Permitted and Prohibited Uses 1.1. The Data may only be used for linguistic education and research, including but not limited to information retrieval, document understanding, machine translation or speech recognition. 1.2. User shall not publish, retransmit, display, redistribute, reproduce or commercially exploit the Data in any form, except that User may include limited excerpts from the Data in articles, reports and other documents describing the results of User’s linguistic education and research.
Prohibited Uses You may use the Website only for lawful purposes and in accordance with these Terms of Use. You agree not to use the Website: • In any way that violates any applicable federal, state, local, or international law or regulation (including, without limitation, any laws regarding the export of data or software to and from the US or other countries). • For the purpose of exploiting, harming, or attempting to exploit or harm minors in any way by exposing them to inappropriate content, asking for personally identifiable information, or otherwise. • To send, knowingly receive, upload, download, use, or re-use any material that does not comply with the Content Standards set out in these Terms of Use. • To transmit, or procure the sending of, any advertising or promotional material without our prior written consent, including any "junk mail," "chain letter," "spam," or any other similar solicitation. • To impersonate or attempt to impersonate the Company, a Company employee, another user, or any other person or entity (including, without limitation, by using email addresses or screen names associated with any of the foregoing). • To engage in any other conduct that restricts or inhibits anyone's use or enjoyment of the Website, or which, as determined by us, may harm the Company or users of the Website, or expose them to liability. Additionally, you agree not to: • Use the Website in any manner that could disable, overburden, damage, or impair the site or interfere with any other party's use of the Website, including their ability to engage in real time activities through the Website. • Use any robot, spider, or other automatic device, process, or means to access the Website for any purpose, including monitoring or copying any of the material on the Website. • Use any manual process to monitor or copy any of the material on the Website, or for any other purpose not expressly authorized in these Terms of Use, without our prior written consent. • Use any device, software, or routine that interferes with the proper working of the Website. • Introduce any viruses, Trojan horses, worms, logic bombs, or other material that is malicious or technologically harmful. • Attempt to gain unauthorized access to, interfere with, damage, or disrupt any parts of the Website, the server on which the Website is stored, or any server, computer, or database connected to the Website. • Attack the Website via a denial-of-service attack or a distributed denial-of-service attack. • Otherwise attempt to interfere with the proper working of the Website.
ACCEPTABLE USE RESTRICTIONS You must: (a) not use the App or any Service in any unlawful manner, for any unlawful purpose, or in any manner inconsistent with this XXXX, or act fraudulently or maliciously, for example, by hacking into or inserting malicious code, including viruses, or harmful data, into the App, any Service or any operating system; (b) not infringe our intellectual property rights or those of any third party in relation to your use of the App or any Service; (c) not transmit any material that is defamatory, offensive or otherwise objectionable in relation to your use of the App or any Service; (d) not use the App or any Service in a way that could damage, disable, overburden, impair or compromise our systems or security or interfere with other users; and (e) not collect or harvest any information or data from any Service or our systems or attempt to decipher any transmissions to or from the servers running any Service.
Use Restrictions (a) Company will not do or attempt to do, and Company will not permit any other person or entity to do or attempt to do, any of the following, directly or indirectly: (i) use any Proprietary Item for any purpose, at any location or in any manner not specifically authorized by this Agreement; (ii) make or retain any copy of any Proprietary Item except as specifically authorized by this Agreement; (iii) create, recreate or obtain the source code for any Proprietary Item; (iv) refer to or otherwise use any Proprietary Item as part of any effort to develop other software, programs, applications, interfaces or functionalities or to compete with BNYM or a Third Party Provider; (v) modify, adapt, translate or create derivative works based upon any Proprietary Item, or combine or merge any Proprietary Item or part thereof with or into any other product or service not provided for in this Agreement and not authorized in writing by BNYM; (vi) remove, erase or tamper with any copyright or other proprietary notice printed or stamped on, affixed to, or encoded or recorded in any Proprietary Item, or fail to preserve all copyright and other proprietary notices in any copy of any Proprietary Item made by Company; (vii) sell, transfer, assign or otherwise convey in any manner any ownership interest or Intellectual Property Right of BNYM, or market, license, sublicense, distribute or otherwise grant, or subcontract or delegate to any other person, including outsourcers, vendors, consultants, joint venturers and partners, any right to access or use any Proprietary Item, whether on Company’s behalf or otherwise; (viii) subcontract for or delegate the performance of any act or function involved in accessing or using any Proprietary Item, whether on Company’s behalf or otherwise; (ix) reverse engineer, re-engineer, decrypt, disassemble, decompile, decipher, reconstruct, re-orient or modify the circuit design, algorithms, logic, source code, object code or program code or any other properties, attributes, features or constituent parts of any Proprietary Item; (x) take any action that would challenge, contest, impair or otherwise adversely effect an ownership interest or Intellectual Property Right of BNYM; (xi) use any Proprietary Item to provide remote processing, network processing, network communications, a service bureau or time sharing operation, or services similar to any of the foregoing to any person or entity, whether on a fee basis or otherwise; (xii) allow Harmful Code into any Proprietary Item, as applicable, or into any interface or other software or program provided by it to BNYM, through Company’s systems or personnel or Company’s use of the Licensed Services or Company’s activities in connection with this Agreement. (b) Company shall, promptly after becoming aware of such, notify BNYM of any facts, circumstances or events regarding its or a Permitted User’s use of the Licensed System that are reasonably likely to constitute or result in a breach of this Section 2.12, and take all reasonable steps requested by BNYM to prevent, control, remediate or remedy any such facts, circumstances or events or any future occurrence of such facts, circumstances or events.
Prohibited Use You may not use the Website for any of the following purposes:
Permitted Uses and Disclosure by Business Associate (1) General Use and Disclosure Provisions Except as otherwise limited in this Section of the Contract, Business Associate may use or disclose PHI to perform functions, activities, or services for, or on behalf of, Covered Entity as specified in this Contract, provided that such use or disclosure would not violate the HIPAA Standards if done by Covered Entity or the minimum necessary policies and procedures of the Covered Entity.
Restricted Uses Without limiting the unsupported or prohibited use cases identified in the Stripe Identity Permitted Businesses list, you must not, and must not enable or allow any other party to: (a) modify the Stripe Identity Services in any way, including by changing
Permitted Uses and Disclosures of Phi by Business Associate Except as otherwise indicated in this Agreement, Business Associate may use or disclose PHI, inclusive of de-identified data derived from such PHI, only to perform functions, activities or services specified in this Agreement on behalf of DHCS, provided that such use or disclosure would not violate HIPAA or other applicable laws if done by DHCS.
Permitted Uses and Disclosures by Business Associate Except as otherwise limited by this Agreement, Business Associate may make any uses and disclosures of Protected Health Information necessary to perform its services to Covered Entity and otherwise meet its obligations under this Agreement, if such use or disclosure would not violate the Privacy Rule if done by Covered Entity. All other uses or disclosures by Business Associate not authorized by this Agreement or by specific instruction of Covered Entity are prohibited.
Prohibited Uses and Disclosures BA shall not use or disclose PHI other than as permitted or required by the Contract and Addendum, or as required by law. BA shall not use or disclose Protected Information for fundraising or marketing purposes. BA shall not disclose Protected Information to a health plan for payment or health care operation purposes if the patient has requested this special restriction, and has paid out of pocket in full for the health care item or service to which the PHI solely relates [42 U.S.C. Section 17935(a) and 45 C.F.R. Section 164.522(a)(vi)]. BA shall not directly or indirectly receive remuneration in exchange for Protected Information, except with the prior written consent of CE and as permitted by the HITECH Act, 42 U.S.C. Section 17935(d)(2), and the HIPAA regulations, 45 C.F.R. Section 164.502(a)(5)(ii); however, this prohibition shall not affect payment by CE to BA for services provided pursuant to the Contract.