Skip to main content

Terms of Use

You are prohibited from violating, or attempting to violate, the security of this website.

Any such violations may result in criminal and civil liabilities to you.We will investigate any alleged violations, and, if a criminal violation is suspected, we will cooperate with law enforcement agencies in their investigations.

Violations of the security of the website, without limitation, includes the following:

  • Logging into or attempting to log into a server or account that you are not authorized to access;
  • Accessing data or taking any action to obtain services not intended for you or your use;
  • Attempting to probe, scan, or test the vulnerability of any system, subsystem or network;
  • Tampering, hacking, modifying or otherwise corrupting or breaching security or authentication measures without proper authorization;
  • Transmitting material that contains viruses, Trojan horses, worms, time bombs, cancelbots or other computer programming routines or engines with the intent or effect of damaging, destroying, disrupting or otherwise impairing a computer’s functionality or the operation of the website or services;
  • Interfering with, intercepting or expropriating any system, data or information; or
  • Interfering with service to any user, host, or network including, without limitation, by means of overloading, “flooding,” “mailbombing,” or “crashing” any computer system.
  • Logging into or attempting to log into a server or account that you are not authorized to access;
  • Accessing data or taking any action to obtain services not intended for you or your use;
  • Attempting to probe, scan, or test the vulnerability of any system, subsystem or network;
  • Tampering, hacking, modifying or otherwise corrupting or breaching security or authentication measures without proper authorization;
  • Transmitting material that contains viruses, Trojan horses, worms, time bombs, cancelbots or other computer programming routines or engines with the intent or effect of damaging, destroying, disrupting or otherwise impairing a computer’s functionality or the operation of the website or services;
  • Interfering with, intercepting or expropriating any system, data or information; or
  • Interfering with service to any user, host, or network including, without limitation, by means of overloading, “flooding,” “mailbombing,” or “crashing” any computer system.