Malicious Intent Sample Clauses

Malicious Intent. You must not misuse the Service by knowingly introducing viruses, Trojans, worms, logic bombs or other material that is malicious or technologically harmful. You must not attempt to gain unauthorised access to the Service, the server on which the Service is stored or any server, computer or database connected to the Service. You must not attack the Service via a denial-of-service attack or a distributed denial-of service attack. By breaching this provision, you would commit a criminal offence under the Computer Misuse Act 1990. We will report any such breach to the relevant law enforcement authorities and we will co-operate with those authorities by disclosing your identity to them. In the event of such a breach, your right to use the Service will cease immediately.
AutoNDA by SimpleDocs
Malicious Intent. Customer agrees not to tamper in any way with the software or functionality of the Site. Without limiting the foregoing, Customer agrees not to put any material into the Site or the Services which contains any viruses, time bombs, Trojan horses, worms, cancel bots or other computer programming routines that may damage, interfere with, intercept or expropriate any system, data or information.
Malicious Intent. Client agrees not to knowingly tamper with the software or functionality of the
Malicious Intent. Client agrees not to knowingly tamper with the software or functionality of the CLOUD PROPELLER Infrastructure or the Services.
Malicious Intent. Authority agrees not to knowingly tamper with the Vendor Software or functionality of Vendor Network. Vendor agrees not to knowingly tamper with the software, databases, Authority Information or the functionality of the Authority System, the Website, Dropbox and/or Intranet.

Related to Malicious Intent

  • Malicious Software The Contractor or subcontractors that discover and isolate malicious software in connection with a reported cyber incident shall submit the malicious software in accordance with instructions provided by the Contracting Officer.

  • Malicious Code DST shall implement controls that are designed to detect the introduction or intrusion of malicious code on information systems handling or holding Fund Data and implement a process for removing said malicious code from information systems handling or holding Fund Data.

  • Malicious Use of Orphan Glue Records Registry Operator shall take action to remove orphan glue records (as defined at xxxx://xxx.xxxxx.xxx/en/committees/security/sac048.pdf) when provided with evidence in written form that such records are present in connection with malicious conduct.

  • COUNTERFEIT WORK (a) The following definitions apply to this clause:

  • Assault Any case of assault upon a bargaining unit member by a student shall be promptly reported to the Board or its designated representative. The Board shall render all reasonable assistance to the bargaining unit member in connection with handling of the incident by law enforcement and judicial authorities. To the extent permitted by law, a teacher assaulted by a student shall upon request be advised of any disciplinary action taken against the student.

  • Vandalism Or Malicious Mischief This peril does not include loss to property on the "residence premises", and any ensuing loss caused by any intentional and wrongful act com- mitted in the course of the vandalism or malicious mischief, if the dwelling has been vacant for more than 60 consecutive days immediately before the loss. A dwelling being constructed is not consid- ered vacant.

  • The Software The End User shall be granted to receive one copy of the Software and the Documentation and to load, install and properly use the Software for the maximum number of servers and users or workflows determined in the Form of Agreement and under the terms and conditions of this XXXX and the ELP. The Form of Agreement contains specific conditions valid for the agreement between the Licensor and the End User for the specific license. References to this XXXX within the present document include the reference to the Form of Agreement concluded with the End User. The Software Licenses defined, described in this document give the rights solely for the Eventus software and no other software or hardware or any other kind of components, unless otherwise stated.

  • Viruses The Fund agrees to use reasonable efforts to prevent the transmission through the Electronic Services of any software or file which contains any viruses, worms, harmful component or corrupted data and agrees not to use any device, software, or routine to interfere or attempt to interfere with the proper working of the Electronic Services.

  • Behaviour No obscene or insulting language or disorderly behaviour shall be permitted. This includes any form of entertainment that may be considered lewd or inappropriate for a public place or that may offend or cause embarrassment to others.

  • Negligent or Willful Damage Un- designated timber meeting Utilization Standards and un- necessarily damaged or negligently or willfully cut by Pur- chaser, if included by Contracting Officer.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!