Badge Misuse Sample Clauses

Badge Misuse. Attendees wearing badges from previous ConnectWise Events or falsified badges and/or sharing or swapping badges will be immediately ejected from the Event and banned from future Events. ConnectWise considers such conduct theft of service, trespassing, and fraud and will report violators to law enforcement authorities. If such conduct is discovered after an Event, violators will be invoiced according to onsite registration pricing and will be required to pay their invoice in full.
AutoNDA by SimpleDocs
Badge Misuse. Attendees wearing badges from previous CoinDesk Conferences or counterfeit or otherwise falsified badges and/or sharing or swapping badges will be immediately ejected from the Conference and banned from future Conferences. CoinDesk considers such conduct theft of service, trespassing, and fraud and will report violators to law enforcement authorities. If such conduct is discovered after any Conference, violators will be invoiced according to onsite registration pricing and will be required to pay their invoice in full in order to avoid being reported to law enforcement authorities.
Badge Misuse. Attendees wearing badges from previous THE WHISKEY CLASSIC Events or falsified badges and/or sharing or swapping badges will be immediately ejected from the Event and banned from future Events.

Related to Badge Misuse

  • Cards 2.1 The Card is a prepaid payment card which may be used to pay for goods and services at participating retailers that accept MasterCard cards located within FLORA shopping mall(s). It is designed for use only within this limited network of shops and retail locations where You are physically present. Like any payment card, We cannot guarantee that a particular retailer will accept the Card – please check with the retailer before attempting the transaction if You are unsure.

  • Misuse Any misuse of sick leave could subject the employee to any or all of the following:

  • Badges (A) Correctional officers and correctional probation officers shall be issued badges according to the following specifications:

  • Operator’s Security Contact Information Xxxxxxx X. Xxxxxxx Named Security Contact xxxxxxxx@xxxxxxxxx.xxx Email of Security Contact (000) 000-0000 Phone Number of Security Contact

  • PERSONAL INFORMATION PRIVACY AND SECURITY CONTRACT 11 Any reference to statutory, regulatory, or contractual language herein shall be to such language as in 12 effect or as amended.

  • Information Integrity and Security Contractor shall immediately notify County of any known or suspected breach of personal, sensitive and confidential information related to Contractor’s work under this Agreement.

  • HOW WE MAY USE YOUR PERSONAL INFORMATION 8.1 We will use the personal information You provide to Us to:

  • Access to Personal Information by Subcontractors Supplier agrees to require any subcontractors or agents to which it discloses Personal Information under this Agreement or under any SOW to provide reasonable assurance, evidenced by written contract, that they will comply with the same or substantially similar confidentiality, privacy and security obligations with respect to such Personal Information as apply to Supplier under this Agreement or any SOW. Supplier shall confirm in writing to DXC that such contract is in place as a condition to DXC’s approval of use of a subcontractor in connection with any SOW. Upon request of DXC, Supplier will provide to DXC a copy of the subcontract or an extract of the relevant clauses. Supplier shall ensure that any failure on the part of any subcontractor or agent to comply with the Supplier obligations under this Agreement or any SOW shall be grounds to promptly terminate such subcontractor or agent. If during the term of this Agreement or any SOW, DXC determines, in its exclusive discretion, that any Supplier subcontractor or agent cannot comply with the Supplier obligations under this Agreement or with any SOW, then DXC may terminate this Agreement in whole or in part (with respect to any SOW for which such subcontractor or agent is providing services), if not cured by Supplier within the time prescribed in the notice of such deficiency.

  • Identification Cards Identification (“ID”) cards are issued by Us for identification purposes only. Possession of any ID card confers no right to services or benefits under this Contract. To be entitled to such services or benefits, Your Premiums must be paid in full at the time that the services are sought to be received.

  • Passwords Passwords are an important aspect of computer security. A poorly chosen password may result in unauthorized access and/or exploitation of Placer County’s resources. All users, including contractors and vendors with access to the County’s systems, are responsible for the creation and protection of passwords and additionally any updates to County Password policies must be followed. Users must not use the same password for Placer County accounts and personal accounts. The reliability of passwords for maintaining confidentiality cannot be guaranteed. Always assume that someone, in addition to the intended or designated recipient, may read any and all messages and files. Any user suspecting that his/her password may have been compromised must, without delay, report the incident to Placer County IT.

Time is Money Join Law Insider Premium to draft better contracts faster.