You agree not to misuse the i.Sec Transaction Control (“Application”) or help anyone else to do so. For example, you must not even try to do any of the following in connection with the Application:

  1. Probe, scan, or test the vulnerability of any system or network without our written permission;
  2. Breach or otherwise circumvent any security or authentication measures;
  3. Access, tamper with, or use non-public areas or parts of the Application, or shared areas of the Application you haven’t been invited to;
  4. Interfere with or disrupt any user, host, or network, for example by sending a virus, overloading, flooding, spamming, or mail-bombing any part of the Services;
  5. Access, search, or create accounts for the Application by any means other than our publicly supported interfaces (for example, “scraping” or creating accounts in bulk);
  6. Send unsolicited communications, promotions or advertisements, or spam;
  7. Send altered, deceptive or false source-identifying information, including “spoofing” or “phishing”;
  8. Carry out activities on bank accounts other than that registered to you;
  9. Intentionally report a legitimate transaction as fraudulentor
  10. Violate the privacy or infringe the rights of others.