Support Abuse Sample Clauses

Support Abuse. You agree not to harass, threaten or abuse authorized representatives of Landlord, including but not limited to tech support representatives, customer relations representatives, and sales representatives, or otherwise abuse Landlord’s support services.
AutoNDA by SimpleDocs
Support Abuse. You agree not to harass, threaten or abuse authorized rep- resentatives of RCN, including but not limited to tech support representa- tives, customer relations representatives, and sales representatives, or oth- erwise abuse RCN’s support services.

Related to Support Abuse

  • Anti-­‐Abuse Registry Operator may suspend, delete or otherwise make changes to domain names in compliance with its anti-­‐abuse policy.

  • Market Abuse 13.1 The Client acknowledges that he will not enter into any transaction which falls within the definition of market abuses of Seychelles Securities Xxx 0000 as amended. This rule applies to all forms of market abuse such as xxxxxxx xxxxxxx (an abusive exploitation of privileged confidential information), the misuse of information and directors trading in shares of their own companies;

  • Substance Abuse Program The SFMTA General Manager or designee will manage all aspects of the FTA-mandated Substance Abuse Program. He/she shall have appointing and removal authority over all personnel working for the Substance Abuse Program personnel, and shall be responsible for the supervision of the SAP.

  • Information Technology Accessibility Standards Any information technology related products or services purchased, used or maintained through this Grant must be compatible with the principles and goals contained in the Electronic and Information Technology Accessibility Standards adopted by the Architectural and Transportation Barriers Compliance Board under Section 508 of the federal Rehabilitation Act of 1973 (29 U.S.C. §794d), as amended. The federal Electronic and Information Technology Accessibility Standards can be found at: xxxx://xxx.xxxxxx-xxxxx.xxx/508.htm.

  • Substance Abuse Treatment Information Substance abuse treatment information shall be maintained in compliance with 42 C.F.R. Part 2 if the Party or subcontractor(s) are Part 2 covered programs, or if substance abuse treatment information is received from a Part 2 covered program by the Party or subcontractor(s).

  • Anti-­‐Abuse Policy i. Registry Operator’s Anti-­‐Abuse Policy will be required under the Registry Registrar Agreement and posted on the Registry Operator’s web site.

  • Fraud, Waste, and Abuse Contractor understands that HHS does not tolerate any type of fraud, waste, or abuse. Violations of law, agency policies, or standards of ethical conduct will be investigated, and appropriate actions will be taken. Pursuant to Texas Government Code, Section 321.022, if the administrative head of a department or entity that is subject to audit by the state auditor has reasonable cause to believe that money received from the state by the department or entity or by a client or contractor of the department or entity may have been lost, misappropriated, or misused, or that other fraudulent or unlawful conduct has occurred in relation to the operation of the department or entity, the administrative head shall report the reason and basis for the belief to the Texas State Auditor’s Office (SAO). All employees or contractors who have reasonable cause to believe that fraud, waste, or abuse has occurred (including misconduct by any HHS employee, Grantee officer, agent, employee, or subcontractor that would constitute fraud, waste, or abuse) are required to immediately report the questioned activity to the Health and Human Services Commission's Office of Inspector General. Contractor agrees to comply with all applicable laws, rules, regulations, and System Agency policies regarding fraud, waste, and abuse including, but not limited to, HHS Circular C-027. A report to the SAO must be made through one of the following avenues: ● SAO Toll Free Hotline: 1-800-TX-AUDIT ● SAO website: xxxx://xxx.xxxxx.xxxxx.xx.xx/ All reports made to the OIG must be made through one of the following avenues: ● OIG Toll Free Hotline 0-000-000-0000 ● OIG Website: XxxxxxXxxxxXxxxx.xxx ● Internal Affairs Email: XxxxxxxxXxxxxxxXxxxxxxx@xxxx.xxxxx.xx.xx ● OIG Hotline Email: XXXXxxxxXxxxxxx@xxxx.xxxxx.xx.xx. ● OIG Mailing Address: Office of Inspector General Attn: Fraud Hotline MC 1300 P.O. Box 85200 Austin, Texas 78708-5200

  • Catastrophic Leave Program Leave credits, as defined below, may be transferred from one or more employees to another employee, on an hour-for-hour basis, in accordance with departmental policies upon the request of both the receiving employee and the transferring employee and upon approval of the employee's appointing authority, under the following conditions:

  • SUBSTANCE ABUSE The dangers and costs that alcohol and other chemical abuses can create in the electrical contracting industry in terms of safety and productivity are significant. The parties to this Agreement resolve to combat chemical abuse in any form and agree that, to be effective, programs to eliminate substance abuse and impairment should contain a strong rehabilitation component. The local parties recognize that the implementation of a drug and alcohol policy and program must be subject to all applicable federal, state, and local laws and regulations. Such policies and programs must also be administered in accordance with accepted scientific principles, and must incorporate procedural safeguards to ensure fairness in application and protection of legitimate interests of privacy and confidentiality. To provide a drug-free workforce for the Electrical Construction Industry, each IBEW local union and NECA chapter shall implement an area-wide Substance Abuse Testing Policy. The policy shall include minimum standards as required by the IBEW and NECA. Should any of the required minimum standards fail to comply with federal, state, and/or local laws and regulations, they shall be modified by the local union and chapter to meet the requirements of those laws and regulations.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage. Measures: • As part of the SAP Security Policy, Personal Data requires at least the same protection level as “confidential” information according to the SAP Information Classification standard. • Access to Personal Data is granted on a need-to-know basis. Personnel have access to the information that they require in order to fulfill their duty. SAP uses authorization concepts that document grant processes and assigned roles per account (user ID). All Customer Data is protected in accordance with the SAP Security Policy. • All production servers are operated in the Data Centers or in secure server rooms. Security measures that protect applications processing Personal Data are regularly checked. To this end, SAP conducts internal and external security checks and penetration tests on its IT systems. • SAP does not allow the installation of software that has not been approved by SAP. • An SAP security standard governs how data and data carriers are deleted or destroyed once they are no longer required.

Time is Money Join Law Insider Premium to draft better contracts faster.