Furthermore, any attempts at pen testing or probing our security for vulnerabilities in order to find security flaws, without our express permission, is also viewed by us as unauthorized access to our systems.
Again, all data is being logged and will be reported.