Unauthorized Use of the Service Sample Clauses

Unauthorized Use of the Service. Customer shall not use the Service for any Unauthorized Purpose or in such a manner as to interfere with use by other custome rs of the System. "Unauthorized Purpose" includes, but is not limited to,: (i) use with intent to avoid payment of charges due under this Contract, (ii) access to, use of, alteration of, or destruction of the System Data files, programs, procedures, or information related to Customer or any other Xxxx Deere custom er, (iii) use with the intent to reverse engineer or clone the System, (iv) use for any unlawful, illegal or fraudulent purpose, (v) any attempt to create a substitute or similar service through use of, or access to, the Service; or (vi)
Unauthorized Use of the Service. Customer shall not use, or attempt to use, the Equipment or Services for any Unauthorized Purpose or in such a manner as to interfere with use by other customers of the OmniTRACS System. "Unauthorized Purpose" as used herein includes: (i) obtaining access to or use of Services with intent to avoid payment, in whole or in part, of charges due under this Agreement, (ii) access to, use of, alteration of, or destruction of the data files, programs, procedures, or information of Customer or any other QUALCOMM customer, (iii) use of the Equipment or Services with the intent to reverse engineer or clone the OmniTRACS System, (iv) use of the Software in such a manner to void the Software license provided in Section 2 or (v) use of the Services or Software furnished pursuant to this Agreement for any purpose or in any manner which, directly or indirectly, violates the law or aids any unlawful act or undertaking. QUALCOMM may, without notice to Customer, and without liability to QUALCOMM, discontinue the Service in response to a request from a government agency, including but not limited to the FCC. For other QUALCOMM actions to discontinue Service to prevent use for an Unauthorized Purpose, QUALCOMM will use best efforts to provide Customer twelve (12) hours notification prior to discontinuing the Service. QUALCOMM shall restore the Service as soon as the Service can be provided without undue risk of use for an Unauthorized Purpose. Customer shall not be credited message service charges for Service interruptions resulting from QUALCOMM's actions under this Section.
Unauthorized Use of the Service. You agree not to access or attempt to access any password-protected portions of the Service without an authorized Login ID or password. IMPACT AUTO AUCTIONS reserves the right to investigate and take legal action against any illegal and/or unauthorized use of the Service including any use or attempted use by you of another person's password and account information. Our decision not to pursue legal action for any violation of these Terms of Use shall not be construed as a waiver of any provision of these Terms of Use or any legal rights of IMPACT AUTO AUCTIONS. Further, IMPACT AUTO AUCTIONS reserves the right to deny access to the Service, or any content or feature provided via the Service, to anyone who violates this Terms of Use or any other applicable terms and conditions of use of the Service or portions thereof or who, in our judgment, interferes with the ability of others to enjoy this Service, or infringes the rights of others.
Unauthorized Use of the Service. Customer shall not use, or attempt to use, the Equipment or Services for any Unauthorized Purpose or in such a manner as to interfere with use by other customers of the OmniTRACS System. "Unauthorized Purpose" as used herein includes: (i) obtaining access to or use of Services with intent to avoid payment, in whole or in part, of charges due under this Agreement.
Unauthorized Use of the Service. You agree not to access or attempt to access any password-protected portions of the Service without an authorized Login ID or password. IAA reserves the right to investigate and take legal action against any illegal and/or unauthorized use of the Service including any use or attempted use by you of another person's password and account information. Our decision not to pursue legal action for any violation of these Terms of Use shall not be construed as a waiver of any provision of these Terms of Use or any legal rights of IAA. Further, IAA reserves the right to deny access to the Service, or any content or feature provided via the Service, to anyone who violates this Terms of Use or any otherapplicable terms and conditions of use of the Service or portions thereof or who, in our judgment,interferes with the ability of others to enjoy this Service, or infringes the rights of others.

Related to Unauthorized Use of the Service

  • Unauthorized Use The Participating Institutions, or the Authorized Users shall not knowingly permit anyone other than the Authorized Users to access the Licensed Materials.

  • Unauthorized Use or Disclosure The Contractor shall notify COMMERCE within five (5) working days of any unauthorized use or disclosure of any confidential information, and shall take necessary steps to mitigate the harmful effects of such use or disclosure.

  • Use of the Service 12.1 When using the Service you must comply with: (a) our CRA, including clause 4 of the General Terms, and this clause 12; and (b) any rules, including any acceptable use conditions, imposed by any third party whose content or services you access using the Service or whose Network on which your data transmits. 12.2 Any use of the Service at the Premises is your responsibility. The terms of our CRA apply to you and also to anyone else who uses the Service (regardless of whether you give them permission to do so or not). 12.3 You must ensure that any software you use in relation to the Service is properly licensed. 12.4 The use of a Local Area Network (LAN) for personal use is permitted, however the set-up and configuration of a LAN connected to the modem is not supported by customer service. 12.5 All IP addresses provided by us for your use remain our property. Most Services include a dynamic IP address. A new IP address is usually allocated whenever the computer and modem are rebooted. The IP address remains until the next time the computer and modem are switched off. Where provided, you may configure your computer or modem to connect using a static IP address. 12.6 We may at any time adjust aspects of the Service for security or Network management reasons, including, without limitation: (a) deleting transitory data that has been stored on our servers for longer than 90 days; (b) deleting stored email messages that are older than 90 days; (c) rejecting any incoming email messages and attachments that exceed 30 Megabytes (including encapsulation); (d) delivering access and content via proxy servers; (e) limiting the number of addresses to whom an outgoing email can be sent; (f) refusing to accept incoming email messages to mailboxes that have exceeded the email storage limit; (g) managing the Network to prioritise certain types of Internet traffic over others; and (h) blocking or filtering specific Internet ports. 12.7 You are responsible for providing any security or privacy measures for your computer networks and any data stored on those networks or accessed through the Service. We will not be liable to you in respect of any loss, damage, costs or expenses incurred by you in connection with your failure to provide that security. 12.8 You may request additional users on the Service in accordance with the Pricing Schedule. 12.9 You must take reasonable steps to ensure that others do not gain unauthorised access to the Service through your account. We recommend that you do not disclose your password to others and that you change your password regularly. 12.10 We may monitor use of the Service to investigate a breach (or suspected breach) of the Fair Use Policy or upon the request of an authorised authority. 12.11 Where you provide your own wireless computer connection device, you are responsible for any loss caused by an unauthorised interception of the Service.

  • No Unauthorized Use or Disclosure Executive agrees that he will not, at any time during or after Executive’s employment by Company, make any unauthorized disclosure of, and will prevent the removal from Company premises of, Confidential Information or Work Product of Company (or its affiliates), or make any use thereof, except in the carrying out of Executive’s responsibilities during the course of Executive’s employment with Company. Executive shall use commercially reasonable efforts to cause all persons or entities to whom any Confidential Information shall be disclosed by him hereunder to observe the terms and conditions set forth herein as though each such person or entity was bound hereby. Executive shall have no obligation hereunder to keep confidential any Confidential Information if and to the extent disclosure thereof is specifically required by law; provided, however, that in the event disclosure is required by applicable law, Executive shall provide Company with prompt notice of such requirement prior to making any such disclosure, so that Company may seek an appropriate protective order. At the request of Company at any time, Executive agrees to deliver to Company all Confidential Information that he may possess or control. Executive agrees that all Confidential Information of Company (whether now or hereafter existing) conceived, discovered or made by him during the period of Executive’s employment by Company exclusively belongs to Company (and not to Executive), and Executive will promptly disclose such Confidential Information to Company and perform all actions reasonably requested by Company to establish and confirm such exclusive ownership. Affiliates of Company shall be third party beneficiaries of Executive’s obligations under this Article 6. As a result of Executive’s employment by Company, Executive may also from time to time have access to, or knowledge of, Confidential Information or Work Product of third parties, such as customers, suppliers, partners, joint venturers, and the like, of Company and its affiliates. Executive also agrees to preserve and protect the confidentiality of such third party Confidential Information and Work Product to the same extent, and on the same basis, as Company’s Confidential Information and Work Product.

  • No Unauthorized Use Provider shall not use Student Data or information in a Pupil Record for any purpose other than as explicitly specified in this DPA.

  • Use of the Software TO THE EXTENT OF A CONFLICT BETWEEN THE PROVISIONS OF THE FOREGOING DOCUMENTS, THE ORDER OF PRECEDENCE SHALL BE (1)THE SIGNED CONTRACT, (2) THE CLICK-ACCEPT AGREEMENT OR THIRD PARTY LICENSE AGREEMENT, AND

  • Unauthorized Work The contractor is not authorized at any time to commence task order performance prior to issuance of a signed TO or other written approval provided by the CO to begin work.

  • Use of the Services 1.1 We will make the Oracle services listed in Your order (the “Services”) available to You pursuant to this Agreement and Your order. Except as otherwise stated in this Agreement or Your order, You have the non- exclusive, worldwide, limited right to use the Services during the period defined in Your order, unless earlier terminated in accordance with this Agreement or Your order (the “Services Period”), solely for Your internal business operations. You may allow Your Users (as defined below) to use the Services for this purpose, and You are responsible for their compliance with this Agreement and Your order. 1.2 The Service Specifications describe and govern the Services. During the Services Period, we may update the Services and Service Specifications (with the exception of the Data Processing Agreement as described below) to reflect changes in, among other things, laws, regulations, rules, technology, industry practices, patterns of system use, and availability of Third Party Content (as defined below). Oracle updates to the Services or Service Specifications will not materially reduce the level of performance, functionality, security or availability of the Services during the Services Period of Your order. 1.3 You may not, and may not cause or permit others to: (a) use the Services to harass any person; cause damage or injury to any person or property; publish any material that is false, defamatory, harassing or obscene; violate privacy rights; promote bigotry, racism, hatred or harm; send unsolicited bulk e-mail, junk mail, spam or chain letters; infringe property rights; or otherwise violate applicable laws, ordinances or regulations; (b) perform or disclose any benchmarking or availability testing of the Services; (c) perform or disclose any performance or vulnerability testing of the Services without Oracle’s prior written approval, or perform or disclose network discovery, port and service identification, vulnerability scanning, password cracking or remote access testing of the Services; or (d) use the Services to perform cyber currency or crypto currency mining ((a) through (d) collectively, the “Acceptable Use Policy”). In addition to other rights that we have in this Agreement and Your order, we have the right to take remedial action if the Acceptable Use Policy is violated, and such remedial action may include removing or disabling access to material that violates the policy.

  • Liability for Unauthorized Use If any Card is lost or stolen or otherwise may be used without your permission (express or implied), you must immediately notify us orally or in writing at the following phone number or address: 0-000-000-0000 or at TIB, National Association, P.O Box 569120, Dallas, Texas 75356-9120. If unauthorized use of a Card occurs before you notify us of the loss, theft or unauthorized use, you may be liable up to a maximum amount of $50. If unauthorized use of a Credit Device occurs, you may be liable for all of the unauthorized use.

  • Unauthorised Use of Intellectual Property a) The Supplier/Service Provider agrees to notify Transnet in writing of any conflicting uses of, and applications of registrations of Patents, Designs and Trade Marks or any act of infringement, unfair competition or passing off involving the Intellectual Property of Transnet of which the Supplier/Service Provider acquires knowledge and Transnet shall have the right, as its own option, to proceed against any party infringing its Intellectual Property. b) It shall be within the sole and absolute discretion of Transnet to determine what steps shall be taken against the infringer and the Supplier/Service Provider shall co-operate fully with Transnet, at Transnet’s cost, in whatever measure including legal action to bring any infringement of illegal use to an end. c) The Supplier/Service Provider shall cooperate to provide Transnet promptly with all relevant ascertainable facts. d) If proceedings are commenced by Transnet alone, Transnet shall be responsible for all expenses but shall be entitled to all damages or other awards arising out of such proceedings. If proceedings are commenced by both Parties, both Parties will be responsible for the expenses and both Parties shall be entitled to damages or other awards arising out of proceedings.