>>>> The use of a resource to infringe upon the usage rights of
>>>> another resource
>>>
>>> I like this.
>>
>> I...don't.
>>
>> It is a meaningless political  expression that can mean anything
>> to anyone.
>
> I think this comment goes to the heart of the challenge, here.  This
> group is focused on an operational topic.  Its definitions should focus
> on operational issues.  Such a focus requires defining things in very
> specific terms.
>
> In this context, I believe abuse concerns unauthorized access and to
> actions that inflict damage on others.  This might need some
> elaboration, if folks want to worry about such things as persistency
> (duration or pattern) of the misbehaviour, degree of damage, or the like.

I'm with both Dave & Sascha on this; the proposed statement is woolly at best.
--
Chris Phillips
Service Operations - intY Ltd.
________________________________
 Information in and attached to this electronic mail is confidential and may be 
legally privileged. It is intended solely for the addressee. Access to this 
electronic mail by anyone else is unauthorised. If you are not the intended 
recipient any use, disclosure, copying, distribution or any other action in 
relation to this message is prohibited and may be unlawful. If you have 
received this message in error, please notify the sender immediately by return 
e-mail, and immediately and permanently delete it without making any copies or 
disclosing the contents to any other person. When addressed to our customers, 
any information contained in this electronic mail or in any attachment is 
subject to intY’s Terms & 
Conditions<http://www.intycascade.com/about-us/terms-and-conditions/>. We have 
scanned this electronic mail for viruses but we do not represent or warrant it 
to be virus free and recommend that you carry out your own virus checks on the 
electronic mail and any attachments.

intY Ltd is a Limited Company, registered in England and Wales at 170 Aztec 
West, Bristol, BS32 4TN. Company Number: 3438922.

Reply via email to