Inappropriate Use of Resources

Any types of hacking, exploration, invasions of privacy, trespassing or other network compromises are prohibited. Excessive utilization of computer resources is prohibited. No one may deliberately attempt to degrade performance of a computer system on the Internet or to deprive authorized personnel of resources or access to any computer system. Deliberate, unauthorized excessive use of these services will be construed as an attempt to deprive others of resources.