TOWN Hall LTD.
By using our internet service, you hereby expressly acknowledge and agree that there are significant security, privacy and confidentiality risks inherent in accessing or transmitting information through the internet, whether the connection is facilitated through wired or wireless technology. Security issues include, without limitation, interception of transmissions, loss of data, and the introduction of viruses and other programs that can corrupt or damage your computer.
Accordingly, you agree that the owner and/or provider of this network is not liable for any interception or transmissions, computer worms or viruses, loss of data, file corruption, hacking or damage to your computer or other devices that result from the transmission or download of information or materials through the internet service provided.
Use of the wireless network is subject to the general restrictions outlined below. If abnormal, illegal, or unauthorised behaviour is detected, including heavy consumption of bandwidth, the network provider reserves the right to permanently disconnect the offending device from the wireless network.
The following are representative examples only and do not comprise a comprehensive list of illegal uses:
The following are representative examples only and do not comprise a comprehensive list of unacceptable uses:
Intercepting or examining the content of messages, files or communications in transit on a data network.
High bandwidth operations, such as large file transfers and media sharing with peer-to-peer programs (i.e.torrents).
Obscene or indecent speech or materials.
Defamatory or abusive language.
Using the Service to transmit, post, upload, or otherwise making available defamatory, harassing, abusive, or threatening material or language that encourages bodily harm, destruction of property or harasses another.
Forging or misrepresenting message headers, whether in whole or in part, to mask the originator of the message.
Facilitating a Violation of these Terms of Use.
Distribution of Internet viruses, Trojan horses, or other destructive activities.
Distributing information regarding the creation of and sending Internet viruses, worms, Trojan horses, pinging, flooding, mail-bombing, or denial of service attacks. Also, activities that disrupt the use of or interfere with the ability of others to effectively use the node or any connected network, system, service, or equipment.
This site uses cookies to improve your online experience, allow you to share content on social media, measure traffic to this website and display customised ads based on your browsing activity.