Unauthorised Usage. 9.1 Any attempt to access or modify unauthorised computer system information or to interfere with normal system operations, whether on the equipment of ours or any computer system or network that is accessed by our services, may result in the suspension or termination of the Clients Services. Unauthorised activities include, but are not limited to, guessing or using passwords other than the Clients own, accessing information that does not have public permission, and accessing any system on which the Client is not welcome.
Appears in 2 contracts
Unauthorised Usage. 9.1 3.7.1 Any attempt to access or modify unauthorised computer system information or to interfere with normal system operations, whether on the equipment of ours or any computer system or network that is accessed by our services, may result in the suspension or termination of the Clients ServicesThe Customers Service. Unauthorised activities include, but are not limited to, guessing or using passwords other than the Clients The Customers own, accessing information that does not have public permission, and accessing any system on which the Client The Customer is not welcome.
Appears in 2 contracts
Samples: www.zettagrid.com, www.zettagrid.com
Unauthorised Usage. 9.1 Any attempt to access or modify unauthorised computer system information or to interfere with normal system operations, whether on the equipment of ours or any computer system or network that is accessed by our services, may result in the suspension or termination of the Clients Servicesyour access. Unauthorised activities include, but are not limited to, guessing or using passwords other than the Clients your own, accessing information that does not have public permission, and accessing any system on which the Client is you are not welcome.
Appears in 2 contracts
Samples: Form of Agreement, Form of Agreement