Access and Use Customer Restrictions Sample Clauses

Access and Use Customer Restrictions 
AutoNDA by SimpleDocs

Related to Access and Use Customer Restrictions

  • ACCEPTABLE USE RESTRICTIONS You must: (a) not use the App or any Service in any unlawful manner, for any unlawful purpose, or in any manner inconsistent with this XXXX, or act fraudulently or maliciously, for example, by hacking into or inserting malicious code, including viruses, or harmful data, into the App, any Service or any operating system; (b) not infringe our intellectual property rights or those of any third party in relation to your use of the App or any Service; (c) not transmit any material that is defamatory, offensive or otherwise objectionable in relation to your use of the App or any Service; (d) not use the App or any Service in a way that could damage, disable, overburden, impair or compromise our systems or security or interfere with other users; and (e) not collect or harvest any information or data from any Service or our systems or attempt to decipher any transmissions to or from the servers running any Service.

  • Access and Use 1. Each Party shall ensure that any service supplier of the other Party is accorded access to and use of public telecommunications transport networks and services in a timely fashion, on transparent, reasonable and nondiscriminatory terms and conditions. This obligation shall be applied, inter alia, through paragraphs 2 through 6. 2. Each Party shall ensure that service suppliers of the other Party have access to and use of any public telecommunications transport network or service offered within or across the border of that Party, including private leased circuits, and to this end shall ensure, subject to the provisions of paragraphs 5 and 6, that such suppliers are permitted: (a) to purchase or lease and attach terminal or other equipment which interfaces with the network and which is necessary to supply their services; (b) to interconnect private leased or owned circuits with public telecommunications transport networks and services or with circuits leased or owned by other service suppliers; (c) to use operating protocols of their choice in the supply of any service, other than as necessary to ensure the availability of telecommunications transport networks and services to the public generally; and (d) to perform switching, signaling and processing functions. 3. Each Party shall ensure that service suppliers of the other Party may use public telecommunications transport networks and services for the movement of information 4. Notwithstanding the provisions of paragraph 3, a Party may take such measures as are necessary: (a) to ensure the security and confidentiality of messages; or (b) to protect the personal data of users of public telecommunications transport networks or services, subject to the requirement that such measures are not applied in a manner which would constitute a means of arbitrary or unjustifiable discrimination or a disguised restriction on trade in services. 5. Each Party shall ensure that no condition is imposed on access to and use of public telecommunications transport networks and services other than as necessary: (a) to safeguard the public service responsibilities of suppliers of public telecommunications transport networks and services, in particular their ability to make their networks or services available to the public generally; or (b) to protect the technical integrity of public telecommunications transport networks or services.

  • Use Restrictions (a) Company will not do or attempt to do, and Company will not permit any other person or entity to do or attempt to do, any of the following, directly or indirectly: (i) use any Proprietary Item for any purpose, at any location or in any manner not specifically authorized by this Agreement; (ii) make or retain any copy of any Proprietary Item except as specifically authorized by this Agreement; (iii) create, recreate or obtain the source code for any Proprietary Item; (iv) refer to or otherwise use any Proprietary Item as part of any effort to develop other software, programs, applications, interfaces or functionalities or to compete with BNYM or a Third Party Provider; (v) modify, adapt, translate or create derivative works based upon any Proprietary Item, or combine or merge any Proprietary Item or part thereof with or into any other product or service not provided for in this Agreement and not authorized in writing by BNYM; (vi) remove, erase or tamper with any copyright or other proprietary notice printed or stamped on, affixed to, or encoded or recorded in any Proprietary Item, or fail to preserve all copyright and other proprietary notices in any copy of any Proprietary Item made by Company; (vii) sell, transfer, assign or otherwise convey in any manner any ownership interest or Intellectual Property Right of BNYM, or market, license, sublicense, distribute or otherwise grant, or subcontract or delegate to any other person, including outsourcers, vendors, consultants, joint venturers and partners, any right to access or use any Proprietary Item, whether on Company’s behalf or otherwise; (viii) subcontract for or delegate the performance of any act or function involved in accessing or using any Proprietary Item, whether on Company’s behalf or otherwise; (ix) reverse engineer, re-engineer, decrypt, disassemble, decompile, decipher, reconstruct, re-orient or modify the circuit design, algorithms, logic, source code, object code or program code or any other properties, attributes, features or constituent parts of any Proprietary Item; (x) take any action that would challenge, contest, impair or otherwise adversely effect an ownership interest or Intellectual Property Right of BNYM; (xi) use any Proprietary Item to provide remote processing, network processing, network communications, a service bureau or time sharing operation, or services similar to any of the foregoing to any person or entity, whether on a fee basis or otherwise; (xii) allow Harmful Code into any Proprietary Item, as applicable, or into any interface or other software or program provided by it to BNYM, through Company’s systems or personnel or Company’s use of the Licensed Services or Company’s activities in connection with this Agreement. (b) Company shall, promptly after becoming aware of such, notify BNYM of any facts, circumstances or events regarding its or a Permitted User’s use of the Licensed System that are reasonably likely to constitute or result in a breach of this Section 2.12, and take all reasonable steps requested by BNYM to prevent, control, remediate or remedy any such facts, circumstances or events or any future occurrence of such facts, circumstances or events.

  • Disclosure and Use Restrictions Executive agrees and covenants: (i) to treat all Confidential Information as strictly confidential; (ii) not to directly or indirectly disclose, publish, communicate, or make available Confidential Information, or allow it to be disclosed, published, communicated, or made available, in whole or part, to any entity or person whatsoever (including other employees of the Company) not having a need to know and authority to know and use the Confidential Information in connection with the business of the Company and, in any event, not to anyone outside of the direct employ of the Company except as required in the performance of Executive’s authorized employment duties to the Company or with the prior consent of the Board acting on behalf of the Company in each instance (and then, such disclosure shall be made only within the limits and to the extent of such duties or consent); and (iii) not to access or use any Confidential Information, and not to copy any documents, records, files, media, or other resources containing any Confidential Information, or remove any such documents, records, files, media, or other resources from the premises or control of the Company, except as required in the performance of Executive’s authorized employment duties to the Company or with the prior consent of the Board acting on behalf of the Company in each instance (and then, such disclosure shall be made only within the limits and to the extent of such duties or consent). Nothing herein shall be construed to prevent disclosure of Confidential Information as may be required by applicable law or regulation, or pursuant to the valid order of a court of competent jurisdiction or an authorized government agency, provided that the disclosure does not exceed the extent of disclosure required by such law, regulation, or order. Executive shall promptly provide written notice of any such order to the Board.

  • Instructions Regarding Transfer Restrictions The Holder consents to the Company making a notation on its records and giving instructions to any transfer agent in order to implement the restrictions on transfer established in this Section 5.

  • Use Restriction (a) If a natural disaster, incident or any other emergency situation occurs or is likely to occur, SORACOM may restrict the use of the SORACOM Air Global Service by the Subscriber in order to give priority to communications whose content are necessary for the prevention of or relief from calamities, for the securing of transportation, communications or electric power supply, the maintenance of public order or any other public interest. (b) If SORACOM detects any significant and/or continuous signal or transmission using a communication procedure or application which occupies the communication band used by SORACOM, SORACOM may control the transmission rate and traffic of such signal or transmission by controlling the communication band allocated to such signal or transmission. (c) SORACOM may suspend or limit the use of the SORACOM Air Global Service by the Subscriber, if: (i) the Subscriber delays in performing or fails to perform any payment obligation or any other obligation under the Agreement; (ii) the Subscriber gives a false information to SORACOM; (iii) SORACOM deems that the Subscriber violates Section 13.1 below; (iv) the Subscriber falls under any of the items of Section 3.2; (v) the credit card account designated by the Subscriber is invalid, unavailable or cannot be used or recognized; or

  • License Restrictions Licensor reserves all rights not expressly granted to You. The Software is licensed for Your internal use only. Except as this Agreement expressly allows, You may not (1) copy (except for back-up purposes), modify, alter, create derivative works, reverse engineer, decompile, or disassemble the Software except and only to the extent expressly permitted by applicable law; (2) transfer, assign, pledge, rent, timeshare, host or lease the Software, or sublicense any of Your license grants or rights under this Agreement; in whole or in part, without prior written permission of Licensor; (3) remove any patent, trademark, copyright, trade secret or other proprietary notices or labels on the Software or its documentation; or (4) disclose the results of any performance, functional or other evaluation or benchmarking of the Software to any third party without the prior written permission of Licensor. Hosting Restrictions. In the event that You desire to have a third party manage, host (either remotely or virtually) or use the Software on Your behalf, You shall (1) first enter into a valid and binding agreement with such third party that contains terms and conditions to protect Licensor’s rights in the Software that are no less prohibitive and/or restrictive than those contained in this Agreement, including, without limitation, the Verification section below; (2) prohibit use by such third party except for the sole benefit of You; and (3) be solely responsible to Licensor for any and all breaches of the above terms and conditions by such third party.

  • LICENCE RESTRICTIONS You agree that you will: 17.1 not rent, lease, sub-license, loan, provide, or otherwise make available, the Apps or the Services in any form, in whole or in part to any person without prior written consent from us; 17.2 not copy the Apps, User Information or Services, except as part of the normal use of the Apps or where it is necessary for the purpose of back-up or operational security; 17.3 not translate, merge, adapt, vary, alter or modify, the whole or any part of the Apps, User Information or Services nor permit the Apps or the Services or any part of them to be combined with, or become incorporated in, any other programs, except as necessary to use the Apps and the Services on devices as permitted in these terms; 17.4 not disassemble, de-compile, reverse engineer or create derivative works based on the whole or any part of the Apps or the Services nor attempt to do any such things, except to the extent that (by virtue of sections 50B and 296A of the UK Copyright, Designs and Patents Act 1988) such actions cannot be prohibited because they are necessary to decompile the Apps to obtain the information necessary to create an independent program that can be operated with the Apps or with another program (Permitted Objective), and provided that the information obtained by you during such activities: (a) is not disclosed or communicated without our prior written consent to any third party to whom it is not necessary to disclose or communicate it in order to achieve the Permitted Objective; and (b) is not used to create any software that is substantially similar in its expression to the Apps; (c) is kept secure; and (d) is used only for the Permitted Objective; 17.5 comply with all applicable technology control or export laws and regulations that apply to the technology used or supported by the Apps or any Service; (a) not overload our servers by contributing or participation in a Denial of Service (DoS) attack.

  • Zone File Access Agreement Registry Operator will enter into an agreement with any Internet user, which will allow such user to access an Internet host server or servers designated by Registry Operator and download zone file data. The agreement will be standardized, facilitated and administered by a Centralized Zone Data Access Provider, which may be ICANN or an ICANN designee (the “CZDA Provider”). Registry Operator (optionally through the CZDA Provider) will provide access to zone file data per Section 2.1.3 of this Specification and do so using the file format described in Section 2.1.4 of this Specification. Notwithstanding the foregoing, (a) the CZDA Provider may reject the request for access of any user that does not satisfy the credentialing requirements in Section 2.1.2 below; (b) Registry Operator may reject the request for access of any user that does not provide correct or legitimate credentials under Section 2.1.2 below or where Registry Operator reasonably believes will violate the terms of Section 2.1.5. below; and, (c) Registry Operator may revoke access of any user if Registry Operator has evidence to support that the user has violated the terms of Section 2.1.5 below.

  • Lobbying Restrictions The Recipient will comply, as applicable, with provisions of the Hatch Act (5 U.S.C. §§ 1501- 1508 and 7324-7328) which limits the political activities of employees whose principal employment activities are funded in whole or in part with Federal funds. The Recipient will comply with provisions of 31 U.S.C § 1352. This provision generally prohibits the use of Federal funds for lobbying in the Executive or Legislative Branches of the Federal Government in connection with the award, and requires disclosure of the use of non-Federal funds for lobbying. The Recipient shall submit, at the time of application, a completed “Certification Regarding Lobbying” form, regardless of dollar value. If applicable, the Recipient receiving in excess of $100,000.00 in Federal funding shall submit a completed Standard Form (SF-LLL), “Disclosure of Lobbying Activities” for any persons engaged in lobbying activities, as discussed at 31 U.S. Code § 1352 – Limitation on use of appropriated funds to influence certain Federal contracting and financial transactions. The form concerns the use of non-Federal funds for lobbying within 30 days following the end of the calendar quarter in which there occurs any event that requires disclosure or that materially affects the accuracy of the information contained in any disclosure form previously filed. If the Recipient must submit the SF-LLL, including those received from sub-recipients, contractors, and subcontractors, to the Grants Officer.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!