Unauthorized Access and Use; Service Interference; Malicious Software Sample Clauses

Unauthorized Access and Use; Service Interference; Malicious Software. The Service contains robot exclusion headers. User agrees that User will not use any robot, spider, scraper, or other automated means to access the Service for any purpose without our express written permission. User will not access the audiovisual content available on the Service for any purpose or in any manner other than streaming. User agrees that User will not: (a) take any action that imposes or Dentalocum believes may impose (in Dentalocum’s sole discretion) an unreasonable or disproportionately large load on the Service's infrastructure; (b) copy, reproduce, modify, create derivative works from, distribute, or publicly display any content (other than content User has submitted to the Service) from the Service, any software code that is part of the Service, or any services that are offered on the Service without the prior express written permission of Dentalocum and the appropriate third party, as applicable; (c) interfere or attempt to interfere with the proper operation of the Service or any activities conducted on the Service; (d) bypass any measures Dentalocum may use to prevent or restrict access to the Service or any subparts of the Service, including, without limitation, features that prevent or restrict use or copying of any content or enforce limitations on use of the Service or the content therein; (e) transmit spam, chain letters, or other unsolicited communications; (f) attempt to interfere with or compromise the system integrity or security or decipher any transmissions to or from the servers running the Service; (g) collect or harvest any personally identifiable information, including Account names, from the Service; (h) access any content on the Service through any technology or means other than those provided or authorized by the Service; or (i) directly or indirectly, advertise or promote another website, product, or service or solicit other Users for other websites, products, or services. Additionally, User agrees that User will not post or introduce any invalid data, virus, worm, or other harmful or malicious software code, agent, hidden procedure, routine, or mechanism through or to the Service or the Service software that is designed to cause to cease functioning, disrupt, disable, harm, or otherwise impair in any manner, including aesthetic disruptions or distortions, the operation of (or to allow User or any other person to access or damage or corrupt data, storage media, programs, equipment, or communications or otherwise int...
AutoNDA by SimpleDocs
Unauthorized Access and Use; Service Interference; Malicious Software. The Service contains robot exclusion headers. User agrees that User will not use any robot, spider, scraper, or other automated means to access the Service for any purpose without our express written permission. User will not access the audiovisual content available on the Service for any purpose or in any manner other than streaming. User agrees that User will not: (a) take any action that imposes or Dentalocums believes may impose (in Dentalocums’s sole discretion) an unreasonable or disproportionately large load on the Service's infrastructure; (b) copy, reproduce, modify, create derivative works from, distribute, or publicly display any content (other than content User has submitted to the Service) from the Service, any software code that is part of the Service, or any services that are offered on the Service without the prior express written permission of Dentalocums and the appropriate third party, as applicable;

Related to Unauthorized Access and Use; Service Interference; Malicious Software

  • Unauthorized Access Using service to access, or to attempt to access without authority, the accounts of others, or to penetrate, or attempt to penetrate, security measures of Company’s or a third party’s computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in disruption of service or the corruption or loss of data.

  • E10 Malicious Software E10.1 The Contractor shall, as an enduring obligation throughout the Contract Period, use the latest versions of anti-virus definitions available from an industry accepted anti-virus software vendor to check for and delete Malicious Software from the ICT Environment.

  • Unauthorized Use or Disclosure The Contractor shall notify COMMERCE within five (5) working days of any unauthorized use or disclosure of any confidential information, and shall take necessary steps to mitigate the harmful effects of such use or disclosure.

  • Unauthorized Use Licensee, the Participating Institutions, or Authorized Users shall not knowingly permit anyone other than Authorized Users to access the Licensed Materials.

  • Unauthorized Access Notification LEA shall notify Provider promptly of any known or suspected unauthorized access. LEA will assist Provider in any efforts by Provider to investigate and respond to any unauthorized access.

  • Authorized User’s Statement of Work A competitive Mini-Bid is required for every transaction under this Centralized Contract. An Authorized User must prepare a detailed Statement of Work using Appendix F, Attachment 1, Mini-Bid Template. The Authorized User must distribute the Mini-Bid to all qualified Vendors per Lot(s) (unless a Vendor has removed itself from consideration via the Appendix F, Attachment 5, Mini-Bid Participation Interest Template). Contact information, organized by Lot, will be available on the OGS website for this Contract. An Authorized User shall conduct its Mini-Bid in accordance with the requirements set forth in Appendix F, Attachment 2, How to Use this Contract. The following terms and conditions shall apply to each Mini-Bid issued by an Authorized User:  An Authorized User may require the execution of unique forms, such as Confidentiality Non- Disclosure agreements; and  An Authorized User is required to make tentative award and non-award notifications to each Contractor who submitted a response to the Mini-Bid. Additionally, the minimum time, excluding the date of release, between issuance of the Mini-Bid by the Authorized User to the Mini-Bid Opening is as follows:  Xxx 0 Xxxx-Xxxx: Xxxx (0) Xxxxxxxx Xxxx  Xxx 0 Mini-Bids: Ten (10) Business Days

  • Malicious Software 12.1 The Supplier shall, as an enduring obligation throughout the Term, use the latest versions of anti-virus definitions available [from an industry accepted anti-virus software vendor] to check for and delete Malicious Software from the ICT Environment.

  • Notice of Unauthorized Use The Receiving Party will notify the Disclosing Party immediately upon discovery of any unauthorized use or disclosure of Confidential Information or any other breach of this Agreement by Receiving Party. The Receiving Party will cooperate with the Disclosing Party in every reasonable way to help the Disclosing Party regain possession of such Confidential Information and prevent its further unauthorized use.

  • Unauthorised Use of Intellectual Property a) The Supplier/Service Provider agrees to notify Transnet in writing of any conflicting uses of, and applications of registrations of Patents, Designs and Trade Marks or any act of infringement, unfair competition or passing off involving the Intellectual Property of Transnet of which the Supplier/Service Provider acquires knowledge and Transnet shall have the right, as its own option, to proceed against any party infringing its Intellectual Property.

  • Unauthorized Work The contractor is not authorized at any time to commence task order performance prior to issuance of a signed TO or other written approval provided by the CO to begin work.

Time is Money Join Law Insider Premium to draft better contracts faster.