Acceptable Use Policy Violations Sample Clauses

Acceptable Use Policy Violations. If you violate the Acceptable Use Policy then in addition to the above actions you will be liable to PayPal for the amount of PayPal’s damages for each violation of the Acceptable Use Policy. You agree that $2,500.00 USD (or equivalent) per transaction in violation of the Acceptable Use Policy is presently a reasonable minimum estimate of PayPal’s actual damages – including, but not limited to, internal administrative costs incurred by PayPal to monitor and track violations, damage to PayPal’s brand and reputation, and penalties imposed upon PayPal by its business partners resulting from a user’s violation - considering all currently existing circumstances, including the relationship of the sum to the range of harm to PayPal that reasonably could be anticipated because due to the nature of the violations of the Acceptable Use Policy, actual damages would be impractical or extremely difficult to calculate. PayPal may deduct such damages directly from any existing balance in the offending Account, or any other Account you control.
AutoNDA by SimpleDocs
Acceptable Use Policy Violations. If you violate the Acceptable Use Policy, then in addition to the above actions, you will be liable to PayPal for the amount of PayPal’s damages for each violation of the Acceptable Use Policy. You agree to indemnify PayPal for all damages and losses PayPal may incur as a result of a violation of the Acceptable Use Policy considering all existing circumstances, including the range of damages and losses to PayPal. PayPal may deduct the amount equivalent to its indemnification directly from any existing balance in the Account of the offending User, or any other Account such User controls.
Acceptable Use Policy Violations. If you violate the Acceptable Use Policy then in addition to the above actions you will be liable to PayPal for the amount of PayPal’s damages for each violation of this policy. If you are a seller and receive funds for transactions that violate the Acceptable Use Policy and said violation is associated with fraud or the sale of goods that are counterfeit or otherwise infringe on intellectual property rights, then in addition to being subject to the above actions you will be liable to PayPal for the amount of PayPal’s damages caused by said violation. You acknowledge and agree that $2,500.00 USD (or equivalent) per violation is presently a reasonable minimum estimate of PayPal’s actual damages – including, but not limited to, internal administrative costs incurred by PayPal to monitor and track violations, damage to PayPal’s brand and reputation, and penalties imposed upon PayPal by its business partners resulting from said violation associated with fraud or the sale of goods that are counterfeit or otherwise infringe on intellectual property rights - considering all currently existing circumstances, including the relationship of the sum to the range of harm to PayPal that reasonably could be anticipated because due to the nature of the violation, actual damages would be impractical or extremely difficult to calculate. PayPal may deduct such damages directly from any existing balance in the offending Account, or any other Account you control.
Acceptable Use Policy Violations. If SimpleCloud becomes aware that Customer's or any Customer end user's use of the Services violates the acceptable use policy set forth in the Services specific terms executed with the Customer, SimpleCloud will give Customer notice of the violation by requesting that Customer correct the violation. If Customer fails to correct the violation within twenty-four (24) hours of SimpleCloud’s request, then SimpleCloud may suspend all or part of Customer's use of the Services until the violation is corrected.
Acceptable Use Policy Violations. If you violate the Acceptable Use Policy then in addition to the above actions you will be liable to PayPal for the amount of
Acceptable Use Policy Violations. If you violate the Acceptable Use Policy then in addition to the above actions you will be liable to WALLEX for the amount of WALLEX’s damages for each violation of the Acceptable Use Policy. You agree that $500.00 SGD (or equivalent) per transaction in violation of the Acceptable Use Policy is presently a reasonable minimum estimate of WALLEX’s actual damages considering all currently existing circumstances, including the relationship of the sum to the range of harm to WALLEX that reasonably could be anticipated because due to the nature of the violations of the Acceptable Use Policy, actual damages would be impractical or extremely difficult to calculate. WALLEX may deduct such damages directly from any existing balance in the offending Account, or any other Account you control.

Related to Acceptable Use Policy Violations

  • Acceptable Use Policy The Services must be used in accordance with RingCentral’s Acceptable Use Policy, available at xxxxx://xxx.xxxxxxxxxxx.xxx/legal/acceptable-use-policy.html. Notwithstanding anything to the contrary in this Agreement, RingCentral may act immediately and without notice to suspend or limit the Services if RingCentral reasonably suspects fraudulent or illegal activity in the Customer’s Account, material breach of the Acceptable Use Policy, or use of the Services that could interfere with the functioning of the RingCentral Network provided such suspension or limitation may only be to the extent reasonably necessary to protect against the applicable condition, activity, or use. RingCentral will promptly remove the suspension or limitation as soon as the condition, activity or use is resolved and mitigated in full. If Customer anticipates legitimate but unusual activity on its Account, Customer should contact Customer Care in advance to avoid any Service disruption.

  • Acceptable Use You agree that you are independently responsible for complying with all applicable laws in all of your activities related to your use of the Service, regardless of the purpose of the use, and for all communications you send through the Service. We and our Service Providers have the right but not the obligation to monitor and remove communications content that we find in our sole discretion to be objectionable in any way. In addition, you are prohibited from using the Service for communications or activities that: (a) violate any law, statute, ordinance or regulation; (b) promote hate, violence, racial intolerance, or the financial exploitation of a crime; (c) defame, abuse, harass or threaten others; (d) include any language or images that are bigoted, hateful, racially offensive, vulgar, obscene, indecent or discourteous; (e) infringe or violate any copyright, trademark, right of publicity or privacy or any other proprietary right under the laws of any jurisdiction; (f) impose an unreasonable or disproportionately large load on our infrastructure; (g) facilitate any viruses, trojan horses, worms or other computer programming routines that may damage, detrimentally interfere with, surreptitiously intercept or expropriate any system, data or information; (h) constitute use of any robot, spider, other automatic device, or manual process to monitor or copy the Service or the portion of the Site through which the Service is offered without our prior written permission; (i) constitute use of any device, software or routine to bypass technology protecting the Site or Service, or interfere or attempt to interfere, with the Site or the Service; or (j) may cause us or our Service Providers to lose any of the services from our internet service providers, payment processors, or other vendors. We encourage you to provide notice to us by the methods described in Section 6 of the General Terms above of any violations of the General Terms or the Agreement generally.

  • SUBSTANCE ABUSE POLICY See applicable administrative policy.

  • Policy Compliance Violations The Requester and Approved Users acknowledge that the NIH may terminate the DAR, including this Agreement and immediately revoke or suspend access to all controlled-access datasets subject to the NIH GDS Policy at any time if the Requester is found to be no longer in agreement with the principles outlined in the NIH GDS Policy, the terms described in this Agreement, or the Genomic Data User Code of Conduct. The Requester and PI agree to notify the NIH of any violations of the NIH GDS Policy, this Agreement, or the Genomic Data User Code of Conduct data within 24 hours of when the incident is identified. Repeated violations or unresponsiveness to NIH requests may result in further compliance measures affecting the Requester. The Requester and PI agree to notify the appropriate DAC(s) of any unauthorized data sharing, breaches of data security, or inadvertent data releases that may compromise data confidentiality within 24 hours of when the incident is identified. As permitted by law, notifications should include any known information regarding the incident and a general description of the activities or process in place to define and remediate the situation fully. Within 3 business days of the DAC notification(s), the Requester agrees to submit to the DAC(s) a detailed written report including the date and nature of the event, actions taken or to be taken to remediate the issue(s), and plans or processes developed to prevent further problems, including specific information on timelines anticipated for action. The Requester agrees to provide documentation verifying that the remediation plans have been implemented. Repeated violations or unresponsiveness to NIH requests may result in further compliance measures affecting the Requester. NIH, or another entity designated by NIH may, as permitted by law, also investigate any data security incident or policy violation. Approved Users and their associates agree to support such investigations and provide information, within the limits of applicable local, state, tribal, and federal laws and regulations. In addition, Requester and Approved Users agree to work with the NIH to assure that plans and procedures that are developed to address identified problems are mutually acceptable and consistent with applicable law.

  • ACCEPTABLE USE RESTRICTIONS You must: (a) not use the App or any Service in any unlawful manner, for any unlawful purpose, or in any manner inconsistent with this XXXX, or act fraudulently or maliciously, for example, by hacking into or inserting malicious code, including viruses, or harmful data, into the App, any Service or any operating system; (b) not infringe our intellectual property rights or those of any third party in relation to your use of the App or any Service; (c) not transmit any material that is defamatory, offensive or otherwise objectionable in relation to your use of the App or any Service; (d) not use the App or any Service in a way that could damage, disable, overburden, impair or compromise our systems or security or interfere with other users; and (e) not collect or harvest any information or data from any Service or our systems or attempt to decipher any transmissions to or from the servers running any Service.

  • Unacceptable Use I am aware that the school monitors the pupil’s activity on this device. I agree that my child will not carry out any activity that constitutes ‘unacceptable use’. This includes, but is not limited to the following: • Using ICT or the internet to bully or harass someone else, or to promote unlawful discrimination • Any illegal conduct, or statements which are deemed to be advocating illegal activity • Activity which defames or disparages the school, or risks bringing the school into disrepute • Causing intentional damage to ICT facilities or materials • Using inappropriate or offensive language I accept that the school will sanction the pupil, in line with our Behaviour Policy, if the pupil engages in any of the above at any time.

  • Additional Acceptable Uses of Student Data Contractor is prohibited from using Student Data for any secondary use not described in this agreement except: a. for adaptive learning or customized student learning purposes; b. to market an educational application or product to a parent or legal guardian of a student if Contractor did not use Data, shared by or collected per this Contract, to market the educational application or product; c. to use a recommendation engine to recommend to a student i. content that relates to learning or employment, within the third-party contractor's internal application, if the recommendation is not motivated by payment or other consideration from another party; or

  • Violence Policies and Procedures The Employer agrees to have in place explicit policies and procedures to deal with violence. The policy will address the prevention of violence, the management of violent situations, provision of legal counsel and support to employees who have faced violence. The policies and procedures shall be part of the employee's health and safety policy and written copies shall be provided to each employee. Prior to implementing any changes to these policies, the employer agrees to consult with the Association.

  • Convicted, Discriminatory, Antitrust Violator, and Suspended Vendor Lists In accordance with sections 287.133, 287.134, and 287.137, F.S., the Contractor is hereby informed of the provisions of sections 287.133(2)(a), 287.134(2)(a), and 287.137(2)(a), F.S. For purposes of this Contract, a person or affiliate who is on the Convicted Vendor List, the Discriminatory Vendor List, or the Antitrust Violator Vendor List may not perform work as a contractor, supplier, subcontractor, or consultant under the Contract. The Contractor must notify the Department if it or any of its suppliers, subcontractors, or consultants have been placed on the Convicted Vendor List, the Discriminatory Vendor List, or the Antitrust Violator Vendor List during the term of the Contract. In accordance with section 287.1351, F.S., a vendor placed on the Suspended Vendor List may not enter into or renew a contract to provide any goods or services to an agency after its placement on the Suspended Vendor List. A firm or individual placed on the Suspended Vendor List pursuant to section 287.1351, F.S., the Convicted Vendor List pursuant to section 287.133, F.S., the Antitrust Violator Vendor List pursuant to section 287.137, F.S., or the Discriminatory Vendor List pursuant to section 287.134, F.S., is immediately disqualified from Contract eligibility.

  • SPAM POLICY You are strictly prohibited from using the Website or any of the Company's Services for illegal spam activities, including gathering email addresses and personal information from others or sending any mass commercial emails.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!