Use Policy/Additional Use Restrictions Sample Clauses

Use Policy/Additional Use Restrictions. 18.2.1 The Hosted Voice Service is intended for commercial use only. In order to purchase and retain Hosted Voice Service, Customer must have and retain an Internet connection either through Atlantic Broadband or through Off-Net Services. Hosted Voice Service will not operate if Customer terminates its Internet connection. Atlantic Broadband shall have no liability for any loss or interruption of Hosted Voice Service which results from (i) Customer’s termination of its Internet connection or (ii) the unavailability or service interruption of any Off-Net Services used in connection with the Hosted Voice Service.
AutoNDA by SimpleDocs

Related to Use Policy/Additional Use Restrictions

  • Service Use Restrictions In connection with your use of the Services, you sha l not in any way transmit, publish, post, upload, disseminate, or distribute any (i) corrupted files, viruses, trojan horses, worms, spyware, time bombs, cancelbots, or any other similar software or programs; and/or ( i) defamatory, infringing, vulgar, sexua ly explicit, obscene, indecent, o fensive, inappropriate, profane, or unlawful content or any hate speech (i.e., racist/discriminatory speech). You sha l also not (i) impair anyone else from using the Services or interfere with the proper functioning of the Services; ( i) access the Services (including by use of robots, scripts, spiders or other automated means) other than via the means provided by us; ( i) misrepresent your identity in any way; (iv) overburden the Services in any way; and/or (v) violate any law, rule or regulation in connection with your use of or access to the Services.

  • General Use Restrictions Licensee shall not use, copy, merge, or transfer copies of the SOFTWARE or the Documentation except as may be expressly and specifically authorized in this Agreement. Licensee shall not knowingly take any action that would cause the SOFTWARE to be placed in the public domain.

  • ACCEPTABLE USE RESTRICTIONS You must:

  • Use Restrictions (a) Company will not do or attempt to do, and Company will not permit any other person or entity to do or attempt to do, any of the following, directly or indirectly:

  • Specific Restrictions on Use of Licensed Materials Unauthorized Use. Licensee shall not knowingly permit anyone other than Authorized Users to use the Licensed Materials.

  • Use Restriction (a) If a natural disaster, incident or any other emergency situation occurs or is likely to occur, SORACOM may restrict the use of the SORACOM Air Global Service by the Subscriber in order to give priority to communications whose content are necessary for the prevention of or relief from calamities, for the securing of transportation, communications or electric power supply, the maintenance of public order or any other public interest.

  • Supplemental JBoss Software Conditions Software Access and Software Maintenance for Supplemental JBoss Software is intended and available for Development Purposes only and for up to 25 users for each 16 Core Band Subscription of Red Hat JBoss Middleware Software that you purchased. If you deploy or use the Supplemental JBoss Software for Production Purposes or for more than 25 users, you agree to purchase the appropriate Software Subscriptions for each Unit that you deploy or use. Red Hat’s Open Source Assurance Program applies only to the Red Hat JBoss Middleware Software Subscription that you purchased (such as Red Hat JBoss Enterprise Application Platform in the example above) and does not apply to Supplemental JBoss Software. JBoss xPaaS Subscriptions (defined below) are not considered Supplemental JBoss Software. Each installation and use of JBoss xPaaS Subscriptions Software for either Development Purposes or Production Purposes is a Unit and requires a paid Software Subscription.

  • PLUMBING RESTRICTIONS The following unacceptable plumbing practices are prohibited by State regulations.

  • Acceptable Use Policy Agreement I understand that I must use school IT systems in a responsible way, to ensure that there is no risk to my safety or to the safety and security of the IT systems and other users. For my own personal safety: • I understand that the school will monitor my use of the IT systems, email and other digital communications. • I will treat my username and password like my toothbrush – I will not share it, nor will I try to use any other person’s username and password. • I will be aware of “stranger danger”, when I am communicating on-line. • I will not disclose or share personal information about myself or others when on-line. • If I arrange to meet people off-line that I have communicated with on-line, I will do so in a public place and take an adult with me. • I will immediately report any unpleasant or inappropriate material or messages or anything that makes me feel uncomfortable when I see it on-line. I understand that everyone has equal rights to use technology as a resource and: • I understand that the school IT systems are primarily intended for educational use and that I will not use the systems for personal or recreational use unless I have permission to do so. • I will not try (unless I have permission) to make large downloads or uploads that might take up internet capacity and prevent other users from being able to carry out their work. • I will not use the school IT systems for on-line gaming, on-line gambling, internet shopping, file sharing, or video broadcasting (e.g. YouTube), unless I have permission of a member of staff to do so. I will act as I expect others to act toward me: • I will respect others’ work and property and will not access, copy, remove or otherwise alter any other user’s files, without the owner’s knowledge and permission. • I will be polite and responsible when I communicate with others, I will not use strong, aggressive or inappropriate language and I appreciate that others may have different opinions. • I will not take or distribute images of anyone without their permission. I recognise that the school has a responsibility to maintain the security and integrity of the technology it offers me and to ensure the smooth running of the school: • I will only use my personal hand held / external devices (mobile phones / USB devices etc) in school if I have permission. I understand that, if I do use my own devices in school, I will follow the rules set out in this agreement, in the same way as if I was using school equipment. • I understand the risks and will not try to upload, download or access any materials which are illegal or inappropriate or may cause harm or distress to others, nor will I try to use any programmes or software that might allow me to bypass the filtering / security systems in place to prevent access to such materials.

  • Additional Acceptable Uses of Student Data Contractor is prohibited from using Student Data for any secondary use not described in this agreement except:

Time is Money Join Law Insider Premium to draft better contracts faster.