Acceptable Use Requirements Sample Clauses

The Acceptable Use Requirements clause defines the rules and limitations governing how a service, product, or resource may be used by its users. Typically, this clause outlines prohibited activities such as illegal conduct, abuse of the service, or actions that could harm other users or the provider’s systems. For example, it may forbid spamming, unauthorized access, or distribution of malware. Its core practical function is to protect the provider and other users by setting clear boundaries for usage, thereby reducing the risk of misuse and potential legal or security issues.
Acceptable Use Requirements. Requirements
Acceptable Use Requirements. Procedural Guidance
Acceptable Use Requirements. Customer shall comply with, and will cause its Authorized Users to comply with, the following Acceptable Use Requirements applicable to the Service. For purposes of this Section 8.1, Customer and Authorized Users shall be referred to as “Customer Users.” a. Customer Users shall not use the Service on any Content that violates applicable law; b. Customer Users shall comply with all laws applicable to their use of the Service; c. Customer Users shall not introduce into the Service any Malicious Code or any other code or Content intended to interfere with or disrupt the operation of the Service; d. Customer Users shall not use the Service for any Content that infringes anyone’s intellectual property or other rights (such as personality or publicity rights) or for which they have not procured the necessary rights; e. Customer Users shall not impersonate any other person or otherwise misrepresent their identity; f. Customer Users shall not tamper with the Service and in particular shall not tamper with the Service in a manner designed to avoid payment for use of the Service; g. Customer Users shall not access the Service other than through the permitted customer and subscriber interfaces as set forth in the user documentation for the Service; and h. Customer Users shall not hack or attempt to reverse engineer the Service or attempt to circumvent any security or authentication functions in the Service.
Acceptable Use Requirements. A. As a condition to make use of the Application you agree not to upload or share any files that:  feature child pornography;  are obscene, defamatory, libelous, slanderous, profane, indecent or unlawful;  promote racism, violence or hatred;  are factually inaccurate, false, misleading or deceptive;  you do not have the right to copy and/or transfer;  infringe, violate or misappropriate intellectual property rights, privacy rights, including data protection rights, and/or any other kind of rights;  infringe on or violate any applicable law or regulation;  constitute ‘hate speech', whether directed at an individual or a group, and whether based upon the race, sex, creed, national origin, religious affiliation, sexual orientation or language of such individual or group;  facilitate or promote gambling, or the sale or use of illicit drugs; and/or  otherwise violate applicable laws. B. You shall not misuse the Application. In particular, you agree not to:  access or use the Application in a way intended to improperly avoid incurring fees, consuming unreasonable amount of storage or exceeding limitations of your subscription;  use any unauthorized means to modify, reroute, or gain access to the Application;  try to access the Application with unauthorized software;  damage, disable, overburden or impair the Application or any network connected to the Application;  use the Application, directly or indirectly, to offer any Application that competes with the Application;  participate in any activity which interferes or may interfere with the efficiency of the Application;  store or transmit any software or data containing any virus, malware, trojan, spyware or other software or program code that is malicious in nature;  transmit junk mail, spam, chain letters, phishing mails, unsolicited promotions or advertisements of any kind and for any purpose. C. You may not, and may not attempt to, directly or indirectly:  sell, resell or lease the Application or Software;  remove, obscure, or alter any notice of any of Storro trademarks, or other Intellectual Property appearing on or contained within the Application;  modify, copy, tamper with or otherwise create derivative works based on the Software or the Application;  analyse, reverse engineer, disassemble, or decompile the Software or the Application or apply any other process or procedure to derive the source code of any software of the Application, except for the scope in which such limitation i...
Acceptable Use Requirements. A. Users may only utilize and/or access PCC Technology for which they have the proper authorization. Users will only have access to the systems and information deemed necessary to perform essential job duties. B. Users should make reasonable efforts to protect their logon information and passwords and to otherwise secure PCC Technology against unauthorized access, including enabling and utilizing security features on all computers, mobile phones, tablets, and other devices. 1. Password requirements will be defined by the Information Technology Department, in accordance with the National Institute of Standards and Technologies (NIST) guidelines. For security and compliance purposes, the Information Technology Department may require you to periodically change your password. C. Users may not use or attempt to gain access to another User’s PCC Technology or attempt to obtain another User’s logon name or password without proper authorization. D. Each User is personally responsible for the appropriate use of all PCC Technology assigned to the User or to which the User has authorized access. E. Users will be accountable for any misuse or unauthorized access of the PCC Technology assigned to them. Users may not enable unauthorized persons to access the PCC network by using a PCC computer or a personal computer that is connected to the PCC network. Any such misuse or unauthorized access may result in disciplinary action for the User. F. Users are expected to comply with all contractual and licensing agreements respecting certain third-party resources by which PCC is bound. G. Users must comply with any additional requirements, policies, or guidelines established for specific PCC Technology to which the User has been granted access. When additional requirements, policies, and guidelines, are more restrictive than this Agreement, the more restrictive requirements, policies, or guidelines will take precedence. H. Users must not use PCC Technology in conjunction with the execution of programs, software, processes, or automated transaction-based commands that are intended to disrupt (or that could reasonably be expected to disrupt) other computer or network users, or damage or degrade performance, software, or hardware components of a system. I. If a PCC employee uses a personally owned device to access PCC Technology or conduct PCC business, he or she shall abide by this Agreement and all other applicable PCC policies and administrative procedures. Users should bear in...

Related to Acceptable Use Requirements

  • Acceptable Use Policy With respect to the Cloud Service, Customer will not: (a) disassemble, decompile, reverse-engineer, copy, translate or make derivative works, (b) transmit any content or data that is unlawful or infringes any intellectual property rights, or (c) circumvent or endanger its operation or security.

  • Acceptable Use You agree that you are independently responsible for complying with all applicable laws in all of your activities related to your use of the Service, regardless of the purpose of the use, and for all communications you send through the Service. We and our Service Providers have the right but not the obligation to monitor and remove communications content that we find in our sole discretion to be objectionable in any way. In addition, you are prohibited from using the Service for communications or activities that: (a) violate any law, statute, ordinance or regulation; (b) promote hate, violence, racial intolerance, or the financial exploitation of a crime; (c) defame, abuse, harass or threaten others; (d) include any language or images that are bigoted, hateful, racially offensive, vulgar, obscene, indecent or discourteous; (e) infringe or violate any copyright, trademark, right of publicity or privacy or any other proprietary right under the laws of any jurisdiction; (f) impose an unreasonable or disproportionately large load on our infrastructure; (g) facilitate any viruses, trojan horses, worms or other computer programming routines that may damage, detrimentally interfere with, surreptitiously intercept or expropriate any system, data or information; (h) constitute use of any robot, spider, other automatic device, or manual process to monitor or copy the Service or the portion of the Site through which the Service is offered without our prior written permission; (i) constitute use of any device, software or routine to bypass technology protecting the Site or Service, or interfere or attempt to interfere, with the Site or the Service; or (j) may cause us or our Service Providers to lose any of the services from our internet service providers, payment processors, or other vendors. We encourage you to provide notice to us by the methods described in Section 6 of the General Terms above of any violations of the General Terms or the Agreement generally.