Cisco Live Network Terms and Conditions
Cisco Live Network Terms and Conditions
Cisco Live Network Terms and Conditions
Cisco Live, in conjunction with the Cisco Live network operations center (NOC), is responsible for maintaining the
availability of the Cisco Live wireless network spectrum. In order to better manage and monitor the wireless
spectrum, and to identify rogue devices and possible misuse of the network, NOC staff will make periodic sweeps
of the Cisco Live wireless coverage area and, in strategic locations, make use of passive monitoring devices and
intrusion detection software.
Any unauthorized wireless devices operating within the Cisco Live wireless spectrum will be considered rogue
devices. As such, depending upon configuration, these devices may present a substantial security threat and will
be subject to removal from the network.
Authentication and encryption: Cisco Live employs WPA2-PSK (AES) encryption and requires use of a passcode
credential for authentication to the network.
● Send, receive, or make available any material that might be considered offensive, obscene, or indecent
● Send, receive, or make available any material that might infringe copyright, such as MP3 or other audio and
video formats
● Run peer-to-peer (P2P) file-sharing software
● Intercept or attempt to intercept other wireless transmissions for the purposes of eavesdropping
● Access or run utilities or services that might negatively impact the overall performance of the network or
deny access to the network, such as RF jamming or denial of service (DoS)
● Harass or cause annoyance, nuisance, or inconvenience to others
● Access or attempt to access systems or resources to which you are not authorized
● Provide services that may interfere with normal network operation
● Provide access to others, such as allowing a third party to use your credentials to access the network
Misuse of the wireless network or Cisco Live wireless spectrum will be taken extremely seriously. Such misuse
may lead to:
© 2019 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 2
Security and monitoring
In order to mitigate the clients’ exposure to external threats, users’ laptop PCs, tablets, phones, and handhelds
used to connect to the wireless network must:
© 2019 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 2 of 2