Impermissible Uses Sample Clauses

Impermissible Uses. The College may not sell, lease, assign, revise, modify, or transfer interest in these instructional materials without permission of the Adjunct member.
AutoNDA by SimpleDocs
Impermissible Uses. Absent explicit written consent from Kymeta, the Supplier will not use or disclose the disclosing Party’s Confidential Information, in whole or in part, to:
Impermissible Uses. In addition to and not in limitation of the other restrictions on use of the Premises set forth in this Section 5, the following uses of the Premises are not considered to be “office use” and will not be permitted: (a) any use of the Premises by an organization or person enjoying sovereign or diplomatic immunity; (b) any use of the Premises by or for any medical, mental health, or dental practice; (c) any use of the Premises by or for an employment agency or bureau; (d) any use of the Premises by or for any user that distributes governmental or other payments, benefits, or information to persons that personally appear at the Premises; and (e) any other use of the Premises or any portion of the Project by any user that will attract a volume, frequency, or type of visitor or employee to the Premises or any portion of the Project or the Buildings that is inconsistent with the standards of a high quality, first-class office building in the Dublin/Pleasanton area or that will in any way impose an excessive demand or use on the facilities or services of the Premises, Building, or Project.
Impermissible Uses. IDT evaluates customer usage in comparison to typical levels of permissible usage engaged in by legitimate customers using the same Service and/or calling plan. Each of the following uses of a Service is impermissible under this Policy and considered outside of normal, individual, personal, non-commercial use: • operating a business; • operating any other enterprise, including not-for-profit or governmental; • operating a call centre; • resale to others; • auto-dialling or fax/voice blasts; • telemarketing; and • without live dialog, including use as a monitor, intercom or for transcription purposes. Over 95% of IDT’s customers use less than 3,000 minutes per month with a Service and do not have any unusual usage patterns in terms of unique numbers called, high call forwarding/transferring usage and so on. A customer’s aggregate usage may be considered outside of normal use if it exceeds 3,000 minutes per month in combination with one or more of the following calling patterns that reflect excessive: • unique numbers called; • call lengths; • call forwarding/transferring; • conference calling; • short duration calls; • number of calls made during a 24 hour period; • number of calls made during a month; • number of calls made to a conference calling service during a month; • number of calls made during business hours; • number of phone numbers called within a single destination; • number of calls terminated and re-initiated consecutively, which, in the aggregate, result in excessive call lengths during a specific time frame; or • other abnormal calling patterns indicative of an attempt to evade enforcement of this Policy (individually or collectively “Excessive Use”). IDT may also determine that abnormal, unreasonable or impermissible usage is occurring, and may take appropriate steps described below, even if the number of minutes used is not excessive, when a customer’s calling patterns during one or more months reflect Excessive Use. We may assess abnormal usage based on comparisons to the usage patterns and levels of our other customers using the same Service or calling plan. You may not use any of the Services in any way that: • is illegal, fraudulent, improper, obscene, defamatory, inappropriate or in a way which xxxxx or attempts to harm any third party; or • violates this Policy or the terms and conditions on the Website. You may not use any automated means to manipulate any of the Services or use them to violate any law, rule, regulation or any third...
Impermissible Uses you may not use the Checks or the Card to purchase securities, for internet gambling, or for any illegal activities.
Impermissible Uses. The following uses of registration information obtained from a source agency shall be deemed other than for election and governmental purposes: (a) Any communication or other use solely or partially for commercial purpose. (b) Solicitation of contributions or services for any purpose other than on behalf of a candidate or political party or in support of or opposition to a ballot measure. (c) Conducting any survey of opinions of voters other than those permitted by section 19003 (f) and (g).
Impermissible Uses. You may not use the Checks to purchase securities, for Internet gambling, or for any illegal activities.
AutoNDA by SimpleDocs
Impermissible Uses. Grant funds are not available to retire any debt, supplant or replace funds or other resources that would otherwise have been made available for the Project, to construct new buildings or remodel existing facilities, to purchase land, to purchase buildings, to provide or support for activity outside the scope or timeframe of the project, or to cover any costs incurred prior to the effective date of this contract or after termination of this contract.
Impermissible Uses. Outback facilities may not be used for partisan purposes.
Impermissible Uses. Neither Party may use the other party’s Confidential Information to compete with, or to allow others to compete with, the other Party or for any purpose not in furtherance of this MSA. In addition, each Party shall: (1) notify the other Party promptly of any material unauthorized possession, use, or attempted access to the other Party’s Confidential Information by any person or entity which may become known to such Party, (2) promptly furnish to the other Party full details of such unauthorized possession, use, or attempted access, (3) use reasonable efforts to cooperate with the other Party, at the other Party’s cost, in any litigation and investigation against third parties reasonably deemed necessary by the other Party to protect its proprietary rights in and to the Confidential Information, and (4) use its commercially reasonable efforts to prevent a recurrence of any such unauthorized possession, use, or attempted access of the other Party’s Confidential Information.
Time is Money Join Law Insider Premium to draft better contracts faster.