Application Restrictions Clause Samples

The APPLICATION RESTRICTIONS clause defines the limitations on how a product, service, or intellectual property may be used by the receiving party. Typically, this clause outlines specific prohibited uses, such as reverse engineering, sublicensing, or using the product for unlawful purposes, and may restrict usage to certain environments or user groups. Its core function is to protect the provider’s interests by preventing misuse or unauthorized exploitation, thereby reducing legal and operational risks.
Application Restrictions. An Employee having obtained a posted position, whether accepted or declined, shall not be eligible to apply for another posted position within a twelve (12) consecutive month period unless it represents change in: 1) total hours, 2) classification, 3) shift commencement time of at least five (5) hours, or 4) pay rate (excluding premiums) This provision may be waived in unusual circumstances by agreement of the parties.
Application Restrictions. You acknowledge and agree that Good reserves the right to accept, limit, or reject Your access to the Good Dynamics Service under certain circumstances. Without limitation: i. The Good Dynamics Service is intended for Applications sending and receiving asynchronous text- based data, and not voice, video or other bandwidth-intensive or latency-sensitive applications. You agree not to exploit or authorize or allow Applications to exploit the GD Service provided hereunder in any unauthorized way whatsoever, including but not limited to, by trespass or burdening network capacity. Good reserves the right to (i) limit or terminate the GD Service with respect to Applications that in Good's reasonable judgment exceed acceptable NOC bandwidth use limits; or (ii) charge additional Fees for the GD Service for Applications that exceed Good's acceptable NOC bandwidth use limits. ii. Applications must not contain any malware, malicious or harmful code, program, or other internal component (e.g., computer viruses, trojan horses, "backdoors") which could damage, destroy, or adversely affect the Good Dynamics Software, GD Service, or other software, firmware, hardware, data, systems, services, or networks. iii. Good reserves the right to reject any Order or rescind Your license to use any Application with the GD Service which has as its primary functionality the mobile delivery of email/calendar/contacts or other functionality offered by products of Good Technology. iv. You agree and acknowledge that the Good Dynamics Software is not designed for and is not authorized for use in any situation where failsafe performance is required (e.g. medical uses, mechanical control of machinery, aeronautics, etc.) Without limitation, You agree that the Good Dynamics Software and GD Service may not be relied upon for (i) the transmission of data relating to emergency, mission critical, life-threatening situations; or (ii) any use where failure could lead to death, personal injury, or environmental damage.
Application Restrictions. Customer acknowledges and agrees that Good reserves the right to accept, limit, or reject Customer’s access to the Good Dynamics Service under the following circumstances.
Application Restrictions. Employees shall be entitled to apply for available promotions within the Court. Employees who failed a probationary or trial service period for a classification shall be prohibited from applying for that classification for one (1) year. The ultimate responsibility for determining promotion lies with the Employer, who shall exercise reasonable judgment in making such determination.
Application Restrictions. You warrant that your Application will not (a) contain any virus, Trojan horse, worm, time bomb, cancelbot, or other computer programming routine that is intended to damage, detrimentally interfere with, surreptitiously intercept or expropriate any system, data, or personal information; (b) create an unusually high load on the VolunteerMatch servers; (c) create liability for VolunteerMatch; or (d) enable a VolunteerMatch user to interfere with other users’ use of the VolunteerMatch services.
Application Restrictions. A. Application of materials shall be done only on properly prepared surfaces as herein specified, and all exterior painting shall be done only in dry weather. Any surface coating damaged by moisture or rain shall be removed and redone as directed by the Engineer. B. In no case shall paint by applied to surfaces that show a moisture content greater than 15 percent.
Application Restrictions. Customer must not do or attempt to do, or permit others to do or attempt to do, any of the following: (a) possess, download, copy or print the Application or any part of the Application, including any component comprised in the Application; (b) modify, port, adapt or create derivative works based on the Application; (c) view, read, reverse compile, reverse assemble, disassemble or print the Application’s source code or object code or other runtime objects or files related to the Application or otherwise reverse engineer, modify or copy the look and feel, functionality or user interface of any portion of the Application; (d) rent, lease, distribute (or redistribute), provide or otherwise make available the Application, in any form, to any third party (including in any service bureau or similar environment), other than to its Clients in accordance with clause 3.4; (e) share use of or access to the Application with other practitioners (including service providers performing work for Customer) who are not Authorised Users in Customer’s practice, even if Customer shares office space or equipment;
Application Restrictions. You and your Application must not do the following: 1. Implement features or business practices that harm the professional reputation or relationships of UNOS members. 2. Use Content received from the APIs in any manner that violates the privacy protections of the Health Insurance Portability and Accountability Act (HIPAA), the Health Information Technology for Economic and Clinical Health Act (HITECH Act), Privacy Act of 1974, or any other applicable law and regulation intended to prevent the unauthorized use or dissemination of individually identifiable health information and data. 3. Impersonate a UNOS member or misrepresent any UNOS member or other third party when requesting or publishing information. 4. Obfuscate or hide any UNOS buttons, sign-in functionality, or consent or authorization flows from your users. In order to access UNOS member-specific Content through the APIs, your users must sign-in with their UNOS credentials and grant your Application access to their Content. 5. Request from the APIs more than the minimum data fields and application permissions your Application needs. 6. Download, scrape, post, or transmit, in any form or by any means, any part of our Website. This includes data retrieved by web browser plugins. 7. Copy, reformat, reverse-engineer, or otherwise modify the APIs, Access Credentials, our Website or any Content. 8. Interfere with or disrupt UNOS services or servers or networks connected to UNOS services, or disobey any requirements, procedures, policies or regulations of networks connected to UNOS services.

Related to Application Restrictions

  • Usage Restrictions Customer will not (a) make any Service or Content available to anyone other than Customer or Users, or use any Service or Content for the benefit of anyone other than Customer or its Affiliates, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or Non-▇▇▇▇▇▇ Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-▇▇▇▇▇▇ Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Services or Content in a way that circumvents a contractual usage limit, or use any Services to access or use any of ▇▇▇▇▇▇ intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Customer's own intranets or otherwise for its own internal business purposes or as permitted in the Documentation, (k) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content or access it to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service, or (4) determine whether the Services are within the scope of any patent.

  • Use Restrictions (a) Company will not do or attempt to do, and Company will not permit any other person or entity to do or attempt to do, any of the following, directly or indirectly: (i) use any Proprietary Item for any purpose, at any location or in any manner not specifically authorized by this Agreement; (ii) make or retain any copy of any Proprietary Item except as specifically authorized by this Agreement; (iii) create, recreate or obtain the source code for any Proprietary Item; (iv) refer to or otherwise use any Proprietary Item as part of any effort to develop other software, programs, applications, interfaces or functionalities or to compete with BNYM or a Third Party Provider; (v) modify, adapt, translate or create derivative works based upon any Proprietary Item, or combine or merge any Proprietary Item or part thereof with or into any other product or service not provided for in this Agreement and not authorized in writing by BNYM; (vi) remove, erase or tamper with any copyright or other proprietary notice printed or stamped on, affixed to, or encoded or recorded in any Proprietary Item, or fail to preserve all copyright and other proprietary notices in any copy of any Proprietary Item made by Company; (vii) sell, transfer, assign or otherwise convey in any manner any ownership interest or Intellectual Property Right of BNYM, or market, license, sublicense, distribute or otherwise grant, or subcontract or delegate to any other person, including outsourcers, vendors, consultants, joint venturers and partners, any right to access or use any Proprietary Item, whether on Company’s behalf or otherwise; (viii) subcontract for or delegate the performance of any act or function involved in accessing or using any Proprietary Item, whether on Company’s behalf or otherwise; (ix) reverse engineer, re-engineer, decrypt, disassemble, decompile, decipher, reconstruct, re-orient or modify the circuit design, algorithms, logic, source code, object code or program code or any other properties, attributes, features or constituent parts of any Proprietary Item; (x) take any action that would challenge, contest, impair or otherwise adversely effect an ownership interest or Intellectual Property Right of BNYM; (xi) use any Proprietary Item to provide remote processing, network processing, network communications, a service bureau or time sharing operation, or services similar to any of the foregoing to any person or entity, whether on a fee basis or otherwise; (xii) allow Harmful Code into any Proprietary Item, as applicable, or into any interface or other software or program provided by it to BNYM, through Company’s systems or personnel or Company’s use of the Licensed Services or Company’s activities in connection with this Agreement. (b) Company shall, promptly after becoming aware of such, notify BNYM of any facts, circumstances or events regarding its or a Permitted User’s use of the Licensed System that are reasonably likely to constitute or result in a breach of this Section 2.12, and take all reasonable steps requested by BNYM to prevent, control, remediate or remedy any such facts, circumstances or events or any future occurrence of such facts, circumstances or events.

  • LICENCE RESTRICTIONS You agree that you will: 17.1 not rent, lease, sub-license, loan, provide, or otherwise make available, the Apps or the Services in any form, in whole or in part to any person without prior written consent from us; 17.2 not copy the Apps, User Information or Services, except as part of the normal use of the Apps or where it is necessary for the purpose of back-up or operational security; 17.3 not translate, merge, adapt, vary, alter or modify, the whole or any part of the Apps, User Information or Services nor permit the Apps or the Services or any part of them to be combined with, or become incorporated in, any other programs, except as necessary to use the Apps and the Services on devices as permitted in these terms; 17.4 not disassemble, de-compile, reverse engineer or create derivative works based on the whole or any part of the Apps or the Services nor attempt to do any such things, except to the extent that (by virtue of sections 50B and 296A of the UK Copyright, Designs and Patents Act 1988) such actions cannot be prohibited because they are necessary to decompile the Apps to obtain the information necessary to create an independent program that can be operated with the Apps or with another program (Permitted Objective), and provided that the information obtained by you during such activities: (a) is not disclosed or communicated without our prior written consent to any third party to whom it is not necessary to disclose or communicate it in order to achieve the Permitted Objective; and (b) is not used to create any software that is substantially similar in its expression to the Apps; (c) is kept secure; and (d) is used only for the Permitted Objective; 17.5 comply with all applicable technology control or export laws and regulations that apply to the technology used or supported by the Apps or any Service; (a) not overload our servers by contributing or participation in a Denial of Service (DoS) attack.

  • EXPORT RESTRICTIONS EXPORT OF THE SOFTWARE IS PROHIBITED BY UNITED STATES LAW. THE FUND MAY NOT UNDER ANY CIRCUMSTANCES RESELL, DIVERT, TRANSFER, TRANSSHIP OR OTHERWISE DISPOSE OF THE SOFTWARE (IN ANY FORM) IN OR TO ANY OTHER COUNTRY. IF CUSTODIAN DELIVERED THE SOFTWARE TO THE FUND OUTSIDE OF THE UNITED STATES, THE SOFTWARE WAS EXPORTED FROM THE UNITED STATES IN ACCORDANCE WITH THE EXPORTER ADMINISTRATION REGULATIONS. DIVERSION CONTRARY TO U.S. LAW IS PROHIBITED. The Fund hereby authorizes Custodian to report its name and address to government agencies to which Custodian is required to provide such information by law.