Technical Restrictions Sample Clauses

Technical Restrictions. Work around any technical restrictions or limitations in the Services; or
AutoNDA by SimpleDocs
Technical Restrictions. ▪ To access any other person’s computer or computer system, network, software or date without his or her knowledge and consent; breach the security of another user or system; or attempt to circumvent the user authentication or security of any host, network or account. This includes, but is not limited to, accessing data not intended for you, logging into or making use of a server or account you are not expressly authorized to access or probing the security of other hosts, networks or accounts without express permission to do so; ▪ To use or distribute tools or devices designed or used for compromising security or whose use is otherwise unauthorized, such as password guessing programs, decoders, password gatherers, keystroke loggers, analyzers, cracking tools, packet sniffers, encryption circumvention devices or Trojan Horse programs. Unauthorized port scanning is strictly prohibited; ▪ To distribute programs that make unauthorized changes to software (cracks); ▪ To use or run dedicated, stand-alone equipment or servers that provide network content or any other services to anyone outside of your Premises local area network (“Premises LAN”), also commonly referred to as public services or servers. Examples of prohibited equipment and servers include, but are not limited to, e-mail, Web hosting, file sharing and proxy services and servers; ▪ To service, alter, modify or tamper with Fort Xxxxxxx Family Communities LLC equipment or Service or permit any other person to do the same who is not authorized by Fort Xxxxxxx Family Communities LLC ▪ To alter network and usage restrictions; ▪ To restrict, inhibit or otherwise interfere with the ability of any other person, regardless of intent, purpose or knowledge, to use or enjoy the Service (except for tools for safety and security functions such as parental controls, for example), including, without limitation, posting or transmitted any information or software which contains a work, virus or other harmful feature, or generating levels of traffic sufficient to impede others’ ability to use, send or retrieve information; ▪ To restrict, inhibit, interfere with or otherwise disrupt or cause a performance degradation, regardless of intent, purpose or knowledge to the Service or any Villages of Xxxxxxx (or Charter Communications host, server, backbone network, node or service, or otherwise cause a performance degradation to any Villages of Xxxxxxx (or Charter Communications) facilities used to deliver the Service; ▪ To ...
Technical Restrictions. You must not: (a) attach anything directly or indirectly to the NWP Phone or to any equipment that we provide for the purposes of the Services, including the housing containing NWP equipment or the panels that the equipment is attached to; or (b) electrically connect anything to any equipment that we provide so that you can use the Services; or
Technical Restrictions. No user of the Broadband Service, Customer Equipment, or the Xxxxxxxx Equipment may, individually or in combination with another: 1. use the Internet service or facilities for web-hosting, e-mail hosting, or other unusually high-bandwidth consumptionunless youhave made special subscriptionarrangements withBrantleyand the usage does not otherwise violate law or regulation; 2. access any other person's computer or computer system, network, software, or data without his or her knowledge and consent; breach the security of another user or system; or attempt to circumvent the user authentication or security of any host, network, or account. This includes, but is not limited to, accessing data not intended for you, logging into or making use of a server or account you are not expressly authorized to access, or probing the security of other hosts, networks, or accounts without express permission to doso; 3. use or distribute tools or devices designed or used for compromising security or whose use is otherwise unauthorized, such as password guessing programs, decoders, password gatherers, keystroke loggers, analyzers, cracking tools, packet sniffers, encryptioncircumvention devices, or Trojan Horse programs. Unauthorized port scanning is strictly prohibited; 4. copy, distribute, or sublicense any proprietary software provided in connection with the Broadband Service by Xxxxxxxx or any third party, except that you may make one copy of each software program for back-up purposes only; 5. distribute programs that make unauthorized changes to software (cracks); 6. use or run dedicated, stand-alone equipment or servers from the Premises that provide network content or any other services to anyone outside of your Premises local area network ("Premises LAN"), also commonly referred to as public services or servers. Examples of prohibited equipment and servers include, but are not limited to, e-mail, Web hosting, file sharing, and proxy services and servers;
Technical Restrictions. 3.1 With the conclusion of the Registrar Contract the Registrar receives the right to simultaneously use up to 4 (four) authentication sessions. 3.2 The Registrant may use a maximum of 4 (four) IP-addresses for sending EPP queries, which are added to the EIF information system firewall to ensure access for queries. 3.3 Inactive session shall be cancelled by EIF after 5 minutes. 3.4 Each EPP query ending with an error message brings with it a session block of up to 1 second. 3.5 A Registrar may not make more than 100 EPP queries per minute. 3.6 EIF guarantees registrars 24/7 availability of EPP service at a level of availability of 99.6%. The Registrar is ensured access to four simultaneous authentication sessions. 3.7 The limits applicable to inquiries into the public WHOIS service are published on the EIF website. In the event of justified need, the Registrar may request EIF to apply greater limits to the inquiries coming from the Registrar's system.
Technical Restrictions. Access any other person's computer or computer system, network, software, or data without his or her knowledge and consent; breach the security of another user or system; or attempt to circumvent the user authentication or security of any host, network, or account. This includes, but is not limited to, accessing data not intended for you, logging into or making use of a server or account you are not expressly authorized to access, or probing the security of other hosts, networks, or accounts without express permission to do so; Use or distribute tools or devices designed or used for compromising security or whose use is otherwise unauthorized, such as password guessing programs, decoders, password gatherers, keystroke loggers, analyzers, cracking tools, packet sniffers, encryption circumvention devices, or Trojan Horse programs. Unauthorized port scanning is strictly prohibited; Copy, distribute, or sublicense any proprietary software provided in connection with the Products by Comcast; Distribute programs that make unauthorized changes to software (cracks); Alter, modify, or tamper with the Products or permit any other person to do the same who is not authorized by Comcast; Restrict, inhibit, or otherwise interfere with the ability of any other entity, to use or enjoy the Products, including posting or transmitting any information or software which contains a worm, virus, or other harmful feature, or generating levels of traffic sufficient to impede others’ ability to use, send, or retrieve information; Restrict, inhibit, interfere with, or otherwise disrupt or cause a performance degradation to the Products or any Comcast (or Comcast supplier) host, server, backbone network, node or service, or otherwise cause a performance degradation to any Comcast (or Comcast supplier) facilities used to deliver the Products; Interfere with computer networking or telecommunications service to any user, host or network, including, without limitation, penetration testing, denial of service attacks, flooding of a network, overloading a service, improper seizing and abusing operator privileges, and attempts to “crash” a host. Customer may not access or use the Products in connection with the operation of nuclear facilities, aircraft navigation, communication systems, medical devices, air traffic control devices, real time control systems or other similarly hazardous situations in a manner that if the Products were to fail it could lead to death, personal injury, property ...

Related to Technical Restrictions

  • General Restrictions The registered Holder of this Purchase Warrant agrees by his, her or its acceptance hereof, that such Holder will not: (a) sell, transfer, assign, pledge or hypothecate this Purchase Warrant (or any Shares issuable upon the exercise of this Purchase Warrant) for a period of one hundred eighty (180) days following the effective date of the Registration Statement (the “Effective Date”) to anyone other than: (i) the Underwriter or a selected dealer participating in the Offering, or (ii) a bona fide officer or partner of the Underwriter or of any such selected dealer, in each case in accordance with FINRA Conduct Rule 5110(e)(1), or (b) cause this Purchase Warrant or the securities issuable hereunder to be the subject of any hedging, short sale, derivative, put or call transaction that would result in the effective economic disposition of this Purchase Warrant or the securities hereunder, except as provided for in FINRA Rule 5110(e)(2). On and after that date that is one hundred eighty (180) days after the Effective Date, transfers to others may be made subject to compliance with or exemptions from applicable securities laws. In order to make any permitted assignment, the Holder must deliver to the Company the assignment form attached hereto as Exhibit B duly executed and completed, together with this Purchase Warrant and payment of all transfer taxes, if any, payable in connection therewith. The Company shall within five (5) Business Days transfer this Purchase Warrant on the books of the Company and shall execute and deliver a new Purchase Warrant or Purchase Warrants of like tenor to the appropriate assignee(s) expressly evidencing the right to purchase the aggregate number of Ordinary Shares purchasable hereunder or such portion of such number as shall be contemplated by any such assignment.

  • LICENCE RESTRICTIONS You agree that you will: 17.1 not rent, lease, sub-license, loan, provide, or otherwise make available, the Apps or the Services in any form, in whole or in part to any person without prior written consent from us; 17.2 not copy the Apps, User Information or Services, except as part of the normal use of the Apps or where it is necessary for the purpose of back-up or operational security; 17.3 not translate, merge, adapt, vary, alter or modify, the whole or any part of the Apps, User Information or Services nor permit the Apps or the Services or any part of them to be combined with, or become incorporated in, any other programs, except as necessary to use the Apps and the Services on devices as permitted in these terms; 17.4 not disassemble, de-compile, reverse engineer or create derivative works based on the whole or any part of the Apps or the Services nor attempt to do any such things, except to the extent that (by virtue of sections 50B and 296A of the UK Copyright, Designs and Patents Act 1988) such actions cannot be prohibited because they are necessary to decompile the Apps to obtain the information necessary to create an independent program that can be operated with the Apps or with another program (Permitted Objective), and provided that the information obtained by you during such activities: (a) is not disclosed or communicated without our prior written consent to any third party to whom it is not necessary to disclose or communicate it in order to achieve the Permitted Objective; and (b) is not used to create any software that is substantially similar in its expression to the Apps; (c) is kept secure; and (d) is used only for the Permitted Objective; 17.5 comply with all applicable technology control or export laws and regulations that apply to the technology used or supported by the Apps or any Service; (a) not overload our servers by contributing or participation in a Denial of Service (DoS) attack.

  • Additional Restrictions In addition to any other restrictions on transfer contained in this Agreement, in no event may any Transfer of a Partnership Interest by any Partner or any redemption pursuant to Section 8.6 be made without the express consent of the General Partner, in its sole and absolute discretion, (i) to any person or entity who lacks the legal right, power or capacity to own a Partnership Interest; (ii) in violation of applicable law; (iii) of any component portion of a Partnership Interest, such as the Capital Account, or rights to distributions, separate and apart from all other components of a Partnership Interest; (iv) if in the opinion of the General Partner based on the advice of legal counsel, if appropriate, such Transfer would cause a termination of the Partnership for Federal or state income tax purposes (except as a result of a redemption of all Partnership Units held by all Limited Partners); (v) if in the opinion of the General Partner based on the advice of legal counsel, if appropriate, such Transfer would cause the Partnership to cease to be classified as a partnership for Federal income tax purposes (except as a result of a redemption of all Partnership Units held by all Limited Partners); (vi) if such Transfer requires the registration of such Partnership Interest pursuant to any applicable federal or state securities laws; (vii) if such Transfer would cause the Partnership to become a “publicly traded partnership,” as such term is defined in Section 7704(b) of the Code (provided that this clause (vii) shall not be the basis for limiting or restricting in any manner the exercise of the Redemption Right under Section 8.6 unless, and only to the extent that, outside tax counsel advises the General Partner that, in the absence of such limitation or restriction, there is a significant risk that the Partnership will be treated as a “publicly traded partnership” and, by reason thereof, taxable as a corporation); (viii) if such Transfer would cause the General Partner to own 10% or more of the ownership interests of any tenant of a property held by the Partnership within the meaning of Section 856(d)(2)(B) of the Code; (ix) if such Transfer would result in the General Partner being “closely held” within the meaning of Section 856(h) of the Code; or (x) if in the opinion the General Partner based on the advice of legal counsel, if appropriate, such Transfer would adversely affect the ability of the General Partner to continue to qualify as a REIT or subject the General Partner to any additional taxes under Section 857 or Section 4981 of the Code.

  • Usage Restrictions Customer will not (a) make any Service or Content available to anyone other than Customer or Users, or use any Service or Content for the benefit of anyone other than Customer or its Affiliates, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or Non-Xxxxxx Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-Xxxxxx Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Services or Content in a way that circumvents a contractual usage limit, or use any Services to access or use any of Xxxxxx intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Customer's own intranets or otherwise for its own internal business purposes or as permitted in the Documentation, (k) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content or access it to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service, or (4) determine whether the Services are within the scope of any patent.

  • Xxxxxxx Xxxxxxx Restrictions/Market Abuse Laws The Participant acknowledges that, depending on his or her country, the broker’s country, or the country in which the Shares are listed, the Participant may be subject to xxxxxxx xxxxxxx restrictions and/or market abuse laws in applicable jurisdictions, which may affect his or her ability to accept, acquire, sell, or attempt to sell or otherwise dispose of Shares or rights to Shares (e.g., Restricted Share Units), or rights linked to the value of Shares, during such times as he or she is considered to have “inside information” regarding the Company (as defined by applicable laws or regulations in the applicable jurisdictions, including the United States and the Participant’s country). Local xxxxxxx xxxxxxx laws and regulations may prohibit the cancellation or amendment of orders the Participant placed before possessing inside information. Furthermore, the Participant may be prohibited from (i) disclosing the inside information to any third party, including fellow employees (other than on a “need to know” basis) and (ii) “tipping” third parties or causing them to otherwise buy or sell securities. Any restrictions under these laws or regulations are separate from and in addition to any restrictions that may be imposed under any applicable Company xxxxxxx xxxxxxx policy. The Participant acknowledges that it is his or her responsibility to comply with any applicable restrictions, and the Participant should consult his or her personal advisor on this matter.

  • General Restriction A Member may not Dispose of all or any portion of its Membership Interest except by complying with all of the following requirements: (A) such Member must receive the unanimous consent of the non-Disposing Members, which consent shall not be unreasonably withheld by each of such other Members; provided, however, that such consent need not be obtained if (I) the proposed Assignee is a Wholly-Owned Affiliate of the Disposing Member and (II) such proposed Assignee demonstrates to the reasonable satisfaction of the other Members that it has the ability to meet the financial and contractual commitments and other obligations of the Disposing Member; and (B) such Member must comply with the requirements of Section 3.03(b)(iii) and, if the Assignee is to be admitted as a Member, Section 3.03(b)(ii).

  • Definitional Restrictions Notwithstanding anything in this Agreement to the contrary, to the extent that any amount or benefit that would constitute non-exempt “deferred compensation” for purposes of Section 409A of the Code (“Non-Exempt Deferred Compensation”) would otherwise be payable or distributable hereunder, or a different form of payment of such Non-Exempt Deferred Compensation would be effected, by reason of a Change in Control or the Executive’s termination of employment, such Non-Exempt Deferred Compensation will not be payable or distributable to the Executive, and/or such different form of payment will not be effected, by reason of such circumstance unless the circumstances giving rise to such Change in Control or termination of employment, as the case may be, meet any description or definition of “change in control event” or “separation from service,” as the case may be, in Section 409A of the Code and applicable regulations (without giving effect to any elective provisions that may be available under such definition). This provision does not prohibit the vesting of any Non-Exempt Deferred Compensation upon a Change in Control or termination of employment, however defined. If this provision prevents the payment or distribution of any Non-Exempt Deferred Compensation, such payment or distribution shall be made on the date, if any, on which an event occurs that constitutes a Section 409A-compliant “change in control event” or “separation from service,” as the case may be, or such later date as may be required by subsection (c) below. If this provision prevents the application of a different form of payment of any amount or benefit, such payment shall be made in the same form as would have applied absent such designated event or circumstance.

  • Use Restrictions (a) Company will not do or attempt to do, and Company will not permit any other person or entity to do or attempt to do, any of the following, directly or indirectly: (i) use any Proprietary Item for any purpose, at any location or in any manner not specifically authorized by this Agreement; (ii) make or retain any copy of any Proprietary Item except as specifically authorized by this Agreement; (iii) create, recreate or obtain the source code for any Proprietary Item; (iv) refer to or otherwise use any Proprietary Item as part of any effort to develop other software, programs, applications, interfaces or functionalities or to compete with BNYM or a Third Party Provider; (v) modify, adapt, translate or create derivative works based upon any Proprietary Item, or combine or merge any Proprietary Item or part thereof with or into any other product or service not provided for in this Agreement and not authorized in writing by BNYM; (vi) remove, erase or tamper with any copyright or other proprietary notice printed or stamped on, affixed to, or encoded or recorded in any Proprietary Item, or fail to preserve all copyright and other proprietary notices in any copy of any Proprietary Item made by Company; (vii) sell, transfer, assign or otherwise convey in any manner any ownership interest or Intellectual Property Right of BNYM, or market, license, sublicense, distribute or otherwise grant, or subcontract or delegate to any other person, including outsourcers, vendors, consultants, joint venturers and partners, any right to access or use any Proprietary Item, whether on Company’s behalf or otherwise; (viii) subcontract for or delegate the performance of any act or function involved in accessing or using any Proprietary Item, whether on Company’s behalf or otherwise; (ix) reverse engineer, re-engineer, decrypt, disassemble, decompile, decipher, reconstruct, re-orient or modify the circuit design, algorithms, logic, source code, object code or program code or any other properties, attributes, features or constituent parts of any Proprietary Item; (x) take any action that would challenge, contest, impair or otherwise adversely effect an ownership interest or Intellectual Property Right of BNYM; (xi) use any Proprietary Item to provide remote processing, network processing, network communications, a service bureau or time sharing operation, or services similar to any of the foregoing to any person or entity, whether on a fee basis or otherwise; (xii) allow Harmful Code into any Proprietary Item, as applicable, or into any interface or other software or program provided by it to BNYM, through Company’s systems or personnel or Company’s use of the Licensed Services or Company’s activities in connection with this Agreement. (b) Company shall, promptly after becoming aware of such, notify BNYM of any facts, circumstances or events regarding its or a Permitted User’s use of the Licensed System that are reasonably likely to constitute or result in a breach of this Section 2.12, and take all reasonable steps requested by BNYM to prevent, control, remediate or remedy any such facts, circumstances or events or any future occurrence of such facts, circumstances or events.

  • Securities Law Restrictions In addition to any restrictions to be contained in that certain letter agreement (commonly known as an “Insider Letter”) to be dated as of the closing of the IPO by and between Subscriber and the Company, Subscriber agrees not to sell, transfer, pledge, hypothecate or otherwise dispose of all or any part of the Shares unless, prior thereto (a) a registration statement on the appropriate form under the Securities Act and applicable state securities laws with respect to the Shares proposed to be transferred shall then be effective or (b) the Company has received an opinion from counsel reasonably satisfactory to the Company, that such registration is not required because such transaction is exempt from registration under the Securities Act and the rules promulgated by the Securities and Exchange Commission thereunder and with all applicable state securities laws.

  • License and Restrictions (i) Subject to the terms of this Agreement, we hereby grant you a limited, personal, revocable, nonexclusive, nonsublicensable, nonassignable, nontransferable, nonresellable license and right to use the Application for the sole purpose of your use of the Mobile Deposit Service. (ii) You acknowledge and agree that any and all intellectual property rights (the "IP Rights") in the Service and the Application are and shall remain the exclusive property of us. Nothing in this Agreement intends to or shall transfer any IP Rights, or to vest any IP Rights in, to you. You are only entitled to the limited use of the rights granted to you in this Agreement. You will not take any action to jeopardize, limit or interfere with the IP Rights. You acknowledge and agree that any unauthorized use of the IP Rights is a violation of this Agreement, as well as a violation of applicable intellectual property laws. You acknowledge and understand that all title and rights in and to any third party content that is not contained in the Service and Application, but may be accessed through the Service, is the property of the respective content owners and may be protected by applicable patent, copyright, or other intellectual property laws and treaties. (iii) You agree not to sell, assign, rent, lease, distribute, export, import, act as an intermediary or provider, or otherwise grant rights to third parties with regard to the Application or Service or any part thereof without our prior written consent. (iv) You agree not to undertake, cause, permit or authorize the modification, creation of derivative works, translation, reverse engineering, decompiling, disassembling or hacking of the Application, the Service, or any part thereof. You agree not intercept, capture, emulate, or redirect the communications protocols used by us for any purpose, including without limitation causing the Service or Application to connect to any computer server or other device not authorized by us. (v) We reserve the right to add or delete features or functions, or to provide programming fixes, updates and upgrades to the Service or Application. You acknowledge and agree that we have no obligation to make available to you any subsequent versions of the Application. You also agree that you may have to enter into a renewed version of this Agreement if you want to download, install or use a new version of the Service or Application. (vi) We have no obligation whatsoever to furnish any maintenance and support services with respect to the Service or Application, and any such maintenance and support services provided will be provided at our discretion. (vii) You grant to us a nonexclusive, perpetual, non-revocable, royalty free license to use, retain, and share any information transmitted through the Application by you, including your location, device-based location information, account numbers, name, date, account amount, and endorsements solely for the purpose of providing the Service. This license shall survive termination of this Agreement for such period as necessary for us to provide the Service, comply with the law, or comply with internal guidelines or procedures.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!