Other Unacceptable Behavior Sample Clauses

Other Unacceptable Behavior. In addition to the conduct covered by the Event Code of Behavior, Attendees may not: ● Interrupt the operation of the Services in any manner whatsoever, including by imposing an unreasonable load on the Services; ● Delete or revise any material or other information of any other user, Red Hat, or any third party; ● Harvest or otherwise collect information about others, including email addresses, without their consent; ● Decipher, decompile, disassemble, or reverse-engineer any of the software comprising or in any way making up a part of the Services; ● Post advertisements or solicitations of business other than those explicitly approved by Red Hat; ● Defeat, investigate, or provide information concerning methods of defeating security mechanisms, including by allowing another person to access the Services using credentials issued to the Attendee, or by falsifying, deleting, or concealing Internet Protocol header, email sender, or other identifying information; ● Engage in conduct that restricts, inhibits or discourages any other person or entity from using or enjoying all or any portion, features or functions of the Services, or which, in Red Hat’s judgment, exposes Red Hat or any of its users, customers, agents or suppliers to any liability or detriment of any type; ● Engage in conduct affecting Red Hat adversely or reflecting negatively on Red Hat, the Services, Red Hat’s goodwill, name or reputation or causing duress, distress or discomfort to Red Hat or anyone else, or discouraging any person or entity from doing business with Red Hat; or ● Take any other action that could endanger or cause damage to Red Hat Age Restriction Attendees and guests must be 18 to attend Event and any associated side meetings, parties or evening events. Attendee participation in certain event activities, such as activities involving alcohol, may be limited in order to comply with applicable laws and regulations. Special permission may be requested for attendees under the age of 18 via xxxxxxxxxxxxxx@xxxxxx.xxx and must be received in advance. Information for Presenters and Sponsors Presenters and sponsors, who are unsure whether their presentations or other materials and communications are consistent with the Event Code of Behavior, please contact xxxxxxxxxxxxxx@xxxxxx.xxx in advance of the event. Medical Insurance and Travel Insurance Red Hat does not provide medical insurance or travel insurance for you. If you attend the Event in person, it is your responsibility to check y...
AutoNDA by SimpleDocs

Related to Other Unacceptable Behavior

  • Unacceptable Uses The following uses will be regarded as not acceptable:

  • Unacceptable Use The following is considered unacceptable use of the school’s ICT facilities and online platforms by any member of the school community. Any breach of this policy may result in disciplinary or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: Using the school’s ICT facilities to breach intellectual property rights or copyright Using the school’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its pupils, or other members of the school community Connecting any device to the school’s ICT network without approval from authorised personnel Setting up any software, applications or web services on the school’s network without approval by authorised personnel, or creating or using any program, tool or item of software designed to interfere with the functioning of the ICT facilities, accounts or data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel Allowing, encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the school’s ICT facilities Causing intentional damage to ICT facilities Removing, deleting or disposing of ICT equipment, systems, programs or information without permission by authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not supposed to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to the school Using websites or mechanisms to bypass the school’s filtering mechanisms This is not an exhaustive list. The school reserves the right to amend this list at any time. The headteacher or other delegated member of SLT will use professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s ICT facilities.

  • ACCEPTABLE Visit booth #XXXX

  • Required Good Faith Efforts In accordance with 5 NYCRR § 142.8, Contractors must document their good faith efforts toward utilizing MWBEs on the Contract. Evidence of required good faith efforts shall include, but not be limited to, the following:

  • Acceptable Use You agree that you are independently responsible for complying with all applicable laws in all of your activities related to your use of the Service, regardless of the purpose of the use, and for all communications you send through the Service. We and our Service Providers have the right but not the obligation to monitor and remove communications content that we find in our sole discretion to be objectionable in any way. In addition, you are prohibited from using the Service for communications or activities that: (a) violate any law, statute, ordinance or regulation; (b) promote hate, violence, racial intolerance, or the financial exploitation of a crime; (c) defame, abuse, harass or threaten others; (d) include any language or images that are bigoted, hateful, racially offensive, vulgar, obscene, indecent or discourteous; (e) infringe or violate any copyright, trademark, right of publicity or privacy or any other proprietary right under the laws of any jurisdiction; (f) impose an unreasonable or disproportionately large load on our infrastructure; (g) facilitate any viruses, trojan horses, worms or other computer programming routines that may damage, detrimentally interfere with, surreptitiously intercept or expropriate any system, data or information; (h) constitute use of any robot, spider, other automatic device, or manual process to monitor or copy the Service or the portion of the Site through which the Service is offered without our prior written permission; (i) constitute use of any device, software or routine to bypass technology protecting the Site or Service, or interfere or attempt to interfere, with the Site or the Service; or (j) may cause us or our Service Providers to lose any of the services from our internet service providers, payment processors, or other vendors. We encourage you to provide notice to us by the methods described in Section 6 of the General Terms above of any violations of the General Terms or the Agreement generally.

  • Authority to act on behalf of Concessionaire 36.2.1 During the period of Suspension, the Authority shall, on behalf of the Concessionaire, collect all Fee and revenues under and in accordance with this Agreement and deposit the same in the Escrow Account. The Authority shall be entitled to make withdrawals from the Escrow Account for meeting the costs incurred by it for remedying and rectifying the cause of Suspension, and thereafter for defraying the expenses specified in Clause 31.3.

  • Good Faith Efforts Contractor shall, to the extent consistent with quality, price, risk and other lawful and relevant considerations, use its good faith efforts to achieve participation by minority, women, and disadvantaged business enterprise participation in Work and services contracted to Contractor under this Contract.

Time is Money Join Law Insider Premium to draft better contracts faster.