Abusing the server Sample Clauses

Abusing the server. If Nucleus receives reports about any abuses regarding the server of the client, Nucleus is entitled to block the access of the server to the internet at once and without prior warning, if there are serious indications that the report is founded. An attempt will first be made contact the client before proceeding with this action, however if this is not done this cannot result in suspending this step to be taken in any way whatsoever. Examples of abuse include: • Sending spam • Carrying out attacks on other systems (both within and outside the Nucleus network) • Hosting phishing sites • Hosting copyright material without permission of the entitled party/parties. • Hosting child pornography • Using the server in illegal actions • Hosting malicious code • … The internet connection will be suspended until the client takes action to stop the challenged actions. When the server of the client is under fire of a network attack, Nucleus will also reserve the right to block the traffic from and to the IP’s of the client on its border routers. However, this will only be done in special cases if the stability of the Nucleus network is at risk and/or if other clients are inconvenienced. All costs caused by abusing the server will be recovered from the client.

Related to Abusing the server

  • Access to the Service Subject to Subscriber’s compliance with the terms of this Agreement, Inriver hereby grants to Subscriber the right to access and use the Service and the Documentation for the internal business purposes for such Business Units as specified in an Order Form on a limited, revocable, non-exclusive, non-transferable basis in accordance with the scope identified in an Order Form. Inriver will provide Subscriber with a primary administrator Account for managing and granting access to its Authorized Users and Subscriber is responsible for activating them. Subscriber hereby instructs Inriver to grant the Subscriber’s implementing partner access to Subscriber’s environment for the Service. If an implementing partner no longer shall have access to the Service, Subscriber shall notify Inriver of this and Inriver will remove such access.

  • Access to the Services ID’s for access to Vendor Core Research and Analyst Inquiry may not be shared. Access to the Services is restricted to the number of named individuals (each a “Licensed User”) as identified in the Customer Purchase Order.

  • Provision of the Service Okta provides the Service to Customer under the Agreement. In connection with the Service, the parties anticipate that Okta may Process Customer Data that contains Personal Data relating to Data Subjects.

  • Use of the Service 11.1 When using the Service you must comply with: (a) our CRA, including clause 4 of the General Terms, and this clause 11; and (b) any rules, including any acceptable use conditions, imposed by any third party whose content or services you access using the Service or whose Network on which your data transmits. 11.2 Any use of the Service at the Premises is your responsibility. The terms of our CRA apply to you and also to anyone else who uses the Service (regardless of whether you give them permission to do so or not). 11.3 You must ensure that any software you use in relation to the Service is properly licensed. 11.4 The use of a Local Area Network (LAN) for personal use is permitted, however the set-up and configuration of a LAN connected to the modem is not supported by customer service. 11.5 All IP addresses provided by us for your use remain our property. Most Services include a dynamic IP address. A new IP address is usually allocated whenever the computer and modem are rebooted. The IP address remains until the next time the computer and modem are switched off. Where provided, you may configure your computer or modem to connect using a static IP address. 11.6 We may at any time adjust aspects of the Service for security or Network management reasons, including, without limitation: (a) deleting transitory data that has been stored on our servers for longer than 90 days; (b) deleting stored email messages that are older than 90 days; (c) rejecting any incoming email messages and attachments that exceed 30 Megabytes (including encapsulation); (d) delivering access and content via proxy servers; (e) limiting the number of addresses to whom an outgoing email can be sent; (f) refusing to accept incoming email messages to mailboxes that have exceeded the email storage limit; (g) managing the Network to prioritise certain types of Internet traffic over others; and (h) blocking or filtering specific Internet ports. 11.7 You are responsible for providing any security or privacy measures for your computer networks and any data stored on those networks or accessed through the Service. We will not be liable to you in respect of any loss, damage, costs or expenses incurred by you in connection with your failure to provide that security. 11.8 You may request additional users on the Service in accordance with the Pricing Schedule. 11.9 You must take reasonable steps to ensure that others do not gain unauthorised access to the Service through your account. We recommend that you do not disclose your password to others and that you change your password regularly. 11.10 We may monitor use of the Service to investigate a breach (or suspected breach) of the Acceptable Use Policy or upon the request of an authorised authority. 11.11 Where you provide your own wireless computer connection device, you are responsible for any loss caused by an unauthorised interception of the Service.

  • B1 The Services The Contractor shall supply the Services during the Contract Period in accordance with the Authority’s requirements as set out in the Specification and the provisions of the Contract in consideration of the payment of the Contract Price. The Authority may inspect and examine the manner in which the Contractor supplies the Services at the Premises during normal business hours on reasonable notice.