Prohibited Uses and Sistema Technologies Use Policies Sample Clauses

Prohibited Uses and Sistema Technologies Use Policies. Customer is prohibited from using, or permitting the use of, any Service (i) for any purpose in violation of any law, rule, regulation, or policy of any government authority; (ii) in violation of any Use Policy (as defined below); (iii) for any use as to which Customer has not obtained all required government approvals, authorizations, licenses, consents, and permits; or (iv) to interfere unreasonably with the use of Sistema Technologies service by others or the operation of the Network. Customer is responsible for assuring that any and all of its users comply with the provisions of the Agreement. Sistema Technologies reserves the right to act immediately and without notice to terminate or suspend the Gov2Biz Services and/or to remove from the Gov2Biz Services any information transmitted by or to Customer or users, if Sistema Technologies determines that such use is prohibited as identified herein, or information does not conform with the requirements set or Sistema Technologies reasonably believes that such use or information may violate any laws, regulations, or written and electronic instructions for use. Furthermore, to the extent applicable, Services shall be subject to Sistema Technologies’ acceptable use policies (“Use Policies”) that may limit use. The Use Policies and other security policies concerning the Services are posted on the Website, and are incorporated into this Agreement by reference. Sistema Technologies may update the Use Policies from time to time, and such updates shall be deemed effective immediately upon posting, with or without actual notice to Customer. Sistema Technologies’ action or inaction in enforcing acceptable use shall not constitute review or approval of Customer’s or any other users’ use or information.
AutoNDA by SimpleDocs

Related to Prohibited Uses and Sistema Technologies Use Policies

  • Permitted and Prohibited Uses 1.1. The Data may only be used for linguistic education and research, including but not limited to information retrieval, document understanding, machine translation or speech recognition.

  • Information Technology Accessibility Standards Any information technology related products or services purchased, used or maintained through this Grant must be compatible with the principles and goals contained in the Electronic and Information Technology Accessibility Standards adopted by the Architectural and Transportation Barriers Compliance Board under Section 508 of the federal Rehabilitation Act of 1973 (29 U.S.C. §794d), as amended. The federal Electronic and Information Technology Accessibility Standards can be found at: xxxx://xxx.xxxxxx-xxxxx.xxx/508.htm.

  • Permitted Uses and Disclosures of Phi by Business Associate Except as otherwise indicated in this Agreement, Business Associate may use or disclose PHI, inclusive of de-identified data derived from such PHI, only to perform functions, activities or services specified in this Agreement on behalf of DHCS, provided that such use or disclosure would not violate HIPAA or other applicable laws if done by DHCS.

  • Visitors to and Conduct on School Property Petitions or written correspondence to the Board shall be presented to the Board in the next regular Board packet. LEGAL REF.: 5 ILCS 120/2.06, Open Meetings Act. 105 ILCS 5/10-6 and 5/10-16. CROSS REF.: 2:220 (School Board Meeting Procedure), 8:10 (Connection with the Community), 8:30 (Visitors to and Conduct on School Property) Adopted: September 5, 2019 Meridian CUSD 223 2:240 Board Policy Development The School Board governs using written policies. Written policies ensure legal compliance, establish Board processes, articulate District ends, delegate authority, and define operating limits. Board policies also provide the basis for monitoring progress toward District ends. Policy Development Anyone may propose new policies, changes to existing policies, or elimination of existing policies. Staff suggestions should be processed through the Superintendent. Suggestions from all others should be made to the Board President or the Superintendent. A Board Policy Committee will consider all policy suggestions, and provide information and recommendations to the Board. The Superintendent is responsible for: (1) providing relevant policy information and data to the Board,

  • Permitted Uses and Disclosures by Business Associate 1. Business Associate may only use or disclose protected health information as necessary to perform the services as outlined in the underlying agreement.

  • Permitted Uses and Disclosure by Business Associate (1) General Use and Disclosure Provisions Except as otherwise limited in this Section of the Contract, Business Associate may use or disclose PHI to perform functions, activities, or services for, or on behalf of, Covered Entity as specified in this Contract, provided that such use or disclosure would not violate the HIPAA Standards if done by Covered Entity or the minimum necessary policies and procedures of the Covered Entity.

  • Prohibited Uses You may use the Website only for lawful purposes and in accordance with these Terms of Use. You agree not to use the Website: • In any way that violates any applicable federal, state, local, or international law or regulation (including, without limitation, any laws regarding the export of data or software to and from the US or other countries). • For the purpose of exploiting, harming, or attempting to exploit or harm minors in any way by exposing them to inappropriate content, asking for personally identifiable information, or otherwise. • To send, knowingly receive, upload, download, use, or re-use any material that does not comply with the Content Standards set out in these Terms of Use. • To transmit, or procure the sending of, any advertising or promotional material without our prior written consent, including any "junk mail," "chain letter," "spam," or any other similar solicitation. • To impersonate or attempt to impersonate the Company, a Company employee, another user, or any other person or entity (including, without limitation, by using email addresses or screen names associated with any of the foregoing). • To engage in any other conduct that restricts or inhibits anyone's use or enjoyment of the Website, or which, as determined by us, may harm the Company or users of the Website, or expose them to liability. Additionally, you agree not to: • Use the Website in any manner that could disable, overburden, damage, or impair the site or interfere with any other party's use of the Website, including their ability to engage in real time activities through the Website. • Use any robot, spider, or other automatic device, process, or means to access the Website for any purpose, including monitoring or copying any of the material on the Website. • Use any manual process to monitor or copy any of the material on the Website, or for any other purpose not expressly authorized in these Terms of Use, without our prior written consent. • Use any device, software, or routine that interferes with the proper working of the Website. • Introduce any viruses, Trojan horses, worms, logic bombs, or other material that is malicious or technologically harmful. • Attempt to gain unauthorized access to, interfere with, damage, or disrupt any parts of the Website, the server on which the Website is stored, or any server, computer, or database connected to the Website. • Attack the Website via a denial-of-service attack or a distributed denial-of-service attack. • Otherwise attempt to interfere with the proper working of the Website.

  • Information Technology Enterprise Architecture Requirements If this Contract involves information technology-related products or services, the Contractor agrees that all such products or services are compatible with any of the technology standards found at xxxxx://xxx.xx.xxx/iot/2394.htm that are applicable, including the assistive technology standard. The State may terminate this Contract for default if the terms of this paragraph are breached.

  • TECHNOLOGY/KNOWLEDGE TRANSFER ACTIVITIES The goal of this task is to develop a plan to make the knowledge gained, experimental results, and lessons learned available to the public and key decision makers. The Recipient shall: • Prepare an Initial Fact Sheet at start of the project that describes the project. Use the format provided by the CAM. • Prepare a Final Project Fact Sheet at the project’s conclusion that discusses results. Use the format provided by the CAM. • Prepare a Technology/Knowledge Transfer Plan that includes: o An explanation of how the knowledge gained from the project will be made available to the public, including the targeted market sector and potential outreach to end users, utilities, regulatory agencies, and others.

  • FOREIGN ACCESS TO TECHNOLOGY This Article shall remain in effect during the term of the Agreement and for (INSERT NUMBER OF YEARS) ( ) years thereafter.

Time is Money Join Law Insider Premium to draft better contracts faster.