Common use of System and Network Security Clause in Contracts

System and Network Security. 3.1. Any reference to systems and networks under this section refer to all systems and networks to which the Customer is granted access through Userverse, including, but not limited to, the Network and the Internet. 3.2. The Customer may not circumvent user authentication or security of any host, device, network or account (referred to as “hacking” or “cracking”), nor interfere with service to any user, host, device or network (referred to as “denial of service attacks”). The host, device, network or account shall also not be used for any illegal purpose, including phishing. 3.3. Violations of system or network security by the Customer are prohibited and may result in civil or criminal liability. Userverse will investigate incidents involving any violation or suspected violation and shall involve and co-operate with law enforcement officials if a criminal violation is suspected. Examples of system or network security violations include, without limitation, thefollowing: 3.3.1. Unauthorised access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of any system or network or to breach any security or authentication measures without the express authorisation of Userverse. 3.3.2. Unauthorised monitoring of data or traffic on the network or systems without the express authorisation of Userverse. 3.3.3. Interference with service to any user, device, host or network including, without limitation, mail bombing, flooding, deliberate attempts to overload a system and broadcast attacks; and/or 3.3.4. Forging of any TCP-IP packet header (spoofing) or any part of the header information in an e- mail or a newsgroup posting.

Appears in 1 contract

Sources: Service Level Agreement

System and Network Security. 3.1. Any reference to systems and networks under this section refer to all systems and networks to which the Customer is granted access through Userverse, including, but not limited to, the Network and Networkand the Internet. 3.2. The Customer may not circumvent user authentication or security of any host, device, network or account (referred to as “hacking” or “cracking”), nor interfere with service to any user, host, device or network (referred to as “denial of service attacks”). The host, device, network or account shall also not be used for any illegal purpose, including phishing. 3.3. Violations of system or network security by the Customer are prohibited and may result in civil or criminal liability. Userverse will investigate incidents involving any violation or suspected violation and shall involve and co-operate with law enforcement officials if a criminal violation is suspected. Examples of system or network security violations include, without limitation, thefollowingthe following: 3.3.1. Unauthorised access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of any system or network or to breach any security or authentication measures without the express authorisation of Userverse. 3.3.2. Unauthorised monitoring of data or traffic on the network or systems without the express authorisation of Userverse. 3.3.3. Interference with service to any user, device, host or network including, without limitation, mail bombing, flooding, deliberate attempts to overload a system and broadcast attacks; and/or 3.3.4. Forging of any TCP-IP packet header (spoofing) or any part of the header information in an e- mail or a newsgroup posting.

Appears in 1 contract

Sources: Service Level Agreement

System and Network Security. 3.1. Any reference to systems and networks under this section refer to all systems and networks to which the Customer is granted access through UserverseMFN, including, but not limited to, the Network infrastructure of MFN itself and the Internet. 3.2. The Customer may not circumvent user authentication or security of any host, device, network or account (referred to as “hacking” or “cracking”), nor interfere with service to any user, host, device or network (referred to as “denial of service attacks”). The host, device, network or account shall also not be used for any illegal purpose, including phishing. 3.3. Violations of system or network security by the Customer are prohibited and may result in civil or criminal liability. Userverse MFN will investigate incidents involving any violation or suspected violation and shall involve and co-operate with law enforcement officials if a criminal violation is suspected. Examples of system or network security violations include, without limitation, thefollowingthe following: 3.3.1. Unauthorised access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of any system or network or to breach any security or authentication measures without the express authorisation of Userverse.MFN; 3.3.2. Unauthorised monitoring of data or traffic on the network or systems without the express authorisation of Userverse.MFN; 3.3.3. Interference with service to any user, device, host or network including, without limitation, mail bombing, flooding, deliberate attempts to overload a system and broadcast attacks; and/or; 3.3.4. Forging of any TCP-IP packet header (spoofing) or any part of the header information in an e- mail or a newsgroup posting.

Appears in 1 contract

Sources: Standard Terms and Conditions

System and Network Security. 3.1. Any reference to systems and networks under this section refer to all systems and networks to which the Customer is granted access through UserverseLUCERT GROUP, including, but not limited to, the Network infrastructure of LUCERT GROUP itself and the Internet. 3.2. The Customer may not circumvent user authentication or security of any host, device, network or account (referred to as “hacking” or “cracking”), nor interfere with service to any user, host, device or network (referred to as “denial of service attacks”). The host, device, network or account shall also not be used for any illegal purpose, including phishing. 3.3. Violations of system or network security by the Customer are prohibited and may result in civil or criminal liability. Userverse LUCERT GROUP will investigate incidents involving any violation or suspected violation and shall involve and co-operate with law enforcement officials if a criminal violation is suspected. Examples of system or network security violations include, without limitation, thefollowingthe following: 3.3.1. Unauthorised Unauthorized access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of any system or network or to breach any security or authentication measures without the express authorisation of Userverse.LUCERT GROUP; 3.3.2. Unauthorised Unauthorized monitoring of data or traffic on the network or systems without the express authorisation of Userverse.LUCERT GROUP; 3.3.3. Interference with service to any user, device, host or network including, without limitation, mail bombing, flooding, deliberate attempts to overload a system and broadcast attacks; and/or; 3.3.4. Forging of any TCP-IP packet header (spoofing) or any part of the header information in an e- mail or a newsgroup posting.

Appears in 1 contract

Sources: Standard Terms and Conditions