Unauthorized Actions. In addition, Customer agrees that it will not use the System to take any action that: (i) violates any applicable law or regulation or is legally libelous, defamatory, indecent, obscene or pornographic; (ii) would violate copyright, trademark, trade secret or other property right of any third party; (iii) involves the addition, removal or modification of identifying network header information in an effort to deceive; (iv) uses the System to access, or attempt to access, the accounts of others, or to penetrate, or attempt to penetrate, security measures of Ventiv's or another entity's computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in access to or the corruption or loss of data; (vi) uses the System to collect, or attempt to collect, personal information about third parties without their valid consent.
Appears in 6 contracts
Samples: Irm Xpress Agreement, Irm Xpress, Terms and Conditions
Unauthorized Actions. In addition, Customer agrees that it will not use the System to take any action that: (i) violates any applicable law or regulation or is legally libelous, defamatory, indecent, obscene or pornographic; (ii) would violate copyright, trademark, trade secret or other property right of any third party; (iii) involves the addition, removal or modification of identifying network header information in an effort to deceive; (iv) uses the System to access, or attempt to access, the accounts of others, or to penetrate, or attempt to penetrate, security measures of VentivAon's or another entity's computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in access to or the corruption or loss of data; (vi) uses the System to collect, or attempt to collect, personal information about third parties without their valid consent.
Appears in 2 contracts
Samples: Terms and Conditions, Terms and Conditions