AUP Violations Sample Clauses

The 'AUP Violations' clause defines the consequences and procedures that apply when a party breaches the Acceptable Use Policy (AUP) associated with a service or product. Typically, this clause outlines what constitutes a violation, such as engaging in prohibited activities like spamming, hacking, or distributing malware, and describes the steps the provider may take in response, which can include warnings, suspension, or termination of service. Its core practical function is to protect the service provider and other users by deterring misuse and providing clear remedies for addressing inappropriate or harmful behavior.
AUP Violations. If Google becomes aware that Customer's or any End User's use of the Services violates the AUP, Google will notify Customer and request that Customer correct the violation. If Customer fails to correct the violation within 24 hours of Google's request, then Google may Suspend all or part of Customer's use of the Services until the violation is corrected. Suspension of the Services may include removal or unsharing of content that violates the AUP.
AUP Violations. If WorkFusion becomes aware that Customer or any Customer User’s use of the Services violates the AUP, WorkFusion will give Customer notice of the violation by requesting that Customer correct the violation. If Customer fails to correct the violation within 24 hours of WorkFusion’s request, then WorkFusion may Suspend all or part of Customer’s use of the Services until the violation is corrected.
AUP Violations. If Actifio becomes aware that Customer's or any Customer End User's use of the Services violates the AUP, Actifio will give Customer notice of the violation by requesting that Customer correct the violation. If Customer fails to correct the violation within 24 hours of Actifio's request, then Actifio may Suspend all or part of Customer's use of the Services until the violation is corrected.
AUP Violations. Where Customer does not meet the intent of the AUP, RedEye may terminate the Agreement and the Services used by the Customer in accordance with the terms of the AUP.
AUP Violations. If Google becomes aware that Customer's or any Customer End User's use of the Services violates the AUP, Google or TheoremOne will give Customer notice of the violation by requesting that Customer correct the violation. If Customer fails to correct the violation within
AUP Violations. If CURBON TRADING becomes aware that a Customer’s or any Administrator or End User’s use of the Services violates the AUP, CURBON TRADING will give the Customer notice of the violation by requesting that Customer corrects the violation. If the Customer fails to correct the violation within 24 hours of CURBON TRADING's request, then CURBON TRADING may Suspend all or part of the Customer's use of the Services until the violation is corrected. Suspension of the Services may include removal or unsharing of content that violates the AUP.
AUP Violations. If a Customer is found, in the Company's reasonable determination, to be in violation of this AUP, the Company will make reasonable commercial efforts to notify the Customer. During this period, Services may, at Company’s sole discretion, be terminated or suspended from the offending IP address(s) to prevent, in the Company’s reasonable judgment, further serious AUP violations such as, but not strictly limited to, child pornography, network attacks or significant volumes of SPAM. If not resolved to the Company’s reasonable satisfaction after three (3) business days then the Company may and without further notice to the Customer terminate all Services under any and all Agreements then in effect with the Customer. No refunds or fees shall be repayable to the Customer in the event of such termination or during any period of suspension and any outstanding fees will remain due. The purpose of this Service Level Agreement is to set forth the service levels at which Company is to provide certain Services to Customer. Customer agrees that the remedies set out herein are the sole and exclusive remedy for Company’s failure to meet an SLA. This SLA applies only while Customer accounts are in good standing. The System Availability SLA and the Application Availability SLA are mutually exclusive. Company shall be subject to, and Customer shall benefit from, only the System Availability SLA unless and until such time as Customer complies with the Application Availability SLA Conditions set out at Section 2.1 below.
AUP Violations. If ▇▇▇▇▇▇▇▇ becomes aware or has reason to believe that Customer's or any End User's use of the Services violates the AUP, Qwiklabs may (a) Suspend Customer or its End Users’ use of the Services until the violation is corrected and/or (b) terminate the applicable Member’s use of the Services. If Services are Suspended, Customer or its End Users may contact Qwiklabs’s support team to discuss how to resume Services.
AUP Violations. If ▇▇▇▇▇▇ becomes aware that Customer’s or any End User’s use of the Services violates the AUP, Crusoe will notify Open Router and request that Customer correct the violation. If Customer fails to correct the violation within 24 hours of Customer receiving notification of ▇▇▇▇▇▇’s request, then Crusoe may request that Open Router Suspend all or part of Customer’s use of the Services through the Open router API until the violation is corrected. Other Suspension Notwithstanding AUP Violations, Crusoe may immediately Suspend all or part of Customer’s use of the Services if (a) Crusoe reasonably believes Customer’s or any End User’s use of the Services could adversely impact the Services, other customers’ or their end users’ use of the Services, or the Crusoe network or servers used to provide the Services; (b) there is suspected unauthorized third- party access to the Services; (c) Crusoe reasonably believes that immediate Suspension is required to comply with any applicable law; or (d) Customer is in breach of Restrictions or the Service Specific Terms. Crusoe will lift any such Suspension when the circumstances giving rise to the Suspension have been resolved. At Customer’s request, Crusoe will, unless prohibited by applicable law, notify Customer of the basis for the Suspension as soon as is reasonably possible. Intellectual Property Rights; Protection of Customer Data; Feedback Intellectual Property Rights Except as expressly stated in this Agreement, this Agreement does not grant either party any rights, implied or otherwise, to the other’s content or any of the other’s intellectual property. As between the parties, Customer owns all Intellectual Property Rights in Customer Data and Customer Applications, and Crusoe owns all Intellectual Property Rights in the Services and Software. Protection of Customer Data; No Training Crusoe will only access or use Customer Data to provide the Services to Customer or as otherwise instructed by Customer and will not use it for any other Crusoe products, services, or advertising. Specifically, Crusoe will only use Customer Data for inference - we will not use it for training Models, and we will not store it on disk or use it for any other purpose other than the inference process. Crusoe generally does not log Customer Data, but does log metadata that might be useful for purposes of debugging and improving the performance of the Service. Crusoe may observe and log a small portion of Customer Data when necessary for deb...

Related to AUP Violations

  • WAGE VIOLATIONS Contractor represents and warrants as previously certified in Contractor’s Bidder’s Certification, that during the term of this Contract and the three (3) year period immediately preceding the award of the Contract, Contractor has not been determined, by a final and binding citation and notice of assessment issued by the Washington Department of Labor and Industries or through a civil judgment entered by a court of limited or general jurisdiction, to be in willful violation of any provision of Washington state wage laws set forth in RCW 49.46, 49.48, or 49.52.

  • Repeat Violations ▇▇▇▇▇▇ agrees to comply with all regulatory requirements and acknowledges that repeat violations could result in increased penalties in the future.

  • Reporting Violations A. When the District receives a written report of unsafe condition which poses a serious and immediate threat to the health or safety of any unit member, the District shall investigate the allegations and take appropriate actions in a timely manner. B. The individual bargaining unit member forwarding a written report of an unsafe condition may request information relating to action(s) taken as a result of his or her report pursuant to the California Public Records Act.

  • Policy Compliance Violations The Requester and Approved Users acknowledge that the NIH may terminate the DAR, including this Agreement and immediately revoke or suspend access to all controlled-access datasets subject to the NIH GDS Policy at any time if the Requester is found to be no longer in agreement with the principles outlined in the NIH GDS Policy, the terms described in this Agreement, or the Genomic Data User Code of Conduct. The Requester and PI agree to notify the NIH of any violations of the NIH GDS Policy, this Agreement, or the Genomic Data User Code of Conduct data within 24 hours of when the incident is identified. Repeated violations or unresponsiveness to NIH requests may result in further compliance measures affecting the Requester. The Requester and PI agree to notify the appropriate DAC(s) of any unauthorized data sharing, breaches of data security, or inadvertent data releases that may compromise data confidentiality within 24 hours of when the incident is identified. As permitted by law, notifications should include any known information regarding the incident and a general description of the activities or process in place to define and remediate the situation fully. Within 3 business days of the DAC notification(s), the Requester agrees to submit to the DAC(s) a detailed written report including the date and nature of the event, actions taken or to be taken to remediate the issue(s), and plans or processes developed to prevent further problems, including specific information on timelines anticipated for action. The Requester agrees to provide documentation verifying that the remediation plans have been implemented. Repeated violations or unresponsiveness to NIH requests may result in further compliance measures affecting the Requester. NIH, or another entity designated by NIH may, as permitted by law, also investigate any data security incident or policy violation. Approved Users and their associates agree to support such investigations and provide information, within the limits of applicable local, state, tribal, and federal laws and regulations. In addition, Requester and Approved Users agree to work with the NIH to assure that plans and procedures that are developed to address identified problems are mutually acceptable and consistent with applicable law.

  • Non-Violation The execution and delivery of this Amendment and the performance and observance by it of the terms and provisions hereof (a) do not violate or contravene its Organization Documents or any applicable Laws or (b) conflict with or result in a breach or contravention of any provision of, or constitute a default under, any other agreement, instrument or document binding upon or enforceable against it.