Intentional Network Disruptions and Abusive Activity Sample Clauses

Intentional Network Disruptions and Abusive Activity. Using service for any activity that adversely affects the ability of other people or systems to use service or third party Internet-based resources. This specifically but without limitation includes excessive consumption of network or system resources whether intentional or unintentional. This also includes “denial of service” (DoS) attacks against another network host or individual user. Interference with or disruption of other network users, network services or network equipment is prohibited. The transmission of viruses, malware, or engaging in” mail bombing,” “chat flooding,” cybersquatting, and similar unlawful behavior is also prohibited.
AutoNDA by SimpleDocs
Intentional Network Disruptions and Abusive Activity. Using service for any activity that adversely affects the ability of other people or systems to use service or third-party Internet-based resources. This specifically, but without limitation, includes excessive consumption of network or system resources whether intentional or unintentional. This also includes denial of service (DoS) attacks against another network host or individual user. Interference with or disruption of other network users, network services or network equipment is prohibited. The transmission of viruses, malware, or engaging in mail bombing, chat flooding, cybersquatting, and similar unlawful behavior is also prohibited. Attempting to circumvent user authentication or security of any host, network, or account on ITC’s systems or the Internet at large (“cracking”). This includes scanning or probing ports without the consent of the owner of the machine being scanned. Email access may be limited from areas where ITC notices attacks to compromise customer’s accounts. ITC will provide VPN access for basic email access in these areas as needed, or the customer may use their own VPN. ITC strongly recommends customers use Encryption, VPNs, and stronger physical device security when traveling.
Intentional Network Disruptions and Abusive Activity. Using service for any activity that adversely affects the ability of other people or systems to use service or third-party Internet-based resources. This specifically, but without limitation, includes excessive consumption of network or system resources whether intentional or unintentional. This also includes denial of service (DoS) attacks against another network host or individual user. Interference with or disruption of other network users, network services or network equipment is prohibited. The transmission of viruses, malware, or engaging in mail bombing, chat flooding, cybersquatting, and similar unlawful behavior is also prohibited. Attempting to circumvent user authentication or security of any host, network, or account on ITC’s systems or the Internet at large (“cracking”). This includes scanning or probing ports without the consent of the owner of the machine being scanned.

Related to Intentional Network Disruptions and Abusive Activity

  • CHILD AND DEPENDENT ADULT/ELDER ABUSE REPORTING CONTRACTOR shall establish a procedure acceptable to ADMINISTRATOR to ensure that all employees, agents, subcontractors, and all other individuals performing services under this Agreement report child abuse or neglect to one of the agencies specified in Penal Code Section 11165.9 and dependent adult or elder abuse as defined in Section 15610.07 of the WIC to one of the agencies specified in WIC Section 15630. CONTRACTOR shall require such employees, agents, subcontractors, and all other individuals performing services under this Agreement to sign a statement acknowledging the child abuse reporting requirements set forth in Sections 11166 and 11166.05 of the Penal Code and the dependent adult and elder abuse reporting requirements, as set forth in Section 15630 of the WIC, and shall comply with the provisions of these code sections, as they now exist or as they may hereafter be amended.

  • Staffing Levels to deal with Potential Violence The Employer agrees that, where there is a risk of violence, an adequate level of trained employees should be present. The Employer recognizes that workloads can lead to fatigue and a diminished ability both to identify and to subsequently deal with potentially violent situations.

  • Particular Methods of Procurement of Consultants’ Services 1. Quality- and Cost-based Selection. Except as otherwise provided in paragraph 2 below, consultants’ services shall be procured under contracts awarded on the basis of Quality and Cost-based Selection.

  • Reporting of Non-Force Majeure Events Each Party (the “Notifying Party”) shall notify the other Parties when the Notifying Party becomes aware of its inability to comply with the provisions of this Agreement for a reason other than a Force Majeure event. The Parties agree to cooperate with each other and provide necessary information regarding such inability to comply, including the date, duration, reason for the inability to comply, and corrective actions taken or planned to be taken with respect to such inability to comply. Notwithstanding the foregoing, notification, cooperation or information provided under this Article shall not entitle the Party receiving such notification to allege a cause for anticipatory breach of this Agreement.

  • Service Jointly Provisioned with an Independent Company or Competitive Local Exchange Company Areas 4.5.1 BellSouth will in some instances provision resold services in accordance with the General Subscriber Services Tariff and Private Line Tariffs jointly with an Independent Company or other Competitive Local Exchange Carrier.

  • Prohibition on Use of Public Funds for Political Activity In performing the Services, Contractor shall comply with San Francisco Administrative Code Chapter 12G, which prohibits funds appropriated by the City for this Agreement from being expended to participate in, support, or attempt to influence any political campaign for a candidate or for a ballot measure. Contractor is subject to the enforcement and penalty provisions in Chapter 12G.

  • Prevention of Avoidance The Parties shall implement as necessary requirements to prevent Financial Institutions from adopting practices intended to circumvent the reporting required under this Agreement.

  • Serious Health Condition An illness, injury, impairment, or physical or mental condition which warrants the participation of a family member to provide care during a period of treatment or supervision and involves either inpatient care in a hospital, hospice or residential health care facility or continuing treatment or continuing supervision by a health care provider (e.g. physician or surgeon) as defined by state and federal law.

  • Benefit Level Two Health Care Network Determination Issues regarding the health care networks for the 2017 insurance year shall be negotiated in accordance with the following procedures:

  • Certification Regarding Prohibition of Certain Terrorist Organizations (Tex Gov. Code 2270) Vendor certifies that Vendor is not a company identified on the Texas Comptroller’s list of companies known to have contracts with, or provide supplies or services to, a foreign organization designated as a Foreign Terrorist Organization by the U.S. Secretary of State. Does Vendor certify? 3 Yes

Time is Money Join Law Insider Premium to draft better contracts faster.