LICENCE RESTRICTIONS. You must not (and must ensure your Authorised Users do not) access or use the Services (including any SaaS Services or Software) except as permitted by the Licence and you must not and must not permit any other person to (as applicable): (a) use the Services in any way which is in breach of any applicable Laws or which infringes any person's rights, including Intellectual Property Rights; (b) use the Services to transmit, publish or communicate material that is defamatory, offensive, abusive, indecent, menacing or unwanted; (c) use the Services in any way that damages, interferes with or interrupts the supply of the Services; Milan Industries Group Pty Ltd Page 1 of 12 (d) introduce malicious programs into our hardware and software or Systems, including viruses, worms, trojan horses and e-mail bombs; (e) reveal your Services account’s password to others or allow others to use your Services account (other than Authorised Users); (f) use the Services to carry out security breaches or disruptions of a network. Security breaches include accessing data where you are not the intended recipient or logging into a server or account that you are not expressly authorised to access or corrupting any data (including network sniffing/monitoring, pinged floods, packet spoofing, denial of service and forged routing information for malicious purposes); (g) use any program/script/command, or send messages of any kind, with the intent to interfere with, or disable, any person’s use of the Services; (h) send any form of harassment via email, or any other form of messaging, whether through language, frequency, or size of messages or use the Services in breach of any person’s privacy (such as by way of identity theft or “phishing”); or (i) use the Services to circumvent user authentication or security of any of our networks, accounts or hosts or those of members or suppliers.
Appears in 1 contract
Sources: Services Agreement
LICENCE RESTRICTIONS. You must not (and must ensure your Authorised Users users do not) access or use the Services (including any SaaS Services or Software) Deliverables except as permitted by the Licence or this Agreement and you must not and must not permit any other person to (as applicable):to:
(a) use the Services Deliverables in any way which is in breach of any applicable Laws or which infringes any person's rights, including Intellectual Property Rightsrights;
(b) use the Services Deliverables to transmit, publish or communicate material that is defamatory, offensive, abusive, indecent, menacing or unwanted;
(c) use the Services Deliverables in any way that damages, interferes with or interrupts the supply of the Services; Milan Industries Group Pty Ltd Page 1 of 12Deliverables;
(d) introduce malicious programs into our the Company’s hardware and software or Systems, including viruses, worms, trojan horses and e-mail bombs;
(e) reveal your Services account’s password to others or allow others to use your Services account (other than Authorised Users);
(f) use the Services Deliverables to carry out security breaches or disruptions of a network. Security breaches include accessing data where you are not the intended recipient or logging into a server or account that you are not expressly authorised to access or corrupting any data (including network sniffing/monitoring, pinged floods, packet spoofing, denial of service and forged routing information for malicious purposes);
(gf) use any program/script/command, or send messages of any kind, with the intent to interfere with, or disable, any person’s use of the ServicesDeliverables;
(hg) if applicable, send any form of harassment via email, or any other form of messaging, whether through language, frequency, or size of messages or use the Services Deliverables in breach of any person’s privacy (such as by way of identity theft or “phishing”); or
(ih) use the Services Deliverables to circumvent user authentication or security of any of our the Company’s networks, accounts or hosts or those of the Company's members or suppliers.
(i) copy, modify, adapt, translate, create a derivative work of, reverse engineer, reverse assemble, disassemble or decompile the Deliverables or any part of Deliverables or otherwise attempt to discover any part of the source code (if any) of the Deliverables;
(j) use any unauthorised modified version of the Deliverables, including (without limitation) for the purpose of building similar or competitive Deliverables or for the purpose of obtaining unauthorised access to the Deliverables;
(k) use the Deliverables in a manner that is contrary to any Laws or in violation of any Intellectual Property Rights or privacy rights;
(l) publish, post, upload or otherwise transmit data that contains any viruses, trojan horses, worms, time bombs, corrupted files or other computer programming routines that are intended to damage, detrimentally interfere with information or property of any person;
(m) use or knowingly permit the use of any security testing tools in order to probe, scan or attempt to penetrate or ascertain the security of the Deliverables;
(n) unless authorised under this Agreement, use the Deliverables in a web enabled form for the purposes of third party analysis or view via the internet or other external network access method;
(o) rent the use of the Deliverables to any third parties;
(p) gain revenue, profit or benefit from the use of any trial Deliverables;
(q) take any action that may compromise or jeopardise the Company’s Intellectual Property Rights in the Deliverables or otherwise;
(r) remove or deface any confidentiality, copyright or other proprietary notice placed on the Deliverables or documentation;
(s) make any representations or warranties to any third parties that could be construed as being representations or warranties from the Company in relation to the Deliverables or any other matter;
(t) use the Deliverables in any way that involves service bureau use, outsourcing, renting, reselling, sublicensing, concurrent use of a single user login, or time-sharing of the Deliverables; or
(u) do any other thing in relation to the Deliverables specifically prohibited by the Company in the documentation or otherwise communicated by the Company to you in writing as being prohibited.
Appears in 1 contract
Sources: It Master Services Agreement
LICENCE RESTRICTIONS. You Customer must not (and must ensure your Customer’s Authorised Users do not) access or use the Cosive Services (including any SaaS Services or Software) except as permitted by the Licence and you Customer must not and must not permit any other person to (as applicable):to:
(a) use the Cosive Services in any way which is in breach of any applicable Laws or which infringes any person's rights, including Intellectual Property Rightsrights;
(b) use the Cosive Services to transmit, publish or communicate material that is defamatory, offensive, abusive, indecent, menacing or unwanted;
(c) use the Cosive Services in any way that damages, interferes with or interrupts the supply of the Cosive Services; Milan Industries Group Pty Ltd Page 1 of 12;
(d) introduce malicious programs into our hardware and software or Systems, including viruses, worms, trojan horses and e-mail bombs;
(e) reveal your Services accountCustomer’s Account’s password to others or allow others to use your Services account Customer’s Account (other than Authorised Users);
(f) use the Cosive Services to carry out security breaches or disruptions of a network. Security breaches include accessing data where you Customer are not the intended recipient or logging into a server or account that you Customer are not expressly authorised to access or corrupting any data (including network sniffing/monitoring, pinged floods, packet spoofing, denial of service and forged routing information for malicious purposes);
(g) use any program/script/command, or send messages of any kind, with the intent to interfere with, or disable, any person’s use of the Cosive Services;
(h) send any form of harassment via email, or any other form of messaging, whether through language, frequency, or size of messages or use the Cosive Services in breach of any person’s privacy (such as by way of identity theft or “phishing”); or
(i) use the Cosive Services to circumvent user authentication or security of any of our Cosive’s networks, accounts or hosts or those of Cosive’s members or suppliers.
Appears in 1 contract
Sources: Software Agreement
LICENCE RESTRICTIONS. contract; You must not (and must ensure your Authorised Users do do
(b) a FKDQJH RI WKH 3HUVRQQHO¶V G not) access or use the Platform Services (including any SaaS Services or Software) except as permitted by the Licence and you must not and must not permit any other person to (as applicable):to:
(a) use the Platform Services in any way which is in breach of any applicable Laws or which infringes any person's rights, including Intellectual Property Rightsrights;
(b) use the Platform Services to transmit, publish or communicate material that is defamatory, offensive, abusive, indecent, menacing or unwanted;
(c) use the Platform Services in any way that damages, interferes with or interrupts the supply of the Platform Services; Milan Industries Group Pty Ltd Page 1 of 12;
(d) introduce malicious programs into our hardware and hardware, software or Systems, including viruses, worms, trojan horses and e-mail bombs;
(e) reveal your Services account’s password to others UHYHDO \RXUlog in$cFredFeRntiXalsQtWo ¶othVe rs or allow others to use your Services account Account (other than Authorised Users);
(f) use the Platform Services to carry out security breaches or disruptions of a network. Security breaches include accessing data where you are not the intended recipient or logging into a server or account that you are not expressly authorised to access or corrupting any data (including network sniffing/monitoring, pinged floods, packet spoofing, denial of service and forged routing information for malicious purposes);
(g) use any program/script/command, or send messages of any kind, with the intent to interfere with, or disable, any person’s use responsibilities which no longer require the user to access the Platform Services for a period of the Services;
(h) send any form of harassment via email, or any other form of messaging, whether through language, frequency, or size of messages or use the Services in breach of any person’s privacy (such as by way of identity theft or “phishing”)at least 90 days; or
(ic) use temporary reallocation of a User account to cover the Services to circumvent user authentication or security long term absence of any of our networks, accounts or hosts or those of members or suppliersthe Personnel.
Appears in 1 contract
Sources: Software as a Service Agreement
LICENCE RESTRICTIONS. You must not (and must ensure your Authorised Users do not) access or use the Services (including any SaaS Services or Software) except as permitted by the Licence and you must not and must not permit any other person to (as applicable):
(a) use the Services in any way which is in breach of any applicable Laws or which infringes any person's rights, including Intellectual Property Rights;
(b) use the Services to transmit, publish or communicate material that is defamatory, offensive, abusive, indecent, menacing or unwanted;
(c) use the Services in any way that damages, interferes with or interrupts the supply of the Services; Milan Industries Group Pty Ltd Page 1 of 12;
(d) introduce malicious programs into our hardware and software or Systems, including viruses, worms, trojan horses and e-mail bombs;
(e) reveal your Services account’s password to others or allow others to use your Services account (other than Authorised Users);
(f) use the Services to carry out security breaches or disruptions of a network. Security breaches include accessing data where you are not the intended recipient or logging into a server or account that you are not expressly authorised to access or corrupting any data (including network sniffing/monitoring, pinged floods, packet spoofing, denial of service and forged routing information for malicious purposes);
(g) use any program/script/command, or send messages of any kind, with the intent to interfere with, or disable, any person’s use of the Services;
(h) send any form of harassment via email, or any other form of messaging, whether through language, frequency, or size of messages or use the Services in breach of any person’s privacy (such as by way of identity theft or “phishing”); or
(i) use the Services to circumvent user authentication or security of any of our networks, accounts or hosts or those of members or suppliers.
Appears in 1 contract
Sources: Master Services Agreement
LICENCE RESTRICTIONS. You must not (and must ensure your Authorised Users do not) access or use the Services (including any SaaS Services or Software) except as permitted by the Licence and you must not and must not permit any other person to (as applicable):to:
(a) use the Services in any way which is in breach of any applicable Laws or which infringes any person's rights, including Intellectual Property Rights;
(b) use the Services to transmit, publish or communicate material that is defamatory, offensive, abusive, indecent, menacing or unwanted;
(c) use the Services in any way that damages, interferes with or interrupts the supply of the Services; Milan Industries Group Pty Ltd Page 1 of 12;
(d) introduce malicious programs into our hardware and software or Systems, including viruses, worms, trojan horses and e-mail bombs;
(e) reveal your Services account’s password to others or allow others to use your Services account (other than Authorised Users);
(f) use the Services to carry out security breaches or disruptions of a network. Security breaches include accessing data where you are not the intended recipient or logging into a server or account that you are not expressly authorised to access or corrupting any data (including network sniffing/monitoring, pinged floods, packet spoofing, denial of service and forged routing information for malicious purposes);
(g) use any program/script/command, or send messages of any kind, with the intent to interfere with, or disable, any person’s use of the Services;
(h) send any form of harassment via email, or any other form of messaging, whether through language, frequency, or size of messages or use the Services in breach of any person’s privacy (such as by way of identity theft or “phishing”); or
(i) use the Services to circumvent user authentication or security of any of our networks, accounts or hosts or those of members or suppliers.
Appears in 1 contract
Sources: Master Service Agreement