Use of Domain Name Sample Clauses

Use of Domain Name. If CenturyLink provides you with a domain name that has CenturyLink's name or marks embedded therein ("CenturyLink Domain Name"), you may only use the CenturyLink Domain Name during the term of the Agreement. CenturyLink owns and has the right to change the CenturyLink Domain Name. Other than for identifying the location of your Web site, you may not issue any public announcement regarding this Agreement or use the name or any marks of CenturyLink or any of its affiliates without the prior written approval of CenturyLink.
AutoNDA by SimpleDocs
Use of Domain Name. 8.1. The Applicant (including its subsidiaries and or other affilaites) undertakes to make every attempt to use the Domain Name subject to the following restrictions. The Applicant: 8.1.1. must commence commercial use of the approved .africa domain name within 20 (twenty) calendar days after registration; 8.1.2. may use the domain name only for the Applicant’s own, business purposes as documented in its .africa Pioneer Application Form; 8.1.3. may not lease, resell or allow any third party to make use of the approved. africa domain name; 8.1.4. may not allocate sub-domains to any third party or make available the approved domain name or any subdomain for the use of any third party; 8.1.5. may not use any other third-level domain with the approved domain name other than “www”; 8.1.6. must use the the approved .africa domain name to explicitly promote the TLD in all its marketing material inclduing but not limited to use on any website hosted at the approved domain name (though this need not be the only purpose to which the domain name is put), social media platforms and so forth; and 8.1.7. is encouraged to, inter alia, include a footer drawing attention to the TLD in any email sent from an email account belonging to the Applicant; create links to the approved domain name and associated website/s; use the Pioneer’s name, logos, shared .africa digital resources to promote visibility and awareness of the .africa brand. 8.2. If Registry Operator in its sole discretion determines that the Applicant is not putting the approved .africa domain name to proper use as described above, then Registry Operator may suspend the registration of the said domain name, or transfer it to another Applicant. 8.3. Save for the domain registration fee, the Applicant is responsible for all other costs and expenses associated with the activation of the xxxxxxxx.xxxxxx domain name for the .africa Pioneer Program. 8.4. Registry Operator undertakes not to disclose the Applicant’s confidential information unless written approval to the contrary is obtained.
Use of Domain Name. 21.10.1 Upon the effective date of registration, the Registrant shall be entitled to exclusive use of the domain name registered in the Registrant's name. 21.10.2 The Registrant agrees and undertakes that it will not use, display, exploit or use the domain name which is illegal or is in convention with or is in violation of any applicable laws or policies. 21.10.3 The Registrant undertakes not to be engaged in the following activities: a. Sending unsolicited mail messages, including the sending of "junk mail" or other advertising material to individuals who did not specifically request for such material (spam). This includes, but is not limited to, bulk-mailing of commercial advertising, informational announcements, and political tracts. Such material may only be sent to those who have expressly requested for it. b. Harassment, whether through language, frequency, or size of messages. c. Creating or forwarding "make-money fast" type messages, "chain letters" or "pyramid schemes" of any type, whether or not the recipient wishes to receive such messages. d. Malicious e-mail, including, but not limited to, flooding a user or site with very large or numerous pieces of e-mail. e. Unauthorized use, or forging, of mail header information (i.e., spoofing). The Registrant's use of the domain name shall also be in compliant with the Domain Service Provider's Acceptable Use Policy and all other applicable policies. The Registrant acknowledges that a breach of this Clause 10 will constitute a material breach of this Agreement and the Domain Service Provider shall be entitled to terminate this Agreement immediately upon such breach without having to refund any of the fees paid by the Registrant to the Domain Service Provider.
Use of Domain Name. (a) The Company and the Purchaser each acknowledge and agree that on and from Completion, the Company must create and register its own domain name to receive traffic directed to the Company under its new business name. (b) The Seller is not obliged to redirect any traffic from the Domain Name to the Company’s new domain name to be procured under paragraph (a) after three (3) months from the Completion Date provided: (i) the email pertains to an Employee; and (ii) the Purchaser has provided the Seller with the Company’s new domain name for the Employees. (c) The Seller will provide a copy to the Company of any email or other correspondence received electronically or in writing by the Seller, or any Related Body Corporate of the Seller, following Completion which is addressed to the Company from a third party and pertains to the Business and which does not relate to an Excluded Asset or any service provided by means of or in relation to an Excluded Asset.
Use of Domain Name. If Brightspeed provides you with a domain name that has Brightspeed’s name or marks embedded therein ("Brightspeed Domain Name"), you may only use the Brightspeed Domain Name during the term of the Agreement. Brightspeed owns and has the right to change the Brightspeed Domain Name. Other than for identifying the location of your Web site, you may not issue any public announcement regarding this Agreement or use the name or any marks of Brightspeed or any of its affiliates without the prior written approval of Brightspeed.
Use of Domain Name 

Related to Use of Domain Name

  • Domain Name Data 1.5.1 Query format: whois EXAMPLE.TLD 1.5.2 Response format:

  • Domain Name Data (1) Query format: whois EXAMPLE.TLD (2) Response format:

  • Sublicense to Use the Scudder Trademarks As exclusive licensee of the rights to use anx xxxxxcense the use of the "Scudder," "Scudder Investments" and "Scudder, Stevens & Clark, Inx." xxxdemaxxx (xxgether, the "Scuddex Xxxxx"), xxx xerexx xxant the Trust a nonexclusive right xxx xxxlicense to use (i) the "Scudder" name and mark as part of the Trust's name (the "Fund Namx"), xxd (ii) the Scudder Marks in connection with the Trust's investment products xxx xxxvices, in each case only for so long as this Agreement, any other investment management agreement between you or any organization which shall have succeeded to your business as investment manager ("your Successor") and the Trust, or any extension, renewal or amendment hereof or thereof remains in effect, and only for so long as you are a licensee of the Scudder Marks, provided however, that you agree to use your best xxxxxxx to maintain your license to use and sublicense the Scudder Marks. The Trust agrees that it shall have no right to suxxxxxxxe or assign rights to use the Scudder Marks, shall acquire no interest in the Scudder Marks othxx xxxx the rights granted herein, that all of txx Xxxxt's uses of the Scudder Marks shall inure to the benefit of Scudder Trust Company xx xxxer and licensor of the Scudder Marks (xxx "Xrademark Owner"), and that the Trust shall nxx xxxxlenge the validity of the Scudder Marks or the Trademark Owner's ownership thereof. The Truxx xxxxher agrees that all services and products it offers in connection with the Scudder Marks shall meet commercially reasonable standards of duaxxxx, xs may be determined by you or the Trademark Owner from time to time, provided that you acknowledge that the services and products the Trust rendered during the one-year period preceding the date of this Agreement are acceptable. At your reasonable request, the Trust shall cooperate with you and the Trademark Owner and shall execute and deliver any and all documents necessary to maintain and protect (including but not limited to in connection with any trademark infringement action) the Scudder Marks and/or enter the Trust as a registered user thereof. Xx xxch time as this Agreement or any other investment management agreement shall no longer be in effect between you (or your Successor) and the Trust, or you no longer are a licensee of the Scudder Marks, the Trust shall (to the extent that, and as soon ax, xx xawfully can) cease to use the Fund Name or any other name indicating that it is advised by, managed by or otherwise connected with you (or your Successor) or the Trademark Owner. In no event shall the Trust use the Scudder Marks or any other name or mark confusingly similar therexx (xxxluding, but not limited to, any name or mark that includes the name "Scudder") if this Agreement or any other investment advisory agrexxxxx xetween you (or your Successor) and the Fund is terminated.

  • Use of Names and Marks All names, trademarks, trade names or symbols (collectively, “Branding”) of each Party are and will remain the exclusive property of such Party. Neither Party will acquire any right to the Branding of the other Party. Accenture will have the limited right to use Supplier’s Branding in connection with the activities described in this Purchase Order. Neither Party may: (i) publicize this Purchase Order, or their subject matter; (ii) state that a Party has approved or endorsed any product or service provided by the other Party as contemplated by this Purchase Order; or (iii) otherwise use the Branding of such other Party or its Affiliates, without the other Party’s prior written consent.

  • Use of Technology Participants are subject to all existing laws (federal and state) and University regulations and policies on use of technology, including not only those laws and regulations that are specific to computers and networks, but also those that may apply generally to personal conduct such as: • UC Electronic Communications Policy: xxxx://xxx.xxxx.xxx/ucophome/policies/ec/ • UCLA E-mail Policy and Guidelines: xxxx://xxx.xxxxxxxxxxxxx.xxxx.xxx/app/Default.aspx?&id=455 • IT Services Acceptable Use Policy: xxxx://xxx.xxx.xxxx.xxx/policies/aupdetail.html • The UC Policy on Copyright Ownership: xxxx://xxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx.xxx/resources/copyright-ownership.html • Bruin OnLine Service Level Agreement: xxxx://xxx.xxx.xxxx.xxx/policies/BOL_SLA.pdf Any violation may result in technology related privileges being restricted or revoked and may also result in The University undertaking disciplinary action. If the violation constitutes a criminal offense, appropriate legal action may be taken.

  • Protection of Customer Data The Supplier shall not delete or remove any proprietary notices contained within or relating to the Customer Data. The Supplier shall not store, copy, disclose, or use the Customer Data except as necessary for the performance by the Supplier of its obligations under this Call Off Contract or as otherwise Approved by the Customer. To the extent that the Customer Data is held and/or Processed by the Supplier, the Supplier shall supply that Customer Data to the Customer as requested by the Customer and in the format (if any) specified by the Customer in the Call Off Order Form and, in any event, as specified by the Customer from time to time in writing. The Supplier shall take responsibility for preserving the integrity of Customer Data and preventing the corruption or loss of Customer Data. The Supplier shall perform secure back-ups of all Customer Data and shall ensure that up-to-date back-ups are stored off-site at an Approved location in accordance with any BCDR Plan or otherwise. The Supplier shall ensure that such back-ups are available to the Customer (or to such other person as the Customer may direct) at all times upon request and are delivered to the Customer at no less than six (6) Monthly intervals (or such other intervals as may be agreed in writing between the Parties). The Supplier shall ensure that any system on which the Supplier holds any Customer Data, including back-up data, is a secure system that complies with the Security Policy and the Security Management Plan (if any). If at any time the Supplier suspects or has reason to believe that the Customer Data is corrupted, lost or sufficiently degraded in any way for any reason, then the Supplier shall notify the Customer immediately and inform the Customer of the remedial action the Supplier proposes to take. If the Customer Data is corrupted, lost or sufficiently degraded as a result of a Default so as to be unusable, the Supplier may: require the Supplier (at the Supplier's expense) to restore or procure the restoration of Customer Data to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer, and the Supplier shall do so as soon as practicable but not later than five (5) Working Days from the date of receipt of the Customer’s notice; and/or itself restore or procure the restoration of Customer Data, and shall be repaid by the Supplier any reasonable expenses incurred in doing so to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer.

  • Unauthorised Use of Intellectual Property a) The Supplier/Service Provider agrees to notify Transnet in writing of any conflicting uses of, and applications of registrations of Patents, Designs and Trade Marks or any act of infringement, unfair competition or passing off involving the Intellectual Property of Transnet of which the Supplier/Service Provider acquires knowledge and Transnet shall have the right, as its own option, to proceed against any party infringing its Intellectual Property. b) It shall be within the sole and absolute discretion of Transnet to determine what steps shall be taken against the infringer and the Supplier/Service Provider shall co-operate fully with Transnet, at Transnet’s cost, in whatever measure including legal action to bring any infringement of illegal use to an end. c) The Supplier/Service Provider shall cooperate to provide Transnet promptly with all relevant ascertainable facts. d) If proceedings are commenced by Transnet alone, Transnet shall be responsible for all expenses but shall be entitled to all damages or other awards arising out of such proceedings. If proceedings are commenced by both Parties, both Parties will be responsible for the expenses and both Parties shall be entitled to damages or other awards arising out of proceedings.

  • OWNERSHIP AND USE OF WORK PRODUCT All reports, studies, information, data, statistics, forms, designs, plans, procedures, systems and any other materials or properties produced in whole or in part under this Agreement in connection with the performance of the Required Services (collectively “Work Product”) shall be the sole and exclusive property of City. No such Work Product shall be subject to private use, copyrights or patent rights by Consultant in the United States or in any other country without the express, prior written consent of City. City shall have unrestricted authority to publish, disclose, distribute, and otherwise use, copyright or patent, in whole or in part, any such Work Product, without requiring any permission of Consultant, except as may be limited by the provisions of the Public Records Act or expressly prohibited by other applicable laws. With respect to computer files containing data generated as Work Product, Consultant shall make available to City, upon reasonable written request by City, the necessary functional computer software and hardware for purposes of accessing, compiling, transferring and printing computer files.

  • USE OF NAMES AND TRADEMARKS 15.1 Nothing contained in this Agreement will be construed as conferring any right to use in advertising, publicity or other promotional activities any name, trademark, trade name, or other designation of either party hereto by the other (including any contraction, abbreviation, or simulation of any of the foregoing). Unless required by law the use, by LICENSEE, of the name "The Regents of the University of California" or the name of any University of California campus in advertising, publicity or other promotional activities is expressly prohibited.

  • Unauthorised Use of Confidential Information The Supplier/Service Provider shall not authorise any party to act on or use in any way any Confidential Information belonging to Transnet whether or not such party is aware of such Confidential Information, and shall promptly notify Transnet of the information if it becomes aware of any party so acting, and shall provide Transnet the information with such assistance as Transnet reasonably requires, at Transnet’s cost and expense, to prevent such third party from so acting.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!