Other Unacceptable Behavior Sample Clauses

Other Unacceptable Behavior. In addition to the conduct covered by the Event Code of Behavior, Attendees may not: ● Interrupt the operation of the Services in any manner whatsoever, including by imposing an unreasonable load on the Services; ● Delete or revise any material or other information of any other user, Red Hat, or any third party; ● Harvest or otherwise collect information about others, including email addresses, without their consent; ● Decipher, decompile, disassemble, or reverse-engineer any of the software comprising or in any way making up a part of the Services; ● Post advertisements or solicitations of business other than those explicitly approved by Red Hat; ● Defeat, investigate, or provide information concerning methods of defeating security mechanisms, including by allowing another person to access the Services using credentials issued to the Attendee, or by falsifying, deleting, or concealing Internet Protocol header, email sender, or other identifying information; ● Engage in conduct that restricts, inhibits or discourages any other person or entity from using or enjoying all or any portion, features or functions of the Services, or which, in Red Hat’s judgment, exposes Red Hat or any of its users, customers, agents or suppliers to any liability or detriment of any type; ● Engage in conduct affecting Red Hat adversely or reflecting negatively on Red Hat, the Services, Red Hat’s goodwill, name or reputation or causing duress, distress or discomfort to Red Hat or anyone else, or discouraging any person or entity from doing business with Red Hat; or ● Take any other action that could endanger or cause damage to Red Hat Age Restriction Attendees and guests must be 18 to attend Event and any associated side meetings, parties or evening events. Attendee participation in certain event activities, such as activities involving alcohol, may be limited in order to comply with applicable laws and regulations. Special permission may be requested for attendees under the age of 18 via xxxxxxxxxxxxxx@xxxxxx.xxx and must be received in advance. Information for Presenters and Sponsors Presenters and sponsors, who are unsure whether their presentations or other materials and communications are consistent with the Event Code of Behavior, please contact xxxxxxxxxxxxxx@xxxxxx.xxx in advance of the event. Medical Insurance and Travel Insurance Red Hat does not provide medical insurance or travel insurance for you. If you attend the Event in person, it is your responsibility to check y...
AutoNDA by SimpleDocs

Related to Other Unacceptable Behavior

  • Unacceptable Uses The following uses will be regarded as not acceptable:

  • Unacceptable Use Unacceptable use of the school’s ICT facilities includes: Using the school’s ICT facilities to breach intellectual property rights or copyright Using the school’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Online gambling, inappropriate advertising, phishing and/or financial scams Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate or harmful Consensual and non-consensual sharing of nude and semi-nude images and/or videos and/or livestreams Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its students, or other members of the school community Connecting any device to the school’s ICT network without approval from authorised personnel Setting up any software, applications or web services on the school’s network without approval by authorised personnel, or creating or using any programme, tool or item of software designed to interfere with the functioning of the school’s ICT facilities, accounts or data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel Allowing, encouraging or enabling others to gain (or attempt to gain) unauthorised access to the school’s ICT facilities Causing intentional damage to the school’s ICT facilities Removing, deleting or disposing of the school’s ICT equipment, systems, programmes or information without permission from authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not permitted by authorised personnel to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to the school Using websites or mechanisms to bypass the school’s filtering or monitoring mechanisms Engaging in content or conduct that is radicalised, extremist, racist, antisemitic or discriminatory in any other way Inappropriate use of AI tools and generative chatbots (such as ChatGPT and Google Bard) to generate text or imagery presented as original work. This is not an exhaustive list. The school reserves the right to amend this list at any time. The headteacher or other relevant member of the SLT will use their professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s ICT facilities.

  • ACCEPTABLE Visit booth #XXXX

  • Acceptable Uses The District is providing access to its school computer systems, computer networks, and the Internet for educational purposes only. The board expects that staff will blend thoughtful use of such information throughout the curriculum and that the staff will provide guidance and instruction to students in the appropriate use of such resources. If you have any doubt about whether a contemplated activity is educational, you may consult with the person(s) designated by the school to help you decide. Accordingly, regulations for participation by anyone on the Internet shall include, but not be limited to, the following:

  • Required Good Faith Efforts In accordance with 5 NYCRR § 142.8, Contractors must document their good faith efforts toward utilizing MWBEs on the Contract. Evidence of required good faith efforts shall include, but not be limited to, the following:

  • Acceptable Use You agree that you are independently responsible for complying with all applicable laws in all of your activities related to your use of the Service, regardless of the purpose of the use, and for all communications you send through the Service. We and our Service Providers have the right but not the obligation to monitor and remove communications content that we find in our sole discretion to be objectionable in any way. In addition, you are prohibited from using the Service for communications or activities that: (a) violate any law, statute, ordinance or regulation; (b) promote hate, violence, racial intolerance, or the financial exploitation of a crime; (c) defame, abuse, harass or threaten others; (d) include any language or images that are bigoted, hateful, racially offensive, vulgar, obscene, indecent or discourteous; (e) infringe or violate any copyright, trademark, right of publicity or privacy or any other proprietary right under the laws of any jurisdiction; (f) impose an unreasonable or disproportionately large load on our infrastructure; (g) facilitate any viruses, trojan horses, worms or other computer programming routines that may damage, detrimentally interfere with, surreptitiously intercept or expropriate any system, data or information; (h) constitute use of any robot, spider, other automatic device, or manual process to monitor or copy the Service or the portion of the Site through which the Service is offered without our prior written permission; (i) constitute use of any device, software or routine to bypass technology protecting the Site or Service, or interfere or attempt to interfere, with the Site or the Service; or (j) may cause us or our Service Providers to lose any of the services from our internet service providers, payment processors, or other vendors. We encourage you to provide notice to us by the methods described in Section 6 of the General Terms above of any violations of the General Terms or the Agreement generally.

  • Unsatisfactory An unsatisfactory rating is demonstrated by a value-added score of less than zero (0), where all of the scores contained within the 99-percent confidence interval also lie below zero (0).

  • Authority to act on behalf of Concessionaire 36.2.1 During the period of Suspension, the Authority shall, on behalf of the Concessionaire, collect all Fee and revenues under and in accordance with this Agreement and deposit the same in the Escrow Account. The Authority shall be entitled to make withdrawals from the Escrow Account for meeting the costs incurred by it for remedying and rectifying the cause of Suspension, and thereafter for defraying the expenses specified in Clause 31.3.

  • Good Faith Efforts Contractor shall, to the extent consistent with quality, price, risk and other lawful and relevant considerations, use its good faith efforts to achieve participation by minority, women, and disadvantaged business enterprise participation in Work and services contracted to Contractor under this Contract.

  • What Will Happen After We Receive Your Letter When we receive your letter, we must do two things:

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!