Social Networks Sample Clauses

Social Networks. 7.1. Our website and mobile or web-based applications may provide you with social plug-ins from various social networks (such as Facebook, LinkedIn and Twitter). If you choose to interact with a social network, your activity on our website or via our mobile or web-based applications will also be made available to social networks such as Facebook and Twitter.
AutoNDA by SimpleDocs
Social Networks. Regular promotion via social networks will provide enormous potential for instant worldwide dissemination. On this communication axis, our focus will consist in posting regular results, especially pictures and short videos, to a PULSAR-branded page on social networks such as Twitter. This type of media typically generates the most online attention and increases the reach of our dissemination campaign. The Twitter handle is @H2020Pulsar or xxxxx://xxxxxxx.xxx/HPulsar.
Social Networks. The following fig.3 shows the fan participation to the Facebook ASSET page: The ASSET Facebook page reached more than 1500 montly fans.
Social Networks. The Service may include features that operate in conjunction with certain third party social networking websites, including but not limited to LinkedIn (“Social Network Features”). While you or your Users’ use of the Social Network Features is governed by these Terms, your or any User’s access and use of third party social networking sites and the services provided through the Services is governed by the terms of service and other agreements posted on those sites. We are not responsible for such use of Social Network Features.
Social Networks. “The right to freedom of opinion and expression is as much a fundamental right on its own accord as it is an “enabler” of other rights, including economic, social and cultural rights, such as the right to education and the right to take part in cultural life and to enjoy the benefits of scientific progress and its applications, as well as civil and political rights, such as the rights to freedom of association and assembly. Thus, by acting as a catalyst for individuals to exercise their right to freedom of opinion and expression, the Internet also facilitates the realization of a range of other human rights.” (Xxx, 0x00). The Human Rights Council Resolution 7/36 underscore the right to access Internet has two dimensions: access to online contents, without any restrictions except in a few limited cases permitted under international human rights law; and the availability of the necessary infrastructure and information communication technologies, such as cables, modems, computers and software, to access the internet in the first place (Rue, 2o11). According to this, the right of all individuals to seek, receive and import information and ideas of all kinds through the Internet, namely through social networks, store, make available, in quantity and diversity information and personal data related to their businesses, activities, and their personal lives; even businesses also came with a more active and intensive role and interaction with consumers in the last couple of years; it raises the question: how to identify ordinary citizens, who are making use of their right of free access and expression on Internet from those with illegal objectives, notably those using internet and social networks to cyberterrorist purposes? How to protect these human rights without giving up on individual freedom? According to Xxxxxx Xxxx, assistant director of the Cyber Division of US Federal Bureau of Investigation (FBI) social networks facilitate cyberterrorism by allowing it to become less constrained geographically and broaden the audience to their criminal actions; expects an increase D6.1 Cyber Terrorism - Stakeholder Needs and Threats Evaluation Funded by the European Commission under the Seventh Framework Programme Page 3o of 157 of cyberterrorism as the number of connected devices exceeds the number of people worldwide. "Terrorists are not only sharing ideas, they are asking for information, and to improve methods of communication. Ever safer." says Xxxxx Xxxxxxx, Deputy D...
Social Networks. From the point of view of the stakeholders that have the mission to prevent and fight against cyber offences, one of the measures to be taken could be the mandatory provision of LEA with free (unpaid) access to information stored in social network databases. This could be achieved through specific free API that would be given by the owner of the social network (Google, Facebook, Instagram,..). Please see point 1o.2.1 above, which applies to social networks as well.
Social Networks. Social networking for joint participation in projects and other school related activities are valuable experiences which should be used with permission and with caution. The following activities are deemed unsafe practices and constitute a violation of responsible use: ● to bully or threaten another person ● to cheat on assignments that are confined to individual completion ● for personal business ● to share personal information (about self or others) ● to communicate false or misleading information ● to access or demonstrate inappropriate or objectionable content Policies governing responsible behavior between adults and minors are applicable in online correspondence just as they would be with any in-person correspondence. Digital Device Use Deployment: Students and their parent/guardian must sign an agreement (located at the end of this booklet) before students will be permitted to take devices home. Students and parents/guardians are encouraged to ask questions and have a full understanding prior to signing the agreement.
AutoNDA by SimpleDocs
Social Networks. While they may be considerable disagreement on the definition of social capital, it is almost universally agreed that one of the most important components and forming elements of social capital on the subject is the social network (although bearing various different levels of importance). A network is a set of interconnected nodes that are structurally linked and communicate in certain ways. The types of nodes characterize the network, thus distinguishing one from another. In social networks, nodes are human beings or groups. All social systems are networks because they communicatively link individuals. In society we have larger connections, such of individuals, organisations, networks or social groups. A social network consists of lines (relations) and nodes (actors, groups, things, organisations, etc.) that can be defined as the pattern of linking a defined set of persons or social actors (Xxxxxxx & Xxxxxxx, 2005). It is a way to describe the value that can accrue through the network (Xxxxxxxx- Xxxxxx & Xxxxxxx, 2007). Because of their basic nature, the structure of networks cannot be studied using the same analytical tools as formal hierarchies. Research on the issue of networks and network mapping by Xxxxxx (1997) reveals that interactions and information exchange between individuals may leads to convergence of norms, values, beliefs and behaviour, which in turn may lead to the formation of interconnected groups of individuals who are quite densely connected that may also be characterised as ―cliques‖, clusters or interlocking networks. He also recognises the value of informal networks as channels and ways to promote communication, integration and novelty, either within the specific organization or even between different organisations. In this sense, the networks are viewed as structures that supplement, complement and add value to the formal organisation. It is interesting to determine how exactly these networks develop and how they interact, forming something far greater than the sum of their component parts. There exists a nesting of a) actors within organisations and
Social Networks. The Service includes features that operate in conjunction with certain third party social networking websites that you visit ("Social Network Features"). While your use of the Social Network Features is governed by this ToU, your access and use of third party social networking websites and the services provided through these websites is governed by the terms of service and other agreements posted on these websites. It is impossible for TYLT to determine in each case whether your use of the Social Network Features would cause you to violate or breach the terms of service and/or other agreements posted on these third party websites. You understand and acknowledge that your use of the Social Network Features may cause you to violate or breach the terms of service and other agreements posted on these third party websites which could result in the termination of your account and ability to access these third party websites and, in some cases, could give rise to liability for damages. YOU AGREE THAT YOU ALONE ARE RESPONSIBLE FOR YOUR USE OF THE SOCIAL NETWORK FEATURES AND THAT TYLT WILL NOT BE LIABLE TO YOU OR ANYONE ELSE FOR YOUR VIOLATION OR BREACH OF ANY TERMS OF SERVICE OR OTHER AGREEMENT THAT MAY RESULT FROM YOUR USE OF THE SOCIAL NETWORK FEATURES.
Social Networks. 8.1 To the extent that Qubeeo and/or Social Network authorise the Customer to incorporate Content into a Storyboard for public display on website or screen the Customer hereby undertakes to comply with the terms applicable to such incorporation and notified to the Customer by Qubeeo, as if Customer were a party to such terms. The Customer acknowledges that the supply of any Social Network service or content via or in connection with StoryStream shall also be subject to the terms and conditions of such Social Network’s applicable service terms in force which the Customer undertakes to comply with.
Time is Money Join Law Insider Premium to draft better contracts faster.