(viii) intercepting a third party’s communications or accessing or attempting to access another party’s account or otherwise circumvent any security measures. (ix) uploading any virus, worm or malicious code. (x) using automated connections that allow web broadcasts, automatic data feeds, automated machine-to-machine connections or peer-to-peer file sharing.