Public WiFI Terms and Conditions

Accessing the Internet through Intercare’s free public wireless Internet (“WiFi”).

Intercare’s public WiFi is provided for intermittent use by our visitors, guests and contractors.

Communication over Intercare’s wireless network including, but not limited to, any media and material stored in Intercare’s network environment:

  1. Should not be considered private or protected;
  2. Is subject to monitoring; and
  3. Is subject to disclosure (without your consent).

You may use Intercare’s public WiFi if you agree to the Terms and Conditions outlined below.

Terms and Conditions

By using Intercare’s public WiFi service you hereby expressly understand, acknowledge and agree, each time you access the service, that:

  1. Your use of Intercare’s public WiFi and any activities conducted online through the public WiFi shall not, at any time, violate any applicable law or regulation or the rights of Intercare, or any third party.
  2. Intercare assumes no accountability, responsibility or liability for any injury or loss to you that results from inaccurate, unsuitable, offensive or illegal Internet communications.
  3. Intercare assumes no accountability, responsibility or liability for any interception or transmissions, computer worms or viruses, loss of data, file corruption, hacking or damage to your computer or other devices that result from the transmission or download of information or materials through the Internet service provided.
  4. Significant security, privacy and confidentiality risks are inherent when you are accessing or transmitting information through the Internet, whether the connection is facilitated through wired or wireless technology. Such risks include, but are not necessarily limited to: interception of transmissions; loss of data; and the introduction or viruses and other programs that can corrupt or damage your computer or other devices.
  5. Intercare reserves the right, at its sole discretion, to reduce or deny network throughput or access to anyone, at any time.
  6. If abnormal, illegal, or unauthorized behavior is detected, including heavy consumption of bandwidth, Intercare reserves the right, at its sole discretion, to permanently disconnect an offending computer(s) or other device(s) from its wireless network.
  7. Intercare will, at all times, fully cooperate with any law enforcement agency’s request for information if it is determined that Intercare’s network was used by you in the facilitation of any illegal activity in any country.

 

Questions, comments or concerns regarding Intecare’s public WiFi Internet service can be emailed to:

publicwifi@intercarecorpgroup.com

 

Examples of Illegal Uses

The following are representative examples only and do not comprise a comprehensive list of illegal uses:

  1. Spamming and invasion of privacy – Sending of unsolicited bulk and/or commercial messages over the Internet using the Service or using the Service for activities that invade another’s privacy;
  2. Intellectual property right violations – Engaging in any activity that infringes or misappropriates the intellectual property rights of others, including patents, copyrights, trademarks, service marks, trade secrets, or any other proprietary right of any third party;
  3. Accessing illegally or without authorization computers, accounts, equipment or networks belonging to another party, or attempting to penetrate/circumvent security measures of another system. This includes any activity that may be used as a precursor to an attempted system penetration, including, but not limited to, port scans, stealth scans, or other information gathering activity;
  4. The transfer of technology, software, or other materials in violation of applicable export laws and regulations.
  5. Export Control Violations;
  6. Using the Service in violation of applicable law and regulation, including, but not limited to, advertising, transmitting, or otherwise making available ponzi schemes, pyramid schemes, fraudulently charging credit cards, pirating software, or making fraudulent offers to sell or buy products, items, or services;
  7. Uttering threats;
  8. Distribution of pornographic materials to minors; and or Child pornography.

Examples of Unacceptable Uses

The following are representative examples only and do not comprise a comprehensive list of unacceptable uses:

  1. High bandwidth operations, such as large file transfers and media sharing with peer-to-peer programs (i.e. torrents);
  2. Obscene or indecent speech or materials;
  3. Defamatory or abusive language;
  4. Using the Service to transmit, post, upload, or otherwise making available defamatory, harassing, abusive, or threatening material or language that encourages bodily harm, destruction of property or harasses another;
  5. Forging or misrepresenting message headers, whether in whole or in part, to mask the originator of the message;
  6. Facilitating a Violation of these Terms of Use;
  7. Hacking;
  8. Distribution of Internet viruses, Trojan horses, or other destructive activities;
  9. Distributing information regarding the creation of and sending Internet viruses, worms, Trojan horses, pinging, flooding, mail-bombing, or denial of service attacks. Also, activities that disrupt the use of or interfere with the ability of others to effectively use the node or any connected network, system, service, or equipment;
  10. Advertising, transmitting, or otherwise making available any software product, product, or service that is designed to violate these Terms of Use, which includes the facilitation of the means to spam, initiation of pinging, flooding, mail-bombing, denial of service attacks, and piracy of software;
  11. The sale, transfer, or rental of the Service to customers, clients or other third parties, either directly or as part of a service or product created for resale;
  12. Seeking information on passwords or data belonging to another user;
  13. Making unauthorized copies of proprietary software, or offering unauthorized copies of proprietary software to others;
  14. Intercepting or examining the content of messages, files or communications in transit on a data network.

 

Leave a reply

Your email address will not be published. Required fields are marked *