Wifi Terms and Conditions

Terms and Conditions
When you click to accept these Terms and Conditions, or when you access or use Gateway’s wireless network facilities and internet services (the Services), you agree that you have read, understand and accept all of the terms and conditions in this policy, and agree to be bound by them for the benefit of Gateway. If you do not agree to the Terms and Conditions or do not understand them, you may not use the Services.

You must be 16 years of age or older to access the Services, and provide the information required in the registration form. See the Privacy Policy for information on collection and use of your personal information.

By using the Services, you hereby expressly acknowledge and agree that there are significant security, privacy and confidentiality risks inherent in accessing or transmitting information through the internet, whether the connection is facilitated through wired or wireless technology. Security issues include, without limitation, interception of transmissions, loss of data, and the introduction of viruses and other programs that can corrupt or damage your computer.

By accessing our internet, you are assuming the risks outlined above. Accordingly, you agree that the owner and/or provider of this network is NOT liable for any interception or transmissions, computer worms or viruses, loss of data, file corruption, hacking or damage to your computer or other devices that result from the transmission or download of information or materials through your use of the Services. You agree to hold Gateway harmless for any damages that may result from access to the Services or inappropriate use contrary to the guidelines set out below.

The Services are provided by Gateway at its discretion. Your access to the Services may be blocked, suspended or terminated at any time, for any reason. Gateway does not guarantee the availability of the Services or specific rates of speed of the Services.

Acceptable Use of the Wireless Network
These terms and conditions are a guide to the acceptable use of the Services. Any individual connected to the network in order to use the Services directly, or to connect to any other network, must comply with these terms and conditions and the stated purposes and acceptable use policies of any other network(s) or host(s) used.

The following guidelines will be applied to determine whether or not a particular use of the Services is appropriate:
1. The Services must be used in a manner consistent with acceptable community standards, including anti-harassment policies in place at Gateway from time to time. The Services shall not be used for malicious or fraudulent purposes.

2. Users must respect the privacy of others. Users shall not use the Services to send unsolicited bulk and/or commercial messages. Users shall not intentionally seek information on, or represent themselves as, another user unless expressly authorized to do so. The Services must not be used to obtain copies of or modify files, data or passwords belonging to others.

3. Users must respect intellectual property protections. Users must not engage in any activity that infringes or misappropriates the intellectual property rights of others, including patents, copyrights, trademarks, service marks, trade secrets, or any other proprietary right of any third party.

4. Users must respect the integrity of other public or private computing and networking systems. Users shall not access computers, accounts, equipment or networks belonging to another party for the purpose of attempting to penetrate/circumvent security measures of another system. This includes any activity that may be used as a precursor to an attempted system penetration, including, but not limited to, port scans, stealth scans, or other information gathering activity.

5. The Services must not be used in a manner that precludes or significantly hampers network access by others, or in a manner that significantly impairs access to other networks connected to the Services.

6. Users must not use the Services to transfer technology, software, or other materials in violation of applicable export laws and regulations.

7. Users must not use the Services in ways that violate any applicable laws or regulations, including applicable criminal laws, consumer protection statutes and regulations, and sale of goods legislation and regulations.

The intent of this policy is to identify certain types of uses that are not appropriate, but this policy does not enumerate all possible inappropriate uses. Gateway retains the discretion to make a determination at any time that any particular use of the Services is not appropriate.
Examples of Unacceptable Uses
The following are representative examples only and do not comprise a comprehensive list of unacceptable uses:
1. High bandwidth operations, such as large file transfers and media sharing with peer-to-peer programs (i.e. Torrents)

2. Sharing or transmitting obscene or indecent speech or materials;

3. Sharing defamatory or abusive language;

4. Using the Service to transmit, post, upload, or otherwise making available defamatory, harassing, abusive, or threatening material or language that encourages bodily harm, destruction of property or harasses another;

5. Forging or misrepresenting message headers, whether in whole or in part, to mask the originator of the message;

6. Facilitating a violation of these terms and conditions;

7. Hacking;

8. Distribution of Internet viruses, Trojan horses, or other destructive activities, or distribution of information regarding the creation of and sending Internet viruses, worms, Trojan horses, pinging, flooding, mail-bombing, or denial of service attacks. Also, activities that disrupt the use of or interfere with the ability of others to effectively use the node or any connected network, system, service, or equipment;

9. Advertising, transmitting, or otherwise making available any software product, product, or service that is designed to violate these terms and conditions, which includes the facilitation of the means to spam, initiation of pinging, flooding, mail-bombing, denial of service attacks, and piracy of software.

10. The sale, transfer, or rental of the Service to customers, clients or other third parties, either directly or as part of a service or product created for resale;

11. Making unauthorized copies of proprietary software or offering unauthorized copies of proprietary software to others; or

12. Intercepting or examining the content of messages, files or communications in transit on a data network.

stay social with us