Security Violations. Use of the Product to violate the security or integrity of any network, computer or communications system, software application or network or computing device.
Appears in 8 contracts
Samples: Max Uc End User License Agreement, End User License Agreement, Accession End User License Agreement