System Abuse Sample Clauses

System Abuse. You may not use the Mail Services in a way that creates technical disturbances for other Vaioni mail customers or for the Vaioni systems generally. Specifically, but without limitation:
AutoNDA by SimpleDocs
System Abuse. Without limitation, you agree not undertake any other activity which may adversely affect the operation or enjoyment of this Site by any other person. You may not reproduce, sell, resell, or otherwise exploit any resource, or access to any resource, contained on this Site.
System Abuse. You shall not use a SharePoint Private Cloud Services by publishing your login information. Any scripts you use in connection with your SharePoint Services must be written such that they do not consume a disproportionate amount of computing and bandwidth resources. Using the SharePoint Private Cloud Services in a way that creates operational disturbances for other SherWeb SharePoint customers or for the SherWeb systems generally shall be deemed consuming a disproportionate amount of computing and bandwidth resources.
System Abuse. Franchisee shall not abuse CTZAPP system, or any other system accessible through the internet to CTZAPP, by casing any harm to the system so that it inhibits or negatively impacts the ability of other users to effectively use such system. Franchisee further agrees not to compromise or attempt to violate security at CTZAPP or elsewhere, including but not limited to, attempted access of any data, server, or account that you are not expressly or authorized to access.
System Abuse. You may not reproduce, sell, resell or otherwise exploit any resource, or access to any resource, contained on this Service. • You are prohibited from using any services or facilities provided in connection with this Service to compromise security or tamper with system resources and/or accounts. The use or distribution of tools designed for compromising security (e.g. password guessing programs, cracking tools or network probing tools) is strictly prohibited.
System Abuse. You may not reproduce, sell, resell or otherwise exploit any resource, or access to any resource, contained on this website. You are prohibited from using any services or facilities provided in connection with this website to compromise security or tamper with system resources and/or accounts. The use or distribution of tools designed for compromising security (e.g., password-guessing programs, cracking tools or network probing tools) are strictly prohibited.
System Abuse. You may not use the Mail Services in a way that creates technical disturbances for other Supplier’s mail customers or for the Supplier’s systems generally. Specifically, but without limitation:
AutoNDA by SimpleDocs
System Abuse. The Customer agrees not to engage in any activities that may degrade the performance of the Software or the Subscription Service for other users. This includes excessive API calls, automated scraping, or any other activity that puts an unreasonable load on the system.

Related to System Abuse

  • System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.

  • System Access CUSTOMER agrees to provide to PROVIDER, at CUSTOMER’S expense, necessary access to the mainframe computer and related information technology systems (the “System”) on which CUSTOMER data is processed during the times (the “Service Hours”) specified in the PSAs, subject to reasonable downtime for utility outages, maintenance, performance difficulties and the like. In the event of a change in the Service Hours, CUSTOMER will provide PROVIDER with at least fifteen (15) calendar days written notice of such change.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization.

  • Market Abuse 13.1 The Client acknowledges that he will not enter into any transaction which falls within the definition of market abuses of Seychelles Securities Xxx 0000 as amended. This rule applies to all forms of market abuse such as xxxxxxx xxxxxxx (an abusive exploitation of privileged confidential information), the misuse of information and directors trading in shares of their own companies; 13.2 If the Company suspects or has reasonable grounds to believe that the Client has been engaged into an abusive behavior as indicated above the Company reserves the rights to void and/or cancel part or all Client’s abusive trading transactions, close all and any of the Client’s trading accounts and terminate this Agreement under s.21.

  • System Upgrade Facilities and System Deliverability Upgrades Connecting Transmission Owner shall design, procure, construct, install, and own the System Upgrade Facilities and System Deliverability Upgrades described in Appendix A hereto. The responsibility of the Developer for costs related to System Upgrade Facilities and System Deliverability Upgrades shall be determined in accordance with the provisions of Attachment S to the NYISO OATT.

  • System Description The wet detention basin is designed to trap 80% of sediment in runoff and maintain pre-development downstream peak flows. The basin has two forebays (smaller ponds) located at the low end of two grass xxxxxx. In addition to runoff conveyance, the grass xxxxxx also allow infiltration and filtering of pollutants, especially from smaller storms. The forebays are each 4 feet deep. They are connected to the main pool by 18 and 24-inch metal pipes that outlet onto a rock chute. The forebays will trap coarse sediments in runoff, such as road sands, thus reducing maintenance of the main basin. The main pool will trap the finer suspended sediment. To do this, the pond size, water level and outlet structures must be maintained as specified in this Agreement (see Figures 1, 2 and 3). The main basin receives runoff from a 67.1 acre drainage area (41.2 acres within the subdivision and 25.9 acres off-site drainage coming from the east). During high rainfall or snow melt events, the water level will temporarily rise and slowly drain down to the elevation of the control structure. The water level is controlled by a 12-inch concrete pipe extending through the berm in the northwest corner of the basin (see Figures 1 and 3). On the face of the 12-inch pipe, there is metal plate with a 3-inch drilled hole (orifice) with stone in front of it. This orifice controls the water level and causes the pond to temporarily rise during runoff events. Washed stone (1- 2” diameter) is placed in front of the orifice to prevent clogging. High flows may enter the grated concrete riser or flow over the rock lined emergency spillway. “As-built” construction drawings of the basin, showing actual dimensions, elevations, outlet structures, etc. will be recorded as an addendum(s) to this agreement within 60 days after [Municipality Name] accepts verification of construction from the project engineer.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!