Unauthorised Usage. 9.1 Any attempt to access or modify unauthorised computer system information or to interfere with normal system operations, whether on the equipment of ours or any computer system or network that is accessed by our services, may result in the suspension or termination of the Clients Services. Unauthorised activities include, but are not limited to, guessing or using passwords other than the Clients own, accessing information that does not have public permission, and accessing any system on which the Client is not welcome. 9.2 Any attempt to disrupt or interfere with users, services or equipment, may result in the termination or suspension of the Clients Service. Disruptions include, but are not limited to, distribution of unsolicited advertising or spamming, monopolisation of services, propagation of, or transmission of information or software which contains, computer worms, trojan horses, viruses or other harmful components, using the network to make unauthorised entry to any other machine accessible via our network, sending harassing or threatening e-mail and forgery or attempted forgery of e-mail messages.
Appears in 2 contracts
Samples: Smartcloud Draas Service Schedule, Smartcloud Service Schedule
Unauthorised Usage. 9.1 3.7.1 Any attempt to access or modify unauthorised computer system information or to interfere with normal system operations, whether on the equipment of ours or any computer system or network that is accessed by our services, may result in the suspension or termination of the Clients ServicesThe Customers Service. Unauthorised activities include, but are not limited to, guessing or using passwords other than the Clients The Customers own, accessing information that does not have public permission, and accessing any system on which the Client The Customer is not welcome.
9.2 3.7.2 Any attempt to disrupt or interfere with users, services or equipment, may result in the termination or suspension of the Clients The Customers Service. Disruptions include, but are not limited to, distribution of unsolicited advertising or spamming, monopolisation of services, propagation of, or transmission of information or software which contains, computer worms, trojan horses, viruses or other harmful components, using the network to make unauthorised entry to any other machine accessible via our network, sending harassing or threatening e-mail and forgery or attempted forgery of e-mail messages.
Appears in 2 contracts
Samples: General Terms and Conditions, General Terms and Conditions
Unauthorised Usage. 9.1 Any attempt to access or modify unauthorised computer system information or to interfere with normal system operations, whether on the PMCL equipment of ours or any computer system or network that is accessed by our services, may result in the suspension or termination of the Clients ServicesCustomers Service. Unauthorised activities include, but are not limited to, guessing or using passwords other than the Clients Customer’s own, accessing information that does not have public permission, and accessing any system on which the Client Customer is not welcome.
9.2 /permitted. Any attempt to disrupt or interfere with users, services or equipment, may result in the termination or suspension of the Clients Customer’s Service. Disruptions include, but are not limited to, distribution of unsolicited advertising or spamming, monopolisation of services, propagation of, or transmission of information or software which contains, computer worms, trojan horses, viruses or other harmful components, using the network to make unauthorised entry to any other machine accessible via our network, sending harassing or threatening e-mail and forgery or attempted forgery of e-mail messages.
Appears in 1 contract
Samples: Standard Form of Agreement