Feeds

Wi-Fi service breaches ISP conditions

Fon and games

Remote control for virtualized desktops

A router designed to share broadband internet connections with third parties appears to break the terms and conditions of seven of the top 10 UK internet service providers.

Fon.com offers Wi-Fi routers for as little as €5 and encourages connection sharing in a bid to build a Wi-Fi community, but its policies could put users at odds with their providers.

OUT-LAW has examined the terms and conditions of the 10 biggest UK ISPs as rated by research firm Point Topic. Only two of the ISPs, Blueyonder from Telewest and Orange Broadband, do not ban the sharing of a connection with third parties.

Seven of the ISPs, including BT, NTL and Tiscali, ban connection sharing explicitly. One ISP, AOL, bans sharing but only if the access is sold. Fon does encourage users to charge for access.

The Fon system is designed to create an informal network of users. If you buy a Fon router you receive a username and password. If you have a Wi-Fi-enabled laptop and come into range of another Fon router you can sign on with your Fon username and password and use that internet access. If you share your Wi-Fi for free at your own home then you can use any Fon connection for free. If you don't share your own access you can use any other Fon point for €3 per day, according to Fon. If you decline the right to have free roaming access you can share 50 per cent of the revenue generated by charging that €3 a day for your access.

Though individual ISP policies tend to forbid sharing, Tim Snape of Internet Service Providers Association (ISPA) says that the idea is a good one. "It sounds like a really good thing to do," he said. "Anything that makes it easier for the consumer to get the benefit of the internet is a good thing. There are negatives that need to be addressed but our thinking is that it is good for the consumer."

"If it is being used for normal use, browsing a few websites, a bit of email, then the amount of traffic is so negligible it's not an issue," said Snape. "But if it's being used to download thousands of CDs then that is an issue but that would apply if it was an individual who wasn't sharing it. It's abuse that ISPs don't like."

A major concern for Wi-Fi users who share a connection is what the connection is used for. Should a third party use the connection for illegal activities, an investigation would lead to the address of the person whose network was shared.

In Fon's case, though, each user must already be a Fon subscriber and must sign in to use the network, meaning that everyone using the network can be identified. "What Fon are doing seems to be the right thing," said Snape. "The key to resolving this problem is being able to identify the users." Fon did not comment when contacted by OUT-LAW.

Copyright © 2006, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

Intelligent flash storage arrays

More from The Register

next story
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
NASA launches new climate model at SC14
75 days of supercomputing later ...
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
You think the CLOUD's insecure? It's BETTER than UK.GOV's DATA CENTRES
We don't even know where some of them ARE – Maude
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
DEATH by COMMENTS: WordPress XSS vuln is BIGGEST for YEARS
Trio of XSS turns attackers into admins
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.