(c) uses technology or other means to access content or systems of Public Storage in a manner that is not authorized by Public Storage;</p> <p>(d) uses or launches any automated system, including, without limitation, "robots," "spiders," or "offline readers," to access content or systems of Public Storage;</p> <p>