Common use of Security Violations Clause in Contracts

Security Violations. 2.1 The Buyer and its End Users shall not access and/or use, or encourage, promote, facilitate or instruct others to access and/or use the Service Elements, the Buyer Content or the Buyer Account in a manner that would compromise or harm the security or integrity of any information technology service or system (including any network, computer, device, communication system or software application), including by means of: 2.1.1 unless otherwise agreed, any API other than that made available by the Supplier; 2.1.2 unauthorised access and/or use, including attempting to probe, scan, or test the vulnerability of any information technology service or system or to breach any security or authentication measures used by any information technology service or system; 2.1.3 the monitoring of data or traffic without permission; or 2.1.4 fraud or other forms of misrepresentation.

Appears in 2 contracts

Sources: Supplier Terms, Supplier Terms

Security Violations. 2.1 The Buyer and its End Users shall not access and/or use, or encourage, promote, facilitate or instruct others to access and/or use the Service Elements, the Buyer Content or the Buyer Account in a manner that would compromise or harm the security or integrity of any information technology service or system (including any network, computer, device, communication system or software application), including by means of: 2.1.1 unless otherwise agreed, any API other than that made available by the Supplier; 2.1.2 unauthorised access and/or use, including attempting to probe, scan, or test the vulnerability of any information technology service or system or to breach any security or authentication measures used by any information technology service or system;system;β€Œ 2.1.3 the monitoring of data or traffic without permission; or 2.1.4 fraud or other forms of misrepresentation.

Appears in 1 contract

Sources: Supplier Terms