(g) probe, scan, or test the vulnerability of any system or network or breach or circumvent any security or authentication measures or otherwise attempt to gain unauthorized access to the Services through hacking, password mining or any other means. (h) use or attempt to use any “spider”, “robot”, “bot”, “scraper”, “data miner” or any other program, device or algorithm, process or methodology to access, acquire, copy, or monitor the Services (or portions thereof).