Feeds

Wi-Fi service breaches ISP conditions

Fon and games

Gartner critical capabilities for enterprise endpoint backup

A router designed to share broadband internet connections with third parties appears to break the terms and conditions of seven of the top 10 UK internet service providers.

Fon.com offers Wi-Fi routers for as little as €5 and encourages connection sharing in a bid to build a Wi-Fi community, but its policies could put users at odds with their providers.

OUT-LAW has examined the terms and conditions of the 10 biggest UK ISPs as rated by research firm Point Topic. Only two of the ISPs, Blueyonder from Telewest and Orange Broadband, do not ban the sharing of a connection with third parties.

Seven of the ISPs, including BT, NTL and Tiscali, ban connection sharing explicitly. One ISP, AOL, bans sharing but only if the access is sold. Fon does encourage users to charge for access.

The Fon system is designed to create an informal network of users. If you buy a Fon router you receive a username and password. If you have a Wi-Fi-enabled laptop and come into range of another Fon router you can sign on with your Fon username and password and use that internet access. If you share your Wi-Fi for free at your own home then you can use any Fon connection for free. If you don't share your own access you can use any other Fon point for €3 per day, according to Fon. If you decline the right to have free roaming access you can share 50 per cent of the revenue generated by charging that €3 a day for your access.

Though individual ISP policies tend to forbid sharing, Tim Snape of Internet Service Providers Association (ISPA) says that the idea is a good one. "It sounds like a really good thing to do," he said. "Anything that makes it easier for the consumer to get the benefit of the internet is a good thing. There are negatives that need to be addressed but our thinking is that it is good for the consumer."

"If it is being used for normal use, browsing a few websites, a bit of email, then the amount of traffic is so negligible it's not an issue," said Snape. "But if it's being used to download thousands of CDs then that is an issue but that would apply if it was an individual who wasn't sharing it. It's abuse that ISPs don't like."

A major concern for Wi-Fi users who share a connection is what the connection is used for. Should a third party use the connection for illegal activities, an investigation would lead to the address of the person whose network was shared.

In Fon's case, though, each user must already be a Fon subscriber and must sign in to use the network, meaning that everyone using the network can be identified. "What Fon are doing seems to be the right thing," said Snape. "The key to resolving this problem is being able to identify the users." Fon did not comment when contacted by OUT-LAW.

Copyright © 2006, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

Secure remote control for conventional and virtual desktops

More from The Register

next story
The Return of BSOD: Does ANYONE trust Microsoft patches?
Sysadmins, you're either fighting fires or seen as incompetents now
Microsoft: Azure isn't ready for biz-critical apps … yet
Microsoft will move its own IT to the cloud to avoid $200m server bill
US regulators OK sale of IBM's x86 server biz to Lenovo
Now all that remains is for gov't offices to ban the boxes
Flash could be CHEAPER than SAS DISK? Come off it, NetApp
Stats analysis reckons we'll hit that point in just three years
Oracle reveals 32-core, 10 BEEELLION-transistor SPARC M7
New chip scales to 1024 cores, 8192 threads 64 TB RAM, at speeds over 3.6GHz
Object storage bods Exablox: RAID is dead, baby. RAID is dead
Bring your own disks to its object appliances
Nimble's latest mutants GORGE themselves on unlucky forerunners
Crossing Sandy Bridges without stopping for breath
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.