(c) attempt to gain unauthorized access to the Services or its related systems or networks. (d) use or knowingly permit others to use any security testing tools in order to probe, scan or attempt to penetrate or ascertain the security of the Services or the Application.