Yesterday we told you about how you could use the TSA.Red WiFi network that is available at THQ. It is also available in at Southern DHQ and Booth College of Mission. We intend to move more sites to the solution because it really enables the kind of connectivity needed for us to focus on our mission.
Today we're going to look at the conditions of using TSA.Red. While there is an element that they're stating the obvious, it is really important to us given the reputation of The Salvation Army and our need to protect it as it is only the goodwill associated with it that generates income.
What follows are the conditions of using the TSA.Red WiFi connection. We think these are the kind of conditions you should have in place if your internet connection is being used by non-TSA staff and/or machines. Feel free to reuse this in your centre, but remember if you join the recommended Territorial WiFi network then you will automatically get TSA.Red (along with networks for TSA devices).
If you choose to continue, you are agreeing to comply with and be bound by the following terms and conditions of use. If you disagree with any part of these terms and conditions, you may not continue. Terms of use:
- Your use of any information or materials on sites you access is entirely at your own risk, for which we shall not be liable.
- You agree that, though this portal, you will not perform any of the following acts:
- Attempt to access devices or resources to which you have no explicit, legitimate rights
- Copy, reproduce, or transmit any copyrighted files or information other than in accordance with the requirements and allowances of the copyright holder
- Launch network attacks of any kind including port scans, DoS/DDoS, packet floods, replays or injections, session hijacking or interception, or other such activity with malicious intent
- Transmit malicious software such as viruses, Trojan horses, and worms
- Surreptitiously install software or make configuration changes to any device or application, by means of the installation or execution of key loggers, registry keys, or other executable or active application or script
- You agree that you will use the access provided here responsibly and with full regard to the safety, security, and privacy of all other users, devices, and resources.
- You agree that you will be mindful of the cultural sensitivities of others while using this portal so as not to provoke reaction or offense, and that you will not intentionally access pornographic, graphically violent, hateful, or other offensive material (as deemed by us) regardless of others´ sensitivities.
- You understand that we reserve the right to log or monitor traffic to ensure that these terms are being followed.
- You understand that unauthorized use of resources through this portal may give rise to a claim for damages and/or be a criminal offense.