Terms of Use \

Use of Porth Wifi Portal (“the Portal”) is subject to these Terms of Use.


There are significant security, privacy and confidentiality risks inherent in accessing or transmitting information over the internet, whether the connection is facilitated through wired or wireless technology. Security issues include, without limitation, interception of transmissions, loss of data, and the introduction of viruses and other programs that can corrupt or damage your computer.

Accordingly, you understand and agree that the owner and provider of this network is NOT liable for any interception or transmissions, computer worms or viruses, loss of data, file corruption, hacking or damage to your computer or other devices that result from the transmission or download of information or materials through the internet service provided.

Acceptable use

The Portal is offered for legitimate internet usage only. If abnormal, illegal, or unauthorized behaviour is detected, including heavy consumption of bandwidth or any of the activities listed below, the network provider reserves the right to permanently disconnect the offending device from the wireless network. \

The following is a non-exhaustive list of examples of unacceptable use of the network :

  • High bandwidth operations, such as large file transfers and media sharing with peer-to-peer programs (including torrents and news servers).
  • Obscene or indecent speech or materials.
  • Defamatory or abusive language.
  • Using the Portal to transmit, post, upload, or otherwise making available defamatory, harassing, abusive, or threatening material or language that encourages bodily harm, destruction of property or harasses another.
  • Forging or misrepresenting message headers, whether in whole or in part, to mask the originator of the message.
  • Facilitating a violation of these Terms of Use.
  • Hacking.
  • Distribution of viruses, worms, trojan horses, or other destructive activities.
  • Distributing information regarding the creation of and sending viruses, worms, trojan horses, pinging, flooding, mail-bombing, or denial of service attacks. Also, activities that disrupt the use of or interfere with the ability of others to effectively use the node or any connected network, system, service, or equipment.
  • Advertising, transmitting, or otherwise making available any software product, product, or service that is designed to violate these Terms of Use, which includes the facilitation of the means to spam, initiation of pinging, flooding, mail-bombing, denial of service attacks, and piracy of software.
  • The sale, transfer, or rental of the Portal to customers, clients or other third parties, either directly or as part of a service or product created for resale.
  • Seeking information on passwords or data belonging to another individual.
  • Making unauthorised copies of proprietary software, or offering unauthorised copies of proprietary software to others.
  • Intercepting or examining the content of messages, files or communications in transit on a data network.


Menter Mon is committed to respecting the privacy of the personal information of the individuals with whom we interact. We collect, use and disclose the personal information of those individuals who use our network in accordance with our Privacy Policy.