11. Data mining
11.1 You must not conduct any systematic or automated data scraping, data mining, data extraction or
data harvesting, or other systematic or automated data collection activity, by means of or in
relation to the Services.
12. Hyperlinks
12.1 You must not link to any material using or by means of the Services that would, if it were made
available through the Services, breach the provisions of this Policy.
13. Harmful software
13.1 The Content must not contain or consist of, and you must not promote, distribute or execute by
means of the Services, any viruses, worms, Trojan horses, time bombs, cancelbots, spyware,
adware or other harmful or malicious software, programs, routines, applications or technologies.
13.2 The Content must not contain or consist of, and you must not promote, distribute or execute by
means of the Services, any software, programs, routines, applications or technologies that will or
may have a material negative effect upon the performance of a computer or introduce material
security risks to a computer.
14. Security
14.1 You must not access or use the Services without permission, including attempting to probe, scan,
or test the vulnerability of the Services or to breach any security or authentication measures used
by the Services.
14.2 You must not monitor data or traffic on the Services without permission.
14.3 You must not forge TCP-IP packet headers, e-mail headers, or any part of a message describing
its origin or route. The legitimate use of aliases and anonymous remailers is not prohibited by this
provision.
15. Network Abuse
15.1 You may not make network connections to any users, hosts, or networks unless you have
permission to communicate with them. Prohibited activities include:
(a) Monitoring or crawling of the Services that impairs or disrupts the Services;
(b) Inundating a target with communications requests so the target either cannot respond to
legitimate traffic or responds so slowly that it becomes ineffective;
(c) Interfering with the proper functioning of any Services, including any deliberate attempt to
overload the Services by mail bombing, news bombing, broadcast attacks, or flooding
techniques;
(d) Operating network services like open proxies, open mail relays, or open recursive domain
name servers; and
(e) Using manual or electronic means to avoid any use limitations placed on the Services,
such as access and storage restrictions.