Permissible and Prohibited Uses Sample Clauses

Permissible and Prohibited Uses. Your Data Plan is intended for Web browsing, messaging, and similar activities on your Bark Phone. Examples of prohibited uses can be found in Section 18 of these T&Cs.
AutoNDA by SimpleDocs
Permissible and Prohibited Uses. Purchasing Entity’s Data Plan is intended for Web browsing, messaging, and similar activities. Certain activities and uses of the Services and Products are permitted and others are not. If Purchasing Entity buys, leases, or finances a Product manufactured for use on the Network, Purchasing Entity agrees that it intends it to be activated on our Service. Examples of permitted uses include but are not limited to: (a) voice calls; (b) web browsing; (c) messaging (d) email; (e) streaming music; and (f) Tethering a Product to other non-harmful Products pursuant to the terms and conditions and allotments in the associated Rate Plan. Examples of prohibited uses include but are not limited to: (aa) using a non-T-Mobile certified repeater or signal booster other than Contractor provides Purchasing Entity; (bb) compromises Network security or capacity, degrades Network performance, uses malicious software or “malware”, hinders other Purchasing Entity’ access to the Network, or otherwise adversely impacts Network service levels or legitimate data flows; (cc) with the exception of use by emergency first responders, using applications which automatically consume unreasonable amounts of available Network capacity; (dd) with the exception of reasonable IoT applications, using applications which used in a way that degrades network capacity or functionality; (ee) misuse of the Service, including "spamming" or sending abusive or unsolicited communications; (ff) tampering with, reprogramming, altering, or otherwise modifying Purchasing Entity’s Products to circumvent any of Contractor’s policies or violate anyone’s intellectual property rights; (gg) causing harm or adverse effects on Contractor, the Network, Contractor, Purchasing Entity, employees, business, or any other person; or (hh) causing Contractor to violate applicable laws and regulations.
Permissible and Prohibited Uses. Customer acknowledges that the data plan is intended for Web browsing, messaging, and similar activities on a Master Account User’s Unit and not on any other equipment. Unless explicitly permitted by a data plan, other uses, including for example, tethering a Unit to a personal computer or other hardware, are not permitted. Examples of prohibited uses include but are not limited to: (a) server devices or host computer applications, including continuous Web camera posts or broadcasts, automatic data feeds, automated machine-to-machine connections or peer-to-peer (P2P) file-sharing applications that are broadcast to multiple servers or recipients, “bots” or similar routines that could disrupt net user groups or email use by others or other applications that denigrate network capacity or functionality; (b) as a substitute or backup for private lines or dedicated data connections; (c) any activity that adversely affects the ability of other users or systems to use either T-Mobile’s Services or the network-based resources of others, including the generation or dissemination of viruses, malware or “denial of service” attacks; (d) accessing, or attempting to access without authority, the information, accounts or devices of others, or to penetrate, or attempt to penetrate, T-Mobile’s or another entity’s network or systems; or (e) running software or other devices that maintain continuously active Internet connections when a computer’s connection would otherwise be idle, or “keep alive” functions. For example, Customer cannot use a data plan for Web broadcasting, or for the operation of servers, telemetry devices and/or supervisory control and data acquisition devices.
Permissible and Prohibited Uses. Customer may use the eServices Center only for lawful and legitimate business purposes. Customer will be responsible for ensuring that it complies with all laws and licensing or other governmental requirements in connection with its participation in the eServices Center. Prohibited uses of the eServices Center shall include, but not be limited to, the following: (i)placement on the eServices Center of harassing or defamatory material or any material that is irrelevant to the legitimate use of the eServices Center; (ii)introduction of viruses, malware, worms or other programming routines that are intended to disrupt or interface with the intended operation of the eServices Center; (iii)promotion of any unlawful activity or purpose, including, but not limited to, any activity that potentially gives rise to criminal or civil liability; (iv) unauthorized alteration of any data or information supplied by the eServices Center; or (v) any activity that infri nges upon the copyright, patent, trademark or other rights of any person or entity.

Related to Permissible and Prohibited Uses

  • Permitted and Prohibited Uses 1.1. The Data may only be used for linguistic education and research, including but not limited to information retrieval, document understanding, machine translation or speech recognition. 1.2. User shall not publish, retransmit, display, redistribute, reproduce or commercially exploit the Data in any form, except that User may include limited excerpts from the Data in articles, reports and other documents describing the results of User’s linguistic education and research.

  • Prohibited Uses You may use the Website only for lawful purposes and in accordance with these Terms of Use. You agree not to use the Website: • In any way that violates any applicable federal, state, local, or international law or regulation (including, without limitation, any laws regarding the export of data or software to and from the US or other countries). • For the purpose of exploiting, harming, or attempting to exploit or harm minors in any way by exposing them to inappropriate content, asking for personally identifiable information, or otherwise. • To send, knowingly receive, upload, download, use, or re-use any material that does not comply with the Content Standards set out in these Terms of Use. • To transmit, or procure the sending of, any advertising or promotional material without our prior written consent, including any "junk mail," "chain letter," "spam," or any other similar solicitation. • To impersonate or attempt to impersonate the Company, a Company employee, another user, or any other person or entity (including, without limitation, by using email addresses or screen names associated with any of the foregoing). • To engage in any other conduct that restricts or inhibits anyone's use or enjoyment of the Website, or which, as determined by us, may harm the Company or users of the Website, or expose them to liability. Additionally, you agree not to: • Use the Website in any manner that could disable, overburden, damage, or impair the site or interfere with any other party's use of the Website, including their ability to engage in real time activities through the Website. • Use any robot, spider, or other automatic device, process, or means to access the Website for any purpose, including monitoring or copying any of the material on the Website. • Use any manual process to monitor or copy any of the material on the Website, or for any other purpose not expressly authorized in these Terms of Use, without our prior written consent. • Use any device, software, or routine that interferes with the proper working of the Website. • Introduce any viruses, Trojan horses, worms, logic bombs, or other material that is malicious or technologically harmful. • Attempt to gain unauthorized access to, interfere with, damage, or disrupt any parts of the Website, the server on which the Website is stored, or any server, computer, or database connected to the Website. • Attack the Website via a denial-of-service attack or a distributed denial-of-service attack. • Otherwise attempt to interfere with the proper working of the Website.

  • Prohibited Use You may not use the Website for any of the following purposes:

  • No Unlawful or Prohibited Use Intellectual Property

  • Prohibited use of card (a) You must not use the card, and/or otherwise operate the card account to pay the current balance. (b) You shall not use and we will not permit the card to be used to effect any card transaction which would contravene the laws of any jurisdiction.

  • Use for Match Prohibited Grantee shall not use funds provided under this Grant Agreement for matching purposes in securing other funding without the written approval of the System Agency.

  • Restricted Use by Licensee Except as expressly authorized by the terms of license, Licensee shall not: (i) Copy the Product; (ii) Cause or permit reverse compilation or reverse assembly of all or any portion of the Product; (iii) Export the Licensed Software in violation of any U.S. Department of Commerce export administration regulations.

  • FUTURE ACTIVITIES AND UNKNOWN CONDITIONS This Agreement shall not operate to shield the Respondent from liability arising from future activities, as of the date of execution of this Agreement.

  • No Prohibited Persons Neither Seller nor any of its Affiliates, officers, directors, partners or members, is an entity or person (or to Seller’s knowledge, owned or controlled by an entity or person): (i) that is listed in the Annex to, or is otherwise subject to the provisions of Executive Order 13224 issued on September 24, 2001 (“EO13224”); (ii) whose name appears on the United States Treasury Department’s Office of Foreign Assets Control (“OFAC”) most current list of “Specifically Designated National and Blocked Persons” (which list may be published from time to time in various mediums including, but not limited to, the OFAC website, http:xxx.xxxxx.xxx/xxxx/x00xxx.xxx); (iii) who commits, threatens to commit or supports “terrorism”, as that term is defined in EO13224; or (iv) who is otherwise affiliated with any entity or person listed above (any and all parties or persons described in clauses (i) through (iv) above are herein referred to as a “Prohibited Person”).

  • Permitted Uses BA shall use Protected Information only for the purpose of performing BA’s obligations under the Contract and as permitted or required under the Contract and Addendum, or as required by law. Further, BA shall not use Protected Information in any manner that would constitute a violation of the Privacy Rule or the HITECH Act if so used by CE. However, BA may use Protected Information as necessary (i) for the proper management and administration of BA;

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!