eduroam for Android Devices

Similar documents
UCLan-Wireless for Apple iphone

eduroam for Windows Vista

eduroam for Windows Vista

PTLGateway Acceptable Use Policy

TERMS OF USE Terms You Your CMT Underlying Agreement CMT Network Subscribers Services Workforce User Authorization to Access and Use Services.

Electronic Network Acceptable Use Policy

Acceptable Use Policy

Acceptable Use Policy. Effective January 2017

Acceptable Use Policy ("AUP")

: Acceptable Use Policy

Glenwood Telecommunications, Inc. Acceptable Use Policy (AUP)

Acceptable Use Policy (AUP)

Brazosport Independent School District Employee/Agent Acceptable Use Agreement For Internet/Network Access and Use

PDMS SaaS Customer Code of Conduct

Acceptable Use Policy

NUCONNECT INTERNET ACCEPTABLE USE POLICY

Acceptable Use and Publishing Policy

APPLICATION TO OPEN PORTS THROUGH THE FIREWALL

Acceptable Use Policy

Fair and acceptable usage policy

ACCEPTABLE USE POLICY (AUP) 3W INFRA reserves the right to unilaterally amend the conditions set out in the Acceptable Use Policy (the Policies ).

IT ACCEPTABLE USE POLICY

PDMS SaaS Customer Code of Conduct

USAGE POLICIES. is defamatory, offensive, abusive, indecent, obscene, or constitutes harassment;

WEBSITE USAGE TERMS AND CONDITIONS

As Titanic Quarter we are delighted to provide telephone line and broadband services to you.

USE POLICY. iprimus.com.au

Any reference in the Term to you or your means you as a user of the Website.

Terms and Conditions of use for the

Acceptable Use Policy

Midstate Telephone & Midstate Communications. Acceptable Use Policy

SMS SERVICE PROVISION

2. VIOLATIONS OF ACCESSHOSTING.COM S ACCEPTABLE USE POLICY. b. Harm to minors. Using the Services to harm, or attempt to harm, minors in any way.

ACCEPTABLE USE POLICY

SCALARR PRIVACY POLICY

Acceptable Use Policy Updated 1/16/2018

TERMS AND CONDITIONS FOR USE OF THE SAFARICOM PREPAY BLACKBERRY SERVICE

Acceptable Use Policy

REGULATION BOARD OF EDUCATION FRANKLIN BOROUGH

Acceptable Use Policy

COACH.COM - PRIVACY POLICY

II.C.4. Policy: Southeastern Technical College Computer Use

You may contact The Translation Network by at You may also call The Translation Network at

User may choose to continue or stop using the Service as needed. User continuing

MERIDIANSOUNDINGBOARD.COM TERMS AND CONDITIONS

UCL Policy on Electronic Mail ( )

Service Specific Terms & Conditions

Breckenridge Financial Supplies Website Use Policy

Sanuk Systems Broadband Service. Terms and Conditions

Website Privacy Policy

Acceptable Use Policy

TERMS & CONDITIONS. Complied with GDPR rules and regulation CONDITIONS OF USE PROPRIETARY RIGHTS AND ACCEPTABLE USE OF CONTENT

Computer Use and File Sharing Policy

2. What is Personal Information and Non-Personally Identifiable Information?

Jacksonville State University Acceptable Use Policy 1. Overview 2. Purpose 3. Scope

TERMS AND CONDITIONS OF PROVIDING ELECTRONIC SERVICES. 1. General provisions

Spree Privacy Policy

Privacy Statement of Taiwan Cooperative Bank

NOOTRY TERMS OF SERVICE

Funding University Inc. Terms of Service

Sure Broadband Services Service Specific Terms and Conditions

DATA PROTECTION POLICY THE HOLST GROUP

Acceptable Use Policy

ACCEPTABLE USE POLICY

The following is the Lightning IP Acceptable Usage Policy ( AUP ) for all Users of the Lightning IP Services. In General

The AUP applies to all Snowball products and services but is in particular applicable to internet services.

Terms and Conditions of Mobile Phone Service (Post-Paid) Between Operator and Subscriber

Online Privacy Notice

Compass Consulting Group Terms of Use & Privacy Policy. Last Updated: 10/1/2018

Acceptable Use Policy

WYANDOTTE MUNICIPAL SERVICES ACCEPTABLE USE POLICY

NebraskaLink Acceptable Use Policy

Wi-Fi Troubleshooting Guide

This policy also applies to personal information about you that the Federation collects from any other third party.

ACCEPTABLE USE POLICY

Acceptable Use Policy

Terms and Conditions

BT Product and Services Agreement (PSA) Apps from BT Service Schedule

Wi-Fi Troubleshooting Student IT

Privacy Policy Effective Date - May 2017

DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY

Privacy Policy. Third Party Links

BUZCOIN TOKENS SALE PRIVACY POLICY. Last updated:

1. INTRODUCTION 2. OUR RIGHTS AND INTELLECTUAL PROPERTY

Sure Unlimited, Sure Pro Broadband, Sure Pro SDSL, Sure Pro VDSL Services

GhostFiber Acceptable Use Policy

The Readlyn Telephone Company dba RTC Communications NETWORK MANAGEMENT AND ACCEPTABLE USE POLICY Internet Service

TERMS AND CONDITIONS. 1. Registering with Us. 2. Orders. 3. User Conduct.

POLICY 8200 NETWORK SECURITY

2.1 Website means operated and owned by UCS Technology Services, including any page, part of element thereof;

1 Page. Website Privacy Policy

Cleveland State University General Policy for University Information and Technology Resources

13. Acceptable Use Policy

EDENRED COMMUTER BENEFITS SOLUTIONS, LLC PRIVACY POLICY. Updated: April 2017

Acceptable Use Policy

Corporate Policy. Revision Change Date Originator Description Rev Erick Edstrom Initial

BUCKEYE INTERNET SERVICE ACCEPTABLE USE POLICY

Maritime Union of Australia. Privacy Policy 2014

Janie Appleseed Network Privacy Policy

region16.net Acceptable Use Policy ( AUP )

Transcription:

Please note: You must read the Wireless Network Fair Usage and Security Policy at the end of this guide. This ensures that you are aware of all the rules regarding Wireless services and prevent your internet access from being stopped. By using the Wireless service you are agreeing to these terms and conditions. Please note: Please make sure that Wireless is switched on. This guide has been created using the Samsung Galaxy so the layout of the settings on other Android devices may differ but the settings for eduroam are the same. The following guide will allow you to connect your Android device to the eduroam service available on campus. 1. Select Settings on the Home screen. 2. Select Wireless and Network Page 1 of 7

3. Select Wi-Fi Settings 4. Select Wi-Fi to turn on Wi-Fi Page 2 of 7

5. Select eduroam 6. Check the setting are as follows: EAP method: PEAP Select Phase 2 authentication drop down arrow 7. Check the setting as follows: Phase 2 authentication :MSCHAPV2 Page 3 of 7

8. Enter the following information: Identity: UCLan email address Password: UCLan Password Anonymous Identity: should be blank Select Connect Please Note: You will now be connected to the eduroam wireless service, you will be notified to confirm that you are connected. Ensure you look for the Wi-Fi symbol at the top of your screen to confirm whether you are using Wi-Fi not 3G. Please Note: You should now be able to browse the internet. Page 4 of 7

Wireless Network Service Fair Usage and Security Policy Please read this document fully and carefully LIS reserves the right to amend or substitute the terms of this policy at any time. Any such amendment or substitution shall be posted on the LIS website and is automatically effective to all Users of the Wireless Network Service at the University of Central Lancashire when adopted by LIS. Why LIS has this Policy This policy is designed to make sure LIS can give you, the User of the Wireless Network Service at the University of Central Lancashire, a service that is fast and reliable. The policy is also designed to limit exposure to legal risk to you and UCLan arising from your use of the Wireless Network Service. Your Computer Security You are responsible for the security of your computer while connected to the Wireless Network Service as follows :- Security patches must be applied Appropriate anti-virus and anti-spyware software must be installed and set to update automatically You must not knowingly or negligently download any electronic material containing a virus, trojan or other computer program known or likely to interrupt, impair, damage, destroy or limit the functionality of any computer software, hardware or telecommunications equipment owned by UCLan or any other Internet user or person. LIS accepts no responsibility for the potential consequences of you failing to employ adequate security measures on your computer while connected to the Wireless Network Service. Page 5 of 7

Downloading Software The downloading and installation of software and other resources from the Internet is done entirely at your own risk. LIS is not responsible for any unwanted effect on your computer that may result from doing so. It is your responsibility to comply with the laws of copyright and to abide by any software license agreements that may apply. What can the Wireless Network Service NOT be Used for? The Wireless Network Service must not be used for Any unlawful, criminal, fraudulent or otherwise illegal purposes or activities Activities which breach the rights of any third party, such as the downloading, streaming or distribution of any copyrighted material of any kind Collecting, streaming, distributing or accessing any material that you know, or reasonably should know, cannot be legally collected, streamed, distributed or accessed Commercial use either self-employed or on behalf of an employer Sending or uploading unsolicited emails, advertising or promotional materials, offering to sell any goods or services, or conducting or forwarding surveys, contests or chain letters Attempting or accomplishing access to any computer system, network or account without consent or otherwise where such access is not intended for you Viewing, modifying or otherwise tampering with any data or system without owner s consent or where it is otherwise not intended you should do so Probing the security of any computer system, network or account Impairing the function of, or interfering with the proper operation of, the Wireless Network Service or any other computer system or network in any manner Consciously acting to harass, cause annoyance, anxiety or inconvenience to, invade the privacy of, or disrupt the activities of other users of the Wireless Network Service or users of any other computer system in any manner What About Excessive Network Usage? The vast majority of users of the Wireless Network Service will not have a problem under this Fair Usage Policy. However, if it is felt that your Internet activities are excessive, LIS may enquire and ask your reasons for such high activity. you may be given a written warning (by email or otherwise). If the levels of activity do not immediately decrease after the warning, LIS may suspend your connection for a fixed period of time. In extreme circumstances, LIS reserves the right to terminate your usage of the Wireless Network Service. Page 6 of 7

What Happens if this Policy is Breached? If any use of the Wireless Network Service constitutes a breach of this Policy, LIS may, at its sole discretion, a) give you notice to stop the unacceptable use(s), b) suspend service for a fixed period or c) terminate your connection (with or without notice as LIS considers appropriate). Page 7 of 7