Xxxxx and Fraud Sample Clauses

Xxxxx and Fraud. Customer will not: (a) use Products or Services for fraudulent, unlawful or destructive purposes, including, but not limited to, unauthorized or attempted access, alteration, abuse or destruction of information; or (b) use Products or Services in such a manner that causes interference with Sprint’s or another’s use of the Sprint network. Customer will promptly cooperate with Sprint to prevent unauthorized access by third parties of the Products and Services via Customer’s facilities.
AutoNDA by SimpleDocs
Xxxxx and Fraud. End User will not use Products or Services: (1) for fraudulent, unlawful or destructive purposes, including, but not limited to, unauthorized or attempted unauthorized access to, or alteration, abuse, or destruction of information; or (2) in any manner that causes interference with Sprint’s or another’s use of the Sprint network. End User will cooperate promptly with Sprint to prevent third parties from gaining unauthorized access to the Products and Services via End User’s facilities.
Xxxxx and Fraud. Customer will not use Services: (1) for fraudulent, abusive, unlawful, or destructive purposes, including unauthorized or attempted unauthorized access to, or alteration, abuse, or destruction of, Bluepeak or any third-party information; (2) in any manner that causes interference with Bluepeak’s or another’s use of the Bluepeak- provided network; or (3) for any other purpose not specifically authorized by this Agreement. Customer will cooperate promptly with Bluepeak to prevent third parties from gaining unauthorized access to the Services via Customer’s facilities.
Xxxxx and Fraud. Customer will not use Products or Services: (1) for fraudulent, unlawful or destructive purposes, including, but not limited to, unauthorized or attempted unauthorized access to, or alteration, abuse or destruction of, information; or (2) in any manner that causes interference with TruMobility’s or another’s use of the TruMobility network. Customer will cooperate promptly with TruMobility to prevent third parties from gaining unauthorized access to the Products and Services via Customer’s facilities.
Xxxxx and Fraud. Customer will not use Services: (1) for fraudulent, abusive, unlawful or destructive purposes, including unauthorized or attempted unauthorized access to, or alteration, abuse or destruction of, information; or (2) in any manner that causes interference with Vast Broadband’s or another’s use of the Vast Broadband- provided network. Customer will cooperate promptly with Vast Broadband to prevent third parties from gaining unauthorized access to the Services via Customer’s facilities. Reseller. Customer represents that it is not a reseller of any telecommunication services provided under this Agreement as described in the Telecommunications Act of 1996, as amended, or applicable state law and acknowledges it is not entitled to any reseller discounts under any laws.

Related to Xxxxx and Fraud

  • Xxxxxx and Recall An employee in receipt of notice of layoff pursuant to 9.08(A)(a)(ii) may:

  • Xxxxxx and X Xxxxxxxxx. Key-agreement in ad-hoc networks. In Nordsec’99, 1999. [4] X. Xxxxxxxx, X. Xxxxxxx, and X. Xxxxxx. Authenticated Group Key Agreement and Friends. In 5th ACM Conference on Computer and Communications Security, pages 17–26. ACM, November 1998. [5] X. Xxxxxx and X. Xxxxx. Communication complexity of group key distribution. In 5th ACM Conference on Computer and Communications Security, November 1998. [6] X. Xxxxxxx and X. Xxxxxxx. Random oracles are practical: A paradigm for designing efficient protocols. In 1st ACM Conference on Computer and Communications Security, 1993. [7] Xxx Xxxxx. The Decision Xxxxxx-Xxxxxxx problem. In Third Algorithmic Number Theory Symposium, number 1423 in Lecture Notes in Computer Science, pages 48–63. Springer-Verlag, Berlin Germany, 1998. [8] Xxx Xxxxx and Xxxxx Xxxxxxxxxx. Applications of multilinear forms to cryptography. To appear in Contemporary Mathematics, American Mathematical Society. [9] Xxxxxxxx Xxxxxxx, Xxxxxxx Xxxxxxxxx, and Xxxxx Xxxxxxxxxxx. Provably authenticated group Xxxxxx-Xxxxxxx key exchange — the dynamic case. In Xxxxx Xxxx, editor, Advances in Cryptology – ASIACRYPT ’2001, Lecture Notes in Computer Science, Gold Coast, Australia, 2001. International Association for Cryptologic Research, Springer-Verlag, Berlin Germany. [10] Xxxxxxxx Xxxxxxx, Xxxxxxx Xxxxxxxxx, Xxxxx Xxxxxxxxxxx, and Xxxx-Xxxxxxx Xxxxxxxxxx. Provably authenticated group xxxxxx-xxxxxxx key exchange. In Xxxxxxxxxx Xxxxxxxx, editor, 8th ACM Conference on Computer and Communications Security, Philadelphia, PA, USA, November 2001. ACM Press. [11] Xxxx Xxxxxxxxx and Xxx Xxxxxxx. A secure and efficient conference key distribution system. In X. Xx Xxxxxx, editor, Advances in Cryptology – EUROCRYPT ’94, number 950 in Lecture Notes in Computer Science. International Association for Cryptologic Research, Springer-Verlag, Berlin Germany, 1995. final version of proceedings. [12] X. Xxxxxxx, X. Xxxxxxxxx, X. Xxx, X. Xxxxxx, and X. Xxxxxxxx. The VersaKey framework: Versatile group key management. IEEE Journal on Selected Areas in Communications, 17(9), September 1999. [13] Xxxxx Xxxxx. Zero-knowledge undeniable signatures. In X.X. Xxxxxxx, editor, Advances in Cryptology – EUROCRYPT ’90, number 473 in Lecture Notes in Computer Science, pages 458–464. Springer-Verlag, Berlin Germany, May 1991.

  • Xxxxxxx and X Xxxx¨cker. A detailed account of Xxxxx Xxxxxx’ version of the standard model. IV. Rev. Math. Phys. 8 (1996) 205–228.

  • PREVENTION OF FRAUD AND XXXXXXX The Supplier represents and warrants that neither it, nor to the best of its knowledge any Supplier Personnel, have at any time prior to the Commencement Date: committed a Prohibited Act or been formally notified that it is subject to an investigation or prosecution which relates to an alleged Prohibited Act; and/or been listed by any government department or agency as being debarred, suspended, proposed for suspension or debarment, or otherwise ineligible for participation in government procurement programmes or contracts on the grounds of a Prohibited Act. The Supplier shall not during the Term: commit a Prohibited Act; and/or do or suffer anything to be done which would cause the Customer or any of the Customer’s employees, consultants, contractors, sub-contractors or agents to contravene any of the Relevant Requirements or otherwise incur any liability in relation to the Relevant Requirements. The Supplier shall during the Term: establish, maintain and enforce, and require that its Sub-Contractors establish, maintain and enforce, policies and procedures which are adequate to ensure compliance with the Relevant Requirements and prevent the occurrence of a Prohibited Act; keep appropriate records of its compliance with its obligations under Clause 14.3.1 and make such records available to the Customer on request; if so required by the Customer, within twenty (20) Working Days of the Commencement Date, and annually thereafter, certify to the Customer in writing that the Supplier and all persons associated with it or its Sub-Contractors or other persons who are supplying the Ordered Panel Services in connection with this Legal Services Contract are compliant with the Relevant Requirements. The Supplier shall provide such supporting evidence of compliance as the Customer may reasonably request; and have, maintain and where appropriate enforce an anti-bribery policy (which shall be disclosed to the Customer on request) to prevent it and any Supplier Personnel or any person acting on the Supplier's behalf from committing a Prohibited Act. The Supplier shall immediately notify the Customer in writing if it becomes aware of any breach of Clause 14.1, or has reason to believe that it has or any of the Supplier Personnel have: been subject to an investigation or prosecution which relates to an alleged Prohibited Act; been listed by any government department or agency as being debarred, suspended, proposed for suspension or debarment, or otherwise ineligible for participation in government procurement programmes or contracts on the grounds of a Prohibited Act; and/or received a request or demand for any undue financial or other advantage of any kind in connection with the performance of this Legal Services Contract or otherwise suspects that any person or Party directly or indirectly connected with this Legal Services Contract has committed or attempted to commit a Prohibited Act. If the Supplier makes a notification to the Customer pursuant to Clause 14.4, the Supplier shall respond promptly to the Customer's enquiries, co-operate with any investigation, and allow the Customer to audit any books, records and/or any other relevant documentation. If the Supplier breaches Clause 14.3, the Customer may by notice: require the Supplier to remove from performance of this Legal Services Contract any Supplier Personnel whose acts or omissions have caused the Supplier’s breach; or immediately terminate this Legal Services Contract. Any notice served by the Customer under Clause 14.4 shall specify the nature of the Prohibited Act, the identity of the Party who the Customer believes has committed the Prohibited Act and the action that the Customer has elected to take (including, where relevant, the date on which this Legal Services Contract shall terminate).

  • Xxxxxxxx and X X. Xxxxx. 1930. Checklist of the fishes and fishlike vertebrates of North and Middle America north of the northern boundary of Venezuela and Columbia. Rept. U.S. Fish Comm. 1928(2):1-670. Jordan, D.S. and X.X. Xxxxxxxx. 1896. The fishes of North and Middle America. Part 1. U.S. Natl. Mus. Bul. 47:1-1240. Xxxxx, S. and X. Xxxxxx. 2005..Hydrogeologic setting of the snake valley hydrologic basin, Xxxxxxx County, Utah, and White Pine and Lincoln Counties, Nevada – implications for possible effects of proposed water xxxxx. Report of investigation 254, Utah Geological Survey. Xxxxxxx, M.C. 1982. Status report of three Bonneville basin endemic fishes. Prepared for the U.S. Fish and Wildlife Service. 27 pp. May, B. E. and X. X. Xxxxx. 1981. Comparative effects of sheep and cattle grazing on the Xxxxx Creek drainage. Transactions of the Bonneville Chapter American Fisheries Society. 1981:48-62. Xxxxx, X.X. 1985. Predation and species replacement in American Southwestern fishes: a case study. Southwestern Naturalist. 30:173-187. Xxxxxx, X. X. and X. X. Xxxxxx. 1985. Two New Intergeneric Cyprinid Hybrids from the Bonneville Basin, Utah. Copeia, 1985(2):509-515. Xxxxxx, X.X. 1972. Threatened freshwater fishes of the United States. Trans. Amer, Fish. Soc. 101(2):239-252.

  • Fraud, Xxxxx and Abuse If you have concerns about being billed for services you never received, or that your insurance information has been stolen or used by someone else, you may report potential health care fraud, waste or abuse to our Special Investigations Unit by using our confidential anti-fraud hotline at 0-000-000-0000 or by email at XXX@xxxxxx.xxx. You may also send an anonymous letter to us at: Blue Cross & Blue Shield of Rhode Island Special Investigations Unit 000 Xxxxxxxx Xxxxxx Providence RI, 02903

  • Xxxxx and X Xxxxxxxxxx. Non-Commutative Geometry, Non- Associative Geometry and the Standard Model of Particle Physics, 1401.5083.

  • Xxxxxxxxx and X Xxxxxxx. A

  • Xxxxxx, P A., special counsel for IMC, in IMC's capacity as both Seller and Servicer under the Sale and Servicing Agreement, and/or Xxxxx & Xxxxxx LLP shall have furnished to the Underwriters their written opinion or opinions, addressed to the Underwriters and the Depositor and dated the Closing Date, in form and substance satisfactory to the Underwriters, to the effect that:

  • Xxxxx, P E. , known to me to be a person and officer whose name is subscribed to the foregoing instrument, and acknowledged to me that he/she executed same for and as the act of the City of Arlington, Texas, a Texas municipal corporation, and as Director of Public Works and Transportation thereof, and for the purposes and consideration therein expressed. GIVEN UNDER MY HAND AND SEAL OF OFFICE this the day of , 20 . Notary Public In and For The State of Texas Notary's Printed Name

Time is Money Join Law Insider Premium to draft better contracts faster.