No Security Violations. You may not use the Services to violate the security or integrity of any network, computer or communications system, software application, or network or computing device (each, a "System"). Prohibited activities include: Unauthorized Access. Accessing or using any System without permission. Interception. Monitoring of data or traffic on a System without permission. You may not make network connections to any users, hosts, or networks unless you have permission to communicate with them. Prohibited activities include: Monitoring or Crawling. Monitoring or crawling of a System that impairs or disrupts the System being monitored or crawled. Intentional Interference. Interfering with the proper functioning of any System, including any deliberate attempt to overload a system by mail bombing, news bombing, broadcast attacks, or flooding techniques. Avoiding System Restrictions. Using manual or electronic means to avoid any use limitations placed on a System, such as access and storage restrictions.
Appears in 2 contracts
Sources: Tealium Subscription Terms and Conditions, Tealium Subscription Terms and Conditions