Intentional Network Disruptions and Abusive Activity Sample Clauses

The "Intentional Network Disruptions and Abusive Activity" clause prohibits parties from deliberately interfering with network operations or engaging in harmful or abusive behaviors online. This typically covers actions such as launching denial-of-service attacks, spreading malware, or attempting unauthorized access to systems. By clearly outlining unacceptable conduct, the clause helps protect the integrity and security of network resources, ensuring a safe and reliable environment for all users.
POPULAR SAMPLE Copied 1 times
Intentional Network Disruptions and Abusive Activity. Using service for any activity that adversely affects the ability of other people or systems to use service or third party Internet-based resources. This specifically but without limitation includes excessive consumption of network or system resources whether intentional or unintentional. This also includes “denial of service” (DoS) attacks against another network host or individual user. Interference with or disruption of other network users, network services or network equipment is prohibited. The transmission of viruses, malware, or engaging in” mail bombing,” “chat flooding,” cybersquatting, and similar unlawful behavior is also prohibited.
Intentional Network Disruptions and Abusive Activity. Using service for any activity that adversely affects the ability of other people or systems to use service or third-party Internet-based resources. This specifically, but without limitation, includes excessive consumption of network or system resources whether intentional or unintentional. This also includes denial of service (DoS) attacks against another network host or individual user. Interference with or disruption of other network users, network services or network equipment is prohibited. The transmission of viruses, malware, or engaging in mail bombing, chat flooding, cybersquatting, and similar unlawful behavior is also prohibited. Attempting to circumvent user authentication or security of any host, network, or account on ITC’s systems or the Internet at large (“cracking”). This includes scanning or probing ports without the consent of the owner of the machine being scanned. Email access may be limited from areas where ITC notices attacks to compromise customer’s accounts. ITC will provide VPN access for basic email access in these areas as needed, or the customer may use their own VPN. ITC strongly recommends customers use Encryption, VPNs, and stronger physical device security when traveling.

Related to Intentional Network Disruptions and Abusive Activity

  • Workplace Violence Prevention and Crisis Response (applicable to any Party and any subcontractors and sub-grantees whose employees or other service providers deliver social or mental health services directly to individual recipients of such services): Party shall establish a written workplace violence prevention and crisis response policy meeting the requirements of Act 109 (2016), 33 VSA §8201(b), for the benefit of employees delivering direct social or mental health services. Party shall, in preparing its policy, consult with the guidelines promulgated by the U.S. Occupational Safety and Health Administration for Preventing Workplace Violence for Healthcare and Social Services Workers, as those guidelines may from time to time be amended. Party, through its violence protection and crisis response committee, shall evaluate the efficacy of its policy, and update the policy as appropriate, at least annually. The policy and any written evaluations thereof shall be provided to employees delivering direct social or mental health services. Party will ensure that any subcontractor and sub-grantee who hires employees (or contracts with service providers) who deliver social or mental health services directly to individual recipients of such services, complies with all requirements of this Section.

  • Presentation of Potential Target Businesses The Company shall cause each of the Initial Shareholders to agree that, in order to minimize potential conflicts of interest which may arise from multiple affiliations, the Initial Shareholders will present to the Company for its consideration, prior to presentation to any other person or company, any suitable opportunity to acquire an operating business, until the earlier of the consummation by the Company of a Business Combination or the liquidation of the Company, subject to any pre-existing fiduciary obligations the Initial Shareholders might have.

  • Particular Methods of Procurement of Consultants’ Services 1. Quality- and Cost-based Selection. Except as otherwise provided in paragraph 2 below, consultants’ services shall be procured under contracts awarded on the basis of Quality and Cost-based Selection.

  • Reporting of Non-Force Majeure Events Each Party (the “Notifying Party”) shall notify the other Parties when the Notifying Party becomes aware of its inability to comply with the provisions of this Agreement for a reason other than a Force Majeure event. The Parties agree to cooperate with each other and provide necessary information regarding such inability to comply, including the date, duration, reason for the inability to comply, and corrective actions taken or planned to be taken with respect to such inability to comply. Notwithstanding the foregoing, notification, cooperation or information provided under this Article shall not entitle the Party receiving such notification to allege a cause for anticipatory breach of this Agreement.

  • COMMERCIAL REUSE OF SERVICES The member or user herein agrees not to replicate, duplicate, copy, trade, sell, resell nor exploit for any commercial reason any part, use of, or access to 's sites.