Barnes & Noble NOOK User Guide
117
posting messages to or canceling or superseding messages on an online forum or newsgroup in a manner
that violates the rules of the forum or newsgroup or that contain forged header information.
sending bulk electronic messages in quantities that exceed standard industry norms or that create the poten-
tial for disruption of the AT&T network or of the networks with which AT&T interconnects
intercepting, redirecting or otherwise interfering or attempting to interfere with e-mail intended for other
parties
knowingly deleting any author attributions, legal notices or proprietary designations or labels in a file that the
user mails or sends
using, distributing, advertising, transmitting, or otherwise making available any software program, product,
or service that is designed to violate this AUP or the AUP of any other Internet Service Provider, including, but not
limited to, the facilitation of the means to spam;
Spam Damages: Because spam related damages are often difficult to quantify, in those cases where the actual dam-
ages cannot be reasonably calculated AT&T reserves the right to seek from the Customer liquidated damages in the
amount of five dollars (US$5.00) for each piece of ‘spam’ or unsolicited bulk email transmitted from or otherwise
connected with Customer’s account, in addition to any other rights and remedies AT&T my have in contract, law and
equity.
Security Violations
It is Customer’s responsibility to ensure the security of its network and the machines that connect to and use IP
Service(s). You are responsible for configuring and securing your services to prevent damage to the AT&T net-
work and/or the disruption of Service(s) to other customers, and ensuring that your customers and users use the
Service(s) in an appropriate manner. Customer is required to take all necessary steps to manage the use of the
IP Service(s) in such a manner that network abuse is prevented or minimized to the greatest extent possible. It is
Customer’s responsibility to take corrective actions on vulnerable or exploited systems to prevent continued abuse.
Violations of system or network security are prohibited and may result in criminal and/or civil liability.
AT&T IP Services may not be used to interfere with, to gain unauthorized access to, or otherwise violate the security
of AT&T’s or another party’s server, network, personal computer, network access or control devices, software or
data, or other system, or to attempt to do any of the foregoing. Examples of violations of system or network security
include but are not limited to:
intercepting, interfering with or redirecting e-mail intended for third parties, or any form of network moni-
toring, scanning or probing, or other action for the unauthorized interception of data or harvesting of e-mail address-
es;
hacking - attempting to attack, breach, circumvent or test the vulnerability of the user authentication or se-
curity of any host, network, server, personal computer, network access and control devices, software or data without
express authorization of the owner of the system or network;
impersonating others in order to obtain another user’s account password or other personal information.
using the IP Service(s) to deliver spyware, or secretly or deceptively obtain the personal information of third
parties (phishing, etc.), or engage in modem hi-jacking;
using any program, file, script, command or the transmission of any message or content of any kind, de-
signed to interfere with a terminal session or the access or use of the Internet or any other means of communication;
distributing or using tools designed to compromise security, including cracking tools, password guessing
programs, packet sniffers or network probing tools (except in the case of authorized legitimate network security
operations);
Summary of Contents for NOOK GlowLight
Page 1: ......
Page 6: ......
Page 120: ...120 Barnes Noble NOOK User Guide...
Page 124: ...124 Barnes Noble NOOK User Guide...