Use of CGI System Sample Clauses

Use of CGI System. The Customer’s right of use of the CGI System under this Agreement is subject to the following restrictions: Customer shall not (i) license, sublicense, sell, resell, transfer, assign, distribute the CGI System or otherwise make available the CGI System to any third party, (ii) modify or make derivative works based on the CGI System, or use the CGI System for commercial time-sharing, rental, outsource or service bureau use, (iii) commercially exploit the CGI System in any way, (iv) in connection with this Service, send or store infringing, obscene, threatening, or otherwise unlawful or tortious material, including but not limited to material that violates privacy rights, (v) send or store Malicious Code in connection with the CGI System, (vi) interfere with or disrupt performance of the CGI System or the data contained therein; (vii) attempt to gain access to the CGI System or its related systems or networks in a manner not set forth in the Documentation, (viii) access all or any part of the CGI System in order to build a product or service which competes with the CGI System, (ix) copy any features, functions, integrations, interfaces or graphics of the CGI System, or (x) reverse engineer, disassemble, decompile, or otherwise attempt to derive the source code contained within the CGI System. This Agreement and its attachments and exhibits do not transfer any right of ownership in or related to the Subscription Services, or CGI System. Customer agrees that use of the CGI System to which access is given shall be (a) in compliance with applicable federal, state and local laws and regulations and communications common carrier tariffs, and (b) for proper business purposes. As part of CGI’s security measures, CGI may assign to Customer one or more user or identification codes and associated passwords that will enable Customer and its Authorized Users to access the CGI System. Customer agrees to maintain the security of its user or identification codes and associated passwords and agrees to be responsible for their proper use by its employees. Each Authorized User shall keep a secure password for his use of the CGI System, that such password shall be changed no less frequently than monthly and that each Authorized User shall keep his password confidential. Customer agrees to comply with any rules of operation and security procedures established by CGI for access to and use of the CGI System. Customer agrees that neither it nor its employees or agents will attempt...

Related to Use of CGI System

  • Use of websites (a) The Borrower may satisfy its obligation to deliver any public information to the Lenders by posting this information onto an electronic website designated by the Borrower and the Administrative Agent (the “Designated Website”) by notifying the Administrative Agent (i) of the address of the website together with any relevant password specifications and (ii) that such information has been posted on the website; provided, that in any event the Borrower shall supply the Administrative Agent with one copy in paper form of any information which is posted onto the website. (b) The Administrative Agent shall supply each Lender with the address of and any relevant password specifications for the Designated Website following designation of that website by the Borrower and the Administrative Agent. (c) The Borrower shall promptly upon becoming aware of its occurrence notify the Administrative Agent if: (i) the Designated Website cannot be accessed due to technical failure; (ii) the password specifications for the Designated Website change; (iii) any new information which is required to be provided under this Agreement is posted onto the Designated Website; (iv) any existing information which has been provided under this Agreement and posted onto the Designated Website is amended; or (v) the Borrower becomes aware that the Designated Website or any information posted onto the Designated Website is or has been infected by any electronic virus or similar software. If the Borrower notifies the Administrative Agent under Section 5.3(c)(i) or Section 5.3(c)(v) above, all information to be provided by the Borrower under this Agreement after the date of that notice shall be supplied in paper form unless and until the Administrative Agent is satisfied that the circumstances giving rise to the notification are no longer continuing.

  • Use of Software Any software that is available on the Services ("Software") is the copyrighted work of Red Hat and/or its licensors. Copying or reproducing the Software to any other server or location for further reproduction or redistribution is strictly prohibited, unless such reproduction or redistribution is permitted by a license agreement accompanying such Software. You may not create derivative works of the Software, or attempt to decompile or reverse-engineer the Software unless otherwise permitted by law. Use of the Software is subject to the license terms of any license agreement that may accompany or is provided with the Software. You may not download any Software until you have read and accepted the terms of the accompanying software license. WITHOUT LIMITING THE FOREGOING, THE SOFTWARE IS WARRANTED, IF AT ALL, ONLY ACCORDING TO THE TERMS OF THE SEPARATE LICENSE AGREEMENT ACCOMPANYING THE SOFTWARE. EXCEPT AS WARRANTED IN SUCH LICENSE AGREEMENT, RED HAT, ITS PARENT, SUBSIDIARY, AND AFFILIATE COMPANIES, AND ITS LICENSORS DISCLAIM ALL WARRANTIES AND CONDITIONS WITH REGARD TO THE SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT, TO THE MAXIMUM EXTENT PERMITTED BY LAW.

  • Use of Customer Data Verizon, Verizon Affiliates and their respective agents, may use, process and/or transfer Customer Data (including intra-group transfers and transfers to entities in countries that do not provide statutory protections for personal information) as set forth in the Privacy Policy and as necessary: (a) in connection with provisioning of Services; (b) to incorporate Customer Data into databases controlled by Verizon, Verizon Affiliates or their respective agents for the purpose of providing Services; administration; provisioning; invoicing and reconciliation; verification of Customer identity, solvency and creditworthiness; maintenance, support and product development; fraud detection and prevention; sales, revenue and customer analysis and reporting; market and customer use analysis including in the manner described in the Privacy Policy; and (c) to communicate to Customer regarding Services.

  • Use of Card PIN 1.1. RECEIPT OF CARD/PIN Once your application for a Card is approved, we shall send you a Card and a Personal Identification Number (PIN) to be used in conjunction with your Card. Please sign your Card upon receiving it.

  • Use of Data by User Registry Operator will permit user to use the zone file for lawful purposes; provided that (a) user takes all reasonable steps to protect against unauthorized access to and use and disclosure of the data and (b) under no circumstances will Registry Operator be required or permitted to allow user to use the data to, (i) allow, enable, or otherwise support the transmission by email, telephone, or facsimile of mass unsolicited, commercial advertising or solicitations to entities other than user’s own existing customers, or (ii) enable high volume, automated, electronic processes that send queries or data to the systems of Registry Operator or any ICANN-­‐accredited registrar.

  • Use of Logos The Company hereby consents to the use of its and its Subsidiaries’ logos in connection with the Debt Financing so long as such logos (i) are used solely in a manner that is not intended to or likely to harm or disparage the Company Group or the reputation or goodwill of the Company Group; (ii) are used solely in connection with a description of the Company, its business and products or the Merger; and (iii) are used in a manner consistent with the other terms and conditions that the Company reasonably imposes.

  • Use of Contractors (a) If the employer wishes to engage contractors and their employees to perform work in the classifications covered by this agreement, the employer must first consult in good faith with the union. Consultation will occur prior to the engagement of sub-contractors. (b) If the employer decides to engage subcontractors, the employer shall ensure that these contractors and their employees receive wages, allowances and conditions equal to or better than those contained in this agreement. (c) The use of sham sub contracting arrangements is a breach of this agreement. The contractor who engages subcontractors is responsible for ensuring the employees of sub- contractors receive wages, allowances and conditions equal to or better those contained in this agreement, this obligation extends to liability for all outstanding wages conditions and entitlements under this agreement.

  • Use of the Software licensed hereunder may require third party software or hardware (including but limited to databases, operating systems and servers). Unless specifically licensed in the Master Agreement, this Agreement does not contain a license to use such additional materials.

  • Use of Cookies 5.1 We use cookies to ensure that our website works effectively and to support your trading activities. Cookies are small text files sent from our web server to your computer. Our cookies do not contain any personal data, account numbers, or passwords. 5.2 We may enlist outside organizations to help us manage the website and collect and analyze statistical data. These outside organizations may install and use their own cookies on our behalf.

  • Use of Technology Participants are subject to all existing laws (federal and state) and University regulations and policies on use of technology, including not only those laws and regulations that are specific to computers and networks, but also those that may apply generally to personal conduct such as:  UC Electronic Communications Policy: xxxx://xxxxxx.xxxx.xxx/doc/7000470/ElectronicCommunications  UCLA E-mail Policy and Guidelines: xxxx://xxx.xxxxxxxxxxxxx.xxxx.xxx/app/Default.aspx?&id=455  IT Services Acceptable Use Policy: xxxx://xxx.xxx.xxxx.xxx/policies/aupdetail.html  The UC Policy on Copyright Ownership: xxxx://xxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx.xxx/resources/copyright-ownership.html  Bruin OnLine Service Level Agreement: xxxx://xxx.xxx.xxxx.xxx/policies/BOL_SLA.pdf Any violation may result in technology related privileges being restricted or revoked and may also result in The University undertaking disciplinary or civil action. If the violation constitutes a criminal offense, appropriate legal action may be taken.