt
of payment. Dues will not be prorated as part of joining or leaving
the club. If the user joins by the 14th, their payment will cover
that month, whereas if they join on the 15th or later, the payment
will be applied to the next month. Regarding departures, the credit
balance in the account will be returned. Paying in advance is
encouraged to help ensure continuous service.
By accepting this Wi-Fi Club User Agreement, you agree to
safeguard your credentials (i. e. username, password, and certificate)
for logging into the Wi-Fi Club network. While this means you shall
not provide your credentials to other users, you may use those
credentials on as many of your devices as you wish. You also hereby
expressly acknowledge and agree that there are significant security,
privacy and confidentiality risks inherent in accessing or
transmitting information through the internet, whether the connection
is facilitated through wired or wireless technology. Security issues
include, without limitation, interception of transmissions, loss of
data, and the introduction of viruses and other programs that can
corrupt or damage your device/computer.
Accordingly, you agree that the owner and/or provider of this network
is NOT liable for any interception or transmissions, computer worms
or viruses, loss of data, file corruption, hacking or damage to your
computer or other devices that result from the transmission or
download of information or materials through the internet service
provided.
Use of the wireless network is subject to the general restrictions
outlined below. If abnormal, illegal, or unauthorized behavior is
detected, including heavy consumption of bandwidth, the network
provider reserves the right to permanently ban the user from the
wireless network.
This User Agreement is subject to change without prior notice. Existing users will receive new versions via email, and have 14 calendar days
to provide feedback. If no feedback is received after 14 calendar days, the
new version shall be considered acknowledged by the user.
Examples of Illegal Uses
The following are representative examples only and do not comprise a
comprehensive list of illegal uses:
- Spamming and invasion of privacy - Sending of unsolicited bulk and/or commercial messages over the Internet using the Service or using the Service for activities that invade another's privacy.
- Intellectual property right violations - Engaging in any activity that infringes or misappropriates the intellectual property rights of others, including patents, copyrights, trademarks, service marks, trade secrets, or any other proprietary right of any third party.
- Accessing illegally or without authorization computers, accounts, equipment or networks belonging to another party, or attempting to penetrate/circumvent security measures of another system. This includes any activity that may be used as a precursor to an attempted system penetration, including, but not limited to, port scans, stealth scans, or other information gathering activity.
- The transfer of technology, software, or other materials in violation of applicable export laws and regulations.
- Export Control Violations
- Using the Service in violation of applicable law and regulation, including, but not limited to, advertising, transmitting, or otherwise making available ponzi schemes, pyramid schemes, fraudulently charging credit cards, pirating software, or making fraudulent offers to sell or buy products, items, or services.
- Uttering threats
- Distribution of pornographic materials to minors
- Child pornography
Examples of Unacceptable Uses
The following are representative examples only and do not comprise a comprehensive list of unacceptable uses:
- Transmitting or intentional reception of any form of information that is FOUO, unless in compliance with the policies and procedures of your employer
- Transfer data to or from any government equipment, except equipment that is specifically designed to connect to the open internet (i. e. TDY laptops)
- Use that interferes with work
- High bandwidth operations, such as large file transfers, media sharing with peer-to-peer programs (i. e. torrents), and streaming high definition, feature length movies.
- Obscene or indecent speech or materials
- Defamatory or abusive language
- Transmit, post, upload, or otherwise making available defamatory, harassing, abusive, or threatening material or language that encourages bodily harm, destruction of property or harasses another
- Forging or misrepresenting message headers, whether in whole or in part, to mask the originator of the message
- Facilitating a violation of these Terms of Use
- Hacking
- Distribution of internet viruses, trojan horses, or other destructive activities
- Distributing information regarding the creation of and sending Internet viruses, worms, Trojan horses, pinging, flooding, mail-bombing, or denial of service attacks. Also, activities that disrupt the use of or interfere with the ability of others to effectively use the node or any connected network, system, service, or equipment
- Advertising, transmitting, or otherwise making available any software product, product, or service that is designed to violate these Terms of Use, which includes the facilitation of the means to spam, initiation of pinging, flooding, mailbombing, denial of service attacks, and piracy of software
- The sale, transfer, or rental of the Service to customers, clients or other third parties, either directly or as part of a service or product created for resale
- Seeking information on passwords or data belonging to another user
- Making unauthorized copies of proprietary software, or offering unauthorized copies of proprietary software to others
- Intercepting or examining the content of messages, files, or communications in transit on a data network
Last updated: 12 December 2019