Circumvention of Security Measures. I shall not bypass or attempt to bypass measures in place to protect Information Resources from security threats and inappropriate use. I shall not disable software on computing devices designed to protect Information Resources.
Appears in 4 contracts
Samples: www.in.gov, www.in.gov, www.indiana.gov
Circumvention of Security Measures. I shall not bypass or attempt to bypass measures in place to protect Information Resources from security threats and inappropriate use, including security tools such as sniffers, password crackers, peer to peer, remote control, and vulnerability assessment software. I shall not disable software on computing devices designed to protect Information ResourcesResources from malware (virus, WORM, etc.).
Appears in 2 contracts
Samples: Confidentiality and Information Resource Agreement, Confidentiality and Information Resource Agreement
Circumvention of Security Measures. I shall not bypass or attempt to bypass measures in place to protect Information Resources from security threats and inappropriate use. I shall not disable software on computing devices designed to protect Information ResourcesResources from malware (virus, WORM, etc.).
Appears in 1 contract
Samples: www.in.gov