You are prohibited from attempting to gain unauthorized access to other computer systems

The service does not allow any attempts at hacking or otherwise gaining unauthorized access to other users' computers.

Classification: neutral

Weight: 20



Service Title Rating Status Author
City of Reading "Security</strong> &nbsp. The City has taken steps to safeguard the submission of information by implementing detailed technology and security policies. Security measures have been integrated into the design, implementation and day-to-day operations of the entire operating environment as part of our continuing commitment to the security of electronic content as well as the electronic transmission of information" APPROVED day Curator
Deleted Service 2317 by user 1764 "When accessing or using our Services, you will not: </p> <ul> <li>Create or submit Content that violates our Content Policy or attempt to circumvent any content-filtering techniques we use;</li> <li>Use Codeaco to violate applicable law or infringe any person or entity's intellectual property or any other proprietary rights;</li> <li>Attempt to gain unauthorized access to another user's Account or to Codeaco (or to other computer systems or networks connected to or used together with Codeaco)" DECLINED (deactivated) Suspended
Discogs "Attempts to gain unauthorized access to other computer systems are prohibited." APPROVED Michael Curator
Session "For example you must not (a) gain or try to gain unauthorized access to our Services or systems. " APPROVED Agnes de Lion Staff
Reddit "Attempt to gain unauthorized access to another user’s Account or to the Services (or to other computer systems or networks connected to or used together with the Services)" DECLINED Peepo Staff
Fandango "<li>Attempt to gain unauthorized access to other computer systems or networks connected to the Services." APPROVED Peepo Staff
CouchSurfing "(i) contains viruses, corrupted data or other harmful, disruptive or destructive file viruses, cancel bots, Trojan horses, harmful code, flood pings, denial-of-service attacks, packet or IP spoofing, forged routing or electronic mail address information or similar methods or technology;</p>" APPROVED Dr_Jeff Staff
IVPN " As a subscriber of our services, you agree that: <ol> <li> <p>You will not use our service to hack or attack other computers or networks on the internet.</p> </li>" APPROVED Agnes de Lion Staff
SecuriSend " <li>Gain access to (or attempt to gain access to) someone else's files without their permission.</li>" APPROVED Agnes de Lion Staff
FastMail "Attempt to gain unauthorised access to the Service, other accounts, computer systems or networks connected to the Service, through password mining or any other means.</li> " APPROVED lemmings
Roll20 "Use or attempt to gain access to or use another’s user or company account, password, data, or computer systems or networks connected to any Roll20 server, whether through hacking, password mining or any other means. </li> <li> Access or attempt to access any material that you are not authorized to access." APPROVED GV-280
SourceForge "<li>your SourceForge Content does not constitute, contain, install or attempt to install or promote spyware or malware or any other computer code (whether on SlashDot Media’s or others computers or equipment) intended to, or that does, enable you or others to gather information about or monitor the online or other activities of another party, unless it discloses such functionality to the user in a clear and conspicuous manner and the user affirmatively consents to such use." APPROVED Agnes de Lion Staff
Crain's Chicago Business " <li>contains or transmits viruses or other harmful, disruptive or destructive files." APPROVED Agnes de Lion Staff
Twitter "probe, scan, or test the vulnerability of any system or network or breach or circumvent any security or authentication measures. " APPROVED Isikyus
Discord "upload or transmit (or attempt to upload or transmit) files that contain viruses, Trojan horses, worms, time bombs, cancelbots, corrupted files or data, or any other similar software or programs or engage in any other activity that may damage the operation of the Service or other users' computers;</li> " DECLINED Dr_Jeff Staff
Bitcasa (discontinued?) "or Bitcasa (or our service providers’) computer systems;</li> <li>interfere with or disrupt any user, host, or network" DECLINED kumiiiii
FastMail "Interfere with or disrupt networks connected to the Service or violate the regulations, policies or procedures of such networks.</li>" DECLINED lemmings
Spotify "<li>includes malicious content such as malware, Trojan horses, or viruses, or otherwise interferes with any user’s access to the Service." APPROVED Dr_Jeff Staff
Bitwarden "to access Bitwarden's Service in ways that exceed your authorization" APPROVED brightlysalty
Twitter "You may not do any of the following while accessing or using the Services: (i) access, tamper with, or use non-public areas of the Services, Twitter’s computer systems, or the technical delivery systems of Twitter’s providers." DECLINED Dr_Jeff Staff
AliExpress "You agree not to undertake any action to undermine the integrity of the computer systems or networks of Alibaba.com and/or any other User nor to gain unauthorized access to such computer systems or networks.<br>" APPROVED Peepo Staff
xda-developers "(6) malicious content (including, without limitation, malware or spyware)." APPROVED Agnes de Lion Staff
Schoology "attempt to gain unauthorized access to the Product or its related systems or networks." APPROVED HunterTheProto
Chinese Software Developer Network "不得在未经许可的情况下,非法进入其它电脑系统。" APPROVED reikousami Curator
Twitch "access the Twitch Services accounts of others without permission. forge another person’s digital signature. misrepresent the source, identity, or content of information transmitted via the Twitch Services. or perform any other similar fraudulent activity;</p>" APPROVED Dr_Jeff Staff
Google "— for example, by hacking, phishing," APPROVED Dr_Jeff Staff
Fiverr "Any attempts to publish or send malicious content with the intent to compromise another member’s account or computer environment is strictly prohibited." APPROVED Agnes de Lion Staff
Kaspersky "Interfering with the operation of the Website or gaining access to the Website's services through circumvention of the standard interface (by means of undocumented routes) is prohibited." APPROVED Dr_Jeff Staff
Strava "Attempting to disrupt, degrade, impair or violate the integrity or security of the Services or the computers, services, Accounts or networks of any other party (including, without limitation, “hacking,” “denial of service” attacks, etc.)," APPROVED Agnes de Lion Staff
Jitsi "attempt to hack or gain unauthorized access to the Service or any network, environment, or system of 8×8, or any of other user(s) of the Service;</li>" APPROVED Dr_Jeff Staff
Instructure "<li>access, tamper with, or use non-public areas or parts of the Service, or shared areas of the Service you haven't been invited to;" APPROVED Dr_Jeff Staff
Pearltrees "That provides access to computer viruses or any other code or program designed to interrupt, destroy or limit the functionality of any software application, computer or telecommunication tool, this list not being exhaustive" APPROVED Agnes de Lion Staff
Alan Thomson Simulation "Content has to be free of software viruses," APPROVED Mezzie Curator
Rumble "<li>contains software viruses or any other computer code, files, or programs that are designed or intended to disrupt, damage, or limit the functioning of any software, hardware, or telecommunications equipment or to damage or obtain unauthorized access to any data or other information of any third party. " APPROVED Agnes de Lion Staff
Anonfiles "<p>It is strictly forbidden to spread viruses, trojans, corrupt" APPROVED Agnes de Lion Staff
V.H. Hess "You further agree that your comments will not contain libelous or otherwise unlawful, abusive or obscene material, or contain any computer virus or other malware that could in any way affect the operation of the Service or any related website. " APPROVED Agnes de Lion Staff
1800Mattress.com " retrieve, alter, or destroy data on, from or through the Site. (b) probe, scan or test the vulnerability of a system or network on, from or through the Site. or (c) breach or defeat system or network security measures on, from or through the Site such as authentication, authorization, confidentiality, intrusion detection, or monitoring." APPROVED RocketSLC
Guilded "Attempts, in any manner, to obtain the password, account, or other security information from any other user. </li> <li> Violates the security of any computer network, or cracks any passwords or security encryption codes." APPROVED Agnes de Lion Staff
1800Mattress.com "interfere with or disrupt any computer, host, network, or telecommunications device maintained by 1800Mattress.com or any third party." DECLINED RocketSLC
Avast " damage, disable or impair the operation of, or gain or attempt to gain unauthorized access to, any Solution or to any property," APPROVED Agnes de Lion Staff
1800Mattress.com "use any technology that is or reasonably should be known to contain software viruses, Trojan horses, or any computer code, files, or programs designed to disrupt, destroy, invade, gain unauthorized access to, corrupt, observe, or modify without authorization, any data, software, computing or network devices, or telecommunications equipment of 1800Mattress.com or any Customer or any other third party." DECLINED RocketSLC
Burger King "<p>Obtain or attempt to gain unauthorized access to other computer systems, materials, information, or any services available on or through the Services;</p> " APPROVED Agnes de Lion Staff
Shopify "You further agree not to permit any third party to do any of the following: (i) access or attempt to access our systems, programs, or data that are not made available for public use." APPROVED private prawn Curator
MOBY Group "You may not attempt to gain unauthorized access to the Site through hacking, password mining or any other means." APPROVED Aayan
AirVPN "6. use the Service to compromise security of, or to obtain (or try to obtain) unauthorized access to any device or system in the Internet (such attempts include port scans);<br>" APPROVED Agnes de Lion Staff
ProtonVPN "<li>Attempting to access, probe, or connect to computing devices without proper authorization (i.e., any form of “hacking”);</li> " APPROVED Agnes de Lion Staff
Wise "You must not attempt to gain unauthorised access to our Website, our servers, computers or databases." APPROVED CyanoTex Curator
Calendly "or</li> <li>To attempt to gain unauthorized access to any portion of this Website or any other accounts, computer systems, or networks connected to this Website, whether through hacking, password mining, or any other means" APPROVED Agnes de Lion Staff
SpaceHey "attempt to gain unauthorized access to the Site, whether through password mining, brute force or DDoS attacks or any other means" APPROVED H3
Curve "in a way that might harm our ability to provide our services or may harm our software, systems or hardware,</p> </li>" DECLINED CyanoTex Curator
Porton Private Cloudstorage You are prohibited from attempting to gain unauthorized access to other computer systems APPROVED Hekkerman
CodeSandbox "You are not allowed to create, transmit, upload or distribute content on/to our Service that contains harmful elements (such as viruses, worms, or any software intended to damage or alter a computer system) that may cause damage to us, our infrastructure, our software or hardware or that may cause our other users similar damage.</li>" APPROVED private prawn Curator
The Movie Database (TMDb) "will not post or submit Contributions that constitute, contain, install or attempt to install or promote spyware, malware or other computer code, whether on our or others' computers or equipment, designated to enable you or others to gather information about or monitor the on-line or other activities of another party;</p> " APPROVED yoharnu
BookBub "(v) attempt to gain unauthorized access to the Sites (or to other computer systems or networks connected to or used together with the Sites), whether through password mining or any other means." APPROVED Zakronia
Cryptee "You also agree to not disrupt the Service networks and servers" APPROVED atng
avoidthehack! You are prohibited from attempting to gain unauthorized access to other computer systems APPROVED avoidthehack
Archive of Our Own " <p>to make available any material that contains software viruses or any other computer code, files or programs designed to interrupt, destroy or limit the functionality of any computer or hardware or telecommunications equipment;</p> </li> <li> <p>to interfere with or disrupt the Service, any <abbr>OTW</abbr>-hosted Content or sites, servers, Services or networks connected to <abbr>OTW</abbr> sites;</p>" APPROVED eliotwl
Polyfill "You must not attempt to gain unauthorised access to Polyfill.io, the server on which Polyfill.io are stored or any server, computer or database connected to Polyfill.io. " APPROVED ThisIsLiz
Neocities "obtain unauthorized access to any data or equipment of Neocities" PENDING pederdm000 Staff
Lichess ">You must not attempt to gain unlawful access to the website, any server connected to our website, any database or computer connected to our website;</li> <li>You must not attack our website via any kind of volumetric attack, or attempt to exploit any bugs, weaknesses and vulnerabilities present in our website." APPROVED Koala
HubSpot "We secure the Personal Information you provide on computer servers in a controlled, secure environment, protected from unauthorized access, use or disclosure." PENDING pederdm000 Staff
DigitalOcean You are prohibited from attempting to gain unauthorized access to other computer systems PENDING staler_0wept
TimePerformance "Le Client s’engage à utiliser le Logiciel de manière à que cette utilisation n’empêche, ni interrompe les communications avec d'autres ordinateurs ou les communications des téléphones portables, ni même empêcher ou interrompre les équipements utilisés pour fournir et utiliser le Service." APPROVED Cyanic76
F-List "In addition, you may not use your account to breach security of another account or attempt to gain unauthorized access to another network or server. Not all areas of the site may be available to you or other authorized users of the site." APPROVED CyanoTex Curator
Pluto TV "gains or enables unauthorized access to the Services or any of its features or functions, other users’ accounts, names, passwords, personally identifiable information or other computers, websites or pages, connected or linked to the Services;</li> " PENDING pederdm000 Staff
The Filipino Channel "f.) software viruses or any other computer code, files or programs designed to interrupt, destroy or limit the functionality of any computer software or computer hardware or telecommunication equipment." APPROVED Earldridge Jazzed Pineda
Opera "<p>b. You may not use the Service to assault, interfere, gain unauthorized access, deny service in any way or form to any other network or device through the Service.</p>" APPROVED ELP_JAPIS Curator
Hey.Café "To access, or to attempt to access, the accounts of others, or to penetrate, or attempt to penetrate, security measures of Hey.Café or another entity's computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in the corruption or loss of data, is expressly prohibited and the offending Hey.Café account is subject to immediate termination.</p> <p>" PENDING R. ^_^
Le Monde " - Ne pas utiliser de virus, injecter de bugs informatiques ou exploiter toute autre forme de faille pour obtenir des avantages ou un accès à des données protégées du Site et/ou Applications." APPROVED Agnes de Lion Staff
BlueStacks "Violates the security of any computer network, or cracks any passwords or security encryption codes, or attempt to post or transmit any information that constitutes a virus, bug, malicious code, or other harmful item" APPROVED (deactivated) Suspended
Mega " 15.7.8 to attempt to gain unauthorised access to any services other than those to which you have been given express permission to access. " APPROVED Agnes de Lion Staff
HideMe VPN "You agree not to attack in any way shape or form any other computer or network while on our service.<br>" APPROVED reikousami Curator
Riot Games (League of Legends) "Transmitting or facilitating the transmission of any content that contains a virus, corrupted data, trojan horse, bot keystroke logger, worm, time bomb, cancelbot or other computer programming routines that are intended to and/or actually damage, detrimentally interfere with, surreptitiously intercept or mine," APPROVED Dr_Jeff Staff
Vivaldi "Unless you have their explicit permission, you will not access another user’s Vivaldi Community account.</li> " APPROVED Agnes de Lion Staff
Cisco "<li>Access or use any application, system, service, tool, data, account, network, or content without authorization or for unintended purposes." APPROVED Dr_Jeff Staff
United States Postal Service "Users also may not post or transmit information or materials that would violate rights of any third party or which contains a virus or other harmful component. " APPROVED Agnes de Lion Staff
Redbubble "malicious code, including but not limited to viruses, trojan horses, worms, time bombs, cancelbots, or any other computer programming routines that may damage, interfere with, surreptitiously intercept, or expropriate any system, program, data, or personal information" APPROVED private prawn Curator
Gettr "involves the use of viruses, bots, worms or any other computer code, files or programs that may interrupt, destroy or limit the functionality of any computer software or hardware, or otherwise may permit the unauthorized use of or access to a computer or a computer network." APPROVED private prawn Curator
Brilliant "User shall not attempt to gain unauthorized access to any portion or feature of the Service, or any other systems or networks connected to the Service or to any Brilliant server, or to any of the services offered on or through the Service, by hacking, password "mining", or any other illegitimate means." APPROVED private prawn Curator
ente.io "<p>12.6.8. to attempt to gain unauthorised access to any services other than those to which you have been given express permission to access." APPROVED bsoyka


Comments:
No comments found