Acceptable Use Policy The Services must be used in accordance with RingCentral’s Acceptable Use Policy, available at xxxxx://xxx.xxxxxxxxxxx.xxx/legal/acceptable-use-policy.html. Notwithstanding anything to the contrary in this Agreement, RingCentral may act immediately and without notice to suspend or limit the Services if RingCentral reasonably suspects fraudulent or illegal activity in the Customer’s Account, material breach of the Acceptable Use Policy, or use of the Services that could interfere with the functioning of the RingCentral Network provided such suspension or limitation may only be to the extent reasonably necessary to protect against the applicable condition, activity, or use. RingCentral will promptly remove the suspension or limitation as soon as the condition, activity or use is resolved and mitigated in full. If Customer anticipates legitimate but unusual activity on its Account, Customer should contact Customer Care in advance to avoid any Service disruption.
Acceptable Use You agree that you are independently responsible for complying with all applicable laws in all of your activities related to your use of the Service, regardless of the purpose of the use, and for all communications you send through the Service. We and our Service Providers have the right but not the obligation to monitor and remove communications content that we find in our sole discretion to be objectionable in any way. In addition, you are prohibited from using the Service for communications or activities that: (a) violate any law, statute, ordinance or regulation; (b) promote hate, violence, racial intolerance, or the financial exploitation of a crime; (c) defame, abuse, harass or threaten others; (d) include any language or images that are bigoted, hateful, racially offensive, vulgar, obscene, indecent or discourteous; (e) infringe or violate any copyright, trademark, right of publicity or privacy or any other proprietary right under the laws of any jurisdiction; (f) impose an unreasonable or disproportionately large load on our infrastructure; (g) facilitate any viruses, trojan horses, worms or other computer programming routines that may damage, detrimentally interfere with, surreptitiously intercept or expropriate any system, data or information; (h) constitute use of any robot, spider, other automatic device, or manual process to monitor or copy the Service or the portion of the Site through which the Service is offered without our prior written permission; (i) constitute use of any device, software or routine to bypass technology protecting the Site or Service, or interfere or attempt to interfere, with the Site or the Service; or (j) may cause us or our Service Providers to lose any of the services from our internet service providers, payment processors, or other vendors. We encourage you to provide notice to us by the methods described in Section 6 of the General Terms above of any violations of the General Terms or the Agreement generally.
ACCEPTABLE USE RESTRICTIONS You must: (a) not use the App or any Service in any unlawful manner, for any unlawful purpose, or in any manner inconsistent with this XXXX, or act fraudulently or maliciously, for example, by hacking into or inserting malicious code, including viruses, or harmful data, into the App, any Service or any operating system; (b) not infringe our intellectual property rights or those of any third party in relation to your use of the App or any Service; (c) not transmit any material that is defamatory, offensive or otherwise objectionable in relation to your use of the App or any Service; (d) not use the App or any Service in a way that could damage, disable, overburden, impair or compromise our systems or security or interfere with other users; and (e) not collect or harvest any information or data from any Service or our systems or attempt to decipher any transmissions to or from the servers running any Service.
Additional Acceptable Uses of Student Data Contractor is prohibited from using Student Data for any secondary use not described in this agreement except: a. for adaptive learning or customized student learning purposes; b. to market an educational application or product to a parent or legal guardian of a student if Contractor did not use Data, shared by or collected per this Contract, to market the educational application or product; c. to use a recommendation engine to recommend to a student i. content that relates to learning or employment, within the third-party contractor's internal application, if the recommendation is not motivated by payment or other consideration from another party; or
COMMENCEMENT OF WORK UNDER A SOW AGREEMENT Commencement of work as a result of the SOW-RFP process shall be initiated only upon issuance of a fully executed SOW Agreement and Purchase Order.
Zone File Access Agreement Registry Operator will enter into an agreement with any Internet user, which will allow such user to access an Internet host server or servers designated by Registry Operator and download zone file data. The agreement will be standardized, facilitated and administered by a Centralized Zone Data Access Provider, which may be ICANN or an ICANN designee (the “CZDA Provider”). Registry Operator (optionally through the CZDA Provider) will provide access to zone file data per Section 2.1.3 of this Specification and do so using the file format described in Section 2.1.4 of this Specification. Notwithstanding the foregoing, (a) the CZDA Provider may reject the request for access of any user that does not satisfy the credentialing requirements in Section 2.1.2 below; (b) Registry Operator may reject the request for access of any user that does not provide correct or legitimate credentials under Section 2.1.2 below or where Registry Operator reasonably believes will violate the terms of Section 2.1.5. below; and, (c) Registry Operator may revoke access of any user if Registry Operator has evidence to support that the user has violated the terms of Section 2.1.5 below.
Unacceptable Use I am aware that the school monitors the pupil’s activity on this device. I agree that my child will not carry out any activity that constitutes ‘unacceptable use’. This includes, but is not limited to the following: • Using ICT or the internet to bully or harass someone else, or to promote unlawful discrimination • Any illegal conduct, or statements which are deemed to be advocating illegal activity • Activity which defames or disparages the school, or risks bringing the school into disrepute • Causing intentional damage to ICT facilities or materials • Using inappropriate or offensive language I accept that the school will sanction the pupil, in line with our Behaviour Policy, if the pupil engages in any of the above at any time.
Proper Instructions and Special Instructions “Proper Instructions,” which may also be standing instructions, as such term is used throughout this Agreement shall mean instructions received by the Custodian from a Fund, a Fund’s duly authorized investment manager or investment adviser, or a person or entity duly authorized by either of them. Such instructions may be in writing signed by the authorized person or persons or may be in a tested communication or in a communication utilizing access codes effected between electro-mechanical or electronic devices or may be by such other means and utilizing such intermediary systems and utilities as may be agreed from time to time by the Custodian and the person(s) or entity giving such instruction, provided that the Fund has followed any security procedures agreed to from time to time by the applicable Fund and the Custodian including, but not limited to, the security procedures selected by the Fund via the form of Funds Transfer Addendum hereto, the terms of which are hereby agreed to. Oral instructions will be considered Proper Instructions if the Custodian reasonably believes them to have been given by a person authorized to provide such instructions with respect to the transaction involved; the Fund shall cause all oral instructions to be confirmed in writing. For purposes of this Section, Proper Instructions shall include instructions received by the Custodian pursuant to any multi-party agreement which requires a segregated asset account in accordance with Section 2.9 hereof.
Framework Agreement 4.1.2.1 The Parties shall enter into a Framework Agreement within 28 days after the Contractor receives the Letter of Acceptance, unless the Particular Conditions establish otherwise. The Framework Agreement shall be based upon FORM No. 3 – FRAMEWORK AGREEMENT annexed to the Particular Conditions. The costs of stamp duties and similar charges (if any) imposed by law in connection with entry into the Framework Agreement shall be borne by the Procuring Entity. 4.1.2.2 The Framework Agreement establishes the terms and conditions that will govern the contract awarded during the term of the Framework Agreement. The Framework Agreement establishes for the procurement works by package as and when required, over the specified period of time. The Framework Agreement does not commit a Procuring Entity to procure, nor a Firm to supply. The Framework Agreement allows the Procuring Entity to call the Contractor to commence the works on a particular package in a specified location within the duration of the agreement. 4.1.2.3 This Framework Agreement does not guarantee the contractor of being called for a contract to start and no commitment is made with regard to possible number of packages to carry out. 4.1.2.4 This Framework Agreement does exclude the Procuring Entity from the right to procure the same Works from other firms. 4.1.2.5 This Framework Agreement does not stop the Procuring Entity from removing the contractor from the same Agreement. 4.1.2.6 FAs shall be established for a maximum period of three (3) years. The Procuring Entity may with the Consent of the Contractor extend this Agreement if the agreement period is less than three (3) years, if the initial engagement has been satisfactory. 4.1.2.7 Call-off Contracts; for work on a package to start, the Procuring Entity shall issue a notice of acceptance of a particular package requesting the contractor to furnish a Performance Security and to start the works thereafter, and providing the contractor with details of location where the works, are to be carried out. The call-off statement shall specify the objectives, tasks, deliverables, timeframes and price or price mechanism. The price for individual call-off contracts shall be based on the prices detailed in the Framework Agreement.
Actions of Custodian Based on Proper Instructions and Special Instructions So long as and to the extent that the Custodian acts in accordance with (a) Proper Instructions or Special Instructions, as the case may be, and (b) the terms of this Agreement, the Custodian shall not be responsible for the title, validity or genuineness of any property, or evidence of title thereof, received by it or delivered by it pursuant to this Agreement.