Technical Restrictions Clause Samples

POPULAR SAMPLE Copied 1 times
Technical Restrictions. No user of the Broadband Service, Customer Equipment, or the ▇▇▇▇▇▇▇▇ Equipment may, individually or in combination with another: 1. use the Internet service or facilities for web-hosting, e-mail hosting, or other unusually high-bandwidth consumptionunless youhave made special subscriptionarrangements withBrantleyand the usage does not otherwise violate law or regulation; 2. access any other person's computer or computer system, network, software, or data without his or her knowledge and consent; breach the security of another user or system; or attempt to circumvent the user authentication or security of any host, network, or account. This includes, but is not limited to, accessing data not intended for you, logging into or making use of a server or account you are not expressly authorized to access, or probing the security of other hosts, networks, or accounts without express permission to doso; 3. use or distribute tools or devices designed or used for compromising security or whose use is otherwise unauthorized, such as password guessing programs, decoders, password gatherers, keystroke loggers, analyzers, cracking tools, packet sniffers, encryptioncircumvention devices, or Trojan Horse programs. Unauthorized port scanning is strictly prohibited; 4. copy, distribute, or sublicense any proprietary software provided in connection with the Broadband Service by ▇▇▇▇▇▇▇▇ or any third party, except that you may make one copy of each software program for back-up purposes only; 5. distribute programs that make unauthorized changes to software (cracks); 6. use or run dedicated, stand-alone equipment or servers from the Premises that provide network content or any other services to anyone outside of your Premises local area network ("Premises LAN"), also commonly referred to as public services or servers. Examples of prohibited equipment and servers include, but are not limited to, e-mail, Web hosting, file sharing, and proxy services and servers;
Technical Restrictions. Work around any technical restrictions or limitations in the Services; or
Technical Restrictions. ▪ To access any other person’s computer or computer system, network, software or date without his or her knowledge and consent; breach the security of another user or system; or attempt to circumvent the user authentication or security of any host, network or account. This includes, but is not limited to, accessing data not intended for you, logging into or making use of a server or account you are not expressly authorized to access or probing the security of other hosts, networks or accounts without express permission to do so; ▪ To use or distribute tools or devices designed or used for compromising security or whose use is otherwise unauthorized, such as password guessing programs, decoders, password gatherers, keystroke loggers, analyzers, cracking tools, packet sniffers, encryption circumvention devices or Trojan Horse programs. Unauthorized port scanning is strictly prohibited; ▪ To distribute programs that make unauthorized changes to software (cracks); ▪ To use or run dedicated, stand-alone equipment or servers that provide network content or any other services to anyone outside of your Premises local area network (“Premises LAN”), also commonly referred to as public services or servers. Examples of prohibited equipment and servers include, but are not limited to, e-mail, Web hosting, file sharing and proxy services and servers; ▪ To service, alter, modify or tamper with Fort ▇▇▇▇▇▇▇ Family Communities LLC equipment or Service or permit any other person to do the same who is not authorized by Fort ▇▇▇▇▇▇▇ Family Communities LLC ▪ To alter network and usage restrictions; ▪ To restrict, inhibit or otherwise interfere with the ability of any other person, regardless of intent, purpose or knowledge, to use or enjoy the Service (except for tools for safety and security functions such as parental controls, for example), including, without limitation, posting or transmitted any information or software which contains a work, virus or other harmful feature, or generating levels of traffic sufficient to impede others’ ability to use, send or retrieve information; ▪ To restrict, inhibit, interfere with or otherwise disrupt or cause a performance degradation, regardless of intent, purpose or knowledge to the Service or any Villages of ▇▇▇▇▇▇▇ (or Charter Communications host, server, backbone network, node or service, or otherwise cause a performance degradation to any Villages of ▇▇▇▇▇▇▇ (or Charter Communications) facilities used to deliver the Service; ▪ To ...
Technical Restrictions. 3.1 With the conclusion of the Registrar Contract the Registrar receives the right to simultaneously use up to 4 (four) authentication sessions. 3.2 The Registrant may use a maximum of 4 (four) IP-addresses for sending EPP queries, which are added to the EIF information system firewall to ensure access for queries. 3.3 Inactive session shall be cancelled by EIF after 5 minutes. 3.4 Each EPP query ending with an error message brings with it a session block of up to 1 second. 3.5 A Registrar may not make more than 100 EPP queries per minute. 3.6 EIF guarantees registrars 24/7 availability of EPP service at a level of availability of 99.6%. The Registrar is ensured access to four simultaneous authentication sessions. 3.7 The limits applicable to inquiries into the public WHOIS service are published on the EIF website. In the event of justified need, the Registrar may request EIF to apply greater limits to the inquiries coming from the Registrar's system.
Technical Restrictions. You must not: (a) attach anything directly or indirectly to the NWP Phone or to any equipment that we provide for the purposes of the Services, including the housing containing NWP equipment or the panels that the equipment is attached to; or (b) electrically connect anything to any equipment that we provide so that you can use the Services; or
Technical Restrictions. Access any other person's computer or computer system, network, software, or data without his or her knowledge and consent; breach the security of another user or system; or attempt to circumvent the user authentication or security of any host, network, or account. This includes, but is not limited to, accessing data not intended for you, logging into or making use of a server or account you are not expressly authorized to access, or probing the security of other hosts, networks, or accounts without express permission to do so; Use or distribute tools or devices designed or used for compromising security or whose use is otherwise unauthorized, such as password guessing programs, decoders, password gatherers, keystroke loggers, analyzers, cracking tools, packet sniffers, encryption circumvention devices, or Trojan Horse programs. Unauthorized port scanning is strictly prohibited; Copy, distribute, or sublicense any proprietary software provided in connection with the Products by Comcast; Distribute programs that make unauthorized changes to software (cracks); Alter, modify, or tamper with the Products or permit any other person to do the same who is not authorized by Comcast; Restrict, inhibit, or otherwise interfere with the ability of any other entity, to use or enjoy the Products, including posting or transmitting any information or software which contains a worm, virus, or other harmful feature, or generating levels of traffic sufficient to impede others’ ability to use, send, or retrieve information; Restrict, inhibit, interfere with, or otherwise disrupt or cause a performance degradation to the Products or any Comcast (or Comcast supplier) host, server, backbone network, node or service, or otherwise cause a performance degradation to any Comcast (or Comcast supplier) facilities used to deliver the Products; Interfere with computer networking or telecommunications service to any user, host or network, including, without limitation, penetration testing, denial of service attacks, flooding of a network, overloading a service, improper seizing and abusing operator privileges, and attempts to “crash” a host. Customer may not access or use the Products in connection with the operation of nuclear facilities, aircraft navigation, communication systems, medical devices, air traffic control devices, real time control systems or other similarly hazardous situations in a manner that if the Products were to fail it could lead to death, personal injury, property ...

Related to Technical Restrictions

  • General Restrictions The registered Holder of this Purchase Warrant agrees by his, her or its acceptance hereof, that such Holder will not: (a) sell, transfer, assign, pledge or hypothecate this Purchase Warrant (or any Shares issuable upon the exercise of this Purchase Warrant) for a period of one hundred eighty (180) days following the effective date of the Registration Statement (the “Effective Date”) to anyone other than: (i) the Underwriter or a selected dealer participating in the Offering, or (ii) a bona fide officer or partner of the Underwriter or of any such selected dealer, in each case in accordance with FINRA Conduct Rule 5110(e)(1), or (b) cause this Purchase Warrant or the securities issuable hereunder to be the subject of any hedging, short sale, derivative, put or call transaction that would result in the effective economic disposition of this Purchase Warrant or the securities hereunder, except as provided for in FINRA Rule 5110(e)(2). On and after that date that is one hundred eighty (180) days after the Effective Date, transfers to others may be made subject to compliance with or exemptions from applicable securities laws. In order to make any permitted assignment, the Holder must deliver to the Company the assignment form attached hereto as Exhibit B duly executed and completed, together with this Purchase Warrant and payment of all transfer taxes, if any, payable in connection therewith. The Company shall within five (5) Business Days transfer this Purchase Warrant on the books of the Company and shall execute and deliver a new Purchase Warrant or Purchase Warrants of like tenor to the appropriate assignee(s) expressly evidencing the right to purchase the aggregate number of Ordinary Shares purchasable hereunder or such portion of such number as shall be contemplated by any such assignment.

  • LICENCE RESTRICTIONS You agree that you will: • not rent, lease, sub-license, loan, provide, or otherwise make available, the App or the Services in any form, in whole or in part to any person without prior written consent from us; • not copy the App, Documentation or Services, except as part of the normal use of the App or where it is necessary for the purpose of back-up or operational security; • not translate, merge, adapt, vary, alter or modify, the whole or any part of the App, Documentation or Services nor permit the App or the Services or any part of them to be combined with, or become incorporated in, any other programs, except as necessary to use the App and the Services on devices as permitted in these terms; • not disassemble, de-compile, reverse engineer or create derivative works based on the whole or any part of the App or the Services nor attempt to do any such things, except to the extent that (by virtue of sections 50B and 296A of the Copyright, Designs and Patents Act 1988) such actions cannot be prohibited because they are necessary to decompile the App to obtain the information necessary to create an independent program that can be operated with the App or with another program (Permitted Objective), and provided that the information obtained by you during such activities: •is not disclosed or communicated without the Licensor’s prior written consent to any third party to whom it is not necessary to disclose or communicate it in order to achieve the Permitted Objective; and •is not used to create any software that is substantially similar in its expression to the App; •is kept secure; and •is used only for the Permitted Objective; • comply with all applicable technology control or export laws and regulations that apply to the technology used or supported by the App or any Service.

  • Additional Restrictions In addition to any other restrictions on Transfer contained in this Agreement, in no event may any Transfer of a Partnership Interest by any Partner or any redemption pursuant to Section 8.6 be made without the express consent of the General Partner, in its sole and absolute discretion, (i) to any person or entity who lacks the legal right, power or capacity to own a Partnership Interest; (ii) in violation of applicable law; (iii) of any component portion of a Partnership Interest, such as the Capital Account, or rights to distributions, separate and apart from all other components of a Partnership Interest; (iv) if in the opinion of the General Partner based on the advice of legal counsel, if appropriate, such Transfer would cause a termination of the Partnership for federal or state income tax purposes (except as a result of a redemption of all Partnership Units held by all Limited Partners); (v) if in the opinion of the General Partner based on the advice of legal counsel, if appropriate, such Transfer would cause the Partnership to cease to be classified as a partnership for federal income tax purposes (except as a result of a redemption of all Partnership Units held by all Limited Partners); (vi) if such Transfer requires the registration of such Partnership Interest pursuant to any applicable federal or state securities laws; (vii) if such Transfer would cause the Partnership to become a “publicly traded partnership,” as such term is defined in Section 7704(b) of the Code (provided that this clause (vii) shall not be the basis for limiting or restricting in any manner the exercise of the Redemption Right under Section 8.6 unless, and only to the extent that, outside tax counsel advises the General Partner that, in the absence of such limitation or restriction, there is a significant risk that the Partnership will be treated as a “publicly traded partnership” and, by reason thereof, taxable as a corporation); (viii) if such Transfer would cause the General Partner to own 10% or more of the ownership interests of any tenant of a property held by the Partnership within the meaning of Section 856(d)(2)(B) of the Code; (ix) if such Transfer would result in the General Partner being “closely held” within the meaning of Section 856(h) of the Code; or (x) if in the opinion of the General Partner based on the advice of legal counsel, if appropriate, such Transfer would adversely affect the ability of the General Partner to continue to qualify as a REIT or subject the General Partner to any additional taxes under Sections 857 or 4981 of the Code.

  • ▇▇▇▇▇▇▇ ▇▇▇▇▇▇▇ Restrictions/Market Abuse Laws The Participant acknowledges that, depending on his or her country, the broker’s country, or the country in which the Shares are listed, the Participant may be subject to ▇▇▇▇▇▇▇ ▇▇▇▇▇▇▇ restrictions and/or market abuse laws in applicable jurisdictions, which may affect his or her ability to accept, acquire, sell, or attempt to sell or otherwise dispose of Shares or rights to Shares (e.g., Special Retention Awards) or rights linked to the value of Shares, during such times as the Participant is considered to have “inside information” regarding the Company (as defined by applicable laws or regulations in the applicable jurisdictions, including the United States and the Participant’s country). Local ▇▇▇▇▇▇▇ ▇▇▇▇▇▇▇ laws and regulations may prohibit the cancellation or amendment of orders the Participant placed before possessing inside information. Furthermore, the Participant may be prohibited from (i) disclosing the inside information to any third party, including fellow employees (other than on a “need to know” basis) and (ii) “tipping” third parties or causing them to otherwise buy or sell securities. Any restrictions under these laws or regulations are separate from and in addition to any restrictions that may be imposed under any applicable Company ▇▇▇▇▇▇▇ ▇▇▇▇▇▇▇ policy. The Participant acknowledges that it is his or her responsibility to comply with any applicable restrictions, and the Participant should consult his or her personal advisor on this matter.

  • Usage Restrictions Customer will not (a) make any Service or Content available to anyone other than Customer or Users, or use any Service or Content for the benefit of anyone other than Customer or its Affiliates, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or Non-▇▇▇▇▇▇ Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-▇▇▇▇▇▇ Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Services or Content in a way that circumvents a contractual usage limit, or use any Services to access or use any of ▇▇▇▇▇▇ intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Customer's own intranets or otherwise for its own internal business purposes or as permitted in the Documentation, (k) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content or access it to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service, or (4) determine whether the Services are within the scope of any patent.