Prohibited Activities and Spoofing. Licensor and its officers, employees, agents, subcontractors, and affiliated users, shall not violate or attempt to violate the security of the State’s network or interfere or attempt to interfere with the State’s systems, networks, authentication measures, servers or equipment, or with the use of or access to the State’s network by any other user. Such prohibited activity includes (i) accessing or logging into a server where access is not authorized; (ii) unauthorized probing, scanning, or testing the security or vulnerability of the State’s network or other systems; and (iii) attempting to portray itself as the State or an affiliate of the State or otherwise attempting to gain access, without authorization, via the State’s network or systems to any account or information technology resource not belonging to Licensor or its officers, employees, agents, subcontractors, and affiliated users (“Spoofing”). Licensor shall not perform unauthorized Spoofing or scanning of any kind, including user account identity. Systems shall not Spoof the xx.xxx domain or engage in Email Spoofing. Email Spoofing is the creation of email messages with a forged sender address. For example, Email Spoofing includes creating or sending emails using the State’s domain.
Appears in 6 contracts
Samples: howto.mt.gov, Montana Group Services, Montana Software License Agreement
Prohibited Activities and Spoofing. Licensor Contractor and its officers, employees, agents, subcontractors, and affiliated users, shall not violate or attempt to violate the security of the State’s network or interfere or attempt to interfere with the State’s systems, networks, authentication measures, servers or equipment, or with the use of or access to the State’s network by any other user. Such prohibited activity includes (i) accessing or logging into a server where access is not authorized; (ii) unauthorized probing, scanning, or testing the security or vulnerability of the State’s network or other systems; and (iii) attempting to portray itself as the State or an affiliate of the State or otherwise attempting to gain access, without authorization, via the State’s network or systems to any account or information technology resource not belonging to Licensor Contractor or its officers, employees, agents, subcontractors, and affiliated users (“Spoofing”). Licensor Contractor shall not perform unauthorized Spoofing or scanning of any kind, including user account identity. Systems shall not Spoof the xx.xxx domain or engage in Email Spoofing. Email Spoofing is the creation of email messages with a forged sender address. For example, Email Spoofing includes creating or sending emails using the State’s domain.
Appears in 3 contracts
Samples: Master Agreement, Electronic Health, Master Agreement
Prohibited Activities and Spoofing. Licensor and its officers, employees, agents, subcontractors, and affiliated users, shall will not violate or attempt to violate the security of the State’s network or interfere or attempt to interfere with the State’s systems, networks, authentication measures, servers or equipment, or with the use of or access to the State’s network by any other user. Such prohibited activity includes (i) accessing or logging into a server where access is not authorized; (ii) unauthorized probing, scanning, or testing the security or vulnerability of the State’s network or other systems; and (iii) attempting to portray itself as the State or an affiliate of the State or otherwise attempting to gain access, without authorization, via the State’s network or systems to any account or information technology resource not belonging to Licensor or its officers, employees, agents, subcontractors, and affiliated users (“Spoofing”). Licensor shall will not perform unauthorized Spoofing or scanning of any kind, including user account identity. Systems shall will not Spoof the xx.xxx domain or engage in Email Spoofing. Email Spoofing is the creation of email messages with a forged sender address. For example, Email Spoofing includes creating or sending emails using the State’s domain.
Appears in 2 contracts
Samples: cor.mt.gov, cor.mt.gov
Prohibited Activities and Spoofing. Licensor Contractor and its officers, employees, agents, subcontractors, and affiliated users, shall not violate or attempt to violate the security of the State’s network or interfere or attempt to interfere with the State’s systems, networks, authentication measures, servers or equipment, or with the use of or access to the State’s network by any other user. Such prohibited activity includes (i) accessing or logging into a server where access is not authorized; (ii) unauthorized probing, scanning, or testing the security or vulnerability of the State’s network or other systems; and (iii) attempting to portray itself as the State or an affiliate of the State or otherwise attempting to gain access, without authorization, via the State’s network or systems to any account or information technology resource not belonging to Licensor or its officers, employees, agents, subcontractors, and affiliated users (“Spoofing”). Licensor shall not perform unauthorized Spoofing or scanning of any kind, including user account identity. Systems shall not Spoof the xx.xxx domain or engage in Email Spoofing. Email Spoofing is the creation of email messages with a forged sender address. For example, Email Spoofing includes creating or sending emails using the State’s domain.
Appears in 1 contract
Samples: cor.mt.gov