attempt to probe, scan, or test the vulnerability of the Site, or any associated system or network, or breaching security or authentication measures without proper authorization;</li> <li>use any robot, spider, scraper or other automated means to access the Site;</li> <li>