Use of Brightstar Device Protection computing systems are restricted to authorized use only. The use of any Brightstar Device Protection computing system may be monitored and recorded by Brightstar Device Protection for administrative and security reasons at any time. Your use of this computing system constitutes consent to this monitoring. Brightstar Device Protection reserves the right to take appropriate action against anyone who accesses or uses, or attempts to access or use, any Brightstar Device Protection related computing system improperly or without the appropriate authorization.