System and Network Security. 5.8.1 Violations of system or network security are prohibited and may result in criminal and civil liability. Examples include, but are not limited to the following: 5.8.1.1 unauthorized access, use, probe, or scan of a systems security or authentication measures, data or traffic; 5.8.1.2 interference with service to any user, host or network including, without limitation, mail bombing, flooding, deliberate attempts to overload a system and broadcast attacks; 5.8.1.3 forging of any TCP-IP packet header or any part of the header information in an e- mail or a newsgroup posting; and 5.8.1.4 employing posts or programs which consume excessive CPU time or storage space, permits the use of mail services, mail forwarding capabilities, POP accounts, or auto responders other than for their own account; or resale of access to CGI scripts installed on our servers.
Appears in 4 contracts
Sources: Fibre to the Business Agreement, Telecommunications, Wireless Services Agreement