Access Restrictions Sample Clauses

Access Restrictions. 22.1 At your request we can bar certain call types made from the mobile phone. We cannot bar calls to emergency service numbers 112 and 000. 22.2 The Service can only be used for standard mobile voice calls, standard international calls, standard international SMS, standard SMS, standard MMS, call forward, voicemail and standard data services 22.3 The Service cannot be used for, but not limited to: (a) fax (including to make international fax calls) and paging services; or (b) call information services such as premium voice services (including, for example, calls to most 1901 or 1902 prefix numbers) unless specified. 22.4 We may provide access to some 190 services for calls, SMS or MMS. 22.5 Some Plans may restrict access to premium SMS services. 22.6 Access to some international countries is activated automatically on some Plans. If you want to bar access to international calls, or request access to international calls contact us by calling us on 0000 000 000 (normal charges apply) or 2534 (free call from an ALDImobile).
AutoNDA by SimpleDocs
Access Restrictions. 11.1 At your request we can bar certain calls made from the mobile phone. We cannot bar calls to emergency service numbers 112 and 000. 11.2 As outlined in paragraph 16.1(b), calls to 1900 numbers are not supported.
Access Restrictions. Contractor shall restrict the use of, and access to, administrative credentials for City accounts and Contractor’s systems to only those of Contractor’s employees and other agents whose access is essential for the purpose of providing the services of this Agreement. Contractor shall require these personnel to log on using an assigned user-name and password when administering City accounts or accessing City Data. These controls must enable Contractor to promptly revoke or change access in response to terminations or changes in job functions, as applicable. Contractor shall encrypt all passwords, passphrases, and PINs, using solutions that are certified against U.S. Federal Information and Processing Standard 140-2, Level 2, or equivalent industry standard, and verify that the encryption keys and keying material are not stored with any associated data. Contractor will implement any City request to revoke or modify user access within twenty-four (24) hours or the next business day of receipt of City’s request. Contractor will disable user accounts after at most ten (10) consecutive invalid authentication attempts.
Access Restrictions. 9.1 Except as expressly set out in these Terms of Service or as permitted by any local law, the User agrees not to: 9.1.1 copy the Apps, Service or Documentation except for the purposes of downloading the Apps or Documentation onto a Device and then subsequently copying those Apps or Documentation onto other Devices. For the avoidance of doubt this shall not allow the User to copy any of the code within the Apps or Service nor any of the text or concepts in the Documentation; 9.1.2 use the Apps, Service or Documentation to provide services to third parties; 9.1.3 rent, lease, sub-license, loan, distribute, disclose, or otherwise commercially exploit the Apps, Service or Documentation or otherwise make them available in whole or in part to any third party except for the purposes specified in clause 9.1.1; 9.1.4 make alterations to, or modifications of, the whole or any part of the Apps or Service or Documentation, or permit the Apps or Service or Documentation or any part of these to be combined with, or become incorporated in, any other programs; or 9.1.5 disassemble, decompile, reverse-engineer or create derivative works based on the whole or any part of the Apps or Service or attempt to do any such thing. 9.2 The User acknowledges that: 9.2.1 all uses of Content shall be for non-profit, non-commercial, educational or educational research purposes only; 9.2.2 commercial use of the Content is not permitted, unless the User has written permission from the owner of the Content; 9.2.3 unauthorised copying of the Content is not permitted, unless the User has written permission from the owner of the Content. 9.3 The User shall not represent or cause others to believe that the Content is the User's original works, or that the Service Provider endorses or is affiliated with any entity, product or service. The User expressly agrees to display the Service Provider's and relevant licensors' copyright and proprietary notice(s) with all of the Content, or any portion(s) thereof, that the User uses.
Access Restrictions. Personal data to be shared should only be provided to those who need to have access, on a need-to-know basis. 6.1 Legal basis Information security
Access Restrictions. The Processor shall ensure that access to Personal Data is limited to (a) employees who process Personal Data as part of their job description and (b) persons who cooperate with the Processor and may process Personal Data for the Processor as part of that cooperation, in accordance with the terms of this Processing Agreement and for the purpose of providing the Services under the Terms. If these persons are not subject to a legal obligation of confidentiality, the Processor shall ensure their contractual confidentiality.
Access Restrictions. You will not, either on your own or through any other person or third party: a) Copy, distribute, alter or modify, any part of the Services in any manner whatsoever without DigiLocker’s explicit authorization in this regard; (ii) access, acquire, copy, monitor or reproduce any portion of the Site or any Content thereof, or circumvent any restrictions imposed on the access of the Site to obtain or attempt to obtain any materials, documents or information through any means not purposely made available through the Site. DigiLocker reserves the right to bar any such activity. b) restrict or inhibit any other person from using the Site, (ii) impersonate any person or entity, whether actual or fictitious, (iii) collect, use, store, access or process any data, including but not limited to sensitive personal information of any User or any person without express and informed consent of the person c) use the Site or any Content for any purpose that is unlawful or prohibited by these Terms of Use, (ii) violates any law for the time being in force d) intentionally compromise the security of the Site or take any action intentionally, or neglect or omit to take, any action that compromises the security of the Site, e) attempt to gain unauthorized access to any portion or feature of the Site, or any other systems or networks connected to the Site or any of the services offered on or through the Site, by hacking, password “mining,” or any other illegitimate means. f) take any action that imposes an unreasonable or disproportionately excessive burden on the infrastructure of the Site, or any systems or networks connected to the Site, g) upload, modify, publish, transmit, update or share any data, code or information which (i) belongs to another person and to which you do not have any right to; (ii) is misleading in any way; (iii) infringes upon or violates any third party’s rights including but not limited to, intellectual property rights, rights of privacy or rights of publicity; (iv) contains any sexually explicit content, or content that promotes obscenity, racism, bias, hatred or physical harm of any kind against any group or individual (v) harasses or advocates harassment of another person; (vi) promotes illegal activities or conduct that is abusive, threatening, obscene, defamatory or libelous; (vii) harm minors in any way; (viii) tries to gain unauthorized access or exceeds the scope of authorized access to the Site or solicits passwords or personal identifying info...
AutoNDA by SimpleDocs
Access Restrictions. The Tenant shall itself, and shall procure that the Tenant’s Consultants and the Tenant’s Contractors and all other parties instructed by the Tenant comply with all reasonable rules restrictions and regulations in relation to access to the Demised Premises and which may reasonably be imposed by the Developer and have been notified in writing to the Tenant and/or which shall be promulgated by the Developer for ensuring the integrity of the Building Systems
Access Restrictions. (a) RCSI will develop RCSI Developed Applications in substantial compliance with the material and reasonable recommendations of First Data. RCSI shall install and maintain programs that will produce a transaction trace error log and store a detailed log of problems encountered in transactions with the First Data computing network (“Problem Log”). RCSI shall allow First Data access to the Problem Log at any time. RCSI shall promptly notify First Data if RCSI becomes aware that any RCSI Developed Application is causing any Operating Problems (as defined below) in the ODS System or the First Data computing network. In the event that an Operating Problem comes to the attention of RCSI or First Data, both Parties agree to consult and cooperate promptly in good faith to prevent the RCSI Developed Application from causing any degradation in the performance of the ODS System or the First Data computing network and to repair and modify the RCSI Developed Application that is causing the Operating Problems so that it will not cause any further Operating Problems. If it is necessary to discontinue use of the RCSI Developed Application to prevent further Operating Problems, RCSI shall discontinue operation of that RCSI Developed Application and First Data may deny access of that RCSI Developed Application to the ODS System. First Data shall cooperate with RCSI to repair and modify the RCSI Developed Application that is causing the problems so that it will not cause any further Operating Problems and it will be allowed to commence operation as soon as possible. (b) When used herein “Operating Problems” means any of the following:
Access Restrictions. 9.2.1. Access to ePHI is restricted. 9.2.1.1. Stored PHI is encrypted. 9.2.1.2. Database administrator and Key Vault administrator roles are segregated. 9.2.2. When access to ePHI is required and permitted, access is restricted to: 9.2.2.1. A small number of named technical and clinical support personnel. 9.2.2.2. Special security-hardened workstations as a jump to JIT VM, spanned in the production environment. 9.2.3. Access to the production environment is restricted. 9.2.3.1. Only dedicated Xxxxxxx IT and security professionals are permitted access. 9.2.3.2. Access is limited to Xxxxxxxinternal network and only from dedicated, hardened workstations. 9.2.3.3. Access credentials are managed by Privileged Access Management tool and are rotated on less than daily basis.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!