Unauthorised Guests Sample Clauses

Unauthorised Guests. You bring any person on to the Premises on an unauthorised basis, and in such instance you shall indemnify and hold harmless UG against all loss, liability, damages, expenses, injury, claim or proceedings suffered or in curred by UGS or UG as a result of such breach.

Related to Unauthorised Guests

  • Unauthorised use We shall not be liable for any loss, liability or cost whatsoever arising from any unauthorised use of the Electronic Service. You shall on demand indemnify, protect and hold us harmless from and against all losses, liabilities, judgements, suits, actions, proceedings, claims, damages and costs resulting from or arising out of any act or omission by any person using an Electronic Service by using your designated passwords, whether or not you authorised such use.

  • Authorised Users 2.1 Subject to the Customer purchasing and using the Services in accordance with and subject to the terms and conditions of this Agreement, Boomerang hereby grants to the Customer a non-exclusive, non-transferable right to permit the Authorised Users to use the Services and the Documentation during the Subscription Term solely for the Customer's internal business operations. 2.2 The Customer undertakes that: 2.2.1 it will not allow or suffer any user subscription to be used by more than one individual Authorised User unless it has been reassigned in its entirety to another individual Authorised User, in which case the prior Authorised User shall no longer have any right to access or use the Services and/or Documentation; 2.2.2 each Authorised User shall keep a secure password for his use of the Services and Documentation, that such password shall be changed no less frequently than monthly and that each Authorised User shall keep his password confidential; 2.2.3 it shall maintain a written, up to date list of current Authorised Users and provide such list to Boomerang within 5 Business Days of Boomerang's written request at any time or times; 2.2.4 it agrees that it and all Authorised Users will follow and comply with all instructions, guidelines and/or provisions of the Documentation in relation to the use of the Services; 2.2.5 it agrees that Boomerang’s records regarding Customer’s use of the Services shall be accepted at all times as correct (save for manifest error) and that if there are any issues regarding the Services the Customer hereby consents to Boomerang accessing the Customer account through its admins to view and endeavour to resolve any such issue including permitting Boomerang to audit the use of the Services in order to gather information and establish the facts relating to such issues. Boomerang shall in any event have the right to audit Customer’s use of the Services provided that such audit may be conducted no more than once per quarter, at Boomerang's expense, and this right shall be exercised with reasonable prior notice, in such a manner as not to substantially interfere with the Customer's normal conduct of business; 2.2.6 if any of the audits referred to in clause 2.2.5 reveal that any password has been provided to any individual who is not an Authorised User, then without prejudice to Boomerang's other rights, the Customer shall promptly disable such passwords and Boomerang shall not issue any new passwords to any such individual; and 2.2.7 if any of the audits referred to in clause 2.2.5 reveal that the Customer has underpaid Fees to Boomerang, then without prejudice to Boomerang's other rights, the Customer shall pay to Boomerang an amount equal to such underpayment as calculated in accordance with the prices set out in the Customer’s UI within 10 Business Days of the date of the relevant audit. 2.3 The Customer shall not access, store, distribute or transmit any material, information, documentation, messages and/or viruses (including any destructive and/or disabling code) during the course of its use of the Services that: 2.3.1 is used in any way for, in relation to and/or in connection with emergency services (including 999 and 112 calls and/or where there could be a risk of personal injury or death) except to the extent that such use is expressly and specifically agreed by Boomerang in writing; 2.3.2 is unlawful, harmful, threatening, defamatory, obscene, infringing, harassing or racially or ethnically offensive; 2.3.3 facilitates illegal activity; 2.3.4 depicts sexually explicit images; 2.3.5 promotes unlawful violence; 2.3.6 is discriminatory based on race, gender, colour, religious belief, sexual orientation, disability; 2.3.7 is in breach of any agreement with any user, customer or client or any laws, regulations or other provisions that are applicable to the Customer, users, customers or clients in any territory; and/or 2.3.8 in a manner that is otherwise illegal or causes damage or injury to any person or property. Boomerang reserves the right, without liability (of whatever nature and/or howsoever arising) and/or prejudice of whatever nature to any of its other rights to the Customer, to disable the Customer's access to any material that breaches the provisions of this clause. 2.4 The Customer shall not except as may be allowed by any applicable law which is incapable of exclusion by agreement between the parties and except to the extent expressly permitted under this Agreement: 2.4.1 attempt to copy, modify, duplicate, create derivative works from, frame, mirror, republish, download, display, transmit, or distribute all or any portion of the Software and/or Documentation (as applicable) in any form or media or by any means; 2.4.2 attempt to reverse compile, disassemble, reverse engineer or otherwise reduce to human- perceivable form all or any part of the Software; 2.4.3 access all or any part of the Services and Documentation in order to build a product or service which competes (directly or indirectly) with the Services and/or the Documentation; 2.4.4 use the Services and/or Documentation to provide services to third parties; 2.4.5 subject to clause 21.1, license, sell, rent, lease, transfer, assign, distribute, display, disclose, or otherwise commercially exploit, or otherwise make the Services and/or Documentation available to any third party except the Authorised Users; and/or 2.4.6 attempt to obtain, or assist third parties in obtaining, access to the Services and/or Documentation, other than as provided under this clause 2; and 2.4.7 shall not use any Plug-Ins apart from expressly authorised by Boomerang and shall follow all of Boomerangs instructions and directions regarding use of such Plug-Ins including any restrictions set out in the Customer’s UI or in any communications from Boomerang to the Customer. 2.5 The Customer shall use all reasonable endeavours to prevent any unauthorised access to, or use of, the Services and/or the Documentation and, in the event of any such unauthorised access or use, promptly notify Boomerang. 2.6 The rights provided under this clause 2 are granted to the Customer only, and shall not be considered granted to any subsidiary or holding company of the Customer.

  • Unauthorised Use of Intellectual Property a) The Supplier/Service Provider agrees to notify Transnet in writing of any conflicting uses of, and applications of registrations of Patents, Designs and Trade Marks or any act of infringement, unfair competition or passing off involving the Intellectual Property of Transnet of which the Supplier/Service Provider acquires knowledge and Transnet shall have the right, as its own option, to proceed against any party infringing its Intellectual Property. b) It shall be within the sole and absolute discretion of Transnet to determine what steps shall be taken against the infringer and the Supplier/Service Provider shall co-operate fully with Transnet, at Transnet’s cost, in whatever measure including legal action to bring any infringement of illegal use to an end. c) The Supplier/Service Provider shall cooperate to provide Transnet promptly with all relevant ascertainable facts. d) If proceedings are commenced by Transnet alone, Transnet shall be responsible for all expenses but shall be entitled to all damages or other awards arising out of such proceedings. If proceedings are commenced by both Parties, both Parties will be responsible for the expenses and both Parties shall be entitled to damages or other awards arising out of proceedings.

  • Unauthorized Leave Leave other than that provided for in this section may be cause for disciplinary action.

  • Unauthorized Aliens Consultant hereby promises and agrees to comply with all the provisions of the Federal Immigration and Nationality Act, 8 U.S.C.A. § 1101, et seq., as amended, and in connection therewith, shall not employ unauthorized aliens as defined therein. Should Consultant so employ such unauthorized aliens for performance of work and/or services covered by this Agreement, and should any liability or sanctions be imposed against City for such use of unauthorized aliens, Consultant hereby agrees to and shall reimburse City for the cost of all such liabilities or sanctions imposed, together with any and all costs, including attorneys’ fees, incurred by City.

  • Unauthorised Use of Confidential Information The Supplier/Service Provider shall not authorise any party to act on or use in any way any Confidential Information belonging to Transnet whether or not such party is aware of such Confidential Information, and shall promptly notify Transnet of the information if it becomes aware of any party so acting, and shall provide Transnet the information with such assistance as Transnet reasonably requires, at Transnet’s cost and expense, to prevent such third party from so acting.

  • Unauthorized Use The Participating Institutions, or the Authorized Users shall not knowingly permit anyone other than the Authorized Users to access the Licensed Materials.

  • Authorised Persons If § 3.4 (Authorised Persons) is specified as applying to a Party in the Election Sheet, Individual Contracts may be negotiated, confirmed and signed on behalf of that Party exclusively by those persons listed by it for such purposes as may be specified in an Annex to this General Agreement. Each Party may unilaterally amend and supplement in writing the list of persons currently authorised to act on its behalf at any time. Such amendments and supplements shall become effective upon their receipt by the other Party.

  • Unauthorized Access Using service to access, or to attempt to access without authority, the accounts of others, or to penetrate, or attempt to penetrate, security measures of Company’s or a third party’s computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in disruption of service or the corruption or loss of data.

  • Unauthorized Use or Disclosure The Contractor shall notify COMMERCE within five (5) working days of any unauthorized use or disclosure of any confidential information, and shall take necessary steps to mitigate the harmful effects of such use or disclosure.