{"component": "clause", "props": {"groups": [{"size": 4, "samples": [{"hash": "ibGvyp1OIRD", "uri": "/contracts/ibGvyp1OIRD#hacking", "label": "Standard Equipment and Services Supply Agreement", "score": 23.7405891418, "published": true}, {"hash": "6pDNeTYVveI", "uri": "/contracts/6pDNeTYVveI#hacking", "label": "Standard Equipment and Services Supply Agreement", "score": 23.6132793427, "published": true}, {"hash": "3pD4lZgnXuu", "uri": "/contracts/3pD4lZgnXuu#hacking", "label": "Standard Equipment and Services Supply Agreement", "score": 23.0670776367, "published": true}], "snippet": "\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 does not accept liability for breaches of the Hosted Services system, nor any call charges that might arise from such a breach. It is the subscriber\u2019s responsibility to ensure the security of their telephone system and/or equipment.", "snippet_links": [{"key": "liability-for-breaches", "type": "clause", "offset": [26, 48]}, {"key": "hosted-services-system", "type": "definition", "offset": [56, 78]}, {"key": "call-charges", "type": "definition", "offset": [88, 100]}, {"key": "arise-from", "type": "definition", "offset": [112, 122]}, {"key": "the-subscriber", "type": "definition", "offset": [144, 158]}, {"key": "to-ensure", "type": "clause", "offset": [176, 185]}, {"key": "security-of", "type": "clause", "offset": [190, 201]}, {"key": "telephone-system", "type": "definition", "offset": [208, 224]}], "hash": "9ef0176ede8f0a4f51add15874c04982", "id": 2}, {"size": 3, "samples": [{"hash": "kn5Ewa4UZW0", "uri": "/contracts/kn5Ewa4UZW0#hacking", "label": "Shopsqa Acceptable Use Policy Agreement", "score": 19.6432819366, "published": true}, {"hash": "b4rWxCrhaDv", "uri": "/contracts/b4rWxCrhaDv#hacking", "label": "Shopsqa Acceptable Use Policy Agreement", "score": 19.6432819366, "published": true}, {"hash": "8cQI76dkIVq", "uri": "/contracts/8cQI76dkIVq#hacking", "label": "Shopsqa Acceptable Use Policy Agreement", "score": 19.5448322296, "published": true}], "snippet": "Accessing illegally or without authorization computers, accounts, equipment or networks belonging to WebQA or any party or individual, or attempting to penetrate security measures of WebQA\u2019s or another\u2019s system. This includes any activity that may be used as a precursor to an attempted system penetration, including, but not limited to, port scans, stealth scans, or other information gathering activity.", "snippet_links": [{"key": "without-authorization", "type": "definition", "offset": [23, 44]}, {"key": "security-measures", "type": "clause", "offset": [162, 179]}, {"key": "not-limited", "type": "clause", "offset": [322, 333]}, {"key": "information-gathering", "type": "clause", "offset": [374, 395]}], "hash": "c194697c45ad77752e62f0241308841a", "id": 3}, {"size": 3, "samples": [{"hash": "htKmv9MgXPr", "uri": "/contracts/htKmv9MgXPr#hacking", "label": "Software as a Service Agreement", "score": 35.0399589539, "published": true}, {"hash": "2s0eQtmiI2H", "uri": "/contracts/2s0eQtmiI2H#hacking", "label": "Software as a Service Agreement", "score": 34.9746208191, "published": true}, {"hash": "gbKdgh3OYop", "uri": "/contracts/gbKdgh3OYop#hacking", "label": "Software as a Service Agreement", "score": 27.7624912262, "published": true}], "snippet": "The Services shall not be used for hacking, attacking, gaining access to, breaching, circumventing, or testing the vulnerability of the user authentication or security of any host, network, server, personal computer, network access and control devices, software, or data without the express authorization of the owner of the system or network.", "snippet_links": [{"key": "the-services", "type": "clause", "offset": [0, 12]}, {"key": "access-to", "type": "definition", "offset": [63, 72]}, {"key": "user-authentication", "type": "clause", "offset": [136, 155]}, {"key": "security-of", "type": "clause", "offset": [159, 170]}, {"key": "personal-computer", "type": "definition", "offset": [198, 215]}, {"key": "control-devices", "type": "clause", "offset": [236, 251]}, {"key": "express-authorization", "type": "definition", "offset": [283, 304]}, {"key": "of-the-owner", "type": "clause", "offset": [305, 317]}, {"key": "the-system", "type": "definition", "offset": [321, 331]}], "hash": "59859b8851f366584f7797dbb412b275", "id": 8}, {"size": 3, "samples": [{"hash": "gt3w7LK5umz", "uri": "/contracts/gt3w7LK5umz#hacking", "label": "School Handbook", "score": 33.4815139771, "published": true}, {"hash": "a7rvuRIhI0M", "uri": "/contracts/a7rvuRIhI0M#hacking", "label": "School Handbook", "score": 32.097442627, "published": true}, {"hash": "48PSEozFsNP", "uri": "/contracts/48PSEozFsNP#hacking", "label": "School Policy Manual", "score": 23.8021907806, "published": true}], "snippet": "No person shall hack or attempt to hack into the Network or access or attempt to access any information stored on the Network to which such person is not entitled access.", "snippet_links": [{"key": "no-person-shall", "type": "clause", "offset": [0, 15]}, {"key": "the-network", "type": "definition", "offset": [45, 56]}, {"key": "not-entitled", "type": "definition", "offset": [150, 162]}], "hash": "c84cb974a573cac3a54e579b07ec1b49", "id": 5}, {"size": 5, "samples": [{"hash": "bQryE3UTY8b", "uri": "/contracts/bQryE3UTY8b#hacking", "label": "Combined Insurance Policy", "score": 25.061548233, "published": true}, {"hash": "glAFSXpwj2L", "uri": "/contracts/glAFSXpwj2L#hacking", "label": "Property Owners Insurance Policy", "score": 22.4510612488, "published": true}, {"hash": "ksXjRJlQxRG", "uri": "/contracts/ksXjRJlQxRG#hacking", "label": "Property Owners Insurance Policy", "score": 21.799451828, "published": true}], "snippet": "Hacking means unauthorised access to any computer system, whether the property of the", "snippet_links": [{"key": "access-to", "type": "definition", "offset": [27, 36]}, {"key": "computer-system", "type": "clause", "offset": [41, 56]}, {"key": "the-property", "type": "clause", "offset": [66, 78]}], "hash": "5ee98d9c1efba3d1f2cce195ae831549", "id": 1}, {"size": 3, "samples": [{"hash": "bL7GEOXNhGy", "uri": "/contracts/bL7GEOXNhGy#hacking", "label": "Terms and Conditions", "score": 35.083480835, "published": true}, {"hash": "6xECF6yzjI5", "uri": "/contracts/6xECF6yzjI5#hacking", "label": "Terms and Conditions", "score": 31.7179813385, "published": true}, {"hash": "3YD8DIpY8l5", "uri": "/contracts/3YD8DIpY8l5#hacking", "label": "Terms and Conditions", "score": 30.7597312927, "published": true}], "snippet": "Websites dedicated to the discussion of hacking activities or the distribution of hacking tools are prohibited. Also, the usage of ACSB\u2019s computer systems or network to access any system, service, or network without the owner\u2019s consent is expressly forbidden. Any activity which causes service interruptions to either ACSB\u2019s network/servers or any outside network. This includes, but is not limited to, the execution of Denial of Service attacks or other maliciously configured software.", "snippet_links": [{"key": "distribution-of", "type": "clause", "offset": [66, 81]}, {"key": "computer-systems", "type": "clause", "offset": [138, 154]}, {"key": "the-owner", "type": "definition", "offset": [216, 225]}, {"key": "service-interruptions", "type": "definition", "offset": [286, 307]}, {"key": "not-limited", "type": "clause", "offset": [387, 398]}, {"key": "the-execution", "type": "clause", "offset": [403, 416]}, {"key": "denial-of-service-attacks", "type": "clause", "offset": [420, 445]}, {"key": "configured-software", "type": "definition", "offset": [467, 486]}], "hash": "277649701684524cc74d8d94e148f1d3", "id": 7}, {"size": 3, "samples": [{"hash": "5G3Ip228Mwk", "uri": "/contracts/5G3Ip228Mwk#hacking", "label": "Hosting Agreement", "score": 27.2559890747, "published": true}, {"hash": "8hnECWjt96T", "uri": "/contracts/8hnECWjt96T#hacking", "label": "Master Services Agreement", "score": 24.8329906464, "published": true}, {"hash": "h5To3fL2h5g", "uri": "/contracts/h5To3fL2h5g#hacking", "label": "Master Services Agreement", "score": 23.1834354401, "published": true}], "snippet": "The use of the Services and/or Third Party Services or hacking, attacking, gaining access to, breaching, circumventing or testing the vulnerability of the user authentication or security of any host, network, server, personal computer, network access and control devices, software or data without express authorization of the owner of the system or network.", "snippet_links": [{"key": "use-of-the-services", "type": "clause", "offset": [4, 23]}, {"key": "third-party-services", "type": "definition", "offset": [31, 51]}, {"key": "access-to", "type": "definition", "offset": [83, 92]}, {"key": "user-authentication", "type": "clause", "offset": [155, 174]}, {"key": "security-of", "type": "clause", "offset": [178, 189]}, {"key": "personal-computer", "type": "definition", "offset": [217, 234]}, {"key": "control-devices", "type": "clause", "offset": [255, 270]}, {"key": "express-authorization", "type": "definition", "offset": [297, 318]}, {"key": "of-the-owner", "type": "clause", "offset": [319, 331]}, {"key": "the-system", "type": "definition", "offset": [335, 345]}], "hash": "b9229c18353661c484159d05bd32fc16", "id": 6}, {"size": 3, "samples": [{"hash": "1CFgCRapbrn", "uri": "/contracts/1CFgCRapbrn#hacking", "label": "Wireless Service Agreement", "score": 24.3661880493, "published": true}, {"hash": "lx2bxsYisIO", "uri": "/contracts/lx2bxsYisIO#hacking", "label": "Wireless Service Agreement", "score": 24.2347698212, "published": true}, {"hash": "gMftTnyNkVk", "uri": "/contracts/gMftTnyNkVk#hacking", "label": "Wireless Service Agreement", "score": 24.1348400116, "published": true}], "snippet": "Accessing any of Lightwave\u2019s equipment, computers or network to read, alter, or modify configuration or firmware.", "snippet_links": [], "hash": "b687dd5baa7d4710f1724d97473151f6", "id": 4}, {"size": 3, "samples": [{"hash": "105gyFKnhUD", "uri": "/contracts/105gyFKnhUD#hacking", "label": "Acceptable Use Policy", "score": 28.8244113922, "published": true}, {"hash": "llwY6ZoxBPM", "uri": "/contracts/llwY6ZoxBPM#hacking", "label": "Acceptable Use Policy", "score": 26.377204895, "published": true}], "snippet": "Unauthorized access to or use of data, including, without limitation, any attempt to circumvent user authentication or security of any host, network, or account, hacking, cracking, port scans, or flood pings, unauthorized monitoring of data or traffic, interfering with service to any user, host, system, or network, conducting denial of service attacks, distributing or introducing viruses, Trojan horses, worms or other harmful software, or any other any attempt to disrupt any service.", "snippet_links": [{"key": "access-to", "type": "definition", "offset": [13, 22]}, {"key": "use-of-data", "type": "clause", "offset": [26, 37]}, {"key": "without-limitation", "type": "clause", "offset": [50, 68]}, {"key": "user-authentication", "type": "clause", "offset": [96, 115]}, {"key": "security-of", "type": "clause", "offset": [119, 130]}, {"key": "denial-of-service-attacks", "type": "clause", "offset": [328, 353]}, {"key": "harmful-software", "type": "clause", "offset": [422, 438]}, {"key": "any-service", "type": "clause", "offset": [476, 487]}], "hash": "1cc9fdbc1abaf3fc8a7df742755f0f2e", "id": 10}, {"size": 3, "samples": [{"hash": "7t0Fu5xlmDY", "uri": "/contracts/7t0Fu5xlmDY#hacking", "label": "Terms of Use", "score": 34.3709030151, "published": true}, {"hash": "eBE1CvEpyGZ", "uri": "/contracts/eBE1CvEpyGZ#hacking", "label": "Terms of Use", "score": 33.9504852295, "published": true}, {"hash": "4IGaSQB2MG8", "uri": "/contracts/4IGaSQB2MG8#hacking", "label": "Terms of Use", "score": 25.7693367004, "published": true}], "snippet": "Third Party hacking attack or other malicious activities of Internet users.", "snippet_links": [{"key": "third-party", "type": "clause", "offset": [0, 11]}], "hash": "de9260c43f8511cc41bc053ea40860f1", "id": 9}], "next_curs": "ClASSmoVc35sYXdpbnNpZGVyY29udHJhY3RzciwLEhZDbGF1c2VTbmlwcGV0R3JvdXBfdjU2IhBoYWNraW5nIzAwMDAwMDBhDKIBAmVuGAAgAA==", "clause": {"title": "Hacking", "size": 81, "parents": [["miscellaneous", "Miscellaneous"], ["liability", "Liability"], ["mutual-liability", "Mutual Liability"], ["student-solicitations", "Student Solicitations"], ["use-of-the-school-network", "USE OF THE SCHOOL NETWORK"]], "children": [], "id": "hacking", "related": [["problems", "Problems", "Problems"], ["solution", "Solution", "Solution"], ["problem-solving", "Problem Solving", "Problem Solving"], ["grievability", "Grievability", "Grievability"], ["interoperability", "Interoperability", "Interoperability"]], "related_snippets": [], "updated": "2025-07-17T06:09:22+00:00", "also_ask": ["What key definitions and scope should be included to clearly delineate 'hacking' in this clause?", "How can this clause be strategically negotiated to allocate liability for third-party hacking incidents?", "What are the most common enforceability challenges for hacking clauses in court?", "How does this clause compare to industry-standard cyber risk provisions?", "What critical risks or loopholes could undermine the effectiveness of this clause?"], "drafting_tip": "Define prohibited hacking activities to avoid ambiguity; specify remedies for breaches to ensure enforceability; reference applicable laws to align with legal standards.", "explanation": "The Hacking clause defines the responsibilities and liabilities of parties in relation to unauthorized access or interference with computer systems, networks, or data. Typically, this clause prohibits either party from engaging in hacking activities, such as bypassing security measures, accessing confidential information without permission, or disrupting digital services. It may also outline the steps to be taken if a hacking incident occurs, such as notification requirements or cooperation with investigations. The core function of this clause is to protect both parties from cyber threats and clarify the consequences of hacking, thereby reducing legal and operational risks associated with cybersecurity breaches."}, "json": true, "cursor": ""}}