You are expected to use the Internet with respect, courtesy, and responsibility, having due regard to the rights of other Internet users. We expect you to have a basic knowledge of how the Internet functions, the types of uses that are generally acceptable, and the types of uses that must be avoided. Common sense is the best guide as to what is considered acceptable use. By using the High Speed Internet Access Services (“Services”), you hereby agree to comply with this Policy. Do not use the Services if you do not agree with this Policy. The Services are provided at this premise by the party(ies) listed below (“Provider(s)”).

Failure to observe the guidelines set forth in this Agreement can result in anything from a warning to a suspension of privileges or termination of your Services. Decisions of Providers’ staff are final. Providers may refer potential violations of laws to the appropriate authorities, may cooperate in the investigation of any suspected criminal or civil wrong, and will cooperate with authorities when required to do so by law, subpoena, or when public interest is at stake.

By using the Service, you are using the Internet at your own risk. Providers are not responsible for any Internet content you view, or transactions or data transmissions you undertake by using the Services.

General Use

“Services” include any high speed Internet access from guestrooms and/or meeting rooms. Your use of these Services is subject to the terms and conditions of this Agreement which is intended to provide you with a set of guidelines you must follow in your use of the Services. You are responsible for your actions and should avoid prohibited activities.

The Providers will not, as an ordinary practice, proactively monitor the activities of those who use the Services to ensure that users comply with this Agreement and/or the law. If the Providers are alerted to violations or potential violations of this Agreement, they will take whatever measures that are deemed necessary to stop or prevent those violations, including the actions described herein.

During the use of the Service you agree to keep private and confidential any identifying information assigned to you including user names, passwords, IP addresses, MAC addresses and other authentication methods.

Guidelines for Use

The following is a list of guidelines for using the Services. These are only intended as guidelines and not an inclusive listing of prohibited conduct.

1. Email Abuse and Spamming

The Services you are receiving from the Providers may include the ability to send and receive electronic mail. Use of your electronic mail account to send unsolicited commercial messages is prohibited. Mass electronic messages or "mail-bombing" (sending mass unsolicited mail or deliberately sending very large attachments to one recipient) are prohibited. Forging electronic mail headers (addresses) is also prohibited regardless of commercial content. Use of electronic mail to harass or intimidate other users is prohibited.

Spamming, sending large numbers of unsolicited commercial email messages or unsolicited bulk email to advertise, offer, sell, or buy any goods or services, for any business or individual, is strictly prohibited. In response to a complaint, the Providers have the discretion to determine, from all of the evidence received, whether the intended recipients were from an “opt-in” email list.

In the interest of maintaining network performance, you should not send, download or stream large files and/or large electronic mail attachments. You are prohibited from running programs designed to defeat network inactivity time-outs and maintaining an open SMTP relay is prohibited.

2.  Facilitating a Violation of this Agreement

You are strictly prohibited from advertising, transmitting, or otherwise making available any software, program, product, or service that is designed to violate or facilitate a violation of this Agreement. This includes the facilitation of the means to spam, initiation of pinging, flooding, mailbombing, denial of service attacks, and piracy of software.

3.  Illegal Activity and Tortious Conduct

Any activity on the Providers’ network that is a violation of any federal or local law is a violation of this policy. Prohibited activities include, but are not limited to: transmitting obscene materials; intentionally spreading computer viruses; gaining unauthorized access to private networks; engaging in the transmission of pirated software; conducting or participating in illegal gambling, soliciting for illegal pyramid schemes through electronic mail or Internet web-site, newsgroups, Usenet, chat relay or chat room postings.

You are strictly prohibited from using the Services in a manner that:

4.  Infringement of Intellectual Property Rights

You are prohibited from making available, publishing, submitting, copying, uploading, posting, transmitting, reproducing, theft of, infringement on, or distributing information, software, or other material that is protected by copyright, trademark, patent, trade secret, any other type of intellectual property rights, trademark laws (by rights of privacy or publicity) or other proprietary right of any party unless you own or control the rights thereto or have received all necessary consents to do the same. This prohibition includes the use of any material or information including images or photographs that are made available through the Services.

5.  Interference with Other Customers Use

You are prohibited from using the Services in a manner that interferes with other guests' use and enjoyment of the Services of the Providers.

6.  Internet Relay Chat and Chat Room Postings and Abuse

Although the Providers do not offer software or technical support for Internet Relay Chat (‘IRC”), you may use the Services to connect to IRC servers and networks maintained by third parties. Please remember that you are a guest when you make use of these facilities. It is particularly important that you do not engage in activities that might interfere with other customers’ access to IRC.

You are also prohibited from abusing chat rooms. Such abuse includes, but is not limited to, scrolling (repeatedly entering either meaningless characters, three or more repeated blank lines, the same text three or more times, or consistently repeating text in a Chat room).

7.  Internet Web-sites, Newsgroups and Usenet Postings and Abuse

The Services give you access to millions of Internet web-sites, newsgroups and Usenet groups (“Discussion Groups”). These Discussion Groups allow you to read and post articles on a variety of topics. Discussion Groups may be moderated or unmoderated. Discussion Groups may also have a charter that describes what posts are appropriate.

Posting commercial messages to a Discussion Group is a violation of this Agreement unless that specific Discussion Group has invited commercial postings in its charter. If you are unable to find a Discussion Group's charter, or the charter does not address commercial posts, you must assume that commercial posting to that Discussion Group is not welcome.

Posting off-topic articles or articles that are not related to that Discussion Group's subject matter as defined in the Discussion Group's charter are also not welcomed. Cross-posting identical postings to over five Discussion Groups, posting for the purpose of threatening, harassing or intimidating Discussion Group users and forging Discussion Group post header information are also prohibited activities.

The Providers do not censor or control content posted to a Discussion Group. As a user of the Services, you are solely responsible for the content that you publish. Upon notification that certain postings violate this policy, the law, or infringe on a trademark or copyrights of another, the Providers may, at their discretion, remove offending posts from its news server.

The Providers reserve the right not to accept postings from Discussion Groups where we have actual knowledge that the content of the Discussion Group violates this Agreement.

8.  Network and Computing Device Security

You are required to take all necessary steps to manage the use of personal computing devices including the device’s hardware, operating systems, applications, services and databases (“Computing Device”) when connected with the Services obtained from the Providers.

Violations of any system or network security are prohibited, and may result in criminal and civil liability. The Providers will investigate incidents involving such violations and will cooperate with law enforcement if a criminal violation is suspected.

Examples of system or network security violations include, but are not limited to the following:

9.  Other Activities

You are prohibited from engaging in any other activity, illegal or not, that the Providers determine in their sole discretion, to be harmful to its guests, operations, reputation, goodwill, or customer relations.

Limitation of Liability

THE PROVIDERS SHALL NOT BE LIABLE FOR ANY DAMAGES SUFFERED AS A RESULT OF USING, MODIFYING, CONTRIBUTING, COPYING, DISTRIBUTING, OR DOWNLOADING MATERIAL THROUGH USE OF THE SERVICES. IN NO EVENT SHALL THE PROVIDERS BE LIABLE FOR ANY INDIRECT, PUNITIVE, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGE (INCLUDING LOSS OF BUSINESS, REVENUE, PROFITS, USE, DATA OR OTHER ECONOMIC ADVANTAGE) HOW SO EVER IT ARISING, WHETHER FOR BREACH OR IN TORT, EVEN IF PROVIDERS HAVE BEEN PREVIOUSLY ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

YOU HAVE SOLE RESPONSIBILITY FOR ADEQUATE PROTECTION AND BACKUP OF DATA AND/OR EQUIPMENT USED IN CONNECTION WITH THE WEBSITE AND WILL NOT MAKE A CLAIM AGAINST THE PROVIDERS FOR LOST DATA, RE-RUN TIME, INACCURATE OUTPUT, WORK DELAYS OR LOST PROFITS RESULTING FROM USE OF THE SERVICES.

YOU AGREE TO HOLD THE PROVIDERS HARMLESS FROM, AND YOU COVENANT NOT TO SUE THE PROVIDERS FOR, ANY CLAIMS BASED ON USING THE SERVICES.