Common use of Unacceptable Behavior Clause in Contracts

Unacceptable Behavior. Below are examples of unacceptable behavior. Each User agrees not to engage in such behavior. • Using, or attempting to use, Xxxxx resources without authorization or for purposes other than those stated in the PI’s approved allocation request • Attempting to copy or reverse engineer any Anton resources (including but not limited to any DESRES property, including all Anton hardware and software for Molecular Dynamics simulations) • Tampering with or obstructing the operation of and/or access to Anton resources and/or attempting to circumvent system security • Tampering with and/or obstructing access to a User’s data • Reading, changing, distributing, or copying others' data or software without authorization • Using Anton resources to attempt to gain unauthorized access to other computational sites • Activities in violation of any and all applicable local, state, and/or federal laws, regulations, and/or ordinances, and/or those of other countries • Activities that violate the intellectual property rights and/or privacy rights of a third party • Sharing passwords, and/or attempting to “crack” or guess other Users’ passwords • Obtaining passwords by other means, such as password capturing programs

Appears in 3 contracts

Samples: Anton End User Agreement, Anton End User Agreement, Anton End User Agreement

AutoNDA by SimpleDocs

Unacceptable Behavior. Below are examples of unacceptable behavior. Each User agrees not to engage in such behavior. • Using, or attempting to use, Xxxxx Anton resources without authorization or for purposes other than those stated in the PI’s approved allocation request • Attempting to copy or reverse engineer any Anton resources (including but not limited to any DESRES property, including all Anton hardware and software for Molecular Dynamics simulations) • Tampering with or obstructing the operation of and/or access to Anton resources and/or attempting to circumvent system security • Tampering with and/or obstructing access to a User’s data • Reading, changing, distributing, or copying others' data or software without authorization • Using Anton resources to attempt to gain unauthorized access to other computational sites • Activities in violation of any and all applicable local, state, and/or federal laws, regulations, and/or ordinances, and/or those of other countries • Activities that violate the intellectual property rights and/or privacy rights of a third party • Sharing passwords, and/or attempting to “crack” or guess other Users’ passwords • Obtaining passwords by other means, such as password capturing programs

Appears in 1 contract

Samples: Anton End User Agreement

AutoNDA by SimpleDocs
Time is Money Join Law Insider Premium to draft better contracts faster.