System Abuse Sample Clauses

System Abuse. You may not use the Mail Services in a way that creates technical disturbances for other Vaioni mail customers or for the Vaioni systems generally. Specifically, but without limitation:
AutoNDA by SimpleDocs
System Abuse. Without limitation, you agree not undertake any other activity which may adversely affect the operation or enjoyment of this Site by any other person. You may not reproduce, sell, resell, or otherwise exploit any resource, or access to any resource, contained on this Site.
System Abuse. You shall not use a SharePoint Private Cloud Services by publishing your login information. Any scripts you use in connection with your SharePoint Services must be written such that they do not consume a disproportionate amount of computing and bandwidth resources. Using the SharePoint Private Cloud Services in a way that creates operational disturbances for other SherWeb SharePoint customers or for the SherWeb systems generally shall be deemed consuming a disproportionate amount of computing and bandwidth resources.
System Abuse. You may not reproduce, sell, resell or otherwise exploit any resource, or access to any resource, contained on this Service. • You are prohibited from using any services or facilities provided in connection with this Service to compromise security or tamper with system resources and/or accounts. The use or distribution of tools designed for compromising security (e.g. password guessing programs, cracking tools or network probing tools) is strictly prohibited.
System Abuse. Franchisee shall not abuse CTZAPP system, or any other system accessible through the internet to CTZAPP, by casing any harm to the system so that it inhibits or negatively impacts the ability of other users to effectively use such system. Franchisee further agrees not to compromise or attempt to violate security at CTZAPP or elsewhere, including but not limited to, attempted access of any data, server, or account that you are not expressly or authorized to access.
System Abuse. You may not use the Mail Services in a way that creates technical disturbances for other Supplier’s mail customers or for the Supplier’s systems generally. Specifically, but without limitation:

Related to System Abuse

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization. Measures: • Multiple authorization levels are used when granting access to sensitive systems, including those storing and processing Personal Data. Authorizations are managed via defined processes according to the SAP Security Policy • All personnel access SAP’s systems with a unique identifier (user ID). • SAP has procedures in place so that requested authorization changes are implemented only in accordance with the SAP Security Policy (for example, no rights are granted without authorization). In case personnel leaves the company, their access rights are revoked. • SAP has established a password policy that prohibits the sharing of passwords, governs responses to password disclosure, and requires passwords to be changed on a regular basis and default passwords to be altered. Personalized user IDs are assigned for authentication. All passwords must fulfill defined minimum requirements and are stored in encrypted form. In the case of domain passwords, the system forces a password change every six months in compliance with the requirements for complex passwords. Each computer has a password-protected screensaver. • The company network is protected from the public network by firewalls. • SAP uses up–to-date antivirus software at access points to the company network (for e-mail accounts), as well as on all file servers and all workstations. • Security patch management is implemented to provide regular and periodic deployment of relevant security updates. Full remote access to SAP’s corporate network and critical infrastructure is protected by strong authentication.

  • Connectivity User is solely responsible for providing and maintaining all necessary electronic communications with Exchange, including, wiring, computer hardware, software, communication line access, and networking devices.

Time is Money Join Law Insider Premium to draft better contracts faster.