Violations of Acceptable Use Policy Sample Clauses

Violations of Acceptable Use Policy. We reserve the right (but have no obligation) to review, refuse and/or remove any User Content in our sole discretion, and to investigate and/or take appropriate action against you in our sole discretion if you violate the Acceptable Use Policy or any other provision of these Terms or otherwise create liability for us or any other person. Such action may include removing or modifying your User Content, terminating your access to the Service in accordance with these Terms, and/or reporting you to law enforcement authorities.
AutoNDA by SimpleDocs
Violations of Acceptable Use Policy. You are responsible for your communications via, and your use of, the service. The following constitute violations of the Wi-Power High-Speed Internet Service Acceptable Use Policy and are expressly prohibited:

Related to Violations of Acceptable Use Policy

  • Actions of Custodian Based on Proper Instructions and Special Instructions So long as and to the extent that the Custodian acts in accordance with (a) Proper Instructions or Special Instructions, as the case may be, and (b) the terms of this Agreement, the Custodian shall not be responsible for the title, validity or genuineness of any property, or evidence of title thereof, received by it or delivered by it pursuant to this Agreement.

  • Acceptable Use Policy Agreement I understand that I must use school IT systems in a responsible way, to ensure that there is no risk to my safety or to the safety and security of the IT systems and other users. • I understand that the school will monitor my use of the IT systems, email and other digital communications. • I will treat my username and password like my toothbrush – I will not share it, nor will I try to use any other person’s username and password. • I will be aware of “stranger danger”, when I am communicating on-line. • I will not disclose or share personal information about myself or others when on-line. • If I arrange to meet people off-line that I have communicated with on-line, I will do so in a public place and take an adult with me. • I will immediately report any unpleasant or inappropriate material or messages or anything that makes me feel uncomfortable when I see it on-line. • I understand that the school IT systems are primarily intended for educational use and that I will not use the systems for personal or recreational use unless I have permission to do so. • I will not try (unless I have permission) to make large downloads or uploads that might take up internet capacity and prevent other users from being able to carry out their work. • I will not use the school IT systems for on-line gaming, on-line gambling, internet shopping, file sharing, or video broadcasting (e.g. YouTube), unless I have permission of a member of staff to do so. • I will respect others’ work and property and will not access, copy, remove or otherwise alter any other user’s files, without the owner’s knowledge and permission. • I will be polite and responsible when I communicate with others, I will not use strong, aggressive or inappropriate language and I appreciate that others may have different opinions. • I will not take or distribute images of anyone without their permission. • I will only use my personal hand held / external devices (mobile phones / USB devices etc) in school if I have permission. I understand that, if I do use my own devices in school, I will follow the rules set out in this agreement, in the same way as if I was using school equipment. • I understand the risks and will not try to upload, download or access any materials which are illegal or inappropriate or may cause harm or distress to others, nor will I try to use any programmes or software that might allow me to bypass the filtering / security systems in place to prevent access to such materials.

  • Acceptable Use Policy With respect to the Cloud Service, Customer will not: (a) disassemble, decompile, reverse-engineer, copy, translate or make derivative works, (b) transmit any content or data that is unlawful or infringes any intellectual property rights, or (c) circumvent or endanger its operation or security.

  • Proper Instructions and Special Instructions “Proper Instructions,” which may also be standing instructions, as such term is used throughout this Agreement shall mean instructions received by the Custodian from a Fund, a Fund’s duly authorized investment manager or investment adviser, or a person or entity duly authorized by either of them. Such instructions may be in writing signed by the authorized person or persons or may be in a tested communication or in a communication utilizing access codes effected between electro-mechanical or electronic devices or may be by such other means and utilizing such intermediary systems and utilities as may be agreed from time to time by the Custodian and the person(s) or entity giving such instruction, provided that the Fund has followed any security procedures agreed to from time to time by the applicable Fund and the Custodian including, but not limited to, the security procedures selected by the Fund via the form of Funds Transfer Addendum hereto, the terms of which are hereby agreed to. Oral instructions will be considered Proper Instructions if the Custodian reasonably believes them to have been given by a person authorized to provide such instructions with respect to the transaction involved; the Fund shall cause all oral instructions to be confirmed in writing. For purposes of this Section, Proper Instructions shall include instructions received by the Custodian pursuant to any multi-party agreement which requires a segregated asset account in accordance with Section 2.9 hereof.

  • Violence Policies and Procedures The Employer agrees to have in place explicit policies and procedures to deal with violence. The policy will address the prevention of violence, the management of violent situations, provision of legal counsel and support to employees who have faced violence. The policies and procedures shall be part of the employee's health and safety policy and written copies shall be provided to each employee. Prior to implementing any changes to these policies, the employer agrees to consult with the Association.

  • ACCEPTABLE USE RESTRICTIONS You must: (a) not use the App or any Service in any unlawful manner, for any unlawful purpose, or in any manner inconsistent with this XXXX, or act fraudulently or maliciously, for example, by hacking into or inserting malicious code, including viruses, or harmful data, into the App, any Service or any operating system; (b) not infringe our intellectual property rights or those of any third party in relation to your use of the App or any Service(to the extent that such use is not licensed by this XXXX); (c) not transmit any material that is defamatory, offensive or otherwise objectionable in relation to your use of the App or any Service; (d) not use the App or any Service in a way that could damage, disable, overburden, impair or compromise our systems or security or interfere with other users; and (e) not collect or harvest any information or data from any Service or our systems or attempt to decipher any transmissions to or from the servers running any Service.

  • Competitive Supplier’s Standard Credit Policy The Competitive Supplier will not require a credit review for any consumer participating in the Program, nor does Competitive Supplier require any consumer to post any security deposit as a condition for participation in the Program. The Competitive Supplier may terminate service to a Participating Consumer and return such consumer to Basic Service in the event that the consumer fails to pay to Competitive Supplier amounts past-due greater than sixty (60) days.

  • Obligations of Covered Entity (1) Covered Entity shall notify Business Associate of any limitations in its notice of privacy practices of Covered Entity, in accordance with 45 C.F.R. § 164.520, or to the extent that such limitation may affect Business Associate’s use or disclosure of PHI. (2) Covered Entity shall notify Business Associate of any changes in, or revocation of, permission by Individual(s) to use or disclose PHI, to the extent that such changes may affect Business Associate’s use or disclosure of PHI. (3) Covered Entity shall notify Business Associate of any restriction to the use or disclosure of PHI that Covered Entity has agreed to in accordance with 45 C.F.R. § 164.522, to the extent that such restriction may affect Business Associate’s use or disclosure of PHI.

  • Customer Instructions The documentation shipped with the returned defective Boeing Product may include specific technical instructions for additional work to be performed on the Boeing Product. The absence of such instructions will evidence Customer's authorization for Boeing to perform all necessary Corrections and work required to return the Boeing Product to a serviceable condition.

  • No Action Except Under Specified Documents or Instructions The Owner Trustee shall not manage, control, use, sell, dispose of or otherwise deal with any part of the Trust Estate except (i) in accordance with the powers granted to and the authority conferred upon the Owner Trustee pursuant to this Agreement, (ii) in accordance with the Transaction Documents and (iii) in accordance with any document or instruction delivered to the Owner Trustee pursuant to Section 6.3.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!