无线网络术语 & 条件

img

Terms and 条件 By using our internet 服务, you hereby expressly acknowledge and agree that there are significant security, privacy and confidentiality risks inherent in accessing or 传输 information through the internet, whether the connection is facilitated through wired or wireless technology. Security issues include, without limitation, interception of transmissions, 数据丢失, and the introduction or viruses and other programs that can corrupt or damage your computer. 相应的, you agree that the owner and/or provider of this network is NOT liable for any interception or transmissions, computer 蠕虫 or viruses, 数据丢失, file corruption, hacking or damage to your computer or other devices that result from the transmission or download of information or materials through the internet 服务 provided.Use of the wireless network is subject to the general restrictions outlined below. 如果不正常, 非法, or unauthorized behavior is detected, 包括 heavy consumption of bandwidth, the network provider reserves the right to permanently disconnect the offending device from the wireless network. 
 
Examples of Illegal Uses The following are representative examples only and do not comprise a comprehensive list of 非法 uses: Spamming and invasion of privacy – Sending of unsolicited bulk and/or commercial messages over the Internet using the 服务 or using the 服务 for activities that invade another’s privacy. Intellectual property right violations – Engaging in any activity that infringes or misappropriates the intellectual property rights of others, 包括 patents, copyrights, 商标, 服务 marks, 商业秘密, or any other proprietary right of any third party. Accessing 非法ly or without authorization computers, 账户, equipment or networks belonging to another party, or attempting to penetrate/circumvent security measures of another 系统. This includes any activity that may be used as a precursor to an attempted 系统 penetration, 包括, but not limited to, 端口扫描, 隐形扫描, or other information gathering activity. The 转移 of technology, 软件, or other materials in violation of applicable export laws and regulations. Export Control ViolationsUsing the 服务 in violation of applicable law and regulation, 包括, but not limited to, 广告, 传输, or otherwise making available ponzi schemes, pyramid schemes, fraudulently charging credit cards, pirating 软件, or making fraudulent offers to sell or buy 产品s, 项目, 或服务. Uttering threats; Distribution of pornographic materials to minors; and Child pornography. 
 
Examples of Unacceptable Uses The following are representative examples only and do not comprise a comprehensive list of unacceptable uses: High bandwidth operations, such as large file 转移s and media sharing with peer-to-peer programs (i.e.torrents) Obscene or indecent speech or materials Defamatory or 虐待 language Using the 服务 to transmit, 帖子, 上传, or otherwise making available defamatory, 骚扰, 虐待, or threatening material or language that encourages bodily harm, destruction of property or harasses another. Forging or misrepresenting message headers, whether in whole or in part, to mask the originator of the message. Facilitating a Violation of these Terms of Use Hacking Distribution of Internet viruses, Trojan horses, or other destructive activities Distributing information regarding the creation of and sending Internet viruses, 蠕虫, Trojan horses, 发出砰的, 洪水, 邮件炸弹, or denial of 服务 attacks. 也, activities that disrupt the use of or interfere with the ability of others to effectively use the node or any connected network, 系统, 服务, 或设备.广告, 传输, or otherwise making available any 软件 产品, 产品, or 服务 that is designed to violate these Terms of Use, which includes the facilitation of the means to spam, initiation of 发出砰的, 洪水, 邮件炸弹, denial of 服务 attacks, and piracy of 软件. 出售, 转移, or rental of the 服务 to customers, clients or other third parties, either directly or as part of a 服务 or 产品 created for resale. Seeking information on passwords or data belonging to another user. Making unauthorized copies of proprietary 软件, or offering unauthorized copies of proprietary 软件 to others. Intercepting or examining the content of messages, files or communications in transit on a data network.