Common use of No Data Mining or Harmful Code Clause in Contracts

No Data Mining or Harmful Code. YOU agree that YOU will not (i) obtain or attempt to obtain any information from the Service, including without limitation email of other Account holders or other Mobile App data; (ii) intercept, examine or otherwise observe any proprietary communications protocol used by the Mobile App or the Service, whether through the use of a network analyzer, packet sniffer or other device; or (iii) use any type of bot, spider, virus, clock, timer, counter, worm, software lock, drop dead device, Trojan horse routing, trap door, time bomb or any other codes, instructions or third-party software that is designed to provide a means of surreptitious or unauthorized access to, or distort, delete, damage or disassemble, the Mobile App, the Site or the Service.

Appears in 1 contract

Samples: License Agreement

AutoNDA by SimpleDocs

No Data Mining or Harmful Code. YOU You agree that YOU you will not (ia) obtain or attempt to obtain any information from the ServiceService including, including without limitation limitation, email addresses or mobile phone numbers of other Account account holders or other Mobile App data; (iib) intercept, examine or otherwise observe any proprietary communications protocol used by the Mobile App or the Service, whether through the use of a network analyzer, packet sniffer or other device; or (iiic) use any type of bot, spider, virus, clock, timer, counter, worm, software lock, drop dead device, Trojan horse routinghorse, trap door, time bomb or any other codes, instructions or third-third party software that is designed to provide a means of surreptitious or unauthorized access to, or distort, delete, damage or disassemble, the Mobile App, the Site or any aspect of the Service.

Appears in 1 contract

Samples: Datagrasp Terms of Use

No Data Mining or Harmful Code. YOU You agree that YOU you will not (ia) obtain or attempt to obtain any information from the ServiceService including, including without limitation limitation, email addresses, mobile phone numbers or other data of other Account holders or other Mobile App datausers; (iib) intercept, examine or otherwise observe any proprietary communications protocol used by the Mobile App or the Service, whether through the use of a network analyzer, packet sniffer or other device; or (iiic) use any type of bot, spider, virus, clock, timer, counter, worm, software lock, drop dead device, Trojan horse routinghorse, trap door, time bomb or any other codes, instructions or third-third party software that is designed to provide a means of surreptitious or unauthorized access to, or distort, delete, damage or disassemble, the Mobile App, the Site or any aspect of the Service.

Appears in 1 contract

Samples: Avinew Terms of Use

AutoNDA by SimpleDocs

No Data Mining or Harmful Code. YOU You agree that YOU you will not (ia) obtain or attempt to obtain any information from the Service, including without limitation email addresses or phone numbers of other Account account holders or other Mobile App software data; (iib) intercept, examine or otherwise observe any proprietary communications protocol used by the Mobile App Site or the Service, whether through the use of a network analyzer, packet sniffer or other device; or (iiic) use any type of bot, spider, virus, clock, timer, counter, worm, software lock, drop dead device, Trojan Trojan-horse routing, trap door, time bomb or any other codes, instructions or third-party software that is designed to provide a means of surreptitious or unauthorized access to, or distort, delete, damage or disassemble, the Mobile App, the Site or the Service.

Appears in 1 contract

Samples: Audittoll Terms of Use

Time is Money Join Law Insider Premium to draft better contracts faster.