Security Violations. 2.1 The Buyer and its End Users shall not access and/or use, or encourage, promote, facilitate or instruct others to access and/or use the Service Elements, the Buyer Content or the Buyer Account in a manner that would compromise or harm the security or integrity of any information technology service or system (including any network, computer, device, communication system or software application), including by means of: 2.1.1 unless otherwise agreed, any API other than that made available by the Supplier; 2.1.2 unauthorised access and/or use, including attempting to probe, scan, or test the vulnerability of any information technology service or system or to breach any security or authentication measures used by any information technology service or system; 2.1.3 the monitoring of data or traffic without permission; or 2.1.4 fraud or other forms of misrepresentation.
Appears in 2 contracts
Sources: Supplier Terms, Supplier Terms
Security Violations. 2.1 The Buyer and its End Users shall not access and/or use, or encourage, promote, facilitate or instruct others to access and/or use the Service Elements, the Buyer Content or the Buyer Account in a manner that would compromise or harm the security or integrity of any information technology service or system (including any network, computer, device, communication system or software application), including by means of:
2.1.1 unless otherwise agreed, any API other than that made available by the Supplier;
2.1.2 unauthorised access and/or use, including attempting to probe, scan, or test the vulnerability of any information technology service or system or to breach any security or authentication measures used by any information technology service or system;system;β
2.1.3 the monitoring of data or traffic without permission; or
2.1.4 fraud or other forms of misrepresentation.
Appears in 1 contract
Sources: Supplier Terms