Last update: 23rd March 2018
Please use our WiFi to access the internet, it’s free because we love you (and Insta pics of your lunch), but to keep us both safe, we have a few terms that we ask you to acknowledge prior to surfing. We also have a few conditions of use that can be summarised as - don’t do anything illegal or dodgy using our internet service, thanks :-).
By using our guest WiFi (‘Service’), you agree that there are security, privacy and confidentiality risks inherent in accessing or transmitting information through the internet. It’s an open platform, with worldwide access and not everyone is as nice as you are.
Urban Guild and the venues in the Group; Urban Reef, Urban Beach, Jenkins & Sons and the Wood Oven as the owners and providers of this network are NOT liable for any interception or transmissions, computer worms or viruses, loss of data, file corruption, hacking or damage to your computer or other devices that result from the transmission or download of information or materials through the internet service provided.
Sorry about that, but accessing the internet can be risky! Virus protection software, encrypted connections and a dose of common sense are all handy to mitigate that risk.
Use of our wireless network is subject to the general restrictions outlined below. If abnormal, illegal, or unauthorised behaviour is detected, including heavy consumption of bandwidth, we can disconnect your device from the network, for ever.
Examples of Illegal Uses
The following are examples only and do not comprise a comprehensive list of illegal uses:
- Spamming and invasion of privacy - Sending of unsolicited bulk and/or commercial messages over the Internet using the Service or using the Service for activities that invade another’s privacy.
- Intellectual property right violations - Engaging in any activity that infringes or misappropriates the intellectual property rights of others, including patents, copyrights, trademarks, service marks, trade secrets, or any other proprietary right of any third party.
- Accessing illegally or without authorisation computers, accounts, equipment or networks belonging to another party, or attempting to penetrate/circumvent security measures of another system. This includes any activity that may be used as a precursor to an attempted system penetration, including, but not limited to, port scans, stealth scans, or other information gathering activity.
- The transfer of technology, software, or other materials in violation of applicable export laws and regulations.
- Export Control Violations
- Using the Service in violation of applicable law and regulation, including, but not limited to, advertising, transmitting, or otherwise making available ponzi schemes, pyramid schemes, fraudulently charging credit cards, pirating software, or making fraudulent offers to sell or buy products, items, or services.
- Uttering threats;
- Distribution of pornographic materials to minors;
- and Child pornography.
Examples of Unacceptable Uses
The following are representative examples only and do not comprise a comprehensive list of unacceptable uses:
- High bandwidth operations, such as large file transfers and media sharing with peer-to-peer programs (i.e.torrents)
- Obscene or indecent speech or materials
- Defamatory or abusive language
- Using the Service to transmit, post, upload, or otherwise making available defamatory, harassing, abusive, or threatening material or language that encourages bodily harm, destruction of property or harasses another.
- Forging or misrepresenting message headers, whether in whole or in part, to mask the originator of the message.
- Distribution of Internet viruses, Trojan horses, or other destructive activities
- Distributing information regarding the creation of and sending Internet viruses, worms, Trojan horses, pinging, flooding, mail-bombing, or denial of service attacks. Also, activities that disrupt the use of or interfere with the ability of others to effectively use the node or any connected network, system, service, or equipment.
- The sale, transfer, or rental of the Service to customers, clients or other third parties, either directly or as part of a service or product created for resale.
- Seeking information on passwords or data belonging to another user.
- Making unauthorised copies of proprietary software, or offering unauthorised copies of proprietary software to others.
- Intercepting or examining the content of messages, files or communications in transit on a data network.