No Security Violations. You may not use the Services to violate the security or integrity of any network, computer or communications system, software application, or network or computing device (each, a “System”). Prohibited activities include but are not limited to: ▪ Unauthorized Access. Accessing or using any System without permission, including attempting to probe, scan, or test the vulnerability of a System or to breach any security or authentication measures used by a System. ▪ Interception. Monitoring of data or traffic on a System without permission.
Appears in 1 contract
Sources: Subscription and Services Agreement
No Security Violations. You may not use the Products or Services to violate the security or integrity of any network, computer or communications system, software application, or network or computing device (each, a “System”). Prohibited activities include but are not limited toinclude: ▪ • Unauthorized Access. Accessing or using any System without permission, including attempting to probe, scan, or test the vulnerability of a System or to breach any security or authentication measures used by a System. ▪ • Interception. Monitoring of data or traffic on a System without permission.
Appears in 1 contract
Sources: User Agreement