Public internet access: who is responsible?
In the first of a series of articles looking at business issues faced by IT managers, we look at the steps companies need to take if they open their networks up to visitors.

As Reeves points out, some services, including those that distribute illegal content, are now quite adept at hiding behind commonly used ports such as port 80, so firewalls that can look inside the packets themselves. "Canny security people set up firewalls so they can look inside the packets, and figure out what the traffic is," he says.
But simply segregating traffic, or scanning it at the technical level, is not enough to protect a company from possible legal action, nor to protect its bandwidth. According to Quocirca's Longbottom, at the very least companies need to have acceptable usage policies for guest access, wired or wireless.
"For legality's sake, it is always best to give out some T&Cs, on-line, so that you can verify that at least they were put in front of the user," he says.
"Also, if a user were to get a virus from your network, then they may have a case against you, if you gave them express permission to use the network. So, make clear in the T&Cs that it is buyer beware."
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
-
Why are many men in tech blind to the gender divide?
In-depth From bias to better recognition, male allies in tech must challenge the status quo to advance gender equality
By Keri Allan
-
BenQ PD3226G monitor review
Reviews This 32-inch monitor aims to provide the best of all possible worlds – 4K resolution, 144Hz refresh rate and pro-class color accuracy – and it mostly succeeds
By Sasha Muller