You're Online!

Please take a moment to check through the below terms & conditions of use. By using our internet service & wireless network you acknowledge and agree to the conditions outlined below.

By using our internet service, you hereby expressly acknowledge and agree that there are significant security, privacy and confidentiality risks inherent in accessing or transmitting information through the internet, whether the connection is facilitated through wired or wireless technology. Security issues include, without limitation, interception of transmissions, loss of data, and the introduction or viruses and other programs that can corrupt or damage your computer.

Accordingly, you agree that the owner and/or provider of this network is NOT liable for any interception or transmissions, computer worms or viruses, loss of data, file corruption, hacking or damage to your computer or other devices that result from the transmission or download of information or materials through the internet service provided.

Use of the wireless network is subject to the general restrictions outlined below. If abnormal, illegal, or unauthorised behaviour is detected, including heavy consumption of bandwidth, the network provider reserves the right to permanently disconnect the offending device from the wireless network.

Examples of Illegal Uses

The following are representative examples only and do not comprise a comprehensive list of illegal uses:

  1. Spamming and invasion of privacy - Sending of unsolicited bulk and/or commercial messages over the Internet using the Service or using the Service for activities that invade another's privacy.
  2. Intellectual property right violations - Engaging in any activity that infringes or misappropriates the intellectual property rights of others, including patents, copyrights, trademarks, service marks, trade secrets, or any other proprietary right of any third party.
  3. Accessing illegally or without authorisation computers, accounts, equipment or networks belonging to another party, or attempting to penetrate/circumvent security measures of another system. This includes any activity that may be used as a precursor to an attempted system penetration, including, but not limited to, port scans, stealth scans, or other information gathering activity.
  4. The transfer of technology, software, or other materials in violation of applicable export laws and regulations.
  5. Export Control Violations.
  6. Using the Service in violation of applicable law and regulation, including, but not limited to, advertising, transmitting, or otherwise making available Ponzi schemes, pyramid schemes, fraudulently charging credit cards, pirating software, or making fraudulent offers to sell or buy products, items, or services.
  7. Uttering threats.
  8. Distribution of pornographic materials to minors.
  9. and Child pornography.

Examples of Unacceptable Uses

The following are representative examples only and do not comprise a comprehensive list of unacceptable uses:

  1. High bandwidth operations, such as large file transfers and media sharing with peer-to-peer programs (i.e. Torrents).
  2. Obscene or indecent speech or materials.
  3. Defamatory or abusive language.
  4. Using the Service to transmit, post, upload, or otherwise making available defamatory, harassing, abusive, or threatening material or language that encourages bodily harm, destruction of property or harasses another.
  5. Forging or misrepresenting message headers, whether in whole or in part, to mask the originator of the message.
  6. Facilitating a Violation of these Terms of Use.
  7. Hacking.
  8. Distribution of Internet viruses, Trojan horses, or other destructive activities.
  9. Distributing information regarding the creation of and sending Internet viruses, worms, Trojan horses, pinging, flooding, mail-bombing, or denial of service attacks. Also, activities that disrupt the use of or interfere with the ability of others to effectively use the node or any connected network, system, service, or equipment.
  10. Advertising, transmitting, or otherwise making available any software product, product, or service that is designed to violate these Terms of Use, which includes the facilitation of the means to spam, initiation of pinging, flooding, mail-bombing, denial of service attacks, and piracy of software.
  11. The sale, transfer, or rental of the Service to customers, clients or other third parties, either directly or as part of a service or product created for resale.
  12. Seeking information on passwords or data belonging to another user.
  13. Making unauthorised copies of proprietary software, or offering unauthorised copies of proprietary software to others.
  14. Intercepting or examining the content of messages, files or communications in transit on a data network.
Birkenstock

Are You Sandal Weather Ready?

Get ready for fun in the sun with our great range of Birkenstock sandals!

Dryrobe

Say Hello To Dryrobe

The ultimate post-swim or post-workout essential is now available online and in our Wroxham Department Store

Lawn Mowers

A Cut Above The Rest!

Keep your lawn looking trim with ease with our range of top quality lawn mowers

In your garden at the moment

Garden jobs for May

Garden jobs for May

With May comes the promise of Summer. The sun's coming out a bit more, but a few more showers until we're into proper sunbathing weather!

Read More
Growing your own - what to plant in May

Growing your own - what to plant in May

The chance of frosts in May are low and so now many vegetable seeds can be sown outdoors, and there's nothing more rewarding than growing your own veggies from seed all the way through to the plate!

Read More
Vegetable seeds to sow in May

Vegetable seeds to sow in May

With the risk of frosts mostly gone, many seeds can be sown directly outdoors from May. Plus there's plenty that can be sown indoors too.

Read More
What to prune & trim in Spring

What to prune & trim in Spring

Most trees & shrubs benefit from an annual pruning, it helps keep their shape, gets rid of dead & diseased wood and encourages new growth. Some plants are best pruned while dormant, and others are best pruned after blooming, here's our handy guide to which to do when in Spring;

Read More
Spring lawn care

Spring lawn care

Once we enter Spring it's all systems go on the lawn care front! Moss can be dealt with, new grass seed laid and feeds can be applied to begin making your lawn nice and healthy.

Read More
How to grow strawberries

How to grow your own strawberries

Strawberries are a highly rewarding and easy fruit to grow at home. best of all they can be grown in beds, containers or even hanging baskets so you can grow them even if you have very little space. here's our handy guide to all things strawberries.

Read More
How to grow tomatoes

How to grow tomatoes

Who doesn't love tomatoes? They're delicious and oh so versatile. What's better than lovely ripe tomatoes? Ones you've grown yourself of course! Not only are they relatively simple to grow but there's also a wide variety to choose from and lots of different things you can do with them in the kitchen.

Read More
Prep your garden for your holiday

How to grow runner beans

Is there anything more quintessentially British than growing runner beans? Probably not! Runner beans are productive, tasty and decorative enough to grow as a climber in your flower border

Read More
Feel the buzz of a bee pollinated garden!

Feel the buzz of a bee pollinated garden!

Of all of the creatures we share our gardens with, bees are our best buzzing buddies! They make the garden feel alive, and more importantly, pollinate our plants. Playing vital step in the ecosystem for virtually every Summer crop and flowering plant, we should treat our furry friends to a tasty garden.

Read More

What our customers say about us

Search engine powered by ElasticSuite