THINGS YOU MAY NOT DO Sample Clauses

THINGS YOU MAY NOT DO. The Software and Documentation are protected by United States copyright laws and international treaties. You must treat the Software and Documentation like any other copyrighted material -- for example a book. You may not:
AutoNDA by SimpleDocs
THINGS YOU MAY NOT DO. The “ATBOS®Trade“ software and Documentation are protected by Canadian copyright laws and international treaties. You must treat the “ATBOS®Trade“ software and Documentation like any other copyrighted material. You agree to not:
THINGS YOU MAY NOT DO. You agree and acknowledge that the Software and Documentation are proprietary works that may be protected by the copyright laws of various nations. You may only use the Software and Documentation for the purposes and in accordance with the terms of this Agreement. You may not, without limitation:
THINGS YOU MAY NOT DO. The Software is protected by United States copyright laws and international treaties. You must treat the Software like any other copyrighted materialfor example, a book. You may not: • copy the Software except to make archival or backup copies as provided above, or in ways explicitly enumerated in the “License Grant” section above, • in your own installer, overwrite a higher-versioned copy of one of the Redistributable Files with a lower-versioned copy without warning the user and obtaining confirmation, • reverse engineer, disassemble, decompile or make any attempt to discover the source code of the Software, or • “crack” or otherwise attempt to circumvent or defeat the encryption and other measures embedded in the Software to protect our rights. • publish the Software in a library or toolkit, or otherwise offer it to other developers in a form that substantially duplicates the features and benefits of the Software as offered by us.
THINGS YOU MAY NOT DO. The HIFIS Software and Documentation are protected by Canadian copyright laws and international treaties. You must treat the HIFIS Software and Documentation like any other copyrighted material. You agree to not:
THINGS YOU MAY NOT DO. For greater certainty, you agree not to:
THINGS YOU MAY NOT DO. The Software and Documentation are protected by United States copyright laws and international treaties. You must treat the Software and Documentation like any other copyrighted material. You may not, directly or indirectly: • copy the Documentation • copy the Software except to make an archival or back-up copy • modify or adapt the Software or merge it into another program • reverse engineer, disassemble, decompile, or make any attempt to discover the source code of the Software • share your user name or password with anyone • place the Software onto a server so that it is accessible via a public network such as the Internet or via a private intranet network • sublicense, rent, lease, lend, give, or otherwise transfer the Software or Documentation or any portion thereof to any other person or entity • use the Software for any purpose other than to communicate with or access data from the Entity via a RETS server • use the Software to cause denial of service to other users • use the Software in a manner that is inconsistent with this Agreement Access Rights You acknowledge and agree that you must have access rights, at all times, to the System in order to retain the license to use the Software. You represent and warrant that you currently have access rights to the System as granted by the Entity. You understand that your right to use the Software shall immediately terminate if your access rights to the System are terminated for any reason. Warranty Disclaimer THE SOFTWARE AND DOCUMENTATION ARE PROVIDED “AS IS” WITHOUT ANY WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, WITHOUT LIMITATION, ANY WARRANTY OF TITLE, NONINFRINGEMENT, MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR THAT THE SOFTWARE IS FREE FROM ERROR. Limitation of Liability UNDER NO CIRCUMSTANCES SHALL WE BE LIABLE TO YOU FOR ANY DIRECT, INDIRECT, SPECIAL, INCIDENTAL, CONSEQUENTIAL, EXEMPLARY, OR PUNITIVE DAMAGES OF ANY KIND ARISING FROM OR IN ANY WAY CONNECTED WITH YOUR USE OF THE SOFTWARE. ANY CLAIM AGAINST US SHALL BE LIMITED TO REPLACEMENT OF THE SOFTWARE OR ONE DOLLAR ($1.00). Use of RETS Data Use of RETS data is limited to the specifications put forth by the Entity. Any use other than those specified by the Entity will automatically terminate this Agreement.
AutoNDA by SimpleDocs
THINGS YOU MAY NOT DO. The Software is protected by United States copyright laws and international treaties. You must treat the Software like any other copyrighted material-for example, a book. You may not: Copy the Software except to make archival or backup copies as provided above, reverse engineer, disassemble, decompile or make any attempt to discover the source code of the Software, or “crack” or otherwise attempt to circumvent or defeat the encryption and other measures embedded in the Software to protect our rights, publish the Software in a library or toolkit, or otherwise offer it to other developers in a form that substantially duplicates the features and benefits of the Software as offered by us.

Related to THINGS YOU MAY NOT DO

  • HOW WE MAY USE YOUR PERSONAL INFORMATION 8.1 We will use the personal information You provide to Us to:

  • Protecting Your Personal Information In addition to protecting your access codes, you should also take precautions to protect your personal identification information, such as your driver’s license, Social Security number, or tax identification number. This information by itself or together with account information may allow unauthorized access to your accounts. You should treat personal information with the same level of care that you would for your account information. You should also protect and secure all information and data stored in any personal computer or other equipment you use to access our Online Banking service.

  • PROTECTION OF YOUR CONTENT 5.1 In order to protect Your Content provided to Oracle as part of the provision of the Services, Oracle will comply with the applicable administrative, physical, technical and other safeguards, and other applicable aspects of system and content management, available at xxxx://xxx.xxxxxx.xxx/us/corporate/contracts/cloud-services/index.html.

  • You may A. Use only one copy of any version of the Software contained on the enclosed CD-ROM or floppy disk or downloaded from the Internet or any other online source on a single computer;

  • You must A. keep records in sufficient detail to enable all EPRs to be easily and accurately determined;

  • Protecting Your Account The Service will allow Business Customers to establish individual Access IDs, passcodes, privileges for each Authorized User. Transaction history is maintained for each Access ID. Additional fees maybe assessed for each Access ID. BUSINESS CUSTOMER(S) WILL BE SOLELY RESPONSIBLE FOR DESIGNATING ITS AUTHORIZED USERS, ASSIGNING PRIVILEGES, AND DISCLOSING THE IDENTITY OF SAID USERS TO THIS INSTITUTION AND ALL CHANGES THEREOF IN WRITING. BUSINESS CUSTOMER REPRESENTS AND WARRANTS THAT ITS AUTHORIZED USERS HAVE THE APPROPRIATE AUTHORITY TO INITIATE TRANSFERS AND BILL PAYMENTS THROUGH THE SERVICE. BUSINESS CUSTOMER AUTHORIZES THIS INSTITUTION AND ITS SERVICE PROVIDERS TO ACT UPON, AND YOU AGREE TO BE BOUND BY, ANY TRANSACTION, WHETHER OR NOT AUTHORIZED, THAT IS INITIATED WITH YOUR ACCESS ID AND PASSCODE AND/OR THE ACCESS ID AND PASSCODE OF AN AUTHORIZED USER. FURTHERMORE, ANY INSTRUCTIONS, DIRECTIONS, OR OTHER INFORMATION PROVIDED BY THE BUSINESS CUSTOMER, OR ANY OF ITS AUTHORIZED USERS, WILL BE DEEMED TO HAVE BEEN AUTHORIZED BY THE BUSINESS CUSTOMER. THIS FINANCIAL INSTITUTION AND ITS SERVICE PROVIDERS WILL NOT BE RESPONSIBLE FOR VERIFYING THE IDENTITY OR AUTHENTICITY OF ANY PERSON CLAIMING TO BE AN AUTHORIZED USER OF THE BUSINESS CUSTOMER. BUSINESS CUSTOMER ASSUMES ANY AND ALL LIABILITY ARISING FROM THE USE OR MISUSE OF THE SERVICE OR COMPANY ACCOUNTS BY ITS AUTHORIZED USERS. BUSINESS CUSTOMER AGREES TO INDEMNIFY AND HOLD HARMLESS THIS FINANCIAL INSTITUTION AND ITS SERVICE PROVIDERS FOR ANY LIABILITY AND DAMAGES RESULTING FROM OUR ACTING UPON ANY DIRECTION, INSTRUCTION, OR INFORMATION THAT IS INITIATED WITH AN ACCESS ID AND PASSCODE OF AN AUTHORIZED USER. YOU AGREE THAT WE MAY SEND NOTICES AND OTHER COMMUNICATIONS, INCLUDING EMAILS, TO THE CURRENT ADDRESS SHOWN IN OUR RECORDS, WHETHER OR NOT THAT ADDRESS INCLUDES A DESIGNATION FOR DELIVERY TO THE ATTENTION OF ANY PARTICULAR INDIVIDUAL. YOU FURTHER AGREE THAT FINANCIAL INSTITUTION NAME AND/OR ITS SERVICE PROVIDERS WILL NOT BE RESPONSIBLE OR LIABLE TO YOU IN ANY WAY IF INFORMATION IS INTERCEPTED BY AN UNAUTHORIZED PERSON, EITHER IN TRANSIT OR AT YOUR PLACE OF BUSINESS. IN ADDITION, YOU AGREE TO • REQUIRE ALL AUTHORIZED USERS TO KEEP PASSCODES SECURE AND STRICTLY CONFIDENTIAL; • IMMEDIATELY NOTIFY US AND SELECT A NEW PASSWORD IF YOU OR YOUR AUTHORIZED USERS BELIEVE YOUR PASSCODES MAY HAVE BECOME KNOWN TO AN UNAUTHORIZED PERSON. WE MAY DISABLE PASSCODES OF AUTHORIZED USERS EVEN WITHOUT RECEIVING SUCH NOTICE FROM YOU, IF WE SUSPECT PASSCODES ARE BEING USED IN AN UNAUTHORIZED OR FRAUDULENT MANNER. BUSINESS CUSTOMERS SHALL BE SOLELY RESPONSIBLE FOR THE DEVELOPMENT AND IMPLEMENTATION OF ALL COMMERCIALLY REASONABLE PROCEDURES TO CONTROL ACCESS TO THEIR COMPUTER SYSTEMS AND TO PROTECT ANY DATA FILES STORED THEREON. BUSINESS CUSTOMERS SHALL BE SOLELY RESPONSIBLE FOR ALL APPROPRIATE AND COMMERCIALLY REASONABLE, PHYSICAL, LOGICAL, AND NETWORK SECURITY SYSTEMS AND DEVICES TO PROTECT THE SECURITY OF DATA FILES MAINTAINED ON COMPUTER(S) USED TO ACCESS THE SERVICE AS WELL AS THE PROTECTION AGAINST UNAUTHORIZED ACCESS TO BUSINESS COMPUTERS, AND/OR NETWORKS USED TO ACCESS THE SERVICE. BUSINESS CUSTOMERS SHALL BE SOLELY RESPONSIBLE FOR ANY AND ALL LOSSES AND DAMAGES ARISING FROM ANY AUTHORIZED OR UNAUTHORIZED ACCESS TO THE SERVICE. THIS FINANCIAL INSTITUTION AND ITS SERVICE PROVIDERS SHALL HAVE NO OBLIGATION, LIABILITY OR CONTROL, EITHER DIRECTLY OR INDIRECTLY CONCERNING THE BUSINESS CUSTOMERS’ SELECTION OF SECURITY SYSTEMS OR DEVICES FOR THE PROTECTION OF ANY DATA FILES OR COMPUTERS USED TO ACCESS THE SERVICES OR OVER BUSINESS CUSTOMERS DEVELOPMENT OR IMPLEMENTATION OF SECURITY PROCEDURES OR THE FAILURE OF BUSINESS CUSTOMER TO MAINTAIN SAID PROCEDURES.

  • In Your Home We cover the following infusion therapy services as part of our allowance for home infusion therapy services when provided by an agency approved by us: • nursing visits; • administration of infusions for therapeutic delivery of drugs, biologicals, and hydration; • infusions for total parenteral nutrition (including the infused TPN); • related equipment; and • supplies. For information about doctor home and office visits see Section 3.23 - Office Visits. For home care equipment and supplies, see Section 3.8 - Durable Medical Equipment, Medical Supplies, Enteral Formula or Food, and Prosthetic Devices. For radiation therapy or chemotherapy services, see Section 3.30 - Radiation Therapy/Chemotherapy Services. For Prescription Drugs, see the Summary of Pharmacy Benefits.

  • Protection of Your Data We will maintain administrative, physical, and technical safeguards for protection of the security, confidentiality and integrity of Your Data, as described in the Documentation. Those safeguards will include, but will not be limited to, measures for preventing access, use, modification or disclosure of Your Data by Our personnel except (a) to provide the Purchased Services and prevent or address service or technical problems, (b) as compelled by law in accordance with Section 8.3 (Compelled Disclosure) below, or (c) as You expressly permit in writing.

  • Protect Yourself I will ensure that the information, images, and materials I post online will not put me at risk. I will not publish my personal details, contact details, or a schedule of my activities. I will report any attacks or inappropriate behavior directed at me while online. I will protect passwords, accounts, and resources. I will not meet anyone in real life that I have met online without parental permission.

  • COMMUNICATION BETWEEN YOU AND XXXXX 24.1 Subject to any applicable laws, the Licensee authorised XXXXX to communicate with it by means of telephone, e-mail, fax, text or any mobile phone messaging services to the Licensees mobile device, laptop and/or computer.

Time is Money Join Law Insider Premium to draft better contracts faster.