iMobile3 Network Policy

The iMobile3Guest wireless network is for the use of iMobile3 guests and staff only. By accessing and using the wireless network you are consenting to system monitoring. Unauthorized use of, or access to, this network may subject you to disciplinary action and criminal prosecution.

By continuing you agree to our terms of service.

  1. Internet Access

    The guest wireless internet access provided by iMobile3 is for use free of charge to its guests and employees. Wireless access is provided on an “as is” and “as available” basis. iMobile3 does not warrant that this service will be uninterrupted, error-free, or free of viruses or other harmful components. No information you consider confidential should be transmitted via this network. By using this network, you agree to be solely responsible for the content of all information you disseminate. You also agree to use this network in responsible and lawful manner consistent with iMobile3 public image.

  2. Security, Privacy, & Confidentiality

    Users should be aware that there are security, privacy, and confidentiality risks inherent in wireless communications and associated technology and iMobile3 does not make any assurances or warranties relating to such risks. By using the guest wireless internet access, users agree that iMobile3 is not liable for any costs or damages, special, incidental or consequential, arising from the use of this service. iMobile3 does not control any materials, information, products or services on the Internet.

  3. Rights for Access Restriction

    Internet access is provided only as a courtesy and may not be available at any requested time. iMobile3 reserves the right to deny or restrict access to any user who abuses this network connection, such as excessive bandwidth consumption or using the network for any type of activity or purpose deemed by any court to be unlawful, harassing, abusive, criminal or fraudulent.

  4. Rights to Monitor

    iMobile3 reserves the right to monitor, intercept, and disclose any transmissions over this network connection and to provide user information, or use records, and other related information under certain circumstances (for example, in response to lawful process, orders, subpoenas, or warrants, or to protect our rights, users or property) to appropriate authorities.