Condor Ferries
BOOK YOUR JOURNEY

FERRIES

FERRY + HOTEL

Select destination:

Your return date must be after your departure date.

PASSENGERS
16+
4 - 15
0 - 3

Maximum of 9 passengers allowed on the outward.

Please select at least one adult to travel.

HOW ARE YOU TRAVELLING?
Have you correctly declared your vehicle height? Find out more here.
Max Length 5m
Max length of car + towed vehicle 10m
Max length of motorhome 7m. For lengths over 7m please call 0345 609 1024 to book.

Please call 0345 609 1024 to book.

Click here
question-mark

If you are travelling on business or in a commercial vehicle please click here for Condor Ferries Freight.

Please note that any person or vehicle travelling for business or commercial venture, carrying commercial goods/samples will need to book via our freight teams and do not qualify for leisure fares. In addition, if the vehicle being taken is designed for the carriage of commercial goods it shall be reserved as freight regardless of its dimensions. For more information please call the Commercial team on 01481 728620 .

Condor Ferries | Onboard Wifi

Now you can SURF ONBOARD

Free 30 mins or 100mb

No activation

code required

Welcome to our onboard Wi-Fi page. Here you’ll find everything you need to know about our onboard Wi-Fi services.

Upgrade to high-speed

Browse

(up to 100 web pages)

Streaming Video

(20 mins)

Streaming music

(2hrs)

Browse

(up to 250 web pages)

Streaming Video

(40 mins)

Streaming music

(5hrs)

IMPORTANT INFORMATION

 

It is free to connect to the Condor Ferries Free Wi-Fi using the online portal. However, we are not responsible for any further costs of additional connect, services, or products purchased whilst using the connection.

 

Data roaming

An offshore Mobile Telephone Network, independent to Condor Ferries is also available which is not free. You will be charged by your network provider for any phone calls, messages or use of data whilst roaming on this network, these charges will be outlined by your network provider.


Despite a recent decision to no longer charge data roaming charges in EU countries, as of June 2017, this does not apply to the satellite network available on board. To avoid paying high data roaming charges, we recommend that you turn data roaming off on your mobile devices.


Condor Ferries is not responsible for any costs incurred by connecting to any other network. To avoid any additional charges, we recommend that you turn off data roaming and "Wi-Fi assist" on Apple devices.

 

WI-FI Acceptable Use Policy Terms and Conditions

You are about to access our onboard Wi-Fi service. You must read and accept the rules and terms of this Acceptable Use Policy before agreeing to use this service.

1. Introduction

This Acceptable Use Policy (AUP) specifies actions prohibited by Condor Ferries to Users of the Condor Ferries Wi-Fi Public Network (in this AUP referred to as the “Network”). In this policy the term "Network" shall mean "The Condor Ferries Wi-Fi Public Network". Users and You/Your means customers or anyone else who uses or accesses the Network. The Network is provided by Condor Limited with registered offices at New Jetty Offices, White Rock, St Peter Port, Guernsey, GY1 2LL (“Condor Ferries” or “We/Us/Our”). It is a resource from which We provide the Network to customers and other Users of the Network. Our objectives for operating and managing the Network include providing a service to customers that ensures;

  1. respect of User’s privacy;
  2. protection for the security and integrity of our Network;
  3. responsible use of our Networks, and;
  4. to comply with all applicable laws.

As the Network is shared by many Users, achievement of our objectives requires appropriate use by each User.

2. Policy Statement

Use of the Network contrary to the policy objectives and the rules set out herein is unacceptable and prohibited. A breach of the policy terms and rules may give rise to sanctions placed upon the User making such breach.

3. Scope

This Policy applies to all Users of the Network.

4. Uses Prohibited

Examples of prohibited uses of the Network are described below. The examples provided are guidelines only and are not intended to be exhaustive.

5. Illegal/Criminal Activity

The Network must not be used in connection with any criminal, civil or in any other violation of the law, regulations, or other statutory requirements of any jurisdiction within which the Network is available. Such violations include but are not limited to;

  1. theft or infringement of any copyrights, patents, trademarks, trade secrets, or other intellectual property, export control violations, fraud, forgery, pyramid or other prohibited business schemes, and/or;
  2. theft, misappropriation, or unauthorised transmission or storage of funds, credit card information, personal information, or online services.

6. Security Violations

The Network may not be used to violate the security of any other network, service or any other system. Examples of security violations include; hacking, cracking (attempting to circumvent User authentication or security of any host, network, or account) into, monitoring, or using systems without authorisation; scanning ports; conducting denial of service attacks; distributing viruses or other harmful software; smurf attacks, and unauthorised alteration or destruction of websites or other information accessed or accessible via the Network.

7. Threats

The Network may not be used to transmit or store material of a threatening nature, including threats of death or physical harm, harassment, libel, and defamation of any person, organisation or other body corporate entity.

8. Offensive Materials

The Network may not be used to transmit or store material of an offensive nature, including obscene, pornographic, indecent, abusive and harmful materials, or to transmit to recipients’ material which is inappropriate for them, is threatening, harassing, invasive of privacy, defamatory, racist, obscene, indecent, offensive, abusive, harmful or malicious including such obscene or offensive materials to children.

9. Spam

The Network may not be used to spam which shall include the following activities:

  1. sending any unsolicited email that could be expected, in our judgement, to provoke complaints;
  2. sending email that does not accurately identify the sender, the sender's return address, and the email address of origin;
  3. sending unsolicited email without identifying in the email a clear and easy means to be excluded from receiving additional email from the originator of the email;
  4. collecting the responses of unsolicited email;
  5. sending email with charity requests, petitions for signatures, or any chain mail related materials;
  6. transmitting email by or on behalf of a User of the service which uses a mailbox for responses, or which promotes the content hosted or transmitted using the Network, or which states or implies in any way that Condor was involved in the transmission of such email or content;
  7. posting a single message or messages similar in content to multiple online forums or newsgroups;
  8. posting messages to an online forum or newsgroup that violate the rules of that forum or newsgroup.

10. Security System

The Network may not be used, directly or indirectly, with systems not configured and maintained in a manner which prevents their use by others in violation of this Policy. Examples include improperly securing a server for use by others to conduct a denial of service attack, distribute spam, and improperly securing an FTP server for use by others to illegally distribute licensed software.

11. Other

The Network may not be used in a manner that damages its reputation or goodwill; violates another ISP's acceptable use policy and/or its terms of service; or interferes with another User of the Network.

User data will not be used for any marketing purposes passed on to third party companies.

12. Resale

The resale of the Network as a service is not permitted.

13. Prohibited Activity

The Network may not be used to attempt an activity prohibited by this Policy or its rules whether or not such activity is successful.

14. Indirect Use

Users are responsible for the security of their own devices that are directly or indirectly connected to Our Network.

A violation of this Policy by a person having indirect access to the Network through another customer or User will be considered a violation by that other customer or User, whether or not such use is within the knowledge or consent of the customer or other User. As an example, resellers are responsible for the actions of their customers to whom they directly and indirectly provide services using the Network. We will address and attempt to resolve complaints about the actions of customers of a reseller without the reseller.

15. Responses to Violations

  1. To achieve the objectives of this Policy, We will determine, in our absolute discretion, whether a use of the Network violates this Policy. Whilst it is not our intention to monitor, control, or censor Users communications on the Network, when We become aware of a violation of this Policy, We may take such action as We deem appropriate to address the violation as described below;
  2. Violations of this Policy may result in a demand for immediate removal of offending material, immediate temporary or permanent filtering, blocked access, suspension or termination of service, or other response appropriate to the violation, as We may determine in our absolute discretion;
  3. Wherever feasible, it is our preference to give notice so that violations may be addressed voluntarily; however, We reserve the right to act without notice when necessary, and as We see fit. To the extent doing so does not interfere with our ability to achieve the objectives of this Policy (as We determine in our discretion), We will attempt to limit any filtering, suspension, termination, or other response to the addresses, locations, Users, or services with respect to which the violation occurs. We will not accept and will not have any liability for the actions We take in response to violations of this Policy whether proven as such or otherwise. The responses described in this Policy are not exclusive and We may take any other technical or legal action as We deem appropriate in the circumstances;
  4. We may cooperate with system administrators at other ISPs or other network or computing service providers to enforce this Policy or a policy of another provider. We may involve, and will cooperate with, law enforcement authorities if criminal activity of any kind is suspected. Violators may also be subject to civil or criminal liability under the applicable law.

16. Incident Reporting

Complaints regarding violations of this Policy should be sent to Condor Ferries Customer Services at customer.care@condorferries.co.uk. Where possible, please include details that would assist us in investigating and resolving the complaint (e.g. a copy of the offending transmission).

17. Contact Information

Please contact us at customer.care@condorferries.co.uk if you have any questions or comments about this Policy.

18. Important Customer Information

  1. This Policy may not be by itself sufficient to prevent possible harm to persons who use the Network as a result of violations by others. Customers (and other Users of the Network) are responsible for taking such steps as they deem necessary to protect the security, integrity, and availability of their networks, systems, services, and information, and to restrict access to undesired content, sites, and services;
  2. We will not be liable to any customers or other Users of the Network for harm that results from violations of this Policy, even when We are aware of those violations;
  3. This Policy supplements, but does not supersede, the Conditions of Carriage (please see: Terms & Conditions) between Condor Ferries and its customers. A violation of this Policy by a customer will be considered a material breach of the customer's transport contract with Condor Ferri es and will result in its termination or We may apply other reasonable consequences. No refunds or credits will be allowed in connection with the consequences of violations of this Policy.

19. Revisions to this Policy

We may revise this Policy at any time without notice, effective when posted to our public web site. Notice of revisions may also be provided by other means such as via email or regular mail.