Violation of Internet Use Policies Sample Clauses

Violation of Internet Use Policies. Bell considers the above practices to constitute abuse of its service. Therefore, Xxxx’x terms and conditions of service prohibit these practices. Engaging in one or more of these practices may result in termination or suspension of the offender’s account and/or access to Xxxx’x services in accordance with the Customer’s agreement with Bell. Nothing contained in this policy shall be construed to limit Xxxx’x actions or remedies in any way with respect to any of the foregoing activities. Bell reserves the right to take any and all additional actions it may deem appropriate with respect to such activities, including without limitation taking action to recover the costs and expenses of identifying offenders and removing them from the Bell service, and levying cancellation charges to cover Xxxx’x costs. In addition, Bell reserves at all times all rights and remedies available to it with respect to such activities at law or in equity. Complaints regarding email, SPAM or Illegal Use or System or Network Security issues, should be sent to xxxxx@xxxx.xx. SCHEDULE B ETHERNET TRANSPORT SERVICE
AutoNDA by SimpleDocs

Related to Violation of Internet Use Policies

  • Definition of Intellectual Property For the purposes of this Agreement, the term “intellectual property” refers to all categories of intellectual property that are the subject of Articles 6.6 (Trademarks) to 6.11 (Undisclosed Information / Measures Related to Certain Regulated Products).

  • Protection of Intellectual Property Subject to and except as permitted by the Credit Agreement, such Grantor shall use commercially reasonable efforts not to do any act or omit to do any act whereby any of the Intellectual Property that is material to the business of Grantor may lapse, expire, or become abandoned, or unenforceable, except as would not reasonably be expected to have a Material Adverse Effect.

  • ACKNOWLEDGEMENT AND PROTECTION OF INTELLECTUAL PROPERTY RIGHTS 1. Licensee acknowledges that all Intellectual Property Rights in the Licensed Material are the property of the Publisher or duly licensed to the Publisher and that this Licence Agreement does not assign or transfer to the Licensee any right, title or interest therein except for the right to access and use the Licensed Material in accordance with the terms and conditions of this Licence Agreement. 2. For the avoidance of doubt, the Publisher hereby acknowledges that any database rights created by the Licensee or the Institutions as a result of Local Hosting, text mining or data mining of the Licensed Material shall be the property of the Licensee, or the Institution.

  • Protection of Intellectual Property Rights Borrower and each of its Subsidiaries shall: (a) use commercially reasonable efforts to protect, defend and maintain the validity and enforceability of its Intellectual Property that is material to Borrower’s business; (b) promptly advise Collateral Agent in writing of material infringement by a third party of its Intellectual Property; and (c) not allow any Intellectual Property material to Borrower’s business to be abandoned, forfeited or dedicated to the public without Collateral Agent’s prior written consent.

  • Sub-Advisor Compliance Policies and Procedures The Sub-Advisor shall promptly provide the Trust CCO with copies of: (i) the Sub-Advisor’s policies and procedures for compliance by the Sub-Advisor with the Federal Securities Laws (together, the “Sub-Advisor Compliance Procedures”), and (ii) any material changes to the Sub-Advisor Compliance Procedures. The Sub-Advisor shall cooperate fully with the Trust CCO so as to facilitate the Trust CCO’s performance of the Trust CCO’s responsibilities under Rule 38a-1 to review, evaluate and report to the Trust’s Board of Trustees on the operation of the Sub-Advisor Compliance Procedures, and shall promptly report to the Trust CCO any Material Compliance Matter arising under the Sub-Advisor Compliance Procedures involving the Sub-Advisor Assets. The Sub-Advisor shall provide to the Trust CCO: (i) quarterly reports confirming the Sub-Advisor’s compliance with the Sub-Advisor Compliance Procedures in managing the Sub-Advisor Assets, and (ii) certifications that there were no Material Compliance Matters involving the Sub-Advisor that arose under the Sub-Advisor Compliance Procedures that affected the Sub-Advisor Assets. At least annually, the Sub-Advisor shall provide a certification to the Trust CCO to the effect that the Sub-Advisor has in place and has implemented policies and procedures that are reasonably designed to ensure compliance by the Sub-Advisor with the Federal Securities Laws.

  • OBLIGATIONS AND ACTIVITIES OF CONTRACTOR AS BUSINESS ASSOCIATE 1. CONTRACTOR agrees not to use or further disclose PHI COUNTY discloses to CONTRACTOR other than as permitted or required by this Business Associate Contract or as required by law. 2. XXXXXXXXXX agrees to use appropriate safeguards, as provided for in this Business Associate Contract and the Agreement, to prevent use or disclosure of PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY other than as provided for by this Business Associate Contract. 3. XXXXXXXXXX agrees to comply with the HIPAA Security Rule at Subpart C of 45 CFR Part 164 with respect to electronic PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY. 4. CONTRACTOR agrees to mitigate, to the extent practicable, any harmful effect that is known to CONTRACTOR of a Use or Disclosure of PHI by CONTRACTOR in violation of the requirements of this Business Associate Contract. 5. XXXXXXXXXX agrees to report to COUNTY immediately any Use or Disclosure of PHI not provided for by this Business Associate Contract of which CONTRACTOR becomes aware. CONTRACTOR must report Breaches of Unsecured PHI in accordance with Paragraph E below and as required by 45 CFR § 164.410. 6. CONTRACTOR agrees to ensure that any Subcontractors that create, receive, maintain, or transmit PHI on behalf of CONTRACTOR agree to the same restrictions and conditions that apply through this Business Associate Contract to CONTRACTOR with respect to such information. 7. CONTRACTOR agrees to provide access, within fifteen (15) calendar days of receipt of a written request by COUNTY, to PHI in a Designated Record Set, to COUNTY or, as directed by COUNTY, to an Individual in order to meet the requirements under 45 CFR § 164.524. If CONTRACTOR maintains an Electronic Health Record with PHI, and an individual requests a copy of such information in an electronic format, CONTRACTOR shall provide such information in an electronic format. 8. CONTRACTOR agrees to make any amendment(s) to PHI in a Designated Record Set that COUNTY directs or agrees to pursuant to 45 CFR § 164.526 at the request of COUNTY or an Individual, within thirty (30) calendar days of receipt of said request by COUNTY. XXXXXXXXXX agrees to notify COUNTY in writing no later than ten (10) calendar days after said amendment is completed. 9. CONTRACTOR agrees to make internal practices, books, and records, including policies and procedures, relating to the use and disclosure of PHI received from, or created or received by CONTRACTOR on behalf of, COUNTY available to COUNTY and the Secretary in a time and manner as determined by COUNTY or as designated by the Secretary for purposes of the Secretary determining COUNTY’S compliance with the HIPAA Privacy Rule. 10. CONTRACTOR agrees to document any Disclosures of PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, and to make information related to such Disclosures available as would be required for COUNTY to respond to a request by an Individual for an accounting of Disclosures of PHI in accordance with 45 CFR § 164.528. 11. CONTRACTOR agrees to provide COUNTY or an Individual, as directed by COUNTY, in a time and manner to be determined by COUNTY, that information collected in accordance with the Agreement, in order to permit COUNTY to respond to a request by an Individual for an accounting of Disclosures of PHI in accordance with 45 CFR § 164.528. 12. XXXXXXXXXX agrees that to the extent CONTRACTOR carries out COUNTY’s obligation under the HIPAA Privacy and/or Security rules CONTRACTOR will comply with the requirements of 45 CFR Part 164 that apply to COUNTY in the performance of such obligation. 13. If CONTRACTOR receives Social Security data from COUNTY provided to COUNTY by a state agency, upon request by COUNTY, CONTRACTOR shall provide COUNTY with a list of all employees, subcontractors and agents who have access to the Social Security data, including employees, agents, subcontractors and agents of its subcontractors. 14. CONTRACTOR will notify COUNTY if CONTRACTOR is named as a defendant in a criminal proceeding for a violation of HIPAA. COUNTY may terminate the Agreement, if CONTRACTOR is found guilty of a criminal violation in connection with HIPAA. COUNTY may terminate the Agreement, if a finding or stipulation that CONTRACTOR has violated any standard or requirement of the privacy or security provisions of HIPAA, or other security or privacy laws are made in any administrative or civil proceeding in which CONTRACTOR is a party or has been joined. COUNTY will consider the nature and seriousness of the violation in deciding whether or not to terminate the Agreement.

  • Obligations and Activities of Business Associate Business Associate agrees to: a. Not use or disclose Protected Health Information other than as permitted or required by this BAA, the Agreement, or as required by law; b. Use appropriate safeguards, and comply with Subpart C of 45 CFR Part 164 with respect to electronic Protected Health Information, to prevent Use or Disclosure of Protected Health Information other than as provided for by this BAA; c. Report to Covered Entity any Use or Disclosure of Protected Health Information not provided for by this BAA of which it becomes aware, including breaches of Unsecured Protected Health Information as required at 45 CFR 164.410, and any Security Incident of which it becomes aware; d. In accordance with 45 CFR 164.502(e)(1)(ii) and 164.308(b)(2), if applicable, ensure that any Subcontractors that create, receive, maintain, or transmit Protected Health Information on behalf of the Business Associate agree to the same restrictions, conditions, and requirements that apply to Business Associate with respect to such information; e. Make available Protected Health Information in a Designated Record Set to Covered Entity or to an individual whose Protected Health Information is maintained by Business Associate, or the individual’s designee, and document and retain the documentation required by 45 CFR 164.530(j), as necessary to satisfy Covered Entity’s obligations under 45 CFR 164.524; f. Make any amendment(s) to Protected Health Information in a Designated Record Set as directed or agreed to by the Covered Entity pursuant to 45 CFR 164.526, or take other measures as necessary to satisfy Covered Entity’s obligations under 45 CFR 164.526; g. Maintain and make available the information required to provide an accounting of Disclosures to the Covered Entity as necessary to satisfy Covered Entity’s obligations under 45 CFR 164.528; h. To the extent the Business Associate is to carry out one or more of Covered Entity's obligation(s) under Subpart E of 45 CFR Part 164, comply with the requirements of Subpart E that apply to the Covered Entity in the performance of such obligation(s); and i. Make its internal practices, books, and records available to the Secretary for purposes of determining Business Associate’s or Covered Entity’s compliance with HIPAA and HIPAA Regulations.

  • Protection and Registration of Intellectual Property Rights (a) Each Co-Borrower shall (i) protect, defend and maintain the validity and enforceability of its Intellectual Property material to Borrower’s business; (ii) promptly advise Bank in writing of material infringements or any other event that could reasonably be expected to materially and adversely affect the value of its Intellectual Property material to Borrower’s business; and (iii) not allow any Intellectual Property material to a Co-Borrower’s business to be abandoned, forfeited or dedicated to the public without Bank’s written consent. (b) If a Co-Borrower (i) obtains any Patent, registered Trademark, registered Copyright, registered mask work, or any pending application for any of the foregoing, whether as owner, licensee or otherwise, or (ii) applies for any Patent or the registration of any Trademark, then such Co-Borrower shall, within the later of (A) fifteen (15) days from the date of such application or (B) on the next Compliance Certificate delivered in accordance with the terms of Section 6.2 hereof, provide written notice thereof to Bank and shall execute such intellectual property security agreements and other documents and take such other actions as Bank may request in its good faith business judgment to perfect and maintain a first priority perfected security interest in favor of Bank in such property. If a Co-Borrower decides to register any Copyrights or mask works in the United States Copyright Office, such Co-Borrower shall: (x) provide Bank with at least fifteen (15) days prior written notice of such Co-Borrower’s intent to register such Copyrights or mask works together with a copy of the application it intends to file with the United States Copyright Office (excluding exhibits thereto); (y) execute an intellectual property security agreement and such other documents and take such other actions as Bank may request in its good faith business judgment to perfect and maintain a first priority perfected security interest in favor of Bank in the Copyrights or mask works intended to be registered with the United States Copyright Office; and (z) record such intellectual property security agreement with the United States Copyright Office contemporaneously with filing the Copyright or mask work application(s) with the United States Copyright Office. Each Co-Borrower shall promptly provide to Bank copies of all applications that it files for Patents or for the registration of Trademarks, Copyrights or mask works, together with evidence of the recording of the intellectual property security agreement required for Bank to perfect and maintain a first priority perfected security interest in such property.

  • Compliance Policies and Procedures To assist the Fund in complying with Rule 38a-1 of the 1940 Act, BBH&Co. represents that it has adopted written policies and procedures reasonably designed to prevent violation of the federal securities laws in fulfilling its obligations under the Agreement and that it has in place a compliance program to monitor its compliance with those policies and procedures. BBH&Co will upon request provide the Fund with information about our compliance program as mutually agreed.

  • Use and Protection of Information Recipient agrees to protect such Information of the Discloser provided to Recipient from whatever source from distribution, disclosure or dissemination to anyone except employees of Recipient with a need to know such Information solely in conjunction with Recipient’s analysis of the Information and for no other purpose except as authorized herein or as otherwise authorized in writing by the Discloser. Recipient will not make any copies of the Information inspected by it.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!