Network Abuse. 3.1 The Buyer and its End Users shall not make network connections or encourage, promote, facilitate or instruct others to make network connections to any users, hosts or networks without the prior written permission of such user, host or network, including where such connection is used for or is intended to be used for: 3.1.1 monitoring or crawling any information technology service or system which impairs or disrupts it from being monitored or crawled; 3.1.2 issuing excessive and unnecessary communications requests to a target which impede it responding to genuine traffic or cause it to respond slowly such as to become ineffective; 3.1.3 interfering with the proper functioning of an information technology service or system in any way, including by any attempt to overload the service or system; 3.1.4 operating network services like mail relays, recursive domain name servers or open proxies; or 3.1.5 using manual or electronic means to evade incurring fees or, without limitation, any use access, device or storage limitations.
Appears in 2 contracts
Sources: Supplier Terms, Supplier Terms
Network Abuse. 3.1 The Buyer and its End Users shall not make network connections or encourage, promote, facilitate or instruct others to make network connections to any users, hosts or networks without the prior written permission of such user, host or network, including where such connection is used for or is intended to be used for:
3.1.1 monitoring or crawling any information technology service or system which impairs or disrupts it from being monitored or crawled;crawled;β
3.1.2 issuing excessive and unnecessary communications requests to a target which impede it responding to genuine traffic or cause it to respond slowly such as to become ineffective;
3.1.3 interfering with the proper functioning of an information technology service or system in any way, including by any attempt to overload the service or system;system;β
3.1.4 operating network services like mail relays, recursive domain name servers or open proxies; or
3.1.5 using manual or electronic means to evade incurring fees or, without limitation, any use access, device or storage limitations.
Appears in 1 contract
Sources: Supplier Terms