
periodic updating, maintenance or repair of the Service or other actions that Company,
in its sole discretion, may elect to take.
3.2 Restrictions on Your Use of the Services. You may not do any of the following in
connection with your use of the Services, unless applicable laws or regulations prohibit
these restrictions or you have our written permission to do so:
download, modify, copy, distribute, transmit, display, perform, reproduce, duplicate,
publish, license, create derivative works from, or offer for sale any information contained
on, or obtained from or through, the Services, except for temporary files that are
automatically cached by your web browser for display purposes, or as otherwise
expressly permitted in these Terms;
duplicate, decompile, reverse engineer, disassemble or decode the Services (including
any underlying idea or algorithm), or attempt to do any of the same;
use, reproduce or remove any copyright, trademark, service mark, trade name, slogan,
logo, image, or other proprietary notation displayed on or through the Services;
use automation software (bots), hacks, modifications (mods) or any other unauthorized
third-party software designed to modify the Services or impersonate human activity on
the Services;
exploit the Services for facilitating any commercial advertisement or solicitation;
access or use the Services in any manner that could disable, overburden, damage,
disrupt or impair the Services or interfere with any other party's access to or use of the
Services or use any device, software or routine that causes the same;
attempt to gain unauthorized access to, interfere with, damage or disrupt the Services,
accounts registered to other users, or the computer systems or networks connected to
the Services;
circumvent, remove, alter, deactivate, degrade or thwart any technological measure or
content protections of the Services;
use any robot, spider, crawlers, scraper, or other automatic device, process, software or
queries that intercepts, “mines,” scrapes, extracts, or otherwise accesses the Services
to monitor, extract, copy or collect information or data from or through the Services, or
engage in any manual process to do the same;
introduce any viruses, trojan horses, worms, logic bombs or other materials that are
malicious or technologically harmful into our systems;