We use cookies on our site to analyze traffic, enhance your experience, and provide you with tailored content.

For more information visit our privacy policy.

Reasonable Use Policy Sample Clauses

Reasonable Use Policy. Reachify is engineered to process and deliver traffic profiles and utilization levels of typical business client calling patterns. "Unlimited" refers to that type and level of usage, which is typically less than 10,000 minutes and 5,000 SMS messages per office per month. Below this threshold is considered reasonable use. For “unlimited” services, in the event the average number of minutes and/or messages per office per month exceeds this threshold, Reachify may apply a reasonable surcharge.
Reasonable Use PolicySubscription Services are designed for use by video professionals and hobbyists, and it is FILMPAC’s expectation that all Subscribers will not unreasonably overload xxxxxxx.xxx with requests for downloads. Accordingly, all Subscribers must
Reasonable Use Policy. ATG offers several calling plans and features which give Customers the freedom to make calls without the minute limits associated with most calling plans. However, because unlimited calling plans and features may be subject to abuse, fraud or unreasonable exploitation, ATG has prepared this Reasonable Use Policy ("Policy") as a guide for Customers. The Policy provides guidance regarding impermissible and unreasonable uses of ATG Services and features, and a summary of ATG's rights in the event that impermissible or unreasonable usage is identified.
Reasonable Use Policy. ‌ In order to ensure the best quality of the SERVICE, Cobisi may curtail unreasonable usage of accounts and sub-accounts for all clients; if a client appears to be unable to maintain a reasonable use of the SERVICE, Cobisi may cancel, suspend, or decline to renew subscriptions for that client without notice. It is within Cobisi' sole discretion to determine what comprises unreasonable use. Both accounts and sub-accounts in the SERVICE are for individual use only. Any non- individual use, or any use that is indistinguishable from non-individual use, is prohibited. For example, the following uses are prohibited: • sharing credentials between people or applications; • simultaneous logins from multiple IP addresses; • connecting from a proxy of any kind. SECURITY AND DATA RETENTION POLICY‌ Once the SERVICE finishes validating a batch of email addresses, the customer who submitted the data can download a detailed validation report in multiple formats, as described on the Verifalia website. Each customer can download multiple times his validation reports and, for security purposes, may even discard both all of the validation report data and the initial email addresses batch from the SERVICE database at his will. In addition to that, the SERVICE automatically deletes the aforementioned records after 30 days since the completion of each email validation batch. We do not sell, lend or market email addresses and use high security precautions to minimize the risk of having email addresses stolen from our databases, including the following best practices: - periodically check and upgrade both the operating system and the core system services; - monitor the SERVICE log to track possible malicious users; - both hash and salt clients passwords; - offer encrypted, HTTPS/SSL connections to our clients; - automatically delete uploaded lists of email addresses after 30 days since their completion. PRICING‌ Where a price for a product or service has been stated it should be assumed to represent units of United States Dollars (USD). Any exceptions to this rule will be specifically identified. The use of the Dollar sign ($) should likewise be taken to specify USD also. Prices listed on the Verifalia website are subject to change without prior notification. Orders will be charged at prices in effect on the transaction day. REFUND POLICY‌ All services rendered by Cobisi are provided on a non-refundable basis: this includes, but is not limited to, setup fees, recurring subscriptio...
Reasonable Use PolicySubscription Services are designed for use by Church professionals, and it is XXXX’s expectation that all Subscribers will not unreasonably overload xxxx.xx with requests for downloads. Accordingly, all Subscribers must comply
Reasonable Use Policy. CompuVoIP offers calling plans and features that give customers the freedom to make calls without the minute limits associated with most calling plans. However, because unlimited calling plans and features may be subject to abuse, fraud or unreasonable exploitation, CompuVoIP has prepared this Reasonable Use Policy as a guide for its customers. The policy provides guidance regarding impermissible and unreasonable use of CompuVoIP services and features and a summary of CompuVoIP’s rights in the event that impermissible or unreasonable usage is identified. Small business unlimited service plans and features are solely for normal commercial used by small businesses and home offices. Our voice services are designed only for continuous live dialogue between two individuals. Unusual calling patterns, excessive called numbers, and/or consistent excessive usage will be considered an indicator that the usage is exceeding normal standards. Our service and related devices may not be used in any way that is illegal, fraudulent, improper or inappropriate. It is prohibited to use any automated means to manipulate our service, use our service to violate any law, rule, or regulation, violate any third party’s intellectual property or personal rights or exceed permitted access to our service.

Related to Reasonable Use Policy

  • Acceptable Use Policy With respect to the Cloud Service, Customer will not: (a) disassemble, decompile, reverse-engineer, copy, translate or make derivative works, (b) transmit any content or data that is unlawful or infringes any intellectual property rights, or (c) circumvent or endanger its operation or security.

  • Acceptable Use Policy Agreement I understand that I must use school IT systems in a responsible way, to ensure that there is no risk to my safety or to the safety and security of the IT systems and other users. • I understand that the school will monitor my use of the IT systems, email and other digital communications. • I will treat my username and password like my toothbrush – I will not share it, nor will I try to use any other person’s username and password. • I will be aware of “stranger danger”, when I am communicating on-line. • I will not disclose or share personal information about myself or others when on-line. • If I arrange to meet people off-line that I have communicated with on-line, I will do so in a public place and take an adult with me. • I will immediately report any unpleasant or inappropriate material or messages or anything that makes me feel uncomfortable when I see it on-line. • I understand that the school IT systems are primarily intended for educational use and that I will not use the systems for personal or recreational use unless I have permission to do so. • I will not try (unless I have permission) to make large downloads or uploads that might take up internet capacity and prevent other users from being able to carry out their work. • I will not use the school IT systems for on-line gaming, on-line gambling, internet shopping, file sharing, or video broadcasting (e.g. YouTube), unless I have permission of a member of staff to do so. • I will respect others’ work and property and will not access, copy, remove or otherwise alter any other user’s files, without the owner’s knowledge and permission. • I will be polite and responsible when I communicate with others, I will not use strong, aggressive or inappropriate language and I appreciate that others may have different opinions. • I will not take or distribute images of anyone without their permission. • I will only use my personal hand held / external devices (mobile phones / USB devices etc) in school if I have permission. I understand that, if I do use my own devices in school, I will follow the rules set out in this agreement, in the same way as if I was using school equipment. • I understand the risks and will not try to upload, download or access any materials which are illegal or inappropriate or may cause harm or distress to others, nor will I try to use any programmes or software that might allow me to bypass the filtering / security systems in place to prevent access to such materials.

  • SUBSTANCE ABUSE POLICY See applicable administrative policy.

  • Violence Policies and Procedures The Employer agrees to have in place explicit policies and procedures to deal with violence. The policy will address the prevention of violence, the management of violent situations, provision of legal counsel and support to employees who have faced violence. The policies and procedures shall be part of the employee's health and safety policy and written copies shall be provided to each employee. Prior to implementing any changes to these policies, the employer agrees to consult with the Association.

  • SPAM POLICY You are strictly prohibited from using the Website or any of the Company's Services for illegal spam activities, including gathering email addresses and personal information from others or sending any mass commercial emails.

  • Compliance Policies and Procedures To assist the Fund in complying with Rule 38a-1 of the 1940 Act, BBH&Co. represents that it has adopted written policies and procedures reasonably designed to prevent violation of the federal securities laws in fulfilling its obligations under the Agreement and that it has in place a compliance program to monitor its compliance with those policies and procedures. BBH&Co will upon request provide the Fund with information about our compliance program as mutually agreed.

  • Sub-Advisor Compliance Policies and Procedures The Sub-Advisor shall promptly provide the Trust CCO with copies of: (i) the Sub-Advisor’s policies and procedures for compliance by the Sub-Advisor with the Federal Securities Laws (together, the “Sub-Advisor Compliance Procedures”), and (ii) any material changes to the Sub-Advisor Compliance Procedures. The Sub-Advisor shall cooperate fully with the Trust CCO so as to facilitate the Trust CCO’s performance of the Trust CCO’s responsibilities under Rule 38a-1 to review, evaluate and report to the Trust’s Board of Trustees on the operation of the Sub-Advisor Compliance Procedures, and shall promptly report to the Trust CCO any Material Compliance Matter arising under the Sub-Advisor Compliance Procedures involving the Sub-Advisor Assets. The Sub-Advisor shall provide to the Trust CCO: (i) quarterly reports confirming the Sub-Advisor’s compliance with the Sub-Advisor Compliance Procedures in managing the Sub-Advisor Assets, and (ii) certifications that there were no Material Compliance Matters involving the Sub-Advisor that arose under the Sub-Advisor Compliance Procedures that affected the Sub-Advisor Assets. At least annually, the Sub-Advisor shall provide a certification to the Trust CCO to the effect that the Sub-Advisor has in place and has implemented policies and procedures that are reasonably designed to ensure compliance by the Sub-Advisor with the Federal Securities Laws.

  • Contractor and Employee Security Precautions The security aspects of working at the Correctional Facility are critical. The following security precautions are part of the site conditions and are a part of this Contract. All persons coming on the site in any way connected with this Work shall be made aware of them, and it is the (General) Contractor’s responsibility to check and enforce them.

  • Drug-Free Workplace Policy Consultant shall provide a drug-free workplace by complying with all provisions set forth in City’s Council Policy 100-5, attached hereto as Exhibit “D” and incorporated herein by reference. Consultant’s failure to conform to the requirements set forth in Council Policy 100-5 shall constitute a material breach of this Agreement and shall be cause for immediate termination of this Agreement by City.

  • Discipline Policy A Discipline Policy Committee will be formed upon the request of the Association or the Board of Education. The committee will be comprised of members appointed by the Board and the Association. By the appropriate means determined by the Board, families will be informed of the District's policies regarding student behavior and discipline procedures. The foregoing committees, study groups, or faculty councils shall serve as advisory, consultative and fact-finding bodies only, and the Board shall not be required to adopt any of the recommendations submitted. The Board agrees, however, that the Association and the teachers shall have the right to submit recommendations and views on these subjects.