Prohibited Traffic Sample Clauses

The Prohibited Traffic clause defines and restricts certain types of data, content, or activities that are not allowed to be transmitted, processed, or facilitated through a service or platform. Typically, this clause outlines specific categories such as illegal content, spam, malware, or other forms of harmful or unauthorized traffic, and may require users to ensure their activities comply with these restrictions. Its core practical function is to protect the service provider and its users from legal liability, security risks, and operational disruptions by clearly delineating unacceptable uses of the service.
Prohibited Traffic. 9.2.1 The services provided under this Agreement shall not be used for any Prohibited Traffic as defined below. Prohibited Traffic is that traffic which reasonably appears to be in violation of applicable laws, rules or regulations. Prohibited Traffic includes, but is not limited to: 9.2.1.1 Traffic that violates, or facilitates a violation of, applicable law, or that furthers an illegal purpose; 9.2.1.2 Traffic that unreasonably ▇▇▇▇▇, frightens, or abuses; and 9.2.1.3 Traffic that unreasonably interferes with the use of the AT&T-21STATE’s network. 9.2.2 Other Evidence of Prohibited Traffic includes, but is not limited to, the following: 9.2.2.1 Predictive dialing of telephone numbers at the NPA or NNX level; 9.2.2.2 Initiating a call, communication or transmission as a result of a party receiving a telemarketing or telephone solicitation responding to a prompt, and signaling the calling party number (CPN) of the called party, unless the called party had an existing business relationship with the telemarketer or telephone solicitor; 9.2.2.3 Passing a telephone number not associated with the calling party as a means to obtain name and number information for the improperly passed telephone number; 9.2.2.4 Causing any caller identification service to transmit misleading or inaccurate caller identification information, with the intent to defraud, cause harm, or wrongfully obtain anything of value; 9.2.2.5 Placing calls for the primary purpose of generating queries to capture the caller ID Name (CNAM) associated with a telephone number; 9.2.2.6 Telemarketing or telephone solicitations to a party that is on a state or federal “Do Not Call” list, unless the called party has an existing business relationship with the telemarketer or telephone solicitor; 9.2.2.7 Denial of Service attacks; and 9.2.2.8 Artificial traffic stimulation, revenue pumping, regulatory arbitrage. 9.2.3 If AT&T-21STATE reasonably believes that CLEC is transmitting any of the preceding types of traffic using any service provided under this Agreement, AT&T-21STATE may suspend the affected service or discontinue the affected service. In the event of such suspension or discontinuance, CLEC that transmitted the relevant traffic to AT&T-21STATE must indemnify AT&T-21STATE against any claim, loss or damage arising from the suspension or discontinuance of the affected service, except for any claim, loss or damage caused by AT&T- 21STATE's gross negligence or willful misconduct. 9.2.4 CLEC agrees tha...
Prohibited Traffic. 2.1 The Services provided under this Agreement shall not be used for any Prohibited Traffic as defined below Prohibited Traffic is that traffic which reasonably appears to be in violation of applicable laws, rules or regulations. Prohibited Traffic includes, but is not limited to: 2.1.1 Traffic that violates, or facilitates a violation of, applicable law, or that furthers an illegal purpose; 2.1.2 Traffic that unreasonably ▇▇▇▇▇, frightens, or abuses; and 2.1.3 Traffic that unreasonably interferes with the use of the Frontier 2.2 Other Evidence of Prohibited Traffic includes, but is not limited to, the following: 2.2.1 Predictive dialing of telephone numbers at the NPA or NNX level; 2.2.2 Initiating a call, communication or transmission as a result of a party receiving a telemarketing or telephone solicitation responding to a prompt, and signaling the calling party number (CPN) of the called party, unless the called party had an existing business relationship with the telemarketer or telephone solicitor; 2.2.3 Passing a telephone number not associated with the calling party as a means to obtain name and number information for the improperly passed telephone number;
Prohibited Traffic. 2.1 The Services provided under this Agreement shall not knowingly be used for any traffic which reasonably appears to be in violation of applicable laws, rules or regulations or that furthers an illegal purpose ( Prohibited Traffic ). 2.2 If a Party reasonably believes that the other Party is knowingly transmitting Prohibited Traffic using any Service provided under this Agreement, that Party may notify the other Party. Upon notification, the Parties agree to cooperate to determine whether the traffic is Prohibited Traffic. Either Party may also initiate a dispute under the Resolution of Disputes provisions of the Agreement. 2.3 Parties agree that if either Party receives a request for information about traffic sent to a Party by the other Party which is reasonably believed to be Prohibited Traffic from an authorized traceback administrator, as authorized by US Telecom s Traceback Group, or its successor, or a Party, they will promptly respond to the authorized traceback request in good faith. The Parties agree to provide complete and accurate information in response to the authorized traceback request. The response shall identify the provider from which it accepted the traffic. Parties agree to provide this information to the authorized traceback administrator without requiring a subpoena.
Prohibited Traffic. 8.2.1 The services provided under this Agreement shall not be used for any Prohibited Traffic as defined below. Prohibited Traffic is that traffic which reasonably appears to be in violation of applicable laws, rules or regulations. Prohibited Traffic includes, but is not limited to: 8.2.1.1 Traffic that violates, or facilitates a violation of, applicable law, or that furthers an illegal purpose; 8.2.1.2 Traffic that unreasonably ▇▇▇▇▇, frightens, or abuses; and 8.2.1.3 Traffic that unreasonably interferes with the use of the either Party’s network.
Prohibited Traffic. 8.1 The Parties will perform Robocall Traceback Mitigation in accordance with effective FCC orders, rules and regulations 8.2 The Services provided under this Agreement shall not be used for any Prohibited Prohibited Traffic is that traffic which reasonably appears to be in violation of applicable laws, rules or regulations. Prohibited Traffic includes, but is not limited to: 8.2.1 Traffic that violates, or facilitates a violation of, applicable law, or that furthers an illegal purpose; 8.2.2 Traffic that unreasonably ▇▇▇▇▇, frightens, or abuses; and 8.2.3 Traffic that unreasonably interferes with the use of either Party network. 8.3 Other Evidence of Prohibited Traffic includes, but is not limited to, the following: 8.3.1 Predictive dialing of telephone numbers at the NPA or NNX level; 8.3.2 Initiating a call, communication or transmission as a result of a party receiving a telemarketing or telephone solicitation responding to a prompt, and signaling the calling party number (CPN) of the called party, unless the called party had an existing business relationship with the telemarketer or telephone solicitor; 8.3.3 Passing a telephone number not associated with the calling party as a means to obtain name and number information for the improperly passed telephone number;
Prohibited Traffic. RC 1. 1.1 The services provided under this Agreement shall not be used for any Prohibited Traffic as defined below (“Prohibited Traffic”). Prohibited Traffic is that traffic which reasonably appears to be in violation of applicable laws, rules or regulations. Prohibited Traffic includes, but is not limited to: RC 1.1.1.1 Traffic that violates, or facilitates a violation of, applicable law, or that furthers an illegal purpose; RC 1.1.1.2 Traffic that unreasonably ▇▇▇▇▇, frightens, or abuses; and RC 1.1.1.3 Traffic that unreasonably interferes with the use of the AT&T-21STATE’s network.
Prohibited Traffic. Publisher shall not generate Internet traffic to the Publisher Media by any of the following methods, as determined by Affinity at its sole reasonable discretion: fraud; computer program that runs automatically (including spiders, Web crawlers, and all types of bots); spamICQ or other instant messenger programs or applications; Internet Relay Chat or other chat room systems, IFrames; zero pixel frames; Common Gateway Interface scripts; JavaScript; click farms or other similar methods; spy ▇▇▇▇ or other downloadable programs (collectively "Prohibited Traffic"). Notwithstanding any other provision in this Agreement to the contrary, if Publisher is found using or engaging in Prohibited Traffic, Affinity reserves the right, at its sole discretion, to immediately suspend the Services, immediately terminate this Agreement, and/or seek any other remedy or recourse as Affinity deems necessary, including withholding Revenue Share payments as of the date of the breach.
Prohibited Traffic. 3.1 Customer shall only send to Company’s platform traffic which is originated via Internet protocol (“IP”). Customer’s causing, transmitting, or routing of any non-IP originated traffic to Company’s platform may result in the immediate termination of Service, in Company’s sole discretion, without prior notice. Company may, in its sole discretion, pass on to Customer any additional charges or fees which result from Customer’s sending non-IP originated traffic to Company’s platform. 3.2 Customer or an End-User of Customer shall not route, or request or permit the routing of any toll-free (8XX) calls or traffic to or in conjunction with any ports, DID, or POTS numbers assigned by Company, or use or permit the use of any other call routing method that would cause the originating carrier to bill Company, without the prior written consent from Company. In the event that Customer or Customer’s End-User routes or sends such calls or traffic to Company’s platform without the prior written consent of Company, then Customer shall be liable for any such charges billed to Company by an originating or transiting carrier as a result of such transmission or routing at the then applicable per minute rate. If the traffic is identified as payphone originated traffic, applicable payphone surcharges shall apply. The transmitting or routing of toll-free traffic to any ports, DID, or POTS numbers provided by Company without complying with the foregoing written consent requirements may result in the immediate termination of Service by Company, in its sole discretion, without prior notice.
Prohibited Traffic. (1) Neither Party shall send any Prohibited Traffic to the other for termination, nor shall either Party terminate any prohibited traffic received from the other Party. In addition to the rights afforded herein to each Party pursuant to paragraph 3.D and all other applicable paragraphs, either Party may block any call, communication or transmission originating from, or terminating to, a telephone number, without notice of any kind if the Party reasonably believes that the call, communication or transmission constitutes Prohibited Traffic. Either may disclose to third-parties Company information regarding the quantity, technical configuration, type, origination, destination, or number of calls, communications, or transmissions of services to the extent needed to investigate suspected misuse, fraudulent, abusive, and/or unlawful use of, or subscription (2) Prohibited Traffic consists of calls, communications, or transmissions being transmitted, placed, or attempted that either Party reasonably believes are in violation of applicable laws, rules or regulations or are nuisance calls. Evidence of Prohibited Traffic includes the following: a) Predictive dialing of telephone numbers at the NPA or NXX level; b) Any telephone call (other than a call made for emergency purposes or is made with the prior express consent of the called party) using an automatic telephone dialing system or an artificial or prerecorded voice, unless the call i) Is made for emergency purposes; ii) Is not made for a commercial purpose; iii) Is made for a commercial purpose but does not include or introduce an advertisement or constitute telemarketing; c) Initiating a call, communication or transmission as a result of a party receiving a telemarketing or telephone solicitation responding to a prompt, and signaling the calling party number (CPN) of the called party, unless the called party had an existing business relationship with the telemarketer or telephone solicitor; d) Passing a telephone number not associated with the calling party as a means to obtain name and number information for the improperly passed telephone number; e) Causing any caller identification service to transmit misleading or inaccurate caller identification information, with the intent to defraud, cause harm, or wrongfully obtain anything of value; f) Placing calls for the primary purpose of generating queries to capture the Caller ID Name (CNAM) associated with a telephone number; g) Telemarketing or telephone solic...
Prohibited Traffic. Publisher shall not generate Internet traffic to the Publisher Media by any of the following methods, as determined by Inhousead at its sole reasonable discretion: fraud; robotic computer program that runs automatically (such as spiders, Web crawlers, and all types of bots); listings on newsgroups; toolbars; spam or other bulk electronic mailing where the recipients are not opted in; ICQ or other messenger programs or applications; Internet Relay Chat or other chat room systems; iFrames; zero pixel frames; frames or windows displayed beyond the visible desktop; click farms or other similar methods; spy ▇▇▇▇ or other downloadable programs installed without the End Users' consent (collectively “Prohibited Traffic”). Notwithstanding any other provision in this Agreement to the contrary, if Publisher is found using or engaging in Prohibited Traffic, Inhousead reserves the right, at its sole discretion, to immediately suspend the Services, immediately terminate this Agreement, and/or seek any other remedy or recourse as Inhousead deems necessary, including withholding Revenue Share payments as of the date of the breach.