Acceptable Use Policies Sample Clauses
Acceptable Use Policies a) We may publish Acceptable Use Policies for a Service or Plan.
b) An Acceptable Use Policy will be directed against extreme, abusive, antisocial, illegal and / or unreasonable use of a Service.
c) You must comply with our applicable Acceptable Use Policy.
Acceptable Use Policies. (a) We may publish an Acceptable Use Policy for a Service or Plan.
(b) An Acceptable Use Policy will be directed against abusive, antisocial, illegal and/or grossly unreasonable use of a Service.
(c) You must comply with an applicable Acceptable Use Policy. For additional information regarding our Acceptable Use Policies, please visit ▇▇▇.▇▇▇▇▇▇.▇▇▇.▇▇/▇▇▇▇▇▇▇▇, or alternatively to obtain a copy of the applicable policy, write to our Customer Information and Compliance Officer at PO Box 5133, ▇▇▇▇▇▇▇ ▇▇▇▇, VIC 3150.
Acceptable Use Policies. It is not acceptable to use the Services or Products for any purpose that violates law, including, but not limited to, local, state or federal laws; violates any third party’s intellectual property or personal rights; transmit communications that might be highly offensive or damaging to any recipients or to use the Services or Products in a manner that is unintended, including in a manner that is detrimental to BEK’s other Customers’ ability to use Services or Products or which adversely affects BEK operations. Customer shall not interfere with, violate, circumvent, misuse, distribute or disrupt network users, the Services or Products, including, but not limited to, contrary to any of the following/in any of the following manners:
Acceptable Use Policies. 2.1 Customer agrees to be bound by and to comply with such policies respecting permitted and prohibited use of the Services as may or may not be posted by 8IT on the 8IT Website from time to time (the “Acceptable Use Policy” or “AUP”). For the purposes of this MSA, the term “AUP Website” refers to the website currently located at ▇▇▇▇://▇▇▇.▇▇▇.▇▇/ in the “Resources” section, and any future or successor site(s). Customer agrees to refer to the Policies section of 8IT’s website on a regular basis, and agrees to be bound to any such policies posted within that section of the webpage. Customer understands that those policies may be updated at any time without notice. Without limiting the generality of the foregoing, ▇▇▇▇▇▇▇▇ agrees that it will not use the Services or Equipment (defined as equipment provided by 8IT to facilitate the delivery of Services) to, directly or indirectly:
2.1.1 invade another person’s privacy; unlawfully use, possess, post, transmit or disseminate obscene, profane or pornographic material; post, transmit, distribute or disseminate content that is unlawful, threatening, abusive, libelous, slanderous, defamatory or otherwise offensive or objectionable; unlawfully promote or incite hatred; or post, transmit or disseminate objectionable information, including, without limitation, any transmissions constituting or encouraging conduct that would constitute a criminal offense, give rise to civil liability, or otherwise violate any municipal, provincial, federal or international law, order or regulation;
2.1.2 access any computer, software, data, or any confidential, copyright protected or patent protected material of any other person, without the knowledge and consent of such person, nor use any tools designed to facilitate such access, such as packet “sniffers”;
2.1.3 upload, post, publish, deface, modify, transmit, reproduce, or distribute in any way, information, software or other material obtained through the Services that is protected by copyright, or other proprietary right, or related derivative works, without obtaining permission of the copyright owner or rightsholder;
2.1.4 alter, modify or tamper with the Equipment or Services;
2.1.5 restrict, inhibit or otherwise interfere with the ability of any other person to use or enjoy the Equipment, the Services or the Internet, or create an unusually large burden on our network, including, without limitation: posting or transmitting any information or software that contains a virus, lock...
Acceptable Use Policies. The Customer shall not use the Service(s) (and shall ensure that the Service(s) are not used):
Acceptable Use Policies. The Faculty Partner, his/her research team, and ITaP staff agree to comply with all Purdue University and ITaP/RCAC policies and procedures, including the University’s information technology policies located at: ▇▇▇▇://▇▇▇.▇▇▇▇▇▇.
Acceptable Use Policies a. You must comply with any Acceptable Use Policy (“AUP”) we publish, as amended from time to time.
b. We will not unfairly use an AUP to change the express provisions of a Customer Contract, or of imposing increased charges.
Acceptable Use Policies. Upon recommendation of the Project THOR Steering Committee, the NWCCOG may adopt Acceptable Use Policies with respect to the Network, and MMC Host shall abide by any such policies of which it has notice.
Acceptable Use Policies. Customer is solely responsible for all Users’ usage of the WCP Service and access to the Internet. Customer is also responsible for ensuring that all Users are aware of, and comply with any Customer acceptable use policy and the Orange Policy. Customer will defend, hold harmless and indemnify Orange against any and all Losses arising out of or related to any breach or alleged breach by Customer, Users, or Customer’s permitted users (including Internet Users) of any Customer acceptable use policy or the Orange Policy. Customer will immediately notify Orange upon learning of any violation of the Orange Policy or any Customer acceptable use policy.
Acceptable Use Policies. The Faculty Partner, his/her research team, and ITaP staff agrees to comply with all Purdue University and ITaP/Research Computing policies and procedures, including the University’s information technology policies located at: ▇▇▇▇://▇▇▇.▇▇▇▇▇▇.▇▇▇/securePurdue. Research Computing policies may be found at: ▇▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇▇▇▇.▇▇▇/policies/. The system is not intended to store data protected by Federal privacy and security laws (e.g., HIPAA, ITAR, classified, etc.). It is the responsibility of the faculty partner to ensure that no protected data is stored on the system. Questions about information security may be directed to the ITaP Help Desk at (▇▇▇) ▇▇▇-▇▇▇▇.