Avoiding System Restrictions Clause Samples

Avoiding System Restrictions. (i.e., unauthorised use of manual or electronic means to avoid any use limitations placed on the users).
Avoiding System Restrictions. Using manual or electronic means to avoid any use limitations placed on the Services.
Avoiding System Restrictions. You many not use any means to avoid the prohibitions of this Policy.
Avoiding System Restrictions. Using manual or electronic means to avoid any use limitations placed on a System, such as access and storage restrictions. No E-Mail or Other Message Abuse The Buyer will not use the Service to distribute, publish, send, or facilitate the sending of unsolicited mass e-mail or other messages, promotions, advertising, or solicitations (like “spam”), including commercial advertising and informational announcements. The Buyer will not alter or obscure mail headers or assume a sender’s identity without the sender’s explicit permission. The Buyer will not collect replies to messages sent from another internet service provider if those messages violate this Policy or the acceptable use policy of that provider. Monitoring and Enforcement The Supplier reserves the right, but does not assume the obligation, to investigate any violation of this Policy or misuse of the Service. The Supplier may: 1. investigate violations of this Policy or misuse of the Service; or 2. remove, disable access to, or modify any content or resource that violates this Policy. Subject to the terms of the Call-Off Contract (including confidentiality obligations), the Supplier may report any activity that it suspects violates any law or regulation to appropriate law enforcement officials, regulators, or other appropriate third parties. The Supplier’s reporting may include disclosing appropriate customer information. The Supplier also may cooperate with appropriate law enforcement agencies, regulators, or other appropriate third parties to help with the investigation and prosecution of illegal conduct by providing network and systems information related to alleged violations of this Policy. Reporting of Violations of this Policy If the Buyer becomes aware of any violation of this Policy, the Buyer will immediately notify the Supplier and provide the Supplier with assistance, as requested, to stop or remedy the violation. Onboarding The onboarding plan for this Call-Off Contract is as specified in the Statement of Work embedded in Schedule 1. The Supplier shall ensure that (unless otherwise agreed by Buyer in writing) all professional services, educational services and consultant staff directly involved in the implementation and delivery of the Service comply with HMG Baseline Personnel Security Standard (BPSS) security checks / Government Staff Vetting Procedures as required for accessing Buyer Data or other services.
Avoiding System Restrictions. Using manual or electronic means to avoid any use limitations placed on a system, such as access and storage restrictions. Licensor reserves the right to remove any User content that User may post at any time without notice to User but does not guarantee to monitor the System for any breaches of the above.
Avoiding System Restrictions. Using manual or electronic means to avoid any use limitation places on the Services such as timing out.

Related to Avoiding System Restrictions

  • Use Restrictions (a) Company will not do or attempt to do, and Company will not permit any other person or entity to do or attempt to do, any of the following, directly or indirectly: (i) use any Proprietary Item for any purpose, at any location or in any manner not specifically authorized by this Agreement; (ii) make or retain any copy of any Proprietary Item except as specifically authorized by this Agreement; (iii) create, recreate or obtain the source code for any Proprietary Item; (iv) refer to or otherwise use any Proprietary Item as part of any effort to develop other software, programs, applications, interfaces or functionalities or to compete with BNYM or a Third Party Provider; (v) modify, adapt, translate or create derivative works based upon any Proprietary Item, or combine or merge any Proprietary Item or part thereof with or into any other product or service not provided for in this Agreement and not authorized in writing by BNYM; (vi) remove, erase or tamper with any copyright or other proprietary notice printed or stamped on, affixed to, or encoded or recorded in any Proprietary Item, or fail to preserve all copyright and other proprietary notices in any copy of any Proprietary Item made by Company; (vii) sell, transfer, assign or otherwise convey in any manner any ownership interest or Intellectual Property Right of BNYM, or market, license, sublicense, distribute or otherwise grant, or subcontract or delegate to any other person, including outsourcers, vendors, consultants, joint venturers and partners, any right to access or use any Proprietary Item, whether on Company’s behalf or otherwise; (viii) subcontract for or delegate the performance of any act or function involved in accessing or using any Proprietary Item, whether on Company’s behalf or otherwise; (ix) reverse engineer, re-engineer, decrypt, disassemble, decompile, decipher, reconstruct, re-orient or modify the circuit design, algorithms, logic, source code, object code or program code or any other properties, attributes, features or constituent parts of any Proprietary Item; (x) take any action that would challenge, contest, impair or otherwise adversely effect an ownership interest or Intellectual Property Right of BNYM; (xi) use any Proprietary Item to provide remote processing, network processing, network communications, a service bureau or time sharing operation, or services similar to any of the foregoing to any person or entity, whether on a fee basis or otherwise; (xii) allow Harmful Code into any Proprietary Item, as applicable, or into any interface or other software or program provided by it to BNYM, through Company’s systems or personnel or Company’s use of the Licensed Services or Company’s activities in connection with this Agreement. (b) Company shall, promptly after becoming aware of such, notify BNYM of any facts, circumstances or events regarding its or a Permitted User’s use of the Licensed System that are reasonably likely to constitute or result in a breach of this Section 2.12, and take all reasonable steps requested by BNYM to prevent, control, remediate or remedy any such facts, circumstances or events or any future occurrence of such facts, circumstances or events.

  • Usage Restrictions Customer will not (a) make any Service or Content available to anyone other than Customer or Users, or use any Service or Content for the benefit of anyone other than Customer or its Affiliates, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or Non-▇▇▇▇▇▇ Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-▇▇▇▇▇▇ Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Services or Content in a way that circumvents a contractual usage limit, or use any Services to access or use any of ▇▇▇▇▇▇ intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Customer's own intranets or otherwise for its own internal business purposes or as permitted in the Documentation, (k) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content or access it to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service, or (4) determine whether the Services are within the scope of any patent.

  • Regulatory Restrictions Notwithstanding any provision of the Deposit Agreement or any ADR(s) to the contrary, Holders are entitled to surrender outstanding ADSs to withdraw the Deposited Securities associated herewith at any time subject only to (i) temporary delays caused by closing the transfer books of the Depositary or the Company or the deposit of Shares in connection with voting at a shareholders’ meeting or the payment of dividends, (ii) the payment of fees, taxes and similar charges, (iii) compliance with any U.S. or foreign laws or governmental regulations relating to the ADSs or to the withdrawal of the Deposited Securities, and (iv) other circumstances specifically contemplated by Instruction I.A.(l) of the General Instructions to Form F-6 (as such General Instructions may be amended from time to time).

  • License Restrictions Licensor reserves all rights not expressly granted to You. The Software is licensed for Your internal use only. Except as this Agreement expressly allows, You may not (1) copy (except for back-up purposes), modify, alter, create derivative works, reverse engineer, decompile, or disassemble the Software except and only to the extent expressly permitted by applicable law; (2) transfer, assign, pledge, rent, timeshare, host or lease the Software, or sublicense any of Your license grants or rights under this Agreement; in whole or in part, without prior written permission of Licensor; (3) remove any patent, trademark, copyright, trade secret or other proprietary notices or labels on the Software or its documentation; or (4) disclose the results of any performance, functional or other evaluation or benchmarking of the Software to any third party without the prior written permission of Licensor. Hosting Restrictions. In the event that You desire to have a third party manage, host (either remotely or virtually) or use the Software on Your behalf, You shall (1) first enter into a valid and binding agreement with such third party that contains terms and conditions to protect Licensor’s rights in the Software that are no less prohibitive and/or restrictive than those contained in this Agreement, including, without limitation, the Verification section below; (2) prohibit use by such third party except for the sole benefit of You; and (3) be solely responsible to Licensor for any and all breaches of the above terms and conditions by such third party.