USE OF WIRELESS SERVICES Sample Clauses

USE OF WIRELESS SERVICES. (a) End User is responsible, and FARMERS EDGE and the Provider are not responsible or liable, to prudently protect and safeguard the device (including any SIM card) against loss, abuse, theft or damage, and for the use of the device and the Wireless Services by End User and any other persons. (b) End User shall not use or allow others to use the Wireless Services or the device if such use: (i) is for, or results in, any illegal, abusive, annoying or offensive activities, including making available offensive content, the commission or encouragement of a criminal offence, stalking, harassment, spamming, disrupting or interfering with the Internet, any network, computer or other devices, transmission of a virus or other harmful component, defamation, intellectual property infringement, or interference with other customers’ service; (ii) is significantly higher than average or consumes excessive network capacity in FARMERS EDGE’s or the Provider’s reasonable opinion, or causes the Provider’s network, or FARMERS EDGE’s or the Provider’s ability to provide services to others, to be adversely affected; (iii) is for multi-media streaming, continuous data transmission or broadcasts, automatic data feeds, peer-to-peer (P2P) file sharing, voice over Internet protocol or any other application which uses excessive network capacity that is not made available to End User by FARMERS EDGE or the Provider; (iv) is to provide a substitute or back-up for private lines or dedicated data connections such as DSL; or (v) is to operate an email, web, server farm, news, chat or other service. (c) End User shall not (and shall not allow others to): (i) remove the SIM card from the device provided by FARMERS EDGE; (ii) use the SIM card provided by FARMERS EDGE with any device not provided through FARMERS EDGE or its authorized dealers (“Non-Farmers Edge Device”); (iii) make changes to the settings of a device or SIM card; (iv) threaten, abuse or harass any employee or representative of FARMERS EDGE or the Provider; (v) commit, attempt to commit, or allow others to commit or attempt to commit, any fraud against FARMERS EDGE or the Provider, including fraudulently obtaining Wireless Services or devices; (vi) transform outbound communications into incoming communications or otherwise attempt to avoid applicable charges; (vii) otherwise abuse the Wireless Services or flat rate or unlimited use plans, or allow others to do any of the foregoing; or (viii) resell, transfer, distribute, shar...
AutoNDA by SimpleDocs
USE OF WIRELESS SERVICES. Wireless Service is furnished for use by the Reseller for any lawful purpose, including resale subject to the terms hereof. Subject to SECTION 4(A), the Reseller may resell Wireless Service purchased hereunder to any Authorized User, wherever located, separately or in Packages; provided, however, that the Reseller may not sell Wireless Services for the purpose of subresale (other than to any Controlled Subsidiaries identified in the signature pages hereto or that have undertaken to be bound by the terms and conditions hereof pursuant to SECTION 20(A)). An Access Number may be associated with only one unit of Equipment, unless NewCo offers such service and the Reseller subscribes to such Wireless Service. Orders, including those which involve the start, a change or the discontinuance of Wireless Service, will be accepted by NewCo only from the Reseller and not from an Authorized User.

Related to USE OF WIRELESS SERVICES

  • Use of Verizon Telecommunications Services 2.1 Verizon Telecommunications Services may be purchased by Z-Tel under this Resale Attachment only for the purpose of resale by Z-Tel as a Telecommunications Carrier. Verizon Telecommunications Services to be purchased by Z-Tel for other purposes (including, but not limited to, Z-Tel’s own use) must be purchased by Z-Tel pursuant to other applicable Attachments to this Agreement (if any), or separate written agreements, including, but not limited to, applicable Verizon Tariffs. 2.2 Z-Tel shall not resell: 2.2.1 Residential service to persons not eligible to subscribe to such service from Verizon (including, but not limited to, business or other nonresidential Customers); 2.2.2 Lifeline, Link Up America, or other means-tested service offerings, to persons not eligible to subscribe to such service offerings from Verizon; 2.2.3 Grandfathered or discontinued service offerings to persons not eligible to subscribe to such service offerings from Verizon; or 2.2.4 Any other Verizon service in violation of a restriction stated in this Agreement (including, but not limited to, a Verizon Tariff) that is not prohibited by Applicable Law. 2.2.5 In addition to any other actions taken by Z-Tel to comply with this Section 2.2, Z-Tel shall take those actions required by Applicable Law to determine the eligibility of Z-Tel Customers to purchase a service, including, but not limited to, obtaining any proof or certification of eligibility to purchase Lifeline, Link Up America, or other means-tested services, required by Applicable Law. Z-Tel shall indemnify Verizon from any Claims resulting from Z-Tel’s failure to take such actions required by Applicable Law. 2.2.6 Verizon may perform audits to confirm Z-Tel’s conformity to the provisions of this Section 2.2. Such audits may be performed twice per calendar year and shall be performed in accordance with Sections 4.4.2 through 4.4.4 of the General Terms and Conditions. 2.3 Z-Tel shall be subject to the same limitations that Verizon’s Customers are subject to with respect to any Telecommunications Service that Verizon grandfathers or discontinues offering. Without limiting the foregoing, except to the extent that Verizon follows a different practice for Verizon Customers in regard to a grandfathered Telecommunications Service, such grandfathered Telecommunications Service: (a) shall be available only to a Customer that already has such Telecommunications Service; (b) may not be moved to a new service location; and, (c) will be furnished only to the extent that facilities continue to be available to provide such Telecommunications Service. 2.4 Z-Tel shall not be eligible to participate in any Verizon plan or program under which Verizon Customers may obtain products or services which are not Verizon Telecommunications Services, in return for trying, agreeing to purchase, purchasing, or using, Verizon Telecommunications Services. 2.5 In accordance with 47 CFR § 51.617(b), Verizon shall be entitled to all charges for Verizon Exchange Access services used by interexchange carriers to provide service to Z-Tel Customers.

  • Verizon OSS Services 8.2.1 Upon request by ECI, Verizon shall provide to ECI Verizon OSS Services. Such Verizon OSS Services will be provided in accordance with, but only to the extent required by, Applicable Law. 8.2.2 Subject to the requirements of Applicable Law, Verizon Operations Support Systems, Verizon Operations Support Systems functions, Verizon OSS Facilities, Verizon OSS Information, and the Verizon OSS Services that will be offered by Verizon, shall be as determined by Verizon. Subject to the requirements of Applicable Law, Verizon shall have the right to change Verizon Operations Support Systems, Verizon Operations Support Systems functions, Verizon OSS Facilities, Verizon OSS Information, and the Verizon OSS Services, from time-to-time, without the consent of ECI. 8.2.3 To the extent required by Applicable Law, in providing Verizon OSS Services to ECI, Verizon will comply with Verizon’s applicable OSS Change Management Guidelines, as such Guidelines are modified from time-to-time, including, but not limited to, the provisions of the Guidelines related to furnishing notice of changes in Verizon OSS Services. Verizon’s OSS Change Management Guidelines will be set out on a Verizon website.

  • Network Services Local Access Services In lieu of any other rates and discounts, Customer will pay fixed monthly recurring local loop charges ranging from $1,200 to $2,000 for TDM-based DS-3 Network Services Local Access Services at 2 CLLI codes mutually agreed upon by Customer and Company.

  • Web Services Our Web Services are designed to enable you to easily establish a presence on the Internet. Our Web Hosting and Design is composed of our Web Hosting and Design Publishing Component and other miscellaneous components. These components may be used independently or in conjunction with each other.

  • ADS Services Up to U.S. $5.00 per 100 ADSs (or fraction thereof) held on the applicable record date(s) established by the Depositary. Person holding ADSs on the applicable record date(s) established by the Depositary.

  • Use of Communication Services The Website may contain bulletin board services, chat areas, news groups, forums, communities, personal web pages, calendars, blog comment sections and/or other message or communication facilities designed to enable you to communicate with the public at large or with a group (collectively, “Communication Services”), you agree to use the Communication Services only to post, send and receive messages and material that are proper and related to the particular Communication Service. By way of example, and not as a limitation, you agree that when using a Communication Service, you will not: defame, abuse, harass, stalk, threaten or otherwise violate the legal rights (such as rights of privacy and publicity) of others; publish, post, upload, distribute or disseminate any inappropriate, profane, defamatory, infringing, obscene, indecent or unlawful topic, name, material or information; upload files that contain software or other material protected by intellectual property laws (or by rights of privacy of publicity) unless you own or control the rights thereto or have received all necessary consents; upload files that contain viruses, corrupted files, or any other similar software or programs that may damage the operation of another's computer; advertise or offer to sell or buy any goods or services for any business purpose, unless such Communication Service specifically allows such messages; conduct or forward surveys, contests, pyramid schemes or chain letters; download any file posted by another user of a Communication Service that you know, or reasonably should know, cannot be legally distributed in such manner; falsify or delete any author attributions, legal or other proper notices or proprietary designations or labels of the origin or source of software or other material contained in a file that is uploaded, restrict or inhibit any other user from using and enjoying the Communication Services; violate any code of conduct or other guidelines which may be applicable for any particular Communication Service; harvest or otherwise collect information about others, including e-mail addresses, without their consent; violate any applicable laws or regulations. The Company has no obligation to monitor the Communication Services. However, the Company reserves the right to review materials posted to a Communication Service and to remove any materials in its sole discretion. The Company reserves the right to terminate your access to any or all of the Communication Services at any time without notice for any reason whatsoever. The Company reserves the right at all times to disclose any information as necessary to satisfy any applicable law, regulation, legal process or governmental request, or to edit, refuse to post or to remove any information or materials, in whole or in part, in the Company’s sole discretion. Always use caution when giving out any personally identifying information about yourself in any Communication Service. The Company does not control or endorse the content, messages or information found in any Communication Service and, therefore, the Company specifically disclaims any liability with regard to the Communication Services and any actions resulting from your participation in any Communication Service. Managers and hosts are not authorized the Company spokespersons, and their views do not necessarily reflect those of the Company. Materials uploaded to a Communication Service may be subject to posted limitations on usage, reproduction and/or dissemination. You are responsible for adhering to such limitations if you upload the materials.

  • Use of Services Subject to the terms of this Agreement, Stripe grants you a worldwide, non-exclusive, non-transferable, non-sublicensable, royalty-free license during the Term to access the Documentation, and access and use the Stripe Technology, as long as your access and use is (a) solely as necessary to use the Services; (b) solely for your business purposes; and (c) in compliance with this Agreement and the Documentation.

  • Voice Services In lieu of any other rates and discounts, Customer will pay fixed per-minute rates ranging from $0.000 to $0.000 for the following Voice Services: Domestic Voice Service: Domestic Outbound Voice Service, including Calling Card and Domestic Inbound Voice Service based on origination and termination type. Data Services:

  • SaaS Services 6.1 Our SaaS Services are audited at least yearly in accordance with the AICPA’s Statement on Standards for Attestation Engagements (“SSAE”) No. 18. We have attained, and will maintain, SOC 1 and SOC 2 compliance, or its equivalent, for so long as you are timely paying for SaaS Services. Upon execution of a mutually agreeable Non-Disclosure Agreement (“NDA”), we will provide you with a summary of our compliance report(s) or its equivalent. Every year thereafter, for so long as the NDA is in effect and in which you make a written request, we will provide that same information. 6.2 You will be hosted on shared hardware in a Tyler data center or in a third-party data center. In either event, databases containing your Data will be dedicated to you and inaccessible to our other customers. 6.3 Our Tyler data centers have fully-redundant telecommunications access, electrical power, and the required hardware to provide access to the Tyler Software in the event of a disaster or component failure. In the event any of your Data has been lost or damaged due to an act or omission of Tyler or its subcontractors or due to a defect in Tyler’s software, we will use best commercial efforts to restore all the Data on servers in accordance with the architectural design’s capabilities and with the goal of minimizing any Data loss as greatly as possible. In no case shall the recovery point objective (“RPO”) exceed a maximum of twenty-four (24) hours from declaration of disaster. For purposes of this subsection, RPO represents the maximum tolerable period during which your Data may be lost, measured in relation to a disaster we declare, said declaration will not be unreasonably withheld. 6.4 In the event we declare a disaster, our Recovery Time Objective (“RTO”) is twenty-four (24) hours. For purposes of this subsection, RTO represents the amount of time, after we declare a disaster, within which your access to the Tyler Software must be restored. 6.5 We conduct annual penetration testing of either the production network and/or web application to be performed. We will maintain industry standard intrusion detection and prevention systems to monitor malicious activity in the network and to log and block any such activity. We will provide you with a written or electronic record of the actions taken by us in the event that any unauthorized access to your database(s) is detected as a result of our security protocols. We will undertake an additional security audit, on terms and timing to be mutually agreed to by the parties, at your written request. You may not attempt to bypass or subvert security restrictions in the SaaS Services or environments related to the Tyler Software. Unauthorized attempts to access files, passwords or other confidential information, and unauthorized vulnerability and penetration test scanning of our network and systems (hosted or otherwise) is prohibited without the prior written approval of our IT Security Officer. 6.6 We test our disaster recovery plan on an annual basis. Our standard test is not client-specific. Should you request a client-specific disaster recovery test, we will work with you to schedule and execute such a test on a mutually agreeable schedule. At your written request, we will provide test results to you within a commercially reasonable timeframe after receipt of the request. 6.7 We will be responsible for importing back-up and verifying that you can log-in. You will be responsible for running reports and testing critical processes to verify the returned Data. 6.8 We provide secure Data transmission paths between each of your workstations and our servers. 6.9 Tyler data centers are accessible only by authorized personnel with a unique key entry. All other visitors to Tyler data centers must be signed in and accompanied by authorized personnel. Entry attempts to the data center are regularly audited by internal staff and external auditors to ensure no unauthorized access. 6.10 Where applicable with respect to our applications that take or process card payment data, we are responsible for the security of cardholder data that we possess, including functions relating to storing, processing, and transmitting of the cardholder data and affirm that, as of the Effective Date, we comply with applicable requirements to be considered PCI DSS compliant and have performed the necessary steps to validate compliance with the PCI DSS. We agree to supply the current status of our PCI DSS compliance program in the form of an official Attestation of Compliance, which can be found at xxxxx://xxx.xxxxxxxxx.xxx/about- us/compliance, and in the event of any change in our status, will comply with applicable notice requirements.

  • System and Data Access Services a. System. Subject to the terms and conditions of this Addendum and solely for the purpose of providing access to Fund Data as set forth herein, State Street hereby agrees to provide the Fund, or certain third parties approved by State Street that serve as the Fund`s investment advisors, investment managers or fund accountants (the "Fund Accountants") or as the Fund`s independent auditors (the "Auditor"), with access to State Street`s Multicurrency HORIZONR Accounting System and the other information systems described in Attachment A (collectively, the "System") on a remote basis solely on the computer hardware, system software and telecommunication links described in Attachment B (the "Designated Configuration") or on any designated substitute or back-up equipment configuration consented to in writing by State Street, such consent not to be unreasonably withheld.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!