ACCEPTABLE USE RESTRICTIONS You must Sample Clauses

ACCEPTABLE USE RESTRICTIONS You must. 11.1 not use the App or any Service in any unlawful manner, for any unlawful purpose, or in any manner inconsistent with this XXXX, or act fraudulently or maliciously, for example, by hacking into or inserting malicious code, including viruses, or harmful data, into the App, any Service or any operating system;
AutoNDA by SimpleDocs
ACCEPTABLE USE RESTRICTIONS You must a) not use the app in any unlawful manner, for any unlawful purpose, or in any manner inconsistent with this XXXX, or act fraudulently or maliciously, for example, by hacking into or inserting malicious code, including viruses, or harmful data, into the App, any Service or any operating system;
ACCEPTABLE USE RESTRICTIONS You must. (i) not use the App in any unlawful manner, for any unlawful purpose, or in any manner inconsistent with these Terms, or act fraudulently or maliciously, for example, by hacking into or inserting malicious code, including viruses, or harmful data, into the App, or any operating system; (ii) not infringe the Intellectual Property Rights of any third party in relation to your use of the App (“Intellectual Property Rights” means copyright, moral rights, trademark, trade dress, patent, trade secret, unfair competition, right of privacy, right of publicity, and any other proprietary rights); and (iii) not upload or transmit any material that is defamatory, offensive or otherwise objectionable in relation to your use of the App.
ACCEPTABLE USE RESTRICTIONS You must. 7.1.1 not use the App or the Services in any unlawful manner, for any unlawful purpose, or in any manner inconsistent with this XXXX, or act fraudulently or maliciously, for example, by hacking into or inserting malicious code, including viruses, trojans, worms, logic bombs, or other harmful data, into the App, the Services or any operating system. You must not attack the App via a denial-of-service attack or a distributed denial-of service attack. By breaching this provision, you would commit criminal offences. We may report any such breach to the relevant law enforcement authorities and we will co-operate with those authorities by disclosing your identity to them. In the event of such a breach, your right to use the App will cease immediately.;

Related to ACCEPTABLE USE RESTRICTIONS You must

  • ACCEPTABLE USE RESTRICTIONS You must:

  • Service Use Restrictions In connection with your use of the Services, you sha l not in any way transmit, publish, post, upload, disseminate, or distribute any (i) corrupted files, viruses, trojan horses, worms, spyware, time bombs, cancelbots, or any other similar software or programs; and/or ( i) defamatory, infringing, vulgar, sexua ly explicit, obscene, indecent, o fensive, inappropriate, profane, or unlawful content or any hate speech (i.e., racist/discriminatory speech). You sha l also not (i) impair anyone else from using the Services or interfere with the proper functioning of the Services; ( i) access the Services (including by use of robots, scripts, spiders or other automated means) other than via the means provided by us; ( i) misrepresent your identity in any way; (iv) overburden the Services in any way; and/or (v) violate any law, rule or regulation in connection with your use of or access to the Services.

  • Use Restriction (a) If a natural disaster, incident or any other emergency situation occurs or is likely to occur, SORACOM may restrict the use of the SORACOM Air Global Service by the Subscriber in order to give priority to communications whose content are necessary for the prevention of or relief from calamities, for the securing of transportation, communications or electric power supply, the maintenance of public order or any other public interest.

  • Use Restrictions (a) Company will not do or attempt to do, and Company will not permit any other person or entity to do or attempt to do, any of the following, directly or indirectly:

  • AGE RESTRICTION You must be at least 18 (eighteen) years of age to use this Website or any Services contained herein. By using this Website, You represent and warrant that You are at least 18 years of age and may legally agree to this Agreement. The Company assumes no responsibility or liability for any misrepresentation of Your age.

  • Termination/Access Restriction Friends of the Lakota Nation reserves the right, in its sole discretion, to terminate your access to the Site and the related services or any portion thereof at any time, without notice. To the maximum extent permitted by law, this agreement is governed by the laws of the State of Colorado and you hereby consent to the exclusive jurisdiction and venue of courts in Colorado in all disputes arising out of or relating to the use of the Site. Use of the Site is unauthorized in any jurisdiction that does not give effect to all provisions of these Terms, including, without limitation, this section. You agree that no joint venture, partnership, employment, or agency relationship exists between you and Friends of the Lakota Nation as a result of this agreement or use of the Site. Friends of the Lakota Nation's performance of this agreement is subject to existing laws and legal process, and nothing contained in this agreement is in derogation of Friends of the Lakota Nation's right to comply with governmental, court and law enforcement requests or requirements relating to your use of the Site or information provided to or gathered by Friends of the Lakota Nation with respect to such use. If any part of this agreement is determined to be invalid or unenforceable pursuant to applicable law including, but not limited to, the warranty disclaimers and liability limitations set forth above, then the invalid or unenforceable provision will be deemed superseded by a valid, enforceable provision that most closely matches the intent of the original provision and the remainder of the agreement shall continue in effect. Unless otherwise specified herein, this agreement constitutes the entire agreement between the user and Friends of the Lakota Nation with respect to the Site and it supersedes all prior or contemporaneous communications and proposals, whether electronic, oral or written, between the user and Friends of the Lakota Nation with respect to the Site. A printed version of this agreement and of any notice given in electronic form shall be admissible in judicial or administrative proceedings based upon or relating to this agreement to the same extent and subject to the same conditions as other business documents and records originally generated and maintained in printed form. It is the express wish to the parties that this agreement and all related documents be written in English.

  • Acceptable Use Agreement I understand that I must use school ICT systems in a responsible way, to ensure that there is no risk to my safety or to the safety and security of the ICT systems and other users. I will, where possible, educate the young people in my care in the safe use of ICT and embed E-Safety in my work with young people including my ‘Prevent’ duty. For my professional and personal safety: • I understand that the school will monitor my use of the ICT systems, email and other digital communications. • I understand that the rules set out in this agreement also apply to use of school ICT systems (e.g. laptops, email, VLE etc.) out of school, and to the transfer of personal data (digital or paper based) out of school • I understand that the school ICT systems are intended for educational use and that I will only use the systems for personal or recreational use within the policies and rules set down by the school. • I will not disclose my username or password to anyone else, nor will I try to use any other person’s username and password. I understand that I should not write down or store a password where it is possible that someone may steal it. • I will immediately report any illegal, inappropriate or harmful material or incident, I become aware of, to the appropriate person.  Will report damaged equipment to the ICT support staff and will not attempt to repair any damage. I will be professional in my communications and actions when using school ICT systems: • I will not access, copy, remove or otherwise alter any other user’s files, without their express permission. • I will ensure that when I take and / or publish images of others I will do so with their permission and in accordance with the school’s policy on the use of digital / video images. If my personal device is used to record images this should be transferred to school systems and deleted from my device as soon as is practicable • I will only use chat and social networking sites in school in accordance with the school’s policies. • I will only communicate with students / pupils and parents / carers using official school systems. • I will not engage in any on-line activity that may compromise my professional responsibilities or be harmful to the reputation of the school. The school and the local authority have the responsibility to provide safe and secure access to technologies and ensure the smooth running of the school: • I will not use personal email addresses when communicating with pupils and parents. • I will not try to upload, download or access any materials which are illegal (including but not restricted to child sexual abuse images, criminally racist material, adult pornography covered by the Obscene Publications Act) or inappropriate or may cause harm or distress to others. I will not try to use any programmes or software that might allow me to bypass the filtering / security systems in place to prevent access to such materials. • I will not install or attempt to install programmes of any type on a machine, or store programmes on a computer and understand that all software should be appropriately licenced. • I will not disable or cause any damage to school equipment, or the equipment belonging to others. • Where digital personal data is transferred outside the secure local network, it must be encrypted. • I understand that the GDPR policy requires that any staff or student / pupil data to which I have access, will be kept private and confidential. • I will immediately report any damage or faults and loss of data to an appropriate person. I understand that I am responsible for my actions in and out of the school: • I understand that this Acceptable Use Agreement applies not only to my work and use of school ICT equipment in school, but also applies to my use of school ICT systems and equipment off the premises and my use of personal equipment on the premises or in situations related to my employment by the school • I understand that if I fail to comply with this Acceptable Use Agreement, I could be subject to disciplinary action. I have read and understand the above and agree to use the school ICT systems (both in and out of school) and my own devices (in school and when carrying out communications related to the school) within these guidelines. Staff / Volunteer Name Signed

  • Age Restrictions Drivers must be 21 years of age or over.

  • General Use Restrictions Licensee shall not use, copy, merge, or transfer copies of the SOFTWARE or the Documentation except as may be expressly and specifically authorized in this Agreement. Licensee shall not knowingly take any action that would cause the SOFTWARE to be placed in the public domain.

  • Usage Restrictions You will not (a) make any Service or Content available to, or use any Service or Content for the benefit of, anyone other than You or Users, (b) sell, resell, license, sublicense, distribute, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Service or Content in a way that circumvents a contractual usage limit, (h) copy a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Your own intranets or otherwise for Your own internal business purposes or as permitted in the Documentation, (k) access any Service or Content in order to build a competitive product or service, or (l) reverse engineer any Service (to the extent such restriction is permitted by law).

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!