Unauthorized Use of the Service Sample Clauses

The "Unauthorized Use of the Service" clause defines and prohibits any access to or use of a service that is not expressly permitted by the agreement. Typically, this clause outlines actions such as sharing login credentials, attempting to bypass security measures, or using the service for illegal or unintended purposes as unauthorized. By clearly delineating what constitutes improper use, the clause helps protect the service provider from liability, ensures compliance with usage policies, and preserves the integrity and security of the service.
Unauthorized Use of the Service. Customer shall not use the Service for any Unauthorized Purpose or in such a manner as to interfere with use by other custome rs of the System. "Unauthorized Purpose" includes, but is not limited to,: (i) use with intent to avoid payment of charges due under this Contract, (ii) access to, use of, alteration of, or destruction of the System Data files, programs, procedures, or information related to Customer or any other ▇▇▇▇ Deere custom er, (iii) use with the intent to reverse engineer or clone the System, (iv) use for any unlawful, illegal or fraudulent purpose, (v) any attempt to create a substitute or similar service through use of, or access to, the Service; or (vi)
Unauthorized Use of the Service. You agree not to access or attempt to access any password-protected portions of the Service without an authorized Login ID or password. IMPACT AUTO AUCTIONS reserves the right to investigate and take legal action against any illegal and/or unauthorized use of the Service including any use or attempted use by you of another person's password and account information. Our decision not to pursue legal action for any violation of these Terms of Use shall not be construed as a waiver of any provision of these Terms of Use or any legal rights of IMPACT AUTO AUCTIONS. Further, IMPACT AUTO AUCTIONS reserves the right to deny access to the Service, or any content or feature provided via the Service, to anyone who violates this Terms of Use or any other applicable terms and conditions of use of the Service or portions thereof or who, in our judgment, interferes with the ability of others to enjoy this Service, or infringes the rights of others.
Unauthorized Use of the Service. Customer shall not use, or attempt to use, the Equipment or Services for any Unauthorized Purpose or in such a manner as to interfere with use by other customers of the OmniTRACS System. "Unauthorized Purpose" as used herein includes: (i) obtaining access to or use of Services with intent to avoid payment, in whole or in part, of charges due under this Agreement, (ii) access to, use of, alteration of, or destruction of the data files, programs, procedures, or information of Customer or any other QUALCOMM customer, (iii) use of the Equipment or Services with the intent to reverse engineer or clone the OmniTRACS System, (iv) use of the Software in such a manner to void the Software license provided in Section 2 or (v) use of the Services or Software furnished pursuant to this Agreement for any purpose or in any manner which, directly or indirectly, violates the law or aids any unlawful act or undertaking. QUALCOMM may, without notice to Customer, and without liability to QUALCOMM, discontinue the Service in response to a request from a government agency, including but not limited to the FCC. For other QUALCOMM actions to discontinue Service to prevent use for an Unauthorized Purpose, QUALCOMM will use best efforts to provide Customer twelve (12) hours notification prior to discontinuing the Service. QUALCOMM shall restore the Service as soon as the Service can be provided without undue risk of use for an Unauthorized Purpose. Customer shall not be credited message service charges for Service interruptions resulting from QUALCOMM's actions under this Section.
Unauthorized Use of the Service. You agree not to access or attempt to access any password-protected portions of the Service without an authorized Login ID or password. IAA reserves the right to investigate and take legal action against any illegal and/or unauthorized use of the Service including any use or attempted use by you of another person's password and account information. Our decision not to pursue legal action for any violation of these Terms of Use shall not be construed as a waiver of any provision of these Terms of Use or any legal rights of IAA. Further, IAA reserves the right to deny access to the Service, or any content or feature provided via the Service, to anyone who violates this Terms of Use or any otherapplicable terms and conditions of use of the Service or portions thereof or who, in our judgment,interferes with the ability of others to enjoy this Service, or infringes the rights of others.
Unauthorized Use of the Service. Customer shall not use, or attempt to use, the Equipment or Services for any Unauthorized Purpose or in such a manner as to interfere with use by other customers of the OmniTRACS System. "Unauthorized Purpose" as used herein includes: (i) obtaining access to or use of Services with intent to avoid payment, in whole or in part, of charges due under this Agreement.

Related to Unauthorized Use of the Service

  • Unauthorized Use The Participating Institutions, or the Authorized Users shall not knowingly permit anyone other than the Authorized Users to access the Licensed Materials.

  • Unauthorized Use or Disclosure The Contractor shall notify COMMERCE within five (5) working days of any unauthorized use or disclosure of any confidential information, and shall take necessary steps to mitigate the harmful effects of such use or disclosure.

  • Use of the Service 11.1 When using the Service you must comply with: (a) our CRA, including clause 4 of the General Terms, and this clause 11; and (b) any rules, including any acceptable use conditions, imposed by any third party whose content or services you access using the Service or whose Network on which your data transmits. 11.2 Any use of the Service at the Premises is your responsibility. The terms of our CRA apply to you and also to anyone else who uses the Service (regardless of whether you give them permission to do so or not). 11.3 You must ensure that any software you use in relation to the Service is properly licensed. 11.4 The use of a Local Area Network (LAN) for personal use is permitted, however the set-up and configuration of a LAN connected to the modem is not supported by customer service. 11.5 All IP addresses provided by us for your use remain our property. Most Services include a dynamic IP address. A new IP address is usually allocated whenever the computer and modem are rebooted. The IP address remains until the next time the computer and modem are switched off. Where provided, you may configure your computer or modem to connect using a static IP address. 11.6 We may at any time adjust aspects of the Service for security or Network management reasons, including, without limitation: (a) deleting transitory data that has been stored on our servers for longer than 90 days; (b) deleting stored email messages that are older than 90 days; (c) rejecting any incoming email messages and attachments that exceed 30 Megabytes (including encapsulation); (d) delivering access and content via proxy servers; (e) limiting the number of addresses to whom an outgoing email can be sent; (f) refusing to accept incoming email messages to mailboxes that have exceeded the email storage limit; (g) managing the Network to prioritise certain types of Internet traffic over others; and (h) blocking or filtering specific Internet ports. 11.7 You are responsible for providing any security or privacy measures for your computer networks and any data stored on those networks or accessed through the Service. We will not be liable to you in respect of any loss, damage, costs or expenses incurred by you in connection with your failure to provide that security. 11.8 You may request additional users on the Service in accordance with the Pricing Schedule. 11.9 You must take reasonable steps to ensure that others do not gain unauthorised access to the Service through your account. We recommend that you do not disclose your password to others and that you change your password regularly. 11.10 We may monitor use of the Service to investigate a breach (or suspected breach) of the Acceptable Use Policy or upon the request of an authorised authority. 11.11 Where you provide your own wireless computer connection device, you are responsible for any loss caused by an unauthorised interception of the Service.

  • No Unauthorized Use or Disclosure Executive agrees that he will not, at any time during or after Executive’s employment by Company, make any unauthorized disclosure of, and will prevent the removal from Company premises of, Confidential Information or Work Product of Company (or its affiliates), or make any use thereof, except in the carrying out of Executive’s responsibilities during the course of Executive’s employment with Company. Executive shall use commercially reasonable efforts to cause all persons or entities to whom any Confidential Information shall be disclosed by him hereunder to observe the terms and conditions set forth herein as though each such person or entity was bound hereby. Executive shall have no obligation hereunder to keep confidential any Confidential Information if and to the extent disclosure thereof is specifically required by law; provided, however, that in the event disclosure is required by applicable law, Executive shall provide Company with prompt notice of such requirement prior to making any such disclosure, so that Company may seek an appropriate protective order. At the request of Company at any time, Executive agrees to deliver to Company all Confidential Information that he may possess or control. Executive agrees that all Confidential Information of Company (whether now or hereafter existing) conceived, discovered or made by him during the period of Executive’s employment by Company exclusively belongs to Company (and not to Executive), and Executive will promptly disclose such Confidential Information to Company and perform all actions reasonably requested by Company to establish and confirm such exclusive ownership. Affiliates of Company shall be third party beneficiaries of Executive’s obligations under this Article 6. As a result of Executive’s employment by Company, Executive may also from time to time have access to, or knowledge of, Confidential Information or Work Product of third parties, such as customers, suppliers, partners, joint venturers, and the like, of Company and its affiliates. Executive also agrees to preserve and protect the confidentiality of such third party Confidential Information and Work Product to the same extent, and on the same basis, as Company’s Confidential Information and Work Product.

  • No Unauthorized Use Provider shall not use Student Data or information in a Pupil Record for any purpose other than as explicitly specified in this DPA.