The Service and Integration Materials are made available to you solely for your own personal or internal business use, as applicable. You shall not, directly or indirectly, and shall not authorize any third party to: (i) decompile, disassemble, reverse engineer, or otherwise attempt to derive any source code, structure, ideas, algorithms, or associated know-how of, the Service or Integration Materials, or reconstruct, or discover, any hidden or non-public elements of the Service or Integration Materials; (ii) translate, adapt, or modify the Service, Integration Materials or any portion thereof; (iii) except as necessary to integrate the Service with your Development Environment (as defined in Section 3.1 below) using the Integration Materials in accordance with our documentation, write or develop any program based upon the Service or any portion thereof; (iv) use the Service or Integration Materials in any manner for the purpose of developing, distributing or making accessible products or services that compete with the Service or Integration Materials; (v) sell, sublicense, transfer, assign, lease, rent, distribute, or grant a security interest in the Service, Integration Materials or any rights thereto; (vi) export, sell or distribute any content or portion of the Service or Integration Materials, allow access to the Service (or any content or other portion thereof) or Integration Materials by any third persons, make the Service or Integration Materials available on a service bureau basis, or otherwise access or use the Service for the benefit of a third party; (vii) permit your Account on the Service to be accessed or used by any persons other than your employee personnel; (viii) attempt to engage in or engage in, any potentially harmful acts that are directed against the Service, including but not limited to violating or using manual or automated software or other means to access, “scrape,” “crawl” or “spider” any pages contained in the Service or interfering with the use of Service by any other user, host or network; (ix) transmit unlawful, infringing, or harmful User Content (as defined in Section 3.4) or other data or code that you are not authorized to transmit, either to or from the Service; (x) interfere or attempt to interfere with, disrupt, or create an undue burden on servers or networks connected to the Service, including by means of overloading, “flooding,” “spamming,” “mail bombing,” or “crashing” the Service, or violate the regulations, policies or procedures of such networks; (xi) attempt to violate any security features of the Service or gain unauthorized access to the Service (or to other computer systems or networks connected to or used together with the Service), whether through password mining or any other means; (xii) alter or remove any trademarks or proprietary notices contained in or on the Service or Integration Materials; (xiii) engage in framing, mirroring, or otherwise simulating the appearance or function of the Service; (xiv) perform or publish any performance or benchmark tests or analyses relating to the Service or Integration Materials; (xv) make any User Content (as defined in Section 3.4 below) available on or through the Service that infringes, violates or misappropriates any patent, trademark, trade secret, copyright, right of publicity, privacy right or other right of any person or entity or is unlawful, threatening, abusive, harassing, defamatory, libelous, deceptive, fraudulent, invasive of another’s privacy, tortious, indecent, obscene, offensive, or profane; (xvi) make any User Content (as defined in Section 3.4 below) available on or through the Service that constitutes unauthorized or unsolicited advertising, junk or bulk e-mail, involves commercial activities and/or sales, such as contests, sweepstakes, barter, advertising, or pyramid schemes without Company’s prior written consent, or impersonates any person or entity, including any employee or representative of Company; (xvii) make available on or through the Service or Integration Materials any computer code, programs, or programming devices that are designed to disrupt, modify, access, delete, damage, deactivate, disable, harm, or otherwise impede in any manner, the operation of the Service or any other associated software, firmware, hardware, computer system, or network (including, without limitation, “Trojan horses,” “viruses,” “worms,” “time bombs,” “time locks,” “devices,” “traps,” “access codes,” or “drop dead” or “trap door” devices) or any other harmful, malicious, or hidden procedures, routines or mechanisms that would cause the Service to cease functioning or to damage or corrupt data, storage media, programs, equipment, or communications, or otherwise interfere with operation; or (xviii) otherwise use the Service or Integration Materials except as expressly permitted hereunder.