We use cookies on our site to analyze traffic, enhance your experience, and provide you with tailored content.

For more information visit our privacy policy.

Harmful software Sample Clauses

Harmful software. 13.1 The Content must not contain or consist of, and you must not promote, distribute or execute by means of the Services, any viruses, worms, spyware, adware or other harmful or malicious software, programs, routines, applications or technologies. 13.2 The Content must not contain or consist of, and you must not promote, distribute or execute by means of the Services, any software, programs, routines, applications or technologies that will or may have a material negative effect upon the performance of a computer or introduce material security risks to a computer.
Harmful software. You must not use the Service to promote or distribute any viruses, Trojans, worms, root kits, spyware, adware or any other harmful software, programs, routines, applications or technologies. You must not use the Service to promote or distribute any software, programs, routines, applications or technologies that will or may negatively affect the performance of a computer or introduce significant security risks to a computer.
Harmful software. 13.1 The Content must not contain or consist of, and you must not promote, distribute or execute by means of the Services, any viruses, worms, spyware, adware or other harmful or malicious software, programs, routines, applications or technologies. 13.2 The Content must not contain or consist of, and you must not promote, distribute or execute by means of the Services, any software, programs, routines, applications or technologies that will or may have a material negative effect upon the performance of a computer or introduce material security risks to a computer. 1. Introduction to availability SLA 1.1 This Schedule 3 sets out the Provider's availability commitments relating to the Hosted Services. 1.2 In this Schedule 3, "uptime" means the percentage of time during a given period when the Hosted Services are available at the gateway between public internet and the network of the hosting services provider for the Hosted Services.
Harmful software. 8.1. The Content must not contain or consist of, and you must not promote or distribute by means of the Services, any viruses, worms, spyware, adware or other harmful or malicious software, programs, routines, applications or technologies. 8.2. The Content must not contain or consist of, and you must not promote or distribute by means of the Services, any software, programs, routines, applications or technologies that will or may have a material negative effect upon the performance of a computer or introduce material security risks to a computer. SCHEDULE 3 (AVAILABILITY SLA) 1. Introduction to availability SLA 1.1. Venuedirectory shall use reasonable endeavours to ensure that the uptime for the Hosted Services is at least 95% during each calendar month. 1.2. Venuedirectory shall be responsible for measuring uptime and shall do so using any reasonable methodology.
Harmful software. 7.1 The Content must not contain or consist of, and you must not promote, distribute or execute by means of the Services, any viruses, worms, spyware, adware or other harmful or malicious software, programs, routines, applications or technologies. 7.2 The Content must not contain or consist of, and you must not promote, distribute or execute by means of the Services, any software, programs, routines, applications or technologies that will or may have a material negative effect upon the performance of a computer or introduce material security risks to a computer. Schedule 3 (Availability SLA) 1. Introduction to availability SLA 1.1 This Schedule 3 sets out the Provider's availability commitments relating to the Hosted Services. 1.2 In this Schedule 3, "uptime" means the percentage of time during a given period when the Hosted Services are available at the gateway between public internet and the network of the hosting services provider for the Hosted Services.
Harmful software. 13.1 The Content must not contain or consist of, and you must not promote, distribute or execute by means of the Services, any viruses, worms, spyware, adware or other harmful or malicious software, programs, routines, applications or technologies. 13.2 The Content must not contain or consist of, and you must not promote, distribute or execute by means of the Services, any software, programs, routines, applications or technologies that will or may have a material negative effect upon the performance of a computer or introduce material security risks to a computer. 1. Categories of data subject 2. Types of Personal Data 3. Purposes of processing 4. Security measures for Personal Data 5. Sub-processors of Personal Data JAXEL - Full Service Development Company San Francisco, CA – USA
Harmful software. 13.1 The Content must not contain or consist of, and you must not promote or distribute by means of the Services, any viruses, worms, spyware, adware or other harmful or malicious software, programs, routines, applications or technologies. 13.2 The Content must not contain or consist of, and you must not promote or distribute by means of the Services, any software, programs, routines, applications or technologies that will or may have a material negative effect upon the performance of a computer or introduce material security risks to a computer. SCHEDULE 3 (DATA PROCESSING INFORMATION) 1. Categories of data subject ● Captive WiFi Clients ● Captive WiFi End Users ● Captive WiFi End Users
Harmful software. 13.1 The Content must not contain or consist of, and you must not promote or distribute by means of the Services, any viruses, worms, spyware, adware or other harmful or malicious software, programs, routines, applications or technologies. 13.2 The Content must not contain or consist of, and you must not promote or distribute by means of the Services, any software, programs, routines, applications or technologies that will or may have a material negative effect upon the performance of a computer or introduce material security risks to a computer. 1. Introduction to availability SLA 1.1 This Schedule 3 sets out the Provider's availability commitments relating to the Hosted Services. 1.2 In this Schedule 3, "uptime" means the percentage of time during a given period when the Hosted Services are available at the gateway between public internet and the network of the hosting services provider for the Hosted Services.
Harmful software. 7.1 The Content must not contain or consist of, and you must not promote, distribute or execute by means of the Services, any viruses, worms, spyware, adware or other harmful or malicious software, programs, routines, applications or technologies. 7.2 The Content must not contain or consist of, and you must not promote, distribute or execute by means of the Services, any software, programs, routines, applications or technologies that will or may have a material negative effect upon the performance of a computer or introduce material security risks to a computer. 1. Introduction to SLA 1.1 This Schedule 2 sets out: (a) ZSL's availability commitments relating to the Hosted Services; and (b) ZSL's service level commitments relating to the Support Services and any Training Services. 1.2 In this Schedule 2, "uptime" means the percentage of time during a given period when the Hosted Services are available at the gateway between public internet and the network of the hosting services provider for the Hosted Services.
Harmful software. 13.1. The Content must not contain or consist of, and you must not promote, distribute or execute by means of the Services, any viruses, worms, spyware, adware or other harmful or malicious software, programs, routines, applications or technologies. 13.2. The Content must not contain or consist of, and you must not promote, distribute or execute by means of the Services, any software, programs, routines, applications or technologies that will or may have a material negative effect upon the performance of a computer or introduce material security risks to a computer. 1. Categories of data subject Schedule 3 (Data processing information) 1.1. Names, Email Ids, Phone Numbers, Addresses. 2. Types of Personal Data 2.1. Names, Email Ids, Phone Numbers, Addresses. 3. Purposes of processing 3.1. To Create a register of users for the Customers’ day to day operations 4. Security measures for Personal Data 4.1. Personal Data Will not be visible to any person without permission. 4.2. Provider and their staff may gain access to it, after getting consent from the Customer.