Misuse of ICT Sample Clauses

Misuse of ICT. Under no circumstances should ICT be used to facilitate behaviour which is either inappropriate in the College environment or illegal. Refer to the document ‘Misdemeanors and Recommended Consequences Regarding the Use of Netb ooks , No t e bo o k s and Related ICT Facilities’.
AutoNDA by SimpleDocs
Misuse of ICT. 6.1 Users of WBC ICT facilities shall not:- • use ICT to engage in any criminal activity • use ICT to access or distribute any unsuitable materials (e.g. racist, pornographic, media promoting violence etc.) • wilfully try to access systems or information for which they are not authorised, or to assist others to do so • fraudulently use or access any system or information, or fraudulently amend any records • use the Council ICT systems for their own business purposes, or for monetary gain • knowingly infringe copyright laws • switch off, bypass or ignore security controls or restrictions • take actions that waste time or resources (e.g. sending unsolicited emails to large groups of people) • make inappropriate or excessive use of Council systems for private or non- council use.

Related to Misuse of ICT

  • Misuse of TINs If the requester discloses or uses TINs in violation of federal law, the requester may be subject to civil and criminal penalties. Specific Instructions Line 1 You must enter one of the following on this line; do not leave this line blank. The name should match the name on your tax return. If this Form W-9 is for a joint account (other than an account maintained by a foreign financial institution (FFI)), list first, and then circle, the name of the person or entity whose number you entered in Part I of Form W-9. If you are providing Form W-9 to an FFI to document a joint account, each holder of the account that is a U.S. person must provide a Form W-9.

  • Unauthorised Use of Intellectual Property a) The Supplier/Service Provider agrees to notify Transnet in writing of any conflicting uses of, and applications of registrations of Patents, Designs and Trade Marks or any act of infringement, unfair competition or passing off involving the Intellectual Property of Transnet of which the Supplier/Service Provider acquires knowledge and Transnet shall have the right, as its own option, to proceed against any party infringing its Intellectual Property.

  • No Improper Use of Materials During his or her employment with the Company, Employee will not improperly use or disclose any Confidential Information or trade secrets, if any, of any former employer or any other person to whom Employee has an obligation of confidentiality, and Employee will not bring onto the premises of the Company any unpublished documents or any property belonging to any former employer or any other person to whom Employee has an obligation of confidentiality unless consented to in writing by that former employer or person.

  • No Unauthorized Use or Disclosure Executive agrees that he will not, at any time during or after Executive’s employment by Company, make any unauthorized disclosure of, and will prevent the removal from Company premises of, Confidential Information or Work Product of Company (or its affiliates), or make any use thereof, except in the carrying out of Executive’s responsibilities during the course of Executive’s employment with Company. Executive shall use commercially reasonable efforts to cause all persons or entities to whom any Confidential Information shall be disclosed by him hereunder to observe the terms and conditions set forth herein as though each such person or entity was bound hereby. Executive shall have no obligation hereunder to keep confidential any Confidential Information if and to the extent disclosure thereof is specifically required by law; provided, however, that in the event disclosure is required by applicable law, Executive shall provide Company with prompt notice of such requirement prior to making any such disclosure, so that Company may seek an appropriate protective order. At the request of Company at any time, Executive agrees to deliver to Company all Confidential Information that he may possess or control. Executive agrees that all Confidential Information of Company (whether now or hereafter existing) conceived, discovered or made by him during the period of Executive’s employment by Company exclusively belongs to Company (and not to Executive), and Executive will promptly disclose such Confidential Information to Company and perform all actions reasonably requested by Company to establish and confirm such exclusive ownership. Affiliates of Company shall be third party beneficiaries of Executive’s obligations under this Article 6. As a result of Executive’s employment by Company, Executive may also from time to time have access to, or knowledge of, Confidential Information or Work Product of third parties, such as customers, suppliers, partners, joint venturers, and the like, of Company and its affiliates. Executive also agrees to preserve and protect the confidentiality of such third party Confidential Information and Work Product to the same extent, and on the same basis, as Company’s Confidential Information and Work Product.

  • Use of Intellectual Property The Adviser grants to the Sub-Adviser a sublicense to use the trademarks, service marks, logos, names, or any other proprietary designations of the Adviser (“AdvisorShares Marks”) on a non-exclusive basis. The Sub-Adviser will acquire no rights in the AdvisorShares Marks, and all goodwill of the AdvisorShares Marks shall inure to and remain with the Adviser. The Sub-Adviser agrees that neither it, nor any of its affiliates, will knowingly in any way refer directly or indirectly to its relationship with the Trust, the Fund(s), the Adviser or any of their respective affiliates or use AdvisorShares Marks in offering, marketing or other promotional materials without the prior express written consent of the Adviser, which approval will not be unreasonably withheld or delayed, except as required by rule, regulation or upon the request of a governmental authority. Notwithstanding the forgoing, the Sub-Adviser and its affiliates may, without obtaining the Adviser’s prior approval, refer directly or indirectly to its relationship with the Trust, the Fund(s), the Adviser or any of their respective affiliates and use AdvisorShares Marks in offering, marketing or other promotional materials provided that such materials were previously approved by the Adviser and remain in substantially the same form.

  • No Use of Name Supplier shall not use, or permit the use of, the name, trade name, service marks, trademarks, or logo of EY or of any EY Network Member in any form of publicity, press release, advertisement, or otherwise without EY’s prior written consent.

  • No Misuse of Water Not to misuse or permit to be misused the water supply to the said Apartment.

  • No Unauthorized Use of Prospectus The Company has not distributed and, prior to the later to occur of (i) the Closing Time and (ii) completion of the distribution of the Securities, will not distribute any prospectus (as such term is defined in the 1933 Act and the 1933 Act Regulations) in connection with the offering and sale of the Securities other than the Registration Statement, any preliminary prospectus, the Prospectus or other materials, if any, permitted by the 1933 Act or by the 1933 Act Regulations and approved by the Representatives.

  • Use of Technology Participants are subject to all existing laws (federal and state) and University regulations and policies on use of technology, including not only those laws and regulations that are specific to computers and networks, but also those that may apply generally to personal conduct such as:  UC Electronic Communications Policy: xxxx://xxxxxx.xxxx.xxx/doc/7000470/ElectronicCommunications  UCLA E-mail Policy and Guidelines: xxxx://xxx.xxxxxxxxxxxxx.xxxx.xxx/app/Default.aspx?&id=455  IT Services Acceptable Use Policy: xxxx://xxx.xxx.xxxx.xxx/policies/aupdetail.html  The UC Policy on Copyright Ownership: xxxx://xxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx.xxx/resources/copyright-ownership.html  Bruin OnLine Service Level Agreement: xxxx://xxx.xxx.xxxx.xxx/policies/BOL_SLA.pdf Any violation may result in technology related privileges being restricted or revoked and may also result in The University undertaking disciplinary or civil action. If the violation constitutes a criminal offense, appropriate legal action may be taken.

  • Prohibited use of card (a) You must not use the card, and/or otherwise operate the card account to pay the current balance.

Time is Money Join Law Insider Premium to draft better contracts faster.