Unauthorised activity Sample Clauses

Unauthorised activity. The Housing Support Provider must: (a) not permit any activity to occur on the Premises that is not authorised under this Deed, without first obtaining the Director’s prior written consent; (b) ensure that the Premises are not used for any illegal activities or improper use.
AutoNDA by SimpleDocs
Unauthorised activity. 5.1 The Supplier shall not be liable (and shall accordingly be absolved of any responsibility for the achievement of the Service Levels in the event that any faults or issues develop as a result of any of the following events (not by way of limitation): 5.1.1 a relocation or a modification of the Software or Professional Services (including but not limited to by the Customer or a third party adding to or interfacing the Software with other software) which is neither carried out nor approved by the Supplier; 5.1.2 improper use or abuse of the Software or Professional Services by any person other than the Supplier; 5.1.3 any use of the Software or Professional Services by a person other than the Supplier which contravenes an express written instruction or recommendation reasonably given by the Supplier to the Customer in relation to the Software or Professional Services; 5.1.4 an event of Force Majeure; 5.1.5 loss of or damage to any files or data where the Customer has failed to keep backups in line with either the Supplier’s recommendations (where applicable) or generally accepted industry standards in relation to the maintenance of back-ups; 5.1.6 any issues which cannot be diagnosed because of a lack of available and appropriate network connectivity. 5.2 If a fault or issue arises as a result of any of the events described in clause 5.1 then, if requested to do so, the Supplier may attend to such fault or issue and charge the Customer on a time and materials basis in accordance with its then Out of Scope Fees, even if such attendance is purely conducted with the objective of ascertaining the cause of the actual fault or issue to the extent that this is unknown or uncertain. 5.3 In the event that the Customer requires to make changes which are not recommended by the Supplier to either the Professional Services, Software or operating systems, and further requires the Supplier to implement such changes, then the Supplier may agree to undertake such work on the basis that the Supplier shall charge the Customer for such work and the Supplier shall be absolved of any responsibility for the achievement of the Service Levels as may be defined within the PS Schedule. 5.4 The Customer acknowledges and agrees that for the Supplier to be able to provide the Professional Services the Customer shall: 5.4.1 Co-operate with the Supplier as the Supplier reasonably requires. 5.4.2 Provide to the Supplier such information as the Supplier reasonably requires and accepts tha...
Unauthorised activity. You must not, in connection with the Website and your use of the Website: (a) modify, adapt, or otherwise alter the Website except in the course of normal use; (b) provide false, misleading, deceptive or otherwise inaccurate Information; (c) act fraudulently; (d) copy, reproduce, create derivative works or publicly display any content contained in the Website (with the exception of your Information); (e) infringe our or any third party’s copyright, patent, trade xxxx, trade secret, confidential information, or any other proprietary or intellectual property rights; (f) take any action that will result on an unreasonable or disproportionately large load being imposed on our infrastructure; (g) incorporate material into the Website or otherwise post any Information that: (i) violates or infringes any applicable law or any right of a third party (including intellectual property rights); or (ii) is threatening, abusive, defamatory, invasive of privacy, libellous, defamatory, vulgar, obscene, profane, or which may otherwise harass or cause distress or inconvenience to, or incite hatred of, any person; (h) use any robot, spider, other automatic device or manual process to monitor or copy the Website, or content contained in the Website; (i) remove, disable, defeat, or otherwise circumvent any functionality of the Website (including a requirement to use a user name and password or other authentication method, or other security protection or preventative measures against unauthorised use); (j) damage, disrupt, disable or otherwise impair the operation of the Website or interfere with the use of the Website by other persons, including introduce a virus, Trojan horse or other malware into the Website intended to cause damage , breach, malfunction, or other undesired effects to the Website, or carry out a denial of service attack; and we may terminate your account should you do, or we suspect you have done or may do, any of the above.
Unauthorised activity. The Supplier shall not be liable (and shall accordingly be absolved of any responsibility for the achievement of the Service Levels defined in each MS Schedule) in the event that any faults or issues develop as a result of any of the following events (not by way of limitation):

Related to Unauthorised activity

  • Unauthorised use We shall not be liable for any loss, liability or cost whatsoever arising from any unauthorised use of the Electronic Service. You shall on demand indemnify, protect and hold us harmless from and against all losses, liabilities, judgements, suits, actions, proceedings, claims, damages and costs resulting from or arising out of any act or omission by any person using an Electronic Service by using your designated passwords, whether or not you authorised such use.

  • Outside Activity A. Although an employee may, in accordance with Article 19, Conflict of Interest/Outside Activity, engage in outside activity, including employment, pursuant to a consulting agreement, requirements that an employee waive the employee's or University's rights to any work or inventions which arise during the course of such outside activity must be approved by the President or representative. B. An employee who proposes to engage in such outside activity shall furnish a copy of this Article and the university's patents policy to the outside employer prior to or at the time a consulting or other agreement is signed, or if there is no written agreement, before the employment begins.

  • Unauthorized Work The contractor is not authorized at any time to commence task order performance prior to issuance of a signed TO or other written approval provided by the CO to begin work.

  • Unauthorised Use of Intellectual Property a) The Supplier/Service Provider agrees to notify Transnet in writing of any conflicting uses of, and applications of registrations of Patents, Designs and Trade Marks or any act of infringement, unfair competition or passing off involving the Intellectual Property of Transnet of which the Supplier/Service Provider acquires knowledge and Transnet shall have the right, as its own option, to proceed against any party infringing its Intellectual Property. b) It shall be within the sole and absolute discretion of Transnet to determine what steps shall be taken against the infringer and the Supplier/Service Provider shall co-operate fully with Transnet, at Transnet’s cost, in whatever measure including legal action to bring any infringement of illegal use to an end. c) The Supplier/Service Provider shall cooperate to provide Transnet promptly with all relevant ascertainable facts. d) If proceedings are commenced by Transnet alone, Transnet shall be responsible for all expenses but shall be entitled to all damages or other awards arising out of such proceedings. If proceedings are commenced by both Parties, both Parties will be responsible for the expenses and both Parties shall be entitled to damages or other awards arising out of proceedings.

  • Unauthorized Use or Disclosure The Contractor shall notify COMMERCE within five (5) working days of any unauthorized use or disclosure of any confidential information, and shall take necessary steps to mitigate the harmful effects of such use or disclosure.

  • Unauthorized Leave Leave other than that provided for in this section may be cause for disciplinary action.

  • Unauthorized Use The Participating Institutions, or the Authorized Users shall not knowingly permit anyone other than the Authorized Users to access the Licensed Materials.

  • Competitive Activity Executive shall be deemed to have engaged in "Competitive Activity" if, during the period commencing on the date hereof and ending on the second anniversary of the date Executive's employment with the Company or its subsidiaries terminates, (i) Executive, for himself or on behalf of any other person, firm, partnership, corporation, or other entity, engages, directly or indirectly, as an executive, agent, representative, consultant, partner, shareholder or holder of any other financial interest, in any business that competes with the Company or its subsidiaries in the line of business Executive is employed in by the Company or its subsidiaries (as applicable), as such business is described in any employment or severance agreement then in effect between Executive and the Company or one of its subsidiaries or, if no such agreement is then in effect, as described on Schedule II attached hereto (a "Competing Business"), it being understood and agreed that Executive's activities shall not satisfy this clause (i) where Executive is employed by a person, firm, partnership, corporation, or other entity engaged in a variety of activities, including the Competing Business, and Executive is not engaged in or responsible for the Competing Business of such entity. Executive may also, without satisfying clause (i) be a passive owner of not more than 2% of the outstanding publicly traded stock of any class of a Competing Business so long as Executive has no active participation in the business of such entity, except to the extent permitted above; or (ii) Executive (A) directly or indirectly through another entity, induces or attempts to induce any employee of the Company or its subsidiaries to leave the employ of the Company or its subsidiaries, or in any way interfere with the relationship between the Company or any of its subsidiaries and any employee thereof, (B) knowingly hires any person who was an employee of the Company or any of its subsidiaries within 180 days prior to the time such employee was hired by Executive, (C) induces or attempts to induce any customer, supplier, licensee or other business relation of the Company or any of its subsidiaries to cease doing business with the Company or its subsidiaries or in any way interfere with the relationship between any such customer, supplier, licensee or business relation and the Company or any subsidiary or (D) directly or indirectly acquires or attempt to acquire an interest in any business relating to the business of the Company or any of its subsidiaries and with which the Company or any of its subsidiaries has entertained discussions or has requested and received information relating to the acquisition of such business by the Company or its subsidiaries in the one-year period immediately preceding Executive's termination of employment with the Company.

  • Unauthorised Use of Confidential Information The Supplier/Service Provider shall not authorise any party to act on or use in any way any Confidential Information belonging to Transnet whether or not such party is aware of such Confidential Information, and shall promptly notify Transnet of the information if it becomes aware of any party so acting, and shall provide Transnet the information with such assistance as Transnet reasonably requires, at Transnet’s cost and expense, to prevent such third party from so acting.

  • Unauthorized Acts Each Party shall (a) notify the other Party promptly of any unauthorized possession, use, or knowledge of any Confidential Information by any person which shall become known to it, any attempt by any person to gain possession of Confidential Information without authorization or any attempt to use or acquire knowledge of any Confidential Information without authorization (collectively, "Unauthorized Access"), (b) promptly furnish to the other Party full details of the Unauthorized Access and use reasonable efforts to assist the other Party in investigating or preventing the reoccurrence of any Unauthorized Access, (c) cooperate with the other Party in any litigation and investigation against third parties deemed necessary by such Party to protect its proprietary rights, and (d) use commercially reasonable efforts to prevent a reoccurrence of any such Unauthorized Access.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!