The User must not Sample Clauses

The User must not a. Do anything which would allow the Church to revoke the Licence as contemplated by Clause 4; b. Do anything which contravenes Clause 6; or c. Do anything (or fail to do something) which would cause a breach of the terms of the User’s or the Church’s insurance policy, or otherwise prejudice such a policy.
AutoNDA by SimpleDocs
The User must not. 6.1 Assign transfer or sub-let the User’s rights under this Agreement 6.2 Be in or about the Building or use the desk space outside the Permitted Hours 6.3 Damage the Building or any of the Charity’s property in the Building, the facilities in the Building and the furniture provided for the User 6.4 Leave rubbish or refuse anywhere other than in the receptacles provided 6.5 Enter other rooms in the building or disturb other activities that may be taking place in The Arc Community Hub 6.6 Eat food with strong odours at your desk.
The User must not. (a) use the Studio for any purpose other than the Acceptable Use; (b) do anything in connection with the Studio which may cause a nuisance, interfere with any other person or be dangerous or offensive in ACMI's reasonable opinion; (c) display or affix any signs, advertisements, posters, flag or notices, to any part of the Studio or the Building without the prior written consent of ACMI (such consent to be at the absolute discretion of ACMI); (d) use the Studio for any illegal purpose or carry on any noxious or offensive activity on the Studio or the Building; (e) use any equipment, plant or fitting in the Studio for any purpose except that for which it was constructed, installed or designed; (f) transfer this arrangement to another person or legal entity;

Related to The User must not

  • Query a search query initiated from the Search Box or a Hyperlink, or a request for Matched Ads initiated by the Ad Code on an Ad Page. Results: Paid Search Results, Hyperlink Results, Domain Match Results, Web Search Results and/or Matched Ads, to the extent included in this Agreement and as appropriate to the context. Search Box: a graphical area in which a user can enter a Query. SO: the Service Order.

  • End User This agreement shall bind the ordering activity as end user but shall not operate to bind a Government employee or person acting on behalf of the Government in his or her personal capacity.

  • Software Use Case Red Hat Enterprise Linux Developer Suite Subscription Services for Red Hat Enterprise Linux Developer Suite are available for Development Purposes only.

  • Local Switching 4.1.1 BellSouth shall provide non-discriminatory access to local circuit switching capability, and local tandem switching capability, on an unbundled basis, except as set forth below in Section 4.1.

  • Network Access TENANT may find it necessary to purchase a network interface card, wireless PC card or other hardware in order to connect to the internet service. LANDLORD is not responsible for the purchase of these items and LANDLORD cannot guarantee compatibility with any device TENANT may have. The computer and network card must have software installed that supports the Internet Protocol commonly referred to as TCP/IP. Any conflicts between the software compatibility of the network and the TENANT’S computer operating system or any other feature will be the responsibility of the TENANT to resolve. LANDLORD will not be responsible for software issues related to the user’s personal computer.

  • End Users Customer will control access to and use of the Products by End Users and is responsible for any use of the Products that does not comply with this Agreement.

  • Connectivity User is solely responsible for providing and maintaining all necessary electronic communications with Exchange, including, wiring, computer hardware, software, communication line access, and networking devices.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • The Web Services E-Verify Employer Agent agrees to, consistent with applicable laws, regulations, and policies, commit sufficient personnel and resources to meet the requirements of this MOU.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!