Security, Cracking and Hacking Sample Clauses

Security, Cracking and Hacking. You are prohibited from violating or attempting to violate the security of the Website. Accordingly, you agree not to: (i) access data or materials not intended for you;
AutoNDA by SimpleDocs
Security, Cracking and Hacking. You are prohibited from violating or attempting to violate the security of the Site. Accordingly, you agree not to: i. Access data or materials not intended for you. ii. Log into a server or account which you are not authorized to access. iii. Attempt to probe, scan or test the vulnerability of a system or network or service to any user, host or network, including without limitation, by means of submitting a virus to the Site, overloading, "flooding," "mailbombing" or "crashing" the Site. Violations of system or network security may result in civil or criminal liability. World Book reserves the right to investigate occurrences which may involve such violations and may involve, and cooperate with, law enforcement authorities in prosecuting users who have participated in such violations. You understand that data and communications, including e-mail and other electronic communications, may be accessed by unauthorized third parties when communicated over the Internet.
Security, Cracking and Hacking. You shall not violate or attempt to violate the security of the Services, Software, and/or Content. Accordingly, you shall not:
Security, Cracking and Hacking. You shall not violate or attempt to violate the security of the Services. Accordingly, you shall not: (i) access data or materials not intended for you; (ii) log into a server or account which you are not authorized to access; (iii) attempt to probe, scan or test the vulnerability of a system or network or to tamper, hack, crack, modify or otherwise corrupt, circumvent or breach security, authentication, rights management or other access control measures without proper authorization; (iv) attempt to interfere with or deny service to any user, host or network, including without limitation, via means of submitting a virus to the Services, overloading, "flooding," "mailbombing," any "denial of service attack" or intentionally "crashing" the Services; (v) attempt to circumvent or alter the methods or processes Community Management Systems uses to measure time, bandwidth utilization, or other methods to account for or document "use" of any of the Services; or (vi) execute any form of unauthorized network monitoring (e.g., packet sniffing) to intercept data not intended for your use or access, or in any way interfere with, intercept or expropriate any system, data or information. Violations of system or network security may result in civil or criminal liability. Community Management Systems reserves the right to investigate occurrences which may involve such violations and may involve, and cooperate with, law enforcement authorities in prosecuting users who have participated in such violations. You understand that data and communications, including e-mail and other electronic communications, may be accessed by unauthorized third parties when communicated over the Internet. You agree that it is your responsibility, and not Community Management Systems', to obtain and use third party software products that support encryption and other security protocols compatible with such protocols (if any) as may be used by Community Management Systems from time to time in connection with the Services.
Security, Cracking and Hacking. You shall not violate or attempt to violate the security of the Program Warehouse Service. Accordingly, you shall not attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without proper authorization. You agree that it is your responsibility to install anti-virus software and related protections against viruses, Trojan horses, worms, time bombs, cancelbots or other computer programming routines or engines that are intended to damage, destroy, disrupt or otherwise impair a computer's functionality or operation which may be transferred to your computer via the Program Warehouse Service.

Related to Security, Cracking and Hacking

  • Security Cameras Security cameras have been installed throughout the Facility; however, they will not routinely be used in areas where there is an expectation of privacy, such as restrooms or patient care areas.

  • Cleanliness and Safety; Entry Resident agrees to maintain the assigned bedroom space, the apartment and the common areas of the Property in a clean, safe and sanitary condition, to exercise all due care in the use of same, and to cooperate fully with the Property pest control program as requested. Resident will be responsible for the cost of treatment for bedbugs and similar pests to the extent Owner’s pest control vendor reasonably determines that an infestation has originated within Resident’s assigned space and during Resident’s occupancy. Resident will place all trash in provided receptacles and will be responsible for the cost of cleaning the interior or exterior of the apartment if not kept in sanitary condition. When outdoor temperatures are below 40 degrees Fahrenheit, Resident will keep the apartment’s heat turned on to prevent frozen or burst pipes, including during vacations. When outdoor temperatures exceed 85 degrees Fahrenheit, Resident will keep the apartment’s air conditioning turned on and set to a reasonable temperature to prevent mold or mildew growth, including during vacations. Owner and its agents, employees and contractors may enter any apartment and bedroom space to perform routine maintenance, inspections, showings and other ordinary functions, provided that Owner will provide advance notice to residents of an apartment before such entry. Owner reserves the right to enter an apartment and any bedroom space without prior notice (including a passkey and/or disarming the alarm or other means of entry if locks have been changed) for emergency maintenance or repair purposes, or when there is reasonable cause to believe that a situation exists that could cause danger to life, safety, health or property. Owner may confiscate any item deemed to cause a danger and is under no obligation to pay compensation for or to return such items.

  • Security Controls Annually, upon Fund’s reasonable request, DST shall provide Fund’s Chief Information Security Officer or his or her designee with a summary of its corporate information security policy and an opportunity to discuss DST’s information security measures, and a high level and non-confidential summary of any penetration testing related to the provision of in-scope services . DST shall review its Security Policy annually.

  • Data Protection and Security A. In this Agreement the following terms shall have the meanings respectively ascribed to them:

  • Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.

  • Federal Water Pollution Control Act The contractor agrees to comply with all applicable standards, orders, or regulations issued pursuant to the Federal Water Pollution Control Act, as amended, 33 U.S.C. 1251 et seq.

  • Historic Preservation Subrecipient agrees to comply with the Historic Preservation requirements set forth in the National Historic Preservation Act of 1966, as amended (16 U.S.C. 470) and the procedures set forth in 36 CFR 800, Protection of Historic Properties, insofar as they apply to the performance of this Contract. In general, this requires concurrence from the State Historic Preservation Officer for all rehabilitation and demolition of historic properties that are fifty years old or older or that are included on a Federal, State, or local historic property list.

  • Protection of the Environment If the Contractor encounters circumstances such as weather conditions or site factors where the Contractor knows or should reasonably know that proceeding with the Work may, directly or indirectly, cause Environmental Damage, the Contractor shall:

  • CLEAN AIR ACT AND THE FEDERAL WATER POLLUTION CONTROL ACT (a) If the Sub-Recipient, with the funds authorized by this Agreement, enters into a contract that exceeds $150,000, then any such contract must include the following provision: Contractor agrees to comply with all applicable standards, orders or regulations issued pursuant to the Clean Air Act (42 U.S.C. 7401-7671q) and the Federal Water Pollution Control Act as amended (33 U.S.C. 1251-1387), and will report violations to FEMA and the Regional Office of the Environmental Protection Agency (EPA).

  • Data Integrity Control Personal Data will remain intact, complete and current during processing activities.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!