Your Use of the Services. 4.1 The Services we provide and any software provided as part of our Services are provided solely for your own use and you may not resell, transfer, assign or sub-license them or any part of them to any other person. 4.2 You must ensure that any machines or personal computers used by you to access our Services do not have an adverse effect on our systems, those of our suppliers or on network traffic generally. You must use our Services in a manner consistent with all applicable laws and regulations which may apply to your use of the our Services. 4.3 You must ensure that any computers, systems or networks that utilise the our services are configured in such a way that does not give a third party the capability to use our services in an illegal or inappropriate manner. You should run a firewall and up-to-date anti-virus software, and ensure that your operating system is kept fully up to date with the latest security patches. 4.4 You must not use our services in any way that would, in our reasonable opinion, materially affect the use of or access to the Internet of any other person. This includes, but is not limited to, "denial of service" (DOS) and "distributed denial of service" (DDOS) attacks against another network or individual user. DOS attacks will result in immediate termination of the service we supply to you. 4.5 Any attempt, whether successful or not, to gain access to or retrieve data from any computer system without authorisation from its maintainer or owner will lead to immediate termination of our service and possibly to prosecution. This applies to port scanning, vulnerability probes and intentional distribution of "trojan horse" programs, viruses and worms, as well as making use of systems compromised by third parties. 4.6 Use of the our service to transmit any unsolicited commercial or unsolicited bulk e-mail is expressly prohibited. We have a zero-tolerance policy for spam. Spamming will result in immediate termination of our service. 4.7 Intentional distribution of software that attempts to and/or causes damage, harassment, or annoyance to persons, data, and/or computer systems is prohibited. This will result in immediate termination of our service. 4.8 Adding, removing or modifying identifying network header information in an effort to deceive or mislead is prohibited. Attempting to impersonate any person by using forged headers or other identifying information may result in termination of our service. 4.9 You must not use our services: 1. In any way that does not comply with any licences applicable to you or is unlawful or fraudulent or has any unlawful purpose or effect or; 2. In connection with the carrying out of a fraud or criminal offence; 3. To disseminate or otherwise distribute, knowingly receive, upload, download, use or re-use, any information or material which is inappropriate, profane, abusive, indecent, defamatory, obscene or menacing, or in breach of any copyright, privacy or any other rights; 4. In any way which infringes any third party's intellectual property rights; 5. In a way that does not comply with our specific instructions.
Appears in 3 contracts
Sources: Terms and Conditions, Terms and Conditions, Terms and Conditions