We use cookies on our site to analyze traffic, enhance your experience, and provide you with tailored content.
For more information visit our privacy policy.Unauthorised use We shall not be liable for any loss, liability or cost whatsoever arising from any unauthorised use of the Electronic Service. You shall on demand indemnify, protect and hold us harmless from and against all losses, liabilities, judgements, suits, actions, proceedings, claims, damages and costs resulting from or arising out of any act or omission by any person using an Electronic Service by using your designated passwords, whether or not you authorised such use.
Authorised Users 2.1 Subject to the Customer purchasing and using the Services in accordance with and subject to the terms and conditions of this Agreement, Boomerang hereby grants to the Customer a non-exclusive, non-transferable right to permit the Authorised Users to use the Services and the Documentation during the Subscription Term solely for the Customer's internal business operations. 2.2 The Customer undertakes that: 2.2.1 it will not allow or suffer any user subscription to be used by more than one individual Authorised User unless it has been reassigned in its entirety to another individual Authorised User, in which case the prior Authorised User shall no longer have any right to access or use the Services and/or Documentation; 2.2.2 each Authorised User shall keep a secure password for his use of the Services and Documentation, that such password shall be changed no less frequently than monthly and that each Authorised User shall keep his password confidential; 2.2.3 it shall maintain a written, up to date list of current Authorised Users and provide such list to Boomerang within 5 Business Days of Boomerang's written request at any time or times; 2.2.4 it agrees that it and all Authorised Users will follow and comply with all instructions, guidelines and/or provisions of the Documentation in relation to the use of the Services; 2.2.5 it agrees that Boomerang’s records regarding Customer’s use of the Services shall be accepted at all times as correct (save for manifest error) and that if there are any issues regarding the Services the Customer hereby consents to Boomerang accessing the Customer account through its admins to view and endeavour to resolve any such issue including permitting Boomerang to audit the use of the Services in order to gather information and establish the facts relating to such issues. Boomerang shall in any event have the right to audit Customer’s use of the Services provided that such audit may be conducted no more than once per quarter, at Boomerang's expense, and this right shall be exercised with reasonable prior notice, in such a manner as not to substantially interfere with the Customer's normal conduct of business; 2.2.6 if any of the audits referred to in clause 2.2.5 reveal that any password has been provided to any individual who is not an Authorised User, then without prejudice to Boomerang's other rights, the Customer shall promptly disable such passwords and Boomerang shall not issue any new passwords to any such individual; and 2.2.7 if any of the audits referred to in clause 2.2.5 reveal that the Customer has underpaid Fees to Boomerang, then without prejudice to Boomerang's other rights, the Customer shall pay to Boomerang an amount equal to such underpayment as calculated in accordance with the prices set out in the Customer’s UI within 10 Business Days of the date of the relevant audit. 2.3 The Customer shall not access, store, distribute or transmit any material, information, documentation, messages and/or viruses (including any destructive and/or disabling code) during the course of its use of the Services that: 2.3.1 is used in any way for, in relation to and/or in connection with emergency services (including 999 and 112 calls and/or where there could be a risk of personal injury or death) except to the extent that such use is expressly and specifically agreed by Boomerang in writing; 2.3.2 is unlawful, harmful, threatening, defamatory, obscene, infringing, harassing or racially or ethnically offensive; 2.3.3 facilitates illegal activity; 2.3.4 depicts sexually explicit images; 2.3.5 promotes unlawful violence; 2.3.6 is discriminatory based on race, gender, colour, religious belief, sexual orientation, disability; 2.3.7 is in breach of any agreement with any user, customer or client or any laws, regulations or other provisions that are applicable to the Customer, users, customers or clients in any territory; and/or 2.3.8 in a manner that is otherwise illegal or causes damage or injury to any person or property. Boomerang reserves the right, without liability (of whatever nature and/or howsoever arising) and/or prejudice of whatever nature to any of its other rights to the Customer, to disable the Customer's access to any material that breaches the provisions of this clause. 2.4 The Customer shall not except as may be allowed by any applicable law which is incapable of exclusion by agreement between the parties and except to the extent expressly permitted under this Agreement: 2.4.1 attempt to copy, modify, duplicate, create derivative works from, frame, mirror, republish, download, display, transmit, or distribute all or any portion of the Software and/or Documentation (as applicable) in any form or media or by any means; 2.4.2 attempt to reverse compile, disassemble, reverse engineer or otherwise reduce to human- perceivable form all or any part of the Software; 2.4.3 access all or any part of the Services and Documentation in order to build a product or service which competes (directly or indirectly) with the Services and/or the Documentation; 2.4.4 use the Services and/or Documentation to provide services to third parties; 2.4.5 subject to clause 21.1, license, sell, rent, lease, transfer, assign, distribute, display, disclose, or otherwise commercially exploit, or otherwise make the Services and/or Documentation available to any third party except the Authorised Users; and/or 2.4.6 attempt to obtain, or assist third parties in obtaining, access to the Services and/or Documentation, other than as provided under this clause 2; and 2.4.7 shall not use any Plug-Ins apart from expressly authorised by Boomerang and shall follow all of Boomerangs instructions and directions regarding use of such Plug-Ins including any restrictions set out in the Customer’s UI or in any communications from Boomerang to the Customer. 2.5 The Customer shall use all reasonable endeavours to prevent any unauthorised access to, or use of, the Services and/or the Documentation and, in the event of any such unauthorised access or use, promptly notify Boomerang. 2.6 The rights provided under this clause 2 are granted to the Customer only, and shall not be considered granted to any subsidiary or holding company of the Customer.
Unauthorized Use or Disclosure The Contractor shall notify COMMERCE within five (5) working days of any unauthorized use or disclosure of any confidential information, and shall take necessary steps to mitigate the harmful effects of such use or disclosure.
Unauthorised Use of Intellectual Property a) The Supplier/Service Provider agrees to notify Transnet in writing of any conflicting uses of, and applications of registrations of Patents, Designs and Trade Marks or any act of infringement, unfair competition or passing off involving the Intellectual Property of Transnet of which the Supplier/Service Provider acquires knowledge and Transnet shall have the right, as its own option, to proceed against any party infringing its Intellectual Property. b) It shall be within the sole and absolute discretion of Transnet to determine what steps shall be taken against the infringer and the Supplier/Service Provider shall co-operate fully with Transnet, at Transnet’s cost, in whatever measure including legal action to bring any infringement of illegal use to an end. c) The Supplier/Service Provider shall cooperate to provide Transnet promptly with all relevant ascertainable facts. d) If proceedings are commenced by Transnet alone, Transnet shall be responsible for all expenses but shall be entitled to all damages or other awards arising out of such proceedings. If proceedings are commenced by both Parties, both Parties will be responsible for the expenses and both Parties shall be entitled to damages or other awards arising out of proceedings.
No Unauthorized Use or Disclosure Executive agrees that he will not, at any time during or after Executive’s employment by Company, make any unauthorized disclosure of, and will prevent the removal from Company premises of, Confidential Information or Work Product of Company (or its affiliates), or make any use thereof, except in the carrying out of Executive’s responsibilities during the course of Executive’s employment with Company. Executive shall use commercially reasonable efforts to cause all persons or entities to whom any Confidential Information shall be disclosed by him hereunder to observe the terms and conditions set forth herein as though each such person or entity was bound hereby. Executive shall have no obligation hereunder to keep confidential any Confidential Information if and to the extent disclosure thereof is specifically required by law; provided, however, that in the event disclosure is required by applicable law, Executive shall provide Company with prompt notice of such requirement prior to making any such disclosure, so that Company may seek an appropriate protective order. At the request of Company at any time, Executive agrees to deliver to Company all Confidential Information that he may possess or control. Executive agrees that all Confidential Information of Company (whether now or hereafter existing) conceived, discovered or made by him during the period of Executive’s employment by Company exclusively belongs to Company (and not to Executive), and Executive will promptly disclose such Confidential Information to Company and perform all actions reasonably requested by Company to establish and confirm such exclusive ownership. Affiliates of Company shall be third party beneficiaries of Executive’s obligations under this Article 6. As a result of Executive’s employment by Company, Executive may also from time to time have access to, or knowledge of, Confidential Information or Work Product of third parties, such as customers, suppliers, partners, joint venturers, and the like, of Company and its affiliates. Executive also agrees to preserve and protect the confidentiality of such third party Confidential Information and Work Product to the same extent, and on the same basis, as Company’s Confidential Information and Work Product.
Unauthorised Use of Confidential Information The Supplier/Service Provider shall not authorise any party to act on or use in any way any Confidential Information belonging to Transnet whether or not such party is aware of such Confidential Information, and shall promptly notify Transnet of the information if it becomes aware of any party so acting, and shall provide Transnet the information with such assistance as Transnet reasonably requires, at Transnet’s cost and expense, to prevent such third party from so acting.
Malicious Software The Contractor or subcontractors that discover and isolate malicious software in connection with a reported cyber incident shall submit the malicious software in accordance with instructions provided by the Contracting Officer.
Unauthorized Use The Participating Institutions, or the Authorized Users shall not knowingly permit anyone other than the Authorized Users to access the Licensed Materials.
COUNTERFEIT WORK (a) The following definitions apply to this clause:
Unauthorized Work The contractor is not authorized at any time to commence task order performance prior to issuance of a signed TO or other written approval provided by the CO to begin work.