Security Ownership and Use Restrictions Sample Clauses

Security Ownership and Use Restrictions 
AutoNDA by SimpleDocs

Related to Security Ownership and Use Restrictions

  • Use Restrictions (a) Company will not do or attempt to do, and Company will not permit any other person or entity to do or attempt to do, any of the following, directly or indirectly:

  • Use Restriction (a) If a natural disaster, incident or any other emergency situation occurs or is likely to occur, SORACOM may restrict the use of the SORACOM Air Global Service by the Subscriber in order to give priority to communications whose content are necessary for the prevention of or relief from calamities, for the securing of transportation, communications or electric power supply, the maintenance of public order or any other public interest.

  • Data Ownership and Use All data obtained from the MLS System is federally copyrighted and remains the property of MLSSAZ. MLSSAZ data is provided solely for publication on the Internet as a tool for consumers to search and view properties available for sale, which have been listed with MLSSAZ members. Utilizing the listing data for any purpose not outlined in this Agreement is not permitted and violates the copyright held by MLSSAZ.

  • Ownership and Use (A) Unless CITY states otherwise in writing, each document— including, but not limited to, each report, draft, record, drawing, or specification (collectively, “work product”)— that CONSULTANT prepares, reproduces, or causes its preparation or reproduction for this Agreement is CITY’s exclusive property.

  • Ownership and Restrictions 4.1 You retain all ownership and intellectual property rights in and to Your Content and Your Applications. Oracle or its licensors retain all ownership and intellectual property rights to the Services, including Oracle Programs and Ancillary Software, and derivative works thereof, and to anything developed or delivered by or on behalf of Oracle under this Agreement.

  • ACCEPTABLE USE RESTRICTIONS You must:

  • Service Use Restrictions In connection with your use of the Services, you sha l not in any way transmit, publish, post, upload, disseminate, or distribute any (i) corrupted files, viruses, trojan horses, worms, spyware, time bombs, cancelbots, or any other similar software or programs; and/or ( i) defamatory, infringing, vulgar, sexua ly explicit, obscene, indecent, o fensive, inappropriate, profane, or unlawful content or any hate speech (i.e., racist/discriminatory speech). You sha l also not (i) impair anyone else from using the Services or interfere with the proper functioning of the Services; ( i) access the Services (including by use of robots, scripts, spiders or other automated means) other than via the means provided by us; ( i) misrepresent your identity in any way; (iv) overburden the Services in any way; and/or (v) violate any law, rule or regulation in connection with your use of or access to the Services.

  • Ownership and License 5.1 Unless otherwise specified in a SOW and except as provided in Section 5.2, Cisco is the sole and exclusive owner of all Deliverables and Supplier hereby irrevocably assigns and transfers to Cisco all of its worldwide right and title to, and interest in, the Deliverables, including all associated Intellectual Property Rights.

  • OWNERSHIP AND USE OF DOCUMENTS 1.3.1 All drawings, specifications, estimates, and all other documents, including shop drawings and calculations, prepared at any time in connection with the Project, shall, upon payment for services in connection therewith, become the sole property of the State.

  • Usage Restrictions You will not (a) make any Service or Content available to, or use any Service or Content for the benefit of, anyone other than You or Users, (b) sell, resell, license, sublicense, distribute, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Service or Content in a way that circumvents a contractual usage limit, (h) copy a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Your own intranets or otherwise for Your own internal business purposes or as permitted in the Documentation, (k) access any Service or Content in order to build a competitive product or service, or (l) reverse engineer any Service (to the extent such restriction is permitted by law).

Time is Money Join Law Insider Premium to draft better contracts faster.