Common use of No Security Violations Clause in Contracts

No Security Violations. You may not use the Services to violate the security or integrity of any network, computer or communications system, software application, or network or computing device (each, a "System"). Prohibited activities include: Unauthorized Access. Accessing or using any System without permission..

Appears in 3 contracts

Samples: Tealium Subscription Terms and Conditions, Tealium Subscription Terms and Conditions, Tealium Subscription Terms and Conditions

AutoNDA by SimpleDocs

No Security Violations. You may not use the Services to violate the security or integrity of any network, computer or communications system, software application, or network or computing device (each, a "System"). Prohibited activities include: Unauthorized Access. Accessing or using any System without permission.., including attempting to probe, scan, or test the vulnerability of a System or to breach any security or authentication measures used by a System. • Interception. Monitoring of data or traffic on a System without permission.

Appears in 1 contract

Samples: Manufacturer End User License Agreement (Eula)

AutoNDA by SimpleDocs

No Security Violations. You may not use the Services to violate the security or integrity of any network, computer or communications system, software application, or network or computing device (each, a "System"). Prohibited activities include: Unauthorized Access. Accessing or using any System without permission..:

Appears in 1 contract

Samples: Professional Services

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!