Abuse of Service Sample Clauses

Abuse of Service. The abuse of Service is prohibited. Using Service or permitting Service to be used in the following ways constitutes abuse:(a) interfering unreasonably with the use of AT&T service by others or the operation of the AT&T network; (b) carrying calls that originate on the network of a facilities-based interexchange carrier other than AT&T and terminate disproportionately to domestic locations for which AT&T's cost of terminating switched access (based on the published access rates of the incumbent local exchange companies) is above AT&T's price for the call under this Agreement (after application of discounts); (c) subjecting AT&T personnel or non-AT&T personnel to hazardous conditions; (d) attempting to avoid the payment, in whole or in part, of any charges by any means or device (non-payment of billed charges will not be considered abuse of service for purposes of this Section); or (e) using the Services or displaying or transmitting Content in a manner that violates any applicable law or regulation. In any instance in which AT&T believes in good faith that there is abuse of Service as set forth above, AT&T may immediately restrict, suspend or discontinue providing Service or prevent the display or transmission of Content, without liability on the part of AT&T, and then notify CUSTOMER of the action that AT&T has taken and the reason for such action. To the extent doing so does not interfere with its ability to prevent abuse of Service (to be determined in AT&T's reasonable judgment), AT&T will attempt to notify CUSTOMER before taking such action, and will attempt to limit any restriction, suspension or discontinuance under this Section to the locations, Content, or Services with respect to which the abuse is taking place.
AutoNDA by SimpleDocs
Abuse of Service. In the event Supplier receives any complaints regarding the receipt of unsolicited transactions, Supplier may in addition to Supplier remedies in clause 3 of these GTC, notify Customer of those complaints and request Customer to correct any such actions that would result in legal or unethical misuse of Supplier infrastructure. Customer acknowledges and agrees to allow Supplier to cooperate with any applicable legal or regulatory authorities in connection with any misuse or suspected misuse of the Services by Customer. Customer further agrees that Supplier shall be entitled to the extent permitted by law to divulge to any applicable legal or regulatory authorities, police, and any other government the name and address of Customer and any other information legally required to be disclosed by Supplier to any such authorities. Customer acknowledges as a result of the transmission as part of the Services of either unsolicited transactions, then upon the discovery or reasonable suspicion of fraud or artificially inflated traffic, the Services may be immediately suspended or terminated by Supplier and that Supplier shall not be liable to Customer or any other party as a result of such suspension or termination.
Abuse of Service. Any use of Webberstop India Private Limited system resource that disrupts the normal use of the system for other Webberstop India Private Limited ’s Customers shall be considered to be abuse of system resources and is grounds for administrative intervention. Spamming is one example of system abuse. Depending on the nature of and the severity of the abuse, the user/Customer may receive an e-mail warning or have their account suspended by Webberstop India Private Limited Technical Support. If the misuse is unintentional, the suspension may be rescinded at the discretion of the Operations Manager of Webberstop India Private Limited, and may require the payment of a service re-activation charge, which shall be at least Rupees Ten Thousand (Rs.10,000) per server. Occasionally, unintentional misuse is mis-classified as intentional misuse. Customers who believe their activity has been mis-classified may appeal to the Operations Manager of Webberstop India Private Limited. Violations of any of the Webberstop India Private Limited conditions of use are unethical and may be criminal offences. Customer shall to report to Webberstop India Private Limited any information that it may have concerning instances in which the conditions of use have been or are being violated. When Webberstop India Private Limited becomes aware of possible violations, it will initiate an investigation. At the same time, in order to prevent further possible unauthorised activity, Webberstop India Private Limited may suspend access to services to the individual account in question. Confirmation of violations may result in cancellation of the individual account and/or criminal prosecution. The account suspension may be rescinded at the discretion of the Operations Manager, following payment of a reactivation charge.
Abuse of Service. The following actions shall be considered to be an abuse of service and a violation of the Agreement: 1) Any use of the system that disrupts the normal use of the system for other subscribers.
Abuse of Service. Any use of the system that disrupts normal use of the system for other Subscribers is considered to be abuse of Services. The propagation of computer worms, viruses, spyware, adware or the use of the network to make unauthorized entry to any other computer systems, River Canyon Wireless equipment, or other communication devices or resources of others is a violation of this agreement. The use of River Canyon Wireless's Service(s) by Subscribers to modify, alter, reverse engineer, decompile disks, or to disassemble any proprietary work in whatever form is a violation of this Agreement. Subscribers running IPX or any other method to use an IP tunneling protocol without notification to and permission from River Canyon Wireless is a violation of this Agreement. The broadcast of Routing Internet Protocol (RIP) or any other inter router protocol by Subscriber(s) is a violation of this Agreement. Failure to obey all terms set forth in the Acceptable Use Policy is a violation of this Agreement. Any Subscriber deemed by River Canyon Wireless to be in violation of this section is subject to immediate termination by River Canyon Wireless. Termination under this section shall have no liability other than to refund any unearned prepaid service fees including direct, indirect, incidental or consequential damages.
Abuse of Service. Any use of the system that disrupts the normal use of the system for other Subscribers is considered to be abuse of Services. The propagation of computer worms, viruses, spyware, adware or the use of the network to make unauthorized entry to any other computer systems, Net 3 ISP equipment, or other communication devices or resources of others is a violation of this agreement. The use of Net 3 ISP's services by Subscribers to modify, alter, reverse engineer, decompile disks, or disassemble any proprietary work in whatever form is a violation of this Agreement. The failure of any Subscriber running IPX to use an IP tunneling protocol is a violation of this Agreement. The broadcast of Routing Internet Protocol (RIP) or any other inter router protocol by Subscriber is a violation of this Agreement. Failure to obey all terms set forth is a violation of this Agreement. Any Subscriber deemed by Net 3 ISP to be in violation of this section is subject to immediate termination by Net 3 ISP. Termination under this section shall have no liability other than to refund any unearned prepaid service fees including direct, indirect, incidental or consequential damages.
Abuse of Service. 4.1 You may not use or permit anyone else to use the channel for any unlawful purpose or in a manner which interferes with the provision of access to other parties. 4.2 RFUANZ may, by notice in writing, withdraw approval to use the channel if it reasonably believes you have breached clause 4.1.
AutoNDA by SimpleDocs
Abuse of Service. Any use of the system that disrupts the normal use of the system for other Customers is considered to be abuse of Services. The propagation of computer worms, viruses, spyware, adware or the use of the network to make unauthorized entry to any other computer systems, SBC Wireless equipment, or other communication devices or resources of others is a violation of this Agreement. The use of SBC Wireless Services by Customers to modify, alter, reverse engineer, decompile disks, or disassemble any proprietary work in whatever form is a violation of this Agreement. The failure of any Customer running IPX to use an IP tunneling protocol is a violation of this Agreement. The broadcast of Routing Internet Protocol (RIP) or any other inter router protocol by Customer is a violation of this Agreement. Failure to obey all terms set forth in the Acceptable Use Policy is a violation of this Agreement. Any Customer deemed by SBC Wireless to be in violation of this section is subject to immediate termination by SBC Wireless. If termination of this Agreement occurs under this section SBC Wireless shall have no liability to customer other than to refund any unearned prepaid service fees.
Abuse of Service. Any use of the system that disrupts the normal use of the system for other Customers is considered to be abuse of Services. The propagation of computer worms, viruses, spyware, adware or the use of the network to make unauthorized entry to any other computer systems, SBC Wireless equipment, or other communication devices or resources of others is a violation of this Agreement. The use of SBC Wireless Services by Customers to modify, alter, reverse engineer, decompile disks, or disassemble any proprietary work in whatever form is a violation of this Agreement. The failure of any Customer running IPX to use an IP tunneling protocol is a violation of this Agreement. The broadcast of Routing Internet Protocol (RIP) or any other inter router protocol by Customer is a violation of this Agreement. Failure to obey all terms set forth in the Acceptable Use Policy is a violation of this Agreement. Any Customer deemed by SBC Wireless to be in violation of this section is subject to immediate termination by SBC Wireless. If termination of this Agreement occurs under this section SBC Wireless shall have no liability to customer other than to refund any unearned prepaid service fees. No Recovery for Indirect Damages No party hereto shall be liable to any other party for any special, indirect, incidental or consequential damages of any kind whatsoever relating to the provision of SBC Wireless Services. NOTWITHSTANDING ANYTHING IN THIS AGREEMENT TO THE CONTRARY, IN NO EVENT SHALL SBC WIRELESS, INC., ITS AFFILIATES OR ANY OF ITS DIRECTORS, OFFICERS, EMPLOYEES, AGENTS OR SUBCONTRACTORS BE LIABLE FOR EXEMPLARY, PUNITIVE, SPECIAL, INCIDENTAL, INDIRECT OR CONSEQUENTIAL DAMAGES (INCLUDING, WITHOUT LIMITATION, ATTORNEYS' FEES), LOSS OF BUSINESS, OR LOST PROFITS, EACH OF WHICH IS HEREBY EXCLUDED BY AGREEMENT OF THE PARTIES REGARDLESS OF WHETHER SUCH DAMAGES WERE FORESEEABLE OR WHETHER A PARTY OR ANY ENTITY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Additional Clarifications, Terms and Conditions Usernames, passwords and email addresses at xxx.xxx-xxxxxxxx.xxx are SBC Wireless’s property and SBC Wireless may alter or replace them at any time. Any Customer’s domain name shall remain the property of Customer. SBC Wireless has no control over certain types of interference and signal blockage. SBC does not guarantee any level or quality of service. If the service becomes unusable and cannot be restored within 2 working days, Xxxxxxxx’s account will be credited on a prorate b...
Abuse of Service. Any use of the system that disrupts the normal use of the system for other Subscribers is abuse of Services. The propagation of computer worms, viruses, spyware, adware, or the use of the network to make unauthorized entry to any other computer systems, Net 3 ISP equipment, or other communication devices or resources of others is a violation of this agreement. The use of Net 3 ISP's services by Subscribers to modify, alter, reverse engineer, decompile disks, or disassemble any proprietary work in whatever form is a violation of this Agreement. The failure of any Subscriber running IPX to use an IP tunneling protocol is a violation of this Agreement. The broadcast of Routing Internet Protocol (RIP) or any other inter router protocol by Subscriber is a violation of this Agreement. Failure to obey all terms set forth is a violation of this Agreement. Any Subscriber deemed by Net 3 ISP to be in violation of this section is subject to immediate termination by Net 3 ISP. Termination under this section shall have no liability other than to refund any unearned prepaid service fees including direct, indirect, incidental, or consequential damages. Net 3 ISP will not support any boot legged or jail broken viewing devices and you will immediately be disconnected from services if pirated movies are downloaded. We are notified when this happens. Usernames, passwords, and email addresses at Xxx0XXX.xxx are Net 3 ISP's property and Net 3 ISP can alter or replace them at any time. Net 3 ISP has no control over certain types of interference and signal blockage. We do not guarantee any level of speed or quality of service, but we try to do the best of our ability. If the service becomes unusable and cannot be restored (not customer user error) within 72 hours, your account will be credited for the outage. The customer must call within 24 hours of non-service to get credit. As an example, we will not credit a customer for calling weeks after the occurrence. Net 3 ISP cannot be held liable for any type of loss, whether actual or perceived, due to a lack of service. Net 3 ISP will not be responsible for paying for customers cell phone xxxx with the use of a hot spot. This privacy notice discloses the privacy practices for XXX0XXX.XXX. This privacy notice applies solely to information collected by this website. It will notify you of the following:
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!