System Abuse Sample Clauses

System Abuse. You may not use the Mail Services in a way that creates technical disturbances for other Vaioni mail customers or for the Vaioni systems generally. Specifically, but without limitation:
AutoNDA by SimpleDocs
System Abuse. Without limitation, you agree not undertake any other activity which may adversely affect the operation or enjoyment of this Site by any other person. You may not reproduce, sell, resell, or otherwise exploit any resource, or access to any resource, contained on this Site.
System Abuse. You shall not use a SharePoint Private Cloud Services by publishing your login information. Any scripts you use in connection with your SharePoint Services must be written such that they do not consume a disproportionate amount of computing and bandwidth resources. Using the SharePoint Private Cloud Services in a way that creates operational disturbances for other SherWeb SharePoint customers or for the SherWeb systems generally shall be deemed consuming a disproportionate amount of computing and bandwidth resources.
System Abuse. You may not reproduce, sell, resell or otherwise exploit any resource, or access to any resource, contained on this Service. • You are prohibited from using any services or facilities provided in connection with this Service to compromise security or tamper with system resources and/or accounts. The use or distribution of tools designed for compromising security (e.g. password guessing programs, cracking tools or network probing tools) is strictly prohibited.
System Abuse. You may not use the Mail Services in a way that creates technical disturbances for other Supplier’s mail customers or for the Supplier’s systems generally. Specifically, but without limitation:
System Abuse. Franchisee shall not abuse CTZAPP system, or any other system accessible through the internet to CTZAPP, by casing any harm to the system so that it inhibits or negatively impacts the ability of other users to effectively use such system. Franchisee further agrees not to compromise or attempt to violate security at CTZAPP or elsewhere, including but not limited to, attempted access of any data, server, or account that you are not expressly or authorized to access.

Related to System Abuse

  • System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.

  • System Access CUSTOMER agrees to provide to PROVIDER, at CUSTOMER’S expense, necessary access to the mainframe computer and related information technology systems (the “System”) on which CUSTOMER data is processed during the times (the “Service Hours”) specified in the PSAs, subject to reasonable downtime for utility outages, maintenance, performance difficulties and the like. In the event of a change in the Service Hours, CUSTOMER will provide PROVIDER with at least fifteen (15) calendar days written notice of such change.

  • System Upgrades The Connecting Transmission Owner shall procure, construct, install, and own the System Upgrade Facilities and System Deliverability Upgrades described in Attachment 6 of this Agreement. To the extent that design work is necessary in addition to that already accomplished in the Class Year Interconnection Facilities Study for the Interconnection Customer, the Connecting Transmission Owner shall perform or cause to be performed such work. If all the Parties agree, the Interconnection Customer may construct System Upgrade Facilities and System Deliverability Upgrades.

  • Anti-­‐Abuse Registry Operator may suspend, delete or otherwise make changes to domain names in compliance with its anti-­‐abuse policy.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization. Measures: • Multiple authorization levels are used when granting access to sensitive systems, including those storing and processing Personal Data. Authorizations are managed via defined processes according to the SAP Security Policy • All personnel access SAP’s systems with a unique identifier (user ID). • SAP has procedures in place so that requested authorization changes are implemented only in accordance with the SAP Security Policy (for example, no rights are granted without authorization). In case personnel leaves the company, their access rights are revoked. • SAP has established a password policy that prohibits the sharing of passwords, governs responses to password disclosure, and requires passwords to be changed on a regular basis and default passwords to be altered. Personalized user IDs are assigned for authentication. All passwords must fulfill defined minimum requirements and are stored in encrypted form. In the case of domain passwords, the system forces a password change every six months in compliance with the requirements for complex passwords. Each computer has a password-protected screensaver. • The company network is protected from the public network by firewalls. • SAP uses up–to-date antivirus software at access points to the company network (for e-mail accounts), as well as on all file servers and all workstations. • Security patch management is implemented to provide regular and periodic deployment of relevant security updates. Full remote access to SAP’s corporate network and critical infrastructure is protected by strong authentication.

  • CHILD ABUSE REPORTING CONTRACTOR hereby agrees to annually train all staff members, including volunteers, so that they are familiar with and agree to adhere to its own child and dependent adult abuse reporting obligations and procedures as specified in California Penal Code section 11165.7, AB 1432, and Education Code 44691. To protect the privacy rights of all parties involved (i.e., reporter, child and alleged abuser), reports will remain confidential as required by law and professional ethical mandates. A written statement acknowledging the legal requirements of such reporting and verification of staff adherence to such reporting shall be submitted to the LEA.

  • Market Abuse 13.1 The Client acknowledges that he will not enter into any transaction which falls within the definition of market abuses of Seychelles Securities Xxx 0000 as amended. This rule applies to all forms of market abuse such as xxxxxxx xxxxxxx (an abusive exploitation of privileged confidential information), the misuse of information and directors trading in shares of their own companies;

  • System Upgrade Facilities and System Deliverability Upgrades Connecting Transmission Owner shall design, procure, construct, install, and own the System Upgrade Facilities and System Deliverability Upgrades described in Appendix A hereto. The responsibility of the Developer for costs related to System Upgrade Facilities and System Deliverability Upgrades shall be determined in accordance with the provisions of Attachment S to the NYISO OATT.

  • System Description The DLCS is a network consisting of devices which are remotely controlled over RF transmission equipment by the PowerCAMPTM Software or equivalent. CL&P shall have access to the PowerCAMP™ LMS (as defined below) via the web interface. The PowerCAMPTM LMS shall include the software and hardware necessary to manage the Control Devices installed at the End-use Equipment at Participating Facilities. The PowerCAMPTM LMS includes AER’s PowerCAMPTM Server and PowerCAMPTM Suite, networking equipment, and third party software. PowerCAMPTM LMS Hardware

  • System Requirements Apple Software is supported only on Apple-branded hardware that meets specified system requirements as indicated by Apple.

Time is Money Join Law Insider Premium to draft better contracts faster.