Forgery or Impersonation Sample Clauses

Forgery or Impersonation. Adding, removing or modifying identifying network, message or article header information in an effort to deceive or mislead is prohibited while using service. Attempting to impersonate any person by using forged headers or other identifying information is prohibited.
AutoNDA by SimpleDocs
Forgery or Impersonation. You agree not to add, remove, modify or forge any message header, network header, TCP/IP packet header or any part of any header or information in any transmission (including any email, upload, posting or other transmission), originating or passing through Our services, in an effort to deceive or mislead another; impersonating or attempting to impersonate any person or entity in any transmission (including any email, upload, posting or other transmission) originating or passing through Our services; misleading or attempting to mislead any person or entity, by use of incorrect identifying information. The use of anonymous re-mailers or nicknames does not constitute a violation hereunder. You shall be required to maintain a policy requiring proper “From” and/or “Reply To” headers on all email and Usenet postings.
Forgery or Impersonation. Adding, removing or modifying identifying information (including any network header information) in an effort to receive or mislead or attempting to impersonate any person by using forged headers or other identifying information.

Related to Forgery or Impersonation

  • Passive NFFE A “Passive NFFE” means any NFFE that is not (i) an Active NFFE, or (ii) a withholding foreign partnership or withholding foreign trust pursuant to relevant U.S. Treasury Regulations.

  • NO HARDSTOP/PASSIVE LICENSE MONITORING Unless an Authorized User is otherwise specifically advised to the contrary in writing at the time of order and prior to purchase, Contractor hereby warrants and represents that the Product and all Upgrades do not and will not contain any computer code that would disable the Product or Upgrades or impair in any way its operation based on the elapsing of a period of time, exceeding an authorized number of copies, advancement to a particular date or other numeral, or other similar self-destruct mechanisms (sometimes referred to as “time bombs,” “time locks,” or “drop dead” devices) or that would permit Contractor to access the Product to cause such disablement or impairment (sometimes referred to as a “trap door” device). Contractor agrees that in the event of a breach or alleged breach of this provision that Authorized User shall not have an adequate remedy at law, including monetary damages, and that Authorized User shall consequently be entitled to seek a temporary restraining order, injunction, or other form of equitable relief against the continuance of such breach, in addition to any and all remedies to which Authorized User shall be entitled.

  • Assaults An employee who is assaulted while in the performance of assigned duties shall promptly report the assault to the Employer. The Employer shall promptly investigate the incident and render such assistance as necessary under the circumstances, including reporting and cooperating with law enforcement authorities.

  • Plagiarism The appropriation of another person's ideas, processes, results, or words without giving appropriate credit.

  • COUNTERFEIT PARTS Seller represents and warrants that it has policies and procedures in place to ensure that none of the Goods furnished under this Order are “suspect/counterfeit parts” and certifies, to the best of its knowledge and belief that no such “suspect/counterfeit parts” have been or are being furnished to Buyer by Seller. “Suspect/counterfeit parts” are parts that may be of new manufacture, but are misleadingly labeled to provide the impression they are of a different class or quality or from a different source than is actually the case. They also include refurbished parts, complete with false labeling, that are represented as new parts or any parts that are designated as suspect by the U.S. Government, such as parts listed in alerts published by the Defense Contract Management Agency under the Government-Industry Data Exchange Program (GIDEP). Parts furnished under this Order shall be purchased directly from the Original Component Manufacturers (“OCM”)/Original Equipment Manufacturers (“OEM”) or through the OCM/OEMs Franchised Distributor. Seller shall maintain documented systems (policy, procedure, or other documented approach) that provides for prior notification to Buyer and Buyer’s written approval before parts or components are procured from sources other than OCM, OEM, or OCM or OEM’s Franchised Distributor. Seller shall provide copies of such documentation for its system upon Buyer’s request. Seller’s systems shall be consistent with applicable industry standard, for the detection and avoidance of counterfeit electronic parts, including flowing down requirements to subcontractors. If Buyer reasonably determines that Seller has supplied suspect/counterfeit parts to Buyer, Buyer shall promptly notify Seller and Seller shall immediately replace the suspect/counterfeit parts with parts acceptable to Buyer. Notwithstanding any other provision contained herein, Seller shall be liable for all costs incurred by Buyer to inspect, remove, and replace the suspect/counterfeit parts, including without limitation Buyer’s external and internal costs of removing such a counterfeit parts, of reinserting replacement parts and of any testing necessitated by the reinstallation of Seller’s goods after counterfeit parts have been exchanged. In addition, Buyer may unilaterally terminate this order for convenience depending on the impact of the delivery of suspect/counterfeit parts on the Seller’s overall performance on this order. Seller’s warranty against suspect/counterfeit parts shall survive any termination or expiration of this Order.

  • Vandalism Or Malicious Mischief This peril does not include loss to property on the "residence premises", and any ensuing loss caused by any intentional and wrongful act com- mitted in the course of the vandalism or malicious mischief, if the dwelling has been vacant for more than 60 consecutive days immediately before the loss. A dwelling being constructed is not consid- ered vacant.

  • Violence (a) The parties agree that violence shall be defined as any incident in which an employee is abused, threatened or assaulted while performing his or her work. The parties agree it includes the application of force, threats with or without weapons and severe verbal abuse. The parties agree that such incidents will not be condoned. Any employee who believes he/she has been subjected to such incident shall report this to a supervisor who will make every reasonable effort to rectify the situation. For purposes of sub- article (a) only, employees as referred to herein shall mean all employees of the Employer.

  • SEXUAL EXPLOITATION 22.1 The Contractor shall take all appropriate measures to prevent sexual exploitation or abuse of anyone by it or by any of its employees or any other persons who may be engaged by the Contractor to perform any services under the Contract. For these purposes, sexual activity with any person less than eighteen years of age, regardless of any laws relating to consent, shall constitute the sexual exploitation and abuse of such person. In addition, the Contractor shall refrain from, and shall take all appropriate measures to prohibit its employees or other persons engaged by it from, exchanging any money, goods, services, offers of employment or other things of value, for sexual favors or activities, or from engaging in any sexual activities that are exploitive or degrading to any person. The Contractor acknowledges and agrees that the provisions hereof constitute an essential term of the Contract and that any breach of this representation and warranty shall entitle UNDP to terminate the Contract immediately upon notice to the Contractor, without any liability for termination charges or any other liability of any kind.

  • Unauthorized Disclosure The Executive agrees and understands that in the Executive’s position with the Company, the Executive has been and will be exposed to and has and will receive information relating to the confidential affairs of the Company Group, including, without limitation, technical information, intellectual property, business and marketing plans, strategies, customer information, software, other information concerning the products, promotions, development, financing, expansion plans, business policies and practices of the Company Group and other forms of information considered by the Company Group to be confidential or in the nature of trade secrets (including, without limitation, ideas, research and development, know-how, formulas, technical data, designs, drawings, specifications, customer and supplier lists, pricing and cost information and business and marketing plans and proposals) (collectively, the “Confidential Information”). Confidential Information shall not include information that is generally known to the public or within the relevant trade or industry other than due to the Executive’s violation of this Section 4.1 or disclosure by a third party who is known by the Executive to owe the Company an obligation of confidentiality with respect to such information. The Executive agrees that at all times during the Executive’s employment with the Company and thereafter, the Executive shall not disclose such Confidential Information, either directly or indirectly, to any individual, corporation, partnership, limited liability company, association, trust or other entity or organization, including a government or political subdivision or an agency or instrumentality thereof (each a “Person”) without the prior written consent of the Company and shall not use or attempt to use any such information in any manner other than in connection with his employment with the Company, unless required by law to disclose such information, in which case the Executive shall provide the Company with written notice of such requirement as far in advance of such anticipated disclosure as possible. This confidentiality covenant has no temporal, geographical or territorial restriction. Upon termination of the Executive’s employment with the Company, the Executive shall promptly supply to the Company all property, keys, notes, memoranda, writings, lists, files, reports, customer lists, correspondence, tapes, disks, cards, surveys, maps, logs, machines, technical data and any other tangible product or document which has been produced by, received by or otherwise submitted to the Executive during or prior to the Executive’s employment with the Company, and any copies thereof in his (or reasonably capable of being reduced to his) possession; provided that nothing in this Employment Agreement or elsewhere shall prevent the Executive from retaining and utilizing: documents relating to his personal benefits, entitlements and obligations; documents relating to his personal tax obligations; his desk calendar, rolodex, and the like; and such other records and documents as may reasonably be approved by the Company.

  • Violence in the Workplace (a) The parties agree that violence shall be defined as any incident in which an employee is abused, threatened or assaulted while performing his or her work. The parties agree it includes the application of force, threats with or without weapons and severe verbal abuse. The parties agree that such incidents will not be condoned. Any employee who believes he/she has been subjected to such incident shall report this to a supervisor who will make every reasonable effort to rectify the situation. For purposes of sub-article (a) only, employees as referred to herein shall mean all employees of the Employer notwithstanding Article 2.12.

Time is Money Join Law Insider Premium to draft better contracts faster.