(b) attempting to breach or breaching the security and/or authentication measures which are not authorized. (c) restricting, disrupting or disabling service to users, hosts, servers or networks. (d) illicitly reproducing TCP/IP packet header. (e) disrupting network services and otherwise disrupting the Platform owner’s ability to monitor the Platform. (f) using any robot, data mining, spider or other automatic device, process or means to access the Platform for any purpose, including monitoring or copying any of the Platform content.