Use technology or any automated system such as scripts or bots in order to collect usernames, passwords, email addresses or other data from the Company Services, or to circumvent or modify any security technology or software that is part of the Company Services;