Network Abuse Sample Clauses

Network Abuse. Use of the Product to carry out network abuse, including denial of service attacks or intentional interference with the proper functioning of any network, computer or communications system, software application or network or computing device.
AutoNDA by SimpleDocs
Network Abuse. You may not make network connections to any users, hosts, or networks unless you have permission to communicate with them. Prohibited activities include:
Network Abuse. You may not make network connections to any users, hosts, or networks unless you have permission to communicate with them. Prohibited activities include: (i) Monitoring or crawling of a System; (ii) Denial of Service (DoS) - Inundating a target with communication requests; (iii) Interfering with the proper functioning of any System, including mail bombing or flooding techniques; (iv) Operating network services like open proxies, open mail relays, or open recursive domain name servers; (v) Using manual or electronic means to avoid any use limitations; (vi) Attack traffic that disrupts any portion of our network (incoming or outgoing) will be blocked until the customer is able to work with security personnel to resolve the issue; (vii) IRC websites and IRC servers are prohibited; (viii) You may not upload ROMs and Emulators; (ix) You must contact us prior to installing a CDN within our infrastructure. "Shared Resource" CDN’s are strictly prohibited.
Network Abuse. Customer is prohibited from abusing the networks of Stratus Networks, Inc. and its underlying carriers. For a complete description of Stratus Networks, Inc.’s network abuse policy, the terms and conditions of which are incorporated by this reference as if copied herein, please refer to the network abuse section within the legal page at xxx.xxxxxxxxxx.xxx.
Network Abuse. Any activity that involves making network connections to any third party without permission is prohibited. Such activity includes, but is not limited to, intentional network interference, port scanning, monitoring, crawling, denial of service, network penetration, sniffing, spoofing, virus deployment, hack attempts, vulnerability scanning, and avoidance of third-party network security restrictions or limitations.
Network Abuse. 3.1 The Buyer and its End Users shall not make network connections or encourage, promote, facilitate or instruct others to make network connections to any users, hosts or networks without the prior written permission of such user, host or network, including where such connection is used for or is intended to be used for: 3.1.1 monitoring or crawling any information technology service or system which impairs or disrupts it from being monitored or crawled; 3.1.2 issuing excessive and unnecessary communications requests to a target which impede it responding to genuine traffic or cause it to respond slowly such as to become ineffective; 3.1.3 interfering with the proper functioning of an information technology service or system in any way, including by any attempt to overload the service or system; 3.1.4 operating network services like mail relays, recursive domain name servers or open proxies; or 3.1.5 using manual or electronic means to evade incurring fees or, without limitation, any use access, device or storage limitations.
Network Abuse. GE will use commercially reasonable efforts to ensure that GE and any Telecommuters agree to abide by the Code of Conduct in Exhibit C, do not abuse Telocity's
AutoNDA by SimpleDocs
Network Abuse. You shall not make network connections to any users, hosts, systems or networks used to provide or make available to You the Console and the Services (each, a 'Target') unless You have permission to communicate with them and, in addition You shall not:
Network Abuse. Users are prohibited from engaging in any activities that LiveCode Ltd determines, at its sole discretion, to constitute network abuse including, but not limited to, the following: • Introducing or executing malicious programs into any network or server, such as viruses, worms, Trojan Horses, and key loggers. • Causing or initiating security breaches or disruptions of network communication and/or connectivity, including port scans, flood pings, email‐ bombing, packet spoofing, IP spoofing, and forged routing information. • Executing any form of network activity that will intercept data not intended for the Customer's server. • Evading or circumventing user authentication or security of any host, network or account, including cracking, brute‐force, or dictionary attacks. • Interfering with or denying service to any user, host, or network other than the Customer's host, such as a denial of service attack or distributed denial of service attack. • Conduct designed to avoid restrictions or access limits to specific services, hosts, or networks, including the forging of packet headers or other identification information. • Soliciting the performance of any illegal activity, even if the activity is not performed. • Using any program, or sending messages of any kind, designed to interfere with or disable a user's terminal session. LiveCode Ltd has included a list of Prohibited Activities and examples of prohibited activities at the end of this document. All Users are encouraged to review this list to ensure compliance with this Agreement. If you believe that a violation of this Agreement has occurred please contact us to report such potential violation.
Network Abuse. 10.1 Franchisee acknowledges that franchisee has read, understands and agrees to comply with, all applicable provision of CTZAPP's current Acceptable User policy incorporated herein by this reference. 10.2 Franchisee expressly agrees that CTZAPP shall not be liable to franchisee for any action, CTZAPP takes to remove or restrict access to obscene, indecent or offensive content made available by Franchisee, nor for any action taken to restrict access to material made available in violation of any law, regulation or rights of a third party, including but not limited to rights under the copyright law and prohibitions on libel, slander and invasion of privacy. 10.3 Franchisee agrees not to use any of CTZAPP services to access or attempt to access other user’s network without their express permission. These access attempts include but are not limited to sending, of virus/Trojan/worms via any electronic media. 10.4 Upon written or electronic request of CTZAPP, franchisee agrees to indemnify and hold harmless CTZAPP, its affiliates, its officers, directors, employees, agents and licensees, form any claims, liabilities, losses, damages and expenses, including reasonable attorney's fees, arising out of or relating to franchisee's or its end user's use of any of the services provided hereunder. 10.5 Use of CTZAPP system resource that disrupts the normal use of the system for other CTZAPP franchisees is considered to be abuse of system resource and is ground for administrative intervention. Violations of any of the CTZAPP conditions of use are unethical and may be deemed criminal offences.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!