Unauthorized Conduct Clause Samples
The Unauthorized Conduct clause defines actions or behaviors that are not permitted under the agreement. It typically outlines specific activities, such as unauthorized use of confidential information, intellectual property, or company resources, and may detail the consequences of such actions, including disciplinary measures or termination of the contract. This clause serves to protect the interests of the parties by clearly establishing boundaries and deterring misconduct, thereby reducing the risk of disputes and safeguarding sensitive assets.
POPULAR SAMPLE Copied 1 times
Unauthorized Conduct. You shall not engage in, encourage, or incite any of the following conduct in connection with the Site, regardless of whether you are aware or unaware of such conduct: (a) impersonate any person or entity; (b) use, download, copy, reproduce, modify, adapt, publish, translate, create derivative works from, transmit, distribute, perform, display, or otherwise exploit the Site or any content found thereon in a manner contrary to these Terms of Use; (c) engage in activities which involve or concern decryption, security bypassing, computer, software or network hacking, data mining, harvesting of client or personal information, reverse engineering, copying, or the like; (d) gain or attempt to gain unauthorized access to computer systems, networks, information or materials through the Site; (e) use the Site or the Site’s features or servers in any manner with the intent to interrupt, damage, disable, overburden, or impair the Site or the Site’s
Unauthorized Conduct. 4.3.1 Customer will not, directly or indirectly, transmit or permit End Users to transmit, directly or indirectly, to any of Socure’s servers any Unauthorized Code. “Unauthorized Code” means any virus, software program or segment of code, or other programming design, instruction, or routine that permits unauthorized access to any Socure server, or the Services and is intended to damage, detrimentally interfere with, surreptitiously intercept, or expropriate any of the foregoing or any system, data, or personal information.
4.3.2 Customer will not (a) breach or attempt to breach the security of any network, servers, data, computers or other hardware or software relating to or used in connection with the Services or belonging to or used or leased by any other customer of Socure or any third party that is hosting or interfacing with any part of the Services; or (b) use or distribute through the Services any software, files or other tools or devices designed to interfere with or compromise the privacy, security or use of the Services or the operations or assets of any other customer of Socure or any third party.
4.3.3 Customer will not modify or tamper with the Services (including the Service Platform) in any way. Furthermore, Customer will not, and will not permit any End User to, reproduce, copy, translate, modify, adapt, create derivative works from, distribute, transmit, transfer, republish, reverse engineer, decompile, or otherwise attempt to discover any object code, compile or attempt to compile any object code from any source code, or remove or delete any portion of the Services (including the Service Platform).
4.3.4 Customer will not remove or alter any of Socure’s Marks (as defined below), or co-brand its own products, services or material with Socure’s Marks, without Socure’s prior written consent. Customer will not incorporate any of Socure’s Marks into Customer’s trademarks, service marks, company names, Internet addresses, domain names, or any other similar designations, for use on or in connection with Customer’s business or any of
Unauthorized Conduct. 5.2.1. Customer will not, directly or indirectly, transmit or permit End Users, Personnel or third parties to transmit, directly or indirectly, to any of Company’s servers any virus, software program or segment of code, or other programming design, instruction, or routine that permits unauthorized access to any Company server, or the Services and is intended to damage, detrimentally interfere with, surreptitiously intercept, or expropriate any of the foregoing or any system, data, or personal information.
5.2.2. Customer will not (a) breach or attempt to breach the security of any network, servers, data, computers or other hardware or software relating to or used in connection with the Services or belonging to or used or leased by any other customer of Company or any third party that is hosting or interfacing with any part of the Services; or (b) use or distribute through the Services any software, files, data, or other tools, devices or information designed or reasonably expected to interfere with, infringe upon or compromise the privacy of any entities, the security or use of the Services, or the operations or assets of any other customer or end user of Company or any third party.
Unauthorized Conduct. The Lessee shall not engage or authorize the following conduct:
(a) Unlawful transaction, business operation, occupancy, visit or other activities
(b) Conduct constituting the Lessee’s default of contract or tort that causes or may cause impairment, inconvenience, damages, etc. to users or the owner of the Lease Building or nearby land or buildings, or allowing a party who engages in such a conduct to remain in the Lease Building
(c) Installation of machinery that causes noise, odor, smoke or vibration that could be heard, smelled or sensed outside of the Lease Property
(d) Tort involving the Lease Property
