Unacceptable Behavior. Below are examples of unacceptable behavior. Each User agrees not to engage in such behavior. • Using, or attempting to use, Xxxxx resources without authorization or for purposes other than those stated in the PI’s approved allocation request • Attempting to copy or reverse engineer any Anton resources (including but not limited to any DESRES property, including all Anton hardware and software for Molecular Dynamics simulations) • Tampering with or obstructing the operation of and/or access to Anton resources and/or attempting to circumvent system security • Tampering with and/or obstructing access to a User’s data • Reading, changing, distributing, or copying others' data or software without authorization • Using Anton resources to attempt to gain unauthorized access to other computational sites • Activities in violation of any and all applicable local, state, and/or federal laws, regulations, and/or ordinances, and/or those of other countries • Activities that violate the intellectual property rights and/or privacy rights of a third party • Sharing passwords, and/or attempting to “crack” or guess other Users’ passwords • Obtaining passwords by other means, such as password capturing programs
Appears in 3 contracts
Samples: End User Agreement, End User Agreement, End User Agreement
Unacceptable Behavior. Below are examples of unacceptable behavior. Each User agrees not to engage in such behavior. • Using, or attempting to use, Xxxxx Anton resources without authorization or for purposes other than those stated in the PI’s approved allocation request • Attempting to copy or reverse engineer any Anton resources (including but not limited to any DESRES property, including all Anton hardware and software for Molecular Dynamics simulations) • Tampering with or obstructing the operation of and/or access to Anton resources and/or attempting to circumvent system security • Tampering with and/or obstructing access to a User’s data • Reading, changing, distributing, or copying others' data or software without authorization • Using Anton resources to attempt to gain unauthorized access to other computational sites • Activities in violation of any and all applicable local, state, and/or federal laws, regulations, and/or ordinances, and/or those of other countries • Activities that violate the intellectual property rights and/or privacy rights of a third party • Sharing passwords, and/or attempting to “crack” or guess other Users’ passwords • Obtaining passwords by other means, such as password capturing programs
Appears in 1 contract
Samples: End User Agreement