Reporting Unacceptable Use Sample Clauses

Reporting Unacceptable Use. Provider requests that anyone with information about a violation of this AUP report it to the following address: Caselle, Inc. 0000 X Xxxx Xxx Xxxx, Xxxxx 000, Xxxxx, Xxxx 00000. Please provide the date and time of the violation and any identifying information regarding the violator, including e-mail or IP (internet protocol) address if available, as well as details of the violation.
AutoNDA by SimpleDocs
Reporting Unacceptable Use. Vendor requests that anyone with information about a violation of this AUP report it via e-mail to the following address: xxxxxxx@xxxxxxxx.xxx. Please provide the date and time (with time zone) of the violation and any identifying information regarding the violator, including e-mail or IP (Internet Protocol) address if available, as well as details of the violation.
Reporting Unacceptable Use. Decipher requests that anyone with information about a violation of this AUP report it via an e-mail to the following address: xxxx@xxxxxxxxxxx.xxx. Please provide the date and time (with time zone) of the violation and any identifying information regarding the violator, including e-mail or IP (internet protocol) address if available, as well as details of the violation.
Reporting Unacceptable Use. CDS requests that anyone with information about a violation of any unacceptable use of the Services to report it via e-mail to the following address: xxxxxxx@xxxxxxxxxxxxxxx.xxx with subject, “R360 Unacceptable Use Report”. Please provide the date and time (with time zone) of the violation and any identifying information regarding the violator, including e-mail or IP (Internet Protocol) address if available, as well as details of the violation.
Reporting Unacceptable Use. If an employee feels that they are being unfairly disadvantaged by another employee, harassed or otherwise put in an compromising position due to misuse of the Unions email or internet use, the employee should a) Save any documents emails or other evidence regarding the alleged breach b) Advise the Secretary of the alleged breach of procedure
Reporting Unacceptable Use. Situm requests that anyone with information about a violation of this AUP report it via e-mail to the following address: xxxxx@xxxxx.xx. Please provide the date and time (with time zone) of the violation and any identifying information regarding the violator, including e-mail or IP (Internet Protocol) address if available, as well as details of the violation. This Data Processing Agreement (“DPA”) forms part of the Master Subscription Agreement (the “Agreement”) between the Customer and SITUM TECHNOLOGIES S.L. (“Situm”) to reflect the parties agreement in regards to the processing of Personal Data during the provision of the Subscriptions Services (the “Services”) to the Customer and in accordance with the requirements of the EU Regulation 2016/769 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (the “GDPR”). In the course of providing the Services, Situm (hereinafter referred to as the “DATA PROCESSOR”) may process Personal Data on behalf of the Customer (hereinafter referred to as the “DATA CONTROLLER”) and the Parties agree to comply with the following provisions with respect to any Personal Data, each acting reasonably and in good faith. This Data Processing Agreement shall apply to the services provided by Situm as well as any future contracted data processing services, which Situm provides on behalf of the Customer and to all other activities in which employees of Situm come into contact with, or may come into contact with personal data controlled by the Customer, or when the possibility of this contact cannot be ruled out. The definitions in Art. 4 of the GDPR shall apply to all the terms used in this Data Processing Agreement.
Reporting Unacceptable Use. Students are responsible for maintaining the integrity of St. Ignatius, Martyr Catholic School’s One to One Chromebook™ Computer program and reporting any violations of this policy.
AutoNDA by SimpleDocs
Reporting Unacceptable Use. Students are responsible for maintaining the integrity of the Highland Falls - Fort Xxxxxxxxxx CSD Student Code of Conduct and reporting any violations of this policy.
Reporting Unacceptable Use. The Church requests that anyone with information about violation of this AUP report it via e-mail to xxxxx.xxxxx@xxxxxxxx.xxx. Please provide the date and time of the violation and any identifying information regarding the violator, including e-mail or IP (Internet Protocol) address if available, as well as details of the violation.

Related to Reporting Unacceptable Use

  • Unacceptable Use Unacceptable use of the school’s ICT facilities includes: Using the school’s ICT facilities to breach intellectual property rights or copyright Using the school’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Online gambling, inappropriate advertising, phishing and/or financial scams Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate or harmful Consensual and non-consensual sharing of nude and semi-nude images and/or videos and/or livestreams Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its students, or other members of the school community Connecting any device to the school’s ICT network without approval from authorised personnel Setting up any software, applications or web services on the school’s network without approval by authorised personnel, or creating or using any programme, tool or item of software designed to interfere with the functioning of the school’s ICT facilities, accounts or data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel Allowing, encouraging or enabling others to gain (or attempt to gain) unauthorised access to the school’s ICT facilities Causing intentional damage to the school’s ICT facilities Removing, deleting or disposing of the school’s ICT equipment, systems, programmes or information without permission from authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not permitted by authorised personnel to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to the school Using websites or mechanisms to bypass the school’s filtering or monitoring mechanisms Engaging in content or conduct that is radicalised, extremist, racist, antisemitic or discriminatory in any other way Inappropriate use of AI tools and generative chatbots (such as ChatGPT and Google Bard) to generate text or imagery presented as original work. This is not an exhaustive list. The school reserves the right to amend this list at any time. The headteacher or other relevant member of the SLT will use their professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s ICT facilities.

  • Acceptable Use You agree that you are independently responsible for complying with all applicable laws in all of your activities related to your use of the Service, regardless of the purpose of the use, and for all communications you send through the Service. We and our Service Providers have the right but not the obligation to monitor and remove communications content that we find in our sole discretion to be objectionable in any way. In addition, you are prohibited from using the Service for communications or activities that: (a) violate any law, statute, ordinance or regulation; (b) promote hate, violence, racial intolerance, or the financial exploitation of a crime; (c) defame, abuse, harass or threaten others; (d) include any language or images that are bigoted, hateful, racially offensive, vulgar, obscene, indecent or discourteous; (e) infringe or violate any copyright, trademark, right of publicity or privacy or any other proprietary right under the laws of any jurisdiction; (f) impose an unreasonable or disproportionately large load on our infrastructure; (g) facilitate any viruses, trojan horses, worms or other computer programming routines that may damage, detrimentally interfere with, surreptitiously intercept or expropriate any system, data or information; (h) constitute use of any robot, spider, other automatic device, or manual process to monitor or copy the Service or the portion of the Site through which the Service is offered without our prior written permission; (i) constitute use of any device, software or routine to bypass technology protecting the Site or Service, or interfere or attempt to interfere, with the Site or the Service; or (j) may cause us or our Service Providers to lose any of the services from our internet service providers, payment processors, or other vendors. We encourage you to provide notice to us by the methods described in Section 6 of the General Terms above of any violations of the General Terms or the Agreement generally.

  • Loop Testing/Trouble Reporting 2.1.6.1 Telepak Networks will be responsible for testing and isolating troubles on the Loops. Telepak Networks must test and isolate trouble to the BellSouth portion of a designed/non-designed unbundled Loop (e.g., UVL-SL2, UCL-D, UVL-SL1, UCL-ND, etc.) before reporting repair to the UNE Customer Wholesale Interconnection Network Services (CWINS) Center. Upon request from BellSouth at the time of the trouble report, Telepak Networks will be required to provide the results of the Telepak Networks test which indicate a problem on the BellSouth provided Loop. 2.1.6.2 Once Telepak Networks has isolated a trouble to the BellSouth provided Loop, and had issued a trouble report to BellSouth on the Loop, BellSouth will take the actions necessary to repair the Loop if a trouble actually exists. BellSouth will repair these Loops in the same time frames that BellSouth repairs similarly situated Loops to its End Users. 2.1.6.3 If Telepak Networks reports a trouble on a non-designed or designed Loop and no trouble actually exists, BellSouth will charge Telepak Networks for any dispatching and testing (both inside and outside the CO) required by BellSouth in order to confirm the Loop’s working status. 2.1.6.4 In the event BellSouth must dispatch to the end-user’s location more than once due to incorrect or incomplete information provided by Telepak Networks (e.g., incomplete address, incorrect contact name/number, etc.), BellSouth will xxxx Xxxxxxx Networks for each additional dispatch required to repair the circuit due to the incorrect/incomplete information provided. BellSouth will assess the applicable Trouble Determination rates from BellSouth’s FCC or state tariffs.

  • Acceptable Use Policy Publisher agrees that it will not, either by itself or by authorizing or encouraging others to do so, directly or indirectly: (a) use, post or promote the Widget or any Recommendations in association with any material or content which is, or which may reasonably be considered illegal, unlawful or infringing under any applicable laws (including, without limitation, content which infringes a third party copyright (i.e. illegal streaming website)), pornographic, obscene, promotional of illicit drugs and drug paraphernalia, gambling-related (unless legal in the location offered), weapon or ammunition-related (unless legal in the location offered), violent, libelous, defamatory, indecent, seditious, offensive, invasive to privacy, abusive, threatening, harmful, vulgar, possibly capable of inciting racial hatred, discriminatory (racially, ethnically or otherwise), in breach of confidence or any other right of any third party, or lacking in necessary authorizations, approvals, consents or licenses; (b) engage in any action or practice that disparages or devalues Taboola (or its affiliates), the Widget, Taboola Sponsored Content, or the reliability, reputation or goodwill of any of them; (c) modify, change, edit, amend, truncate, alter, bypass or reorder any aspect of the Widget or Recommendations; (d) take any action that might impede Taboola’s provision of the Service, including, without limitation, the following actions: (i) placing the Widget in an iFrame; (ii) altering the appearance of the Widget by placing it in a container or otherwise; (iii) adding Publisher’s own code onto the Widget; (iv) overriding Taboola’s code on the Widget; and/or (v) removing the Widget from certain Website pages; (e) generate clicks on Recommendations, or generate Recommendation Pageviews, that Taboola believes, in its sole discretion, is through any automated, deceptive, fraudulent or other means that is designed to generate clicks or Recommendation Pageviews that are not the willing actions of human end users who possess an independent, genuine desire to engage with the content that appears on the relevant page(s), including but not limited to, through (i) repeated manual clicks, use of robots or other automated tools or computer generated requests, (ii) participation in pay-per-click programs, (iii) redirection of search requests to pages that do not contain content reasonably relevant to the search query, or (iv) the provision of consideration to any third party in exchange for the third party causing any Clicks or Recommendation Pageviews to occur; (f) copy, crawl, index, cache or store any information derived by Taboola, or contained in or concerning a Recommendation; or (g) provide Taboola any personally identifiable information concerning any Visitor or other person (“PII”). Clause (e) of the previous sentence shall be deemed to have been violated (x) if traffic is not converting above a certain threshold as determined by Taboola in its sole discretion or if Publisher’s Website’s result in low post-click performance, or (y) by any Recommendation Pageviews that Taboola determines, in its sole discretion, were the result of transfers or referrals of Visitors to a Website by a third party content distribution service provider and that resulted in a monthly click-through rate that was less than fifty percent (50%) of the click-through rate experienced by the remainder of the Recommendation Pageviews that occurred on the Website during the same month. A “Recommendation Pageview” shall be deemed to have occurred each unique time the Widget is rendered on the Desktop, Mobile Optimized, Tablet, App Website article page as shown in Appendix A, as determined by Taboola and reported on Taboola’s analytic dashboard and shall not include any Pageviews that are not human initiated. Notwithstanding anything to the contrary herein, Taboola shall have the right to immediately terminate this Agreement without prior notice to Publisher and to remove the Widget from the Website(s) with no further obligation to Publisher in the event of Publisher’s violation of the foregoing Acceptable Use Policy.

  • ACCEPTABLE USE RESTRICTIONS You must: (a) not use the App or any Service in any unlawful manner, for any unlawful purpose, or in any manner inconsistent with this XXXX, or act fraudulently or maliciously, for example, by hacking into or inserting malicious code, including viruses, or harmful data, into the App, any Service or any operating system; (b) not infringe our intellectual property rights or those of any third party in relation to your use of the App or any Service(to the extent that such use is not licensed by this XXXX); (c) not transmit any material that is defamatory, offensive or otherwise objectionable in relation to your use of the App or any Service; (d) not use the App or any Service in a way that could damage, disable, overburden, impair or compromise our systems or security or interfere with other users; and (e) not collect or harvest any information or data from any Service or our systems or attempt to decipher any transmissions to or from the servers running any Service.

  • Updated Information Submission by Interconnection Customer The updated information submission by the Interconnection Customer, including manufacturer information, shall occur no later than one hundred eighty (180) Calendar Days prior to the Trial Operation. The Interconnection Customer shall submit a completed copy of the Electric Generating Unit data requirements contained in Appendix 1 to the LGIP. It shall also include any additional information provided to the Participating TO and the CAISO for the Interconnection Studies. Information in this submission shall be the most current Electric Generating Unit design or expected performance data. Information submitted for stability models shall be compatible with the Participating TO and CAISO standard models. If there is no compatible model, the Interconnection Customer will work with a consultant mutually agreed to by the Parties to develop and supply a standard model and associated information.

  • Substance Abuse Treatment Information Substance abuse treatment information shall be maintained in compliance with 42 C.F.R. Part 2 if the Party or subcontractor(s) are Part 2 covered programs, or if substance abuse treatment information is received from a Part 2 covered program by the Party or subcontractor(s).

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!