Restricted Use of the Services Sample Clauses

Restricted Use of the Services. You shall not, and shall not permit any users of the Services or any other party to, engage in, solicit, or promote any activity that is objectionable or may be illegal, violates the rights of others, is likely to cause notoriety, harm or damage to the reputation of Intuit or could subject Intuit to liability to third parties, including: (i) unauthorized access, monitoring, interference with, or use of the Services or third party accounts, data, computers, systems or networks; (ii) interference with others’ use of the Services or any system or network, including mail bombing, broadcast or denial of service attacks; (iii) unauthorized collection or use of personal or confidential information, including phishing, pharming, spidering, and harvesting; (iv) viewing or other use of any Content that, in Intuit’s opinion, is prohibited under this Agreement; (v) any other activity that places Intuit in the position of fostering, or having potential or actual liability for, illegal activity in any jurisdiction; or (vi) attempting to probe, scan, penetrate or test the vulnerability of an Intuit system or network or to breach Intuit’s security or authentication measures, whether by passive or intrusive techniques. Intuit reserves the right to not authorize and may terminate your use of the Services based on reasonable suspicion of your activities, business, products or services that are objectionable or promote, support or engage in any of the restricted uses described above.
Restricted Use of the Services. You shall not, and shall not permit any users of the Services or any other party to, engage in, solicit, or promote any activity that is objectionable or may be illegal, violates the rights of others, is likely to cause notoriety, harm or damage to the reputation of VS1 Cloud or could subject VS1 Cloud to liability to third parties, including: (i) unauthorized access, monitoring, interference with, or use of the Services or third party accounts, data, computers, systems or networks; (ii) interference with others’ use of the Services or any system or network, including mail bombing, broadcast or denial of service attacks; (iii) unauthorized collection or use of personal or confidential information, including phishing, pharming, spidering, and harvesting;
Restricted Use of the Services. 6.2.1. You agree not to use, nor permit any third party to use, the Services to upload, post, distribute, link to, publish, reproduce, engage in, promote or transmit any of the following, including but not limited to: 1. Illegal, fraudulent, defamatory, obscene, pornographic, profane, threatening, abusive, hateful, harassing, offensive, inappropriate or objectionable information or communications of any kind, including without limitation conduct that is excessively violent, incites or threatens violence, encourages would encourage "flaming" others, or criminal or civil liability under any local, state, or foreign law; 2. Content that would impersonate someone else or falsely represent your identity or qualifications, or that may constitute a breach of any individual's privacy; is illegally unfair or deceptive, or creates a safety or health risk to an individual to the public; 3. Except as permitted by AMAZONATION in writing, investment opportunities, solicitations, chain letters, pyramid schemes, other unsolicited commercial communication or engage in spamming or flooding; 4. Virus, Trojan horse, worm or other disruptive or harmful software or data; and 5. Any information, software or Content that you do not own or have the right to use which is not legally yours and without permission from the copyright owner or intellectual property rights owners thereof. 6.2.2. You shall not, and shall not permit any users of the Services or any other party to, engage in, solicit, or promote any activity that is objectionable or may be illegal, violates the rights of others, is likely to cause notoriety, harm or damage to the reputation of AMAZONATION or could subject AMAZONATION to liability to third parties, including: (i) unauthorized access, monitoring, interference with, or use of the Services or third party accounts, data, computers, systems or networks; (ii) interference with others' use of the Services or any system or network, including mail bombing, broadcast or denial of service attacks; (iii) unauthorized collection or use of personal or confidential information, including phishing, pharming, spidering, and harvesting; (iv) viewing or other use of any Content that, in AMAZONATION's opinion, is prohibited under this Agreement; (v) any other activity that places AMAZONATION in the position of fostering, or having potential or actual liability for, illegal activity in any jurisdiction; or (vi) attempting to probe, scan, penetrate or test the vulnerability of an...
Restricted Use of the Services. The Services are not a substitute for sound fire management techniques and practices in emergency situations. Customer agrees not to use, access, sell, resell, or offer for any commercial purposes, any portion of the Services.
Restricted Use of the Services. 4.1 The Customer shall only use the Services for the agreed and intended use and in accordance with applicable laws and regulations and any documentation and other instructions from Tribia. 4.2 The Customer shall not use or permit or encourage a third party to use the Services in violation of this Agreement and shall be liable for any of its user's use of the Services. It is strictly prohibited to examine, copy, reproduce, translate, decompile, repair, reverse engineer or modify the Services except to the extent required to obtain interoperability with other independently created software or as otherwise permitted by mandatory law; 4.3 The number of permitted users, project areas and/or project rooms agreed in the Customer Agreement may never be exceeded. The Customer shall immediately report to Tribia if the Custom- er needs to expand the number of permitted users project areas and/or project rooms. 4.4 If Customer wishes to increase the number of permitted users, project areas and/ or project rooms, Customer's Subscription Administrator must submit a new order to Tribia. Upon Tribia's approval of the order form, Tribia shall extend the license to the Service to the desired number of permitted users, project areas and/ or project rooms according to the new order. Customer will be responsible for any additional fees for additional permitted users, project areas and/ or project rooms, from the following month after the extension has been made available by Tribia. 4.5 If Customer wishes to reduce the number of permitted users, project areas and/ or project rooms, Customer's Subscription Administrator must submit a new order to Tribia. Upon Tribia's approval of the order form and subject to any minimum commitments agreed in the Customer Agreement, Tribia shall reduce the license to the Service to the desired number of permitted users, project areas and/ or project rooms according to the new order. The reduction will be made effec- tive from the start of the first subsequent calendar month.
Restricted Use of the Services. 5.1. You agree not to access (or attempt to access) any of the Services by any means other than through the interface that is provided directly or indirectly by us, unless you have been specifically allowed to do so in a separate written agreement with us. 5.2. You agree that you will not engage in any activity that interferes with or disrupts the Services (or the servers and networks which are connected to the Services). In particular, you agree not to engage in the following acts or cause or permit others to do so: a) Use the Services or any content to violate applicable law or the Terms; b) Permit an authorized third party to access the Services. This does not include the Customer, End Customer or Trusted Relatives provided that such an extension is made in accordance with these Terms; c) Sell, resell, rent, lease the rights to the Services; d) Modify, translate, or create derivative works of the Services except as permitted by us; e) Remove, obscure or alter any proprietary rights notices (including copyright and trademark notices) which may be affixed to or contained in the Services or their outputs; f) Copy, modify, or create derivative works based on outputs from our Services; g) Copy, frame, or mirror any part or content of the Services; h) Reverse engineer, decompile, disassemble or otherwise attempt to discover the source code or underlying ideas or algorithms of the Services or Software; i) Access the Services in order to build a competitive product or service, or copy any features, functions or graphics of the Services; j) Create any link to the Services or frame or mirror the content contained on, or accessible from, the Services; k) Use the Services to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights or copyright; l) Use the Services to knowingly upload, store, transmit or distribute material containing software viruses, worms, Trojan horses or other malicious code, files, scripts, agents or programs that may damage the operation of the Services or third-party’s computer, property of information; m) Interfere with or disrupt the integrity or performance of the Services or third-party data contained therein; n) Perform any simulated attack, penetration test, denial of service simulation or similar vulnerability test or scan of the Services; o) Attempt to gain unauthorized access to the Services or their related systems or networks or ...
Restricted Use of the Services. You shall not, and shall not permit any users of the Services or any other party to, engage in, solicit, or promote any activity that is objectionable or may be illegal, violates the rights of others, is likely to cause notoriety, harm or damage to the reputation of TheBlockLedger or could subject TheBlockLedger to liability to third parties, including: a. Unauthorized access, monitoring, interference with, or use of the Services or Third Party accounts, data, computers, systems or networks; b. Interference with others’ use of the Services or any system or network, including mail bombing, broadcast or denial of service attacks; c. Unauthorised collection or use of personal or confidential information, including phishing, pharming, spidering, and harvesting; d. Viewing or other use of any Content that, in TheBlockLedger’s opinion, is prohibited under this Agreement; e. Any other activity that places TheBlockLedger in the position of fostering, or having potential or actual liability for, illegal activity in any jurisdiction; or f. Attempting to probe, scan, penetrate or test the vulnerability of an TheBlockLedger system or network or to breach TheBlockLedger’s security or authentication measures, whether by passive or intrusive techniques. TheBlockLedger reserves the right not to authorise and may terminate Your use of the Services based on reasonable suspicion of Your activities, business, products or services that are objectionable or promote, support or engage in any of the restricted uses described above.
Restricted Use of the Services i) The Client shall not, and shall not permit any users of the Services or any other party to, engage in, solicit, or promote any activity that is objectionable or may be illegal, violates the rights of others, is likely to cause notoriety, harm or damage to the reputation of Mercans or could subject Mercans to liability to third parties, including: (i) unauthorized access, monitoring, interference with, or use of the Services or third party accounts, data, computers, systems or networks; (ii) interference with others’ use of the Services or any system or network, including mail bombing, broadcast or denial of service attacks; (iii) unauthorized collection or use of personal or confidential information, including phishing, pharming, spidering, and harvesting; (iv) viewing or other use of any Content that, in Mercans’ opinion, is prohibited under this Agreement; (v) any other activity that places Mercans in the position of fostering, or having potential or actual liability for, illegal activity in any jurisdiction; or (vi) attempting to probe, scan, penetrate or test the vulnerability of an Mercans system or network or to breach Mercans’ security or authentication measures, whether by passive or intrusive techniques. Mercans reserves the right to not authorize and may terminate the Client’s use of the Services based on reasonable suspicion of the Client’s activities, business, products or services that are objectionable or promote, support or engage in any of the restricted uses described above.