FAIR ACCESS POLICY (“FAP Sample Clauses

FAIR ACCESS POLICY (“FAP. The Fair Access Policy is set by the Service Provider and they have the right to vary the FAP at any time. Therefore we will always make the current policies available on our website. If you exceed any data usage thresholds set-out in the prevailing FAP for your Package or utilise applications or traffic that we or the Service Provider deems it necessary to manage more actively (sometimes referred to as ‘Congestion Management”), this will result in some or all of your data usage being restricted. This will mean that you will see maximum achievable speeds slowed, significantly at peak times, beyond any normal speed fluctuations that will be encountered on the network by way of overall customer traffic. If at any point in your contract with the broadband shack you use more than your monthly data allowance and you do not add a “bolt on” to cover this amount used we will automatically add a bolt on to your next invoice to cover this amount. If in the event there is not a “bolt on “ large enough to cover your months usage then you will be billed for this use at £0.06 xxxxx per MB used.
AutoNDA by SimpleDocs
FAIR ACCESS POLICY (“FAP. (a) The Fair Access Policy (FAP) has been defined to enable a high quality internet access service via satellite with a consistent customer experience at an acceptable price. The implementation of the FAP determines the management of your Satellite Broadband Services to prevent any unfair and unacceptable use of the network. You are subject to a FAP during the lifetime of this Agreement.

Related to FAIR ACCESS POLICY (“FAP

  • Acceptable Use Policy Agreement I understand that I must use school IT systems in a responsible way, to ensure that there is no risk to my safety or to the safety and security of the IT systems and other users. For my own personal safety: • I understand that the school will monitor my use of the IT systems, email and other digital communications. • I will treat my username and password like my toothbrush – I will not share it, nor will I try to use any other person’s username and password. • I will be aware of “stranger danger”, when I am communicating on-line. • I will not disclose or share personal information about myself or others when on-line. • If I arrange to meet people off-line that I have communicated with on-line, I will do so in a public place and take an adult with me. • I will immediately report any unpleasant or inappropriate material or messages or anything that makes me feel uncomfortable when I see it on-line. I understand that everyone has equal rights to use technology as a resource and: • I understand that the school IT systems are primarily intended for educational use and that I will not use the systems for personal or recreational use unless I have permission to do so. • I will not try (unless I have permission) to make large downloads or uploads that might take up internet capacity and prevent other users from being able to carry out their work. • I will not use the school IT systems for on-line gaming, on-line gambling, internet shopping, file sharing, or video broadcasting (e.g. YouTube), unless I have permission of a member of staff to do so. I will act as I expect others to act toward me: • I will respect others’ work and property and will not access, copy, remove or otherwise alter any other user’s files, without the owner’s knowledge and permission. • I will be polite and responsible when I communicate with others, I will not use strong, aggressive or inappropriate language and I appreciate that others may have different opinions. • I will not take or distribute images of anyone without their permission. I recognise that the school has a responsibility to maintain the security and integrity of the technology it offers me and to ensure the smooth running of the school: • I will only use my personal hand held / external devices (mobile phones / USB devices etc) in school if I have permission. I understand that, if I do use my own devices in school, I will follow the rules set out in this agreement, in the same way as if I was using school equipment. • I understand the risks and will not try to upload, download or access any materials which are illegal or inappropriate or may cause harm or distress to others, nor will I try to use any programmes or software that might allow me to bypass the filtering / security systems in place to prevent access to such materials.

  • Changes to Privacy Policy Agreement The Tintstitute reserves the right to update and/or change the terms of our privacy policy, and as such we will post those change to our website homepage at xxxx://xxx.xxxxxxxxxxxxxx.xxx, so that our users and/or visitors are always aware of the type of information we collect, how it will be used, and under what circumstances, if any, we may disclose such information. If at any point in time The Tintstitute decides to make use of any personally identifiable information on file, in a manner vastly different from that which was stated when this information was initially collected, the user or users shall be promptly notified by email. Users at that time shall have the option as to whether or not to permit the use of their information in this separate manner.

  • Zone File Access Agreement Registry Operator will enter into an agreement with any Internet user, which will allow such user to access an Internet host server or servers designated by Registry Operator and download zone file data. The agreement will be standardized, facilitated and administered by a Centralized Zone Data Access Provider, which may be ICANN or an ICANN designee (the “CZDA Provider”). Registry Operator (optionally through the CZDA Provider) will provide access to zone file data per Section 2.1.3 of this Specification and do so using the file format described in Section 2.1.4 of this Specification. Notwithstanding the foregoing, (a) the CZDA Provider may reject the request for access of any user that does not satisfy the credentialing requirements in Section 2.1.2 below; (b) Registry Operator may reject the request for access of any user that does not provide correct or legitimate credentials under Section 2.1.2 below or where Registry Operator reasonably believes will violate the terms of Section 2.1.5. below; and, (c) Registry Operator may revoke access of any user if Registry Operator has evidence to support that the user has violated the terms of Section 2.1.5 below.

  • WILEY OPEN ACCESS TERMS AND CONDITIONS Wiley Publishes Open Access Articles in fully Open Access Journals and in Subscription journals offering Online Open. Although most of the fully Open Access journals publish open access articles under the terms of the Creative Commons Attribution (CC BY) License only, the subscription journals and a few of the Open Access Journals offer a choice of Creative Commons Licenses. The license type is clearly identified on the article.

  • Elsevier Open Access Terms and Conditions You can publish open access with Elsevier in hundreds of open access journals or in nearly 2000 established subscription journals that support open access publishing. Permitted third party re-use of these open access articles is defined by the author's choice of Creative Commons user license. See our open access license policy for more information. Terms & Conditions applicable to all Open Access articles published with Elsevier: Any reuse of the article must not represent the author as endorsing the adaptation of the article nor should the article be modified in such a way as to damage the author's honour or reputation. If any changes have been made, such changes must be clearly indicated. The author(s) must be appropriately credited and we ask that you include the end user license and a DOI link to the formal publication on ScienceDirect. If any part of the material to be used (for example, figures) has appeared in our publication with credit or acknowledgement to another source it is the responsibility of the user to ensure their reuse complies with the terms and conditions determined by the rights holder. Additional Terms & Conditions applicable to each Creative Commons user license:

  • DATA/ACCESS/CONFIDENTIALITY/ PRESERVATION 10.1 As used in this Agreement, the word “data” shall mean all information and things developed or obtained during the performance of, or acquired or developed by reason of, this Agreement, including, but not limited to, all studies, reports, files, formulae, surveys, maps, charts, sound recordings, video recordings, pictorial reproductions, drawings, analyses, graphic representations, computer programs, computer printouts, notes, letters, memoranda, papers, and documents, all whether finished or unfinished.

  • Terms of Coverage The plan takes effect upon check-in on the booked arrival date to an iTrip unit. All coverage shall terminate upon normal check-out time of the iTrip unit or the departure of the Covered Guest, whichever occurs first.

  • Union Access to Premises Representatives of the Union shall have access to the Company’s premises to carry on inspections or investigations pertaining to the terms and conditions of this Agreement, upon reasonable advance notice to the Company. Such access shall be carried on at reasonable hours and in such a manner so as not to interfere with the normal operations of the Company. The Union will advise the Company of its designated representatives who wish to gain access to the premises and the Union agrees to comply with all reasonable Company security precautions as may be in force from time to time.

  • Union Access 54. The Union shall have reasonable access to all work locations to verify that the terms and conditions of this Agreement are being carried out and for the purpose of conferring with employees provided that access shall be subject to such rules and regulations immediately below, as well as to such rules and regulations as may be agreed to by the department and the Union.

  • Maintaining Confidentiality of Access Passwords Where access to the Licensed Materials is to be controlled by use of passwords, Licensee shall secure that Participating Institutions will use reasonable efforts to inform Authorized Users that they should not divulge their numbers and passwords to any third party. Licensee shall secure that Participating Institutions will also use reasonable efforts to maintain the confidentiality of any institutional passwords provided by Licensor.

Time is Money Join Law Insider Premium to draft better contracts faster.