VIOLATIONS OF SYSTEM OR NETWORK SECURITY. 2.1 Any violation by you of systems or network security is prohibited, and may result in you incurring criminal or civil liability. We shall investigate incidents involving such violations and will inform and co-operate with the relevant law enforcement organisations if we are requested by them to do so. 2.2 Violations may include, but are not limited to the following:- 2.2.1 unauthorised access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of a system or network; 2.2.2 unauthorised monitoring of data or traffic on any network or system without express authorisation of the owner of the system or network; 2.2.3 interfering with any user, host or network, including mailbombing (see definition at clause 4.2), flooding, and deliberate attempts to overload a system, and broadcast attacks.
Appears in 8 contracts
Samples: Software Supply Agreement, Software Supply Agreement, Software Supply Agreement
VIOLATIONS OF SYSTEM OR NETWORK SECURITY. 2.1 Any violation by you of systems or network security is prohibited, and may result in you incurring criminal or civil liability. We shall investigate incidents involving such violations and will inform and co-operate with the relevant law enforcement organisations if we are requested by them to do so.
2.2 Violations may include, but are not limited to the following:-
2.2.1 unauthorised access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of a system or network;
2.2.2 unauthorised monitoring of data or traffic on any network or system without express authorisation of the owner of the system or network;
2.2.3 interfering with any user, host or network, including mailbombing (see definition at clause 4.23.2), flooding, and deliberate attempts to overload a system, and broadcast attacks.
Appears in 2 contracts