Spoofing Sample Clauses

Spoofing. Spoofing the SenderID or otherwise attempting to mislead message recipients as to who is sending the SMS message is not allowed. It’s good business sense to identify your brand or name in each message you send. But it’s not ok to identify yourself as another individual or business.
AutoNDA by SimpleDocs
Spoofing. You acknowledge that accessing certain web sites through the Service may result in users of the system being inadvertently lulled into pro- viding sensitive information through a Internet browser or other soft- ware that allows fake URLs to obscure the real domain. You expressly assume the risks of any damages resulting from such activity.
Spoofing sending emails or messages with forged or obfuscated headers, or assuming an identity without the sender's permission Security Violations You may not attempt to compromise XxXxxxxx.xxx services, to access or modify content that does not belong to you, or to otherwise engage in malicious actions: Unauthorized access: accessing or using any XxXxxxxx.xxx system or service without permission Security research: conducting any security research or audit on XxXxxxxx.xxx systems without written permission to do so, including via scanners and automated tools. Eavesdropping: listening to or recording data that does not belong to you without permission Other attacks: non-technical attacks such as social engineering, phishing, or physical attacks against anyone or any system Network and Services Abuse You may not abuse the resources and systems of XxXxxxxx.xxx. In particular the following activities are prohibited: Network abuse: causing Denial of Service (DoS) by flooding systems with network traffic that slows down the system makes it unreachable, or significantly impacts the quality of service Unthrottled RPC/API calls: sending large numbers of RPC or remote API calls to our systems without appropriate throttling, with the risk of impacting the quality of service for other users. Note: XxXxxxxx.xxx provides batch APIs for imports, so there should be no need for this. Throttled calls are typically acceptable at a rate of 1 call/second, with no parallel calls. Exceptions may be authorized on a case-by-case basis - please contact us if you think you need one. Overloading: voluntarily impacting the performance or availability of systems with abnormal content such as very large data quantities, or very large numbers of elements to process, such as email bombs. Crawling: automatically crawling resources in a way that impacts the availability and performance of the systems Attacking: using the XxXxxxxx.xxx services to attack, crawl or otherwise impact the availability or security of third-party systems Abusive registrations: using automated tools to repeatedly register or subscribe to
Spoofing. Any attempt to forge or misrepresent message headers, falsifying headers or transmission of information to mask the originator of the message. Obscene Speech or Materials Use of the service to distribute, transmit, display or otherwise make available unlawful, defamatory, obscene, indecent, pornographic, derogatory, sexist, racist, prejudiced, harmful, degrading, hateful, threatening, intimidating, harassing, fraudulent, deceptive, tortious or otherwise objectionable material or information. Usenet Postings Posting of content in newsgroups that does not comply with the group’s charter or other related policies. Export Control Violations Exporting encryption software which is contrary to that respective country’s rules and regulations. The responsibility for avoiding the harmful activities as described rests primarily with you and your users/subscribers. e-shelter will not, as an ordinary practice, monitor your communication to ensure that you comply with e-shelter policy or applicable law. The above listing of prohibited activities is not exhaustive and e-shelter reserves the right to take certain preventative or corrective actions in case of harmful activities. Should e-shelter become aware of harmful activities, however, it may take any action to stop the harmful activity, including but not limited to, removing information, implementing screening software designed to block such contents, denying access to the Internet, or take any other action it deems appropriate. The policy will be revised from time to time. Changes of the policy will result in an update of the AUP posted on the e-shelter website. By using the service after an updated version has been posted, you accept any new or additional terms that result from the changes.
Spoofing. It is unlawful for any person to initiate the transmission to a protected computer of a commercial electronic mail message that does not contain a functioning return electronic mail address or other Internet-based mechanism, clearly and conspicuously displayed, that (i) a recipient may use to submit, in a manner specified in the message, a reply electronic mail message or other form of Internet-based communication requesting not to receive future commercial electronic mail messages from that sender at the electronic mail address where the message was received; and (ii) remains capable of receiving such messages or communications for no less than 30 days after the transmission of the original message
Spoofing. Amazon EC2 instances cannot send spoofed network traffic. The AWS- controlled, host-based firewall infrastructure will not permit an instance to send traffic with a source IP or MAC address other than its own. • Port Scanning. When port scanning is detected, it is stopped and blocked.
Spoofing. Clients are prohibited from placing orders with the intent to cancel them before execution to deceive other market participants. Spoofing distorts market prices and is considered market manipulation.
AutoNDA by SimpleDocs

Related to Spoofing

  • Vlastnictví Zdravotnické zařízení si ponechá a bude uchovávat Zdravotní záznamy. Zdravotnické zařízení a Zkoušející převedou na Zadavatele veškerá svá práva, nároky a tituly, včetně práv duševního vlastnictví k Důvěrným informacím (ve smyslu níže uvedeném) a k jakýmkoli jiným Studijním datům a údajům.

Time is Money Join Law Insider Premium to draft better contracts faster.