All Scripture quotations unless marked otherwise are taken from the Common English Bible ©2011, published by Abingdon Press. Used by permission. All rights reserved.
All other content on this website unless marked otherwise belongs the Oberlin United Methodist Church and may not be used, copied or distributed without express written permission.
Wireless Network Access – WiFi – Public Wireless Network
By using our internet service, you hereby expressly acknowledge and agree that there are significant security, privacy and confidentiality risks inherent in accessing or transmitting information through the internet, whether the connection is facilitated through wired or wireless technology. Security issues include, without limitation, interception of transmissions, loss of data, and the introduction or viruses and other programs that can corrupt or damage your computer.
Accordingly, you agree that the owner and/or provider of this network is NOT liable for any interception or transmissions, computer worms or viruses, loss of data, file corruption, hacking or damage to your computer or other devices that result from the transmission or download of information or materials through the internet service provided.
Accordingly, you agree that Oberlin United Methodist Church information technology department may also restrict, filter, and/or block access to content that violate our policies. Oberlin United Methodist will also force WiFi users to install our SSL certificate to monitor traffic on our network(s). Oberlin United Methodist Church may also keep logs of internet traffic for one (1) year. These logs may include the following:
- Device name
- Device MAC Address
- Web traffic sent to your device
- Web traffic your device has sent
- Websites you’ve visited
Use of the wireless network is subject to the general restrictions outlined below. If abnormal, illegal, or unauthorized behavior is detected, including heavy consumption of bandwidth, the network provider reserves the right to permanently disconnect the offending device from the wireless network.
Examples of Illegal Uses
The following are representative examples only and do not comprise a comprehensive list of illegal uses:
- Spamming and invasion of privacy – Sending of unsolicited bulk and/or commercial messages over the Internet using the Service or using the Service for activities that invade another’s privacy.
- Intellectual property right violations – Engaging in any activity that infringes or misappropriates the intellectual property rights of others, including patents, copyrights, trademarks, service marks, trade secrets, or any other proprietary right of any third party.
- Accessing illegally or without authorization computers, accounts, equipment or networks belonging to another party, or attempting to penetrate/circumvent security measures of another system. This includes any activity that may be used as a precursor to an attempted system penetration, including, but not limited to, port scans, stealth scans, or other information gathering activity.
- The transfer of technology, software, or other materials in violation of applicable export laws and regulations.
- Export Control Violations
- Using the Service in violation of applicable law and regulation, including, but not limited to, advertising, transmitting, or otherwise making available ponzi schemes, pyramid schemes, fraudulently charging credit cards, pirating software, or making fraudulent offers to sell or buy products, items, or services.
- Uttering threats;
- Distribution of pornographic materials to minors;
- and Child pornography.
Examples of Unacceptable Uses
The following are representative examples only and do not comprise a comprehensive list of unacceptable uses:
- High bandwidth operations, such as large file transfers and media sharing with peer-to-peer programs (i.e.torrents)
- Obscene or indecent speech or materials
- Defamatory or abusive language
- Using the Service to transmit, post, upload, or otherwise making available defamatory, harassing, abusive, or threatening material or language that encourages bodily harm, destruction of property or harasses another.
- Forging or misrepresenting message headers, whether in whole or in part, to mask the originator of the message.
- Distribution of Internet viruses, Trojan horses, or other destructive activities
- Distributing information regarding the creation of and sending Internet viruses, worms, Trojan horses, pinging, flooding, mail-bombing, or denial of service attacks. Also, activities that disrupt the use of or interfere with the ability of others to effectively use the node or any connected network, system, service, or equipment.
- The sale, transfer, or rental of the Service to customers, clients or other third parties, either directly or as part of a service or product created for resale.
- Seeking information on passwords or data belonging to another user.
- Making unauthorized copies of proprietary software, or offering unauthorized copies of proprietary software to others.
- Intercepting or examining the content of messages, files or communications in transit on a data network.
Information security practices
We and our website hosting providers employ a variety of security measures in our data centers and hosting facilities to protect against the unauthorized access, theft, loss, misuse, or alteration of information we collect from you.
- Understand and save your preferences based on previous or current site activity, which enables us to provide you with improved services.
- Compile aggregate data about site usage in order to offer better site experiences and tools in the future.
We may also use trusted third-party services that track this information on our behalf.
You can choose to have your computer warn you each time a cookie is being sent, or you can choose to turn off all cookies through your browser. If you disable cookies, some of our features will not function properly.
IP address tracking
When you connect to our site, our servers recognize the IP (Internet Protocol) address of the computer providing you with Internet access. The IP address is used to gather location information of site visitors and can help diagnose problems with our servers or otherwise administer our site.
Personal information collection
We collect information from you when you create an account, make a donation, register for an event, sign up for a newsletter, respond to a survey, or any time you enter information into our site. Users can visit the site anonymously, with the understanding that our servers do collect IP address information.
In order to complete the purposes of your visit to our site, you might be asked to enter your name, email address, mailing address, phone number, or other details.
We may use the information we collect from you in the following ways:
- To complete the purposes of your visit.
- To personalize your experience and to allow us to deliver the type of content in which you are most interested.
- To improve our website in order to better serve you.
- To send emails regarding your account, donation, registration, etc.
- To send periodic email newsletters you requested.
- To follow up with you after correspondence with us.
Any information collected is for use by the church. We do not sell, trade, or otherwise transfer to outside parties your personal information. This does not include website hosting providers and other parties who assist us in operating our website, conducting our business, or serving our users, so long as those parties agree to keep this information confidential. We may also release information when such release is appropriate to comply with the law, enforce our site policies, or protect ours or others’ rights, property, or safety.
Access to your information
Upon request we will provide you with access to all information that we have collected about you. Visitors may obtain and correct this information by sending a request to us at [email protected] so that we may take action to remove such information.
Email from the church
If at any time you would like to unsubscribe from receiving future emails, you can contact us at [email protected].
Sometimes we include or link to third-party websites on our website. Third-party sites have separate and independent privacy policies; we have no responsibility or liability for the content and activities of these linked sites.
We may change this policy from time to time. If we do, we will post the new policy here.
Any questions about our website, or concerns about this policy should be directed to:
The Oberlin United Methodist Church
102 N Cass Ave, Oberlin Kansas, 67749