Welcome to our onboard Wi-Fi page. Here you’ll find all information relating to our Wi-Fi services, how much they cost and answers to any questions you may have…
WIFI Acceptable Use Policy Terms and Conditions
You are about to access our onboard wifi service. You must read and accept the rules and terms of this Acceptable Use Policy before agreeing to use this service.
This Acceptable Use Policy (AUP) specifies actions prohibited by Condor Ferries to Users of the Condor Ferries Wi-Fi Public Network (in this AUP referred to as the “Network”). In this policy the term "Network" shall mean "The Condor Ferries Wi-Fi Public Network". Users and You/Your means customers or anyone else who uses or accesses the Network. The Network is provided by Condor Limited with registered offices at New Jetty Offices, White Rock, St Peter Port, Guernsey, GY1 2LL (“Condor Ferries” or “We/Us/Our”). It is a resource from which We provide the Network to customers and other Users of the Network. Our objectives for operating and managing the Network include providing a service to customers that ensures;
- respect of User’s privacy;
- protection for the security and integrity of our Network;
- responsible use of our Networks, and;
- to comply with all applicable laws.
As the Network is shared by many Users, achievement of our objectives requires appropriate use by each User.
2. Policy Statement
Use of the Network contrary to the policy objectives and the rules set out herein is unacceptable and prohibited. A breach of the policy terms and rules may give rise to sanctions placed upon the User making such breach.
This Policy applies to all Users of the Network.
4. Uses Prohibited
Examples of prohibited uses of the Network are described below. The examples provided are guidelines only and are not intended to be exhaustive.
5. Illegal/Criminal Activity
The Network must not be used in connection with any criminal, civil or in any other violation of the law, regulations, or other statutory requirements of any jurisdiction within which the Network is available. Such violations include but are not limited to;
- theft or infringement of any copyrights, patents, trademarks, trade secrets, or other intellectual property, export control violations, fraud, forgery, pyramid or other prohibited business schemes, and/or;
- theft, misappropriation, or unauthorised transmission or storage of funds, credit card information, personal information, or online services.
6. Security Violations
The Network may not be used to violate the security of any other network, service or any other system. Examples of security violations include; hacking, cracking (attempting to circumvent User authentication or security of any host, network, or account) into, monitoring, or using systems without authorisation; scanning ports; conducting denial of service attacks; distributing viruses or other harmful software; smurf attacks, and unauthorised alteration or destruction of websites or other information accessed or accessible via the Network.
The Network may not be used to transmit or store material of a threatening nature, including threats of death or physical harm, harassment, libel, and defamation of any person, organisation or other body corporate entity.
8. Offensive Materials
The Network may not be used to transmit or store material of an offensive nature, including obscene, pornographic, indecent, abusive and harmful materials, or to transmit to recipients’ material which is inappropriate for them, is threatening, harassing, invasive of privacy, defamatory, racist, obscene, indecent, offensive, abusive, harmful or malicious including such obscene or offensive materials to children.
The Network may not be used to spam which shall include the following activities:
- sending any unsolicited email that could be expected, in our judgement, to provoke complaints;
- sending email that does not accurately identify the sender, the sender's return address, and the email address of origin;
- sending unsolicited email without identifying in the email a clear and easy means to be excluded from receiving additional email from the originator of the email;
- collecting the responses of unsolicited email;
- sending email with charity requests, petitions for signatures, or any chain mail related materials;
- transmitting email by or on behalf of a User of the service which uses a mailbox for responses, or which promotes the content hosted or transmitted using the Network, or which states or implies in any way that Condor was involved in the transmission of such email or content;
- posting a single message or messages similar in content to multiple online forums or newsgroups;
- posting messages to an online forum or newsgroup that violate the rules of that forum or newsgroup.
10. Security System
The Network may not be used, directly or indirectly, with systems not configured and maintained in a manner which prevents their use by others in violation of this Policy. Examples include improperly securing a server for use by others to conduct a denial of service attack, distribute spam, and improperly securing an FTP server for use by others to illegally distribute licensed software.
The Network may not be used in a manner that damages its reputation or goodwill; violates another ISP's acceptable use policy and/or its terms of service; or interferes with another User of the Network.
User data will not be used for any marketing purposes passed on to third party companies.
The resale of the Network as a service is not permitted.
13. Prohibited Activity
The Network may not be used to attempt an activity prohibited by this Policy or its rules whether or not such activity is successful.
14. Indirect Use
Users are responsible for the security of their own devices that are directly or indirectly connected to Our Network.
A violation of this Policy by a person having indirect access to the Network through another customer or User will be considered a violation by that other customer or User, whether or not such use is within the knowledge or consent of the customer or other User. As an example, resellers are responsible for the actions of their customers to whom they directly and indirectly provide services using the Network. We will address and attempt to resolve complaints about the actions of customers of a reseller without the reseller.
15. Responses to Violations
- To achieve the objectives of this Policy, We will determine, in our absolute discretion, whether a use of the Network violates this Policy. Whilst it is not our intention to monitor, control, or censor Users communications on the Network, when We become aware of a violation of this Policy, We may take such action as We deem appropriate to address the violation as described below;
- Violations of this Policy may result in a demand for immediate removal of offending material, immediate temporary or permanent filtering, blocked access, suspension or termination of service, or other response appropriate to the violation, as We may determine in our absolute discretion;
- Wherever feasible, it is our preference to give notice so that violations may be addressed voluntarily; however, We reserve the right to act without notice when necessary, and as We see fit. To the extent doing so does not interfere with our ability to achieve the objectives of this Policy (as We determine in our discretion), We will attempt to limit any filtering, suspension, termination, or other response to the addresses, locations, Users, or services with respect to which the violation occurs. We will not accept and will not have any liability for the actions We take in response to violations of this Policy whether proven as such or otherwise. The responses described in this Policy are not exclusive and We may take any other technical or legal action as We deem appropriate in the circumstances;
- We may cooperate with system administrators at other ISPs or other network or computing service providers to enforce this Policy or a policy of another provider. We may involve, and will cooperate with, law enforcement authorities if criminal activity of any kind is suspected. Violators may also be subject to civil or criminal liability under the applicable law.
16. Incident Reporting
Complaints regarding violations of this Policy should be sent to Condor Ferries Customer Services at email@example.com. Where possible, please include details that would assist us in investigating and resolving the complaint (e.g. a copy of the offending transmission).
17. Contact Information
Please contact us at firstname.lastname@example.org if you have any questions or comments about this Policy.
18. Important Customer Information
- This Policy may not be by itself sufficient to prevent possible harm to persons who use the Network as a result of violations by others. Customers (and other Users of the Network) are responsible for taking such steps as they deem necessary to protect the security, integrity, and availability of their networks, systems, services, and information, and to restrict access to undesired content, sites, and services;
- We will not be liable to any customers or other Users of the Network for harm that results from violations of this Policy, even when We are aware of those violations;
- This Policy supplements, but does not supersede, the Conditions of Carriage (please see: Terms & Conditions) between Condor Ferries and its customers. A violation of this Policy by a customer will be considered a material breach of the customer's transport contract with Condor Ferries and will result in its termination or We may apply other reasonable consequences. No refunds or credits will be allowed in connection with the consequences of violations of this Policy.
19. Revisions to this Policy
We may revise this Policy at any time without notice, effective when posted to our public web site. Notice of revisions may also be provided by other means such as via email or regular mail.