Common use of Impersonation Clause in Contracts

Impersonation. You may not impersonate individuals, groups, or organizations in a manner that is intended to or does mislead, confuse, or deceive others. While you may maintain parody, fan, commentary, or newsfeed accounts, you may not do so if the intent of the account is to engage in spamming or abusive behavior. Read more about our impersonation policy. We strive to protect people on Twitter from technical abuse and spam. To promote a stable and secure environment on Twitter, you may not do, or attempt to do, any of the following while accessing or using Twitter: • Access, tamper with, or use non-public areas of Twitter, Twitter’s computer systems, or the technical delivery systems of Twitter’s providers (except as expressly permitted by the Twitter Bug Bounty program). • Probe, scan, or test the vulnerability of any system or network, or breach or circumvent any security or authentication measures (except as expressly permitted by the Twitter Bug Bounty program). • Access or search, or attempt to access or search, Twitter by any means (automated or otherwise) other than through our currently available, published interfaces that are provided by Twitter (and only pursuant to the applicable terms and conditions), unless you have been specifically allowed to do so in a separate agreement with Twitter. Note that crawling Twitter is permissible if done in accordance with the provisions of the robots.txt file; however, scraping Twitter without our prior consent is expressly prohibited. • Forge any TCP/IP packet header or any part of the header information in any email or posting, or in any way use Twitter to send altered, deceptive, or false source-identifying information. • Interfere with or disrupt the access of any user, host or network, including, without limitation, sending a virus, overloading, flooding, spamming, mail- bombing Twitter’s services, or by scripting the creation of content in such a manner as to interfere with or create an undue burden on Twitter. Any accounts engaging in the following activities may be temporarily locked or subject to permanent suspension: • Malware/Phishing: You may not publish or link to malicious content intended to damage or disrupt another person’s browser or computer or to compromise a person’s privacy.

Appears in 3 contracts

Sources: User Agreement, User Agreement, User Agreement