No Security Violations. Licensee may not use the Service to violate, or attempt to violate, the security or integrity of any network, computer, or communications system, software application, or network or computing device prohibited activities include Licensee taking, or attempting to take, any of the following actions: x Gaining unauthorized access to the Service or any other accounts or Systems, whether through high-volume, automated, or electronic processes, hacking, password mining, reverse engineering, or any other means. x Probing, vulnerability scanning, or penetration testing of any System, or breaching any security or authentication measures without obtaining prior written approval from Nuance. In particular, social engineering, denial of service, destructive, and password sniffing or cracking tests are not permitted. x Monitoring data or traffic on any System without such permission. (Licensee may, however, monitor data or traffic on resources dedicated to Licenexscleuseive’usse.)
Appears in 4 contracts
Sources: End User License Agreement and Terms of Service, End User License Agreement, End User License Agreement
No Security Violations. Licensee may not use the Service to violate, or attempt to violate, the security or integrity of any network, computer, or communications system, software application, or network or computing device hese prohibited activities include Licensee taking, or attempting to take, any of the following actions: x Gaining unauthorized access to the Service or any other accounts or Systems, whether through high-volume, automated, or electronic processes, hacking, password mining, reverse engineering, or any other means. x Probing, vulnerability scanning, or penetration testing of any System, or breaching any security or authentication measures without obtaining prior written approval from Nuance. In particular, social engineering, denial of service, destructive, and password sniffing or cracking tests are not permitted. x Monitoring data or traffic on any System without such permission. (Licensee may, however, monitor data or traffic on resources dedicated to Licenexscleuseive’usseLicense exclusive use.)
Appears in 1 contract
Sources: End User License Agreement