Public internet access: who is responsible?

In the first of a series of articles looking at business issues faced by IT managers, we look at the steps companies need to take if they open their networks up to visitors.

As Reeves points out, some services, including those that distribute illegal content, are now quite adept at hiding behind commonly used ports such as port 80, so firewalls that can look inside the packets themselves. "Canny security people set up firewalls so they can look inside the packets, and figure out what the traffic is," he says.

But simply segregating traffic, or scanning it at the technical level, is not enough to protect a company from possible legal action, nor to protect its bandwidth. According to Quocirca's Longbottom, at the very least companies need to have acceptable usage policies for guest access, wired or wireless.

"For legality's sake, it is always best to give out some T&Cs, on-line, so that you can verify that at least they were put in front of the user," he says.

"Also, if a user were to get a virus from your network, then they may have a case against you, if you gave them express permission to use the network. So, make clear in the T&Cs that it is buyer beware."

Featured Resources

How inkjet can transform your business

Get more out of your business by investing in the right printing technology

Download now

Journey to a modern workplace with Office 365: which tools and when?

A guide to how Office 365 builds a modern workplace

Download now

Modernise and transform your sales organisation

Learn how a modernised sales process can drive your business

Download now

Your guide to managing cloud transformation risk

Realise the benefits. Mitigate the risks

Download now

Most Popular


How to use Chromecast without Wi-Fi

5 Feb 2020

The top ten password-cracking techniques used by hackers

10 Feb 2020
operating systems

How to fix a stuck Windows 10 update

12 Feb 2020
Microsoft Windows

Windows 7 bug blocks users from shutting down their PCs

10 Feb 2020