You're Online!

Please take a moment to check through the below terms & conditions of use. By using our internet service & wireless network you acknowledge and agree to the conditions outlined below.

By using our internet service, you hereby expressly acknowledge and agree that there are significant security, privacy and confidentiality risks inherent in accessing or transmitting information through the internet, whether the connection is facilitated through wired or wireless technology. Security issues include, without limitation, interception of transmissions, loss of data, and the introduction or viruses and other programs that can corrupt or damage your computer.

Accordingly, you agree that the owner and/or provider of this network is NOT liable for any interception or transmissions, computer worms or viruses, loss of data, file corruption, hacking or damage to your computer or other devices that result from the transmission or download of information or materials through the internet service provided.

Use of the wireless network is subject to the general restrictions outlined below. If abnormal, illegal, or unauthorised behaviour is detected, including heavy consumption of bandwidth, the network provider reserves the right to permanently disconnect the offending device from the wireless network.

Examples of Illegal Uses

The following are representative examples only and do not comprise a comprehensive list of illegal uses:

  1. Spamming and invasion of privacy - Sending of unsolicited bulk and/or commercial messages over the Internet using the Service or using the Service for activities that invade another's privacy.
  2. Intellectual property right violations - Engaging in any activity that infringes or misappropriates the intellectual property rights of others, including patents, copyrights, trademarks, service marks, trade secrets, or any other proprietary right of any third party.
  3. Accessing illegally or without authorisation computers, accounts, equipment or networks belonging to another party, or attempting to penetrate/circumvent security measures of another system. This includes any activity that may be used as a precursor to an attempted system penetration, including, but not limited to, port scans, stealth scans, or other information gathering activity.
  4. The transfer of technology, software, or other materials in violation of applicable export laws and regulations.
  5. Export Control Violations.
  6. Using the Service in violation of applicable law and regulation, including, but not limited to, advertising, transmitting, or otherwise making available Ponzi schemes, pyramid schemes, fraudulently charging credit cards, pirating software, or making fraudulent offers to sell or buy products, items, or services.
  7. Uttering threats.
  8. Distribution of pornographic materials to minors.
  9. and Child pornography.

Examples of Unacceptable Uses

The following are representative examples only and do not comprise a comprehensive list of unacceptable uses:

  1. High bandwidth operations, such as large file transfers and media sharing with peer-to-peer programs (i.e. Torrents).
  2. Obscene or indecent speech or materials.
  3. Defamatory or abusive language.
  4. Using the Service to transmit, post, upload, or otherwise making available defamatory, harassing, abusive, or threatening material or language that encourages bodily harm, destruction of property or harasses another.
  5. Forging or misrepresenting message headers, whether in whole or in part, to mask the originator of the message.
  6. Facilitating a Violation of these Terms of Use.
  7. Hacking.
  8. Distribution of Internet viruses, Trojan horses, or other destructive activities.
  9. Distributing information regarding the creation of and sending Internet viruses, worms, Trojan horses, pinging, flooding, mail-bombing, or denial of service attacks. Also, activities that disrupt the use of or interfere with the ability of others to effectively use the node or any connected network, system, service, or equipment.
  10. Advertising, transmitting, or otherwise making available any software product, product, or service that is designed to violate these Terms of Use, which includes the facilitation of the means to spam, initiation of pinging, flooding, mail-bombing, denial of service attacks, and piracy of software.
  11. The sale, transfer, or rental of the Service to customers, clients or other third parties, either directly or as part of a service or product created for resale.
  12. Seeking information on passwords or data belonging to another user.
  13. Making unauthorised copies of proprietary software, or offering unauthorised copies of proprietary software to others.
  14. Intercepting or examining the content of messages, files or communications in transit on a data network.
Shoe fitting online

Book a Shoe Fitting Online

Make sure your little ones are in the right size school shoes by having their feet measured and fitted for the new year so they're just right.

Sharon Maughan & Trevor Eve Facewise Instore

In-Store with FaceWise Creator, Sharon Maughan

Join Sharon Maughan & her husband Trevor Eve, to learn about FaceWise, have a photo with them and get your products signed!

Saturday 17th August in Wroxham Department Store, 11am - 3pm

Norfolk Day Roys Food Hall

Saturday 27th July is Norfolk Day!

Visit Wroxham Food Hall on Norfolk day to meet our local suppliers and sample some tasty food & drinks

In your garden at the moment

Pests, problems & plagues in July

Pests, problems & plagues in July

We're really in the swing of planting, harvesting & marvelling at the growth of our subterrainean friends, we don't want anything bad to happen to them, do we! So while you're busy sowing and harvesting, it's definitely giving your plants a quick health checkup:

Read More
Quick list of planting & harvesting jobs for July

Quick list of planting & harvesting jobs for July

July is a key month in the gardening calendar, the sun is out, some of your veg is ready to harvest and it's time to plant some new treats too!

Read More
Deadheading, dead important!

Deadheading, dead important!

Deadheading properly in your garden can make a huge difference to growing, garden health and, last but not least, appearance!

Read More
Hot weather garden care

Hot weather garden care

As the weather gets hotter we all get a bit cheerier, and here are a few tips to keep your garden happy too!

Read More
Summer Summer lawn mowing & watering

Summer lawn mowing & watering

Over the summer lawn care is mostly focused on mowing and watering but its also important to take the time to enjoy your lawn too, with the odd picnic or garden party.

Read More
Prep your garden for your holiday

Jobs to do in your garden before your holiday

Holidays are great, but with all the packing, online check-ins and last-minute trips to the shops to replace lost travel adapters it's easy to forget that your garden will benefit a lot from some extra attention before you leave it for a week or two. Here are our top tips for making sure you return home from your hols to healthy garden;

Read More
Summer greenhouse survival guide

Summer greenhouse survival guide

It doesn't matter if it's glass or plastic, greenhouses can get really hot in sunny weather. Here are a few ideas for making sure your plants don't overheat.

Read More
Summer Pond Care

Summer Pond Care

Summer is a great time for your pond and it should be teeming with wildlife, full of lush plant growth and your fish will be active and happy. Here are our tips for making the most of your pond during Summer;

Read More

What our customers say about us

Search engine powered by ElasticSuite