System Abuse Sample Clauses

The System Abuse clause defines and prohibits improper or unauthorized use of a system, network, or service. It typically outlines specific actions that constitute abuse, such as attempting to gain unauthorized access, disrupting service for other users, or introducing malicious software. By clearly delineating unacceptable behaviors, this clause helps protect the integrity and security of the system, ensuring fair and reliable access for all users and mitigating risks associated with misuse.
System Abuse. You may not use the Mail Services in a way that creates technical disturbances for other Vaioni mail customers or for the Vaioni systems generally. Specifically, but without limitation:
System Abuse. Without limitation, you agree not undertake any other activity which may adversely affect the operation or enjoyment of this Site by any other person. You may not reproduce, sell, resell, or otherwise exploit any resource, or access to any resource, contained on this Site.
System Abuse. You shall not use a SharePoint Private Cloud Services by publishing your login information. Any scripts you use in connection with your SharePoint Services must be written such that they do not consume a disproportionate amount of computing and bandwidth resources. Using the SharePoint Private Cloud Services in a way that creates operational disturbances for other SherWeb SharePoint customers or for the SherWeb systems generally shall be deemed consuming a disproportionate amount of computing and bandwidth resources.
System Abuse. You may not reproduce, sell, resell or otherwise exploit any resource, or access to any resource, contained on this website. You are prohibited from using any services or facilities provided in connection with this website to compromise security or tamper with system resources and/or accounts. The use or distribution of tools designed for compromising security (e.g., password-guessing programs, cracking tools or network probing tools) are strictly prohibited.
System Abuse. You may not use the Mail Services in a way that creates technical disturbances for other Supplier’s mail customers or for the Supplier’s systems generally. Specifically, but without limitation:
System Abuse. Franchisee shall not abuse CTZAPP system, or any other system accessible through the internet to CTZAPP, by casing any harm to the system so that it inhibits or negatively impacts the ability of other users to effectively use such system. Franchisee further agrees not to compromise or attempt to violate security at CTZAPP or elsewhere, including but not limited to, attempted access of any data, server, or account that you are not expressly or authorized to access.
System Abuse. The Customer agrees not to engage in any activities that may degrade the performance of the Software or the Subscription Service for other users. This includes excessive API calls, automated scraping, or any other activity that puts an unreasonable load on the system.
System Abuse. You may not reproduce, sell, resell or otherwise exploit any resource, or access to any resource, contained on this Service. • You are prohibited from using any services or facilities provided in connection with this Service to compromise security or tamper with system resources and/or accounts. The use or distribution of tools designed for compromising security (e.g. password guessing programs, cracking tools or network probing tools) is strictly prohibited.

Related to System Abuse

  • System Use (a) An electronic site access system may be used on site, subject to the requirements of this statement. (b) The system operates via: (i) a facial recognition device; and (ii) an electronic gate. (c) The system will be installed at the access and egress point/s of the site and will only be utilised to identify presence on site. (d) The purpose for which the electronic site access system will be implemented is to ensure: (i) avoiding unauthorised access to site; (ii) confirmation and co-ordination of effort in emergency situations; and (iii) confirmation that all entrants to site have received a site specific induction; (e) The only personal data collected by the system is a site entrant’s: (i) image; (ii) first & last name; (iii) mobile phone number; (iv) email address; and (v) employer’s name. (the Collected Data) (f) The Collected Data will only be held or used for the purposes specified above, unless otherwise by consent or required by law. (g) The Employer will not use the electronic site access control system to verify who was on a site at a particular time for the purpose of: (i) evaluating whether a variation claim regarding labour costs made by a subcontractor can be substantiated; (ii) taking disciplinary action against an Employee, or assisting a subcontractor to take disciplinary action against its own employees, regarding their start and finish times; or (iii) otherwise generally tracking a worker’s movements whilst on the site.

  • System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.

  • System Access CUSTOMER agrees to provide to PROVIDER, at CUSTOMER’S expense, necessary access to the mainframe computer and related information technology systems (the “System”) on which CUSTOMER data is processed during the times (the “Service Hours”) specified in the PSAs, subject to reasonable downtime for utility outages, maintenance, performance difficulties and the like. In the event of a change in the Service Hours, CUSTOMER will provide PROVIDER with at least fifteen (15) calendar days written notice of such change.

  • System Upgrades The Connecting Transmission Owner shall procure, construct, install, and own the System Upgrade Facilities and System Deliverability Upgrades described in Attachment 6 of this Agreement. To the extent that design work is necessary in addition to that already accomplished in the Class Year Interconnection Facilities Study for the Interconnection Customer, the Connecting Transmission Owner shall perform or cause to be performed such work. If all the Parties agree, the Interconnection Customer may construct System Upgrade Facilities and System Deliverability Upgrades. 5.2.1 As described in Section 32.3.5.3 of the SGIP in Attachment Z of the ISO OATT, the responsibility of the Interconnection Customer for the cost of the System Upgrade Facilities and System Deliverability Upgrades described in Attachment 6 of this Agreement shall be determined in accordance with Attachment S of the ISO OATT, as required by Section 32.3.5.3.2

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization.