Unauthorized Applications Clause Samples

The "Unauthorized Applications" clause defines restrictions on the use of certain software or applications that have not been expressly approved by the relevant party, typically within a business or contractual context. This clause often prohibits the installation, access, or use of unapproved programs on company devices or within a service environment, and may outline procedures for requesting approval or consequences for violations. Its core function is to protect systems and data from security risks, ensure compliance with company policies, and prevent potential legal or operational issues arising from the use of unauthorized software.
Unauthorized Applications. Distributor shall not, directly or indirectly through any third party, attempt to register any of Supplier’s patents or patent rights, copyrights, trademarks and service marks, brands, trade secrets or trade names without Supplier’s prior written permission.
Unauthorized Applications. You understand that the Obvious Assets are not designed, intended, authorized or warranted to be suitable for use in the following “Unauthorized Applications”: life support applications, devices or systems, the operation of nuclear facilities; aircraft navigation systems; aircraft communication systems; air traffic control; direct life support machines; weapons systems; military or space equipment requiring radiation hardened components; and Enhanced 911 or E911 emergency calling system. You warrant that you will not use the Obvious Assets for Unauthorized Applications.
Unauthorized Applications. 10.1 Anti-Personnel Landmines. Products are not intended or authorized for use in anti-personnel landmines, and Motorola will not use Products for this purpose. Upon request from Freescale, Motorola will furnish a written certification that (i) Motorola does not use Products in anti-personnel landmines, and (ii) to Motorola’s actual knowledge, without a duty to investigate, Motorola’s customers do not use Products in anti-personnel landmines.
Unauthorized Applications 

Related to Unauthorized Applications

  • Unauthorized Work The contractor is not authorized at any time to commence task order performance prior to issuance of a signed TO or other written approval provided by the CO to begin work.

  • Unauthorized Aliens Consultant hereby promises and agrees to comply with all of the provisions of the Federal Immigration and Nationality Act, 8 U.S.C.A. §§ 1101, et seq., as amended, and in connection therewith, shall not employ unauthorized aliens as defined therein. Should Consultant so employ such unauthorized aliens for the performance of work and/or services covered by this Agreement, and should any liability or sanctions be imposed against City for such use of unauthorized aliens, Consultant hereby agrees to and shall reimburse City for the cost of all such liabilities or sanctions imposed, together with any and all costs, including attorneys’ fees, incurred by City.

  • Unauthorized Access Using service to access, or to attempt to access without authority, the accounts of others, or to penetrate, or attempt to penetrate, security measures of Company’s or a third party’s computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in disruption of service or the corruption or loss of data.

  • Unauthorized Access Notification ▇▇▇ shall notify Provider promptly of any known unauthorized access. ▇▇▇ will assist Provider in any efforts by Provider to investigate and respond to any unauthorized access.

  • Unauthorized Absence An unauthorized absence from the work site or failure to report for duty after a leave request has been disapproved, revoked, or canceled by the appointing authority, or at the expiration of a leave, shall be without pay. Such absence may also be grounds for disciplinary action.