System Interference Sample Clauses

POPULAR SAMPLE Copied 2 times
System Interference. 4.12.1. Approved Distribution App (or its components or derivative elements) must not make changes to the user’s device outside of the app unless such change is clearly and prominently presented to the user and the user explicitly consents. This includes behavior such as replacing or reordering the default presentation of apps, widgets, or the settings on the device. If an app makes such changes with the user’s knowledge and consent, it must be clear to the user which app has made the change and the user must be able to reverse the change easily, or by uninstalling the app altogether. 4.12.2. Approved Distribution App may not request or otherwise obtain admin-access to the End User’s device. 4.12.3. Approved Distribution App must not introduce any security vulnerabilities, and must be updated as needed to maintain adequate security. 4.12.4. Approved Distribution Apps and their ads must not modify or add browser settings or bookmarks, add homescreen shortcuts, or icons on the user’s device as a service to third parties or for advertising purposes. 4.12.5. Approved Distribution Apps and their ads must not display advertisements through system level notifications on the user’s device, unless the notifications derive from an integral feature provided by the installed app (e.g., an airline app that notifies users of special deals, or a game that notifies users of in-game promotions). 4.12.6. Approved Distribution Apps must not encourage, incentivize, or mislead users into removing or disabling third-party apps.
System Interference. You agree that you shall not monitor, interfere with, or reverse engineer the technical implementation of DigiCert's Certificate Services, except upon prior written approval from DigiCert, and shall not otherwise intentionally compromise the security of the Certificate Services.
System Interference. Company and its Users shall not interfere with, circumvent, disable, or disrupt the integrity, security, or performance of the Services.
System Interference. Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law, when committed intentionally, the serious hindering without right of the functioning of a computer system by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data.

Related to System Interference

  • Interference Lessee shall use the Facility in a manner which shall not cause interference with the use or occupancy of the other portions of the Building by Lessor or others in any way. Lessee's use hereunder will be done in such a manner so as not to interfere with or impose any additional expense upon Lessor in maintaining the Building.

  • Non-Interference During the Employment Period and the Post-Termination Non-Interference Period, I shall not, directly or indirectly for my own account or for the account of any other individual or entity, engage in Interfering Activities.

  • System Use (a) An electronic site access system may be used on site, subject to the requirements of this statement. (b) The system operates via: (i) a facial recognition device; and (ii) an electronic gate. (c) The system will be installed at the access and egress point/s of the site and will only be utilised to identify presence on site. (d) The purpose for which the electronic site access system will be implemented is to ensure: (i) avoiding unauthorised access to site; (ii) confirmation and co-ordination of effort in emergency situations; and (iii) confirmation that all entrants to site have received a site specific induction; (e) The only personal data collected by the system is a site entrant’s: (i) image; (ii) first & last name; (iii) mobile phone number; (iv) email address; and (v) employer’s name. (the Collected Data) (f) The Collected Data will only be held or used for the purposes specified above, unless otherwise by consent or required by law. (g) The Employer will not use the electronic site access control system to verify who was on a site at a particular time for the purpose of: (i) evaluating whether a variation claim regarding labour costs made by a subcontractor can be substantiated; (ii) taking disciplinary action against an Employee, or assisting a subcontractor to take disciplinary action against its own employees, regarding their start and finish times; or (iii) otherwise generally tracking a worker’s movements whilst on the site.

  • System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.

  • No interference Registry Operator shall not interfere with measurement Probes, including any form of preferential treatment of the requests for the monitored services. Registry Operator shall respond to the measurement tests described in this Specification as it would to any other request from an Internet user (for DNS and RDDS) or registrar (for EPP).