Common use of Prohibited Behavior Clause in Contracts

Prohibited Behavior. You may not access Google services from an Application that engages in deceptive, unfair, harassing or otherwise annoying practices. For example, the Application may not: (a) use, or permit an unaffiliated person to use, an end user’s computer system for any purpose not understood and affirmatively consented to by the end user (including, without limitation, for purposes of consuming bandwidth or computer resources, sending email messages, launching denial of service attacks, accruing toll charges through a dialer or obtaining personal information from an end user’s computer such as login, password, account or other information personal to the end user); (b) intentionally create or exploit any security vulnerabilities in end user computers; (c) trigger pop-ups, pop-unders, exit windows, or similar obstructive or intrusive functionality, that materially interfere with an end user’s Web navigation or browsing or the use of his or her computer; (d) repeatedly ask an end user to take, or try to deceive an end user into taking, an action that the end user has previously declined to take (such as repeatedly asking an end user to change his or her home page or some other setting or configuration); (e) redirect browser traffic away from valid DNS entries (except that your Application may direct unresolved URLs to an alternative URL designated by you, provided that the page to which the end user resolves adequately informs the end user that you and your Application are the source of that page); (f) interfere with the browser default search functionality (except that your Application may permit an end user to change his or her default search engine with proper disclosure, consent and attribution as provided below); or (g) engage in activity that violates any applicable law or regulation.

Appears in 4 contracts

Samples: Google Services Agreement, Google Services Agreement (Infospace Inc), Google Services Agreement Order Form (Synacor, Inc.)

AutoNDA by SimpleDocs

Prohibited Behavior. You may An Approved Client Application must not access Google services from an Application that engages engage in deceptive, unfair, harassing or otherwise annoying practices. For example, the an Approved Client Application may will not: (a) use, or permit an unaffiliated person a third party to use, an end userEnd User’s computer system for any purpose not understood and affirmatively consented to by the end user End User (including, without limitation, for purposes of consuming bandwidth or computer resources, sending email messages, launching denial of service attacks, accruing toll charges through a dialer or obtaining personal information from an end userEnd User’s computer such as login, password, account or other information personal to the end userEnd User); (b) intentionally create or exploit any security vulnerabilities in end user computersan End User’s computer; (c) trigger pop-ups, pop-unders, exit windows, or similar obstructive or intrusive functionality, functionality that materially interfere with an end userEnd User’s Web navigation or browsing or the use of his or her computer; (d) repeatedly ask an end user End User to take, or try to deceive an end user End User into taking, an action that the end user End User has previously declined to take (such as repeatedly asking an end user End User to change his or her home page or some other setting or configuration); (e) redirect browser traffic away from valid DNS entries (except that your Application Approved Client Applications may direct unresolved URLs to an alternative URL designated by youCompany, provided that the page to which the end user End User resolves adequately informs the end user End User that you Company and your the Approved Client Application are the source of that page); (f) interfere with the browser default search functionality (except that your an Approved Client Application may permit an end user End User to change his or her default search engine with proper disclosure, consent and attribution as provided belowabove); or; (g) engage in activity that violates any applicable law or regulation; or (h) contain any viruses, worms, trojan horses, or the like.

Appears in 3 contracts

Samples: Google Search and Advertising Services Agreement (AVG Technologies N.V.), Google Services Agreement (AVG Technologies N.V.), Google Search and Advertising Services Agreement (IncrediMail Ltd.)

Prohibited Behavior. You may not access bundle any Google services from Application with an Application that engages in deceptive, unfair, harassing or otherwise annoying practices. For example, the Application may not: (a) use, or permit an unaffiliated person to use, an end user’s computer system for any purpose not understood and affirmatively consented to by the end user (including, without limitation, for purposes of consuming bandwidth or computer resources, sending email messages, launching denial of service attacks, accruing toll charges through a dialer or obtaining personal information from an end user’s computer such as login, password, account or other information personal to the end user); (b) intentionally create or exploit any security vulnerabilities in end user computers; (c) trigger pop-ups, pop-unders, exit windows, or similar obstructive or intrusive functionality, that materially interfere with an end user’s Web navigation or browsing or the use of his or her computer; (d) repeatedly ask an end user to take, or try to deceive an end user into taking, an action that the end user has previously declined to take (such as repeatedly asking an end user to change his or her home page or some other setting or configuration); (e) redirect browser traffic away from valid DNS entries (except that your Application may direct unresolved URLs to an alternative URL designated by you, provided that the page to which the end user resolves adequately informs the end user that you and your Application are the source of that page); (f) interfere with the browser default search functionality (except that your Application may permit an end user to change his or her default search engine with proper disclosure, consent and attribution as provided below); or (g) engage in activity that violates any applicable law or regulation.

Appears in 2 contracts

Samples: Linking Agreement (Qihoo 360 Technology Co LTD), Promotion and Distribution Agreement (Divx Inc)

Prohibited Behavior. You may not access bundle any Google services from Application with an Application that engages in deceptive, unfair, harassing or otherwise annoying practices. For example, the Application may not: (a) use, or permit an unaffiliated person to use, an end user’s computer system for any purpose not understood and affirmatively consented to by the end user (including, without limitation, for purposes of consuming bandwidth or computer resources, sending email messages, launching denial of service attacks, accruing toll charges through a dialer or obtaining personal information from an end user’s computer such as login, password, account or other information personal to the end user); (b) intentionally create or exploit any security vulnerabilities in end user computers; (c) trigger pop-ups, pop-unders, exit windows, or similar obstructive or intrusive functionality, that materially interfere with an end user’s Web navigation or browsing or the use of his or her computer; (d) repeatedly ask an end user to take, or try to deceive an end user into taking, an action that the end user has previously declined to take (such as repeatedly asking an end user to change his or her home page or some other setting or configuration);; Google Confidential (e) redirect browser traffic away from valid DNS entries (except that your Application may direct unresolved URLs to an alternative URL designated by you, provided that the page to which the end user resolves adequately informs the end user that you and your Application are the source of that page); (f) interfere with the browser default search functionality (except that your Application may permit an end user to change his or her default search engine with proper disclosure, consent and attribution as provided below); or (g) engage in activity that violates any applicable law Jaw or regulation.

Appears in 2 contracts

Samples: Promotion and Distribution Agreement (WhiteSmoke, Inc.), Promotion and Distribution Agreement (WhiteSmoke, Inc.)

AutoNDA by SimpleDocs

Prohibited Behavior. You may An Approved Client Application must not access Google services from an Application that engages engage in deceptive, unfair, harassing or otherwise annoying practices. For example, the an Approved Client Application may will not: (a) use, or permit an unaffiliated person a third party to use, an end userEnd User’s computer system for any purpose not understood and affirmatively consented to by the end user End User (including, without limitation, for purposes of consuming bandwidth or computer resources, sending email messages, launching denial of service attacks, accruing toll charges through a dialer or obtaining personal information from an end userEnd User’s computer such as login, password, account or other information personal to the end userEnd User); (b) intentionally create or exploit any security vulnerabilities in end user computersan End User’s computer; (c) trigger pop-ups, pop-unders, exit windows, or similar obstructive or intrusive functionality, functionality that materially interfere with an end userEnd User’s Web navigation or browsing or the use of his or her computer; (d) repeatedly ask an end user End User to take, or try to deceive an end user End User into taking, an action that the end user End User has previously declined to take (such as repeatedly asking an end user End User to change his or her home page or some other setting or configuration); (e) redirect browser traffic away from valid DNS entries (except that your Application Approved Client Applications may direct unresolved URLs to an alternative URL designated by youCompany, provided that the page to which the end user End User resolves adequately informs the end user End User that you Company and your the Approved Client Application are the source of that page); (f) interfere with the browser default search functionality (except that your an Approved Client Application may permit an end user End User to change his or her default search engine with proper disclosure, consent and attribution as provided belowabove); or; (g) engage in activity that violates any applicable law or regulation.; or (h) contain any viruses, worms, trojan horses, or the like. - 3 - Google Confidential (02152011)

Appears in 1 contract

Samples: Google Search and Advertising Services Agreement

Prohibited Behavior. You may An approved Client Application must not access Google services from an Application that engages engage in deceptive, unfair, harassing or otherwise annoying practices. For example, the an approved Client Application may will not: (a) use, or permit an unaffiliated person a third party to use, an end userEnd User’s computer system for any purpose not understood and affirmatively consented to by the end user End User (including, without limitation, for purposes of consuming bandwidth or computer resources, sending email messages, launching denial of service attacks, accruing toll charges through a dialer or obtaining personal information from an end userEnd User’s computer such as login, password, account or other information personal to the end userEnd User); (b) intentionally create or exploit any security vulnerabilities in end user computersan End User’s computer; (c) trigger pop-ups, pop-unders, exit windows, or similar obstructive or intrusive functionality, functionality that materially interfere with an end userEnd User’s Web navigation or browsing or the use of his or her computer; (d) repeatedly ask an end user End User to take, or try to deceive an end user End User into taking, an action that the end user End User has previously declined to take (such as repeatedly asking an end user End User to change his or her home page or some other setting or configuration);; * Information redacted pursuant to a confidential treatment request by InfoSpace, Inc. under 5 U.S.C. §552(b)(4) and 17 C.F.R. §§ 200.80(b)(4) and 240.24b-2, and submitted separately with the Securities and Exchange Commission. (e) redirect browser traffic away from valid DNS entries (except that your Application approved Client Applications may direct unresolved URLs to an alternative URL designated by youCustomer, provided that the page to which the end user End User resolves adequately informs the end user End User that you Customer and your the approved Client Application are the source of that page); (f) interfere with the browser default search functionality (except that your an approved Client Application may permit an end user End User to change his or her default search engine with proper disclosure, consent and attribution as provided belowabove); or; (g) engage in activity that violates any applicable law or regulation; or (h) contain any viruses, worms, trojan horses, or the like.

Appears in 1 contract

Samples: Google Services Agreement (Infospace Inc)

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!