Examples of what you must and mustn’t do when using Sample Clauses

Examples of what you must and mustn’t do when using our Channels and services are explained in the table below. You must use our Channels and services: You mustn’t use our Channels and services: ● Safely and responsibly. For example, you must ensure you only transfer money to a person you know and trust. You must ensure the information you provide to us is correct and complete. ● Yourself. For example, you mustn’t let someone else pretend to be you. ● For purposes we permit. For example, you mustn’t transfer money to pay for one of the activities set out in the “prohibited activities” box above. ● In your country of residency where our services are available. ● By following the Terms of this Agreement (including any instructions we may reasonably give you to help us offer our services). ● In breach of any of the Terms of this Agreement. For example, if you haven’t paid our Fees. ● To transfer money for a service or goods prohibited by law. ● To act fraudulently or provide us with false, inaccurate, or misleading information. ● To register more than once on our Channels (without receiving our prior written permission). ● To do something in a way we reasonably believe may damage our reputation, or which might harm our ability to provide our services to other customers. ● By doing everything required to meet legal and regulatory requirements, by responding to a direction of a regulator or law enforcement authority and by cooperating with any investigation that we (or any law enforcement or regulatory body) may carry out. ● By responding to us when we need you to. For example, you must give us information that we request (such as a copy of your ID document, proof of address, or your recipient’s identifying details) to prevent fraud and money laundering. ● By keeping your personal information, that we need to provide our services to you, up to date. ● By meeting the Channel and service requirements. For example, only use our services as an individual, not as a business, unless you inform us. ● To act in a way that threatens the security of our Channels or services (for example, by hacking or introducing viruses into our systems). ● To use anything that hides your activities on our Channels (like an anonymising proxy). ● To copy or monitor our Channels (for example, by using any robot, spider, or other automatic device or manual process) without having first received our permission in writing. ● To do anything that infringes any intellectual property rights we may have. For example, you shouldn’t copy any of our ...
AutoNDA by SimpleDocs

Related to Examples of what you must and mustn’t do when using

  • SCOPE OF SERVICES/CASE HANDLING A. Upon execution by GPM, attorneys are retained to provide legal services for the purpose of seeking damages and other relief in the Litigation. Client provides authorization to seek appointment as Lead Plaintiff in the class action, while the Attorneys will seek to be appointed Class Counsel. If this occurs, the Litigation will be prosecuted as a class action. B. If you obtain access to non-public information during the pendency of the Litigation, you must not engage in transactions in securities. C. Attorneys are authorized to prosecute the Litigation. The appointed Lead Plaintiffs will monitor, review and participate with counsel in the prosecution of the Litigation. The Attorneys shall consult with the appointed Lead Plaintiffs concerning all major substantive matters related to the Litigation, including, but not limited to, the complaint, dispositive motions and settlement. Because of potential differences of opinion between Clients concerning, among other things, strategy, goals and objectives of the Litigation, the Attorneys shall consult with the appointed Lead Plaintiffs as to the courses of action to pursue. The Client agrees to abide by the decisions of the appointed Lead Plaintiffs, which shall be final and binding on all Clients. D. GPM is given the authority to opt the Client out of any class action proceeding relating to the claims authorized herein and/or pursue the Client claim individually in a group action, if the Client is not appointed Lead Plaintiff and GPM is not appointed Class Counsel. E. The Attorneys shall provide sufficient resources, including attorney time and capital for payment of costs and expenses, to vigorously prosecute the Litigation. F. Any recovery from defendants that the Attorneys are responsible for will be divided among class members based on the recognized loss by each class member as calculated by a damage allocation plan which will be prepared by a financial expert or consultant, provided to the appointed Lead Plaintiffs, be subject to the Court's approval and will account for such factors as size of securities ownership, date of purchase, date of sale and continued holdings, if any. Under the rules governing class action litigation, while the Lead Plaintiffs recover according to the same formula as other class members, the Court may approve, upon application therefore, reimbursement of the Lead Plaintiffs’ reasonable costs and expenses directly related to the representation of the class. Examples are lost wages and travel expenses associated with testifying in the action.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes. 11.2 We may (i) compile statistical and other information related to the performance, operation and use of the Services, and (ii) use data from the Services in aggregated form for security and operations management, to create statistical analyses, and for research and development purposes (clauses i and ii are collectively referred to as “Service Analyses”). We may make Service Analyses publicly available; however, Service Analyses will not incorporate Your Content, Personal Data or Confidential Information in a form that could serve to identify You or any individual. We retain all intellectual property rights in Service Analyses. 11.3 We may provide You with the ability to obtain certain Oracle Software (as defined below) for use with the Services. If we provide Oracle Software to You and do not specify separate terms for such software, then such Oracle Software is provided as part of the Services and You have the non-exclusive, worldwide, limited right to use such Oracle Software, subject to the terms of this Agreement and Your order (except for separately licensed elements of the Oracle Software, which separately licensed elements are governed by the applicable separate terms), solely to facilitate Your use of the Services. You may allow Your Users to use the Oracle Software for this purpose, and You are responsible for their compliance with the license terms. Your right to use any Oracle Software will terminate upon the earlier of our notice (by web posting or otherwise) or the end of the Services associated with the Oracle Software. Notwithstanding the foregoing, if Oracle Software is licensed to You under separate terms, then Your use of such software is governed by the separate terms. Your right to use any part of the Oracle Software that is licensed under the separate terms is not restricted in any way by this Agreement.

  • Particular Methods of Procurement of Consultants’ Services 1. Quality- and Cost-based Selection. Except as otherwise provided in paragraph 2 below, consultants’ services shall be procured under contracts awarded on the basis of Quality and Cost-based Selection.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If ECI chooses to subtend a Verizon access Tandem, ECI’s NPA/NXX must be assigned by ECI to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 ECI shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from ECI’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office ECI utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow ECI’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.

  • Trunk Group Architecture and Traffic Routing 5.2.1 The Parties shall jointly establish Access Toll Connecting Trunks between CLEC and CBT by which they will jointly provide Tandem-transported Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic from and to CLEC's Customers. 5.2.2 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access and non-translated Toll Free traffic (e.g., 800/888) to allow CLEC’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier that is connected to the CBT access Tandem. 5.2.3 The Access Toll Connecting Trunks shall be one-way or two-way trunks, as mutually agreed, connecting an End Office Switch that CLEC utilizes to provide Telephone Exchange Service and Switched Exchange Access Service in the given LATA to an access Tandem Switch CBT utilizes to provide Exchange Access in the LATA.

  • Data Necessary to Perform Services The Trust or its agent shall furnish to USBFS the data necessary to perform the services described herein at such times and in such form as mutually agreed upon.

  • Enterprise Information Management Standards Performing Agency shall conform to HHS standards for data management as described by the policies of the HHS Chief Data and Analytics Officer. These include, but are not limited to, standards for documentation and communication of data models, metadata, and other data definition methods that are required by HHS for ongoing data governance, strategic portfolio analysis, interoperability planning, and valuation of HHS System data assets.

  • Switching System Hierarchy and Trunking Requirements For purposes of routing PNG traffic to Verizon, the subtending arrangements between Verizon Tandem Switches and Verizon End Office Switches shall be the same as the Tandem/End Office subtending arrangements Verizon maintains for the routing of its own or other carriers’ traffic (i.e., traffic will be routed to the appropriate Verizon Tandem subtended by the terminating End Office serving the Verizon Customer). For purposes of routing Verizon traffic to PNG, the subtending arrangements between PNG Tandem Switches and PNG End Office Switches shall be the same as the Tandem/End Office subtending arrangements that PNG maintains for the routing of its own or other carriers’ traffic.

  • Proposed Policies and Procedures Regarding New Online Content and Functionality By October 31, 2017, the School will submit to OCR for its review and approval proposed policies and procedures (“the Plan for New Content”) to ensure that all new, newly-added, or modified online content and functionality will be accessible to people with disabilities as measured by conformance to the Benchmarks for Measuring Accessibility set forth above, except where doing so would impose a fundamental alteration or undue burden. a) When fundamental alteration or undue burden defenses apply, the Plan for New Content will require the School to provide equally effective alternative access. The Plan for New Content will require the School, in providing equally effective alternate access, to take any actions that do not result in a fundamental alteration or undue financial and administrative burdens, but nevertheless ensure that, to the maximum extent possible, individuals with disabilities receive the same benefits or services as their nondisabled peers. To provide equally effective alternate access, alternates are not required to produce the identical result or level of achievement for persons with and without disabilities, but must afford persons with disabilities equal opportunity to obtain the same result, to gain the same benefit, or to reach the same level of achievement, in the most integrated setting appropriate to the person’s needs. b) The Plan for New Content must include sufficient quality assurance procedures, backed by adequate personnel and financial resources, for full implementation. This provision also applies to the School’s online content and functionality developed by, maintained by, or offered through a third-party vendor or by using open sources. c) Within thirty (30) days of receiving OCR’s approval of the Plan for New Content, the School will officially adopt, and fully implement the amended policies and procedures.

  • Information Technology Accessibility Standards Any information technology related products or services purchased, used or maintained through this Grant must be compatible with the principles and goals contained in the Electronic and Information Technology Accessibility Standards adopted by the Architectural and Transportation Barriers Compliance Board under Section 508 of the federal Rehabilitation Act of 1973 (29 U.S.C. §794d), as amended. The federal Electronic and Information Technology Accessibility Standards can be found at: xxxx://xxx.xxxxxx-xxxxx.xxx/508.htm.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!