Impersonation Sample Clauses

Impersonation. Impersonate any person or entity; falsely state or otherwise misrepresent Your affiliation with any person or entity, including US; forge headers or otherwise manipulate identifiers in order to disguise the origin of any submissions to or through the Website; or expressly state or imply that We endorse any statement You make;
AutoNDA by SimpleDocs
Impersonation. You agree that you will NOT use the Service to impersonate any person or entity in person or electronically or forge anyone else’s digital or manual signature, including, but not limited to, an official of the Provider or its employees, a forum leader, guide or host, or falsely state or otherwise misrepresent your affiliation with a person or entity. You may not appear to represent the Provider through the use of or reference to the Provider’s name in any emails without the express written consent of the Provider.
Impersonation. When accessing and/or using the Network, users are not permitted to forge other users’ names, disguise their identity, impersonate other users, or send anonymous communications.
Impersonation. You may not impersonate individuals, groups, or organizations in a manner that is intended to or does mislead, confuse, or deceive others. While you may maintain parody, fan, commentary, or newsfeed accounts, you may not do so if the intent of the account is to engage in spamming or abusive behavior. Read more about our impersonation policy. Spam and security We strive to protect people on Twitter from technical abuse and spam. To promote a stable and secure environment on Twitter, you may not do, or attempt to do, any of the following while accessing or using Twitter: • Access, tamper with, or use non-public areas of Twitter, Twitter’s computer systems, or the technical delivery systems of Twitter’s providers (except as expressly permitted by the Twitter Bug Bounty program). • Probe, scan, or test the vulnerability of any system or network, or breach or circumvent any security or authentication measures (except as expressly permitted by the Twitter Bug Bounty program). • Access or search, or attempt to access or search, Twitter by any means (automated or otherwise) other than through our currently available, published interfaces that are provided by Twitter (and only pursuant to the applicable terms and conditions), unless you have been specifically allowed to do so in a separate agreement with Twitter. Note that crawling Twitter is permissible if done in accordance with the provisions of the robots.txt file; however, scraping Twitter without our prior consent is expressly prohibited. • Forge any TCP/IP packet header or any part of the header information in any email or posting, or in any way use Twitter to send altered, deceptive, or false source-identifying information. • Interfere with or disrupt the access of any user, host or network, including, without limitation, sending a virus, overloading, flooding, spamming, mail- bombing Twitter’s services, or by scripting the creation of content in such a manner as to interfere with or create an undue burden on Twitter. Any accounts engaging in the following activities may be temporarily locked or subject to permanent suspension: • Malware/Phishing: You may not publish or link to malicious content intended to damage or disrupt another person’s browser or computer or to compromise a person’s privacy.
Impersonation. You may not use the Service to impersonate any person or entity, or falsely state or otherwise misrepresent your affiliation with any person or entity, or to create a false identity for the purpose of misleading others. Without limiting the foregoing, you may not use invalid or forged headers, invalid or non-existent domain names or other means of deceptive addressing.
Impersonation. If Xxxxx or Xxxxxxx uses the agreed key f to authenticate a message to the other, then using a watcher, Xxxxx can compute f and forge any message. In other words, Xxxxx can impersonate the sender.
Impersonation. This can involve the portrayal of another person or entity, such as the impersonation of AOL Inc. staff or an information provider, authorized Guide or Host, or communication under a false name or a name that you are not authorized to use. Members must avoid the portrayal of AOL Inc. personnel or others persons in all forms of online communication, including, but not limited to, screen names, member profiles, chat dialogue and message postings. (vi)
AutoNDA by SimpleDocs
Impersonation. This can involve the portrayal of another person or entity, such as the impersonation of AOL, Inc. staff or an independent content provider ("ICP"), authorized Guide or Host, or communication under a false name or a name that you are not authorized to use, such as a celebrity. Members may not pretend to be AOL, Inc. personnel or other persons in any online communication, for example by using screen names, Member profiles, chat dialogue and message postings. (f) Chain Letters and Pyramid Schemes. Certain chain letters and pyramid schemes are illegal. Transmission of chain letters and pyramid schemes of any kind is not allowed on AOL. This material places an unnecessary load on our e-mail system and is considered a nuisance by many Members. Not only are chain letters (or messages that offer a product or service based on the structure of a chain letter) of questionable legality, they are a waste of resources and AOL does not permit them. (g)
Impersonation. Attempts to log on to the computer/network/Internet impersonating a system administrator or District employee, student, or individual other than oneself, will result in revocation of the user's access to computer/network/Internet. Other Security Risks. Any user identified as having had access privileges revoked or denied on another computer system may be denied access to the District’s Network/Internet.
Impersonation. The Customer will not impersonate any person, entity, or otherwise misrepresent an affiliation with any person or entity, or provide false data on any signup form, contract, or online application, including, but not limited to, fraudulent use of credit card numbers or information.
Time is Money Join Law Insider Premium to draft better contracts faster.