User Conduct Guidelines Sample Clauses

User Conduct Guidelines. 3.2.1 You are responsible for your use of this product and related services. Unless permitted by applicable law or with prior written permission from EsonTech, you must not engage in the following activities while using this product and related services:
AutoNDA by SimpleDocs
User Conduct Guidelines. Any time Licensee accesses or uses the Circle Services, Licensee is required to comply with Circle’s user conduct guidelines, as follows:
User Conduct Guidelines. 5.1 Users may not: ▪ access, copy, store or use any aspect of the Website for any purpose other than your own personal use; ▪ access, search, collect information from, or otherwise interact with the Website or whether by manual methods or by use of any software, device, script or robot, or by any other means (automated or otherwise), including by “scraping,” “crawling” or “spidering” the Website, to systematically retrieve information in order to create or compile, directly or indirectly, in single or multiple downloads, a collection, compilation, database, directory or the like (except that crawling is permissible without further authorization if done in accordance with the provisions of the robots .txt file only); ▪ access the Website other than through the currently available, published interfaces that are provided by RH, unless you have been specifically authorized to do so in a separate agreement with RH; ▪ mirror or frame the Website any page, feature, functionality, tool or content of the Website, copy any aspect of the Website, or use or display RH's name or any of RH's other trademarks, logos or proprietary materials, without RH's express written consent; ▪ interfere with, disrupt, damage or compromise the Website or our systems or the access of any User, host or network in any way, including through the use of viruses, cancel bots, Trojan horses, harmful code, flood pings, denial-of-service attacks, backdoors, packet or IP spoofing, forged routing or electronic mail address information or similar methods or technology or by overloading, flooding, spamming, mail-bombing the Website or otherwise imposing an unreasonable or disproportionately large load on the Website; ▪ access, tamper with or use non-public areas of the Website, RH's computer systems, or the technical delivery systems of RH's providers; ▪ probe, scan, or test the vulnerability of any system or network of RH or its providers, or breach or circumvent any security or authentication measures of such system or network; ▪ avoid, bypass, remove, deactivate, impair, descramble, or otherwise circumvent any technological measure implemented by RH or any of RH's providers or any other third party to protect the Website; ▪ forge any TCP/IP packet header or any part of the header information in any e-mail or posting, or in any way use the Website to send altered, deceptive or false source-identifying information; ▪ attempt to decipher, decompile, disassemble or reverse engineer any of the code,...

Related to User Conduct Guidelines

  • User Conduct You agree not to use Mobile Banking or the content or information delivered through Mobile Banking in any way that would: (a) infringe any third-party copyright, patent, trademark, trade secret or other proprietary rights or rights of privacy, including any rights in the Software; (b) be fraudulent or involve the sale of counterfeit or stolen items, including, but not limited to, use of Mobile Banking to impersonate another person or entity; (c) violate any law, statute, ordinance or regulation (including, but not limited to, those governing export control, consumer protection, unfair competition, anti-discrimination or false advertising); (d) be false, misleading or inaccurate; (e) create liability for us or our affiliates or service providers, or cause us to lose (in whole or in part) the services of any of our service providers; (f) be defamatory, trade libelous, unlawfully threatening or unlawfully harassing; (g) potentially be perceived as illegal, offensive or objectionable; (h) interfere with or disrupt computer networks connected to Mobile Banking; (i) interfere with or disrupt the use of Mobile Banking by any other user; or (j) use Mobile Banking in such a manner as to gain unauthorized entry or access to the computer systems of others.

Time is Money Join Law Insider Premium to draft better contracts faster.