Common use of Unauthorised Usage Clause in Contracts

Unauthorised Usage. 9.1 Any attempt to access or modify unauthorised computer system information or to interfere with normal system operations, whether on the equipment of ours or any computer system or network that is accessed by our services, may result in the suspension or termination of your access. Unauthorised activities include, but are not limited to, guessing or using passwords other than your own, accessing information that does not have public permission, and accessing any system on which you are not welcome. 9.2 Any attempt to disrupt or interfere with users, services or equipment, may result in the termination or suspension of your access. Disruptions include, but are not limited to, distribution of unsolicited advertising or spamming, monopolisation of services, propagation of, or transmission of information or software which contains, computer worms, trojan horses, viruses or other harmful components, using the network to make unauthorised entry to any other machine accessible via our network, sending harassing or threatening e-mail and forgery or attempted forgery of e-mail messages. 9.3 You will be held liable for, and indemnify Powernet for, all costs and damages, attributable to your unauthorised activities or disruptions.

Appears in 1 contract

Sources: Standard Form of Agreement

Unauthorised Usage. 9.1 Any attempt to access or modify unauthorised computer system information or to interfere with normal system operations, whether on the equipment of ours or any computer system or network that is accessed by our services, may result in the suspension or termination of your access. Unauthorised activities include, but are not limited to, guessing or using passwords other than your own, accessing information that does not have public permission, and accessing any system on which you are not welcome. 9.2 Any attempt to disrupt or interfere with users, services or equipment, may result in the termination or suspension of your access. Disruptions include, but are not limited to, distribution of unsolicited advertising or spamming, monopolisation of services, propagation of, or transmission of information or software which contains, computer worms, trojan horses, viruses or other harmful components, using the network to make unauthorised entry to any other machine accessible via our network, sending harassing or threatening e-mail and forgery or attempted forgery of e-mail messages. 9.3 You will be held liable for, and indemnify Powernet PowerNET for, all costs and damages, attributable to your unauthorised activities or disruptions.

Appears in 1 contract

Sources: Standard Form of Agreement