probe, scan, or test the vulnerability of any system or network or breach or circumvent any security or authentication measure;</li> <li>access or search the Service and Websites by any means other than Asana’s publicly supported interfaces (for example, “scraping”);</li> <li>attempt to disrupt or overwhelm our infrastructure by intentionally imposing unreasonable requests or burdens on our resources (e.g. using “bots” or other automated systems to send requests to our servers at a rate beyond what could be sent by a human user during the same period of time).