Network Abuse Sample Clauses

Network Abuse. Use of the Product to carry out network abuse, including denial of service attacks or intentional interference with the proper functioning of any network, computer or communications system, software application or network or computing device.
AutoNDA by SimpleDocs
Network Abuse. You may not make network connections to any users, hosts, or networks unless you have permission to communicate with them. Prohibited activities include:
Network Abuse. You may not make network connections to any users, hosts, or networks unless you have permission to communicate with them. Prohibited activities include: (i) Monitoring or crawling of a System; (ii) Denial of Service (DoS) - Inundating a target with communication requests; (iii) Interfering with the proper functioning of any System, including mail bombing or flooding techniques; (iv) Operating network services like open proxies, open mail relays, or open recursive domain name servers; (v) Using manual or electronic means to avoid any use limitations; (vi) Attack traffic that disrupts any portion of our network (incoming or outgoing) will be blocked until the customer is able to work with security personnel to resolve the issue; (vii) IRC websites and IRC servers are prohibited; (viii) You may not upload ROMs and Emulators; (ix) You must contact us prior to installing a CDN within our infrastructure. "Shared Resource" CDN’s are strictly prohibited.
Network Abuse. Customer is prohibited from abusing the networks of Stratus Networks, Inc. and its underlying carriers. For a complete description of Stratus Networks, Inc.’s network abuse policy, the terms and conditions of which are incorporated by this reference as if copied herein, please refer to the network abuse section within the legal page at xxx.xxxxxxxxxx.xxx.
Network Abuse. 3.1 The Buyer and its End Users shall not make network connections or encourage, promote, facilitate or instruct others to make network connections to any users, hosts or networks without the prior written permission of such user, host or network, including where such connection is used for or is intended to be used for:
Network Abuse. GE will use commercially reasonable efforts to ensure that GE and any Telecommuters agree to abide by the Code of Conduct in Exhibit C, do not abuse Telocity's
Network Abuse. You shall not make network connections to any users, hosts, systems or networks used to provide or make available to You the Console and the Services (each, a 'Target') unless You have permission to communicate with them and, in addition You shall not:
AutoNDA by SimpleDocs
Network Abuse. Any activity that involves making network connections to any third party without permission is prohibited. Such activity includes, but is not limited to, intentional network interference, port scanning, monitoring, crawling, denial of service, network penetration, sniffing, spoofing, virus deployment, hack attempts, vulnerability scanning, and avoidance of third-party network security restrictions or limitations.
Network Abuse. 10.1 Franchisee acknowledges that franchisee has read, understands and agrees to comply with, all applicable provision of CTZAPP's current Acceptable User policy incorporated herein by this reference.
Network Abuse. Users are prohibited from engaging in any activities that LiveCode Ltd determines, at its sole discretion, to constitute network abuse including, but not limited to, the following: • Introducing or executing malicious programs into any network or server, such as viruses, worms, Trojan Horses, and key loggers. • Causing or initiating security breaches or disruptions of network communication and/or connectivity, including port scans, flood pings, email‐ bombing, packet spoofing, IP spoofing, and forged routing information. • Executing any form of network activity that will intercept data not intended for the Customer's server. • Evading or circumventing user authentication or security of any host, network or account, including cracking, brute‐force, or dictionary attacks. • Interfering with or denying service to any user, host, or network other than the Customer's host, such as a denial of service attack or distributed denial of service attack. • Conduct designed to avoid restrictions or access limits to specific services, hosts, or networks, including the forging of packet headers or other identification information. • Soliciting the performance of any illegal activity, even if the activity is not performed. • Using any program, or sending messages of any kind, designed to interfere with or disable a user's terminal session. LiveCode Ltd has included a list of Prohibited Activities and examples of prohibited activities at the end of this document. All Users are encouraged to review this list to ensure compliance with this Agreement. If you believe that a violation of this Agreement has occurred please contact us to report such potential violation.
Time is Money Join Law Insider Premium to draft better contracts faster.