Security, Cracking and Hacking Sample Clauses
Security, Cracking and Hacking. You are prohibited from violating or attempting to violate the security of the Website. Accordingly, you agree not to: (i) access data or materials not intended for you;
Security, Cracking and Hacking. You shall not violate or attempt to violate the security of the Services. Accordingly, you shall not: (i) access data or materials not intended for you; (ii) log into a server or account which you are not authorized to access; (iii) attempt to probe, scan or test the vulnerability of a system or network or to tamper, hack, crack, modify or otherwise corrupt, circumvent or breach security, authentication, rights management or other access control measures without proper authorization; (iv) attempt to interfere with or deny service to any user, host or network, including without limitation, via means of submitting a virus to the Services, overloading, "flooding," "mailbombing," any "denial of service attack" or intentionally "crashing" the Services; (v) attempt to circumvent or alter the methods or processes Community Management Systems uses to measure time, bandwidth utilization, or other methods to account for or document "use" of any of the Services; or (vi) execute any form of unauthorized network monitoring (e.g., packet sniffing) to intercept data not intended for your use or access, or in any way interfere with, intercept or expropriate any system, data or information. Violations of system or network security may result in civil or criminal liability. Community Management Systems reserves the right to investigate occurrences which may involve such violations and may involve, and cooperate with, law enforcement authorities in prosecuting users who have participated in such violations. You understand that data and communications, including e-mail and other electronic communications, may be accessed by unauthorized third parties when communicated over the Internet. You agree that it is your responsibility, and not Community Management Systems', to obtain and use third party software products that support encryption and other security protocols compatible with such protocols (if any) as may be used by Community Management Systems from time to time in connection with the Services.
Security, Cracking and Hacking. You shall not violate or attempt to violate the security of the Program Warehouse Service. Accordingly, you shall not attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without proper authorization. You agree that it is your responsibility to install anti-virus software and related protections against viruses, Trojan horses, worms, time bombs, cancelbots or other computer programming routines or engines that are intended to damage, destroy, disrupt or otherwise impair a computer's functionality or operation which may be transferred to your computer via the Program Warehouse Service.
Security, Cracking and Hacking. You shall not violate or attempt to violate the security of the Services, Software, and/or Content. Accordingly, you shall not:
Security, Cracking and Hacking. You are prohibited from violating or attempting to violate the security of the Site. Accordingly, you agree not to:
i. Access data or materials not intended for you.
ii. Log into a server or account which you are not authorized to access.
iii. Attempt to probe, scan or test the vulnerability of a system or network or service to any user, host or network, including without limitation, by means of submitting a virus to the Site, overloading, "flooding," "mailbombing" or "crashing" the Site. Violations of system or network security may result in civil or criminal liability. World Book reserves the right to investigate occurrences which may involve such violations and may involve, and cooperate with, law enforcement authorities in prosecuting users who have participated in such violations. You understand that data and communications, including e-mail and other electronic communications, may be accessed by unauthorized third parties when communicated over the Internet.
