(6) exploit the Pocket Technologies in any unauthorized way whatsoever, including, but not limited to, by trespass or burdening network capacity. (7) use any robot, spider, scraper, or other automated means to access our website or proprietary work for any purpose without our prior written permission.