Installation and Use Rights You may install and use any number of copies of the software on your devices.
Authorization and Application of Overtime (a) An employee who is required to work overtime shall be entitled to overtime compensation when:
Use of the Services 1.1 We will make the Oracle services listed in Your order (the “Services”) available to You pursuant to this Agreement and Your order. Except as otherwise stated in this Agreement or Your order, You have the non- exclusive, worldwide, limited right to use the Services during the period defined in Your order, unless earlier terminated in accordance with this Agreement or Your order (the “Services Period”), solely for Your internal business operations. You may allow Your Users (as defined below) to use the Services for this purpose, and You are responsible for their compliance with this Agreement and Your order.
Your Use of the Services You agree to comply with U.S. or other applicable law regarding the transmission of any information obtained from the Services in accordance with this Agreement, not to use the Services for illegal purposes or in manner inconsistent with this Agreement, and not to interfere with or disrupt the networks connected to the Services. You agree to use the Services solely for your own noncommercial use and benefit, and not for resale or other transfer or disposition to, or use by or for the benefit of, anyone else. You agree that you will not take any action that imposes an unreasonable or disproportionately large load on our infrastructure. You acquire no rights to the Services and/or materials we provide to you other than the limited right to utilize the Services in accordance with this Agreement.
Allocation and use of scarce resources Any procedures for the allocation and use of scarce resources, including frequencies, numbers and rights of way, will be carried out in an objective, timely, transparent and non-discriminatory manner. The current state of allocated frequency bands will be made publicly available, but detailed identification of frequencies allocated for specific government uses is not required.
Collection and Use of Your Information You acknowledge that when you download, install, or use the Application, Company may use automatic means (including, for example, cookies and web beacons) to collect information about your Mobile Device and about your use of the Application. You also may be required to provide certain information about yourself as a condition to downloading, installing, or using the Application or certain of its features or functionality, and the Application may provide you with opportunities to share information about yourself with others. All information we collect through or in connection with this Application is subject to our Privacy Policy. By downloading, installing, using, and providing information to or through this Application, you consent to all actions taken by us with respect to your information in compliance with the Privacy Policy.
LIMITATIONS ON REVERSE ENGINEERING, DECOMPILATION AND DISASSEMBLY You may not reverse engineer, decompile, or disassemble the Software, except and only to the extent that such activity is expressly permitted by applicable law notwithstanding this limitation.
Application of Funding Techniques to Programs 6.3.1 The State shall apply the following funding techniques when requesting Federal funds for the component cash flows of the programs listed in sections 4.2 and 4.3 of this Agreement.
Your Use of the Service 4.1 You will not use the Service in any way that would constitute or contribute to the commission of a crime, tort, fraud, or other unlawful activity (including activities deemed unlawful under a complainant’s legal jurisdiction) (“Laws”). You will indemnify, and keep us fully indemnified, against all costs, claims, demands, expenses, and liabilities arising out of, or in connection with, any claim that the Service (or its use) infringes any Laws.
Malicious Use of Orphan Glue Records Registry Operator shall take action to remove orphan glue records (as defined at xxxx://xxx.xxxxx.xxx/en/committees/security/sac048.pdf) when provided with evidence in written form that such records are present in connection with malicious conduct.