A free service for Super 8 guests. To get started, read through the following terms and conditions.
Super 8 Online Acceptable Use Terms and Conditions This following are policies ("these Policies") for use of the Super 8 wireless internet access service that is provided to our guests as an amenity. We use the term the "Service" to refer to that service and any related internet access services. The term "Super 8," "the hotel," "we," "our" or "us" refers to this hotel and any properties and/or business that are associated, through which you access the Service. The term "you" refers to any person or entity using the Service. The Internet is a tremendous resource that is used responsibly by millions of people every day. Unfortunately, it is sometimes abused. These terms and conditions are intended to protect Super 8 and its guests and the Internet community at large from irresponsible or, in some cases, illegal activities. These terms and conditions provide guidelines and are not meant to be exhaustive. Super 8 retains the right to prohibit or take action to stop or prevent activities that harm or may harm the Service or Super 8 or its reputation. Violation of these terms by you may result in suspension or termination of your access to the Service. These terms apply to all users of the Service or any of its components. IF YOU DO NOT AGREE TO BE BOUND BY THESE TERMS, YOU SHOULD IMMEDIATELY STOP USE OF THE SERVICE. Under normal circumstances, we do not actively monitor use of the Service or require editorial control over the content of any e-mail transmissions or other material created or available through the Service. Additionally, we do not have control over the manner in which our guests or other third parties behave. By publishing these terms and conditions, we do not promise you that all of our guests will abide by them. As discussed further below, we advise our guest to take precautions to protect against unauthorized access to your computer and files, the introduction of viruses and access by your children to pornography or other content you deem inappropriate. You Must Comply With Law and Respect the Property and Rights of Others. In using the Service, you must comply with all applicable federal, state, local and international laws, regulations and other governmental requirements. You may not use the Service to directly or indirectly: * Violate any such law, regulation or requirement. * Misappropriate the funds, property or data of any person. * Violate the copyrights, trademarks, trade secrets, patents or other property rights of any person, including, but not limited to, by downloading, using or distributing any music or other audio files, video, photographs or other visual material or any article, publication or other content without the permission of the owner. * Defraud, slander or defame any person. * Violate any person's privacy rights or use any person's name, image or likeness in violation of that person's so-called "publicity right " or other legally protected rights. * Threaten, harass or intimidate any person or create any nuisance. * Violate any other legal rights of any person. * Attempt or help another person to do any of the foregoing, whether or not successful. For example, prohibited activities include but are not limited to: * Transmitting, receiving or storing child pornography or any other illegal material. * Intentionally spreading any computer virus or other harmful software or programming. * Running a "pyramid" scheme, committing other fraud or engaging in other deceptive acts or practices. * Theft or unauthorized use of funds, property or credit card or other personal information. You should also be aware that many music and movie files found online today are pirated copies of copyrighted materials, and the use or distribution of such pirated files is a violation of these terms and copyright law. You May Not Violate the Security of Others. You may not directly or indirectly interfere with or gain or attempt to gain access to our or any other person's network, network access or control device, system, server, computer, software or data without the knowledge and consent of the hotel, guest or individual. Examples of prohibited activities include, but are not limited to: * Hacking, cracking into, monitoring or using networks, systems or Internet resources without authorization. * Accessing data not intended for you. * Logging into or making use of a server or account you are not authorized to access. *Intercepting, interfering with or redirecting e-mail intended for third parties, or any form of probing the security of other networks or systems or scanning ports, or other action for the unauthorized interception of data or harvesting of e-mail addresses. * Using any program, file, script, command or the transmission of any message or content of any kind, designed to interfere with a terminal session or the access or use of the Internet or any other means of communication. Using or distributing tools designed to compromise security, like password guessing programs, cracking tools, packet sniffers or network probing tools is prohibited. The Service May Not Be Used to Access or Distribute Offensive Materials. The Service is not be used directly or indirectly to host, access, download, store, post, distribute, transmit or re-transmit offensive or inciteful materials, including, but not limited to, threatening, harassing, malicious, racist, defamatory, libelous, treasonous, excessively violent, obscene, pornographic, indecent or hateful materials or materials constituting or encouraging conduct that violates any law, regulation or order, or provides guidance, or provides guidance, information or assistance with respect to causing damage or security breaches to Super 8's network. Do Not Use the Service for Spam or Other Unneccessary or Harassing E-Mails. You may not directly or indirectly use the Service to send mass or other duplicated unsolicited e-mail messages or to send any other unsolicited e-mail that provokes complaints. This includes, but is not limited to: * "Spamming," as that term from time to time is generally understood within the Internet service provider industry. * Sending unsolicited e-mails offering products or services, investment opportunities, charity requests, petitions for signatures, chain-mail or other solicitations. * Using Internet addresses that you do not have the right to use. * Distributing or using software designed to promote the sending of unsolicited bulk electronic messages. * Using distribution lists containing addresses that include those who have opted out. * Sending bulk electronic messages in quantities that exceed standard industry norms or that create the potential for disruption of Super 8's network or of the networks with which Super 8 interconnects. This also includes, but is not limited to, conduct that directly or indirectly encourages, permits, or relies on spamming or other duplicated unsolicited e-mail. Examples include using the Service to collect the responses from unsolicited e-mail (for example, through a Website advertised with spam) or providing spam "support services" such as e-mail dropboxes or the sale of spamware. The Service may not be used for unsolicited e-mail, even if not expressly prohibited by these terms, unless the message accurately identifies the sender, includes the sender's return e-mail address and the e-mail address of origin and states a clear and easy means for recipients to choose to be excluded from receiving additional e-mail from the originator. Release of Viruses, Blocking of Service or Other Interference with Usage by Others is Prohibited. You may not directly or indirectly restrict, block or otherwise interfere with the ability of any other guest to use or enjoy the Service. Among other things, this means you must not: * Intentionally release any virus, worm or other harmful programming or item. * Engage in any form of "denial of service" attack, as from time to time is generally understood within the Internet service provider industry, including, but not limited to, flooding of a network, overloading a service, attempting to "crash" a host or "mail bombing " (i.e., sending large volumes of e-mail with the apparent intent of denying another Internet user service). Misrepresentation of Your Identity You may not mislead anyone as to your identity, including, but not limited to, by pretending to be someone else, falsifying address information or modifying headers to conceal your true identity. This policy is not intended to prevent the use of screen-names, aliases or anonymous remailers for any legitimate purpose. Without limiting the scope of these terms, you may not use the Service to engage in any form of “phishing,” such as sending emails that falsely claim to be from a legitimate enterprise in an effort to cause recipients to give out private information that will be used for raiding bank accounts, identity theft or other illegal or illegitimate purposes. Internet "Chat" The Service allows you to participate in online "chat" discussions. The Service is not be used to perform chat "flooding" or other abusive practices. "Flooding" is deliberately repeating actions in quick succession in order to fill the screens of other Internet users with text. The Service may not be used to continue to send chat messages to an Internet user who has indicated his or her desire to not receive such messages. You Must Comply With the Rules of the Websites and Other Resources You Access Through the Service, you may have access to search engines, subscription services, newsgroups, chat areas, bulletin boards, Web pages and other resources that publish terms of use, polices, rules, guidelines or agreements to govern their use. You must review and obey any such terms, policies, rules, guidelines and agreements, which may include standards unique for the particular resource. Consequences if You Violate These Policies You are obligated to follow these terms and conditions. If while using the Service a guest violates these policies, access to the Service may be limited or terminated at the descretion of the hotel and its management. How You Can Report Suspected Violations Any complaints regarding violations of these terms and constions should be directed to the management of this hotel.
Click the button below to accept these terms and conditions.