Common use of Unacceptable Behavior Clause in Contracts

Unacceptable Behavior. Below are examples of unacceptable behavior. Each User agrees not to engage in such behavior. • Using, or attempting to use, Xxxxx resources without authorization or for purposes other than those stated in the PI’s approved allocation request • Attempting to copy or reverse engineer any Anton resources (including but not limited to any DESRES property, including all Anton hardware and software for Molecular Dynamics simulations) • Tampering with or obstructing the operation of and/or access to Anton resources and/or attempting to circumvent system security • Tampering with and/or obstructing access to a User’s data • Reading, changing, distributing, or copying others' data or software without authorization • Using Anton resources to attempt to gain unauthorized access to other computational sites • Activities in violation of any and all applicable local, state, and/or federal laws, regulations, and/or ordinances, and/or those of other countries • Activities that violate the intellectual property rights and/or privacy rights of a third party • Sharing passwords, and/or attempting to “crack” or guess other Users’ passwords • Obtaining passwords by other means, such as password capturing programs

Appears in 3 contracts

Samples: End User Agreement, End User Agreement, End User Agreement

AutoNDA by SimpleDocs

Unacceptable Behavior. Below are examples of unacceptable behavior. Each User agrees not to engage in such behavior. • Using, or attempting to use, Xxxxx Anton resources without authorization or for purposes other than those stated in the PI’s approved allocation request • Attempting to copy or reverse engineer any Anton resources (including but not limited to any DESRES property, including all Anton hardware and software for Molecular Dynamics simulations) • Tampering with or obstructing the operation of and/or access to Anton resources and/or attempting to circumvent system security • Tampering with and/or obstructing access to a User’s data • Reading, changing, distributing, or copying others' data or software without authorization • Using Anton resources to attempt to gain unauthorized access to other computational sites • Activities in violation of any and all applicable local, state, and/or federal laws, regulations, and/or ordinances, and/or those of other countries • Activities that violate the intellectual property rights and/or privacy rights of a third party • Sharing passwords, and/or attempting to “crack” or guess other Users’ passwords • Obtaining passwords by other means, such as password capturing programs

Appears in 1 contract

Samples: End User Agreement

AutoNDA by SimpleDocs
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!