Wireless Access
CEI is happy to offer guest Wi-Fi for all students! It is impossible to guarantee the service or specific rates of speed. We also have no control over the information obtained through the Internet and cannot be held responsible for its content or accuracy. Use of the service is subject to the user’s own risk. We reserve the right to remove, block, filter, or restrict by any other means any material that, in our sole discretion, may be illegal, may subject us to liability, or may violate this Policy. We will cooperate with legal authorities and/or third parties in the investigation of any suspected or alleged crime or civil wrong. Violations of this Policy may result in suspension or termination of access to the Service, other resources, or other actions as detailed below.
Responsibilities of Service Users
Users are responsible for ensuring they are running up-to-date anti-virus software on their wireless devices. Users must be aware that, as they connect their devices to the Internet through the Service, they expose their devices to worms, viruses, Trojan horses, denial-of-service attacks, intrusions, packet sniffing, and other abuses by third parties. Users must respect all copyrights. Downloading or sharing copyrighted materials is strictly prohibited. The running of programs, services, systems, processes, or servers by a single user or group of users that may substantially degrade network performance or accessibility will not be allowed. Electronic chain letters and mail bombs are prohibited. Connecting to "Peer to Peer" file sharing networks or downloading large files, such as CD ISO images, is also prohibited. Accessing another person's computer, computer account, files, or data without permission is prohibited. Attempting to circumvent or subvert system or network security measures is prohibited. Creating or running programs designed to identify security loopholes, decrypt intentionally secured data, or gain unauthorized access to any system is prohibited. Using any means to decode or otherwise obtain restricted passwords or access control information is prohibited. Forging the identity of a user or machine in electronic communication is prohibited. Saturating network or computer resources to the exclusion of another's use, for example, by overloading the network with traffic such as emails or legitimate (file backup or archive) or malicious (denial of service attack) activity, is prohibited. Users understand that wireless Internet access is inherently not secure, and users should adopt appropriate security measures when using the Service. We highly discourage users from conducting confidential transactions (such as online banking, credit card transactions, etc.) over any wireless network, including this Service. Users are responsible for the security of their own devices.
Limitations of Wireless Network Access
We are not liable for any damage, undesired resource usage, or detrimental effects that may occur to a user's device and/or software while the user’s device is attached to the Service. The user is responsible for any actions taken from his or her device, whether intentional or unintentional, that damage or otherwise affect other devices or users of the Service. The user hereby releases the Company from liability for any loss, damage, security infringement, or injury that the user may sustain as a result of being allowed access to the Service. The user agrees to be solely responsible for any such loss, infringement, damage, or injury.