YOUR ACCESS TO THE SERVICE Sample Clauses

YOUR ACCESS TO THE SERVICE. 3.1 To access and/or use the Service, you will be asked to sign up with your first and last name, your email address, your phone number and a password (“Registration Data”). You must provide accurate, complete and up-to-date information required for your user account. 3.2 To make a booking, you will be requested to complete your Registration Data with your payment details and your specific preferences/requests for your booking (“Booking Data”). Such Booking Data are required for the purpose of providing you the Service, including confirming the details of your booking. 3.3 When you use our Service and/or access any of our Platforms, whether or not a booking has been made, we may automatically collect certain information. Please take a look at our Privacy Notice for further information. 3.4 Our Service is provided for your use, subject to the Terms set out herein. You are not allowed to transfer, re-sell, deep-link, use, copy, monitor, display, download, create derivative works or reproduce any content or information, software, products or services available on our Service and Platforms for any commercial or competitive activity or purpose. 3.5 Additionally, by using the Service and/or the Platforms: 3.5.1 you agree not to make any speculative, false, or fraudulent booking; 3.5.2 you represent that you possess the legal authority to create a binding legal obligation; 3.5.3 you will only use this Service to make legitimate bookings; and 3.5.4 you represent that the information supplied by you on our Service is true, accurate, current and complete and you will safeguard your account information and will supervise and be completely responsible for any use of your account by you and anyone other than you. 3.6 If your booking or account shows signs of fraud, abuse or suspicious activity, Work-sphere may cancel any booking and close any associated user accounts. If you have conducted any fraudulent activity, Work-sphere reserves the right to take any necessary legal action, including making police reports on any suspected fraudulent activity machine, resulting in unlawful wrongful gain or wrongful loss. 3.7 The Service is intended to be used by working professionals, and not for students (regardless of their age) and persons who under the legal age of majority ("Unintended Users"). We reserve the limit the use of, suspend or terminate any workbuddy accounts associated with or used by any Unintended Users.
AutoNDA by SimpleDocs
YOUR ACCESS TO THE SERVICE. Xcel Energy will not be liable if for any reason all or any part of the Service is unavailable at any time or for any period. From time to time, we may restrict access to some parts of the Service, or the entire Service, to users, including licensed users. Xcel Energy does not make any representations or guarantees regarding uptime or availability of the Service. You are responsible for: • Making all arrangements necessary for you to have access to the Service. • Ensuring that any of your designated Delegates are aware of these Terms of Use and comply with them. • Ensuring that all persons who access the Service through your internet connection are aware of these Terms of Use and comply with them. We may block, limit or terminate your access to the Service for any reason, including if: (i) you violate these Terms of Use; (ii) you violate any applicable law or regulation relating to your use of the Service; (iii) you engage in any conduct which Xcel Energy, in its sole discretion, believes is offensive, harmful, defamatory or otherwise harmful to Xcel Energy or others; or (iv) you breach any other agreement with Xcel Energy. For purposes of accessing the Service, you are responsible for obtaining Internet and mobile carrier services via the service provider(s) of your choice, for any and all fees imposed by such service provider(s) and any associated communications service provider(s) charges. Standard messaging, data and other fees may be charged by your mobile carrier. Fees and charges will appear on your mobile bill or be deducted from your pre-paid balance. Your carrier may prohibit or restrict certain Service features, and certain Service features may be incompatible with your carrier or mobile device. Contact your carrier with questions regarding these issues. You acknowledge that there are certain security, corruption, transmission error, and access availability risks associated with using open networks such as the Internet and you hereby expressly assume such risks (to the extent the law allows you to do so). You acknowledge that you are using the Service at your convenience, have made your own independent assessment of the adequacy of the Internet as a delivery mechanism for accessing information and initiating instructions and that you are satisfied with that assessment. N You authorize Xcel Energy to contact you at the phone or mobile number provided in your account/s, via phone, text (SMS or MMS), or other similar method using automated dialing ...
YOUR ACCESS TO THE SERVICE. 1. You will need a smartphone compatible with iOS or Android operating systems with ZealiD App downloaded to access the Service. 2. While ZealiD endeavours to ensure that the Service is normally available 24 hours a day, ZealiD shall not be liable if for any reason they are unavailable at any time or for any period. 3. Access to the Service may be suspended temporarily and without notice in the case of system failure, maintenance or repair or for reasons beyond ZealiD’s control. 4. You shall not use the Service if you are under the age of 18. 5. ZealiD strives to accommodate users with disabilities. Please refer to the ZealiD CPS.
YOUR ACCESS TO THE SERVICE. Subject to payment of applicable fees and Your acceptance of and compliance with these Terms of Service, Rejlers grants You a limited, non-exclusive, non-transferable, revocable, limited license to use the Service as specified in these Terms for the time period separately agreed upon between You and Rejlers. Except as specifically allowed pursuant to these Terms of Service, You are not entitled to use, copy, store, modify, transfer, distribute or otherwise make publicly available Your account, Your credentials, the Service, a part thereof or the material contained therein in any way. Your use of the Service is subject to these Terms of Service and any reasonable instructions provided by Rejlers from time to time. You may not:
YOUR ACCESS TO THE SERVICE 

Related to YOUR ACCESS TO THE SERVICE

  • Access to the Services ID’s for access to Vendor Core Research and Analyst Inquiry may not be shared. Access to the Services is restricted to the number of named individuals (each a “Licensed User”) as identified in the Customer Purchase Order.

  • Access to the Site 22.1 The Contractor shall allow the Engineer and any person authorized by the Engineer access to the Site, to any place where work in connection with the Contract is being carried out or is intended to be carried out and to any place where materials or plant are being manufactured / fabricated / assembled for the works.

  • Access to NID 2.7.3.1 NewPhone may access the customer’s premises wiring by any of the following means and NewPhone shall not disturb the existing form of electrical protection and shall maintain the physical integrity of the NID: 2.7.3.1.1 BellSouth shall allow NewPhone to connect its Loops directly to BellSouth’s multi-line residential NID enclosures that have additional space and are not used by BellSouth or any other telecommunications carriers to provide service to the premises; 2.7.3.1.2 Where an adequate length of the customer’s premises wiring is present and environmental conditions permit, either Party may remove the customer premises wiring from the other Party’s NID and connect such wiring to that Party’s own NID; 2.7.3.1.3 Either Party may enter the subscriber access chamber or dual chamber NID enclosures for the purpose of extending a cross-connect or spliced jumper wire from the customer premises wiring through a suitable “punch-out” hole of such NID enclosures; or 2.7.3.1.4 NewPhone may request BellSouth to make other rearrangements to the customer premises wiring terminations or terminal enclosure on a time and materials cost basis. 2.7.3.2 In no case shall either Party remove or disconnect the other Party’s loop facilities from either Party’s NIDs, enclosures, or protectors unless the applicable Commission has expressly permitted the same and the disconnecting Party provides prior notice to the other Party. In such cases, it shall be the responsibility of the Party disconnecting loop facilities to leave undisturbed the existing form of electrical protection and to maintain the physical integrity of the NID. It will be NewPhone’s responsibility to ensure there is no safety hazard, and NewPhone will hold BellSouth harmless for any liability associated with the removal of the BellSouth Loop from the BellSouth NID. Furthermore, it shall be the responsibility of the disconnecting Party, once the other Party’s loop has been disconnected from the NID, to reconnect the disconnected loop to a nationally recognized testing laboratory listed station protector, which has been grounded as per Article 800 of the National Electrical Code. If no spare station protector exists in the NID, the disconnected loop must be appropriately cleared, capped and stored. 2.7.3.3 NewPhone shall not remove or disconnect ground wires from BellSouth’s NIDs, enclosures, or protectors. 2.7.3.4 NewPhone shall not remove or disconnect NID modules, protectors, or terminals from BellSouth’s NID enclosures. 2.7.3.5 Due to the wide variety of NID enclosures and outside plant environments, BellSouth will work with NewPhone to develop specific procedures to establish the most effective means of implementing this section if the procedures set forth herein do not apply to the NID in question.

  • Access to Services Subject to and in accordance with the terms of this Agreement, including any Schedules, Company grants You a non-exclusive, non-sublicensable, nontransferable, non-assignable, revocable license for the term of this Agreement to access and use the Services. Services may only be used by Your Users for internal business purposes only. You agree to comply with the terms and conditions of this Agreement, including any Schedules, and with all applicable Company procedures and policies that further define use of the Services. You acknowledge and agree that the actions of any of Your Users with respect to the Services will be deemed to be actions by You and that any breach by any of Your Users of the terms of this Agreement, including any Schedule, will be deemed to be a breach by You.

  • Access to PHI Business Associate shall provide access to PHI in a Designated Record Set to Covered Entity or as directed by Covered Entity to an Individual to meet the requirements under 45 CFR § 164.524. Business Associate shall provide such access in the time and manner reasonably designated by Covered Entity. Within three (3) business days, Business Associate shall forward to Covered Entity for handling any request for access to PHI that Business Associate directly receives from an Individual.

  • Network Services Local Access Services In lieu of any other rates and discounts, Customer will pay fixed monthly recurring local loop charges ranging from $1,200 to $2,000 for TDM-based DS-3 Network Services Local Access Services at 2 CLLI codes mutually agreed upon by Customer and Company.

  • Changes to the Services We provide Services in a multi- user environment and must therefore reserve the right to modify and discontinue Services. We may modify a Service at any time without degrading its functionality or security features For current subscriptions, we may degrade the functionality of a Service or discontinue a Service only in case of (i) legal requirements; (ii) changes in the Services imposed by Siemens’ subcontractors; (iii) the termination of our relationship with a provider of software and/or services used by us which are material for the provision of such Service; (iv) lack of customer acceptance; and/or (v) security risks. We will notify you of any material degradation of functionality or the discontinuation of a Service and the effective date at least 80 days prior to such change, and you may terminate the modified Service 30 days prior to the change effective date. In the event of such termination or discontinuation of a Service, we will refund any prepaid amounts for the applicable Service on a pro-rata basis for the remaining Subscription Term. We do not maintain prior versions of a Service.

  • Use of the Service 12.1 When using the Service you must comply with: (a) our CRA, including clause 4 of the General Terms, and this clause 12; and (b) any rules, including any acceptable use conditions, imposed by any third party whose content or services you access using the Service or whose Network on which your data transmits. 12.2 Any use of the Service at the Premises is your responsibility. The terms of our CRA apply to you and also to anyone else who uses the Service (regardless of whether you give them permission to do so or not). 12.3 You must ensure that any software you use in relation to the Service is properly licensed. 12.4 The use of a Local Area Network (LAN) for personal use is permitted, however the set-up and configuration of a LAN connected to the modem is not supported by customer service. 12.5 All IP addresses provided by us for your use remain our property. Most Services include a dynamic IP address. A new IP address is usually allocated whenever the computer and modem are rebooted. The IP address remains until the next time the computer and modem are switched off. Where provided, you may configure your computer or modem to connect using a static IP address. 12.6 We may at any time adjust aspects of the Service for security or Network management reasons, including, without limitation: (a) deleting transitory data that has been stored on our servers for longer than 90 days; (b) deleting stored email messages that are older than 90 days; (c) rejecting any incoming email messages and attachments that exceed 30 Megabytes (including encapsulation); (d) delivering access and content via proxy servers; (e) limiting the number of addresses to whom an outgoing email can be sent; (f) refusing to accept incoming email messages to mailboxes that have exceeded the email storage limit; (g) managing the Network to prioritise certain types of Internet traffic over others; and (h) blocking or filtering specific Internet ports. 12.7 You are responsible for providing any security or privacy measures for your computer networks and any data stored on those networks or accessed through the Service. We will not be liable to you in respect of any loss, damage, costs or expenses incurred by you in connection with your failure to provide that security. 12.8 You may request additional users on the Service in accordance with the Pricing Schedule. 12.9 You must take reasonable steps to ensure that others do not gain unauthorised access to the Service through your account. We recommend that you do not disclose your password to others and that you change your password regularly. 12.10 We may monitor use of the Service to investigate a breach (or suspected breach) of the Fair Use Policy or upon the request of an authorised authority. 12.11 Where you provide your own wireless computer connection device, you are responsible for any loss caused by an unauthorised interception of the Service.

  • Data Access Services State Street agrees to make available to the Fund the Data Access Services subject to the terms and conditions of this Addendum and such data access operating standards and procedures as may be issued by State Street from time to time. The Fund shall be able to access the System to (i) originate electronic instructions to State Street in order to (a) effect the transfer or movement of cash or securities held under custody by State Street or (b) transmit accounting or other information (the transactions described in (i)(a) and (i)(b) above are referred to herein as “Client Originated Electronic Financial Instructions”), and (ii) access data for the purpose of reporting and analysis, which shall all be deemed to be Data Access Services for purposes of this Addendum.

  • Use of the Services 1.1 We will make the Oracle services listed in Your order (the “Services”) available to You pursuant to this Agreement and Your order. Except as otherwise stated in this Agreement or Your order, You have the non- exclusive, worldwide, limited right to use the Services during the period defined in Your order, unless earlier terminated in accordance with this Agreement or Your order (the “Services Period”), solely for Your internal business operations. You may allow Your Users (as defined below) to use the Services for this purpose, and You are responsible for their compliance with this Agreement and Your order. 1.2 The Service Specifications describe and govern the Services. During the Services Period, we may update the Services and Service Specifications (with the exception of the Data Processing Agreement as described below) to reflect changes in, among other things, laws, regulations, rules, technology, industry practices, patterns of system use, and availability of Third Party Content (as defined below). Oracle updates to the Services or Service Specifications will not materially reduce the level of performance, functionality, security or availability of the Services during the Services Period of Your order. 1.3 You may not, and may not cause or permit others to: (a) use the Services to harass any person; cause damage or injury to any person or property; publish any material that is false, defamatory, harassing or obscene; violate privacy rights; promote bigotry, racism, hatred or harm; send unsolicited bulk e-mail, junk mail, spam or chain letters; infringe property rights; or otherwise violate applicable laws, ordinances or regulations; (b) perform or disclose any benchmarking or availability testing of the Services; (c) perform or disclose any performance or vulnerability testing of the Services without Oracle’s prior written approval, or perform or disclose network discovery, port and service identification, vulnerability scanning, password cracking or remote access testing of the Services; or (d) use the Services to perform cyber currency or crypto currency mining ((a) through (d) collectively, the “Acceptable Use Policy”). In addition to other rights that we have in this Agreement and Your order, we have the right to take remedial action if the Acceptable Use Policy is violated, and such remedial action may include removing or disabling access to material that violates the policy.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!