Network Usage Sample Clauses

Network Usage. Licensee understands and agrees that HGST may use Licensee’s internal network and Internet connection for the limited purpose of transmitting license-related data at the time of installation, registration, use or update of Software to a HGST-operated license server. At such time, HGST may validate the license-related data in order to protect HGST against unlicensed or illegal use of the Software. HGST may, at its option, only permit activation of the Software upon exchange of license related data between Licensee’s computer and the HGST license server. Some Software may have license verification mechanisms that do not require the use of Licensee’s internal network and Internet connection, and HGST shall not use Licensee’s network or Internet connection for such Software.
AutoNDA by SimpleDocs
Network Usage. Xxxxx understands and agrees that Cellebrite may use Buyer’s internal network and Internet connection for the limited purpose of transmitting license-related data at the time of installation, registration, use or update of Software to a Cellebrite-operated license server. At such time, Cellebrite may validate the license-related data in order to protect Cellebrite against unlicensed or illegal use of any Software. At its option, Cellebrite may only permit activation of Software upon exchange of license related data between Buyer’s computer and the Cellebrite license server.
Network Usage. Use of district network must be in support of education and research, and consistent with the mission of the district. The Chehalis School District reserves the right to prioritize use and access to district network.
Network Usage. 1.1 You have been provided with an individual username and password; these must not be disclosed to any other person and you must not log on to the network using any other username or password. 1.2 You must log off when leaving a computer; you are responsible for all usage of the network under your username. 1.3 You are permitted to use the network only for educational purposes as required by Thomastown West PS 1.4 You must not access or interfere with other users’ files or settings or interfere with, move or delete shared files. 1.5 You must not bully, harass, threaten or intimidate others; all communication should be fair, respectful and courteous.
Network Usage. The purpose of the District’s Computer Network is to assist in preparing students for success in life and provide them with electronic access to a wide range of information. The following conditions are imposed on the use of the Computer Network and violation of these conditions is cause for revoking the privilege of access to the network or further disciplinary action. These conditions apply whether the user accesses the network during school time and on school property or at a remote location.
Network Usage. CPS Network access and bandwidth is provided to schools for academic and operational services. CPS reserves the right to prioritize network bandwidth and limit certain Network activities that are negatively impacting academic and operational services. Use of proxy servers or virtual private networks to bypass Network security systems (firewalls, etc.) is strictly prohibited.
Network Usage. Secure Wi-Fi Connections: When connecting to any non-University Wi-Fi networks, staff members should prioritize secure networks and avoid using public, unsecured Wi-Fi whenever possible. Avoid Public Computers: Staff should refrain from using public computers or internet cafes to access university resources, as these may pose security risks. Approved Devices: Staff shall only have access to DSU resources using those devices Reporting Security Incidents DSU Digital Data Services Phone: 000-000-0000 DSU Digital Data Services Support Ticket: xxxxxxx.xxx.xxx Personal Use Restrictions Agreement Violations
AutoNDA by SimpleDocs
Network Usage. Network authentication is required prior to campus computer log-in. Unauthorized use, tampering with, or damage to, any part of the computer network connectivity system and/or violation of policies as stated in the University’s “Responsible Use Policy” and/or University Housing’s “ResNet Use Guidelines” located at the Housing website (xxxx://xxx.xxxxxxx.xxxxxxx.xxx) is prohibited. Violations may result in permanent loss of computer network connectivity privileges to the Cal Poly network and possible revocation of this License (see License Terms and Conditions §11- Revocation of License.) Violations may also result in a violation of the Student Conduct Code, as described in Sections §§41301 and 41302 of Title 5 of the California Code of Regulations, and CSU Executive Order 1098.
Network Usage. SWC may monitor your activities, preferences, and transactional data (such as your IP address) relating to your use of the Network and/or services and log this information. This information may be used to diagnose Network technical problems. We also use personal and non-Personal Information in aggregate or statistical form in order to improve our products, services and procedures. This means that information from many persons and/or web Network visits is grouped together in a way that does not disclose the Personal Information of any particular person. For example, we track how many people have expressed interest in a particular product and what kinds of web browsers are most often used when visiting our web Network. Among other things, this information helps us determine which of our products and services are successful and which should be changed or discontinued.
Network Usage a. The Client represents and warrants that it and any other user of the Service will not knowingly use the Service for unlawful purposes (including without limitation infringement of copyright, trademark, or other intellectual property right, misappropriation of trade secrets, wire fraud, invasion of privacy, obscenity and libel), or to interfere with or disrupt other network users, network services or network equipment. Disruptions include without limitation distribution of unsolicited advertising or chain letters, repeated harassment of other network users, impersonating another such user, falsifying one’s network identity for improper or illegal purposes, sending unsolicited mass emailings, propagation of computer worms and viruses, and using the network to make unauthorised entry to any other machine accessible via the network. b. Matrix Solutions does not guarantee that its Services will be continuous or fault free.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!