User manual
• maintainingasitethatisadvertisedviaunsolicitedelectronicmessages,regardlessoftheoriginoftheunsolicited
electronic messages
• spamming,orsendingunsolicitedcommerciale-mail,sendingunsolicitedelectronicmessageswithpetitionsforsignatures,
or any chain mail related materials, or requests for charitable donations
• sendingmessagesthatareharassingormalicious,orotherwisecouldreasonablybepredictedtointerferewithanother
party’s quiet enjoyment of the AT&T IP Services or the Internet (e.g., through language, frequency, size or otherwise)
• sendingbulk(i.e.,twenty-veormorerecipients)electronicmessageswithoutidentifying,withinthemessage,areasonable
means of opting out from receiving additional messages from the sender
• usingdistributionlistscontainingaddressesthatincludethosewhohaveoptedout
• sendingelectronicmessagesthatdonotaccuratelyidentifythesender,thesender’sreturnaddress,thee-mailaddressof
origin, or other information contained in the subject line or header
• forgingheadersoridentiersinordertodisguisetheoriginofe-mail
• useofredirectlinksinunsolicitedcommerciale-mailtoadvertiseawebsiteorservice
• postingasinglemessage,ormessagestoonlineforumsornewsgroups,thatcouldreasonablybeexpectedto
provoke com-plaints
• postingmessagestoorcancelingorsupersedingmessagesonanonlineforumornewsgroupinamannerthatviolatesthe
rules of the forum or newsgroup or that contain forged header information
• sendingbulkelectronicmessagesinquantitiesthatexceedstandardindustrynormsorthatcreatethepotentialfordisruption
of the AT&T network or of the networks with which AT&T interconnects
• intercepting,redirectingorotherwiseinterferingorattemptingtointerferewithe-mailintendedforotherparties
knowingly deleting any author attributions, legal notices or proprietary designations or labels in a file that the user mails or
sends using, distributing, advertising, transmitting, or otherwise making available any software program, product, or service
that is designed to violate this AUP or the AUP of any other Internet Service Provider, including, but not limited to, the
facilitation of the means to spam
Spam Damages: Because spam related damages are often dicult to quantify, in those cases where the actual damages cannot
be rea-sonably calculated AT&T reserves the right to seek from the Customer liquidated damages in the amount of five dollars
(US$5.00) for each piece of ‘spam’ or unsolicited bulk email transmitted from or otherwise connected with Customer’s account,
in addition to any other rights and remedies AT&T my have in contract, law and equity.
Security Violations
It is Customer’s responsibility to ensure the security of its network and the machines that connect to and use IP Service(s).
You are responsible for configuring and securing your services to prevent damage to the AT&T network and/or the disruption of
Service(s) to other customers, and ensuring that your customers and users use the Service(s) in an appropriate manner. Customer
is required to take all necessary steps to manage the use of the IP Service(s) in such a manner that network abuse is prevented
or minimized to the greatest extent possible. It is Customer’s responsibility to take corrective actions on vulnerable or exploited
systems to prevent contin-ued abuse. Violations of system or network security are prohibited and may result in criminal and/or
civil liability.
AT&T IP Services may not be used to interfere with, to gain unauthorized access to, or otherwise violate the security of AT&T’s
or another party’s server, network, personal computer, network access or control devices, software or data, or other system,
or to at-tempt to do any of the foregoing. Examples of violations of system or network security include but are not limited to:
• intercepting,interferingwithorredirectinge-mailintendedforthirdparties,oranyformofnetworkmonitoring,scanning
or probing, or other action for the unauthorized interception of data or harvesting of e-mail addresses
Barnes & Noble NOOK User Guide 113










