Kinsale Town Free WiFi Terms and Conditions
- By using the Wireless Network, you agree to these terms and conditions.
- You must be at least 18 years of age to use the Wireless Network, any persons under the age
of 18 must be accompanied by a Legal Parent/Guardian when using the Wireless Network.
- Not all information found on the Internet is accurate, complete, up to date or otherwise
acceptable to all individuals. Wild Atlantic WiFi Ltd. is not responsible for the accuracy,
quality or content of the information retrieved from the Internet.
- All Wireless networks owned and operated by Wild Atlantic WiFi Ltd. are equipped with 7-
layer firewall and other security measures. Users should be aware that as electronic security
cannot be guaranteed, Wild Atlantic WiFi Ltd. bears no responsibility for unauthorized
access to transactions and communications undertaken by users or any other problems
users may encounter with e-mails, banking/credit card transactions, online bookings,
shopping etc.
- Users will not access or download, or attempt to access or download, any material that is
likely to be considered unlawful, offensive or pornographic in nature. Any infringements of
copyright are the responsibility of the user.
- The intended usage of the Wireless Network is to serve a broad number of users at once, to
ensure accessibility and to cater to a large number of concurrent users across the network
heavy usage of the network by an individual (e.g. prolonged video streaming, Netflix,
YouTube) may result in the limiting or permanent blocking of a user's access the Wireless
Network.
- Users are reminded that the Internet Wireless Network may be unavailable for technical or
other reasons beyond the control of staff.
- Wild Atlantic WiFi Ltd. reserves the right to monitor and block users from using the Wireless
Network for any reason to ensure compliance with its internet policy.
- Failure to use the Wireless Network in accordance with Wild Atlantic WiFi's policy may result
in withdrawal of Wireless Network. Use of the wireless network is subject to the general
restrictions outlined below. If abnormal, illegal, or unauthorized behaviour is detected,
including heavy consumption of bandwidth, the network provider reserves the right to
permanently disconnect the offending device from the wireless network.
Examples of Illegal Uses
The following are representative examples only and do not comprise a comprehensive list of illegal
uses:
1. Spamming and invasion of privacy - Sending of unsolicited bulk and/or commercial
messages over the Internet using the Wireless Network or using the Wireless Network for
activities that invade another's privacy.
2. Intellectual property right violations - Engaging in any activity that infringes or
misappropriates the intellectual property rights of others, including patents, copyrights,
trademarks, trade secrets, or any other proprietary right of any third party.
3. Accessing illegally or without authorization computers, accounts, equipment or networks
belonging to another party, or attempting to penetrate/circumvent security measures of
another system. This includes any activity that may be used as a precursor to an
attempted system penetration, including, but not limited to, port scans, stealth scans, or
other information gathering activity.
4. The transfer of technology, software, or other materials in violation of applicable export
laws and regulations.
5. Export Control Violations
6. Using the Wireless Network in violation of applicable law and regulation, including, but
not limited to, advertising, transmitting, or otherwise making available Ponzi schemes,
pyramid schemes, fraudulently charging credit cards, pirating software, or making
fraudulent offers to sell or buy products, items, or services.
7. Uttering threats.
8. Distribution of pornographic materials to minors.
9. and Child pornography.
Examples of Unacceptable Uses
The following are representative examples only and do not comprise a comprehensive list of
unacceptable uses:
1. High bandwidth operations, such as large file transfers and media sharing with peer-to-
peer programs (i.e. Torrents)
2. Obscene or indecent speech or materials
3. Defamatory or abusive language
4. Using the Wireless Network to transmit, post, upload, or otherwise making available
defamatory, harassing, abusive, or threatening material or language that encourages
bodily harm, destruction of property or harasses another.
5. Forging or misrepresenting message headers, whether in whole or in part, to mask the
originator of the message.
6. Facilitating a Violation of these Terms of Use
7. Hacking
8. Distribution of Internet viruses, Trojan horses, or other destructive activities
9. Distributing information regarding the creation of and sending Internet viruses, worms,
Trojan horses, pinging, flooding, mail-bombing, or denial of service attacks. Also,
activities that disrupt the use of or interfere with the ability of others to effectively use the
node or any connected network, system, service, or equipment.
10. Advertising, transmitting, or otherwise making available any software product, product, or
service that is designed to violate these Terms of Use, which includes the facilitation of
the means to spam, initiation of pinging, flooding, mail-bombing, denial of service attacks,
and piracy of software.
11. The sale, transfer, or rental of the Wireless Network to customers, clients or other third
parties, either directly or as part of a Wireless Network or product created for resale.
12. Seeking information on passwords or data belonging to another user.
13. Making unauthorized copies of proprietary software or offering unauthorized copies of
proprietary software to others.
14. Intercepting or examining the content of messages, files or communications in transit on
a data network.
Quick Links
Get in Contact
- Tel : +353 21 4700507
- Email : [email protected]
- Collins House, Market Square, Kinsale, Co. Cork