Use of CGI System Sample Clauses

Use of CGI System. The Customer’s right of use of the CGI System under this Agreement is subject to the following restrictions: Customer shall not (i) license, sublicense, sell, resell, transfer, assign, distribute the CGI System or otherwise make available the CGI System to any third party, (ii) modify or make derivative works based on the CGI System, or use the CGI System for commercial time-sharing, rental, outsource or service bureau use, (iii) commercially exploit the CGI System in any way, (iv) in connection with this Service, send or store infringing, obscene, threatening, or otherwise unlawful or tortious material, including but not limited to material that violates privacy rights, (v) send or store Malicious Code in connection with the CGI System, (vi) interfere with or disrupt performance of the CGI System or the data contained therein; (vii) attempt to gain access to the CGI System or its related systems or networks in a manner not set forth in the Documentation, (viii) access all or any part of the CGI System in order to build a product or service which competes with the CGI System, (ix) copy any features, functions, integrations, interfaces or graphics of the CGI System, or (x) reverse engineer, disassemble, decompile, or otherwise attempt to derive the source code contained within the CGI System. This Agreement and its attachments and exhibits do not transfer any right of ownership in or related to the Subscription Services, or CGI System. Customer agrees that use of the CGI System to which access is given shall be (a) in compliance with applicable federal, state and local laws and regulations and communications common carrier tariffs, and (b) for proper business purposes. As part of CGI’s security measures, CGI may assign to Customer one or more user or identification codes and associated passwords that will enable Customer and its Authorized Users to access the CGI System. Customer agrees to maintain the security of its user or identification codes and associated passwords and agrees to be responsible for their proper use by its employees. Each Authorized User shall keep a secure password for his use of the CGI System, that such password shall be changed no less frequently than monthly and that each Authorized User shall keep his password confidential. Customer agrees to comply with any rules of operation and security procedures established by CGI for access to and use of the CGI System. Customer agrees that neither it nor its employees or agents will attempt...
AutoNDA by SimpleDocs

Related to Use of CGI System

  • Use of Content The content on the App is provided to you “as is” for your personal use only and may not be used, copied, distributed, transmitted, broadcast, displayed, sold, licensed, de-compiled, or otherwise exploited for any other purposes whatsoever without our prior written consent. If you download or print a copy of the content you must retain all copyright and other proprietary notices contained therein.

  • Use of Software Any software that is available on the Services ("Software") is the copyrighted work of Red Hat and/or its licensors. Copying or reproducing the Software to any other server or location for further reproduction or redistribution is strictly prohibited, unless such reproduction or redistribution is permitted by a license agreement accompanying such Software. You may not create derivative works of the Software, or attempt to decompile or reverse-engineer the Software unless otherwise permitted by law. Use of the Software is subject to the license terms of any license agreement that may accompany or is provided with the Software. You may not download any Software until you have read and accepted the terms of the accompanying software license. WITHOUT LIMITING THE FOREGOING, THE SOFTWARE IS WARRANTED, IF AT ALL, ONLY ACCORDING TO THE TERMS OF THE SEPARATE LICENSE AGREEMENT ACCOMPANYING THE SOFTWARE. EXCEPT AS WARRANTED IN SUCH LICENSE AGREEMENT, RED HAT, ITS PARENT, SUBSIDIARY, AND AFFILIATE COMPANIES, AND ITS LICENSORS DISCLAIM ALL WARRANTIES AND CONDITIONS WITH REGARD TO THE SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT, TO THE MAXIMUM EXTENT PERMITTED BY LAW.

  • Use of Customer Data Verizon, Verizon Affiliates and their respective agents, may use, process and/or transfer Customer Data (including intra-group transfers and transfers to entities in countries that do not provide statutory protections for personal information) as set forth in the Privacy Policy and as necessary:

  • Use of Image I hereby consent to the use of my image by EMPOWER for any and all purposes, including, without limitation or compensation: Video, still photographs, publication and any trade or advertising purposes, providing such uses are not made as to constitute a direct endorsement of any product or service. PARTICIPANT INFORMATION (MUST BE COMPLETED FOR ALL PARTICIPANT(S) Name of Participant: (Print Clearly) Initial Date of Birth: _ Weight: Check In on Facebook Street Address: City: State: Zip: Phone Number: Email Address: Emergency Contact: Phone Number: Emergency Contact’s Relationship to Participant: By signing this document, I acknowledge that I may be found by a court of law to have waived my right to a lawsuit against the Released Parties on the basis of any claim herein from which I have released them. I HAVE HAD THE SUFFICIENT OPPORTUNITY TO READ THIS ENTIRE DOCUMENT. I HAVE CAREFULLY READ AND UNDERSTOOD IT AND AGREE TO BE BOUND BY ITS TERMS. Participant’s Signature: (Over 18 years of age) Date: PARENT OR GUARDIAN’S ADDITIONAL INDEMNIFICATION (MUST BE COMPLETED FOR PARTICIPANTS UNDER THE AGE OF 18) I, (parent/guardian name), the parent/guardian of (Xxxxx’s name) whose date of birth is / / give permission for my child to participate in the activities and utilize the equipment and facilities provided by EMPOWER. I have reviewed the terms of the above Agreement and, as parent/guardian, accept its terms. I have discussed the terms of the above Agreement with my child and am assured by my child that he/she understands the Agreement and has also freely accepted its terms. I agree to fully release, indemnify and hold harmless the Released Parties from any claims which I may have and, to the fullest extent allowed by law, to release the Released Parties on behalf of my child for any claim(s) that my child may have. I further agree to indemnify and hold harmless the Released Parties from any and all claims which are brought by, or on behalf of the above stated minor and which are in any way connected with such use or participation by the above stated minor. I HAVE HAD THE SUFFICIENT OPPORTUNITY TO READ THIS ENTIRE DOCUMENT. I HAVE READ AND UNDERSTOOD IT AND AGREE THAT MYSELF AND MY MINOR CHILD ARE TO BE BOUND BY ITS TERMS. Parent/Guardian’s Signature: Date:

  • Use of Card 6.1 On receipt of the Credit Card, You must immediately sign on the signature panel on the reverse of the Credit Card.

  • Use of Data by User Registry Operator will permit user to use the zone file for lawful purposes; provided that (a) user takes all reasonable steps to protect against unauthorized access to and use and disclosure of the data and (b) under no circumstances will Registry Operator be required or permitted to allow user to use the data to, (i) allow, enable, or otherwise support the transmission by email, telephone, or facsimile of mass unsolicited, commercial advertising or solicitations to entities other than user’s own existing customers, or (ii) enable high volume, automated, electronic processes that send queries or data to the systems of Registry Operator or any ICANN-­‐accredited registrar.

  • Use of Contractors (a) If the employer wishes to engage contractors and their employees to perform work in the classifications covered by this agreement, the employer must first consult in good faith with the union. Consultation will occur prior to the engagement of sub-contractors.

  • Use of the Software licensed hereunder may require third party software or hardware (including but limited to databases, operating systems and servers). Unless specifically licensed in the Master Agreement, this Agreement does not contain a license to use such additional materials.

  • Use of Cookies 5.1 We use cookies to ensure that our website works effectively and to support your trading activities. Cookies are small text files sent from our web server to your computer. Our cookies do not contain any personal data, account numbers, or passwords.

  • Use of Technology Participants are subject to all existing laws (federal and state) and University regulations and policies on use of technology, including not only those laws and regulations that are specific to computers and networks, but also those that may apply generally to personal conduct such as:  UC Electronic Communications Policy: xxxx://xxxxxx.xxxx.xxx/doc/7000470/ElectronicCommunications  UCLA E-mail Policy and Guidelines: xxxx://xxx.xxxxxxxxxxxxx.xxxx.xxx/app/Default.aspx?&id=455  IT Services Acceptable Use Policy: xxxx://xxx.xxx.xxxx.xxx/policies/aupdetail.html  The UC Policy on Copyright Ownership: xxxx://xxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx.xxx/resources/copyright-ownership.html  Bruin OnLine Service Level Agreement: xxxx://xxx.xxx.xxxx.xxx/policies/BOL_SLA.pdf Any violation may result in technology related privileges being restricted or revoked and may also result in The University undertaking disciplinary or civil action. If the violation constitutes a criminal offense, appropriate legal action may be taken.

Time is Money Join Law Insider Premium to draft better contracts faster.