Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- <html>
- <head>
- <title>Guest Wireless Services</title>
- <style>
- <!--
- HTML { margin: 0 }
- BODY { background: #DDDDDD; color: black; }
- H2 { font-face: Verdana; font-size: 80px; }
- -->
- </style>
- </head>
- <body>
- <table align="center" width="100%" border=0 cellspacing=0 cellpadding=6 style="margin-top: 100px;">
- <tr><td colspan="2" valign="top" align="center">
- <h2 id="loading">Welcome</h2>
- <Form action="#">
- <P>See front desk for access code</P>
- <Input Type="text" width="80"></input>
- <input type="submit" value="Get Online!">
- </form><br>
- This network is provided as a service to clients. By connecting, you agree to certain monitoring and logging which is enabled in order to enforce acceptable use terms.<P>
- This Policy is a guide to the acceptable use of Guest Wireless services (Services). Any individual
- connected to the network in order to use it directly, or to connect to any other network(s), must comply
- with this policy and the stated purposes and Acceptable Use policies of any other network(s) or host(s) used.
- The following guidelines will be applied to determine whether or not a particular use of the Services is
- appropriate:</td>
- </tr>
- </table>
- <pre>
- <br> 1. Users must respect the privacy of others. Users shall not intentionally seek information on, or represent
- themselves as, another user unless explicitly authorized to do so by that user. Nor shall Users obtain
- copies of, or modify files, other data, or passwords belonging to others.
- <br> 2. Users must respect the legal protection applied to programs, data, photographs, music, written
- documents and other material as provided by copyright, trademark, patent, licensure and other
- proprietary rights mechanisms.
- <br> 3. Users must respect the integrity of other public or private computing and network systems. Users shall
- not intentionally develop or use programs that harass other users or infiltrate any other computer,
- computing system or network and/or damage or alter the software components or file systems of a
- computer, computing system or network.
- <br> 4. Use should be consistent with guiding ethical statements and accepted community standards. Use of the
- Services for malicious, fraudulent, or misrepresentative purposes is not acceptable.
- <br> 5. The Services may not be used in ways that violate applicable laws or regulations.
- <br> 6. The Services may not be used in a manner that precludes or significantly hampers network access by
- others. Nor may the Services be used in a manner that significantly impairs access to other networks
- connected to the network.
- <br> 7. Connections which create routing patterns that are inconsistent with the effective and shared use of the
- Services may not be established.
- <br> 8. Unsolicited advertising is not acceptable. Advertising is permitted on some Web pages, mailing lists, news
- groups and similar environments if advertising is explicitly allowed in that environment.
- <br> 9. Repeated, unsolicited and/or unwanted communication of an intrusive nature is strictly prohibited.
- Continuing to send e-mail messages or other communications to an individual or organization after being
- asked to stop is not acceptable.
- <br> 10. By logging on, you agree to hold the network owner harmless for any damages that
- may result from access to the Internet or inappropriate usage.
- <P>The intent of this policy is to identify certain types of uses that are not appropriate, but this policy does not
- necessarily enumerate all possible inappropriate uses. Using the guidelines given above, we may at any time
- make a determination that a particular use is not appropriate.</pre>
- <!-- FOOTER --><div style="visibility:hidden">%CONTENT%</div>
- </body>
- </html>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement