Computer Science Wireless Network Usage and Policy Agreement
Introduction
The Computer Science Department at Florida State University provides Wireless Internet connectivity to its members.
Use of the service is subject to the terms in this Policy. As a user of this service you are responsible for you use of this service, and that you comply with the terms defined in this Policy. ANY USER WHO DOES NOT AGREE TO BE BOUND BY THIS POLICY SHOULD STOP USE OF THIS SERVICE AND NOTIFY THE SYSTEMS GROUP SO THEIR ACCOUNT MAY BE DISABLED.
Illegal Activity
The use of this Service for any activity which violates local, state, or federal law is a violation of this Policy.
Activities which are considered a violation of this Policy include, but are not limited to:
Posting or dissemination material which is unlawful, or material which violates copyright or intellectual property rights. Use of peer-to-peer networks to download and/or upload material which violates copyright or intellectual property rights. Using the service in an attempt to gain unauthorized access to another computer, electronic communications systems, or telecommunications system, regardless of the outcome.
Security of Radio Transmissions
You understand that data sent and received on the Wireless Network is not encrypted, or in any other way secured from wiretapping, interception, or eavesdropping.
You agree not to hold the Computer Science Department, Florida State University, or it’s employees responsible for any claims, losses, actions, damages, suits, or proceedings resulting from i) unauthorized access of your computer, or ii) interception of traffic sent or received using the Wireless Network.
You agree to take good faith measures to ensure your Computer Science login password is not sent over the network unencrypted or use the same password for other accounts.
Bandwidth and Other Limitations
You must ensure that your activities do not place any unusually large burden on the Wireless Network (as determined by the Computer Science Department).
You may not run a server in connection with the Wireless Network. Examples include, but are not limited to, running server software for http, irc, mail, ftp, multi-user interactive forums, game servers, and peer-to-peer network servers.
Violation of Acceptable Use Policy
The Computer Science Department reserves the right to investigate suspected violations of this Policy, including the gathering of information and the examination of network traffic from the user’s machine.
The Computer Science Department may disable a user’s access to the Wireless Network if they violate the terms set forth in this Policy.