The Cambridge Building Society - Wi-Fi Service Terms and Conditions of Use

Please read these terms and conditions of use carefully before using this service.

In these special terms and conditions:

  • ‘The Cambridge’, ‘the Society’, ‘we’, ‘us’ and ‘our’ refer to The Cambridge Building Society; and
  • ‘you’ and ‘your’ refer to users of this service

1. This agreement sets out the terms and conditions of use for this service and is between The Cambridge Building Society and you. By using, viewing, transmitting, caching, storing and/or otherwise utilising the service, the services or functions offered in or by the service and/or the contents viewable through the service in any way, you have agreed to each and all of the terms and conditions set out below, and waive any right to claim ambiguity or error in this agreement. If you do not agree to each and all of these terms and conditions please do not use the service and leave the service immediately. We reserve the right, at our sole and absolute discretion, to change, modify, add, or remove portions of these terms at any time without notice and, unless otherwise indicated, such changes will become effective immediately; therefore, please check these terms periodically for changes. Your continued or subsequent use of the service following the posting of changes to this agreement will mean you accept those changes.

2. You agree to comply with the terms and conditions of use that are notified to you by The Cambridge Building Society. You use The Cambridge’s Wi-Fi service at your own risk. 

3. You are responsible for making sure the device or equipment you use to access the Wi-Fi service is suitable and has adequate security protection.

4. The Cambridge is not responsible for your use of the Wi-Fi service and does not provide anti-malware of any kind.

5. The service is provided over a public Wi-Fi network and this has inherent security risks. We cannot guarantee the service is secure, but we have taken steps to make the security risk as low as reasonably practicable. By using the service you assume all responsibility and risk for use of the service.

6. The Cambridge is not responsible for, nor is it liable for, data or content that you access or receive via the service.

7. The Cambridge does not guarantee the performance, security or availability of the Wi-Fi service.

8. The Cambridge at its discretion may block or limit access to certain websites.

9. The Cambridge may collect personal information about you and other individuals when you access the Wi-Fi service. The information collected will relate to your device address and the addresses of any websites you visit. This information will be treated as private and confidential unless we are required by law or regulations to disclose the information.

10. Use of the wireless network is subject to the general restrictions outlined below. If abnormal, illegal, or unauthorised behaviour is detected, including heavy consumption of bandwidth, The Cambridge reserves the right to permanently disconnect the offending device from the wireless network.

11. Examples of illegal uses (the following are examples only and do not comprise a comprehensive list of illegal uses):

11.1 Spamming and invasion of privacy - sending of unsolicited bulk and/or commercial messages over the internet, using the service or using the service for activities that invade another person’s privacy.

11.2 Intellectual property right violations - engaging in any activity that infringes or misappropriates the intellectual property rights of others, including patents, copyrights, trademarks, service marks, trade secrets, or any other proprietary right of any third party.

11.3 Accessing illegally or without authorisation computers, accounts, equipment or networks belonging to another party, or attempting to access or circumvent security measures of another system. This includes any activity that may be used as a precursor to an attempted system penetration, including, but not limited to, port scans, stealth scans, or other information gathering activity.

11.4 The transfer of technology, software, or other materials in violation of applicable export laws and regulations.

11.5 Export control violations.

11.6 Using the service in violation of applicable law and regulation, including, but not limited to, advertising, transmitting, or otherwise making available ponzi schemes, pyramid schemes, fraudulently charging credit cards, pirating software, or making fraudulent offers to sell or buy products, items, or services.

11.7 Making threats;

11.8 Distributing pornographic materials;

11.9 Child pornography.

12. Examples of unacceptable uses (the following are examples only and do not comprise a comprehensive list of unacceptable uses):

12.1 High bandwidth operations, such as large file transfers and media sharing with peer-to-peer programs (i.e. torrents).

12.2 Obscene or indecent speech or materials.

12.3 Defamatory or abusive language.

12.4 Using the service to transmit, post, upload, or otherwise making available defamatory, harassing, abusive, or threatening material or language that encourages bodily harm, destruction of property, harasses or causes needless anxiety to others.

12.5 Forging or misrepresenting message headers, whether in whole or in part, to mask the originator of the message.

12.6 Facilitating a violation of these terms of use.

12.7 Hacking.

12.8 Distribution of internet viruses, Trojan horses, or other destructive activities.

12.9 Distributing information regarding the creation of and sending internet viruses, worms, Trojan horses, pinging, flooding, mail-bombing, or denial of service attacks. Also, activities that disrupt the use of or interfere with the ability of others to effectively use the node or any connected network, system, service, or equipment.

12.10 Advertising, transmitting, or otherwise making available any software product, product, or service that is designed to violate these terms of use, which includes the facilitation of the means to spam, initiation of pinging, flooding, mail-bombing, denial of service attacks, and piracy of software.

12.11 The sale, transfer, or rental of the service to customers, clients or other third parties, either directly or as part of a service or product created for resale.

12.12 Seeking information on passwords or data belonging to another user.

12.13 Making unauthorised copies of proprietary software, or offering unauthorised copies of proprietary software to others.

12.14 Intercepting or examining the content of messages, files or communications in transit on a data network.