Type III Guest Network Acceptable Use Policy (AUP)
Last Revised: 06/10/25

  1. Purpose The Type III Guest Network (“the Network”) is a wireless internet access service provided by Type III Technologies LLC (“the Company”) to authorized guests, including but not limited to patients, visitors, vendors, and temporary users (“Users”) while on the premises. This Acceptable Use Policy (AUP) defines the rules and guidelines for the use of the Network and serves to protect the integrity, security, and reliability of the Company’s IT infrastructure, as well as the privacy and safety of all stakeholders.> Use of the Network signifies acknowledgment, understanding, and acceptance of the terms within this AUP. Violations of this policy may result in termination of access, revocation of visitation privileges, civil or criminal liability, and notification to appropriate law enforcement authorities.
  2. Scope of Access and Eligibility. Access to the Network is:
    • Granted solely to temporary guests present on Type III Technologies LLC premises
    • Intended for short-term, non-commercial, general-purpose internet access
    • Subject to restrictions including timeouts, session limits, and bandwidth throttling
    • Provided on a revocable, non-exclusive, non-transferable basis
    The Network is strictly segmented from all internal systems, administrative networks, EHR/EMR systems, payment systems, and any systems that store or transmit PHI or sensitive business data.
  3. Authorized Use. Permissible activities include:
    • General web browsing
    • Personal email and web-based communication
    • Low-bandwidth audio/video streaming
    • Access to personal or cloud-based productivity tools
  4. Users must:
    • Ensure their devices are updated with current security patches and antivirus protections
    • Use the Network responsibly and avoid excessive bandwidth consumption
    • Comply with all local, state, and federal laws while connected.
  5. Prohibited Activities Users are expressly forbidden from:
    • Accessing, transmitting, downloading, or storing illegal, pornographic, hateful, discriminatory, or otherwise inappropriate content
    • Using P2P file sharing, torrents, or unlicensed software distribution
    • Attempting to bypass or interfere with firewalls, filters, DNS settings, or any network security mechanism
    • Engaging in network reconnaissance, sniffing, spoofing, scanning, or unauthorized packet capturing
    • Sending unsolicited bulk messages (spam), phishing emails, or distributing malware
    • Connecting any unauthorized network equipment (e.g., routers, repeaters, access points)
    • Attempting to gain unauthorized access to company systems, third-party services, or accounts
    • Using anonymization tools (e.g., Tor, I2P), tunneling software, or personal VPNs to circumvent restrictions
    • Sharing access credentials or allowing unauthorized users to connect
    • Hosting servers, relays, or proxy services on the Network
  6. Privacy and Monitoring
    • The Network is unsecured and does not guarantee confidentiality. All data is transmitted at the User’s own risk.
    • The Company reserves the right to monitor, log, and analyze all traffic over the Network.
    • Use of the Network constitutes consent to such monitoring.
    • The Company may share data with law enforcement or regulatory agencies upon lawful request.
    • There is no expectation of privacy while using the Network.
  7. Security and Risk Assumption
    • Users assume full responsibility for the security and integrity of their own devices.
    • The Company is not responsible for any loss, corruption, or theft of data while using the Network.
    • Users are strongly advised not to access sensitive personal accounts (e.g., banking, healthcare) while on the Network.
    • Any detected compromise, infection, or malicious activity originating from a User’s device will result in immediate disconnection.
  8. Liability and Indemnification
    • The Network is provided “as-is” and “as available,” with no warranties, express or implied.
    • The Company disclaims all liability for loss or damage resulting from use or inability to use the Network.
    • Users agree to indemnify and hold harmless Type III Technologies LLC, its employees, contractors, and affiliates from any claims, liabilities, damages, or losses resulting from their use of the Network.
  9. Enforcement and Consequences
    • Violations of this policy will result in immediate termination of access and may result in device blacklisting (via MAC or IP address)
    • The Company reserves the right to block specific services, sites, or devices at its discretion
    • Repeated or severe violations may be referred to appropriate law enforcement or civil authorities.
  10. Updates and Modifications
    • This AUP is subject to revision at any time without prior notice.
    • The most current version will be posted on this page.
    • Continued use of the Network constitutes acceptance of the current version.
  11. Governing Law and Jurisdiction This AUP shall be governed by and construed in accordance with the laws of the State of California and applicable federal statutes of the United States. Any legal action or proceeding arising under or relating to this policy shall be exclusively brought in the courts located within Los Angeles County, California.
Here’s the short version:
  • The Guest network is for basic stuff like email, browsing, or checking news.
  • Don’t use it to download illegal content or do anything shady.
  • No hacking, VPNs, torrents, or trying to access private systems.
  • It’s a public network, not a secure one – use it wisely.
  • We can see what happens on this network. If you break the rules, you’re off.
  • Use = agreement. If you don’t agree, don’t connect.
Enjoy your visit, and stay safe online!
Scroll to Top