2.1. While using any of our Services you must comply with all relevant and applicable laws.
2.2. You must not use any part of our Services to:
2.2.1. download, possess or transmit in any way, illegal material (for example indecent images of children);
2.2.2. send, publish, distribute, circulate or otherwise propagate any material that is threatening, invasive of privacy, discriminatory, defamatory, racist, obscene, indecent, offensive, abusive, harmful or malicious;
2.2.3. gain or attempt to gain unauthorised access to any computer systems for any unauthorised or prohibited purpose;
2.2.4. prevent other users of our Service from accessing the Service;
2.2.5. cause critical disruption to our Services (for example using the Services to launch or receive a deliberate denial of service (DDOS) attack);
2.2.6. execute, for malicious purposes, any form of network monitoring or data interception that may affect third parties;
2.2.7. intentionally impair or attempt to impair the operation of any computer, prevent or hinder access to any program or data held in any computer or to impair the operation of any such program or the reliability of any such data (for example deleting files or changing the desktop settings);
2.2.8. knowingly transmit any data, send or upload any material that contains viruses, Trojan horses, worms, time-bombs, keystroke loggers, spyware, adware or any other harmful programs or similar computer code designed to adversely affect the operation of any computer software or hardware;
2.2.9. infringe the legal rights of others, including, but not limited to, privacy rights and intellectual property rights; or to commit fraud, or for any other unlawful or fraudulent purpose or effect.
2.3. Any use of any part of our Services as described in paragraph 2.2 will be seen as a breach of this policy and we may take any of the actions as set out in paragraph 4.
2.4. You must only use safe and appropriate equipment or software when using our Service and if we discover, or are informed, that any equipment or software which you use to access to our Services has been compromised and is likely to cause harm or damage to our services, network or other customers, we reserve the right to request that you cease use of such equipment or software immediately.