User Conduct Guidelines Sample Clauses

User Conduct Guidelines. 3.2.1 You are responsible for your use of this product and related services. Unless permitted by applicable law or with prior written permission from EsonTech, you must not engage in the following activities while using this product and related services: (1) interfering, disrupting, modifying, or affecting the normal operation of this product and related services using unauthorized plugins, systems, or third-party tools, including but not limited to excessively using product systems or network bandwidth resources, causing serious load to the product system, network, server, or application used by other users, and impacting system uptime; (2) engaging in any activity that compromises computer network security in connection with this product and related services, including but not limited to: a. conducting illegal intrusions into other networks, interfering with the normal function of other networks, and stealing network data; b. providing programs or tools specifically designed to engage in activity that compromises computer network security, such as intrusion into networks, interference with normal network function and protective measures, and stealing network data; c. providing technical support, advertising, payment settlement, and other assistance to those who engage in activities that compromise computer network security; d. accessing unauthorized data or servers/accounts; e. entering into public computer networks or other people’s computer systems without permission and deleting, modifying, or adding stored information; f. attempting to investigate, scan, test, or exploit weak points in this product system or network, or other activities that interfere with network security; g. attempting to interfere or disrupt the normal operation of this product system or website, deliberately spreading malicious code or viruses, or engaging in other activities that disrupt normal network information services; h. sending and storing files, scripts, and programs that contain viruses, worms, Trojans, and other harmful computer codes; i. forging TCP/IP packet names or parts of names; (3) copying, imitating, modifying, translating, adapting, lending, selling, transferring licenses, spreading related services over the internet, or reverse engineering, disassembling, compiling, or attempting to discover the source code of this product and related services in any other way; (4) maliciously registering accounts, including but not limited to frequently or massively register...
AutoNDA by SimpleDocs
User Conduct Guidelines. Any time Licensee accesses or uses the Circle Services, Licensee is required to comply with Circle’s user conduct guidelines, as follows: 2.5.1 Licensee agrees that Licensee will access and use the Services and Circle Device for Licensee’s personal, family, or community use only, and not for any business use. 2.5.2 Licensee is not authorized to access or use the Services or the Circle Device: 1. to impersonate any person or entity, or falsify or otherwise misrepresent Licensee’s identity, credentials, affiliations or intentions; 2. to collect, store, or use any information from or about another user other than a Managed User, other than to provide aid to such user, to enable features of the Circle Services such as monitoring internet use, or as otherwise authorized and intended by such user; 3. to “stalk” or harass any other user; 4. to distribute unsolicited commercial or bulk electronic communications (or, “spam”), chain letters or “pyramid” schemes; 5. for political campaigning, recruiting votes or soliciting donations or other support for legislative or other initiatives; 6. to systematically retrieve information or content to create or compile, directly or indirectly, in single or multiple downloads, a collection, compilation, database, directory or the like, whether by manual methods, through the use of bots, crawlers, or spiders, or otherwise; 7. if Licensee is not able to form legally binding contracts (for example, if Licensee is under 18, and does not have the consent of Licensee’s parent or guardian); 8. if Licensee is a person barred from receiving services under the laws of the United States or other applicable jurisdiction; or 9. for any other purposes that are not expressly permitted by this XXXX. 2.5.3 Further, Licensee may not: 1. access, copy, distribute, share, publish, use or store any Circle Content, including any information from or abou t any other user, for purposes that are inconsistent with Circle’s Privacy Policy, or otherwise violate the privacy rights or any other rights of other users or any other third party, including by disclosing, selling, renting, distributing or exposing any Circle Content to a third party, using it for marketing purposes, or otherwise using it for any purposes unrelated to the Circle Services; 2. access, copy, distribute, share, publish, use or store, or prepare derivative works from any Circle Content that belongs to Circle, another user or to a third party, including works covered by any copyrights, t...
User Conduct Guidelines. 5.1 Users may not:

Related to User Conduct Guidelines

  • User Conduct You agree not to use Mobile Banking or the content or information delivered through Mobile Banking in any way that would: (a) infringe any third-party copyright, patent, trademark, trade secret or other proprietary rights or rights of privacy, including any rights in the Software; (b) be fraudulent or involve the sale of counterfeit or stolen items, including, but not limited to, use of Mobile Banking to impersonate another person or entity; (c) violate any law, statute, ordinance or regulation (including, but not limited to, those governing export control, consumer protection, unfair competition, anti-discrimination or false advertising); (d) be false, misleading or inaccurate; (e) create liability for us or our affiliates or service providers, or cause us to lose (in whole or in part) the services of any of our service providers; (f) be defamatory, trade libelous, unlawfully threatening or unlawfully harassing; (g) potentially be perceived as illegal, offensive or objectionable; (h) interfere with or disrupt computer networks connected to Mobile Banking; (i) interfere with or disrupt the use of Mobile Banking by any other user; or (j) use Mobile Banking in such a manner as to gain unauthorized entry or access to the computer systems of others.

  • HIV/AIDS Model Workplace Guidelines Grantee will: a. implement the System Agency’s policies based on the Human Immunodeficiency Virus/Acquired Immunodeficiency Syndrome (HIV/AIDS), AIDS Model Workplace Guidelines for Businesses at xxxx://xxx.xxxx.xxxxx.xx.xx/hivstd/policy/policies.shtm, State Agencies and State Grantees Policy No. 090.021. b. educate employees and clients concerning HIV and its related conditions, including AIDS, in accordance with the Texas. Health & Safety Code §§ 85.112-114.

  • Policies, Guidelines, Directives and Standards Either the Funder or the Ministry will give the HSP Notice of any amendments to the manuals, guidelines or policies identified in Schedule C. An amendment will be effective in accordance with the terms of the amendment. By signing a copy of this Agreement the HSP acknowledges that it has a copy of the documents identified in Schedule C.

  • Applicable Guidelines The Sentencing Guidelines to be considered in this case are those in effect at the time of sentencing. The following statements regarding the calculation of the Sentencing Guidelines are based on the Guidelines Manual currently in effect, namely the November 2011 Guidelines Manual.

  • General Guidelines Conduct yourself in a responsible manner at all times in the laboratory.

  • Hot Weather Guidelines For the purposes of site based discussions regarding the need to plan and perform work during expected periods of hot weather, the following issues shall be considered in conjunction with proper consideration of Occupational Health and Safety issues.

  • Business Conduct Merger Sub was formed on December 3, 2020. Since its inception, Merger Sub has not engaged in any activity, other than such actions in connection with (a) its organization and (b) the preparation, negotiation and execution of this Agreement and the Transactions. Merger Sub has no operations, has not generated any revenues and has no liabilities other than those incurred in connection with the foregoing and in association with the Merger as provided in this Agreement.

  • Ordering Guidelines and Processes 1.13.1 For information regarding Ordering Guidelines and Processes for various Network Elements, Combinations and Other Services, PLI should refer to the “Guides” section of the BellSouth Interconnection Web site, which is incorporated herein by reference, as amended from time to time. The Web site address is: http//xxx.xxxxxxxxxxxxxxx.xxxxxxxxx.xxx/. 1.13.2 Additional information may also be found in the individual CLEC Information Packages, which are incorporated herein by reference, as amended from time to time, located at the “CLEC UNE Products” Web site address: xxxx://xxx.xxxxxxxxxxxxxxx.xxxxxxxxx.xxx/guides/html/unes.html. 1.13.3 The provisioning of Network Elements, Combinations and Other Services to PLI’s Collocation Space will require cross-connections within the central office to connect the Network Element, Combinations or Other Services to the demarcation point associated with PLI’s Collocation Space. These cross-connects are separate components that are not considered a part of the Network Element, Combinations or Other Services and, thus, have a separate charge pursuant to this Agreement.

  • Business Conducted Borrower shall continue in the business currently conducted by it using its best efforts to maintain its customers and goodwill. Borrower shall not engage, directly or indirectly, in any line of business substantially different from the business conducted by it immediately before the Closing Date, or engage in business or lines of business which are not reasonably related thereto.

  • Guidelines The Office of State Procurement adheres to all guidelines set forth by the State and Federal Government concerning The Americans with Disabilities Act (ADA) as well as all mandated fire codes.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!