Wi-Fi使用條款

Wi-Fi使用條款

通過使用我們的互聯網服務,您特此明確承認並同意,通過互聯網訪問或傳輸信息所固有的重大安全性,隱私和機密性風險,無論通過有線或無線技術是否便利連接。安全問題包括但不限於攔截傳輸,丟失數據,以及可能損壞計算機的推送,病毒和其他程序。

通過使用我們的互聯網服務,您還同意,當前的Wi-Fi服務提供商可能會使用您的個人資料來通知您有關當前場所或由服務提供商管理的其他場所的促銷活動,特別優惠和獨家活動等。

因此,您同意,此網絡的擁有者和/或供應商不對任何攔截或傳播,計算機蠕蟲或病毒,數據丟失,文件損壞,黑客攻擊或您的計算機或其他傳輸或其他設備因為通過此互聯網服務下載信息或材料而造成的損害負責。

無線網絡的使用將會受以下概述的一般限制。如果檢測到異常,非法或未經授權的行為,包括大量帶寬消耗,網絡提供商保留將違規設備與無線網絡永久斷開連接的權利。

參與提供此Wi-Fi服務的公司/機構的官員,董事,員工,供應商和許可人不會對您使用Wi-Fi系統或互聯網直接或間接產生的任何費用或損害負責,具體包括任何直接,間接,偶然,示範,特殊,懲罰性或後果性損害賠償。

非法用途的例子

以下僅作為代表性示例,不包括非法用途的全面列表:

      1.垃圾郵件和侵犯隱私權 – 通過互聯網使用服務或使用本服務發送侵入他人隱私的活動的未經請求的批量和/或商業信息。

      2.侵犯知識產權 – 從事任何侵犯或盜用他人知識產權的活動,包括專利,版權,商標,服務標記,商業秘密或任何第三方的任何其他所有權。

      3.非法或未授權訪問屬於另一方的計算機,帳戶,設備或網絡,或試圖滲透/規避另一系統的安全措施。這包括可能被用作企圖系統滲透的前兆的任何活動,包括但不限於端口掃描,隱形掃描或其他信息收集活動。

      4.技術,軟件或其他材料的轉讓違反適用的出口法律法規。

      5.導出違規的控制程式

      6.使用本服務違反適用的法律法規,包括但不限於廣告,傳播或以其他方式提供的蓬鬆計劃,金字塔計劃,欺詐性地收取信用卡,盜版軟件,或提供欺詐性報價來銷售或購買產品,物品或服務。

      7.發出威脅性信息

      8.向未成年人分發色情材料;

      9.和兒童色情。

不可接受的用途的例子

以下僅是代表性示例,不包括不可接受的用途的全面列表:

      1.高帶寬操作,例如大型文件傳輸和與點對點程序的媒體共享

      2.淫褻或不雅言論或材料

      3.誹謗或辱罵語言

      4.使用本服務傳播,張貼,上傳或以其他方式提供誹謗,騷擾,辱罵或威脅的材料或語言,鼓勵身體傷害,毀壞財產或騷擾另一方。

      5.偽造或虛假的郵件標題,無論是全部還是部分掩蓋消息的發起者。

      6.促進違反這些使用條款

      7.黑客行為

      8.互聯網病毒,特洛伊木馬或其他破壞性活動的分發

      9.分發關於創建和發送互聯網病毒,蠕蟲,特洛伊木馬,ping,洪水,郵件轟炸或拒絕服務攻擊的信息。另外,破壞使用或乾擾他人有效使用節點或任何連接的網絡,系統,服務或設備的能力的活動。

      10.廣告,傳播或以其他方式提供旨在違反這些使用條款的任何軟件產品,產品或服務,其中包括便利垃圾郵件,啟動ping,洪水,郵件轟炸,拒絕服務攻擊和盜版的軟件。

      11.向客戶,客戶或其他第三方出售,轉讓或出租本服務,直接或作為為轉售創造的服務或產品的一部分。

      12.尋求屬於另一個用戶的密碼或數據的信息。

      13.非法複製專有軟件,或向其他人提供專有軟件的未經授權的副本。

      14.攔截或檢查數據網絡上傳輸的消息,文件或通信內容。

Terms and Conditions

By using our internet service, you hereby expressly acknowledge and agree that there are significant security, privacy and confidentiality risks inherent in accessing or transmitting information through the internet, whether the connection is facilitated through wired or wireless technology. Security issues include, without limitation, interception of transmissions, loss of data, and the introduction or viruses and other programs that can corrupt or damage your computer.

By using our internet service, you also agree that your data might be used by the Wi-Fi service provider to inform you about promotions, special deals and exclusive events at the current location or at other locations managed by the service provider.

Accordingly, you agree that the owner and/or provider of this network is NOT liable for any interception or transmissions, computer worms or viruses, loss of data, file corruption, hacking or damage to your computer or other devices that result from the transmission or download of information or materials through the internet service provided.

Use of the wireless network is subject to the general restrictions outlined below. If abnormal, illegal, or unauthorized behavior is detected, including heavy consumption of bandwidth, the network provider reserves the right to permanently disconnect the offending device from the wireless network.

The officers, directors, employees , vendors and licensors involved in the provision of this Wi-Fi service are not liable for any costs or damages arising, either directly or indirectly, from your use of the Wi-Fi System or the Internet, specifically including any direct, indirect, incidental, exemplary, special, punitive or consequential damages.

Examples of Illegal Uses
The following are representative examples only and do not comprise a comprehensive list of illegal uses:

  1.Spamming and invasion of privacy - Sending of unsolicited bulk and/or commercial messages over the Internet using the Service or using the Service for activities that invade another's privacy.

  2.Intellectual property right violations - Engaging in any activity that infringes or misappropriates the intellectual property rights of others, including patents, copyrights, trademarks, service marks, trade secrets, or any other proprietary right of any third party.

  3.Accessing illegally or without authorization computers, accounts, equipment or networks belonging to another party, or attempting to penetrate/circumvent security measures of another system. This includes any activity that may be used as a precursor to an attempted system penetration, including, but not limited to, port scans, stealth scans, or other information gathering activity.

  4.The transfer of technology, software, or other materials in violation of applicable export laws and regulations.

  5.Export Control Violations

  6.Using the Service in violation of applicable law and regulation, including, but not limited to, advertising, transmitting, or otherwise making available ponzi schemes, pyramid schemes, fraudulently charging credit cards, pirating software, or making fraudulent offers to sell or buy products, items, or services.

  7.Uttering threats;

  8.Distribution of pornographic materials to minors;

  9.and Child pornography.

Examples of Unacceptable Uses
The following are representative examples only and do not comprise a comprehensive list of unacceptable uses:

  1.High bandwidth operations, such as large file transfers and media sharing with peer-to-peer programs (i.e.torrents)

  2.Obscene or indecent speech or materials

  3.Defamatory or abusive language

  4.Using the Service to transmit, post, upload, or otherwise making available defamatory, harassing, abusive, or threatening material or language that encourages bodily harm, destruction of property or harasses another.

  5.Forging or misrepresenting message headers, whether in whole or in part, to mask the originator of the message.

  6.Facilitating a Violation of these Terms of Use

  7.Hacking

  8.Distribution of Internet viruses, Trojan horses, or other destructive activities

  9.Distributing information regarding the creation of and sending Internet viruses, worms, Trojan horses, pinging, flooding, mail-bombing, or denial of service attacks. Also, activities that disrupt the use of or interfere with the ability of others to effectively use the node or any connected network, system, service, or equipment.

  10.Advertising, transmitting, or otherwise making available any software product, product, or service that is designed to violate these Terms of Use, which includes the facilitation of the means to spam, initiation of pinging, flooding, mail-bombing, denial of service attacks, and piracy of software.

  11.The sale, transfer, or rental of the Service to customers, clients or other third parties, either directly or as part of a service or product created for resale.

  12.Seeking information on passwords or data belonging to another user.

  13.Making unauthorized copies of proprietary software, or offering unauthorized copies of proprietary software to others.

  14.Intercepting or examining the content of messages, files or communications in transit on a data network.