Restricted Use of the Services Sample Clauses

Restricted Use of the Services. You shall not, and shall not permit any users of the Services or any other party to, engage in, solicit, or promote any activity that is objectionable or may be illegal, violates the rights of others, is likely to cause notoriety, harm or damage to the reputation of Intuit or could subject Intuit to liability to third parties, including: (i) unauthorized access, monitoring, interference with, or use of the Services or third party accounts, data, computers, systems or networks; (ii) interference with others’ use of the Services or any system or network, including mail bombing, broadcast or denial of service attacks; (iii) unauthorized collection or use of personal or confidential information, including phishing, pharming, spidering, and harvesting; (iv) viewing or other use of any Content that, in Intuit’s opinion, is prohibited under this Agreement; (v) any other activity that places Intuit in the position of fostering, or having potential or actual liability for, illegal activity in any jurisdiction; or (vi) attempting to probe, scan, penetrate or test the vulnerability of an Intuit system or network or to breach Intuit’s security or authentication measures, whether by passive or intrusive techniques. Intuit reserves the right to not authorize and may terminate your use of the Services based on reasonable suspicion of your activities, business, products or services that are objectionable or promote, support or engage in any of the restricted uses described above.
AutoNDA by SimpleDocs
Restricted Use of the Services. You shall not, and shall not permit any users of the Services or any other party to, engage in, solicit, or promote any activity that is objectionable or may be illegal, violates the rights of others, is likely to cause notoriety, harm or damage to the reputation of VS1 Cloud or could subject VS1 Cloud to liability to third parties, including: (i) unauthorized access, monitoring, interference with, or use of the Services or third party accounts, data, computers, systems or networks; (ii) interference with others’ use of the Services or any system or network, including mail bombing, broadcast or denial of service attacks; (iii) unauthorized collection or use of personal or confidential information, including phishing, pharming, spidering, and harvesting;
Restricted Use of the Services. 5.2.1. You agree not to use, nor permit any third party to use, the Services to upload, post, distribute, link to, publish, reproduce, engage in, promote or transmit any of the following, including but not limited to: a. Illegal, fraudulent, defamatory, obscene, pornographic, profane, threatening, abusive, hateful, harassing, offensive, inappropriate or objectionable information or communications of any kind, including without limitation conduct that is excessively violent, incites or threatens violence, encourages would encourage "flaming" others, or criminal or civil liability under any local, state, federal or foreign law; b. Content that would impersonate someone else or falsely represent your identity or qualifications, or that may constitute a breach of any individual's privacy; is illegally unfair or deceptive, or creates a safety or health risk to an individual to the public; c. Except as permitted by FSI in writing, investment opportunities, solicitations, chain letters, pyramid schemes, other unsolicited commercial communication or engage in spamming or flooding; d. Virus, Trojan horse, worm or other disruptive or harmful software or data; and e. Any information, software or Content that you do not own or have the right to use which is not legally yours and without permission from the copyright owner or intellectual property rights owners thereof. 5.2.2. You shall not, and shall not permit any users of the Services or any other party to, engage in, solicit, or promote any activity that is objectionable or may be illegal, violates the rights of others, is likely to cause notoriety, harm or damage to the reputation of FSI or could subject FSI to liability to third parties, including: (i) unauthorized access, monitoring, interference with, or use of the Services or third party accounts, data, computers, systems or networks; (ii) interference with others' use of the Services or any system or network, including mail bombing, broadcast or denial of service attacks; (iii) unauthorized collection or use of personal or confidential information, including phishing, pharming, spidering, and harvesting; (iv) viewing or other use of any Content that, in FSI’s opinion, is prohibited under this Agreement; (v) any other activity that places FSI in the position of fostering, or having potential or actual liability for, illegal activity in any jurisdiction; or (vi) attempting to probe, scan, penetrate or test the vulnerability of an FSI system or network or to bre...
Restricted Use of the Services. 4.1 The Customer shall only use the Services for the agreed and intended use and in accordance with applicable laws and regulations and any documentation and other instructions from Tribia. 4.2 The Customer shall not use or permit or encourage a third party to use the Services in violation of this Agreement and shall be liable for any of its user's use of the Services. It is strictly prohibited to examine, copy, reproduce, translate, decompile, repair, reverse engineer or modify the Services except to the extent required to obtain interoperability with other independently created software or as otherwise permitted by mandatory law; 4.3 The number of permitted users, project areas and/or project rooms agreed in the Customer Agreement may never be exceeded. The Customer shall immediately report to Tribia if the Custom- er needs to expand the number of permitted users project areas and/or project rooms. 4.4 If Customer wishes to increase the number of permitted users, project areas and/ or project rooms, Customer's Subscription Administrator must submit a new order to Tribia. Upon Tribia's approval of the order form, Tribia shall extend the license to the Service to the desired number of permitted users, project areas and/ or project rooms according to the new order. Customer will be responsible for any additional fees for additional permitted users, project areas and/ or project rooms, from the following month after the extension has been made available by Tribia. 4.5 If Customer wishes to reduce the number of permitted users, project areas and/ or project rooms, Customer's Subscription Administrator must submit a new order to Tribia. Upon Tribia's approval of the order form and subject to any minimum commitments agreed in the Customer Agreement, Tribia shall reduce the license to the Service to the desired number of permitted users, project areas and/ or project rooms according to the new order. The reduction will be made effec- tive from the start of the first subsequent calendar month.
Restricted Use of the Services. 5.1. You agree not to access (or attempt to access) any of the Services by any means other than through the interface that is provided directly or indirectly by us, unless you have been specifically allowed to do so in a separate written agreement with us. 5.2. You agree that you will not engage in any activity that interferes with or disrupts the Services (or the servers and networks which are connected to the Services). In particular, you agree not to engage in the following acts or cause or permit others to do so: a) Use the Services or any content to violate applicable law or the Terms; b) Permit an authorized third party to access the Services. This does not include the Customer, End Customer or Trusted Relatives provided that such an extension is made in accordance with these Terms; c) Sell, resell, rent, lease the rights to the Services; d) Modify, translate, or create derivative works of the Services except as permitted by us; e) Remove, obscure or alter any proprietary rights notices (including copyright and trademark notices) which may be affixed to or contained in the Services or their outputs; f) Copy, modify, or create derivative works based on outputs from our Services; g) Copy, frame, or mirror any part or content of the Services; h) Reverse engineer, decompile, disassemble or otherwise attempt to discover the source code or underlying ideas or algorithms of the Services or Software; i) Access the Services in order to build a competitive product or service, or copy any features, functions or graphics of the Services; j) Create any link to the Services or frame or mirror the content contained on, or accessible from, the Services; k) Use the Services to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights or copyright; l) Use the Services to knowingly upload, store, transmit or distribute material containing software viruses, worms, Trojan horses or other malicious code, files, scripts, agents or programs that may damage the operation of the Services or third-party’s computer, property of information; m) Interfere with or disrupt the integrity or performance of the Services or third-party data contained therein; n) Perform any simulated attack, penetration test, denial of service simulation or similar vulnerability test or scan of the Services; o) Attempt to gain unauthorized access to the Services or their related systems or networks or ...
Restricted Use of the Services. The Services are not a substitute for sound fire management techniques and practices in emergency situations. Customer agrees not to use, access, sell, resell, or offer for any commercial purposes, any portion of the Services.
Restricted Use of the Services. You shall not, and shall not permit any users of the Services or any other party to, engage in, solicit, or promote any activity that is objectionable or may be illegal, violates the rights of others, is likely to cause notoriety, harm or damage to the reputation of TheBlockLedger or could subject TheBlockLedger to liability to third parties, including: a. Unauthorized access, monitoring, interference with, or use of the Services or Third Party accounts, data, computers, systems or networks; b. Interference with others’ use of the Services or any system or network, including mail bombing, broadcast or denial of service attacks; c. Unauthorised collection or use of personal or confidential information, including phishing, pharming, spidering, and harvesting; d. Viewing or other use of any Content that, in TheBlockLedger’s opinion, is prohibited under this Agreement; e. Any other activity that places TheBlockLedger in the position of fostering, or having potential or actual liability for, illegal activity in any jurisdiction; or f. Attempting to probe, scan, penetrate or test the vulnerability of an TheBlockLedger system or network or to breach TheBlockLedger’s security or authentication measures, whether by passive or intrusive techniques. TheBlockLedger reserves the right not to authorise and may terminate Your use of the Services based on reasonable suspicion of Your activities, business, products or services that are objectionable or promote, support or engage in any of the restricted uses described above.
AutoNDA by SimpleDocs
Restricted Use of the Services i) The Client shall not, and shall not permit any users of the Services or any other party to, engage in, solicit, or promote any activity that is objectionable or may be illegal, violates the rights of others, is likely to cause notoriety, harm or damage to the reputation of Mercans or could subject Mercans to liability to third parties, including: (i) unauthorized access, monitoring, interference with, or use of the Services or third party accounts, data, computers, systems or networks; (ii) interference with others’ use of the Services or any system or network, including mail bombing, broadcast or denial of service attacks; (iii) unauthorized collection or use of personal or confidential information, including phishing, pharming, spidering, and harvesting; (iv) viewing or other use of any Content that, in Mercans’ opinion, is prohibited under this Agreement; (v) any other activity that places Mercans in the position of fostering, or having potential or actual liability for, illegal activity in any jurisdiction; or (vi) attempting to probe, scan, penetrate or test the vulnerability of an Mercans system or network or to breach Mercans’ security or authentication measures, whether by passive or intrusive techniques. Mercans reserves the right to not authorize and may terminate the Client’s use of the Services based on reasonable suspicion of the Client’s activities, business, products or services that are objectionable or promote, support or engage in any of the restricted uses described above.

Related to Restricted Use of the Services

  • Use of the Services 1.1 We will make the Oracle services listed in Your order (the “Services”) available to You pursuant to this Agreement and Your order. Except as otherwise stated in this Agreement or Your order, You have the non- exclusive, worldwide, limited right to use the Services during the period defined in Your order, unless earlier terminated in accordance with this Agreement or Your order (the “Services Period”), solely for Your internal business operations. You may allow Your Users (as defined below) to use the Services for this purpose, and You are responsible for their compliance with this Agreement and Your order. 1.2 The Service Specifications describe and govern the Services. During the Services Period, we may update the Services and Service Specifications (with the exception of the Data Processing Agreement as described below) to reflect changes in, among other things, laws, regulations, rules, technology, industry practices, patterns of system use, and availability of Third Party Content (as defined below). Oracle updates to the Services or Service Specifications will not materially reduce the level of performance, functionality, security or availability of the Services during the Services Period of Your order. 1.3 You may not, and may not cause or permit others to: (a) use the Services to harass any person; cause damage or injury to any person or property; publish any material that is false, defamatory, harassing or obscene; violate privacy rights; promote bigotry, racism, hatred or harm; send unsolicited bulk e-mail, junk mail, spam or chain letters; infringe property rights; or otherwise violate applicable laws, ordinances or regulations; (b) perform or disclose any benchmarking or availability testing of the Services; (c) perform or disclose any performance or vulnerability testing of the Services without Oracle’s prior written approval, or perform or disclose network discovery, port and service identification, vulnerability scanning, password cracking or remote access testing of the Services; or (d) use the Services to perform cyber currency or crypto currency mining ((a) through (d) collectively, the “Acceptable Use Policy”). In addition to other rights that we have in this Agreement and Your order, we have the right to take remedial action if the Acceptable Use Policy is violated, and such remedial action may include removing or disabling access to material that violates the policy.

  • Scope of the Services UNOPS intends to retain the Contractor for the implementation of the Services, and the Contractor intends to provide the Services. The Contractor has represented to UNOPS that it has the appropriate experience, expertise, licences, and resources to undertake the Services and has agreed to undertake the Services in accordance with the Contract. In reliance on the Contractor’s representations UNOPS has entered into the Contract. The Contract sets out the terms and conditions upon which the Contractor will undertake the Services.

  • Performance of the Services In addition to the Common Articles, it is specified that:

  • Provision of the Services The Supplier acknowledges and agrees that the Customer relies on the skill and judgment of the Supplier in the provision of the Services and the performance of its obligations under this Call Off Contract. The Supplier shall ensure that the Services: comply in all respects with the description of the Services in Call Off Schedule 2 ( Services) or elsewhere in this Call Off Contract; and are supplied in accordance with the provisions of this Call Off Contract (including the Call Off Tender) and the Tender. The Supplier shall perform its obligations under this Call Off Contract in accordance with: all applicable Law; Good Industry Practice; the Standards; the Security Policy; the ICT Policy (if so required by the Customer); and the Supplier's own established procedures and practices to the extent the same do not conflict with the requirements of Clauses 7.1.3(a) to 7.1.3(e). The Supplier shall: at all times allocate sufficient resources with the appropriate technical expertise to supply the Deliverables and to provide the Services in accordance with this Call Off Contract; subject to Clause 22.1 (Variation Procedure), obtain, and maintain throughout the duration of this Call Off Contract, all the consents, approvals, licences and permissions (statutory, regulatory contractual or otherwise) it may require and which are necessary for the provision of the Services; ensure that any services recommended or otherwise specified by the Supplier for use by the Customer in conjunction with the Deliverables and/or the Services shall enable the Deliverables and/or the Services to meet the requirements of the Customer; ensure that the Supplier Assets will be free of all encumbrances (except as agreed in writing with the Customer); ensure that the Services are fully compatible with any Customer Property or Customer Assets described in Call Off Schedule 4 (Implementation Plan) (or elsewhere in this Call Off Contract) or otherwise used by the Supplier in connection with this Call Off Contract; minimise any disruption to the Sites and/or the Customer's operations when providing the Services; ensure that any Documentation and training provided by the Supplier to the Customer are comprehensive, accurate and prepared in accordance with Good Industry Practice; co-operate with the Other Suppliers and provide reasonable information (including any Documentation), advice and assistance in connection with the Services to any Other Supplier and, on the Call Off Expiry Date for any reason, to enable the timely transition of the supply of the Services (or any of them) to the Customer and/or to any Replacement Supplier; assign to the Customer, or if it is unable to do so, shall (to the extent it is legally able to do so) hold on trust for the sole benefit of the Customer, all warranties and indemnities provided by third parties or any Sub-Contractor in respect of any Deliverables and/or the Services. Where any such warranties are held on trust, the Supplier shall enforce such warranties in accordance with any reasonable directions that the Customer may notify from time to time to the Supplier; provide the Customer with such assistance as the Customer may reasonably require during the Call Off Contract Period in respect of the supply of the Services; deliver the Services in a proportionate and efficient manner; ensure that neither it, nor any of its Affiliates, embarrasses the Customer or otherwise brings the Customer into disrepute by engaging in any act or omission which is reasonably likely to diminish the trust that the public places in the Customer, regardless of whether or not such act or omission is related to the Supplier’s obligations under this Call Off Contract; and gather, collate and provide such information and co-operation as the Customer may reasonably request for the purposes of ascertaining the Supplier’s compliance with its obligations under this Call Off Contract. An obligation on the Supplier to do, or to refrain from doing, any act or thing shall include an obligation upon the Supplier to procure that all Sub-Contractors and Supplier Personnel also do, or refrain from doing, such act or thing. This Clause 8 shall apply if any Services have been included in Annex 1 of Call Off Schedule 2 (Services).

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!