Certain Use Guidelines/Customer Prohibitions Sample Clauses

Certain Use Guidelines/Customer Prohibitions. The Customer shall not and shall not permit or suffer the Registered Users to do any of the following acts (individually, a "Prohibited Act", and collectively, "Prohibited Acts"): (i) wilfully tamper with the security of the Systems or tamper with other unique URLs, (ii) access data on the System not intended for the Customer, (iii) log into a server or account on the System that the Customer is not authorized to access, (iv) attempt to probe, scan or test the vulnerability of any Systems or to breach the security or authentication measures without proper authorization; (v) wilfully render any part of the Systems unusable.
AutoNDA by SimpleDocs

Related to Certain Use Guidelines/Customer Prohibitions

  • Use Guidelines 3.3.1. The JAGGAER Applications are provided to Client for use only as expressly set forth in the Agreement, and Client will not use the JAGGAER Applications in whole or in part for any other use or purpose. In particular, Client will not, and will not allow any third party to: (i) decompile, disassemble, reverse engineer or attempt to reconstruct, identify or discover any source code, underlying ideas, underlying user interface techniques or algorithms of the JAGGAER Applications by any means, or disclose any of the foregoing; (ii) except as expressly set forth in the Agreement, provide, rent, lease, lend, or use the JAGGAER Applications for timesharing, subscription, or service bureau purposes; (iii) sublicense, transfer or assign the JAGGAER Applications or any of the rights or licenses granted under the Agreement; or remove or obscure any trademark, product identification, proprietary marking, copyright or other notices provided with the JAGGAER Applications or related documentation.

  • Summary of Policy and Prohibitions on Procurement Lobbying Pursuant to State Finance Law §139-j and §139-k, this Contract includes and imposes certain restrictions on communications between OGS and a Vendor during the procurement process. A Vendor is restricted from making contacts from the earliest notice of intent to solicit offers/bids through final award and approval of the Procurement Contract by OGS and, if applicable, the Office of the State Comptroller (“restricted period”) to other than designated staff unless it is a contact that is included among certain statutory exceptions set forth in State Finance Law §139-j(3)(a). Designated staff, as of the date hereof, is identified in Appendix G, Contractor and OGS Information, or as otherwise indicated by OGS. OGS employees are also required to obtain certain information when contacted during the restricted period and make a determination of the responsibility of the Vendor pursuant to these two statutes. Certain findings of non-responsibility can result in rejection for contract award and in the event of two findings within a four-year period; the Vendor is debarred from obtaining governmental Procurement Contracts. Further information about these requirements can be found on the OGS website: xxxx://xxx.xxx.xx.xxx/aboutOgs/regulations/defaultSFL_139j-k.asp.

  • Anti-­‐Abuse Policy i. Registry Operator’s Anti-­‐Abuse Policy will be required under the Registry Registrar Agreement and posted on the Registry Operator’s web site.

  • Changes to Privacy Policy Agreement The Tintstitute reserves the right to update and/or change the terms of our privacy policy, and as such we will post those change to our website homepage at xxxx://xxx.xxxxxxxxxxxxxx.xxx, so that our users and/or visitors are always aware of the type of information we collect, how it will be used, and under what circumstances, if any, we may disclose such information. If at any point in time The Tintstitute decides to make use of any personally identifiable information on file, in a manner vastly different from that which was stated when this information was initially collected, the user or users shall be promptly notified by email. Users at that time shall have the option as to whether or not to permit the use of their information in this separate manner.

  • Violence Policies and Procedures The Employer agrees to have in place explicit policies and procedures to deal with violence. The policy will address the prevention of violence, the management of violent situations, provision of legal counsel and support to employees who have faced violence. The policies and procedures shall be part of the employee's health and safety policy and written copies shall be provided to each employee. Prior to implementing any changes to these policies, the employer agrees to consult with the Association.

  • Your Guide to Selecting a Primary Care Provider (PCP) and Other Providers Quality healthcare begins with a partnership between you and your primary care provider (PCP). When you need care, call your PCP, who will help coordinate your care. Your healthcare coverage under this plan is provided or arranged through our network of PCPs, specialists, and other providers. You’re encouraged to: • become involved in your healthcare by asking providers about all treatment plans available and their costs; • take advantage of the preventive health services offered under this plan to help you stay healthy and find problems before they become serious. Each member is required to provide the name of his or her PCP. However, if the name of a PCP is not provided with the application, your enrollment will not be delayed and your coverage will not be cancelled. How to Find a PCP or Other Providers Finding a PCP in our network is easy. To select a provider, or to check that a provider is in our network, please use the “Find a Doctor” tool on our website or call Customer Service. Please note: We are not obligated to provide you with a provider. We are not liable for anything your provider does or does not do. We are not a healthcare provider and do not practice medicine, dentistry, furnish health care, or make medical judgments.

  • Rights Protection Mechanisms and Abuse Mitigation ­‐ Registry Operator commits to implementing and performing the following protections for the TLD:

  • Usage Guidelines A) Any public use of the Sprint Marks ("Use") must be follow Sprint's guidelines. Use of the Marks includes the following: . Broadcast (TV and Radio) . Print . Direct Mail . New Media (on-line, CD ROM, Internet, etc.) . Collateral Materials . Endorsements/Sponsorships . Use of Celebrities and/or Public Figures . Retail Packaging/Use with Third Parties

  • Compliance with Consensus Policies and Temporary Policies Registry Operator shall comply with and implement all Consensus Policies and Temporary Policies found at <xxxx://xxx.xxxxx.xxx/general/consensus-­‐policies.htm>, as of the Effective Date and as may in the future be developed and adopted in accordance with the ICANN Bylaws, provided such future Consensus Polices and Temporary Policies are adopted in accordance with the procedure and relate to those topics and subject to those limitations set forth in Specification 1 attached hereto (“Specification 1”).

  • Provisions for Covered Entity to Inform Business Associate of Privacy Practices and Restrictions (a) Covered Entity shall notify Business Associate of any limitation(s) in the notice of privacy practices of Covered Entity under 45 CFR 164.520, to the extent that such limitation may affect Business Associate’s use or disclosure of protected health information.

Time is Money Join Law Insider Premium to draft better contracts faster.