Unauthorised Access. Accessing or using any System without permission, including attempting to probe, scan, or test the vulnerability of a System or to breach any security or authentication measures used by a System.
Appears in 3 contracts
Samples: End User Licence Agreement, End User License Agreement, End User License Agreement
Unauthorised Access. Accessing or using any System system without permission, including attempting to probe, scan, or test the vulnerability of a System system or to breach any security or authentication measures used by a System.system. ii) Interception. Monitoring of data or traffic on a system without permission. iii)
Appears in 1 contract
Samples: Software License Agreement