Common use of Hacking Clause in Contracts

Hacking. Unauthorized access to or use of data, including, without limitation, any attempt to circumvent user authentication or security of any host, network, or account, hacking, cracking, port scans, or flood pings, unauthorized monitoring of data or traffic, interfering with service to any user, host, system, or network, conducting denial of service attacks, distributing or introducing viruses, Trojan horses, worms or other harmful software, or any other any attempt to disrupt any service.

Appears in 2 contracts

Sources: Acceptable Use Policy, Acceptable Use Policy

Hacking. Unauthorized access to or use of data, includingsystems, without limitationserver or networks, including any attempt to circumvent user authentication probe, scan or security test the vulnerability of any host, network, or account, hacking, cracking, port scans, or flood pings, unauthorized monitoring of data or traffic, interfering with service to any user, host, a system, server or network or to breach security or authentication measures without express authorization of the owner of the system, server or network, conducting denial of service attacks, distributing or introducing viruses, Trojan horses, worms or other harmful software, or any other any attempt to disrupt any service.

Appears in 1 contract

Sources: Terms of Acceptable Use