Unauthorized Access and Use Sample Clauses

Unauthorized Access and Use. Midco shall not be liable for any damages, including charges for Service under this Agreement that Customer may incur as a result of unauthorized use or misuse of the Service by Customer’s employees, customers, contractors, agents, other third parties, or the public. Customer is responsible for all charges incurred on or through Service, including but not limited to charges incurred due to fraud, abuse, or misuse of services, whether known or unknown, and whether or not Midco takes any actions to stop or block the activity. Customer is responsible for the access to and security of any Customer Equipment related to Service. Midco does not warrant or guarantee that it can prevent unauthorized use or misuse.
AutoNDA by SimpleDocs
Unauthorized Access and Use. In the event ZoomInfo has a reasonable belief that Licensee or any Authorized User is engaged in or facilitated any unauthorized access or use of the Licensed Materials or ZoomInfo Technology in violation of this Agreement, ZoomInfo, in its sole discretion, may immediately suspend Licensee’s access to the Licensed Materials and/or ZoomInfo Technology until such violation is resolved to ZoomInfo’s reasonable satisfaction. ZoomInfo will have no liability to Licensee for such period of suspension and a suspension shall have no effect on the Term of this Agreement nor on Licensee’s obligation to pay the Subscription Fee.
Unauthorized Access and Use. In the event Bluebook has a reasonable belief that Licensee or any Authorized User is engaged in or facilitated any unauthorized access or use of the Licensed Materials or Bluebook of Business in violation of this Agreement, Bluebook, in its sole discretion, may immediately suspend Licensee’s access to the Licensed Materials and/or Bluebook of Business until such violation is resolved to Bluebook’s reasonable satisfaction. Bluebook will have no liability to Licensee for such period of suspension and a suspension shall have no effect on the Term of this Agreement nor on Licensee’s obligation to pay the Subscription Fee.

Related to Unauthorized Access and Use

  • Unauthorized Access Using service to access, or to attempt to access without authority, the accounts of others, or to penetrate, or attempt to penetrate, security measures of Company’s or a third party’s computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in disruption of service or the corruption or loss of data.

  • Unauthorized Access Notification XXX shall notify Provider promptly of any known unauthorized access. XXX will assist Provider in any efforts by Provider to investigate and respond to any unauthorized access.

  • Unauthorized Use The Participating Institutions, or the Authorized Users shall not knowingly permit anyone other than the Authorized Users to access the Licensed Materials.

  • Authorized Access Transfer Agent shall have controls that are designed to maintain the logical separation such that access to systems hosting Fund Data and/or being used to provide services to Fund will uniquely identify each individual requiring access, grant access only to authorized personnel based on the principle of least privileges, and prevent unauthorized access to Fund Data.

  • Access and Use 1. Each Party shall ensure that any service supplier of the other Party is accorded access to and use of public telecommunications transport networks and services in a timely fashion, on transparent, reasonable and nondiscriminatory terms and conditions. This obligation shall be applied, inter alia, through paragraphs 2 through 6. 2. Each Party shall ensure that service suppliers of the other Party have access to and use of any public telecommunications transport network or service offered within or across the border of that Party, including private leased circuits, and to this end shall ensure, subject to the provisions of paragraphs 5 and 6, that such suppliers are permitted: (a) to purchase or lease and attach terminal or other equipment which interfaces with the network and which is necessary to supply their services; (b) to interconnect private leased or owned circuits with public telecommunications transport networks and services or with circuits leased or owned by other service suppliers; (c) to use operating protocols of their choice in the supply of any service, other than as necessary to ensure the availability of telecommunications transport networks and services to the public generally; and (d) to perform switching, signaling and processing functions. 3. Each Party shall ensure that service suppliers of the other Party may use public telecommunications transport networks and services for the movement of information 4. Notwithstanding the provisions of paragraph 3, a Party may take such measures as are necessary: (a) to ensure the security and confidentiality of messages; or (b) to protect the personal data of users of public telecommunications transport networks or services, subject to the requirement that such measures are not applied in a manner which would constitute a means of arbitrary or unjustifiable discrimination or a disguised restriction on trade in services. 5. Each Party shall ensure that no condition is imposed on access to and use of public telecommunications transport networks and services other than as necessary: (a) to safeguard the public service responsibilities of suppliers of public telecommunications transport networks and services, in particular their ability to make their networks or services available to the public generally; or (b) to protect the technical integrity of public telecommunications transport networks or services.

  • Authorized Use The Student Data shared pursuant to the Service Agreement, including persistent unique identifiers, shall be used for no purpose other than the Services outlined in Exhibit A or stated in the Service Agreement and/or otherwise authorized under the statutes referred to herein this DPA.

  • Authorized Uses The Participating Institutions and the Authorized Users may make all use of the Licensed Materials as is consistent with the applicable law and with this Agreement, including but not limited to the following licensing conditions ("Authorized Uses"). In addition, the Licensed Materials may be used for purposes of research, education or other non-commercial use as particularly follows:

  • Unauthorized Aliens Consultant hereby promises and agrees to comply with all the provisions of the Federal Immigration and Nationality Act, 8 U.S.C.A. § 1101, et seq., as amended, and in connection therewith, shall not employ unauthorized aliens as defined therein. Should Consultant so employ such unauthorized aliens for performance of work and/or services covered by this Agreement, and should any liability or sanctions be imposed against City for such use of unauthorized aliens, Consultant hereby agrees to and shall reimburse City for the cost of all such liabilities or sanctions imposed, together with any and all costs, including attorneys’ fees, incurred by City.

  • Unauthorized Use or Disclosure The Contractor shall notify COMMERCE within five (5) working days of any unauthorized use or disclosure of any confidential information, and shall take necessary steps to mitigate the harmful effects of such use or disclosure.

  • Unauthorized Work The contractor is not authorized at any time to commence task order performance prior to issuance of a signed TO or other written approval provided by the CO to begin work.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!