Prohibited Actions. 9.1. It is absolutely prohibited for the Client to take any of the following actions in relation to the Company’s systems and/or Platform(s) and/or Client Account: (a) Use, without the prior and written consent of the Company, of any software, which applies artificial intelligence analysis to the Company’s systems and/or Platform(s) and/or Client Account. (b) Intercept, monitor, damage or modify any communication which is not intended for him. (c) Use any type of spider, virus, worm, Trojan-horse, time bomb or any other codes or instructions that are designed to distort, delete, damage or disassemble the Platform(s) or the communication system or any system of the Company. (d) Send any unsolicited commercial communication not permitted under applicable law or Applicable Regulations. (e) Do anything that will or may violate the integrity of the Company computer system or Platform(s) or cause such system(s) to malfunction or stop their operation. (f) Unlawfully access or attempt to gain access, reverse engineer or otherwise circumvent any security measures that the Company has applied to the Platform(s). (g) Any action that could potentially allow the irregular or unauthorized access or use of the Platform(s). 9.2. Should the Company reasonably suspect that the Client has violated the terms of paragraph (10.1) of this Client Agreement, this shall be deemed as an Event of Default (as per Paragraph (13.1) and the Company shall be entitled to take one or more of the counter measures of paragraph (13.2) of this Client Agreement.
Appears in 22 contracts
Sources: Client Agreement, Client Agreement, Client Agreement
Prohibited Actions. 9.110.1. It is absolutely prohibited for the Client to take any of the following actions in relation to the Company’s systems and/or Platform(s) and/or Client Account:
(a) Usea. use, without the prior and written consent of the Company, of any software, software which applies artificial intelligence analysis to the Company’s systems and/or Platform(s) and/or Client Account.
(b) Intercept; b. intercept, monitor, damage or modify any communication which is not intended for him.;
(c) Use c. use any type of spider, virus, worm, Trojan-horse, time bomb or any other codes or instructions that are designed to distort, delete, damage or disassemble the Platform(s) or the communication system or any other system of the Company.;
(d) Send d. send any unsolicited commercial communication not permitted under applicable law or Applicable Regulations.;
(e) Do e. do anything that will or may violate the integrity of the Company Company’s computer system or Platform(s) or cause such system(s) to malfunction or stop their operation.operating;
(f) Unlawfully f. unlawfully access or attempt to gain access, reverse engineer or otherwise circumvent any security measures that the Company has applied to the Platform(s).;
(g) Any g. do any action that could potentially allow the irregular or unauthorized access or use of the Platform(s);
h. send massive requests on the server which may cause delays in the execution time;
i. engage in Abusive Trading.
9.210.2. Should the Company reasonably suspect that the Client has violated the terms of paragraph (10.1) of this Client Agreement, this shall be deemed as an Event of Default (as per Paragraph (13.1) and the Company shall be it is entitled to take any one or more of the counter measures of actions stated in paragraph (13.2) 14.2. of this Client Agreement.
Appears in 11 contracts
Sources: Client Agreement, Client Agreement, Client Agreement
Prohibited Actions. 9.110.1. It is absolutely prohibited for the Client to take any of the following actions in relation to the Company’s systems and/or Platform(s) and/or Client Account:
(a) Use, without the prior and written consent of the Company, of any software, which applies artificial intelligence analysis to the Company’s systems and/or Platform(s) and/or Client Account.
(b) Intercept, monitor, damage or modify any communication which is not intended for him.
(c) Use any type of spider, virus, worm, Trojan-horse, time bomb or any other codes or instructions that are designed to distort, delete, damage or disassemble the Platform(s) or the communication system or any system of the Company.
(d) Send any unsolicited commercial communication not permitted under applicable law or Applicable Regulations.
(e) Do anything that will or may violate the integrity of the Company computer system or Platform(s) or cause such system(s) to malfunction or stop their operation.
(f) Unlawfully access or attempt to gain access, reverse engineer or otherwise circumvent any security measures that the Company has applied to the Platform(s).
(g) Any Do any action that could potentially allow the irregular or unauthorized unauthorised access or use of the Platform(s).
9.2(h) Send massive requests on the server which may cause delays in the execution time.
(i) Abusive Trading.
10.2. Should the Company reasonably suspect that the Client has violated the terms of paragraph (10.1) of this Client Agreement., this shall be deemed as an Event of Default (as per Paragraph (13.1) and the Company shall be it is entitled to take one or more of the counter measures of Events of Default under paragraph (13.2) 14.2. of this Client Agreement.
Appears in 8 contracts
Sources: Client Agreement, Client Agreement, Client Agreement
Prohibited Actions. 9.110.1. It is absolutely prohibited for the Client to take any of the following actions in relation to the Company’s systems and/or Platform(s) and/or Client Account:
(a) Use, without the prior and written consent of the Company, of any software, which applies artificial intelligence analysis to the Company’s systems and/or Platform(s) and/or Client Account.
(b) Intercept, monitor, damage or modify any communication which is not intended for him.
(c) Use any type of spider, virus, worm, Trojan-horse, time bomb or any other codes or instructions that are designed to distort, delete, damage or disassemble the Platform(s) or the communication system or any system of the Company.
(d) Send any unsolicited commercial communication not permitted under applicable law or Applicable Regulations.
(e) Do anything that will or may violate the integrity of the Company computer system or Platform(s) or cause such system(s) to malfunction or stop their operation.
(f) Unlawfully access or attempt to gain access, reverse engineer or otherwise circumvent any security measures that the Company has applied to the Platform(s).
(g) Any any action that could potentially allow the irregular or unauthorized unauthorised access or use of the Platform(s).
9.2h) send massive requests on the server which may cause delays in the execution time.
i) Abusive Trading.
10.2. Should the Company reasonably suspect that the Client has violated the terms of paragraph (10.1) of this Client Agreement., this shall be deemed as an Event of Default (as per Paragraph (13.1) and the Company shall be it is entitled to take one or more of the counter measures of paragraph (13.2) 14.2. of this Client Agreement.
Appears in 2 contracts
Sources: Client Agreement, Client Agreement
Prohibited Actions. 9.18.1. It is absolutely prohibited for the Client to take any of anyof the following actions in relation to the Company’s systems and/or Platform(s) and/or Client Account:
(a) Use, without the prior and written consent of the Company, of any software, which applies artificial intelligence analysis to the Company’s systems and/or Platform(s) and/or Client Account.
(b) Intercept, monitor, damage or modify any communication which is not intended for him.
(c) Use any type of spider, virus, worm, Trojan-horse, time bomb or any other codes or instructions that are designed to distort, delete, damage or disassemble the Platform(s) or the communication system or any system of the Company.
(d) Send any unsolicited commercial communication not permitted under applicable law or Applicable Regulations.
(e) Do anything that will or may violate the integrity of the Company computer system or Platform(s) or cause such system(s) to malfunction or stop their operation.
(f) Unlawfully access or attempt to gain access, reverse engineer or otherwise circumvent any security measures that the Company has applied to the Platform(s).
(g) Any action that could potentially allow the irregular or unauthorized unauthorised access or use of the Platform(s).
9.2h) Employ trading strategies aimed at exploiting errors in prices and/or concluding transaction prices that are not representative of the market value.
8.2. Should the Company reasonably suspect that the Client has violated the terms of paragraph (10.1) 8.1 of this Client Agreement, this shall be deemed as an Event of Default (as per Paragraph (13.1paragraph 14.1) and the Company shall be entitled to take one or more of the counter measures of paragraph (13.2) 14.2 of this Client Agreement.
Appears in 2 contracts
Sources: Client Agreement, Client Agreement
Prohibited Actions. 9.1. 10.1 It is absolutely prohibited for the Client to take any of the following actions in relation to the Company’s systems and/or Platform(s) and/or Client Account:
(a) Useuse, without the prior and written consent of the Company, of any software, software which applies artificial intelligence analysis to the Company’s systems and/or Platform(s) and/or Client Account.
(b) Interceptintercept, monitor, damage or modify any communication which is not intended for him.
(c) Use use any type of spider, virus, worm, Trojan-horse, time bomb or any other codes or instructions that are designed to distort, delete, damage or disassemble the Platform(s) or the communication system or any other system of the Company.
(d) Send send any unsolicited commercial communication not permitted under applicable law or Applicable Regulations.
(e) Do do anything that will or may violate the integrity of the Company Company’s computer system or Platform(s) or cause such system(s) to malfunction or stop their operationoperating.
(f) Unlawfully unlawfully access or attempt to gain access, reverse engineer or otherwise circumvent any security measures that the Company has applied to the Platform(s).
(g) Any do any action that could potentially allow the irregular or unauthorized access or use of the Platform(s).
9.2. h) send massive requests on the server which may cause delays in the execution time.
i) engage in Abusive Trading.
10.2 Should the Company reasonably suspect that the Client has violated the terms of paragraph (10.1) of this Client Agreement, this shall be deemed as an Event of Default (as per Paragraph (13.1) and the Company shall be it is entitled to take any one or more of the counter measures of actions stated in paragraph (13.2) 14.2. of this Client Agreement.
Appears in 2 contracts
Sources: Client Agreement, Client Agreement
Prohibited Actions. 9.110.1. It is absolutely prohibited for the Client to take any of the following actions in relation to the Company’s systems and/or Platform(s) and/or Client Account:
(a) Use, without the prior and written consent of the Company, of any software, which applies artificial intelligence analysis to the Company’s systems and/or Platform(s) and/or Client Account.
(b) Intercept, monitor, damage or modify any communication which is not intended for him.
(c) Use any type of spider, virus, worm, Trojan-horse, time bomb or any other codes or instructions that are designed to distort, delete, damage or disassemble the Platform(s) or the communication system or any system of the Company.
(d) Send any unsolicited commercial communication not permitted under applicable law or Applicable Regulations.
(e) Do anything that will or may violate the integrity of the Company computer system or Platform(s) or cause such system(s) to malfunction or stop their operation.thei Operation
(f) Unlawfully access or attempt to gain access, reverse engineer or otherwise circumvent any security measures that the Company has applied to the Platform(s).
(g) Any any action that could potentially allow the irregular or unauthorized unauthorised access or use of the Platform(s).
9.2(h) send massive requests on the server which may cause delays in the execution time.
(i) Abusive Trading
10.2. Should the Company reasonably suspect that the Client has violated the terms of paragraph (10.1) 10.1 of this Client Agreement, this shall be deemed as an Event of Default (as per Paragraph (13.1) and the Company shall be it is entitled to take one or more of the counter measures of paragraph (13.2) 14.2 of this Client Agreement.
Appears in 2 contracts
Sources: Client Agreement, Client Agreement
Prohibited Actions. 9.18.1. It is absolutely prohibited for the Client to take any of anyof the following actions in relation to the Company’s systems and/or Platform(s) and/or Client Account:
(a) Use, without the prior and written consent of the Company, of any software, which applies artificial intelligence analysis to the Company’s systems and/or Platform(s) and/or Client Account.
(b) Intercept, monitor, damage or modify any communication which is not intended for him.
(c) Use any type of spider, virus, worm, Trojan-horse, time bomb or any other codes or instructions that are designed to reverse engineer, distort, delete, damage or disassemble the Platform(s) or the communication system or any system of the Company.
(d) Send any unsolicited commercial communication not permitted under applicable law or Applicable Regulations.
(e) Do anything that will or may violate the integrity of the Company computer system or Platform(s) or cause such system(s) to malfunction or stop their operation.
(f) Unlawfully access or attempt to gain access, reverse engineer engineer, or otherwise circumvent any security measures that the Company has applied to the Platform(s).
(g) Any action that could potentially allow the irregular or unauthorized access or use of the Platform(s).
9.2h) Employ trading strategies aimed at exploiting errors in prices and/or concluding transaction prices that are not representative of the market value.
8.2. Should the Company reasonably suspect that the Client has violated the terms of paragraph (10.1) 8.1 of this Client Agreement, this shall be deemed as an Event of Default (as per Paragraph (13.1paragraph 14.1) and the Company shall be entitled to take one or more of the counter measures of paragraph (13.2) 14.2 of this Client Agreement.
Appears in 1 contract
Sources: Client Agreement
Prohibited Actions. 9.1. It is absolutely prohibited for the Client to take any of the following actions in relation to the Company’s systems and/or Platform(s) and/or Client Account:
(a) Use, without the prior and written consent of the Company, of any software, which applies artificial intelligence analysis to the Company’s systems and/or Platform(s) and/or Client Account.
(b) Intercept, monitor, damage or modify any communication which is not intended for him.
(c) Use any type of spider, virus, worm, Trojan-horse, time bomb or any other codes or instructions that are designed to distort, delete, damage or disassemble the Platform(s) or the communication system or any system of the Company.
(d) Send any unsolicited commercial communication not permitted under applicable law or lawor Applicable Regulations.
(e) Do anything that will or may violate the integrity of the Company computer system or Platform(sorPlatform(s) or cause such system(s) to malfunction or stop their operation.
(f) Unlawfully access or attempt to gain access, reverse engineer or otherwise circumvent any security measures that the Company has applied to the Platform(s).
(g) Any action that could potentially allow the irregular or unauthorized access or use of the Platform(s).
9.2. Should the Company reasonably suspect that the Client has violated the terms of paragraph (10.1) of this Client Agreement, this shall be deemed as an Event of Default (as per Paragraph (13.1) and the Company shall be entitled to take one or more of the counter measures of paragraph (13.2) of this Client Agreement.
Appears in 1 contract
Sources: Client Agreement
Prohibited Actions. 9.1. It is absolutely prohibited for the Client to take any of the following actions in relation to the Company’s systems and/or Platform(s) and/or Client Account:
(a) Use, without the prior and written consent of the Company, of any software, which applies artificial intelligence analysis to the Company’s systems and/or Platform(s) and/or and/ or Client Account.
(b) Intercept, monitor, damage or modify any communication which is not intended for him.
(c) Use any type of spider, virus, worm, Trojan-horse, time bomb or any other codes or instructions that are designed to distort, delete, damage or disassemble the Platform(s) or the communication system or any system of the Company.
(d) Send any unsolicited commercial communication not permitted under applicable law or Applicable Regulations.
(e) Do anything that will or may violate the integrity of the Company computer system or Platform(s) or cause such system(s) to malfunction or stop their operation.
(f) Unlawfully access or attempt to gain access, reverse engineer or otherwise circumvent any security measures that the Company has applied to the Platform(s).
(g) Any action that could potentially allow the irregular or unauthorized access or use of the Platform(s).
(h) scalping: The Scalping technique on Profitswiss Platform is strictly prohibited and will be fiercly sanctioned if discovered by Profitswiss System Moderators.
9.2. Should the Company reasonably suspect that the Client has violated the terms of paragraph (10.1) of this Client Agreement, this shall be deemed as an Event of Default (as per Paragraph (13.1) and the Company shall be entitled to take one or more of the counter measures of paragraph (13.2) of this Client Agreement.
Appears in 1 contract
Sources: Client Agreement
Prohibited Actions. 9.1. It is absolutely prohibited for the Client to take any of the following actions in relation to the Company’s systems and/or Platform(s) and/or Client Account:
(a) Use, without the prior and written consent of the Company, of any software, which applies artificial intelligence analysis to the Company’s systems and/or Platform(s) and/or Client Account.
(b) Intercept, monitor, damage or modify any communication which is not intended for him.
(c) Use any type of spider, virus, worm, Trojan-horse, time bomb or any other codes or instructions that are designed to distort, delete, damage or disassemble the Platform(s) or the communication system or any system of the Company.
(d) Send any unsolicited commercial communication not permitted under applicable law or Applicable Regulations.
(e) Do anything that will or may violate the integrity of the Company computer system or Platform(s) or cause such system(s) to malfunction or stop their operation.the operations,
(f) Unlawfully access or attempt to gain access, reverse engineer or otherwise circumvent any security measures that the Company has applied to the Platform(s).
(g) Any action that could potentially allow the irregular or unauthorized unauthorised access or use of the Platform(s).
(h) Send massive requests on the server which may cause delays in the execution time.
(i) Abusive Trading
9.2. Should the Company reasonably suspect that the Client has violated the terms of paragraph (10.1) 9.1 of this Client Agreement, this shall be deemed as an Event of Default (as per Paragraph (13.1) and the Company shall be it is entitled to take one or more of the counter measures of paragraph (13.2) 13.2 of this Client Agreement.
Appears in 1 contract
Sources: Client Agreement
Prohibited Actions. 9.110.1. It is absolutely prohibited for the Client to take any of the following actions in relation to the Company’s systems and/or Platform(s) and/or Client Account:
(a) Use, without the prior and written consent of the Company, of any software, which applies artificial intelligence analysis to the Company’s systems and/or Platform(s) and/or Client Account.
(b) Intercept, monitor, damage or modify any communication which is not intended for him.
(c) Use any type of spider, virus, worm, Trojan-horse, time bomb or any other codes or instructions that are designed to distort, delete, damage or disassemble the Platform(s) or the communication system or any system of the Company.
(d) Send any unsolicited commercial communication not permitted under applicable law or Applicable Regulations.
(e) Do anything that will or may violate the integrity of the Company computer system or Platform(s) or cause such system(s) to malfunction or stop their operation.
(f) Unlawfully access or attempt to gain access, reverse engineer or otherwise circumvent any security measures that the Company has applied to the Platform(s).
(g) Any any action that could potentially allow the irregular or unauthorized unauthorised access or use of the Platform(s).
9.2(h) send massive requests on the server which may cause delays in the execution time.
(i) Abusive Trading.
10.2. Should the Company reasonably suspect that the Client has violated the terms of paragraph (10.1) 10.1 of this Client Agreement, this shall be deemed as an Event of Default (as per Paragraph (13.1) and the Company shall be it is entitled to take one or more of the counter measures of paragraph (13.2) 14.2 of this Client Agreement.
Appears in 1 contract
Sources: Client Agreement
Prohibited Actions. 9.1. 9.1 It is absolutely prohibited for the Client to take any of the following actions in relation to the Company’s systems and/or Platform(s) and/or Client Account:
(a) a. Use, without the prior and written consent of the Company, of any software, which applies artificial intelligence analysis to the Company’s systems and/or Platform(s) and/or and/ or Client Account.
(b) b. Intercept, monitor, damage or modify any communication which is not intended for him.
(c) c. Use any type of spider, virus, worm, Trojan-horse, time bomb or any other codes or instructions that are designed to distort, delete, damage or disassemble the Platform(s) or the communication system or any system of the Company.
(d) d. Send any unsolicited commercial communication not permitted under applicable law or Applicable Regulations.
(e) e. Do anything that will or may violate the integrity of the Company computer system or Platform(s) or cause such system(s) to malfunction or stop their operation.
(f) f. Unlawfully access or attempt to gain access, reverse engineer or otherwise circumvent any security measures that the Company has applied to the Platform(s).
(g) g. Any action that could potentially allow the irregular or unauthorized access or use of the Platform(s).
9.2. h. scalping: The Scalping technique on DBankings Platform is strictly prohibited and willbe fiercely sanctioned if discovered by DBankings System Moderators.
9.2 Should the Company reasonably suspect that the Client has violated the terms of paragraph (10.1) of this Client Agreement, this shall be deemed as an Event of Default (as per Paragraph (13.1) and the Company shall be entitled to take one or more of the counter measures of paragraph (13.2) of this Client Agreement.
Appears in 1 contract
Sources: Client Agreement
Prohibited Actions. 9.110.1. It is absolutely prohibited for the Client to take any of the following actions in relation to the Company’s systems and/or Platform(s) and/or Client Account:
(a) Use, without the prior and written consent of the Company, of any software, which applies artificial intelligence analysis to the Company’s systems and/or Platform(s) and/or Client Account.
(b) Intercept, monitor, damage or modify any communication which is not intended for him.
(c) Use any type of spider, virus, worm, Trojan-horseTrojan•horse, time bomb or any other codes or instructions that are designed to distort, delete, damage or disassemble the Platform(s) or the communication system or any system of the Company.
(d) Send any unsolicited commercial communication not permitted under applicable law or Applicable Regulations.
(e) Do anything that will or may violate the integrity of the Company computer system or Platform(s) or cause such system(s) to malfunction or stop their operation.thei Operation
(f) Unlawfully access or attempt to gain access, reverse engineer or otherwise circumvent any security measures that the Company has applied to the Platform(s).
(g) Any any action that could potentially allow the irregular or unauthorized unauthorised access or use of the Platform(s).
9.2(h) send massive requests on the server which may cause delays in the execution time.
(i) Abusive Trading
10.2. Should the Company reasonably suspect that the Client has violated the terms of paragraph (10.1) 10.1 of this Client Agreement, this shall be deemed as an Event of Default (as per Paragraph (13.1) and the Company shall be it is entitled to take one or more of the counter measures of paragraph (13.2) 14.2 of this Client Agreement.
Appears in 1 contract
Sources: Client Agreement
Prohibited Actions. 9.1. It is absolutely prohibited for the Client to take any of the following actions in relation to relationto the Company’s systems and/or Platform(s) and/or Client Account:
(a) Use, without the prior and written consent of the Company, of any software, which applies whichapplies artificial intelligence analysis to the Company’s systems and/or Platform(s) and/or Client Account.
(b) Intercept, monitor, damage or modify any communication which is not intended for him.
(c) Use any type of spider, virus, worm, Trojan-horse, time bomb or any other codes or instructions that are designed to distort, delete, damage or disassemble the Platform(s) or the communication system or any system of the Company.
(d) Send any unsolicited commercial communication not permitted under applicable law or lawor Applicable Regulations.
(e) Do anything that will or may violate the integrity of the Company computer system or Platform(sorPlatform(s) or cause such system(s) to malfunction or stop their operation.
(f) Unlawfully access or attempt to gain access, reverse engineer or otherwise circumvent any security measures that the Company has applied to the Platform(s).Platform(s).
(g) Any action that could potentially allow the irregular or unauthorized access or use of the Platform(sthePlatform(s).
9.2. Should the Company reasonably suspect that the Client has violated the terms of paragraph ofparagraph (10.1) of this Client Agreement, this shall be deemed as an Event of Default (as per Paragraph (13.1) and the Company shall be entitled to take one or more of the counter thecounter measures of paragraph (13.2) of this Client Agreement.
Appears in 1 contract
Sources: Client Agreement
Prohibited Actions. 9.1. 9.1 It is absolutely prohibited for the Client to take any of the following actions in relation to the Company’s systems and/or Platform(s) and/or Client Account:
(a) a. Use, without the prior and written consent of the Company, of any software, which applies artificial intelligence analysis to the Company’s systems and/or Platform(s) and/or and/ or Client Account.
(b) b. Intercept, monitor, damage or modify any communication which is not intended for him.
(c) c. Use any type of spider, virus, worm, Trojan-horse, time bomb or any other codes or instructions that are designed to distort, delete, damage or disassemble the Platform(s) or the communication system or any system of the Company.
(d) d. Send any unsolicited commercial communication not permitted under applicable law or Applicable Regulations.
(e) e. Do anything that will or may violate the integrity of the Company computer system or Platform(s) or cause such system(s) to malfunction or stop their operation.
(f) f. Unlawfully access or attempt to gain access, reverse engineer or otherwise circumvent any security measures that the Company has applied to the Platform(s).
(g) g. Any action that could potentially allow the irregular or unauthorized access or use of the Platform(s).
9.2. h. scalping: The Scalping technique on Gamma-Holdings Platform is strictly prohibited and will be fiercely sanctioned if discovered by Gamma-Holdings System Moderators.
9.2 Should the Company reasonably suspect that the Client has violated the terms of paragraph (10.1) of this Client Agreement, this shall be deemed as an Event of Default (as per Paragraph (13.1) and the Company shall be entitled to take one or more of the counter measures of paragraph (13.2) of this Client Agreement.
Appears in 1 contract
Sources: Client Agreement
Prohibited Actions. 9.18.1. It is absolutely prohibited for the Client to take any of the following actions in relation to the Company’s systems and/or Platform(s) and/or Client Account:
(a) Use, without the prior and written consent of the Company, of any software, which applies artificial intelligence analysis to the Company’s systems and/or Platform(s) and/or Client Account.
(b) Intercept, monitor, damage or modify any communication which is not intended for him.
(c) Use any type of spider, virus, worm, Trojan-horse, time bomb or any other codes or instructions that are designed to reverse engineer, distort, delete, damage or disassemble the Platform(s) or the communication system or any system of the Company.
(d) Send any unsolicited commercial communication not permitted under applicable law or Applicable Regulations.
(e) Do anything that will or may violate the integrity of the Company computer system or Platform(s) or cause such system(s) to malfunction or stop their operation.
(f) Unlawfully access or attempt to gain access, reverse engineer engineer, or otherwise circumvent any security measures that the Company has applied to the Platform(s).otherwise
(g) Any action that could potentially allow the irregular or unauthorized access or use of the Platform(s).
9.2h) Employ trading strategies aimed at exploiting errors in prices and/or concluding transaction prices that are not representative of the market value.
8.2. Should the Company reasonably suspect that the Client has violated the terms of paragraph (10.1) 8.1 of this Client Agreement, this shall be deemed as an Event of Default (as per Paragraph (13.1paragraph 14.1) and the Company shall be entitled to take one or more of the counter measures of paragraph (13.2) 14.2 of this Client Agreement.
Appears in 1 contract
Sources: Client Agreement
Prohibited Actions. 9.1. 9.1 It is absolutely prohibited for the Client to take any of the following actions in relation to the Company’s systems and/or Platform(s) and/or Client Account:
(a) a. Use, without the prior and written consent of the Company, of any software, which applies artificial intelligence analysis to the Company’s systems and/or Platform(s) and/or and/ or Client Account.
(b) b. Intercept, monitor, damage or modify any communication which is not intended for him.
(c) c. Use any type of spider, virus, worm, Trojan-horse, time bomb or any other codes or instructions that are designed to distort, delete, damage or disassemble the Platform(s) or the communication system or any system of the Company.
(d) d. Send any unsolicited commercial communication not permitted under applicable law or Applicable Regulations.
(e) e. Do anything that will or may violate the integrity of the Company computer system or Platform(s) or cause such system(s) to malfunction or stop their operation.
(f) f. Unlawfully access or attempt to gain access, reverse engineer or otherwise circumvent any security measures that the Company has applied to the Platform(s).
(g) g. Any action that could potentially allow the irregular or unauthorized access or use of the Platform(s).
9.2. h. scalping: The Scalping technique on OpenXTM Platform is strictly prohibited and will be fiercely sanctioned if discovered by OpenXTM System Moderators.
9.2 Should the Company reasonably suspect that the Client has violated the terms of paragraph (10.1) of this Client Agreement, this shall be deemed as an Event of Default (as per Paragraph (13.1) and the Company shall be entitled to take one or more of the counter measures of paragraph (13.2) of this Client Agreement.
Appears in 1 contract
Sources: Client Agreement