Now you can surf onboard

Welcome to our onboard Wi-Fi page. Here you’ll find all information relating to our Wi-Fi services, how much they cost and answers to any questions you may have…

Now you can surf onboard

WIFI Acceptable Use Policy Terms and Conditions

You are about to access our onboard wifi service. You must read and accept the rules and terms of this Acceptable Use Policy before agreeing to use this service.

1. Introduction

This Acceptable Use Policy (AUP) specifies actions prohibited by Condor Ferries to Users of the Condor Ferries Wi-Fi Public Network (in this AUP referred to as the “Network”). In this policy the term "Network" shall mean "The Condor Ferries Wi-Fi Public Network". Users and You/Your means customers or anyone else who uses or accesses the Network. The Network is provided by Condor Limited with registered offices at New Jetty Offices, White Rock, St Peter Port, Guernsey, GY1 2LL (“Condor Ferries” or “We/Us/Our”). It is a resource from which We provide the Network to customers and other Users of the Network. Our objectives for operating and managing the Network include providing a service to customers that ensures;

  1. respect of User’s privacy;
  2. protection for the security and integrity of our Network;
  3. responsible use of our Networks, and;
  4. to comply with all applicable laws.

As the Network is shared by many Users, achievement of our objectives requires appropriate use by each User.

2. Policy Statement

Use of the Network contrary to the policy objectives and the rules set out herein is unacceptable and prohibited. A breach of the policy terms and rules may give rise to sanctions placed upon the User making such breach.

3. Scope

This Policy applies to all Users of the Network.

4. Uses Prohibited

Examples of prohibited uses of the Network are described below. The examples provided are guidelines only and are not intended to be exhaustive.

5. Illegal/Criminal Activity

The Network must not be used in connection with any criminal, civil or in any other violation of the law, regulations, or other statutory requirements of any jurisdiction within which the Network is available. Such violations include but are not limited to;

  1. theft or infringement of any copyrights, patents, trademarks, trade secrets, or other intellectual property, export control violations, fraud, forgery, pyramid or other prohibited business schemes, and/or;
  2. theft, misappropriation, or unauthorised transmission or storage of funds, credit card information, personal information, or online services.

6. Security Violations

The Network may not be used to violate the security of any other network, service or any other system. Examples of security violations include; hacking, cracking (attempting to circumvent User authentication or security of any host, network, or account) into, monitoring, or using systems without authorisation; scanning ports; conducting denial of service attacks; distributing viruses or other harmful software; smurf attacks, and unauthorised alteration or destruction of websites or other information accessed or accessible via the Network.

7. Threats

The Network may not be used to transmit or store material of a threatening nature, including threats of death or physical harm, harassment, libel, and defamation of any person, organisation or other body corporate entity.

8. Offensive Materials

The Network may not be used to transmit or store material of an offensive nature, including obscene, pornographic, indecent, abusive and harmful materials, or to transmit to recipients’ material which is inappropriate for them, is threatening, harassing, invasive of privacy, defamatory, racist, obscene, indecent, offensive, abusive, harmful or malicious including such obscene or offensive materials to children.

9. Spam

The Network may not be used to spam which shall include the following activities:

  1. sending any unsolicited email that could be expected, in our judgement, to provoke complaints;
  2. sending email that does not accurately identify the sender, the sender's return address, and the email address of origin;
  3. sending unsolicited email without identifying in the email a clear and easy means to be excluded from receiving additional email from the originator of the email;
  4. collecting the responses of unsolicited email;
  5. sending email with charity requests, petitions for signatures, or any chain mail related materials;
  6. transmitting email by or on behalf of a User of the service which uses a mailbox for responses, or which promotes the content hosted or transmitted using the Network, or which states or implies in any way that Condor was involved in the transmission of such email or content;
  7. posting a single message or messages similar in content to multiple online forums or newsgroups;
  8. posting messages to an online forum or newsgroup that violate the rules of that forum or newsgroup.

10. Security System

The Network may not be used, directly or indirectly, with systems not configured and maintained in a manner which prevents their use by others in violation of this Policy. Examples include improperly securing a server for use by others to conduct a denial of service attack, distribute spam, and improperly securing an FTP server for use by others to illegally distribute licensed software.

11. Other

The Network may not be used in a manner that damages its reputation or goodwill; violates another ISP's acceptable use policy and/or its terms of service; or interferes with another User of the Network.

User data will not be used for any marketing purposes passed on to third party companies.

12. Resale

The resale of the Network as a service is not permitted.

13. Prohibited Activity

The Network may not be used to attempt an activity prohibited by this Policy or its rules whether or not such activity is successful.

14. Indirect Use

Users are responsible for the security of their own devices that are directly or indirectly connected to Our Network.

A violation of this Policy by a person having indirect access to the Network through another customer or User will be considered a violation by that other customer or User, whether or not such use is within the knowledge or consent of the customer or other User. As an example, resellers are responsible for the actions of their customers to whom they directly and indirectly provide services using the Network. We will address and attempt to resolve complaints about the actions of customers of a reseller without the reseller.

15. Responses to Violations

  1. To achieve the objectives of this Policy, We will determine, in our absolute discretion, whether a use of the Network violates this Policy. Whilst it is not our intention to monitor, control, or censor Users communications on the Network, when We become aware of a violation of this Policy, We may take such action as We deem appropriate to address the violation as described below;
  2. Violations of this Policy may result in a demand for immediate removal of offending material, immediate temporary or permanent filtering, blocked access, suspension or termination of service, or other response appropriate to the violation, as We may determine in our absolute discretion;
  3. Wherever feasible, it is our preference to give notice so that violations may be addressed voluntarily; however, We reserve the right to act without notice when necessary, and as We see fit. To the extent doing so does not interfere with our ability to achieve the objectives of this Policy (as We determine in our discretion), We will attempt to limit any filtering, suspension, termination, or other response to the addresses, locations, Users, or services with respect to which the violation occurs. We will not accept and will not have any liability for the actions We take in response to violations of this Policy whether proven as such or otherwise. The responses described in this Policy are not exclusive and We may take any other technical or legal action as We deem appropriate in the circumstances;
  4. We may cooperate with system administrators at other ISPs or other network or computing service providers to enforce this Policy or a policy of another provider. We may involve, and will cooperate with, law enforcement authorities if criminal activity of any kind is suspected. Violators may also be subject to civil or criminal liability under the applicable law.

16. Incident Reporting

Complaints regarding violations of this Policy should be sent to Condor Ferries Customer Services at customer.care@condorferries.co.uk. Where possible, please include details that would assist us in investigating and resolving the complaint (e.g. a copy of the offending transmission).

17. Contact Information

Please contact us at customer.care@condorferries.co.uk if you have any questions or comments about this Policy.

18. Important Customer Information

  1. This Policy may not be by itself sufficient to prevent possible harm to persons who use the Network as a result of violations by others. Customers (and other Users of the Network) are responsible for taking such steps as they deem necessary to protect the security, integrity, and availability of their networks, systems, services, and information, and to restrict access to undesired content, sites, and services;
  2. We will not be liable to any customers or other Users of the Network for harm that results from violations of this Policy, even when We are aware of those violations;
  3. This Policy supplements, but does not supersede, the Conditions of Carriage (please see: Terms & Conditions) between Condor Ferries and its customers. A violation of this Policy by a customer will be considered a material breach of the customer's transport contract with Condor Ferries and will result in its termination or We may apply other reasonable consequences. No refunds or credits will be allowed in connection with the consequences of violations of this Policy.

19. Revisions to this Policy

We may revise this Policy at any time without notice, effective when posted to our public web site. Notice of revisions may also be provided by other means such as via email or regular mail.

WIFI FAQs

Log in and use

Any Wi-Fi enabled device such as a smart phone, laptop or tablet.
  1. Switch on your device and open 'Settings'
  2. Use 'Wi-Fi' to select the network Condor_WiFi_Public
  3. Open the internet browser and you will be redirected to the internet access portal; if not then type the following url into your browser http://login
  4. A login/register screen will appear. Follow the instructions and enter your Wi-Fi activation and agree to the terms and conditions to continue
Yes. Roaming is available on wireless network only on the main deck.
We recommend that you limit emails and attachments as Satellite Internet connection is slower than cable broadband.
We advise that Wi-Fi should be used in the public areas of the ship – Bar, Brasserie, Club and Quiet Lounges. Unfortunately there is no guarantee that Wi-Fi will work in passenger cabins due to the number of walls/bulkheads.
Unfortunately not. The vouchers are vessel specific and currently not transferable. However we are actively investigating to see if this can be changed.

Free minutes and payment

Your free access is available every calendar day. It starts the moment you are shown the ‘You’re connected’ page. Logging out of the service or loss of service during the sailing will allow re-login.
If you’re using a paid subscription you will have faster connection as the Free Wi-Fi option has limited bandwidth and a restriction of 10MB data and 30 minutes’ time.
You can buy Wi-Fi data in blocks which last for 24 hours. In every case, the clock starts from acceptance of the activation code on the internet access web page.
100MB £4.99
200MB £9.99
500MB £19.99
You can pay using your credit card or cash at the Information Desk.
Yes, we can supply you with a payment receipt at the time of purchase.

Troubleshooting

If you can’t connect, you may need to change the settings within your browser or you’re running other programs that aren’t optimized for our system. Assistance can be provided by onboard Crew subject to availability.
Yes. Assistance can be provided by onboard Crew subject to their availability, they’ll help you get started.
No, as we do not provide portal devices (tablets) onboard.
Make sure this switch is 'on'. Also check if the portal devices are not in 'airplane mode'.

Security and speed

The speed you get depends on the number of users and how heavily they’re using the service. If you’re using our free service, then you can expect up to 1Mb/s. Paid users will receive speeds up to 20Mb/s.
We require this information for authentication and prevention of fraud.
Yes. The Wi-Fi service uses third-party filtering software. This means that it will automatically block access to certain types of websites and content which is deemed as inappropriate.
No public network is fool proof. Ensure you do your best to protect yourself and your device:
  • Install robust anti-virus software and a personal firewall on your device. Keep anti-virus software up to date
  • Protect your device with a password
  • Never leave your device unattended; if necessary, lock it
  • Make sure that a website is secure before you input financial details. Check for the padlock icon on your browser
  • If you’re connecting to your own corporate network, use a secure VPN (virtual private network)
spinner

Please wait while we find the best fares for you...