Unauthorized Use of Service Sample Clauses
Unauthorized Use of Service. We shall not be held responsible and liable for (i) any loss, damage or expenses resulting from the modification or alteration of the Services made by any one other than Us; (ii) any unauthorized use of the Services and its consequences. However we may alter, modify or change any feature or part of the Services at our sole discretion for any reason without being liable to you in any manner whatsoever.
Unauthorized Use of Service. Customer shall not directly or indirectly: (i) interfere or attempt to interfere with the proper working of the Service or any activities conducted on the Service; (ii) bypass any privacy settings or measures DATUMIZE may use to prevent or restrict access to the Service (or other accounts, computer systems or networks connected to the Service); (iii) run mail list, any form of auto-responder or “spam” on the Service; or (iv) use manual or automated software, devices, or other processes to “crawl” or “spider” any DATUMIZE Property.
Unauthorized Use of Service. Rackspace agrees only to perform the specific security services described in the Service Order Form and other part of the Agreement. Customer is otherwise responsible for the security of the servers provided pursuant to this Agreement. Customer shall be responsible for unauthorized use of the Services by any person, unless such unauthorized use results from Rackspace's failure to perform its obligations under the Agreement.
Unauthorized Use of Service. You acknowledge and agree that you must not, and you must not authorize or encourage any third party to, perform the following actions:
1. Use another individual’s account or share your password or account, including re-assignment of accounts via email address change, with any unauthorized person or third-party service;
2. Attempt to decipher, decompile, reverse engineer or otherwise discover the source code of any software making up the Service;
3. Modify, adapt, or hack the Service or otherwise attempt to gain unauthorized access to the Service or related systems or networks;
4. Defame, abuse, harass, stalk, threaten, or otherwise violate the legal right of others;
5. Publish, post, upload, email, distribute, or disseminate (collectively, “Transmit”) any unlawful, profane, defamatory, libelous, inaccurate, racist, sexist, harassing, hateful, infringing, obscene, indecent, or other content we deem inappropriate;
6. Use the Service to store or transmit files, materials, data, text, audio, video, images or other content that infringes on any person’s intellectual property rights;
7. Transmit or share files that contain viruses, corrupted files, or any other similar software or programs that may damage or adversely affect the operation of another person’s computer, our Services, any software or hardware, or telecommunications equipment;
8. Use the Services or any Materials (defined in Section 13) for any commercial purpose, including without limitation, contacting, advertising to, soliciting or selling to, any other Client, unless you have our prior written consent to do so;
9. Transmit or share surveys, contests, pyramid schemes, spam, unsolicited advertising or promotional materials, other forms of duplicative or unsolicited messages or chain letters;
10. Download any file that you know or reasonably should know cannot be legally obtained in such manner;
11. Falsify or delete any author attributions, legal or other proper notices or proprietary designations or labels of the origin or the source of software or other material including falsely implying any sponsorship or association with TBFS;
12. Restrict or inhibit any other user from using and enjoying any authorized area within our Services;
13. Collect or store personal data, except to the extent required for business purposes;
14. Interfere or attempt to interfere with or disrupt the proper functioning of our Service, servers, or networks;
15. Perform stress testing, penetration testing or any act that...
Unauthorized Use of Service. We shall perform the specific security services described in the Sales Order Form. Client shall be responsible for all unauthorized use of the Services by any person or entity, except as otherwise expressly set forth in this Agreement.
Unauthorized Use of Service. You acknowledge and agree that the Service is for your non-commercial, personal use only. You acknowledge and agree that you may not distribute, sell, resell, interfere with or exploit for any commercial purposes any portion of the Service. ZIPPYYUM is not liable for any claims, actions, damages, or other liability incurred as a result of any unauthorized use of the Service. You shall not attempt, or support others' attempts, to circumvent, reverse engineer, decrypt, break (e.g. by inputting viruses or other harmful programming routines or data) or otherwise alter or interfere with the Service. - Affirmation. If you are under 18, you may only use the Service with the involvement of a parent or guardian. By using the Service, you are affirming that you are 18 years old or older. - Merchants; Product Pricing. Available restaurants are subject to change, and are not guaranteed to be available at all times. ZIPPYYUM does not assume responsibility or liability for the actions, omissions, Products, locations or content of any participating restaurant. You acknowledge and agree that ZIPPYYUM is not responsible for the pricing of the Products, and the participating restaurants are solely responsible for setting the prices for Products, and pricing may change at any time without notice. You further acknowledge that ZIPPYYUM is not responsible for the Products, the preparation of the Products or the delivery of the Products at the restaurant. The information provided by the Service as to calorie content of each Product is an estimate based on standard serving size and would vary based on actual serving size of each Product. You acknowledge that the purpose of the Service is to facilitate the pre-ordering of Products.
Unauthorized Use of Service. Client agrees that all interpreting calls directed the Propio assigned phone number are authorized to receive billable interpreting services. Client shall be solely and fully responsible for charges resulting from interpreting calls directed to Propio with a verified Access Code, whether such use is authorized. The Client agrees not to disclose the assigned phone number nor Access Code to unauthorized parties unless it receives prior written approval from Propio.
Unauthorized Use of Service. Customer shall not directly or indirectly: (i) use the HUBTYPE Platform other than as permitted by this Agreement ; (ii) use unique values or a continuous set of values as inputs to event attributes, (iii) interfere or attempt to interfere with the proper working of the Service or any activities conducted on the Service; (iv) bypass any privacy settings or measures HUBTYPE may use to prevent or restrict access to the Service (or other accounts, computer systems or networks connected to the Service); (v) run mail list, any form of auto-responder or “spam” on the Service; or (vi) use manual or automated software, devices, or other processes to “crawl” or “spider” any page of the Sites.
Unauthorized Use of Service. The Customer shall be responsible for any unauthorized use of the Services by any person, and shall pay all fees incurred for its account by any person using the Services, unless such unauthorized use results from DUO’s failure to perform its obligations under the Agreement.
Unauthorized Use of Service. While Infradapt may provide security Services and or security Products to Customer, Customer is responsible for the security of the Products and Services provided pursuant to this Agreement, and Infradapt agrees only to perform the specific security services described in the Order Form or Work Order, and/or other portion of the Agreement. Customer shall be responsible for any unauthorized use of the Services by any person, and shall pay all fees incurred for its account by any person using the Services, unless such unauthorized use was because of a security breach that occurred when a component of Infradapt’s Security Environment that Customer had contracted for was unavailable which would have, under normal operating practices, protected Customer from said security breach.