Advertisement
Guest User

ax0nh-i-rnet

a guest
Jul 24th, 2009
856
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
HTML 3.90 KB | None | 0 0
  1. <html>
  2. <head>
  3.     <title>Guest Wireless Services</title>
  4.     <style>
  5.     <!--
  6.         HTML { margin: 0 }
  7.         BODY { background: #DDDDDD; color: black; }
  8.         H2   { font-face: Verdana; font-size: 80px; }
  9.     -->
  10.     </style>
  11. </head>
  12. <body>
  13.  
  14. <table align="center" width="100%" border=0 cellspacing=0 cellpadding=6 style="margin-top: 100px;">
  15. <tr><td colspan="2" valign="top" align="center">
  16.     <h2 id="loading">Welcome</h2>
  17.         <Form action="#">
  18.  
  19.     <P>See front desk for access code</P>
  20.     <Input Type="text" width="80"></input>
  21.     <input type="submit" value="Get Online!">
  22.     </form><br>
  23. This network is provided as a service to clients. By connecting, you agree to certain monitoring and logging which is enabled in order to enforce acceptable use terms.<P>
  24. This Policy is a guide to the acceptable use of Guest Wireless services (Services). Any individual
  25. connected to the network in order to use it directly, or to connect to any other network(s), must comply
  26. with this policy and the stated purposes and Acceptable Use policies of any other network(s) or host(s) used.
  27. The following guidelines will be applied to determine whether or not a particular use of the Services is
  28. appropriate:</td>
  29. </tr>
  30. </table>
  31. <pre>
  32. <br>  1. Users must respect the privacy of others. Users shall not intentionally seek information on, or represent
  33.       themselves as, another user unless explicitly authorized to do so by that user. Nor shall Users obtain
  34.       copies of, or modify files, other data, or passwords belonging to others.
  35.  
  36. <br>  2. Users must respect the legal protection applied to programs, data, photographs, music, written
  37.       documents and other material as provided by copyright, trademark, patent, licensure and other
  38.       proprietary rights mechanisms.
  39. <br>  3. Users must respect the integrity of other public or private computing and network systems. Users shall
  40.       not intentionally develop or use programs that harass other users or infiltrate any other computer,
  41.       computing system or network and/or damage or alter the software components or file systems of a
  42.       computer, computing system or network.
  43. <br>  4. Use should be consistent with guiding ethical statements and accepted community standards. Use of the
  44.       Services for malicious, fraudulent, or misrepresentative purposes is not acceptable.
  45. <br>  5. The Services may not be used in ways that violate applicable laws or regulations.
  46. <br>  6. The Services may not be used in a manner that precludes or significantly hampers network access by
  47.       others. Nor may the Services be used in a manner that significantly impairs access to other networks
  48.       connected to the network.
  49. <br>  7. Connections which create routing patterns that are inconsistent with the effective and shared use of the
  50.       Services may not be established.
  51. <br>  8. Unsolicited advertising is not acceptable. Advertising is permitted on some Web pages, mailing lists, news
  52.       groups and similar environments if advertising is explicitly allowed in that environment.
  53. <br>  9. Repeated, unsolicited and/or unwanted communication of an intrusive nature is strictly prohibited.
  54.       Continuing to send e-mail messages or other communications to an individual or organization after being
  55.       asked to stop is not acceptable.
  56. <br> 10. By logging on, you agree to hold the network owner harmless for any damages that
  57.       may result from access to the Internet or inappropriate usage.
  58.  
  59. <P>The intent of this policy is to identify certain types of uses that are not appropriate, but this policy does not
  60. necessarily enumerate all possible inappropriate uses. Using the guidelines given above, we may at any time
  61. make a determination that a particular use is not appropriate.</pre>
  62. <!--                                                                  FOOTER                                                                         --><div style="visibility:hidden">%CONTENT%</div>
  63. </body>
  64. </html>
  65.  
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement