Prohibited Use 4. You may not use the Website for any of the following purposes:
Prohibited Uses You may use the Website only for lawful purposes and in accordance with these Terms of Use. You agree not to use the Website: • In any way that violates any applicable federal, state, local, or international law or regulation (including, without limitation, any laws regarding the export of data or software to and from the US or other countries). • For the purpose of exploiting, harming, or attempting to exploit or harm minors in any way by exposing them to inappropriate content, asking for personally identifiable information, or otherwise. • To send, knowingly receive, upload, download, use, or re-use any material that does not comply with the Content Standards set out in these Terms of Use. • To transmit, or procure the sending of, any advertising or promotional material without our prior written consent, including any "junk mail," "chain letter," "spam," or any other similar solicitation. • To impersonate or attempt to impersonate the Company, a Company employee, another user, or any other person or entity (including, without limitation, by using email addresses or screen names associated with any of the foregoing). • To engage in any other conduct that restricts or inhibits anyone's use or enjoyment of the Website, or which, as determined by us, may harm the Company or users of the Website, or expose them to liability. Additionally, you agree not to: • Use the Website in any manner that could disable, overburden, damage, or impair the site or interfere with any other party's use of the Website, including their ability to engage in real time activities through the Website. • Use any robot, spider, or other automatic device, process, or means to access the Website for any purpose, including monitoring or copying any of the material on the Website. • Use any manual process to monitor or copy any of the material on the Website, or for any other purpose not expressly authorized in these Terms of Use, without our prior written consent. • Use any device, software, or routine that interferes with the proper working of the Website. • Introduce any viruses, Trojan horses, worms, logic bombs, or other material that is malicious or technologically harmful. • Attempt to gain unauthorized access to, interfere with, damage, or disrupt any parts of the Website, the server on which the Website is stored, or any server, computer, or database connected to the Website. • Attack the Website via a denial-of-service attack or a distributed denial-of-service attack. • Otherwise attempt to interfere with the proper working of the Website.
Unauthorized Use or Disclosure The Contractor shall notify COMMERCE within five (5) working days of any unauthorized use or disclosure of any confidential information, and shall take necessary steps to mitigate the harmful effects of such use or disclosure.
Prohibited use of card (a) You must not use the card, and/or otherwise operate the card account to pay the current balance.
Prohibition on Unauthorized Use or Disclosure The Business Associate will neither use nor disclose the Covered Entity’s Protected Health Information, except as permitted or required by this Addendum or in writing by the Covered Entity or as Required by Law. This Agreement does not authorize the Business Associate to use or disclose the Covered Entity’s Protected Health Information in a manner that will violate Subpart E of 45 CFR Part 164 if done by the Covered Entity.
Permitted and Prohibited Uses 1.1. The Data may only be used for linguistic education and research, including but not limited to information retrieval, document understanding, machine translation or speech recognition.
Prohibited Uses and Disclosures BA shall not use or disclose PHI other than as permitted or required by the Contract and Addendum, or as required by law. BA shall not use or disclose Protected Information for fundraising or marketing purposes. BA shall not disclose Protected Information to a health plan for payment or health care operation purposes if the patient has requested this special restriction, and has paid out of pocket in full for the health care item or service to which the PHI solely relates [42 U.S.C. Section 17935(a) and 45 C.F.R. Section 164.522(a)(vi)]. BA shall not directly or indirectly receive remuneration in exchange for Protected Information, except with the prior written consent of CE and as permitted by the HITECH Act, 42 U.S.C. Section 17935(d)(2), and the HIPAA regulations, 45 C.F.R. Section 164.502(a)(5)(ii); however, this prohibition shall not affect payment by CE to BA for services provided pursuant to the Contract.
Unauthorised Use of Confidential Information The Supplier/Service Provider shall not authorise any party to act on or use in any way any Confidential Information belonging to Transnet whether or not such party is aware of such Confidential Information, and shall promptly notify Transnet of the information if it becomes aware of any party so acting, and shall provide Transnet the information with such assistance as Transnet reasonably requires, at Transnet’s cost and expense, to prevent such third party from so acting.
Prohibited Content You may not access Google services from an Application that: (a) contains any viruses, worms, trojan horses, or the like; and (b) is distributed primarily for the purpose of (i) distributing pornographic, obscene, excessively profane, gambling-related, deceptive, fraudulent or illegal content, or (ii) distributing content related to “hacking” or “cracking.”
Restricted Use 5.1 Recipient shall maintain and use Material in compliance with all applicable laws, regulations and rules. Material may only be used for internal academic non-profit research. In no circumstances shall Material be used (i) in or for clinical trials; (ii) for diagnostic or therapeutic purposes involving human subjects or animals; (iii) for prophylactic use; or (iv) for production. Recipient shall be solely liable for any modifications to any Product that it makes, directs or permits, including but not limited to any potential infringement upon third-party intellectual property rights. Recipient shall defend, indemnify and hold CTK harmless from and against any claims of third parties based on any claim arising out of Recipient’s use of .