Network & Internet Clause Samples

The 'Network & Internet' clause defines the terms and conditions governing a party's access to and use of network and internet resources provided under an agreement. It typically outlines acceptable use policies, restrictions on unauthorized activities such as hacking or data breaches, and may specify security requirements or monitoring rights. This clause ensures that both parties understand their responsibilities regarding network usage, helping to prevent misuse, protect sensitive information, and maintain the integrity and security of the network infrastructure.
Network & Internet. (i) attempting to obtain unauthorized access to any network or account, including accessing data not intended for Customer, logging into a server or account without being expressly authorized to access or probing the security of other networks; (ii) attempts to interfere with the Service of others including users, hosts and networks, including "denial of service" attacks, "flooding" of networks, deliberate attempts to overload a Service and attempts to "crash" any host; (iii) reselling any Services or Products, without BEK's prior written consent; (iv) distribution of the Services or Products; (v) equipment, accessory, apparatus, circuit or devices that are harmful to the network, shall not be attached to or connected with Services or Products; (vi) circumventing copyright laws and regulation, including the unauthorized download of music, video, images, books, software or content and/or other copyright protected works; (vii) attempting to provide commercial or noncommercial distribution of content or information knowingly or unknowingly, directly or indirectly using peer to peer or other methods, under a residential service agreement with BEK; and (viii) excessive use of the Services, which is defined as exceeding 300% over the average of Service usage of BEK customers in the same class of service that you have purchased from BEK.
Network & Internet. (i) attempting to obtain unauthorized access to any network or account, including accessing data not intended for Customer, logging into a server or account without being expressly authorized to access or probing the security of other networks; (ii) attempts to interfere with the Service of others including users, hosts and networks, including "denial of service" attacks, "flooding" of networks, deliberate attempts to overload a Service and attempts to "crash" any host; (iii) reselling any Services or Products, without ▇▇▇'s prior written consent; (iv) distribution of the Services or Products; (v) equipment, accessory, apparatus, circuit or devices that are harmful to the network, shall not be attached to or connected with Services or Products; (vi) circumventing copyright laws and regulation, including the unauthorized download of music, video, images, books, software or content and/or other copyright protected works; (vii) attempting to provide commercial or noncommercial distribution of content or information knowingly or unknowingly, directly or indirectly using peer to peer or other methods, under a residential service agreement with BEK; (viii) excessive use of the Services, which is defined as exceeding 300% over the average of Service usage of BEK customers in the same class of service that you have purchased from BEK; (ix) transmitting unsolicited bulk or commercial messages commonly known as “spam”; (x) participating in the collection of very large numbers of email addresses, screen names, or other identifiers of others (without their prior consent), a practice sometimes known as spidering or harvesting, or participate in the use of software (including “spyware”) designed to facilitate this activity; (xi) use or run dedicated, stand-alone equipment or servers from the Premises that provide network content or any other services to anyone outside of your Premises local area network (“Premises LAN”), also commonly referred to as public services or servers. Examples of prohibited equipment and servers include, but are not limited to, email, web hosting, file sharing, and proxy services and servers; (xii) use or run programs, devices, or equipment from the Premises that provide network content or any other services to anyone outside of your Premises LAN; and (xiii) use or run programs, devices, or equipment that, by their nature, result in excessive use of the Services by the Premises. Examples of prohibited programs, devices, or equipment include, bu...

Related to Network & Internet

  • Network PHARMACY is a retail, mail order or specialty pharmacy that has a contract to accept our pharmacy allowance for prescription drugs and diabetic equipment or supplies covered under this plan. NETWORK PROVIDER is a provider that has entered into a contract with us or other Blue Cross and Blue Shield plans. For pediatric dental care services, network provider is a dentist that has entered into a contract with us or participates in the Dental Coast to Coast Network. For pediatric vision hardware services, a network provider is a provider that has entered into a contract with EyeMed, our vision care service manager.

  • Internet We will provide internet service to you for your noncommercial use. You acknowledge that the internet service is a shared service. We have no duty to you to edit, censor, review or take any responsibility for any information you or your guests may create, place on the internet, or view. You shall not use the internet we provide to engage in any criminal, illegal or unauthorized activity and any such use is a default of this Lease. Any violation of the Digital Millennium Copyright Act ("DMCA") is a breach of this Lease. You shall not attempt to degrade the performance of the internet service or hamper the ability of others to use the internet. You shall not use rogue devices, including wireless routers or modems, or take any measurers to interfere with our internet systems by configuring devices connected to our network so that they can communicate on our network using the internet protocol. Your use of the internet is at your sole risk and we are not responsible for your equipment, programs or software. Although we strive to provide superior internet service and sufficient bandwidth to our residents, we are not responsible for slow internet or other residents taking up significant bandwidth. WE RESERVE THE RIGHT TO INTERRUPT YOUR INTERNET SERVICE IN RESPONSE TO A BREACH OF THIS LEASE, INCLUDING BUT NOT LIMITED TO A FAILURE TO PAY RENT OR A VIOLATION OF THIS PARAGRAPH 6.

  • Network Interface Device 2.7.1 The NID is defined as any means of interconnection of the customer’s premises wiring to BellSouth’s distribution plant, such as a cross-connect device used for that purpose. The NID is a single line termination device or that portion of a multiple line termination device required to terminate a single line or circuit at the premises. The NID features two (2) independent ▇▇▇▇▇▇▇▇ or divisions that separate the service provider’s network from the customer’s premises wiring. Each chamber or division contains the appropriate connection points or posts to which the service provider and the customer each make their connections. The NID provides a protective ground connection and is capable of terminating cables such as twisted pair cable. 2.7.2 BellSouth shall permit NewPhone to connect NewPhone’s Loop facilities to the customer’s premises wiring through the BellSouth NID or at any other technically feasible point.

  • Internet Use 7.1. Customer is prohibited from posting or transmitting unlawful material on or via the Internet or the World Wide Web. 7.2. Leaseweb is entitled to actively block ports or IP addresses for the Network, in the event that such is – in Leaseweb’s reasonable view – necessary to preserve or protect the security and performance of the Network or the Internet or the World Wide Web. An overview of the blocked ports or IP addresses may be requested in writing by Customer from Leaseweb. 7.3. Without prejudice to the generality of Clause 7.2 of the Acceptable Use Policy, Leaseweb shall in any event actively block the following ports for its Network: (i) UDP/137 – Netbios; (ii) UDP/139 – Netbios; (iii) TCP/135 till 139 – Netbios;(iv) TCP/445 – Smb; and (v) Protocol UDP port 11211 - Memcache 7.4. If Leaseweb reasonably suspects that Customer is subject to a DoS attack, DDoS attack, DRDoS attack or another attack and (in Leaseweb’s reasonable opinion) such attack negatively affects the Infrastructure, Leaseweb shall be entitled to immediately block access to Customer's Infrastructure. In the event that Customer is subject to repetitive attacks, and Customer does not successfully take measures to prevent that future attacks may negatively affect Leaseweb’s Infrastructure, then Leaseweb shall be entitled to immediately terminate theSales Contract by sending a written notice to Customer.

  • Internet Services Transfer Agent shall make available to Company and Shareholders, through ▇▇▇.▇▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇ (“Web Site”), online access to certain Account and Shareholder information and certain transaction capabilities (“Internet Services”), subject to Transfer Agent’s security procedures and the terms and conditions set forth herein and on the Web Site. Transfer Agent provides Internet Services “as is,” on an “as available” basis, and hereby specifically disclaims any and all representations or warranties, express or implied, regarding such Internet Services, including any implied warranty of merchantability or fitness for a particular purpose and implied warranties arising from course of dealing or course of performance.