Unauthorised Usage. 3.7.1 Any attempt to access or modify unauthorised computer system information or to interfere with normal system operations, whether on the equipment of ours or any computer system or network that is accessed by our services, may result in the suspension or termination of The Customers Service. Unauthorised activities include, but are not limited to, guessing or using passwords other than The Customers own, accessing information that does not have public permission, and accessing any system on which The Customer is not welcome.
Appears in 2 contracts
Samples: www.zettagrid.com, www.zettagrid.com
Unauthorised Usage. 3.7.1 9.1 Any attempt to access or modify unauthorised computer system information or to interfere with normal system operations, whether on the equipment of ours or any computer system or network that is accessed by our services, may result in the suspension or termination of The Customers Serviceyour access. Unauthorised activities include, but are not limited to, guessing or using passwords other than The Customers your own, accessing information that does not have public permission, and accessing any system on which The Customer is you are not welcome.
Appears in 2 contracts
Samples: Form of Agreement, Form of Agreement
Unauthorised Usage. 3.7.1 9.1 Any attempt to access or modify unauthorised computer system information or to interfere with normal system operations, whether on the equipment of ours or any computer system or network that is accessed by our services, may result in the suspension or termination of The Customers Servicethe Clients Services. Unauthorised activities include, but are not limited to, guessing or using passwords other than The Customers the Clients own, accessing information that does not have public permission, and accessing any system on which The Customer the Client is not welcome.
Appears in 2 contracts