Defamatory or Abusive Language Sample Clauses

Defamatory or Abusive Language. Using the Service to transmit, post, upload, or otherwise making available defamatory, harassing, abusive, or threatening material or language that encourages bodily harm, destruction of property or harasses another.
AutoNDA by SimpleDocs
Defamatory or Abusive Language. Using Lightwave’s network as a means to transmit or post defamatory, harassing, abusive messages or language which threatens bodily harm or destruction of property, or inappropriate language directed to minors.
Defamatory or Abusive Language. Using the Service to transmit, post, upload, or otherwise making available defamatory, harassing, abusive, or threatening material or language that encourages bodily harm, destruction of property or harasses another. Forging of Headers Forging or misrepresenting message headers, whether in whole or in part, to mask the originator of the message. Hacking Accessing illegally or without authorization computers, accounts, equipment or networks belonging to another party, or attempting to penetrate security measures of another system. This includes any activity that may be used as a precursor to an attempted system penetration, including, but not limited to, port scans, stealth scans, or other information gathering activity. Distribution of Internet Viruses, Trojan Horses, or Other Destructive Activities Distributing information regarding the creation of and sending Internet viruses, worms, Trojan Horses, pinging, flooding, mailbombing, or denial of service attacks. Also, activities that disrupt the use of or interfere with the ability of others to effectively use the service. Facilitating a Violation of this Agreement of Use Advertising, transmitting, or otherwise making available any software product, product, or service that is designed to violate this Agreement, which includes the facilitation of the means to spam, initiation of pinging, flooding, mailbombing, denial of service attacks, and piracy of software. Other Illegal Activities Using the Service in violation of applicable law and regulation, including, but not limited to, advertising, transmitting, or otherwise making available ponzi schemes, pyramid schemes, fraudulently charging credit cards, pirating software, or making fraudulent offers to sell or buy products, items, or services. Resale The sale, transfer, or rental of the Service to customers, clients or other third parties, either directly or as part of a service or product created for resale. **************************************************************** Notice of Violations Cole County Circuit Court requests that anyone who believes that there is a violation to contact the court immediately. Disclaimer You acknowledge
Defamatory or Abusive Language. Using M&COL’s network as a means to transmit or post defamatory, harassing, abusive, or threatening language.
Defamatory or Abusive Language. Using the Service to transmit, post, upload, or otherwise making available defamatory, harassing, abusive, or threatening material or language that encourages bodily harm, destruction of property or harasses another. Forging of Headers Forging or misrepresenting message headers, whether in whole or in part, to mask the originator of the message. Hacking Accessing illegally or without authorization computers, accounts, equipment or networks belonging to another party, or attempting to penetrate security measures of another system. This includes any activity that may be used as a precursor to an attempted system penetration, including, but not limited to, port scans, stealth scans, or other information gathering activity. Distribution of Internet Viruses, Trojan Horses, or Other Destructive Activities Distributing information regarding the creation of and sending Internet viruses, worms, Trojan Horses, pinging, flooding, mailbombing, or denial of service attacks. Also, activities that disrupt the use of or interfere with the ability of others to effectively use the Node or any connected network, system, service, or equipment. Facilitating a Violation of this Agreement of Use Advertising, transmitting, or otherwise making available any software product, product, or service that is designed to violate this Agreement, which includes the facilitation of the means to spam, initiation of pinging, flooding, mailbombing, denial of service attacks, and piracy of software. Export Control Violations The transfer of technology, software, or other materials in violation of applicable export laws and regulations, including but not limited to the U.S. Export Administration Regulations and Executive Orders.
Defamatory or Abusive Language. Using the Service to transmit, post, upload, or otherwise making available defamatory, harassing, abusive, or threatening material or language that encourages bodily harm, destruction of property or harasses another. Forging of Headers Forging or misrepresenting message headers, whether in whole or in part, to mask the originator of the message. Hacking Accessing illegally or without authorization computers, accounts, equipment or networks belonging to another party, or attempting to penetrate security measures of another system. This includes any activity that may be used as a precursor to an attempted system penetration, including, but not limited to, port scans, stealth scans, or other information gathering activity.
Defamatory or Abusive Language. Using the Service to transmit, post, upload, or otherwise making available defamatory, harassing, abusive, or threatening material or language that encourages bodily harm, destruction of property or harasses another.  Forging of Headers Forging or misrepresenting message headers, whether in whole or in part, to mask the originator of the message.  Circumventing Xxxxx’x firewall or content filter systems Using software or any other methods (for example VPN software, TOR. This list is not exhaustive.) of circumventing the firewall or content filter systems and continue to use the internet connection is strictly prohibited.  Hacking Accessing illegally or without authorisation computers, accounts, equipment or networks belonging to another party, or attempting to penetrate security measures of another system. This includes any activity that may be used as a precursor to an attempted system penetration, including, but not limited to, port scans, stealth scans, or other information gathering activity.  Distribution of Viruses, Trojan Horses, or Other Destructive Activities Distributing information regarding the creation of and sending Internet viruses, worms, Trojan Horses, pinging, flooding, mailbombing, or denial of service attacks. Also, activities that disrupt the use of or interfere with the ability of others to effectively use the Node or any connected network, system, service, or equipment.  Facilitating a Violation of this Agreement of Use Advertising, transmitting, or otherwise making available any software product, product, or service that is designed to violate this agreement, which includes the facilitation of the means to spam, initiation of pinging, flooding, mailbombing, denial of service attacks, and piracy of software.  Other Illegal Activities Using the Service in violation of applicable law and regulation, including, but not limited to, advertising, transmitting, or otherwise making available ponzi schemes, pyramid schemes, fraudulently charging credit cards, pirating software, or making fraudulent offers to sell or buy products, items, or services.  Resale The sale, transfer, or rental of the Service to customers, clients or other third parties, either directly or as part of a service or product created for resale.
AutoNDA by SimpleDocs
Defamatory or Abusive Language. Using the Service to transmit, post, upload, or otherwise make available defamatory, harassing, abusive, or threatening material or language that encourages bodily harm, destruction of property or harasses another is prohibited. Forging of Headers Forging or misrepresenting message headers, whether in whole or in part, to mask the originator of the message is prohibited. Hacking Accessing illegally or without authorization computers, accounts, equipment, or networks belonging to another party, or attempting to penetrate security measures of another system is prohibited. This includes any activity that may be used as a precursor to an attempted system penetration, including, but not limited to, port scans, stealth scans, or other information gathering activity. Distribution of Internet Viruses, Trojan Horses, or Other Destructive Activities Distributing information regarding the creation of and sending Internet viruses, worms, Trojan Horses, pinging, flooding, mail-bombing, or denial of service attacks or like matters is prohibited. Also, activities that disrupt the use of or interfere with the ability of others to effectively use the node or any connected network, system, service, or equipment. Facilitating a Violation of this Agreement of Use Advertising, transmitting, or otherwise making available any software product, product, or service that is designed to violate this Agreement, which includes the facilitation of the means to spam, initiation of pinging, flooding, mail-bombing, denial of service attacks, and piracy of software is prohibited. Other Illegal Activities Using the Service in violation of applicable local, state, and federal laws and regulations, including, but not limited to, advertising, transmitting, or otherwise making available Ponzi schemes, pyramid schemes, fraudulently charging credit cards, pirating software, or making fraudulent offers to sell or buy products, items, or services is prohibited. Resale The sale, transfer, or rental of the Service to customers, clients, or other third parties, either directly or as part of a service or product created for resale, is prohibited. Violation School Board Policy Using the Service in violation of any School Public Schools Policy with specific attention called to the following policies: IJNDB K-12 Computer/Network/Internet User Agreement, IJNDBA Staff Computer/Network/Internet User Agreement, IJNDD Social Networking Policy of the Swansea Public Schools, GBEA Staff Ethics/Conflict of Interes...
Defamatory or Abusive Language. Using TASTE MEDIA LTD’s network as a means to transmit or post defamatory, harassing, abusive, or threatening language. Forging of Headers: Forging or misrepresenting message headers, whether in whole or in part, to mask the originator of the message. Illegal or Unauthorised Access to Other Computers or Networks: Accessing illegally or without authorisation computers, accounts, or networks belonging to another party, or attempting to penetrate security measures of another individual’s system (often known as “hacking”). Also, any activity that might be used as a precursor to an attempted system penetration (i.e. port scan, stealth scan, or other information gathering activity). Distribution of Internet Viruses, Worms, Trojan Horses, or Other Destructive Activities: Distributing information regarding the creation of and sending Internet viruses, worms, Trojan horses, pinging, flooding, mail bombing, or denial of service attacks. Also, activities that disrupt the use of or interfere with the ability of others to effectively use the network or any connected network, system, service, or equipment. Facilitating a Violation of this AUP: Advertising, transmitting, or otherwise making available any software, program, product, or service that is designed to violate this AUP, which includes the facilitation of the means to Spam, initiation of pinging, flooding, mail bombing, denial of service attacks, and piracy of software. Forums, Social Media Web sites, Usenet Groups: TASTE MEDIA LTD reserves the right not to accept postings from third party web sites where we have actual knowledge that the content of the web site violates the AUP. Other Illegal Activities: Engaging in activities that are determined to be illegal, including advertising, transmitting, or otherwise making available ponzi schemes, pyramid schemes, fraudulently charging credit cards, and pirating software. Other Activities: Engaging in activities, whether lawful or unlawful, that TASTE MEDIA LTD determines to be harmful to its subscribers, operations, reputation, goodwill, or customer relations. As we have pointed out, the responsibility for avoiding the harmful activities just described rests primarily with the subscriber. TASTE MEDIA LTD will not, as an ordinary practice, monitor the communications of its subscribers to ensure that they comply with TASTE MEDIA LTD policy or applicable law. When TASTE MEDIA LTD becomes aware of harmful activities, however, it may take any action to stop the harmful a...

Related to Defamatory or Abusive Language

  • REMARKS i) The signature(s) of the grievant(s).

  • ADVERTISING OR PUBLICITY CONTRACTOR shall not use the name of County, its officers, directors, employees or agents, in advertising or publicity releases or otherwise without securing the prior written consent of COUNTY in each instance.

  • Unauthorized Use or Disclosure The Contractor shall notify COMMERCE within five (5) working days of any unauthorized use or disclosure of any confidential information, and shall take necessary steps to mitigate the harmful effects of such use or disclosure.

  • Derogatory Material No material derogatory to an employee's conduct, service, character or personality shall be placed in his/her personnel file unless the employee has acknowledged that he/she has had the opportunity to review such material by affixing his/her signature to the copy to be filed with the express understanding that such signature in no way indicates agreement with the contents thereof. The employee shall also have the right to submit a written answer to such material and his/her answer shall be reviewed by the Superintendent or his designee and attached to the file copy.

  • Unauthorized Disclosure The Executive agrees and understands that in the Executive’s position with the Company, the Executive has been and will be exposed to and has and will receive information relating to the confidential affairs of the Company Group, including, without limitation, technical information, intellectual property, business and marketing plans, strategies, customer information, software, other information concerning the products, promotions, development, financing, expansion plans, business policies and practices of the Company Group and other forms of information considered by the Company Group to be confidential or in the nature of trade secrets (including, without limitation, ideas, research and development, know-how, formulas, technical data, designs, drawings, specifications, customer and supplier lists, pricing and cost information and business and marketing plans and proposals) (collectively, the “Confidential Information”). Confidential Information shall not include information that is generally known to the public or within the relevant trade or industry other than due to the Executive’s violation of this Section 4.1 or disclosure by a third party who is known by the Executive to owe the Company an obligation of confidentiality with respect to such information. The Executive agrees that at all times during the Executive’s employment with the Company and thereafter, the Executive shall not disclose such Confidential Information, either directly or indirectly, to any individual, corporation, partnership, limited liability company, association, trust or other entity or organization, including a government or political subdivision or an agency or instrumentality thereof (each a “Person”) without the prior written consent of the Company and shall not use or attempt to use any such information in any manner other than in connection with his employment with the Company, unless required by law to disclose such information, in which case the Executive shall provide the Company with written notice of such requirement as far in advance of such anticipated disclosure as possible. This confidentiality covenant has no temporal, geographical or territorial restriction. Upon termination of the Executive’s employment with the Company, the Executive shall promptly supply to the Company all property, keys, notes, memoranda, writings, lists, files, reports, customer lists, correspondence, tapes, disks, cards, surveys, maps, logs, machines, technical data and any other tangible product or document which has been produced by, received by or otherwise submitted to the Executive during or prior to the Executive’s employment with the Company, and any copies thereof in his (or reasonably capable of being reduced to his) possession; provided that nothing in this Employment Agreement or elsewhere shall prevent the Executive from retaining and utilizing: documents relating to his personal benefits, entitlements and obligations; documents relating to his personal tax obligations; his desk calendar, rolodex, and the like; and such other records and documents as may reasonably be approved by the Company.

  • ADVERTISING RESULTS The prior written approval of the Commissioner is required in order for results of the Bid to be used by the Contractor as part of any commercial advertising. The Contractor shall also obtain the prior written approval of the Commissioner relative to the Bid or Contract for press or other media releases.

  • Publicity The Company, and the Buyer shall have the right to review a reasonable period of time before issuance of any press releases, SEC, OTCBB or FINRA filings, or any other public statements with respect to the transactions contemplated hereby; provided, however, that the Company shall be entitled, without the prior approval of the Buyer, to make any press release or SEC, OTCBB (or other applicable trading market) or FINRA filings with respect to such transactions as is required by applicable law and regulations (although the Buyer shall be consulted by the Company in connection with any such press release prior to its release and shall be provided with a copy thereof and be given an opportunity to comment thereon).

  • Proprietary or Confidential Information of City Contractor understands and agrees that, in the performance of the work or services under this Agreement or in contemplation thereof, Contractor may have access to private or confidential information which may be owned or controlled by City and that such information may contain proprietary or confidential details, the disclosure of which to third parties may be damaging to City. Contractor agrees that all information disclosed by City to Contractor shall be held in confidence and used only in performance of the Agreement. Contractor shall exercise the same standard of care to protect such information as a reasonably prudent contractor would use to protect its own proprietary data.

  • ADVERTISEMENT AND PROMOTION A. Concessionaire shall not advertise in any manner or form on or about the Concession Premises or any other part of the Area, except by means of such signs or forms of advertising as first shall be approved, in writing, by Department.

  • Data Disclosing an Invention If the Parties exchange Data disclosing an invention for which patent protection is being considered, and the furnishing Party identifies the Data as such when providing it to the Receiving Party, the Receiving Party shall withhold it from public disclosure for a reasonable time (one (1) year unless otherwise agreed or the Data is restricted for a longer period herein).

Time is Money Join Law Insider Premium to draft better contracts faster.