Unauthorized Use or Access Sample Clauses

Unauthorized Use or Access. You agree that you will not, under any circumstances: (a) Interfere or attempt to interfere with the proper functioning of Company Properties or connect to or use Company Properties in any way not expressly permitted by the Terms; (b) Systematically retrieve data or other content from our Company Properties to create or compile, directly or indirectly, in single or multiple downloads, a collection, compilation, database, directory or the like, whether by manual methods, through the use of bots, crawlers, spiders, or otherwise; (c) Use, display, mirror or frame Company Properties, or any individual element within Company Properties, Company’s name, any Company trademark, logo or other proprietary information, or the layout and design of any page or form contained on a page, without Company’s express written consent; (d) Use any unauthorized software that accesses, intercepts, “mines” or otherwise collects information from or through Company Properties or that is in transit from or to Company Properties, including, but not limited to, any software that reads areas of RAM or streams of network traffic used by Company Properties; (e) Intercept, examine or otherwise observe any proprietary communications protocol used by a client, a server or Company Properties, whether through the use of a network analyzer, packet sniffer or other device; (f) Make any automated use of Company Properties, or take any action that imposes or may impose (in Company’s sole discretion) an unreasonable or disproportionately large load on the infrastructure for Company Properties; (g) Bypass any robot exclusion headers or other measures Company takes to restrict access to Company Properties, or use any software, technology or device to send content or messages, scrape, spider or crawl Company Properties, or harvest or manipulate data; (h) Use, facilitate, create, or maintain any unauthorized connection to Company Properties, including, but not limited to: (i) any connection to any unauthorized server that emulates, or attempts to emulate, any part of Company Properties; or (ii) any connection using programs, tools or software not expressly approved by Company; (i) Reverse engineer, decompile, disassemble, decipher or otherwise attempt to derive the source code for any underlying software or other intellectual property used to provide Company Properties, or to obtain any information from Company Properties; (j) Forge headers or otherwise manipulate identifiers in order to disguise the ...
AutoNDA by SimpleDocs
Unauthorized Use or Access. Customer will prevent unauthorized use of the Services by its End Users and terminate any unauthorized use of or access to the Services. The Services are not intended for End Users under the age of 18. Customer will ensure that it does not allow any person under 18. Customer is responsible for any activity using its account, whether or not Customer authorized that activity. You should immediately notify Nvestiv in writing of any unauthorized use of your account by sending an email to xxxxxxx@xxxxxxx.xxx.
Unauthorized Use or Access. Customer will prevent unauthorized use of the Services by its End Users and terminate any unauthorized use of or access to the Services. The Services are not intended for End Users under the age of 13 if they reside in the United States or 16 if they reside anywhere else. If the law where the End User resides requires that the End User must be older in order for Dropbox to lawfully provide the Services to the End User without parental consent, the End User must be that older age. Customer will ensure that it does not allow any person under 13 residing in the United States, or 16 if they reside anywhere else, to use the Services. Customer will promptly notify Dropbox of any unauthorized use of or access to the Services.
Unauthorized Use or Access. You agree that you will not, under any circumstances: (a) Interfere or attempt to interfere with the proper functioning of the Website, Application, Services or Provider Materials or connect to or use the Website, Application, Services or Provider Materials in any way not expressly permitted by the Terms, including, without limitation, through the use of viruses, cancel bots, Trojan horses, harmful code, flood pings, denial-of-service attacks, packet or IP spoofing, forged routing or electronic mail address information, or similar methods or technology; (b) Provide inaccurate, misleading or false information to Provider or any other User through your use of the Services, and if any such information that you provide becomes inaccurate, misleading or false, you will promptly notify Provider of such change; (c) Systematically retrieve data or other content from our Website, Application, Services or Provider Materials to create or compile, directly or indirectly, in single or multiple downloads, a collection, compilation, database, directory or the like, whether by manual methods, through the use of bots, crawlers, or spiders, or otherwise; (d) Bypass any robot exclusion headers or other measures Provider takes to restrict access to the Website, Application, Services or Provider Materials or use any software, technology or device to send content or messages, scrape, spider or crawl the Website, Services or Provider Materials or harvest or manipulate data; (e) Use, facilitate, create, or maintain any unauthorized connection to the Website, Application, Services or Provider Materials, including, but not limited to: (a) any connection to any unauthorized server that emulates, or attempts to emulate, any part of the Website, Services or Provider Materials; or (b) any connection using programs, tools or software not expressly approved by Provider; (f) Reverse engineer, decompile, disassemble, decipher or otherwise attempt to derive the source code for any underlying software or other intellectual property used to provide the Website, Application, Services or Provider Materials, or to obtain any information from the Website, Application, Services or Provider Materials; (g) Impersonate any person or entity, including, but not limited to, Provider personnel, or falsely state or otherwise misrepresent your affiliation with a person or entity; (h) Make available any Content that you do not have a right to Make Available under any law or under contractual or fiduciary re...

Related to Unauthorized Use or Access

  • Unauthorized Use or Disclosure The Contractor shall notify COMMERCE within five (5) working days of any unauthorized use or disclosure of any confidential information, and shall take necessary steps to mitigate the harmful effects of such use or disclosure.

  • Unauthorized Use The Participating Institutions, or the Authorized Users shall not knowingly permit anyone other than the Authorized Users to access the Licensed Materials.

  • No Unauthorized Use or Disclosure Executive agrees that he will not, at any time during or after Executive’s employment by Company, make any unauthorized disclosure of, and will prevent the removal from Company premises of, Confidential Information or Work Product of Company (or its affiliates), or make any use thereof, except in the carrying out of Executive’s responsibilities during the course of Executive’s employment with Company. Executive shall use commercially reasonable efforts to cause all persons or entities to whom any Confidential Information shall be disclosed by him hereunder to observe the terms and conditions set forth herein as though each such person or entity was bound hereby. Executive shall have no obligation hereunder to keep confidential any Confidential Information if and to the extent disclosure thereof is specifically required by law; provided, however, that in the event disclosure is required by applicable law, Executive shall provide Company with prompt notice of such requirement prior to making any such disclosure, so that Company may seek an appropriate protective order. At the request of Company at any time, Executive agrees to deliver to Company all Confidential Information that he may possess or control. Executive agrees that all Confidential Information of Company (whether now or hereafter existing) conceived, discovered or made by him during the period of Executive’s employment by Company exclusively belongs to Company (and not to Executive), and Executive will promptly disclose such Confidential Information to Company and perform all actions reasonably requested by Company to establish and confirm such exclusive ownership. Affiliates of Company shall be third party beneficiaries of Executive’s obligations under this Article 6. As a result of Executive’s employment by Company, Executive may also from time to time have access to, or knowledge of, Confidential Information or Work Product of third parties, such as customers, suppliers, partners, joint venturers, and the like, of Company and its affiliates. Executive also agrees to preserve and protect the confidentiality of such third party Confidential Information and Work Product to the same extent, and on the same basis, as Company’s Confidential Information and Work Product.

  • Unauthorized Access Using service to access, or to attempt to access without authority, the accounts of others, or to penetrate, or attempt to penetrate, security measures of Company’s or a third party’s computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in disruption of service or the corruption or loss of data.

  • Unauthorized Work The contractor is not authorized at any time to commence task order performance prior to issuance of a signed TO or other written approval provided by the CO to begin work.

  • No Unauthorized Use Provider shall not use Student Data or information in a Pupil Record for any purpose other than as explicitly specified in this DPA.

  • Unauthorised use We shall not be liable for any loss, liability or cost whatsoever arising from any unauthorised use of the Electronic Service. You shall on demand indemnify, protect and hold us harmless from and against all losses, liabilities, judgements, suits, actions, proceedings, claims, damages and costs resulting from or arising out of any act or omission by any person using an Electronic Service by using your designated passwords, whether or not you authorised such use.

  • Unauthorised Use of Confidential Information The Supplier/Service Provider shall not authorise any party to act on or use in any way any Confidential Information belonging to Transnet whether or not such party is aware of such Confidential Information, and shall promptly notify Transnet of the information if it becomes aware of any party so acting, and shall provide Transnet the information with such assistance as Transnet reasonably requires, at Transnet’s cost and expense, to prevent such third party from so acting.

  • Unauthorised Use of Intellectual Property a) The Supplier/Service Provider agrees to notify Transnet in writing of any conflicting uses of, and applications of registrations of Patents, Designs and Trade Marks or any act of infringement, unfair competition or passing off involving the Intellectual Property of Transnet of which the Supplier/Service Provider acquires knowledge and Transnet shall have the right, as its own option, to proceed against any party infringing its Intellectual Property. b) It shall be within the sole and absolute discretion of Transnet to determine what steps shall be taken against the infringer and the Supplier/Service Provider shall co-operate fully with Transnet, at Transnet’s cost, in whatever measure including legal action to bring any infringement of illegal use to an end. c) The Supplier/Service Provider shall cooperate to provide Transnet promptly with all relevant ascertainable facts. d) If proceedings are commenced by Transnet alone, Transnet shall be responsible for all expenses but shall be entitled to all damages or other awards arising out of such proceedings. If proceedings are commenced by both Parties, both Parties will be responsible for the expenses and both Parties shall be entitled to damages or other awards arising out of proceedings.

  • Unauthorized Access Notification XXX shall notify Provider promptly of any known unauthorized access. XXX will assist Provider in any efforts by Provider to investigate and respond to any unauthorized access.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!