User may not use Services to transmit, distribute, or store material in a manner that:
3.1. Modifies, alters, tampers with, repairs, or otherwise creates derivative works of any software included in the Services;
3.2. Except as allowed by mandatory applicable Law, reverse engineers, disassembles, or decompiles the Infrastructure or Services or software included in the Services;
3.3. Accesses or uses the Services in a way intended to avoid incurring fees or exceeding usage limits or quotas;
3.4. Interferes with or adversely affects the Services or use of the Services by other users;
3.5. Uses any high volume automated means (including robots, spiders, scripts or similar data gathering or extraction methods) to access the Services and any other accounts, computer systems, or networks connected to the Services (each a “System”);
3.6. Connects to any users, hosts, or networks where Client does not have permission to communicate with such users, hosts, or networks, including, but not limited to:
- Monitors or crawls a System so that such System is impaired or disrupted;
- Conducts denial of service attacks;
- Intentionally interferes with the proper functioning of any System, including any deliberate attempt to overload a System by any means;
- Operates network services like open proxies, open mail relays, or open recursive domain name servers;
- Uses means (manual or electronic) to avoid any use limitations placed on a System, such as access and storage restrictions;
3.7. Distributes, publishes, sends, or facilitates unsolicited mass e-mailings, promotions, advertising, or solicitations, including commercial advertising and informational announcements;
3.8. Alters or obscures mail headers or assume a sender's identity without the sender's explicit permission; or