Defamatory or Abusive Language Sample Clauses

Defamatory or Abusive Language. Using the Service to transmit, post, upload, or otherwise making available defamatory, harassing, abusive, or threatening material or language that encourages bodily harm, destruction of property or harasses another.
AutoNDA by SimpleDocs
Defamatory or Abusive Language. Using Lightwave’s network as a means to transmit or post defamatory, harassing, abusive messages or language which threatens bodily harm or destruction of property, or inappropriate language directed to minors.
Defamatory or Abusive Language. Using the Service to transmit, post, upload, or otherwise making available defamatory, harassing, abusive, or threatening material or language that encourages bodily harm, destruction of property or harasses another. Forging of Headers Forging or misrepresenting message headers, whether in whole or in part, to mask the originator of the message. Hacking Accessing illegally or without authorization computers, accounts, equipment or networks belonging to another party, or attempting to penetrate security measures of another system. This includes any activity that may be used as a precursor to an attempted system penetration, including, but not limited to, port scans, stealth scans, or other information gathering activity. Distribution of Internet Viruses, Trojan Horses, or Other Destructive Activities Distributing information regarding the creation of and sending Internet viruses, worms, Trojan Horses, pinging, flooding, mailbombing, or denial of service attacks. Also, activities that disrupt the use of or interfere with the ability of others to effectively use the service. Facilitating a Violation of this Agreement of Use Advertising, transmitting, or otherwise making available any software product, product, or service that is designed to violate this Agreement, which includes the facilitation of the means to spam, initiation of pinging, flooding, mailbombing, denial of service attacks, and piracy of software. Other Illegal Activities Using the Service in violation of applicable law and regulation, including, but not limited to, advertising, transmitting, or otherwise making available ponzi schemes, pyramid schemes, fraudulently charging credit cards, pirating software, or making fraudulent offers to sell or buy products, items, or services. Resale The sale, transfer, or rental of the Service to customers, clients or other third parties, either directly or as part of a service or product created for resale. **************************************************************** Notice of Violations Xxxx County Circuit Court requests that anyone who believes that there is a violation to contact the court immediately. Disclaimer You acknowledge
Defamatory or Abusive Language. Using the Service to transmit, post, upload, or otherwise making available defamatory, harassing, abusive, or threatening material or language that encourages bodily harm, destruction of property or harasses another. Forging of Headers Forging or misrepresenting message headers, whether in whole or in part, to mask the originator of the message. Hacking Accessing illegally or without authorization computers, accounts, equipment or networks belonging to another party, or attempting to penetrate security measures of another system. This includes any activity that may be used as a precursor to an attempted system penetration, including, but not limited to, port scans, stealth scans, or other information gathering activity. Distribution of Internet Viruses, Trojan Horses, or Other Destructive Activities Distributing information regarding the creation of and sending Internet viruses, worms, Trojan Horses, pinging, flooding, mailbombing, or denial of service attacks. Also, activities that disrupt the use of or interfere with the ability of others to effectively use the Node or any connected network, system, service, or equipment. Facilitating a Violation of this Agreement of Use Advertising, transmitting, or otherwise making available any software product, product, or service that is designed to violate this Agreement, which includes the facilitation of the means to spam, initiation of pinging, flooding, mailbombing, denial of service attacks, and piracy of software. Export Control Violations The transfer of technology, software, or other materials in violation of applicable export laws and regulations, including but not limited to the U.S. Export Administration Regulations and Executive Orders.
Defamatory or Abusive Language. Using the Service to transmit, post, upload, or otherwise make available defamatory, harassing, abusive, or threatening material or language that encourages bodily harm, destruction of property or harasses another is prohibited. Forging of Headers Forging or misrepresenting message headers, whether in whole or in part, to mask the originator of the message is prohibited. Hacking Accessing illegally or without authorization computers, accounts, equipment, or networks belonging to another party, or attempting to penetrate security measures of another system is prohibited. This includes any activity that may be used as a precursor to an attempted system penetration, including, but not limited to, port scans, stealth scans, or other information gathering activity. Distribution of Internet Viruses, Trojan Horses, or Other Destructive Activities Distributing information regarding the creation of and sending Internet viruses, worms, Trojan Horses, pinging, flooding, mail-bombing, or denial of service attacks or like matters is prohibited. Also, activities that disrupt the use of or interfere with the ability of others to effectively use the node or any connected network, system, service, or equipment. Facilitating a Violation of this Agreement of Use Advertising, transmitting, or otherwise making available any software product, product, or service that is designed to violate this Agreement, which includes the facilitation of the means to spam, initiation of pinging, flooding, mail-bombing, denial of service attacks, and piracy of software is prohibited. Other Illegal Activities Using the Service in violation of applicable local, state, and federal laws and regulations, including, but not limited to, advertising, transmitting, or otherwise making available Ponzi schemes, pyramid schemes, fraudulently charging credit cards, pirating software, or making fraudulent offers to sell or buy products, items, or services is prohibited. Resale The sale, transfer, or rental of the Service to customers, clients, or other third parties, either directly or as part of a service or product created for resale, is prohibited. Violation School Board Policy Using the Service in violation of any School Public Schools Policy with specific attention called to the following policies: IJNDB K-12 Computer/Network/Internet User Agreement, IJNDBA Staff Computer/Network/Internet User Agreement, IJNDD Social Networking Policy of the Swansea Public Schools, GBEA Staff Ethics/Conflict of Interes...
Defamatory or Abusive Language. Using the Service to transmit, post, upload, or otherwise making available defamatory, harassing, abusive, or threatening material or language that encourages bodily harm, destruction of property or harasses another. Forging of Headers Forging or misrepresenting message headers, whether in whole or in part, to mask the originator of the message. Hacking Accessing illegally or without authorization computers, accounts, equipment or networks belonging to another party, or attempting to penetrate security measures of another system. This includes any activity that may be used as a precursor to an attempted system penetration, including, but not limited to, port scans, stealth scans, or other information gathering activity.
Defamatory or Abusive Language. Using M&COL’s network as a means to transmit or post defamatory, harassing, abusive, or threatening language.
AutoNDA by SimpleDocs
Defamatory or Abusive Language. Using the Service to transmit, post, upload, or otherwise making available defamatory, harassing, abusive, or threatening material or language that encourages bodily harm, destruction of property or harasses another.  Forging of Headers Forging or misrepresenting message headers, whether in whole or in part, to mask the originator of the message.  Circumventing Xxxxx’x firewall or content filter systems Using software or any other methods (for example VPN software, TOR. This list is not exhaustive.) of circumventing the firewall or content filter systems and continue to use the internet connection is strictly prohibited.  Hacking Accessing illegally or without authorisation computers, accounts, equipment or networks belonging to another party, or attempting to penetrate security measures of another system. This includes any activity that may be used as a precursor to an attempted system penetration, including, but not limited to, port scans, stealth scans, or other information gathering activity.  Distribution of Viruses, Trojan Horses, or Other Destructive Activities Distributing information regarding the creation of and sending Internet viruses, worms, Trojan Horses, pinging, flooding, mailbombing, or denial of service attacks. Also, activities that disrupt the use of or interfere with the ability of others to effectively use the Node or any connected network, system, service, or equipment.  Facilitating a Violation of this Agreement of Use Advertising, transmitting, or otherwise making available any software product, product, or service that is designed to violate this agreement, which includes the facilitation of the means to spam, initiation of pinging, flooding, mailbombing, denial of service attacks, and piracy of software.  Other Illegal Activities Using the Service in violation of applicable law and regulation, including, but not limited to, advertising, transmitting, or otherwise making available ponzi schemes, pyramid schemes, fraudulently charging credit cards, pirating software, or making fraudulent offers to sell or buy products, items, or services.  Resale The sale, transfer, or rental of the Service to customers, clients or other third parties, either directly or as part of a service or product created for resale.
Defamatory or Abusive Language. Using TASTE MEDIA LTD’s network as a means to transmit or post defamatory, harassing, abusive, or threatening language. Forging of Headers: Forging or misrepresenting message headers, whether in whole or in part, to mask the originator of the message. Illegal or Unauthorised Access to Other Computers or Networks: Accessing illegally or without authorisation computers, accounts, or networks belonging to another party, or attempting to penetrate security measures of another individual’s system (often known as “hacking”). Also, any activity that might be used as a precursor to an attempted system penetration (i.e. port scan, stealth scan, or other information gathering activity). Distribution of Internet Viruses, Worms, Trojan Horses, or Other Destructive Activities: Distributing information regarding the creation of and sending Internet viruses, worms, Trojan horses, pinging, flooding, mail bombing, or denial of service attacks. Also, activities that disrupt the use of or interfere with the ability of others to effectively use the network or any connected network, system, service, or equipment. Facilitating a Violation of this AUP: Advertising, transmitting, or otherwise making available any software, program, product, or service that is designed to violate this AUP, which includes the facilitation of the means to Spam, initiation of pinging, flooding, mail bombing, denial of service attacks, and piracy of software. Forums, Social Media Web sites, Usenet Groups: TASTE MEDIA LTD reserves the right not to accept postings from third party web sites where we have actual knowledge that the content of the web site violates the AUP. Other Illegal Activities: Engaging in activities that are determined to be illegal, including advertising, transmitting, or otherwise making available ponzi schemes, pyramid schemes, fraudulently charging credit cards, and pirating software. Other Activities: Engaging in activities, whether lawful or unlawful, that TASTE MEDIA LTD determines to be harmful to its subscribers, operations, reputation, goodwill, or customer relations. As we have pointed out, the responsibility for avoiding the harmful activities just described rests primarily with the subscriber. TASTE MEDIA LTD will not, as an ordinary practice, monitor the communications of its subscribers to ensure that they comply with TASTE MEDIA LTD policy or applicable law. When TASTE MEDIA LTD becomes aware of harmful activities, however, it may take any action to stop the harmful a...

Related to Defamatory or Abusive Language

  • REMARKS i) The signature(s) of the grievant(s).

  • Disparaging Comments The Participant agrees that during the period of the Participant's employment with the Company and thereafter, the Participant shall not make any disparaging or defamatory comments regarding the Company or, after termination of his employment relationship with the Company, make any comments concerning any aspect of the termination of their relationship. The obligations of the Participant under this subsection shall not apply to disclosures required by applicable law, regulation or order of any court or governmental agency.

  • No Unauthorized Use or Disclosure Executive agrees that he will not, at any time during or after Executive’s employment by Company, make any unauthorized disclosure of, and will prevent the removal from Company premises of, Confidential Information or Work Product of Company (or its affiliates), or make any use thereof, except in the carrying out of Executive’s responsibilities during the course of Executive’s employment with Company. Executive shall use commercially reasonable efforts to cause all persons or entities to whom any Confidential Information shall be disclosed by him hereunder to observe the terms and conditions set forth herein as though each such person or entity was bound hereby. Executive shall have no obligation hereunder to keep confidential any Confidential Information if and to the extent disclosure thereof is specifically required by law; provided, however, that in the event disclosure is required by applicable law, Executive shall provide Company with prompt notice of such requirement prior to making any such disclosure, so that Company may seek an appropriate protective order. At the request of Company at any time, Executive agrees to deliver to Company all Confidential Information that he may possess or control. Executive agrees that all Confidential Information of Company (whether now or hereafter existing) conceived, discovered or made by him during the period of Executive’s employment by Company exclusively belongs to Company (and not to Executive), and Executive will promptly disclose such Confidential Information to Company and perform all actions reasonably requested by Company to establish and confirm such exclusive ownership. Affiliates of Company shall be third party beneficiaries of Executive’s obligations under this Article 6. As a result of Executive’s employment by Company, Executive may also from time to time have access to, or knowledge of, Confidential Information or Work Product of third parties, such as customers, suppliers, partners, joint venturers, and the like, of Company and its affiliates. Executive also agrees to preserve and protect the confidentiality of such third party Confidential Information and Work Product to the same extent, and on the same basis, as Company’s Confidential Information and Work Product.

  • ADVERTISING OR PUBLICITY CONTRACTOR shall not use the name of County, its officers, directors, employees or agents, in advertising or publicity releases or otherwise without securing the prior written consent of COUNTY in each instance.

  • Unauthorized Use or Disclosure The Contractor shall notify COMMERCE within five (5) working days of any unauthorized use or disclosure of any confidential information, and shall take necessary steps to mitigate the harmful effects of such use or disclosure.

  • No General Solicitation or Advertising in Regard to this Transaction Neither the Company nor any of its affiliates nor any person acting on its or their behalf (a) has conducted or will conduct any general solicitation (as that term is used in Rule 502(c) of Regulation D) or general advertising with respect to any of the Shares, or (b) made any offers or sales of any security or solicited any offers to buy any security under any circumstances that would require registration of the Common Stock under the Securities Act.

  • Derogatory Material No material derogatory to an employee's conduct, service, character, or personality or any material which could have an adverse effect on an employee's status shall be placed in his personnel file unless the employee has had an opportunity to review the material. The employee shall acknowledge that he has had the opportunity to review such material by affixing his signature to the copy to be filed with the express understanding that such signature in no way indicated agreement with the contents thereof. The employee shall also have the right to submit a written answer to such material and his answer shall be reviewed by the Superintendent or his designee and attached to the file copy.

  • Unauthorized Disclosure The Executive agrees and understands that in the Executive’s position with the Company, the Executive has been and will be exposed to and has and will receive information relating to the confidential affairs of the Company Group, including, without limitation, technical information, intellectual property, business and marketing plans, strategies, customer information, software, other information concerning the products, promotions, development, financing, expansion plans, business policies and practices of the Company Group and other forms of information considered by the Company Group to be confidential or in the nature of trade secrets (including, without limitation, ideas, research and development, know-how, formulas, technical data, designs, drawings, specifications, customer and supplier lists, pricing and cost information and business and marketing plans and proposals) (collectively, the “Confidential Information”). Confidential Information shall not include information that is generally known to the public or within the relevant trade or industry other than due to the Executive’s violation of this Section 4.1 or disclosure by a third party who is known by the Executive to owe the Company an obligation of confidentiality with respect to such information. The Executive agrees that at all times during the Executive’s employment with the Company and thereafter, the Executive shall not disclose such Confidential Information, either directly or indirectly, to any individual, corporation, partnership, limited liability company, association, trust or other entity or organization, including a government or political subdivision or an agency or instrumentality thereof (each a “Person”) without the prior written consent of the Company and shall not use or attempt to use any such information in any manner other than in connection with his employment with the Company, unless required by law to disclose such information, in which case the Executive shall provide the Company with written notice of such requirement as far in advance of such anticipated disclosure as possible. This confidentiality covenant has no temporal, geographical or territorial restriction. Upon termination of the Executive’s employment with the Company, the Executive shall promptly supply to the Company all property, keys, notes, memoranda, writings, lists, files, reports, customer lists, correspondence, tapes, disks, cards, surveys, maps, logs, machines, technical data and any other tangible product or document which has been produced by, received by or otherwise submitted to the Executive during or prior to the Executive’s employment with the Company, and any copies thereof in his (or reasonably capable of being reduced to his) possession; provided that nothing in this Employment Agreement or elsewhere shall prevent the Executive from retaining and utilizing: documents relating to his personal benefits, entitlements and obligations; documents relating to his personal tax obligations; his desk calendar, rolodex, and the like; and such other records and documents as may reasonably be approved by the Company.

  • ADVERTISING RESULTS The prior written approval of the Commissioner is required in order for results of the Bid to be used by the Contractor as part of any commercial advertising. The Contractor shall also obtain the prior written approval of the Commissioner relative to the Bid or Contract for press or other media releases.

  • Competitive Activities During the term of this Agreement, Consultant will not, directly or indirectly, in any individual or representative capacity, engage or participate in or provide services to any business that is competitive with the types and kinds of business being conducted by Company.

Time is Money Join Law Insider Premium to draft better contracts faster.