- Attempting to reverse-engineer or exploit the Application.
- Using the Application for unlawful purposes or in violation of applicable laws.
- Sharing access credentials with unauthorized individuals.
- Transmit any content that is unlawful, defamatory, or infringes intellectual property rights.
- Perform simulations or activities that are harmful, abusive, or disruptive to the Application’s infrastructure or other users.
- Engage in commercial activities or offer services using the Application without prior approval.