Wireless Internet Service Prohibited Uses
T-MOBILE PROHIBITED USES – WIRELESS INTERNET SERVICE
The definitions below are specific to this document (T-Mobile Prohibited Uses – Wireless Internet Service) and do not apply to any other document.
1. DEFINITIONS
1.1 “Customer” means a Person who purchases wireless services on the T-Mobile Network from T-Mobile or its reseller.
1.2 “End User” means the Person accessing or using the Service.
1.3 “Facilities” means the communications switching equipment and cell site transceiver equipment maintained, expanded, modified, or replaced by T-Mobile to provide Service to Customers in the Territory.
1.4 “Person” means any individual, subsidiary, corporation, limited liability company, partnership, co-partnership, firm, joint venture, association, joint stock company, trust, estate, unincorporated organization, governmental or regulatory body or other entity.
1.5 “Service” or “Services” means the wireless communications services provided by T-Mobile.
1.6 “SIM” means subscriber identity module.
1.7 “Territory” means the United States of America (including Puerto Rico and the U.S. Virgin Islands).
2. PROHIBITED USES
With respect to the Services and Facilities, Customers and End Users shall not engage in any Prohibited Use. “Prohibited Use” with respect to the use of Service or Facilities includes, but is not limited to, the following:
A. accessing, altering or interfering, or attempting or assisting another Person to access, alter or interfere, with the communications equipment or information of T-Mobile, any Customer or End User, including by rearranging, tampering or making any unauthorized connection with any wireless telephone equipment or Facilities, or using any scheme, false representation or false credit devices, or by, or through, any other fraudulent means or devices whatsoever, whether within or outside of the Territory;
B. using the Service in a manner that unreasonably interferes with use of services provided by T-Mobile or any Customers or End Users, including, but not limited to:
(i) compromising the T-Mobile Network security or capacity, degrading the T-Mobile Network performance, using malicious software or “malware”, hindering other Customers’ or End Users’ access to the T-Mobile Network, or otherwise adversely impacting network service levels or legitimate data flows;
(ii) using applications which automatically consume unreasonable amounts of available T-Mobile Network capacity;
(iii) using applications which are designed for unamended use, automatic data feeds, connections, or applications that are used in a way that degrades network capacity or functionality; and
(iv) misusing the Service, including "spamming" or sending abusive, unsolicited, or other mass automated communications;
C. using the Service to convey information of a nature or in such a manner that renders the conveyance unlawful, or to impersonate another person with fraudulent or malicious intent, or for any purpose in violation of the law;
D. any other unauthorized, wrongful, or misappropriated use of Service (including cloning, compromised SIM algorithm, and subscription fraud);
E. rearranging, tampering or making an unauthorized connection with any portion or component of the T-Mobile Network;
F. using or assisting others in the use of any unethical or fraudulent scheme, or by or through any other unethical or fraudulent means or devices whatsoever, with intent to avoid payment of, in whole or in part, any charges for Service;
G. using the Service without permission on a stolen or lost device;
H. installing any amplifiers, enhancers, repeaters or other devices that modify or otherwise affect the radio frequencies used to provide the Service without express permission from T-Mobile;
I. using the Service for monitoring of third parties without their permission, including location-based tracking of individuals, except as agreed to in writing by T-Mobile;
J. using the Service to provide life-sustaining medical care or monitoring;
K. using the Service or Facilities in any manner that, if the use was by T-Mobile’s own subscribers, the subscriber would be in breach of T-Mobile’s subscriber terms; and
L. any other use of the Service or Facilities that T-Mobile reasonably determines, in its sole discretion, is fraudulent or harmful.
T-Mobile Prohibited Uses – Wireless Internet Service v 250404