Unauthorized Access and Use; Service Interference; Malicious Software Sample Clauses

Unauthorized Access and Use; Service Interference; Malicious Software. The Service contains robot exclusion headers. User agrees that User will not use any robot, spider, scraper, or other automated means to access the Service for any purpose without our express written permission. User will not access the audiovisual content available on the Service for any purpose or in any manner other than streaming. User agrees that User will not: (a) take any action that imposes or Dentable believes may impose (in Dentable’s sole discretion) an unreasonable or disproportionately large load on the Service's infrastructure; (b) copy, reproduce, modify, create derivative works from, distribute, or publicly display any content (other than content User has submitted to the Service) from the Service, any software code that is part of the Service, or any services that are offered on the Service without the prior express written permission of Dentable and the appropriate third party, as applicable; (c) interfere or attempt to interfere with the proper operation of the Service or any activities conducted on the Service; (d) bypass any measures Dentable may use to prevent or restrict access to the Service or any subparts of the Service, including, without limitation, features that prevent or restrict use or copying of any content or enforce limitations on use of the Service or the content therein; (e) transmit spam, chain letters, or other unsolicited communications; (f) attempt to interfere with or compromise the system integrity or security or decipher any transmissions to or from the servers running the Service; (g) collect or harvest any personally identifiable information, including Account names, from the Service; (h) access any content on the Service through any technology or means other than those provided or authorized by the Service; or (i) directly or indirectly, advertise or promote another website, product, or service or solicit other Users for other websites, products, or services. Additionally, User agrees that User will not post or introduce any invalid data, virus, worm, or other harmful or malicious software code, agent, hidden procedure, routine, or mechanism through or to the Service or the Service software that is designed to cause to cease functioning, disrupt, disable, harm, or otherwise impair in any manner, including aesthetic disruptions or distortions, the operation of (or to allow User or any other person to access or damage or corrupt data, storage media, programs, equipment, or communications or otherwise interfere w...
AutoNDA by SimpleDocs
Unauthorized Access and Use; Service Interference; Malicious Software. The Service contains robot exclusion headers. User agrees that User will not use any robot, spider, scraper, or other automated means to access the Service for any purpose without our express written permission. User will not access the audiovisual content available on the Service for any purpose or in any manner other than streaming. User agrees that User will not: (a) take any action that imposes or Dentalocums believes may impose (in Dentalocums’s sole discretion) an unreasonable or disproportionately large load on the Service's infrastructure; (b) copy, reproduce, modify, create derivative works from, distribute, or publicly display any content (other than content User has submitted to the Service) from the Service, any software code that is part of the Service, or any services that are offered on the Service without the prior express written permission of Dentalocums and the appropriate third party, as applicable;

Related to Unauthorized Access and Use; Service Interference; Malicious Software

  • Unauthorized Access Using service to access, or to attempt to access without authority, the accounts of others, or to penetrate, or attempt to penetrate, security measures of Company’s or a third party’s computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in disruption of service or the corruption or loss of data.

  • Unauthorized Use or Disclosure The Contractor shall notify COMMERCE within five (5) working days of any unauthorized use or disclosure of any confidential information, and shall take necessary steps to mitigate the harmful effects of such use or disclosure.

  • Unauthorized Use The Participating Institutions, or the Authorized Users shall not knowingly permit anyone other than the Authorized Users to access the Licensed Materials.

  • Unauthorized Access Notification XXX shall notify Provider promptly of any known unauthorized access. XXX will assist Provider in any efforts by Provider to investigate and respond to any unauthorized access.

  • Malicious Software The Contractor or subcontractors that discover and isolate malicious software in connection with a reported cyber incident shall submit the malicious software in accordance with instructions provided by the Contracting Officer.

  • Unauthorised Use of Intellectual Property a) The Supplier/Service Provider agrees to notify Transnet in writing of any conflicting uses of, and applications of registrations of Patents, Designs and Trade Marks or any act of infringement, unfair competition or passing off involving the Intellectual Property of Transnet of which the Supplier/Service Provider acquires knowledge and Transnet shall have the right, as its own option, to proceed against any party infringing its Intellectual Property. b) It shall be within the sole and absolute discretion of Transnet to determine what steps shall be taken against the infringer and the Supplier/Service Provider shall co-operate fully with Transnet, at Transnet’s cost, in whatever measure including legal action to bring any infringement of illegal use to an end. c) The Supplier/Service Provider shall cooperate to provide Transnet promptly with all relevant ascertainable facts. d) If proceedings are commenced by Transnet alone, Transnet shall be responsible for all expenses but shall be entitled to all damages or other awards arising out of such proceedings. If proceedings are commenced by both Parties, both Parties will be responsible for the expenses and both Parties shall be entitled to damages or other awards arising out of proceedings.

  • Unauthorized Work The contractor is not authorized at any time to commence task order performance prior to issuance of a signed TO or other written approval provided by the CO to begin work.

  • Server Software Subject to the terms and conditions of this XXXX, Vocera grants you the non-exclusive right to (i) install and run (“Use”) the Server Software on computer systems (each, a “Server Computer”) located at End User’s Facilities in the geographic territory designated above (“Territory”); (ii) to Use the Client Software in conjunction with Authorized Client Devices and such Server Computers; and (iii) for pilot licenses for certain Software provided on a trial basis, use such Software for the limited term specified by Vocera in writing. You may Use the standard Server Software on one primary Server Computer (or a primary cluster of computers suitably configured for productive use of the Server Software). You may install backup copies of the Server Software on backup Server Computers to provide redundancy in the event of failure of the primary Server Computer(s) but, unless you have acquired additional licenses or a failover license from Vocera, you may not run such backup or additional copies concurrently with the primary copies. Vocera grants you the right to use the applicable License Key issued by Vocera only to enable Use of the Server Software in conjunction with the licensed Server Computers. Server Software may be licensed for a Subscription Term as specified in the Quote.

  • No Unauthorized Use or Disclosure Executive agrees that he will not, at any time during or after Executive’s employment by Company, make any unauthorized disclosure of, and will prevent the removal from Company premises of, Confidential Information or Work Product of Company (or its affiliates), or make any use thereof, except in the carrying out of Executive’s responsibilities during the course of Executive’s employment with Company. Executive shall use commercially reasonable efforts to cause all persons or entities to whom any Confidential Information shall be disclosed by him hereunder to observe the terms and conditions set forth herein as though each such person or entity was bound hereby. Executive shall have no obligation hereunder to keep confidential any Confidential Information if and to the extent disclosure thereof is specifically required by law; provided, however, that in the event disclosure is required by applicable law, Executive shall provide Company with prompt notice of such requirement prior to making any such disclosure, so that Company may seek an appropriate protective order. At the request of Company at any time, Executive agrees to deliver to Company all Confidential Information that he may possess or control. Executive agrees that all Confidential Information of Company (whether now or hereafter existing) conceived, discovered or made by him during the period of Executive’s employment by Company exclusively belongs to Company (and not to Executive), and Executive will promptly disclose such Confidential Information to Company and perform all actions reasonably requested by Company to establish and confirm such exclusive ownership. Affiliates of Company shall be third party beneficiaries of Executive’s obligations under this Article 6. As a result of Executive’s employment by Company, Executive may also from time to time have access to, or knowledge of, Confidential Information or Work Product of third parties, such as customers, suppliers, partners, joint venturers, and the like, of Company and its affiliates. Executive also agrees to preserve and protect the confidentiality of such third party Confidential Information and Work Product to the same extent, and on the same basis, as Company’s Confidential Information and Work Product.

  • Licensed Software Computer program(s) provided by Contractor in connection with the Deliverables, subject to Section 14 of this Contract.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!