Cheating and Hacking. You agree that you will not, under any circumstances: (a) Use cheats, exploits, automation software, bots, hacks, mods or any unauthorized software designed to modify or interfere with any Company Properties; (b) Interfere with or damage Company Properties, including, without limitation, through the use of viruses, cancel bots, Trojan horses, harmful code, flood pings, denial-of-service attacks, packet or IP spoofing, forged routing or electronic mail address information, or similar methods or technology; (c) Modify or cause to be modified any files that are a part of Company Properties; (d) Disrupt, overburden, or aid or assist in the disruption or overburdening of: (i) any computer or server used to offer or support Company Properties; or (ii) the enjoyment of Company Properties by any other person; (e) Institute, assist, or become involved in any type of attack, including, but not limited to, distribution of a virus, denial of service attacks upon Company Properties, or other attempts to disrupt Company Properties or any other person’s use or enjoyment of Company Properties; (f) Attempt to gain unauthorized access to Company Properties, accounts registered to others, or to the computers, servers or networks connected to Company Properties by any means other than the User interface provided by Company, including, but not limited to, by circumventing or modifying, attempting to circumvent or modify, or encouraging or assisting any other person to circumvent or modify, any security, technology, device or software that is part of Company Properties; (g) Access, tamper with or use non-public areas of Company Properties, Company’s computer systems, or the technical delivery systems of Company’s providers; (h) Attempt to probe, scan, or test the vulnerability of any Company system or network, or breach any security or authentication measures; (i) Disrupt or interfere with the security of, or otherwise cause harm to, Company Properties, systems, resources, accounts, passwords, servers or networks connected to or accessible through Company Properties or any affiliated or linked sites; or (j) Avoid, bypass, remove, deactivate, impair, descramble, or otherwise circumvent any technological measure implemented by Company or any of Company’s providers or any other third party (including another User) to protect Company Properties.
Appears in 2 contracts
Sources: Terms of Use, Terms of Use
Cheating and Hacking. You agree that you will not, under any circumstances:
(a) Use cheats, exploits, automation software, bots, hacks, mods or any unauthorized software designed to modify or interfere with any Company PropertiesProperties or any quiz or game experience;
(b) Interfere with or damage Company Properties, including, without limitation, through the use of viruses, cancel bots, Trojan horses, harmful code, flood pings, denial-of-service attacks, packet or IP spoofing, forged routing or electronic mail address information, or similar methods or technology;
(c) Modify or cause to be modified any files that are a part of Company Properties;
(d) Disrupt, overburden, or aid or assist in the disruption or overburdening of: (i) any computer or server used to offer or support Company Properties; or (ii) the enjoyment of Company Properties by any other person;
(e) Institute, assist, or become involved in any type of attack, including, but not limited to, distribution of a virus, denial of service attacks upon Company Properties, or other attempts to disrupt Company Properties or any other person’s use or enjoyment of Company Properties;
(f) Attempt to gain unauthorized access to Company Properties, accounts registered to others, or to the computers, servers or networks connected to Company Properties by any means other than the User user interface provided by Company, including, but not limited to, by circumventing or modifying, attempting to circumvent or modify, or encouraging or assisting any other person to circumvent or modify, any security, technology, device or software that is part of Company Properties;
(g) Access, tamper with or use non-public areas of Company Properties, Company’s computer systems, or the technical delivery systems of Company’s providers;
(h) Attempt to probe, scan, or test the vulnerability of any Company Property, system or network, or breach any security or authentication measures;
(i) Disrupt or interfere with the security of, or otherwise cause harm to, Company Properties, systems, resources, accounts, passwords, servers or networks connected to or accessible through Company Properties or any affiliated or linked sites; or
(j) Avoid, bypass, remove, deactivate, impair, descramble, or otherwise circumvent any technological measure implemented by Company or any of Company’s providers or any other third party (including another Useruser) to protect Company Properties.
Appears in 1 contract
Sources: Terms of Use