Responsible Use and Conduct Sample Clauses

Responsible Use and Conduct. In order to access our Resources, you may be required to provide certain information about yourself (such as identification, email, phone number, contact details, etc.) as part of the registration process, or as part of your ability to use the Resources. You agree that any information you provide will always be accurate, correct, and up to date. You are responsible for maintaining the confidentiality of any login information associated with any account you use to access our Resources. Accordingly, you are responsible for all activities that occur under your accounts. Accessing (or attempting to access) any of our Resources by any means other than through the means we provide, is strictly prohibited. You specifically agree not to access (or attempt to access) any of our Resources through any automated, unethical, or unconventional means. Engaging in any activity that disrupts or interferes with our Resources, including the servers and/or networks to which our Resources are located or connected, is strictly prohibited. Attempting to copy, duplicate, reproduce, sell, trade, or resell our resources is strictly prohibited. You are solely responsible for any consequences, losses, or damages that we may directly or indirectly incur or suffer due to any unauthorized activities conducted by you, as explained above, and may incur criminal or civil liability. We may provide various open communication tools on our website, such as blog comments, blog posts, public chat, forums, message boards, newsgroups, product ratings and reviews, various social media services, etc. You understand that generally we do not pre-screen or monitor the content posted by users of these various communication tools, which means that if you choose to use these tools to submit any type of content to our website, then it is your personal responsibility to use these tools in a responsible and ethical manner. By posting information or otherwise using any open communication tools as mentioned, you agree that you will not upload, post, share or otherwise distribute any content that: Is illegal, threatening, defamatory, abusive, harassing, degrading, intimidating, fraudulent, deceptive, invasive, racist, or contains any type of suggestive, inappropriate, or explicit language; Infringes on any trademark, patent, trade secret, copyright, or other proprietary rights of any party; Contains any type of unauthorized or unsolicited advertising; Impersonates any person or entity, including any xxx.xxxxxxx...
AutoNDA by SimpleDocs
Responsible Use and Conduct. 1 It must be signed before a student participates in a BYOT Program. Please submit this form to the Building Principal. Dear Parents/Guardians:
Responsible Use and Conduct a. In order to access our Resources, you may be required to provide certain information about yourself (such as identification, email, phone number, contact details, etc.) as part of the registration process, or as part of your ability to use the Resources. You agree that any information you provide will always be accurate, correct, and up to date. b. You are responsible for maintaining the confidentiality of any login information associated with any account you use to access our Resources. Accordingly, you are responsible for all activities that occur under your accounts. c. In order to prepare your return, to file your return, to provide advice about tax matters, and/or to provide an audit defense service, you will need to provide information about your income, deductions, credits, dependents, etc. Collectively, this information is known as tax return information. In order to use XxxXxxxx.xxx Services, you will need to provide your tax return information. You agree that any information you give to XxxXxxxx.xxx will always be accurate, correct and up to date. d. You agree that you are solely responsible for (and that XxxXxxxx.xxx has no responsibility to you or to any third party for) any breach of your obligations under the Terms and for the consequences (including any loss or damage which XxxXxxxx.xxx may suffer) of any such breach. e. If you file tax returns for another individual, you should be doing so with the consensus of that individual after fully understanding the implications of this action. XxxXxxxx.xxx will not be held responsible if you are doing this without the knowledge / consensus of that person concerned. f. Accessing (or attempting to access) any of our Resources by any means other than through the means we provide, is strictly prohibited. You specifically agree not to access (or attempt to access) any of our Resources through any automated, unethical or unconventional means. g. Engaging in any activity that disrupts or interferes with our Resources, including the servers and/or networks to which our Resources are located or connected, is strictly prohibited. h. Attempting to copy, duplicate, reproduce, sell, trade, or resell our resources is strictly prohibited. i. We may provide various open communication tools on our website, such as blog comments, blog posts, public chat, forums, message boards, newsgroups, product ratings and reviews, various social media services, etc. You understand that generally we do not pre-screen or monitor...
Responsible Use and Conduct. In order to access our Resources/ , you may be required to provide certain information about yourself (such as identification, email, phone number, contact details, etc.) as part of the registration process, or as part of your ability to use the Resources. You agree that any information you provide will always be accurate, correct, and up to date. You are responsible for maintaining the confidentiality of any login information associated with any account you use to access our Resources. Accordingly, you are responsible for all activities that occur under your accounts. Accessing (or attempting to access) any of our Resources/ by any means other than through the means we provide, is strictly prohibited. You specifically agree not to access (or attempt to access) any of our Resources/ through any automated, unethical or unconventional means. Violating the terms of the present clause shall be dealt under the relevant laws at the courts in New Delhi. Engaging in any activity that disrupts or interferes with our Resources/ , including the servers and/or networks to which our Resources / are located or connected, is strictly prohibited. Attempting to copy, duplicate, reproduce, sell, trade, or resell our Resources / is strictly prohibited. Violating the terms of the present clause shall be dealt under the relevant laws at the courts in New Delhi. You are solely responsible for any consequences, losses, or damages that we may directly or indirectly incur or suffer due to any unauthorized activities conducted by you, as explained above, and may incur criminal or civil liability. MTS believes strongly in protecting user privacy, which is why a separate Privacy Policy have been created in order to explain in detail how we collect, manage, process, secure, and store your private information. Please refer to MTS privacy policy, incorporated by reference herein, that is posted on the Website.
Responsible Use and Conduct. 4.1 Depending on your option of license, you oblige when accessing the services we provide, you agree to use these Services only for the purposes permitted by (a) these Terms and (b) applicable appendixes and descriptions, and applicable governing laws. Wherein, you understand that; In order to access or use our Services, you may be required to provide certain information about yourself (such as identification, contact details, etc.) as part of the registration process or as part of your ability to use the Services. You agree that any information you provide will always be accurate, correct and up to date. 4.2 You are responsible for, if applicable, maintaining the confidentiality of any login information associated with any account you use to access our Services. Accordingly, you are responsible for all activities that occur under your account(s). You may only permit authorized users who possess rightfully obtained login information to use the Services, and you must ensure that anyone who uses the Services does so within the confines of your authorization and are compliant with these Terms. You may not make the Services or any login information available to any third party, including, without limitation, in any form by rental, service bureau, hosting, time sharing arrangement or demonstration of the Services to any third party. You may not use the Services for the benefit of a third party. You may not disclose to any third party the results of any benchmarking or comparative study or analysis involving the Services. 4.3 Accessing (or attempting to access) any of our Services by any means other than through the means we provide is strictly prohibited. You specifically agree not to access (or attempt to access) any of our Services through any automated, unethical, or unconventional means. 4.4 Engaging in any activity that disrupts or interferes with our Services, including the servers and/or networks at which our Services are located or to which they are connected, is strictly prohibited. This includes restricting in any way any other authorized user from using the Services. We may suspend your use of the Safestate Services if your use causes or is reasonably likely to cause damage to the Safestate Service or another customer. 4.5 Attempting to copy, duplicate, reproduce, sell, trade, or resell our Services is strictly prohibited unless otherwise agreed to in writing. 4.6 The Services may not be used in any way that is unlawful or which xxxxx Safestate (or ...
Responsible Use and Conduct. In order to access our Resources/ , you may be required to provide certain information about yourself (such as identification, email, phone number, contact details, etc.) as part of the registration process, or as part of your ability to use the Resources. You agree that any information you provide will always be accurate, correct, and up to date. • You are responsible for maintaining the confidentiality of any login information associated with any account you use to access our Resources/ . Accordingly, you are responsible for all activities that occur under your accounts. • Accessing (or attempting to access) any of our Resources/ by any means other than through the means we provide, is strictly prohibited. You specifically agree not to access (or attempt to access) any of our Resources/ through any automated, unethical or unconventional means. • Engaging in any activity that disrupts or interferes with our Resources/ , including the servers and/or networks to which our Resources / are located or connected, is strictly prohibited. • Attempting to copy, duplicate, reproduce, sell, trade, or resell our Resources / is strictly prohibited. • You are solely responsible for any consequences, losses, or damages that we may directly or indirectly incur or suffer due to any unauthorized activities conducted by you, as explained above, and may incur criminal or civil liability. Campsvilla Outdoors Pvt ltd believes strongly in protecting user privacy, which is why a separate Privacy Policy has been created in order to explain in detail how we collect, manage, process, secure, and store your private information. Please refer to Campsvilla Outdoors Pvt ltd privacy policy, incorporated by reference herein, that is posted on the Website.
Responsible Use and Conduct. By using the Services either directly or indirectly, you agree to use these Services only for the purposes intended as permitted by (a) this Agreement, (b) applicable laws, regulations and generally accepted online practices or guidelines, and (c) the terms and conditions imposed by the insurers. WHEREIN, YOU UNDERSTAND THAT:
AutoNDA by SimpleDocs
Responsible Use and Conduct. By visiting our website and accessing the information, resources, services, products, and tools we provide for you, either directly or indirectly (hereafter referred to as ‘Resources’), you agree to use these Resources only for the purposes intended as permitted by (a) the terms of this User Agreement, and (b) applicable laws, regulations and generally accepted online practices or guidelines. Wherein, you understand that:
Responsible Use and Conduct. In order to access our Resources/ , you may be required to provide certain information about yourself (such as identification, email, phone number, contact details, etc.) as part of the registration process, or as part of your ability to use the Resources. You agree that any information you provide will always be accurate, correct, and up to date. • You are responsible for maintaining the confidentiality of any login information associated with any account you use to access our Resources/ . Accordingly, you are responsible for all activities that occur under your accounts. • Accessing (or attempting to access) any of our Resources/ by any means other than through the means we provide, is strictly prohibited. You specifically agree not to access (or attempt to access) any of our Resources/ through any automated, unethical or unconventional means. • Engaging in any activity that disrupts or interferes with our Resources/ , including the servers and/or networks to which our Resources / are located or connected, is strictly prohibited. • Attempting to copy, duplicate, reproduce, sell, trade, or resell our Resources / is strictly prohibited. • You are solely responsible for any consequences, losses, or damages that we may directly or indirectly incur or suffer due to any unauthorized activities conducted by you, as explained above, and may incur criminal or civil liability.

Related to Responsible Use and Conduct

  • Requester and Approved User Responsibilities The Requester agrees through the submission of the DAR that the PI named has reviewed and understands the principles for responsible research use and data management of the genomic datasets as defined in the NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy. The Requester and Approved Users further acknowledge that they are responsible for ensuring that all uses of the data are consistent with national, tribal, and state laws and regulations, as appropriate, as well as relevant institutional policies and procedures for managing sensitive genomic and phenotypic data. The Requester certifies that the PI is in good standing (i.e., no known sanctions) with the institution, relevant funding agencies, and regulatory agencies and is eligible to conduct independent research (i.e., is not a postdoctoral fellow, student, or trainee). The Requester and any Approved Users may use the dataset(s) only in accordance with the parameters described on the study page and in the 1 If contractor services are to be utilized, PI requesting the data must provide a brief description of the services that the contractor will perform for the PI (e.g., data cleaning services) in the research use statement of the DAR. Additionally, the Key Personnel section of the DAR must include the name of the contractor’s employee(s) who will conduct the work. These requirements apply whether the contractor carries out the work at the PI’s facility or at the contractor’s facility. In addition, the PI is expected to include in any contract agreement requirements to ensure that any of the contractor’s employees who have access to the data adhere to the NIH GDS Policy, this Data Use Certification Agreement, and the NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy. Note that any scientific collaborators, including contractors, who are not at the Requester must submit their own DAR. Addendum to this Agreement for the appropriate research use, as well as any limitations on such use, of the dataset(s), as described in the DAR, and as required by law. Through the submission of this DAR, the Requester and Approved Users acknowledge receiving and reviewing a copy of the Addendum which includes Data Use Limitation(s) for each dataset requested. The Requester and Approved Users agree to comply with the terms listed in the Addendum. Through submission of the DAR, the PI and Requester agree to submit a Project Renewal or Project Close-out prior to the expiration date of the one (1) year data access period. The PI also agrees to submit an annual Progress Update prior to the one (1) year anniversary2 of the project, as described under Research Use Reporting (Term 10) below. By approving and submitting the attached DAR, the Institutional Signing Official provides assurance that relevant institutional policies and applicable local, state, tribal, and federal laws and regulations, as applicable, have been followed, including IRB approval, if required. Approved Users may be required to have IRB approval if they have access to personal identifying information for research participants in the original study at their institution, or through their collaborators. The Institutional Signing Official also assures, through the approval of the DAR, that other institutional departments with relevant authorities (e.g., those overseeing human subjects research, information technology, technology transfer) have reviewed the relevant sections of the NIH GDS Policy and the associated procedures and are in agreement with the principles defined. The Requester acknowledges that controlled-access datasets subject to the NIH GDS Policy may be updated to exclude or include additional information. Unless otherwise indicated, all statements herein are presumed to be true and applicable to the access and use of all versions of these datasets.

  • Business Conduct Merger Sub was formed on December 3, 2020. Since its inception, Merger Sub has not engaged in any activity, other than such actions in connection with (a) its organization and (b) the preparation, negotiation and execution of this Agreement and the Transactions. Merger Sub has no operations, has not generated any revenues and has no liabilities other than those incurred in connection with the foregoing and in association with the Merger as provided in this Agreement.

  • General Conduct The BSC has specific policies governing conduct in the units, including, but not limited to, assault, harassment, sexual harassment, host, alcohol, party and substance abuse policies. Member agrees to read and abide by these policies. Failure to follow BSC conduct policies will lead to a range of sanctions up to and including termination of this contract and BSC membership.

  • Anti-Money Laundering and Identity Theft Prevention Related Duties Subject to the terms and conditions set forth herein, the Trust hereby delegates to the Transfer Agent the Delegated Anti-Money Laundering Duties and, where applicable, the Delegated Identity Theft Prevention Duties that are set forth in the Trust’s Anti-Money Laundering (“AML”) Program and Identity Theft Prevention Program (“IDTPP”) as described below. The Transfer Agent agrees to perform the Delegated Anti-Money Laundering Duties and the Delegated Identity Theft Prevention Duties, with respect to ownership of shares in the Fund for which the Transfer Agent maintains the applicable information subject to and in accordance with the terms and conditions of the Contract.

  • Authorization to Release and Transfer Necessary Personal Information The Grantee hereby explicitly and unambiguously consents to the collection, use and transfer, in electronic or other form, of the Grantee’s personal data by and among, as applicable, the Company and its Subsidiaries for the exclusive purpose of implementing, administering and managing the Grantee’s participation in the Plan. The Grantee understands that the Company may hold certain personal information about the Grantee, including, but not limited to, the Grantee’s name, home address and telephone number, date of birth, social security number (or any other social or national identification number), salary, nationality, job title, number of Award Units and/or shares of Common Stock held and the details of all Award Units or any other entitlement to shares of Common Stock awarded, cancelled, vested, unvested or outstanding for the purpose of implementing, administering and managing the Grantee’s participation in the Plan (the “Data”). The Grantee understands that the Data may be transferred to the Company or to any third parties assisting in the implementation, administration and management of the Plan, that these recipients may be located in the Grantee’s country or elsewhere, and that any recipient’s country (e.g., the United States) may have different data privacy laws and protections than the Grantee’s country. The Grantee understands that he or she may request a list with the names and addresses of any potential recipients of the Data by contacting his or her local human resources representative or the Company’s stock plan administrator. The Grantee authorizes the recipients to receive, possess, use, retain and transfer the Data, in electronic or other form, for the sole purpose of implementing, administering and managing the Grantee’s participation in the Plan, including any requisite transfer of such Data to a broker or other third party assisting with the administration of Award Units under the Plan or with whom shares of Common Stock acquired pursuant to the vesting of the Award Units or cash from the sale of such shares may be deposited. Furthermore, the Grantee acknowledges and understands that the transfer of the Data to the Company or to any third parties is necessary for the Grantee’s participation in the Plan. The Grantee understands that the Grantee may, at any time, view the Data, request additional information about the storage and processing of the Data, require any necessary amendments to the Data or refuse or withdraw the consents herein by contacting the Grantee’s local human resources representative or the Company’s stock plan administrator in writing. The Grantee further acknowledges that withdrawal of consent may affect his or her ability to vest in or realize benefits from the Award Units, and the Grantee’s ability to participate in the Plan. For more information on the consequences of refusal to consent or withdrawal of consent, the Grantee understands that he or she may contact his or her local human resources representative or the Company’s stock plan administrator.

  • Insurance and Fingerprint Requirements Information Insurance If applicable and your staff will be on TIPS member premises for delivery, training or installation etc. and/or with an automobile, you must carry automobile insurance as required by law. You may be asked to provide proof of insurance. Fingerprint It is possible that a vendor may be subject to Chapter 22 of the Texas Education Code. The Texas Education Code, Chapter 22, Section 22.0834. Statutory language may be found at: xxxx://xxx.xxxxxxxx.xxxxx.xxxxx.xx.xx/ If the vendor has staff that meet both of these criterion: (1) will have continuing duties related to the contracted services; and (2) has or will have direct contact with students Then you have ”covered” employees for purposes of completing the attached form. TIPS recommends all vendors consult their legal counsel for guidance in compliance with this law. If you have questions on how to comply, see below. If you have questions on compliance with this code section, contact the Texas Department of Public Safety Non-Criminal Justice Unit, Access and Dissemination Bureau, FAST-FACT at XXXX@xxxxx.xxxxx.xx.xx and you should send an email identifying you as a contractor to a Texas Independent School District or ESC Region 8 and TIPS. Texas DPS phone number is (000) 000-0000. See form in the next attribute to complete entitled: Texas Education Code Chapter 22 Contractor Certification for Contractor Employees

  • Reasonable Suspicion Testing All Employees Performing Safety-Sensitive Functions A. Reasonable suspicion testing for alcohol or controlled substances may be directed by the Employer for any employee performing safety-sensitive functions when there is reason to suspect that alcohol or controlled substance use may be adversely affecting the employee’s job performance or that the employee may present a danger to the physical safety of the employee or another. B. Specific objective grounds must be stated in writing that support the reasonable suspicion. Examples of specific objective grounds include but are not limited to: 1. Physical symptoms consistent with alcohol and/or controlled substance use; 2. Evidence or observation of alcohol or controlled substance use, possession, sale, or delivery; or 3. The occurrence of an accident(s) where a trained manager, supervisor or lead worker suspects alcohol or other controlled substance use may have been a factor.

  • Customer Information and Release Authorization Throughout this Agreement, you authorize Clearview Energy or its agents to obtain and review information from credit-reporting agencies regarding your credit history and information from the Utility relating to you and your account that includes, but is not limited to: account name and number; billing history; payment history; rate classification; historical and future electricity usage; meter readings; and characteristics of electricity service. Clearview Energy will not provide or sell such information to any other party without your consent unless required to do so by law, or it is necessary to enforce the terms of this Agreement. Clearview Energy reserves the right to reject your enrollment, or terminate this Agreement, in the event you rescind these authorizations.

  • Handling Sensitive Personal Information and Breach Notification A. As part of its contract with HHSC Contractor may receive or create sensitive personal information, as section 521.002 of the Business and Commerce Code defines that phrase. Contractor must use appropriate safeguards to protect this sensitive personal information. These safeguards must include maintaining the sensitive personal information in a form that is unusable, unreadable, or indecipherable to unauthorized persons. Contractor may consult the “Guidance to Render Unsecured Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals” issued by the U.S. Department of Health and Human Services to determine ways to meet this standard. B. Contractor must notify HHSC of any confirmed or suspected unauthorized acquisition, access, use or disclosure of sensitive personal information related to this Contract, including any breach of system security, as section 521.053 of the Business and Commerce Code defines that phrase. Contractor must submit a written report to HHSC as soon as possible but no later than 10 business days after discovering the unauthorized acquisition, access, use or disclosure. The written report must identify everyone whose sensitive personal information has been or is reasonably believed to have been compromised. C. Contractor must either disclose the unauthorized acquisition, access, use or disclosure to everyone whose sensitive personal information has been or is reasonably believed to have been compromised or pay the expenses associated with HHSC doing the disclosure if: 1. Contractor experiences a breach of system security involving information owned by HHSC for which disclosure or notification is required under section 521.053 of the Business and Commerce Code; or 2. Contractor experiences a breach of unsecured protected health information, as 45 C.F.R. §164.402 defines that phrase, and HHSC becomes responsible for doing the notification required by 45 C.F.R. §164.404. HHSC may, at its discretion, waive Contractor's payment of expenses associated with HHSC doing the disclosure.

  • CAUTIONS FOR GLOBAL USE AND EXPORT AND IMPORT COMPLIANCE Due to the global nature of the internet, through the use of our network you hereby agree to comply with all local rules relating to online conduct and that which is considered acceptable Content. Uploading, posting and/or transferring of software, technology and other technical data may be subject to the export and import laws of the United States and possibly other countries. Through the use of our network, you thus agree to comply with all applicable export and import laws, statutes and regulations, including, but not limited to, the Export Administration Regulations (xxxx://xxx.xxxxxx.xxx.xxx/bis/ear/ear_data.html), as well as the sanctions control program of the United States (xxxx://xxx.xxxxxxxx.xxx/resource- center/sanctions/Programs/Pages/Programs.aspx). Furthermore, you state and pledge that you:

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!