Specific Examples of AUP Violations Sample Clauses

The "Specific Examples of AUP Violations" clause defines and enumerates particular actions or behaviors that are considered breaches of the Acceptable Use Policy (AUP). This clause typically lists activities such as spamming, unauthorized access, distribution of malware, or illegal content sharing, providing clear illustrations of what is prohibited. By offering concrete examples, it helps users understand the boundaries of acceptable conduct and reduces ambiguity, thereby ensuring compliance and making enforcement of the policy more straightforward.
POPULAR SAMPLE Copied 1 times
Specific Examples of AUP Violations. The following are examples of conduct which may lead to termination of your Service. Without limiting the general policy in Section 1, it is a violation of the Agreement and this AUP to: (a) access without permission or right the accounts or computer systems of others, to spoof the URL, DNS or IP addresses of Verizon or any other entity, or to penetrate the security measures of Verizon or any other person’s computer system, or to attempt any of the foregoing; (b) transmit uninvited communications, data or information, or engage in other similar activities, including without limitation, “spamming”, “flaming” or denial of service attacks; (c) intercept, interfere with or redirect email or other transmissions sent by or to others; (d) introduce viruses, worms, harmful code or Trojan horses on the Internet; (e) post off-topic information on message boards, chat rooms or social networking sites; (f) engage in conduct that is defamatory, fraudulent, obscene or deceptive; (g) violate Verizon’s or any third party’s copyright, trademark, proprietary or other intellectual property rights; (h) engage in any conduct harmful to the Verizon network, the Internet generally or other Internet users; (i) generate excessive amounts of email or other Internet traffic; (j) use the Service to violate any rule, policy or guideline of Verizon; (k) use the service in any fashion for the transmission or dissemination of images containing child pornography or in a manner that is obscene, sexually explicit, cruel or racist in nature or which espouses, promotes or incites bigotry, hatred or racism; or (l) download or use the Service in Cuba, Iran, North Korea, Sudan and Syria or to destinations that are otherwise controlled or embargoed under U.S. law, as modified from time to time by the Departments of Treasury and Commerce.
Specific Examples of AUP Violations. The following are examples of conduct which may lead to termination of your Service. Without limiting the general policy in Section 1, it is a violation of the Agreement and this AUP to: (a) access without permission or right the accounts or computer systems of others, to spoof the URL, DNS or IP addresses of Verizon or any other entity, or to penetrate the security measures of Verizon or any other person’s computer system, or to attempt any of the foregoing; (b) transmit uninvited communications, data or information, or engage in other similar activities, including without limitation, “spamming”, “flaming” or denial of service attacks; (c) intercept, interfere with or redirect email or other transmissions sent by or to others;
Specific Examples of AUP Violations. The following are examples of conduct which may lead to termination of your service. Without limiting the general policy in section 1, it is a violation of the agreement and this AUP to: (a) access without permission or right the accounts or computer systems of others, to spoof the URL, DNS, or IP addresses of Lackawanna County or any other entity, or to penetrate the security measures of Lackawanna County or any other person’s computer system or network, or to attempt any of the foregoing; (b) transmit uninvited communications, data or information, or engage in other similar activities, including without limitation, “spamming”, “flaming”, or denial of service attacks; (c) intercept, interfere with or redirect email or other transmissions sent by or to others; (d) introduce viruses, worms, harmful code or Trojan horses on the internet; (e) post off-topic information on message boards, chat rooms, or social networking sites; (f) engage in conduce that is defamatory , fraudulent, obscene or deceptive; (g) violate Lackawanna County’s or any third party’s copyright, trademark, proprietary or other intellectual property rights; (h) engage in any conduct harmful to the Lackawanna County Wireless network, the internet generally, or other internet users; (i) use the service to violate any rule , policy, or guideline of Lackawanna County; or (j) use the service in any fashion for the transmission or dissemination of images containing child pornography or in a manner that is obscene, sexually explicit, cruel or raciest in nature or which espouses , promotes or incites bigotry, hatred, or racism.
Specific Examples of AUP Violations. The following are examples of conduct which may lead to termination of Customer Service. Without limiting the general policy in Section K(i), it is a violation of the Agreement to: (a) access without permission or right the accounts or computer systems of others, to spoof the URL, DNS or IP addresses of NetCarrier, or subcontractors or suppliers, or any other entity, or to penetrate the security measures of NetCarrier or NetCarrier subcontractors or suppliers or any other person’s computer system, or to attempt any of the foregoing; (b) transmit uninvited communications, data or information, or engage in other similar activities, including without limitation, “spamming”, “flaming” or denial of service attacks; (c) intercept, interfere with or redirect email or other transmissions sent by or to others; (d) introduce viruses, worms, harmful code or Trojan horses on the Internet; (e) engage in conduct that is defamatory, fraudulent, obscene or deceptive; (f) generate excessive amounts of email or other Internet traffic; (g) Use the Service in any fashion for the transmission or dissemination of images containing child pornography or in a manner that is obscene, sexually explicit, cruel or racist in nature or which espouses, promotes or incites bigotry, hatred or racism; or (h) download or Use the Service in countries prohibited by applicable law.

Related to Specific Examples of AUP Violations

  • Material Changes; Undisclosed Events, Liabilities or Developments Since the date of the latest audited financial statements included within the SEC Reports, except as set forth on Schedule 3.1(i), (i) there has been no event, occurrence or development that has had or that could reasonably be expected to result in a Material Adverse Effect, (ii) the Company has not incurred any liabilities (contingent or otherwise) other than (A) trade payables and accrued expenses incurred in the ordinary course of business consistent with past practice and (B) liabilities not required to be reflected in the Company’s financial statements pursuant to GAAP or disclosed in filings made with the Commission, (iii) the Company has not altered its method of accounting, (iv) the Company has not declared or made any dividend or distribution of cash or other property to its stockholders or purchased, redeemed or made any agreements to purchase or redeem any shares of its capital stock and (v) the Company has not issued any equity securities to any officer, director or Affiliate, except pursuant to existing Company stock option plans. The Company does not have pending before the Commission any request for confidential treatment of information. Except for the issuance of the Securities contemplated by this Agreement or as set forth on Schedule 3.1(i), no event, liability, fact, circumstance, occurrence or development has occurred or exists or is reasonably expected to occur or exist with respect to the Company or its Subsidiaries or their respective businesses, prospects, properties, operations, assets or financial condition that would be required to be disclosed by the Company under applicable securities laws at the time this representation is made or deemed made that has not been publicly disclosed at least 1 Trading Day prior to the date that this representation is made.

  • Permitted Uses and Disclosures of Phi by Business Associate Except as otherwise indicated in this Agreement, Business Associate may use or disclose PHI, inclusive of de-identified data derived from such PHI, only to perform functions, activities or services specified in this Agreement on behalf of DHCS, provided that such use or disclosure would not violate HIPAA or other applicable laws if done by DHCS.

  • Geographic Area and Sector Specific Allowances, Conditions and Exceptions The following allowances and conditions shall apply where relevant. Where the Employer does work which falls under the following headings, the Employer agrees to pay and observe the relevant respective conditions and/or exceptions set out below in each case.

  • Permitted and Required Uses/Disclosures of PHI 3.1 Except as limited in this Agreement, Business Associate may use or disclose PHI to perform Services, as specified in the underlying grant or contract with Covered Entity. The uses and disclosures of Business Associate are limited to the minimum necessary, to complete the tasks or to provide the services associated with the terms of the underlying agreement. Business Associate shall not use or disclose PHI in any manner that would constitute a violation of the Privacy Rule if used or disclosed by Covered Entity in that manner. Business Associate may not use or disclose PHI other than as permitted or required by this Agreement or as Required by Law. 3.2 Business Associate may make PHI available to its employees who need access to perform Services provided that Business Associate makes such employees aware of the use and disclosure restrictions in this Agreement and binds them to comply with such restrictions. Business Associate may only disclose PHI for the purposes authorized by this Agreement: (a) to its agents and Subcontractors in accordance with Sections 9 and 17 or, (b) as otherwise permitted by Section 3. 3.3 Business Associate shall be directly liable under HIPAA for impermissible uses and disclosures of the PHI it handles on behalf of Covered Entity, and for impermissible uses and disclosures, by Business Associate’s Subcontractor(s), of the PHI that Business Associate handles on behalf of Covered Entity and that it passes on to Subcontractors.

  • Presentation of Potential Target Businesses The Company shall cause each of the Initial Shareholders to agree that, in order to minimize potential conflicts of interest which may arise from multiple affiliations, the Initial Shareholders will present to the Company for its consideration, prior to presentation to any other person or company, any suitable opportunity to acquire an operating business, until the earlier of the consummation by the Company of a Business Combination or the liquidation of the Company, subject to any pre-existing fiduciary obligations the Initial Shareholders might have.