Fair Use. 2.1 The Company’s services may be used to link into other networks worldwide; Use of these other networks shall conform to the acceptable use policies of these networks. 2.2 The Company’s services may only be used using Internet protocols and other standards specified by the Company. 2.3 Use may not circumvent user authentication or security of any host, network, or account (referred to as "cracking" or "hacking"), nor interfere with service to any user, host, or network (referred to as "denial of service attacks") including networks directly and indirectly connected to the Company. 2.4 Use that disproportionately reduces the capacity of the Company’s services is prohibited. Where a Company service has designed contention between users, use that interferes with the fair use of a contended service by others is prohibited. Use of IP multicast other than by means provided and coordinated by the Company is likewise prohibited. 2.5 Use that the Company, at its sole discretion, considers may be a precursor to a use that is prohibited. E.g. ‘port probing’ to ascertain the vulnerability of a system on the Internet is prohibited. 2.6 You are prohibited from posting, transmitting or disseminating any information or software that contains a virus, Trojan horse, worm or other harmful program or that generates levels of traffic sufficient to impede others’ ability to send or retrieve information. Prohibited conduct under the clause includes denial of service attacks or similarly disruptive transmissions, as well as transmissions containing other harmful or malicious features.
Appears in 3 contracts
Sources: Master Service Agreement, Master Service Agreement, Master Service Agreement
Fair Use. 2.1 The Company’s services may be used to link into other networks worldwide; Use of these other networks shall conform to the acceptable use policies of these networks.
2.2 The Company’s services may only be used using Internet protocols and other standards specified by the Company.
2.3 Use may not circumvent user authentication or security of any host, network, or account (referred to as "cracking" or "hacking"), nor interfere with service to any user, host, or network (referred to as "denial of service attacks") including networks directly and indirectly connected to the Company.
2.4 Use that disproportionately reduces the capacity of the Company’s services is prohibited. Where a Company service has designed contention between users, use that interferes with the fair use of a contended service by others is prohibited. Use of IP multicast other than by means provided and coordinated by the Company is likewise prohibited.
2.5 Use that the Company, at its sole discretion, considers may be a precursor to a use that is prohibited. E.g. ‘port probing’ to ascertain the vulnerability of a system on the Internet is prohibited.
2.6 You are prohibited from posting, transmitting or disseminating any information or software that contains a virus, Trojan horse, worm or other harmful program or that generates levels of traffic sufficient to impede others’ ability to send or retrieve information. Prohibited conduct under the clause Clause includes denial of service attacks or similarly disruptive transmissions, as well as transmissions containing other harmful or malicious features.
Appears in 1 contract
Sources: Master Service Agreement