UNREASONABLE USE Sample Clauses

UNREASONABLE USE. 2.1. You must not use or try to use the Services:
AutoNDA by SimpleDocs
UNREASONABLE USE. 5.1 You must follow Our Fair Go™ Policy when using the Our Mobile Phone Services. This policy can be found at xxx.xxxxxxxxx.xxx
UNREASONABLE USE. For the purpose of this clause 9, Unreasonable Use includes, without limitation, the following:
UNREASONABLE USE. 5.1 You must follow Acceptable Use Policy when using the Our Mobile Phone Services. This policy can be found at xxx.xxxxxx.xxx.xx
UNREASONABLE USE. If we consider your use of the Services is unreasonable or your use does not comply with the terms of this Agreement, then we may suspend the Services immediately without notice to you. We consider your use of the Services to be unreasonable if your usage of that component of the Services affects our other customersaccess to our network and services. INVESTIGATION We reserve the right to investigate any use of the Services that we reasonably suspect is in breach of clauses 12, 13 or 14 of this Agreement. During the investigation we may suspend all or part of the Services and/or remove material that we reasonably believe violates the requirements set out in those clauses. You authorise us (or our agents) to cooperate with: law enforcement authorities in the investigation of suspected criminal violations; and system administrators of other Internet service providers network or computing facilities.
UNREASONABLE USE. In addition, where we consider your use of the Broadband service to be unreasonable, then we may suspend your access to that or any other promotion immediately and without notice to you. Without limiting the meaning of ‘unreasonable’:

Related to UNREASONABLE USE

  • Unacceptable Use The following is considered unacceptable use of the school’s ICT facilities and online platforms by any member of the school community. Any breach of this policy may result in disciplinary or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: Using the school’s ICT facilities to breach intellectual property rights or copyright Using the school’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its pupils, or other members of the school community Connecting any device to the school’s ICT network without approval from authorised personnel Setting up any software, applications or web services on the school’s network without approval by authorised personnel, or creating or using any program, tool or item of software designed to interfere with the functioning of the ICT facilities, accounts or data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel Allowing, encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the school’s ICT facilities Causing intentional damage to ICT facilities Removing, deleting or disposing of ICT equipment, systems, programs or information without permission by authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not supposed to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to the school Using websites or mechanisms to bypass the school’s filtering mechanisms This is not an exhaustive list. The school reserves the right to amend this list at any time. The headteacher or other delegated member of SLT will use professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s ICT facilities.

  • Visibility 12.1. Contractor shall follow any instructions given by EFI relating to visibility for the tasks and output under this Contract, including the use of specific disclaimers.

  • Substance Use Disorder counseling shall be provided by a QCC, or Chemical Dependency Counselor Intern. Substance use disorder education and life skills training shall be provided by counselors or individuals who have been trained in the education. All counselor interns shall work under the direct supervision of a QCC.

  • Vehicle Use 5.2.1 Each Lessee may use Lease Vehicles leased hereunder in connection with its car rental business, including use by such Lessee’s and its subsidiaries’ employees, directors, officers, agents, representatives and other business associates in their personal or professional capacities, subject to Sub-Clause 6.1 (

  • Overload Teaching Paragraph 1: Overload teaching is that teaching conducted by a full-time classroom teacher teaching daily in a vacant position during his/her planning period.

  • Acceptable Use You agree that you are independently responsible for complying with all applicable laws in all of your activities related to your use of the Service, regardless of the purpose of the use, and for all communications you send through the Service. We and our Service Providers have the right but not the obligation to monitor and remove communications content that we find in our sole discretion to be objectionable in any way. In addition, you are prohibited from using the Service for communications or activities that: (a) violate any law, statute, ordinance or regulation; (b) promote hate, violence, racial intolerance, or the financial exploitation of a crime; (c) defame, abuse, harass or threaten others; (d) include any language or images that are bigoted, hateful, racially offensive, vulgar, obscene, indecent or discourteous; (e) infringe or violate any copyright, trademark, right of publicity or privacy or any other proprietary right under the laws of any jurisdiction; (f) impose an unreasonable or disproportionately large load on our infrastructure; (g) facilitate any viruses, trojan horses, worms or other computer programming routines that may damage, detrimentally interfere with, surreptitiously intercept or expropriate any system, data or information; (h) constitute use of any robot, spider, other automatic device, or manual process to monitor or copy the Service or the portion of the Site through which the Service is offered without our prior written permission; (i) constitute use of any device, software or routine to bypass technology protecting the Site or Service, or interfere or attempt to interfere, with the Site or the Service; or (j) may cause us or our Service Providers to lose any of the services from our internet service providers, payment processors, or other vendors. We encourage you to provide notice to us by the methods described in Section 6 of the General Terms above of any violations of the General Terms or the Agreement generally.

  • No Outside Advertising No outside advertisement for any vacancy shall be placed until the applications of present union members have been fully processed.

  • Excessive Use 4.11 If Your use of the Services is deemed by Us to be in excess of that which is normal for the Service which You have purchased, We may at Our discretion require You to move onto another Service which is more suitable for Your requirements.

  • Unauthorized Use Licensee, the Participating Institutions, or Authorized Users shall not knowingly permit anyone other than Authorized Users to access the Licensed Materials.

  • No Unauthorized Use Provider shall not use Student Data or information in a Pupil Record for any purpose other than as explicitly specified in this DPA.

Time is Money Join Law Insider Premium to draft better contracts faster.