Use Restricted to Lawful Purpose Sample Clauses

Use Restricted to Lawful Purpose. Merchant agrees to use the Services solely for lawful purposes. Merchant agrees that it will not transmit any material through FORTE’s systems in violation of any applicable Law or Rule. FORTE reserves the right to use all means necessary to monitor Merchant’s actions in the event of a real or perceived security breach. FORTE reserves the right to terminate Services to Merchant should FORTE deem Merchant’s use of the Services are for an unlawful purpose. In the event of such an occurrence, FORTE shall make reasonable efforts to notify Merchant prior to taking any such action, but is not required to do so.
AutoNDA by SimpleDocs
Use Restricted to Lawful Purpose. Xxxxxxxx agrees to use the Services solely for lawful purposes. Xxxxxxxx agrees that it will not transmit any material through Xxxxx'x Payments Gateway in violation of any Federal, State or foreign law, including but not limited to, copyrighted material, material legally judged to be threatening, obscene, or material protected by trade secret laws. Forte reserves the right to use all means necessary to monitor Xxxxxxxx’s actions in the event of a real or perceived security breach.
Use Restricted to Lawful Purpose. Member agrees to use the Services solely for lawful purposes within the United States of America. Member agrees that it will submit transactions through Xxxxx’s Services in violation of any Rules, Regulations, and Laws. Relay reserves the right to use all means necessary to monitor Member’s actions in the event of a real or perceived security breach.
Use Restricted to Lawful Purpose. Xxxxxxxx agrees to use the Services solely for lawful purposes. Xxxxxxxx agrees that it will not transmit any material through FORTE’s systems in violation of any applicable Law or Rule. FORTE reserves the right to use all means necessary to monitor Xxxxxxxx’s actions in the event of a real or perceived security breach. FORTE reserves the right to terminate Services to Merchant should FORTE deem Merchant’s use of the Services are for an unlawful purpose. In the event of such an occurrence, FORTE shall make reasonable efforts to notify Merchant prior to taking any such action, but is not required to do so.

Related to Use Restricted to Lawful Purpose

  • Use Restriction (a) If a natural disaster, incident or any other emergency situation occurs or is likely to occur, SORACOM may restrict the use of the SORACOM Air Global Service by the Subscriber in order to give priority to communications whose content are necessary for the prevention of or relief from calamities, for the securing of transportation, communications or electric power supply, the maintenance of public order or any other public interest.

  • Use Restrictions (a) Company will not do or attempt to do, and Company will not permit any other person or entity to do or attempt to do, any of the following, directly or indirectly:

  • Service Use Restrictions In connection with your use of the Services, you sha l not in any way transmit, publish, post, upload, disseminate, or distribute any (i) corrupted files, viruses, trojan horses, worms, spyware, time bombs, cancelbots, or any other similar software or programs; and/or ( i) defamatory, infringing, vulgar, sexua ly explicit, obscene, indecent, o fensive, inappropriate, profane, or unlawful content or any hate speech (i.e., racist/discriminatory speech). You sha l also not (i) impair anyone else from using the Services or interfere with the proper functioning of the Services; ( i) access the Services (including by use of robots, scripts, spiders or other automated means) other than via the means provided by us; ( i) misrepresent your identity in any way; (iv) overburden the Services in any way; and/or (v) violate any law, rule or regulation in connection with your use of or access to the Services.

  • Specific Restrictions on Use of Licensed Materials Unauthorized Use. Licensee shall not knowingly permit anyone other than Authorized Users to use the Licensed Materials.

  • ACCEPTABLE USE RESTRICTIONS You must:

  • Offshore Performance of Work Prohibited Due to security and identity protection concerns, all services under this Agreement shall be performed within the borders of the United States. All storage and processing of information shall be performed within the borders of the United States. This provision applies to work performed by the Subrecipient’s contractors and subcontractors at all tiers.

  • License Restrictions You shall not:

  • Grant Remedies Termination and Prohibited Activities 18 9.1 Remedies 18 9.2 Termination for Convenience 19 9.3 Termination for Cause 19

  • Usage Restrictions You will not (a) make any Service or Content available to, or use any Service or Content for the benefit of, anyone other than You or Users, (b) sell, resell, license, sublicense, distribute, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Service or Content in a way that circumvents a contractual usage limit, (h) copy a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Your own intranets or otherwise for Your own internal business purposes or as permitted in the Documentation, (k) access any Service or Content in order to build a competitive product or service, or (l) reverse engineer any Service (to the extent such restriction is permitted by law).

  • Duration of Agreement and Protected Data Upon Termination or Expiration The Master Agreement commences on the date of signature. • Upon expiration of the Master Agreement without renewal, or upon termination of the Master Agreement prior to its expiration, Vendor will securely delete or otherwise destroy any and all Protected Data remaining in the possession of Vendor or any of its subcontractors or other authorized persons or entities to whom it has disclosed Protected Data. If requested by the District, Vendor will assist the District in exporting all Protected Data previously received back to the District for its own use, prior to deletion, in such formats as may be requested by the District. • In the event the Master Agreement is assigned to a successor Vendor (to the extent authorized by the Master Agreement), the Vendor will cooperate with the District as necessary to transition Protected Data to the successor Vendor prior to deletion. • Neither Vendor nor any of its subcontractors or other authorized persons or entities to whom it has disclosed Protected Data will retain any Protected Data, copies, summaries or extracts of the Protected Data, or any de-identified Protected Data, on any storage medium whatsoever. Upon request, Vendor and/or its subcontractors or other authorized persons or entities to whom it has disclosed Protected Data, as applicable, will provide the District with a certification from an appropriate officer that these requirements have been satisfied in full. Challenging Accuracy of Protected Data: Parents or eligible students can challenge the accuracy of any Protected Data provided by the District to Vendor, by contacting the District regarding procedures for requesting amendment of education records under the Family Educational Rights and Privacy Act (FERPA). Teachers or principals may request to challenge the accuracy of APPR data provided to Vendor by following the appeal process in the District’s applicable APPR Plan. Data Storage and Security Protections: Any Protected Data that Vendor receives will be stored on systems maintained by Vendor, or by a subcontractor under the direct control of Vendor, in a secure data center facility located within the United States. The measures that Vendor (and, if applicable, its subcontractors) will take to protect Protected Data include adoption of technologies, safeguards and practices that align with the NIST Cybersecurity Framework, and safeguards associated with industry standards and best practices including, but not limited to, disk encryption, file encryption, firewalls, and password protection.

Time is Money Join Law Insider Premium to draft better contracts faster.