Data, System, & Network Security

Violations of system or network security are strictly prohibited and its compliance is highly enforced. Examples of prohibited actions follow:

1. Unauthorized access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without express authorization of the owner of the system or network

2. Unauthorized monitoring of data or traffic on any network or system without express authorization of the owner of the system or network

3. Interference with service provided to any user, host or network

4. Transmission, distribution or storage of any material in violation of any applicable law or regulation