Network & Internet Clause Samples
The 'Network & Internet' clause defines the terms and conditions governing a party's access to and use of network and internet resources provided under an agreement. It typically outlines acceptable use policies, restrictions on unauthorized activities such as hacking or data breaches, and may specify security requirements or monitoring rights. This clause ensures that both parties understand their responsibilities regarding network usage, helping to prevent misuse, protect sensitive information, and maintain the integrity and security of the network infrastructure.
Network & Internet. (i) attempting to obtain unauthorized access to any network or account, including accessing data not intended for Customer, logging into a server or account without being expressly authorized to access or probing the security of other networks;
(ii) attempts to interfere with the Service of others including users, hosts and networks, including "denial of service" attacks, "flooding" of networks, deliberate attempts to overload a Service and attempts to "crash" any host;
(iii) reselling any Services or Products, without BEK's prior written consent;
(iv) distribution of the Services or Products;
(v) equipment, accessory, apparatus, circuit or devices that are harmful to the network, shall not be attached to or connected with Services or Products;
(vi) circumventing copyright laws and regulation, including the unauthorized download of music, video, images, books, software or content and/or other copyright protected works;
(vii) attempting to provide commercial or noncommercial distribution of content or information knowingly or unknowingly, directly or indirectly using peer to peer or other methods, under a residential service agreement with BEK; and
(viii) excessive use of the Services, which is defined as exceeding 300% over the average of Service usage of BEK customers in the same class of service that you have purchased from BEK.
Network & Internet. (i) attempting to obtain unauthorized access to any network or account, including accessing data not intended for Customer, logging into a server or account without being expressly authorized to access or probing the security of other networks;
(ii) attempts to interfere with the Service of others including users, hosts and networks, including "denial of service" attacks, "flooding" of networks, deliberate attempts to overload a Service and attempts to "crash" any host;
(iii) reselling any Services or Products, without ▇▇▇'s prior written consent;
(iv) distribution of the Services or Products;
(v) equipment, accessory, apparatus, circuit or devices that are harmful to the network, shall not be attached to or connected with Services or Products;
(vi) circumventing copyright laws and regulation, including the unauthorized download of music, video, images, books, software or content and/or other copyright protected works;
(vii) attempting to provide commercial or noncommercial distribution of content or information knowingly or unknowingly, directly or indirectly using peer to peer or other methods, under a residential service agreement with BEK;
(viii) excessive use of the Services, which is defined as exceeding 300% over the average of Service usage of BEK customers in the same class of service that you have purchased from BEK;
(ix) transmitting unsolicited bulk or commercial messages commonly known as “spam”;
(x) participating in the collection of very large numbers of email addresses, screen names, or other identifiers of others (without their prior consent), a practice sometimes known as spidering or harvesting, or participate in the use of software (including “spyware”) designed to facilitate this activity;
(xi) use or run dedicated, stand-alone equipment or servers from the Premises that provide network content or any other services to anyone outside of your Premises local area network (“Premises LAN”), also commonly referred to as public services or servers. Examples of prohibited equipment and servers include, but are not limited to, email, web hosting, file sharing, and proxy services and servers;
(xii) use or run programs, devices, or equipment from the Premises that provide network content or any other services to anyone outside of your Premises LAN; and
(xiii) use or run programs, devices, or equipment that, by their nature, result in excessive use of the Services by the Premises. Examples of prohibited programs, devices, or equipment include, bu...
