User manual

• hacking-attemptingtoattack,breach,circumventortestthevulnerabilityoftheuserauthenticationorsecurityof anyhost,
network, server, personal computer, network access and control devices, software or data without express authorization of
the owner of the system or network
• impersonatingothersinordertoobtainanotheruser’saccountpasswordorotherpersonalinformation
• usingtheIPService(s)todeliverspyware,orsecretlyordeceptivelyobtainthepersonalinformationof thirdparties(phishing,
etc.), or engage in modem hi-jacking
• usinganyprogram,le,script,commandorthetransmissionofanymessageorcontentofanykind,designedtointerfere
with a terminal session or the access or use of the Internet or any other means of communication
• distributingorusingtoolsdesignedtocompromisesecurity,includingcrackingtools,passwordguessingprograms,
packet sniers or network probing tools (except in the case of authorized legitimate network security operations)
• unauthorizedmonitoringofdataortraconanynetworkorsystemwithoutexpressauthorizationoftheownerofthe
system or network; this would include use of sniers or SNMP tools
• falsifyingpacketheader,sender,orUserinformationwhetherinwholeorinparttomasktheidentityofthesender,originator
or point of origin
• knowinglyuploadingordistributinglesthatcontainviruses,Trojanhorses,worms,timebombs,cancelbots,corruptedles,
or any other similar software or programs that may damage the operation of another’s computer or property of another
• engaginginthetransmissionofpiratedsoftware;withrespecttodial-upaccounts,usinganysoftwareordevicedesigned
to defeat system time-out limits or to allow your ac-count to stay logged on while you are not actively using the AT&T IP
Service(s) or using your account for the purpose of operating a server of any type
• usingmanualorelectronicmeanstoavoidanyuselimitationsplacedontheServices
• gainingunauthorizedaccesstoprivatenetworks;violatingrules,regulations,andpoliciesapplicabletoanynetwork,server,
computer database, web site, or ISP that you access through the IP Service(s)
Network Usage
Where an AT&T Service account, service or feature description specifies limits on bandwidth, disk utilization, simultaneous
connections, and/or aggregate data download or upload, use in excess of those limits is not permitted without an appropriate
change in account type or status and may incur additional charges for such usage.
Bandwidth, disk utilization, simultaneous connections, and aggregate data downloads/uploads will be computed or determined
by AT&T from time to time in developing its product and service oerings. In the event AT&T determines that an account is
exceeding the relevant bandwidth, disk utilization, aggregate data download/upload limits, simultaneous connections, or
reasonable session times, the account owner will generally be notified by E-mail. If the excess use continues after such notification,
the owner may be requested to upgrade the type of account or to modify the activity creating the excess use, or the account may
be terminated.
If excessive bandwidth, disk space utilization, simultaneous connections, aggregate data download or upload, or session length
is deter-mined to adversely aect AT&T’s ability to provide service, immediate action may be taken. The account owner may be
notified by e-mail as soon as practical thereafter.
Barnes & Noble NOOK User Guide 114