Common use of Server Abuse Clause in Contracts

Server Abuse. Any attempts to undermine or cause harm to any of the Company’s servers or Subscriber of the Company is strictly prohibited including, but not limited to:  Logging into a server or account that you are not authorized to access  Accessing data or taking any action to obtain services not intended for you or your use  Attempting to probe, scan or test the vulnerability of any system, subsystem or network  Tampering, hacking, modifying, or otherwise corrupting or breaching security or authentication measures without proper authorization  Transmitting material that contains viruses, Trojan horses, worms, time bombs, cancelbots or other computer programming routines or engines with the intent or effect of damaging, destroying, disrupting or otherwise impairing a computer's functionality or the operation of the System  Interfering with, intercepting or expropriating any system, data or information  Interfering with service to any user, host or network including, without limitation, by means of overloading, "flooding," "mailbombing," or "crashing" any computer system You will be held responsible for all actions performed by your account whether it be done by you or by others. All sub-networks of the Company and all Subscribers must adhere to the above policies.

Appears in 1 contract

Sources: Terms of Service

Server Abuse. Any attempts to undermine or cause harm to any of the Company’s servers or Subscriber of the Company is strictly prohibited including, but not limited to: Logging into a server or account that you are not authorized to access Accessing data or taking any action to obtain services not intended for you or your use Attempting to probe, scan or test the vulnerability of any system, subsystem or network Tampering, hacking, modifying, or otherwise corrupting or breaching security or authentication measures without proper authorization Transmitting material that contains viruses, Trojan horses, worms, time bombs, cancelbots or other computer programming routines or engines with the intent or effect of damaging, destroying, disrupting or otherwise impairing a computer's functionality or the operation of the System Interfering with, intercepting or expropriating any system, data or information Interfering with service to any user, host or network including, without limitation, by means of overloading, "flooding," "mailbombing," or "crashing" any computer system You will be held responsible for all actions performed by your account whether it be done by you or by others. All sub-networks of the Company and all Subscribers must adhere to the above policies.

Appears in 1 contract

Sources: End User License Agreement