Link Manipulation Sample Clauses

Link Manipulation. Qualifying Links may not be manipulated in any way, including (a) redirecting links to hide or manipulate their original source; (b) Direct- linking, e.g. using your Qualifying Links as the destination URL in any paid advertisement.
AutoNDA by SimpleDocs

Related to Link Manipulation

  • Stabilization Neither the Company nor, to its knowledge, any of its employees, directors or shareholders (without the consent of the Representative) has taken or shall take, directly or indirectly, any action designed to or that has constituted or that might reasonably be expected to cause or result in, under Regulation M of the Exchange Act, or otherwise, stabilization or manipulation of the price of any security of the Company to facilitate the sale or resale of the Public Securities.

  • Malware Seller shall (consistent with the following sentence) ensure that no malware or similar items are coded or introduced into any aspect of the Facility, Interconnection Facilities, the Company Systems interfacing with the Facility and Interconnection Facilities, and any of Seller's critical control systems or processes used by Seller to provide energy, including the information, data and other materials delivered by or on behalf of Seller to Company, (collectively, the "Environment"). Seller will continue to review, analyze and implement improvements to and upgrades of its Malware prevention and correction programs and processes that are commercially reasonable and consistent with the then current technology industry's standards and, in any case, not less robust than the programs and processes implemented by Seller with respect to its own information systems. If Malware is found to have been introduced into the Environment, Seller will promptly notify Company and Seller shall take immediate action to eliminate and remediate the effects of the Malware, at Seller's expense. Seller shall not modify or otherwise take corrective action with respect to the Company Systems except at Company's request. Seller will promptly report to Company the nature and status of all Malware elimination and remediation efforts.

  • Spam 3.1 Also known as junk mail or Unsolicited Commercial Email (UCE), the term "spam" refers to submitting a commercial email or SMS message to a large number of recipients who have not requested or opted to receive it and have no reasonable expectation to receiving email or SMS from the sender.

  • Blacklisting The Contractor must not commit any breach of the Employment Relations Xxx 0000 (Blacklists) Regulations 2010 or section 137 of the Trade Union and Labour Relations (Consolidation) Xxx 0000, or commit any breach of the Data Protection Laws by unlawfully processing personal data in connection with any blacklisting activities. Breach of this clause is a material default which shall entitle the Authority to terminate the Framework Agreement.

  • Virus detection You will be responsible for the installation and proper use of any virus detection/scanning program we require from time to time.

  • Encryption The Fund acknowledges and agrees that encryption may not be available for every communication through the System, or for all data. The Fund agrees that Custodian may deactivate any encryption features at any time, without notice or liability to the Fund, for the purpose of maintaining, repairing or troubleshooting the System or the Software.

  • Anti-Piracy In order to prevent theft, piracy, unauthorized retransmissions, redistribution or exhibition, copying or duplication of any Channel, in whole or in part, (hereinafter collectively referred to as “Piracy”), the IPTV Operator shall, prior to the commencement of the Term of the agreement and at all times during such Term, employ, maintain, and enforce fully effective conditional access system delivery and content protection and security systems, and related physical security and operational procedures (hereinafter collectively referred to as the “Security Systems”) as may be specified (security specifications), in a non-discriminatory manner in writing, from time to time, by ZEEL. The IPTV Operator shall comply with the Anti-Piracy Requirements set out in Clause VI and VII in ANNEXURE XII and also provide full and complete information for conducting Technical Audit by the auditors, empaneled by the Authority for conducting such audit, by furnishing details outlined in Clause I, II, III, IV and V of ANNEXURE XII attached herewith. The IPTV Operator shall deploy finger printing mechanisms to detect any piracy, violation of copyright and unauthorized viewing of the Channels, distributed / transmitted through its Platform at least every 10 minutes on 24 x 7 x 365(6) basis. The IPTV Operator shall not authorize, cause or suffer any portion of any of the Zee Group Channels to be recorded, duplicated, cablecast, exhibited or otherwise used for any purpose other than for distribution by the IPTV Operator at the time these Channels are made available. If the IPTV Operator becomes aware that any unauthorized third party is recording, duplicating, cablecasting, exhibiting or otherwise using any or all of the Zee Group Channels for any other purpose, the IPTV Operator shall within ten minutes of so becoming aware of such recording, duplicating, cablecasting, exhibiting or otherwise using any or all of the Zee Group Channels for any other purpose, notify ZEEL and the IPTV Operator shall also switch off the concerned Set Top Box to prevent such unauthorized use. However, use of a Set Top Box with Personal Video Recorder/ Digital Video Recorder facility which has been supplied by the IPTV Operator shall not be treated as unauthorized use, as long as such Set Top Box is used in accordance with the terms and conditions of the subscription agreement between the IPTV Operator and the subscriber. The IPTV Operator shall comply with the specifications for Set Top Box, Conditional Access System and Subscriber Management System as set out in ANNEXURE X attached herewith. If so instructed by Information (as defined below) by ZEEL, the IPTV Operator shall shut off or de-authorize the transmission to any unauthorized subscriber/ subscriber indulging in piracy, within ten minutes from the time it receives such instruction from ZEEL. Any communication under this Clause shall be considered as valid Information only if (i) the information is sent through e-mail in a format as mutually agreed by the parties and (ii) the information is sent by a person(s) who is designated to send such information. However, the “information” may even be provided by ZEEL representatives through other means of communications such as telephonic message, fax etc. and the said “information” shall later be confirmed by ZEEL through e-mail and the IPTV Operator shall be under obligation to act upon such information.

  • Behaviour No obscene or insulting language or disorderly behaviour shall be permitted. This includes any form of entertainment that may be considered lewd or inappropriate for a public place or that may offend or cause embarrassment to others.

  • Weapons (1) If the Contractor requests that its personnel performing in the USCENTCOM AOR be authorized to carry weapons for individual self-defense, the request shall be made through the Contracting Officer to the Combatant Commander, in accordance with DoD Instruction 3020.41. The Combatant Commander will determine whether to authorize in-theater contractor personnel to carry weapons and what weapons and ammunition will be allowed.

  • Drug-Free Workplace Contractor represents and warrants that it shall comply with the applicable provisions of the Drug-Free Work Place Act of 1988 (41 U.S.C. §701 et seq.) and maintain a drug-free work environment.

Time is Money Join Law Insider Premium to draft better contracts faster.