For free WiFi access
please enter your details.
Part of the Inns Of Cornwall And Devon Family
Use of this system is subject to our
Usage Policy and Privacy Policy
Inns of Cornwall and Devon Privacy Policy Privacy Notice The security of your personal information is critically important to us. • We won’t ask you for personal information or store it unless we truly need it • We will ensure that personal data is kept secure against unauthorised or unlawful loss or disclosure • We regularly review our methods of handling personal information • We only disclose any personal data in compliance with proper procedures • We don’t keep personal information for longer than is necessary • We ensure that all staff follow good data protection practice In order to operate effectively and efficiently, we collect information about the people we work with. This includes members of the public; past and prospective employees and clients; partner organisations and stakeholders; and those who supply us with goods and services. This personal information must be handled properly under the Data Protection Act 1998 (‘the DPA’) and the General Data Protection Regulation 2016/679 (‘the GDPR’). This legislation regulates the way that we handle personal data that we collect in the course of carrying out our work and gives certain rights to people whose personal data we may hold. Personal data means any recorded information held by us and from which an individual can be identified, including names, addresses, telephone numbers and other personal details. This information is gathered in a variety of ways including website newsletter sign-up forms, pre-registration and booking forms, event notifications and feedback surveys. Your personal information will only be used within Inns of Cornwall and Devon and its associated trading companies as far as is reasonably necessary. It will not be disclosed to third parties without your explicit consent or unless we are required to do so by law. Your right to access, change or remove personal information You can ask to see the personal information we hold about you by notifying us at operations@iocd.co.uk you can ask us to change or remove this information unless we are required by law to retain it (for example, in the case of previous employees or tenants). Once we have received your request we will comply or explain why we cannot comply within 30 days. Marketing You may instruct us at any time not to process your personal information for marketing purposes. You can unsubscribe from our mailing list or update your preferences at any time. To do this, please use the online methods or contact us by emailing operations@iocd.co.uk. Website visitors Like most website operators, Inns of Cornwall and Devon and its associated companies collects non-personally-identifying information of the sort that web browsers and servers typically make available, such as the browser type, language preference, referring site, and the date and time of each visitor request. We collect this non-personally-identifying information to better understand how visitors use our websites. From time to time, we may release non-personally-identifying information in the aggregate, e.g. by publishing a report on trends in the usage of our websites. Privacy Notice changes Although most changes are likely to be minor, Inns of Cornwall and Devon may change this Privacy Notice from time to time and we encourage visitors to check this page regularly for any changes. Your continued use of our websites after any change in this Privacy Notice will constitute your acceptance of such change. Cookies We use cookies on our Inns of Cornwall and Devon websites and Wi-Fi access to recognise a device when a user visits our websites, to track users as they navigate our websites, to improve website usability, to analyse the use of our sites, to administer our websites, to improve the security of our websites and to personalise our websites for each user. Cookies do not typically contain any information that personally identifies a user. Most browsers allow you to refuse to accept cookies, but if you block cookies you will not be able to use all the features on our websites.
Inns of Cornwall and Devon Usage Policy Usage Notice By using our internet service, you hereby expressly acknowledge and agree that there are significant security, privacy and confidentiality risks inherent in accessing or transmitting information through the internet, whether the connection is facilitated through wired or wireless technology. Security issues include, without limitation, interception of transmissions, loss of data, and the introduction or viruses and other programs that can corrupt or damage your computer. Accordingly, you agree that the owner and/or provider of this network is NOT liable for any interception or transmissions, computer worms or viruses, loss of data, file corruption, hacking or damage to your computer or other devices that result from the transmission or download of information or materials through the internet service provided. Use of the wireless network is subject to the general restrictions outlined below. If abnormal, illegal, or unauthorized behavior is detected, including heavy consumption of bandwidth, the network provider reserves the right to permanently disconnect the offending device from the wireless network. Examples of Illegal Uses The following are representative examples only and do not comprise a comprehensive list of illegal uses: 1. Spamming and invasion of privacy - Sending of unsolicited bulk and/or commercial messages over the Internet using the Service or using the Service for activities that invade another's privacy. 2. Intellectual property right violations - Engaging in any activity that infringes or misappropriates the intellectual property rights of others, including patents, copyrights, trademarks, service marks, trade secrets, or any other proprietary right of any third party. 3. Accessing illegally or without authorization computers, accounts, equipment or networks belonging to another party, or attempting to penetrate/circumvent security measures of another system. This includes any activity that may be used as a precursor to an attempted system penetration, including, but not limited to, port scans, stealth scans, or other information gathering activity. 4. The transfer of technology, software, or other materials in violation of applicable export laws and regulations. 5. Export Control Violations 6. Using the Service in violation of applicable law and regulation, including, but not limited to, advertising, transmitting, or otherwise making available ponzi schemes, pyramid schemes, fraudulently charging credit cards, pirating software, or making fraudulent offers to sell or buy products, items, or services. 7. Uttering threats; 8. Distribution of pornographic materials to minors; 9. and Child pornography. Examples of Unacceptable Uses The following are representative examples only and do not comprise a comprehensive list of unacceptable uses: 1. High bandwidth operations, such as large file transfers and media sharing with peer-to-peer programs (i.e.torrents) 2. Obscene or indecent speech or materials 3. Defamatory or abusive language 4. Using the Service to transmit, post, upload, or otherwise making available defamatory, harassing, abusive, or threatening material or language that encourages bodily harm, destruction of property or harasses another. 5. Forging or misrepresenting message headers, whether in whole or in part, to mask the originator of the message. 6. Facilitating a Violation of these Terms of Use 7. Hacking 8. Distribution of Internet viruses, Trojan horses, or other destructive activities 9. Distributing information regarding the creation of and sending Internet viruses, worms, Trojan horses, pinging, flooding, mail-bombing, or denial of service attacks. Also, activities that disrupt the use of or interfere with the ability of others to effectively use the node or any connected network, system, service, or equipment. 10. Advertising, transmitting, or otherwise making available any software product, product, or service that is designed to violate these Terms of Use, which includes the facilitation of the means to spam, initiation of pinging, flooding, mail-bombing, denial of service attacks, and piracy of software. 11. The sale, transfer, or rental of the Service to customers, clients or other third parties, either directly or as part of a service or product created for resale. 12. Seeking information on passwords or data belonging to another user. 13. Making unauthorized copies of proprietary software, or offering unauthorized copies of proprietary software to others. 14. Intercepting or examining the content of messages, files or communications in transit on a data network.