Circumvention of Security Measures. I shall not bypass or attempt to bypass measures in place to protect Information Resources from security threats and inappropriate use. I shall not disable software on computing devices designed to protect Information Resources.
Appears in 4 contracts
Samples: Information Resources Use Agreement, Information Resources Use Agreement, Information Resources Use Agreement
Circumvention of Security Measures. I shall not bypass or attempt to bypass measures in place to protect Information Resources from security threats and inappropriate use, including security tools such as sniffers, password crackers, peer to peer, remote control, and vulnerability assessment software. I shall not disable software on computing devices designed to protect Information ResourcesResources from malware (virus, WORM, etc.).
Appears in 2 contracts
Samples: Confidentiality Agreement, Confidentiality Agreement
Circumvention of Security Measures. I shall not bypass or attempt to bypass measures in place to protect Information Resources from security threats and inappropriate use. I shall not disable software on computing devices designed to protect Information ResourcesResources from malware (virus, WORM, etc.).
Appears in 1 contract
Samples: Information Resources Use Agreement