Security Violations. You may not use Services Offerings to violate the security or integrity of any network, computer, communications system, software application, network or computing device (each, a “System”).
Appears in 3 contracts
Sources: Dedicated Server Agreement, Dedicated Server Agreement, Dedicated Server Agreement