Use of the Service by Client Clause Samples

The 'Use of the Service by Client' clause defines the terms and conditions under which the client is permitted to access and utilize the service provided by the supplier. Typically, this clause outlines acceptable and prohibited uses, such as restrictions on sharing access credentials, limitations on commercial exploitation, or compliance with applicable laws. Its core function is to set clear boundaries for service usage, thereby protecting the provider from misuse and ensuring the service is used as intended.
Use of the Service by Client. 7.1 Client agrees to use the Service only as permitted by: (a) The Agreement; (b) Characteristics, settings and limits of the Service, including setting of limits by Client as allowed by the Service, as published and updated by Issuer from time to time on Issuer website for the Service; and (c) Any applicable law, regulation or generally accepted practices or guidelines in the relevant jurisdictions.
Use of the Service by Client. 7.1. Client agrees to use the Service only as permitted by: (a) The Agreement; (b) The limits for the Service, as published and updated by Issuer from time to time on Issuer website for the Service; and (c) Any applicable law, regulation or generally accepted practices or guidelines in the relevant jurisdictions. 7.2. Payment transactions with payment GiftCard 7.2.1. Client may make payment orders and transactions with GiftCard, associated with GiftCard account of e-money held by Client. The payment transaction may be payment for Goods and Services on POS at Merchants accepting GiftCard as payment method, or others if explicitly agreed on between the Parties. Client understands and agrees that Virtual GiftCard may be used only for payment for Goods and Services in Internet. 7.2.2. The payment order executed with GiftCard will be received by Issuer in electronic form. The Client’s consent for execution of the payment transaction with GiftCard becomes irrevocable and the payment order becomes irrevocable when Client presents GiftCard for execution of the transaction and: (a) the chip or the magnetic stripe of Card is read by the POS device and/or a valid PIN is entered and/or Client signs the receipt from the device; or (b) by giving GiftCard or entering 7.2.3. Payment transactions initiated by or through the payee: Issuer shall execute a payment transaction initiated by or through the payee in accordance with the Client’s consent given before the payment service provider of the payee. In cases where the amount of the transaction is not known at the moment of providing the consent, Client may be provided with an option to agree to the blocking of a specific amount for the purposes of the exection of the transaction in question. In case Client has agreed to said blocking, the Issuer shall unblock the amount at the moment of the initiation by or though the payee. 7.2.4. The GiftCard may be used by Client, who purchased GiftCard or by other third party, to whom the GiftCard has been given for which Client is fully responsible. The Cards are always linked with the e-money account of Client and give access to the Client’s funds. 7.2.5. The Client understands and agrees that it is not permitted to carry out a transaction with the available e-money for funding any payment accounts, digital wallets or other similar instruments provided by other payment service providers. 7.2.6. Requests for blocking and unblocking of GiftCard may be made by the Client. 7.3. Reversal...

Related to Use of the Service by Client

  • Use of the Service 11.1 When using the Service you must comply with: (a) our CRA, including clause 4 of the General Terms, and this clause 11; and (b) any rules, including any acceptable use conditions, imposed by any third party whose content or services you access using the Service or whose Network on which your data transmits. 11.2 Any use of the Service at the Premises is your responsibility. The terms of our CRA apply to you and also to anyone else who uses the Service (regardless of whether you give them permission to do so or not). 11.3 You must ensure that any software you use in relation to the Service is properly licensed. 11.4 The use of a Local Area Network (LAN) for personal use is permitted, however the set-up and configuration of a LAN connected to the modem is not supported by customer service. 11.5 All IP addresses provided by us for your use remain our property. Most Services include a dynamic IP address. A new IP address is usually allocated whenever the computer and modem are rebooted. The IP address remains until the next time the computer and modem are switched off. Where provided, you may configure your computer or modem to connect using a static IP address. 11.6 We may at any time adjust aspects of the Service for security or Network management reasons, including, without limitation: (a) deleting transitory data that has been stored on our servers for longer than 90 days; (b) deleting stored email messages that are older than 90 days; (c) rejecting any incoming email messages and attachments that exceed 30 Megabytes (including encapsulation); (d) delivering access and content via proxy servers; (e) limiting the number of addresses to whom an outgoing email can be sent; (f) refusing to accept incoming email messages to mailboxes that have exceeded the email storage limit; (g) managing the Network to prioritise certain types of Internet traffic over others; and (h) blocking or filtering specific Internet ports. 11.7 You are responsible for providing any security or privacy measures for your computer networks and any data stored on those networks or accessed through the Service. We will not be liable to you in respect of any loss, damage, costs or expenses incurred by you in connection with your failure to provide that security. 11.8 You may request additional users on the Service in accordance with the Pricing Schedule. 11.9 You must take reasonable steps to ensure that others do not gain unauthorised access to the Service through your account. We recommend that you do not disclose your password to others and that you change your password regularly. 11.10 We may monitor use of the Service to investigate a breach (or suspected breach) of the Acceptable Use Policy or upon the request of an authorised authority. 11.11 Where you provide your own wireless computer connection device, you are responsible for any loss caused by an unauthorised interception of the Service.

  • Use of the Services 1.1 We will make the Oracle services listed in Your order (the “Services”) available to You pursuant to this Agreement and Your order. Except as otherwise stated in this Agreement or Your order, You have the non- exclusive, worldwide, limited right to use the Services during the period defined in Your order, unless earlier terminated in accordance with this Agreement or Your order (the “Services Period”), solely for Your internal business operations. You may allow Your Users (as defined below) to use the Services for this purpose, and You are responsible for their compliance with this Agreement and Your order. 1.2 The Service Specifications describe and govern the Services. During the Services Period, we may update the Services and Service Specifications (with the exception of the Data Processing Agreement as described below) to reflect changes in, among other things, laws, regulations, rules, technology, industry practices, patterns of system use, and availability of Third Party Content (as defined below). Oracle updates to the Services or Service Specifications will not materially reduce the level of performance, functionality, security or availability of the Services during the Services Period of Your order. 1.3 You may not, and may not cause or permit others to: (a) use the Services to harass any person; cause damage or injury to any person or property; publish any material that is false, defamatory, harassing or obscene; violate privacy rights; promote bigotry, racism, hatred or harm; send unsolicited bulk e-mail, junk mail, spam or chain letters; infringe property rights; or otherwise violate applicable laws, ordinances or regulations; (b) perform or disclose any benchmarking or availability testing of the Services; (c) perform or disclose any performance or vulnerability testing of the Services without Oracle’s prior written approval, or perform or disclose network discovery, port and service identification, vulnerability scanning, password cracking or remote access testing of the Services; or (d) use the Services to perform cyber currency or crypto currency mining ((a) through (d) collectively, the “Acceptable Use Policy”). In addition to other rights that we have in this Agreement and Your order, we have the right to take remedial action if the Acceptable Use Policy is violated, and such remedial action may include removing or disabling access to material that violates the policy.

  • Sub-adviser’s Use of the Services of Others The Sub-adviser may (at its cost except as contemplated by Paragraph 5 of this Agreement) employ, retain, or otherwise avail itself of the services or facilities of other persons or organizations, including affiliates of the Sub-adviser, for the purpose of providing the Sub-adviser or the Adviser or the applicable Corporation or Fund, as appropriate, with such statistical and other factual information, such advice regarding economic factors and trends, such advice as to occasional transactions in specific securities, or such other information, advice, or assistance as the Sub-adviser may deem necessary, appropriate, or convenient for the discharge of its obligations hereunder or otherwise helpful to the Adviser or the Corporation or the Fund, as appropriate, or in the discharge of its overall responsibilities with respect to the other accounts that it serves as investment manager or counselor.

  • Termination by Clients The Account Owner may terminate enrollment in the DNA Guardian Program at any time.

  • Access to Personal Information by Subcontractors Supplier agrees to require any subcontractors or agents to which it discloses Personal Information under this Agreement or under any SOW to provide reasonable assurance, evidenced by written contract, that they will comply with the same or substantially similar confidentiality, privacy and security obligations with respect to such Personal Information as apply to Supplier under this Agreement or any SOW. Supplier shall confirm in writing to DXC that such contract is in place as a condition to DXC’s approval of use of a subcontractor in connection with any SOW. Upon request of DXC, Supplier will provide to DXC a copy of the subcontract or an extract of the relevant clauses. Supplier shall ensure that any failure on the part of any subcontractor or agent to comply with the Supplier obligations under this Agreement or any SOW shall be grounds to promptly terminate such subcontractor or agent. If during the term of this Agreement or any SOW, DXC determines, in its exclusive discretion, that any Supplier subcontractor or agent cannot comply with the Supplier obligations under this Agreement or with any SOW, then DXC may terminate this Agreement in whole or in part (with respect to any SOW for which such subcontractor or agent is providing services), if not cured by Supplier within the time prescribed in the notice of such deficiency.