Network Abuse. Any activity that involves making network connections to any third party without permission is prohibited. Such activity includes, but is not limited to, intentional network interference, port scanning, monitoring, crawling, denial of service, network penetration, sniffing, spoofing, virus deployment, hack attempts, vulnerability scanning, and avoidance of third-party network security restrictions or limitations.
Appears in 3 contracts
Sources: Software as a Service Agreement, Software as a Service Agreement, Software as a Service Agreement