Interfere with, or compromise the system integrity or security of the GIK Applications, or otherwise bypass any measures GIK may use to prevent or restrict access to the GIK Applications.</li> <li>Conduct automated queries including screen and database scraping, spiders, robots, crawlers, bypassing "captcha" or similar precautions, and any other automated activity with the purpose of obtaining information from the GIK Applications, or any of the underlying data or information supplied or provided by GIK.</li> <li>Use any of GIK's trademarks.</li> <li>