You are prohibited from attempting to gain unauthorized access to other computer systems

The service does not allow any attempts at hacking or otherwise gaining unauthorized access to other users' computers.

Classification: neutral

Weight: 20



Service Title Rating Status Author
City of Reading "Security</strong> &nbsp. The City has taken steps to safeguard the submission of information by implementing detailed technology and security policies. Security measures have been integrated into the design, implementation and day-to-day operations of the entire operating environment as part of our continuing commitment to the security of electronic content as well as the electronic transmission of information" APPROVED day Curator
Deleted Service 2317 by user 1764 "When accessing or using our Services, you will not: </p> <ul> <li>Create or submit Content that violates our Content Policy or attempt to circumvent any content-filtering techniques we use;</li> <li>Use Codeaco to violate applicable law or infringe any person or entity's intellectual property or any other proprietary rights;</li> <li>Attempt to gain unauthorized access to another user's Account or to Codeaco (or to other computer systems or networks connected to or used together with Codeaco)" DECLINED SheepDog
Discogs "Attempts to gain unauthorized access to other computer systems are prohibited." APPROVED Michael Curator
Session "For example you must not (a) gain or try to gain unauthorized access to our Services or systems. " APPROVED Agnes de Lion Staff
Reddit "Attempt to gain unauthorized access to another user’s Account or to the Services (or to other computer systems or networks connected to or used together with the Services)" DECLINED Peepo Staff
Le Monde " - Ne pas utiliser de virus, injecter de bugs informatiques ou exploiter toute autre forme de faille pour obtenir des avantages ou un accès à des données protégées du Site et/ou Applications." APPROVED Agnes de Lion Staff
Fandango "<li>Attempt to gain unauthorized access to other computer systems or networks connected to the Services." APPROVED Peepo Staff
CouchSurfing "(i) contains viruses, corrupted data or other harmful, disruptive or destructive file viruses, cancel bots, Trojan horses, harmful code, flood pings, denial-of-service attacks, packet or IP spoofing, forged routing or electronic mail address information or similar methods or technology;</p>" APPROVED Dr_Jeff Staff
IVPN " As a subscriber of our services, you agree that: <ol> <li> <p>You will not use our service to hack or attack other computers or networks on the internet.</p> </li>" APPROVED Agnes de Lion Staff
SecuriSend " <li>Gain access to (or attempt to gain access to) someone else's files without their permission.</li>" APPROVED Agnes de Lion Staff
FastMail "Attempt to gain unauthorised access to the Service, other accounts, computer systems or networks connected to the Service, through password mining or any other means.</li> " APPROVED lemmings
BlueStacks "Violates the security of any computer network, or cracks any passwords or security encryption codes, or attempt to post or transmit any information that constitutes a virus, bug, malicious code, or other harmful item" APPROVED (deactivated)
Roll20 "Use or attempt to gain access to or use another’s user or company account, password, data, or computer systems or networks connected to any Roll20 server, whether through hacking, password mining or any other means. </li> <li> Access or attempt to access any material that you are not authorized to access." APPROVED GV-280
SourceForge "<li>your SourceForge Content does not constitute, contain, install or attempt to install or promote spyware or malware or any other computer code (whether on SlashDot Media’s or others computers or equipment) intended to, or that does, enable you or others to gather information about or monitor the online or other activities of another party, unless it discloses such functionality to the user in a clear and conspicuous manner and the user affirmatively consents to such use." APPROVED Agnes de Lion Staff
Crain's Chicago Business " <li>contains or transmits viruses or other harmful, disruptive or destructive files." APPROVED Agnes de Lion Staff
Twitter "probe, scan, or test the vulnerability of any system or network or breach or circumvent any security or authentication measures. " APPROVED Isikyus
Discord "upload or transmit (or attempt to upload or transmit) files that contain viruses, Trojan horses, worms, time bombs, cancelbots, corrupted files or data, or any other similar software or programs or engage in any other activity that may damage the operation of the Service or other users' computers;</li> " DECLINED Dr_Jeff Staff
Bitcasa (discontinued?) "or Bitcasa (or our service providers’) computer systems;</li> <li>interfere with or disrupt any user, host, or network" DECLINED kumiiiii
Mega " 15.7.8 to attempt to gain unauthorised access to any services other than those to which you have been given express permission to access. " APPROVED Agnes de Lion Staff
FastMail "Interfere with or disrupt networks connected to the Service or violate the regulations, policies or procedures of such networks.</li>" DECLINED lemmings
Spotify "<li>includes malicious content such as malware, Trojan horses, or viruses, or otherwise interferes with any user’s access to the Service." APPROVED Dr_Jeff Staff
Bitwarden "to access Bitwarden's Service in ways that exceed your authorization" APPROVED brightlysalty
Twitter "You may not do any of the following while accessing or using the Services: (i) access, tamper with, or use non-public areas of the Services, Twitter’s computer systems, or the technical delivery systems of Twitter’s providers." DECLINED Dr_Jeff Staff
AliExpress "You agree not to undertake any action to undermine the integrity of the computer systems or networks of Alibaba.com and/or any other User nor to gain unauthorized access to such computer systems or networks.<br>" APPROVED Peepo Staff
xda-developers "(6) malicious content (including, without limitation, malware or spyware)." APPROVED Agnes de Lion Staff
Schoology "attempt to gain unauthorized access to the Product or its related systems or networks." APPROVED HunterTheProto
Chinese Software Developer Network "不得在未经许可的情况下,非法进入其它电脑系统。" APPROVED reikousami Curator
HideMe VPN "You agree not to attack in any way shape or form any other computer or network while on our service.<br>" APPROVED reikousami Curator
Twitch "access the Twitch Services accounts of others without permission. forge another person’s digital signature. misrepresent the source, identity, or content of information transmitted via the Twitch Services. or perform any other similar fraudulent activity;</p>" APPROVED Dr_Jeff Staff
Google "— for example, by hacking, phishing," APPROVED Dr_Jeff Staff
Fiverr "Any attempts to publish or send malicious content with the intent to compromise another member’s account or computer environment is strictly prohibited." APPROVED Agnes de Lion Staff
Riot Games (League of Legends) "Transmitting or facilitating the transmission of any content that contains a virus, corrupted data, trojan horse, bot keystroke logger, worm, time bomb, cancelbot or other computer programming routines that are intended to and/or actually damage, detrimentally interfere with, surreptitiously intercept or mine," APPROVED Dr_Jeff Staff
Kaspersky "Interfering with the operation of the Website or gaining access to the Website's services through circumvention of the standard interface (by means of undocumented routes) is prohibited." APPROVED Dr_Jeff Staff
Strava "Attempting to disrupt, degrade, impair or violate the integrity or security of the Services or the computers, services, Accounts or networks of any other party (including, without limitation, “hacking,” “denial of service” attacks, etc.)," APPROVED Agnes de Lion Staff
Jitsi "attempt to hack or gain unauthorized access to the Service or any network, environment, or system of 8×8, or any of other user(s) of the Service;</li>" APPROVED Dr_Jeff Staff
Instructure "<li>access, tamper with, or use non-public areas or parts of the Service, or shared areas of the Service you haven't been invited to;" APPROVED Dr_Jeff Staff
Vivaldi "Unless you have their explicit permission, you will not access another user’s Vivaldi Community account.</li> " APPROVED Agnes de Lion Staff
Cisco "<li>Access or use any application, system, service, tool, data, account, network, or content without authorization or for unintended purposes." APPROVED Dr_Jeff Staff
Pearltrees "That provides access to computer viruses or any other code or program designed to interrupt, destroy or limit the functionality of any software application, computer or telecommunication tool, this list not being exhaustive" APPROVED Agnes de Lion Staff
Alan Thomson Simulation "Content has to be free of software viruses," APPROVED Mezzie Curator
United States Postal Service "Users also may not post or transmit information or materials that would violate rights of any third party or which contains a virus or other harmful component. " APPROVED Agnes de Lion Staff
Rumble "<li>contains software viruses or any other computer code, files, or programs that are designed or intended to disrupt, damage, or limit the functioning of any software, hardware, or telecommunications equipment or to damage or obtain unauthorized access to any data or other information of any third party. " APPROVED Agnes de Lion Staff
Anonfiles "<p>It is strictly forbidden to spread viruses, trojans, corrupt" APPROVED Agnes de Lion Staff
V.H. Hess "You further agree that your comments will not contain libelous or otherwise unlawful, abusive or obscene material, or contain any computer virus or other malware that could in any way affect the operation of the Service or any related website. " APPROVED Agnes de Lion Staff
1800Mattress.com " retrieve, alter, or destroy data on, from or through the Site. (b) probe, scan or test the vulnerability of a system or network on, from or through the Site. or (c) breach or defeat system or network security measures on, from or through the Site such as authentication, authorization, confidentiality, intrusion detection, or monitoring." APPROVED RocketSLC
Guilded "Attempts, in any manner, to obtain the password, account, or other security information from any other user. </li> <li> Violates the security of any computer network, or cracks any passwords or security encryption codes." APPROVED Agnes de Lion Staff
1800Mattress.com "interfere with or disrupt any computer, host, network, or telecommunications device maintained by 1800Mattress.com or any third party." DECLINED RocketSLC
Avast " damage, disable or impair the operation of, or gain or attempt to gain unauthorized access to, any Solution or to any property," APPROVED Agnes de Lion Staff
1800Mattress.com "use any technology that is or reasonably should be known to contain software viruses, Trojan horses, or any computer code, files, or programs designed to disrupt, destroy, invade, gain unauthorized access to, corrupt, observe, or modify without authorization, any data, software, computing or network devices, or telecommunications equipment of 1800Mattress.com or any Customer or any other third party." DECLINED RocketSLC
Burger King "<p>Obtain or attempt to gain unauthorized access to other computer systems, materials, information, or any services available on or through the Services;</p> " APPROVED Agnes de Lion Staff
Shopify "You further agree not to permit any third party to do any of the following: (i) access or attempt to access our systems, programs, or data that are not made available for public use." APPROVED private prawn Curator
Redbubble "malicious code, including but not limited to viruses, trojan horses, worms, time bombs, cancelbots, or any other computer programming routines that may damage, interfere with, surreptitiously intercept, or expropriate any system, program, data, or personal information" APPROVED private prawn Curator
MOBY Group "You may not attempt to gain unauthorized access to the Site through hacking, password mining or any other means." APPROVED Aayan
AirVPN "6. use the Service to compromise security of, or to obtain (or try to obtain) unauthorized access to any device or system in the Internet (such attempts include port scans);<br>" APPROVED Agnes de Lion Staff
ProtonVPN "<li>Attempting to access, probe, or connect to computing devices without proper authorization (i.e., any form of “hacking”);</li> " APPROVED Agnes de Lion Staff
Wise "You must not attempt to gain unauthorised access to our Website, our servers, computers or databases." APPROVED CyanoTex Curator
Gettr "involves the use of viruses, bots, worms or any other computer code, files or programs that may interrupt, destroy or limit the functionality of any computer software or hardware, or otherwise may permit the unauthorized use of or access to a computer or a computer network." APPROVED private prawn Curator
Brilliant "User shall not attempt to gain unauthorized access to any portion or feature of the Service, or any other systems or networks connected to the Service or to any Brilliant server, or to any of the services offered on or through the Service, by hacking, password "mining", or any other illegitimate means." APPROVED private prawn Curator
Calendly "or</li> <li>To attempt to gain unauthorized access to any portion of this Website or any other accounts, computer systems, or networks connected to this Website, whether through hacking, password mining, or any other means" APPROVED Agnes de Lion Staff
SpaceHey "attempt to gain unauthorized access to the Site, whether through password mining, brute force or DDoS attacks or any other means" APPROVED H3
Curve "in a way that might harm our ability to provide our services or may harm our software, systems or hardware,</p> </li>" DECLINED CyanoTex Curator
Porton Private Cloudstorage You are prohibited from attempting to gain unauthorized access to other computer systems APPROVED Hekkerman
CodeSandbox "You are not allowed to create, transmit, upload or distribute content on/to our Service that contains harmful elements (such as viruses, worms, or any software intended to damage or alter a computer system) that may cause damage to us, our infrastructure, our software or hardware or that may cause our other users similar damage.</li>" APPROVED private prawn Curator


Comments:
No comments found