System and Network Security Sample Clauses

System and Network Security. 5.8.1 Violations of system or network security are prohibited and may result in criminal and civil liability. Examples include, but are not limited to the following: 5.8.1.1 unauthorized access, use, probe, or scan of a systems security or authentication measures, data or traffic; 5.8.1.2 interference with service to any user, host or network including, without limitation, mail bombing, flooding, deliberate attempts to overload a system and broadcast attacks; 5.8.1.3 forging of any TCP-IP packet header or any part of the header information in an e- mail or a newsgroup posting; and 5.8.1.4 employing posts or programs which consume excessive CPU time or storage space, permits the use of mail services, mail forwarding capabilities, POP accounts, or auto responders other than for their own account; or resale of access to CGI scripts installed on our servers.
AutoNDA by SimpleDocs
System and Network Security. 3.1. Any reference to systems and networks under this section refer to all systems and networks to which the Customer is granted access through MFN, including, but not limited to, the infrastructure of MFN itself and the Internet. 3.2. The Customer may not circumvent user authentication or security of any host, device, network or account (referred to as “hacking” or “cracking”), nor interfere with service to any user, host, device or network (referred to as “denial of service attacks”). The host, device, network or account shall also not be used for any illegal purpose, including phishing. 3.3. Violations of system or network security by the Customer are prohibited and may result in civil or criminal liability. MFN will investigate incidents involving any violation or suspected violation and shall involve and co-operate with law enforcement officials if a criminal violation is suspected. Examples of system or network security violations include, without limitation, the following: 3.3.1. Unauthorised access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of any system or network or to breach any security or authentication measures without the express authorisation of MFN; 3.3.2. Unauthorised monitoring of data or traffic on the network or systems without the express authorisation of MFN; 3.3.3. Interference with service to any user, device, host or network including, without limitation, mail bombing, flooding, deliberate attempts to overload a system and broadcast attacks; 3.3.4. Forging of any TCP-IP packet header (spoofing) or any part of the header information in an e- mail or a newsgroup posting.
System and Network Security. The Company understands that there is a constant risk posed to its computer systems and networks by individuals attempting to gain unauthorized access. Daily, computer systems run the risk of compromise through unauthorized access by hackers, malware, and other threats that not only put the Company’s own data and employees at risk but could also potentially compromise the Company financial information and accounts. Financial losses resulting from such risk could cause the failure of the Company’s business. The Company explicitly acknowledges that the Bank is not responsible for the safety and security of the Company’s systems and networks. The Company understands that its computer systems are vulnerable to various types of infiltration. The Company will take responsible measures to protect its data by ensuring that proper security network devices are deployed, configured properly, and kept up to date with tools such as firewalls, proxies, intrusion detection and prevention systems, up-to-date anti-virus protection, operating system patches, and patches for third-party software packages like Adobe Acrobat, Internet Explorer, and Microsoft Office. Additionally, security audits should be performed by the Company to ensure that the security measures it has in place are adequate and effective.
System and Network Security. 7.1 You must not, and must not allow any other person to, interfere with the security of our systems, networks, software or infrastructure, including by: (a) accessing data unlawfully or without consent; (b) attempting to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures; (c) attempting to interfere with service to any user, host or network, including, without limitation, via means of overloading, "flooding", "mail bombing" or "crashing"; (d) forging any TCP/IP packet header or any part of the header information in any e-mail or newsgroup posting; or (e) taking any action in order to obtain services to which you or the other person are not entitled. 7.2 Without limiting any of our other rights to suspend the Service, we may immediately and without notice suspend the Service if a breach of security of your equipment results in malicious network activity originating from you.
System and Network Security. Customer is prohibited from utilizing Chicago VPS services to compromise the security or tamper with system resources or accounts on computers at the Premises or at any third party site. Specific activities that are prohibited include, but are not limited to:  Use or distribution of tools designed for compromising security.  Unauthorized access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without express authorization of the owner of the system or network.  Unauthorized monitoring of data or traffic on any network or system without express authorization of the owner of the system or network.  Deliberate attempts to overload a system and broadcast attacks.  Forging of any TCP-IP packet header or any part of the header information in an email or a newsgroup posting.  Intentionally or negligently transmitting files containing a computer virus or corrupted data. Chicago VPS, in its sole discretion, shall determine what action shall be taken in response to a violation on a case-by-case basis. Violation of this AUP could also subject Customer to criminal or civil liability. Chicago VPS may block access at the router level to Customer's Equipment involved. If Chicago VPS believes, in its sole discretion, that a violation of this AUP has occurred, such action may also include, but is not limited to, temporary or permanent blocking of access to the equipment, and the suspension or termination of Customer’s Services under this Agreement. Chicago VPS may involve and shall also fully cooperate with law enforcement authorities (including compliance with court orders) in investigating suspected lawbreakers. Chicago VPS complies with the Digital Millennium Copyright Act (“DMCA"). Chicago VPS encourages Users to report an alleged copyright infringement involving a user by sending a notice that complies with the DMCA to: DMCA Notices Velocity Servers Inc. 0000 Xxxxxxxx Xxxxx Xxxxxxxxxxxxx XX 00000 Telephone Number of Designated Agent: 800.518.9716 Facsimile Number of Designated Agent: 716.335.9628 Email Address of Designated Agent: dmca@Chicago XXX.xxx
System and Network Security. Customer is prohibited from utilizing Peer 1 services to compromise the security or tamper with system resources or accounts on computers at the Premises or at any third party site. Specific activities that are prohibited include, but are not limited to: · Use or distribution of tools designed for compromising security. · Unauthorized access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without express authorization of the owner of the system or network. · Unauthorized monitoring of data or traffic on any network or system without express authorization of the owner of the system or network. · Deliberate attempts to overload a system and broadcast attacks. · Forging of any TCP-IP packet header or any part of the header information in an email or a newsgroup posting. · Intentionally or negligently transmitting files containing a computer virus or corrupted data.
System and Network Security. Customer may not use the Services to violate or interfere with the security or integrity of any network, computer or communications system, software application, or network or computing device. Customer may not make network connections to any users, hosts, or networks unless Customer have permission to communicate with them.
AutoNDA by SimpleDocs
System and Network Security. End Users are prohibited from violating any system or network security measures including but not limited to engaging in unauthorized access or use of Xxxx’x or a third party’s network, data or information. End Users are unauthorized to monitor Bell or third party’s data, systems or network traffic. End Users are prohibited to interfere with service to any user, host or network including without limitation, mail bombing, flooding, deliberate attempts to overload a system and broadcast attacks. End Users are prohibited to forge any TCP-IP packet header or any part of the header information in an e-mail or newsgroup posting.
System and Network Security. In order to protect the security and integrity of the Site or the Service, you may not (and you agree that you will not):
System and Network Security. Violations of system or network security are prohibited, and may result in criminal and civil liability. Reliance Connects will investigate incidents involving such violations and may involve and will cooperate with law enforcement if a criminal violation is suspected. Examples of system or network security violations include, without limitation, the following: • Unauthorized access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without express authorization of the owner of the system or network. • Unauthorized monitoring of data or traffic on any network or system without express authorization of the owner of the system or network. • Interference with service to any user, host or network including, without limitation, mail bombing, flooding, deliberate attempts to overload a system and broadcast attacks. • Forging of any TCP-IP packet header or any part of the header information in an e-mail or a newsgroup posting.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!