UNAUTHORIZED ACCESS AND USE; SITE INTERFERENCE; MALICIOUS SOFTWARE Sample Clauses

UNAUTHORIZED ACCESS AND USE; SITE INTERFERENCE; MALICIOUS SOFTWARE. The Site contains robot exclusion headers. You agree that you will not use any robot, spider, scraper, or other automated means to access the Site for any purpose without our express written permission. You will not access the audiovisual content available on the Site for any purpose or in any manner other than streaming. You agree that you will not: (a) take any action that imposes or we believe may impose (in our sole discretion) an unreasonable or disproportionately large load on the Site’s infrastructure; (b) copy, reproduce, modify, create derivative works from, distribute, or publicly display any content (other than content you have submitted to the Site) from the Site, any software code that is part of the Site, or any services that are offered on the Site without the prior express written permission of Upwork and the appropriate third party, as applicable; (c) interfere or attempt to interfere with the proper operation of the Site or any activities conducted on the Site; (d) bypass any measures we may use to prevent or restrict access to the Site or any subparts of the Site, including, without limitation, features that prevent or restrict use or copying of any content or enforce limitations on use of the Site or the content therein; (e) transmit spam, chain letters, or other unsolicited communications; (f) attempt to interfere with or compromise the system integrity or security or decipher any transmissions to or from the servers running the Site; (g) collect or harvest any personally identifiable information, including Account names, from the Site; (h) access any content on the Site through any technology or means other than those provided or authorized by the Site; or (i) directly or indirectly, advertise or promote another website, product, or service or solicit other Users for other websites, products, or services. Additionally, you agree that you will not post or introduce any invalid data, virus, worm, or other harmful or malicious software code, agent, hidden procedure, routine, or mechanism through or to the Site or the Site software that is designed to cause to cease functioning, disrupt, disable, harm, or otherwise impair in any manner, including aesthetic disruptions or distortions, the operation of (or to allow you or any other person to access or damage or corrupt data, storage media, programs, equipment, or communications or otherwise interfere with operations of or on) the Site or any other software, firmware, hardware, computer syst...
AutoNDA by SimpleDocs
UNAUTHORIZED ACCESS AND USE; SITE INTERFERENCE; MALICIOUS SOFTWARE. The Site contains robot exclusion headers. You agree that you will not use any robot, spider, scraper, or other automated means to access the Site for any purpose without our express written permission. You will not access the audiovisual content available on the Site for any purpose or in any manner other than streaming. You agree that you will not: (a) take any action that imposes or we believe may impose (in our sole discretion) an unreasonable or disproportionately large load on the Site’s infrastructure;
UNAUTHORIZED ACCESS AND USE; SITE INTERFERENCE; MALICIOUS SOFTWARE. The Site contains robot exclusion headers. You agree that you will not use any robot, spider, scraper, or other automated means to access the Site for any purpose without our express written permission. You will not access the audiovisual content available on the Site for any purpose or in any manner other than streaming. You agree that you will not: (a) take any action that imposes or we believe may impose (in our sole discretion) an unreasonable or disproportionately large load on the Site’s infrastructure; (b) copy, reproduce, modify, create derivative works from, distribute, or publicly display any content (other than content you have submitted to the Site) from the Site, any software code that is part of the Site, or any services that are offered on the Site without the prior express written permission of Xxxxx and the appropriate third party, as applicable;

Related to UNAUTHORIZED ACCESS AND USE; SITE INTERFERENCE; MALICIOUS SOFTWARE

  • Unauthorized Access Using service to access, or to attempt to access without authority, the accounts of others, or to penetrate, or attempt to penetrate, security measures of Company’s or a third party’s computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in disruption of service or the corruption or loss of data.

  • Malicious Software The Contractor or subcontractors that discover and isolate malicious software in connection with a reported cyber incident shall submit the malicious software in accordance with instructions provided by the Contracting Officer.

  • Unauthorized Use The Participating Institutions, or the Authorized Users shall not knowingly permit anyone other than the Authorized Users to access the Licensed Materials.

  • Server Software Subject to the terms and conditions of this XXXX, Vocera grants you the non-exclusive right to (i) install and run (“Use”) the Server Software on computer systems (each, a “Server Computer”) located at End User’s Facilities in the geographic territory designated above (“Territory”); (ii) to Use the Client Software in conjunction with Authorized Client Devices and such Server Computers; and (iii) for pilot licenses for certain Software provided on a trial basis, use such Software for the limited term specified by Vocera in writing. You may Use the standard Server Software on one primary Server Computer (or a primary cluster of computers suitably configured for productive use of the Server Software). You may install backup copies of the Server Software on backup Server Computers to provide redundancy in the event of failure of the primary Server Computer(s) but, unless you have acquired additional licenses or a failover license from Vocera, you may not run such backup or additional copies concurrently with the primary copies. Vocera grants you the right to use the applicable License Key issued by Vocera only to enable Use of the Server Software in conjunction with the licensed Server Computers. Server Software may be licensed for a Subscription Term as specified in the Quote.

  • Unauthorized Use or Disclosure The Contractor shall notify COMMERCE within five (5) working days of any unauthorized use or disclosure of any confidential information, and shall take necessary steps to mitigate the harmful effects of such use or disclosure.

  • Unauthorised Use of Intellectual Property a) The Supplier/Service Provider agrees to notify Transnet in writing of any conflicting uses of, and applications of registrations of Patents, Designs and Trade Marks or any act of infringement, unfair competition or passing off involving the Intellectual Property of Transnet of which the Supplier/Service Provider acquires knowledge and Transnet shall have the right, as its own option, to proceed against any party infringing its Intellectual Property. b) It shall be within the sole and absolute discretion of Transnet to determine what steps shall be taken against the infringer and the Supplier/Service Provider shall co-operate fully with Transnet, at Transnet’s cost, in whatever measure including legal action to bring any infringement of illegal use to an end. c) The Supplier/Service Provider shall cooperate to provide Transnet promptly with all relevant ascertainable facts. d) If proceedings are commenced by Transnet alone, Transnet shall be responsible for all expenses but shall be entitled to all damages or other awards arising out of such proceedings. If proceedings are commenced by both Parties, both Parties will be responsible for the expenses and both Parties shall be entitled to damages or other awards arising out of proceedings.

  • Unauthorized Access Notification XXX shall notify Provider promptly of any known unauthorized access. XXX will assist Provider in any efforts by Provider to investigate and respond to any unauthorized access.

  • Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.

  • Third Party Software 1. The Software may contain third party software that requires and/or additional terms and conditions. Such required third party software notices and/or additional terms and conditions are located at xxxx://xxx.xxxxxxxxx.xxx/thirdparty/index.html and are made a part of and incorporated by reference into this XXXX. By accepting this XXXX, You are also accepting the additional terms and conditions, if any, set forth therein.

  • No Unauthorized Use or Disclosure Executive agrees that he will not, at any time during or after Executive’s employment by Company, make any unauthorized disclosure of, and will prevent the removal from Company premises of, Confidential Information or Work Product of Company (or its affiliates), or make any use thereof, except in the carrying out of Executive’s responsibilities during the course of Executive’s employment with Company. Executive shall use commercially reasonable efforts to cause all persons or entities to whom any Confidential Information shall be disclosed by him hereunder to observe the terms and conditions set forth herein as though each such person or entity was bound hereby. Executive shall have no obligation hereunder to keep confidential any Confidential Information if and to the extent disclosure thereof is specifically required by law; provided, however, that in the event disclosure is required by applicable law, Executive shall provide Company with prompt notice of such requirement prior to making any such disclosure, so that Company may seek an appropriate protective order. At the request of Company at any time, Executive agrees to deliver to Company all Confidential Information that he may possess or control. Executive agrees that all Confidential Information of Company (whether now or hereafter existing) conceived, discovered or made by him during the period of Executive’s employment by Company exclusively belongs to Company (and not to Executive), and Executive will promptly disclose such Confidential Information to Company and perform all actions reasonably requested by Company to establish and confirm such exclusive ownership. Affiliates of Company shall be third party beneficiaries of Executive’s obligations under this Article 6. As a result of Executive’s employment by Company, Executive may also from time to time have access to, or knowledge of, Confidential Information or Work Product of third parties, such as customers, suppliers, partners, joint venturers, and the like, of Company and its affiliates. Executive also agrees to preserve and protect the confidentiality of such third party Confidential Information and Work Product to the same extent, and on the same basis, as Company’s Confidential Information and Work Product.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!