Systems Abuse Sample Clauses

Systems Abuse. The User shall not commit any systems abuse including, but without limitation, any excessively intensive processor use, any excessive use of disk space, any excessive use of data storage space, computer hacking, error handling or masking or any domain name service unauthorized by the Company, installing permanently running programs such as IRC robots, or the resale of CGI scripts or databases.
AutoNDA by SimpleDocs
Systems Abuse. You agree not to abuse Landlord’s system, or any other system accessible through the Internet via Landlord, by causing any harm to the system so that it inhibits or negatively impacts the ability of other users to effectively use such system. You further agree not to compromise or attempt to violate security at Landlord or elsewhere, including but not limited to, attempted access of any data, server, or account that you are not expressly authorized to access.
Systems Abuse. You agree not to abuse RCN’s system, or any other system accessible through the Internet via RCN, by causing any harm to the system so that it inhibits or negatively impacts the ability of other users to effectively use such system. You further agree not to compromise or attempt to violate security at RCN or elsewhere, including but not limited to, attempted access of any data, server, or account that you are not expressly authorized to access. RCN cable modem service is for residential use only and our network will not support or allow servers of any kind from the home.

Related to Systems Abuse

  • Systems The details of any systems work will be determined after a thorough business analysis. System's work will be billed on a time and material basis. Investors Bank provides an allowance of 10 systems hours for data extract set up and reporting extract set up. Additional hours will be billed on a time and material basis.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Configuration Management The Contractor shall maintain a configuration management program, which shall provide for the administrative and functional systems necessary for configuration identification, control, status accounting and reporting, to ensure configuration identity with the UCEU and associated cables produced by the Contractor. The Contractor shall maintain a Contractor approved Configuration Management Plan that complies with ANSI/EIA-649 2011. Notwithstanding ANSI/EIA-649 2011, the Contractor’s configuration management program shall comply with the VLS Configuration Management Plans, TL130-AD-PLN-010-VLS, and shall comply with the following:

  • Operational Support Systems (OSS 2.13.1 BellSouth has developed and made available the following electronic interfaces by which <<customer_name>> may submit LSRs electronically. LENS Local Exchange Navigation System EDI Electronic Data Interchange TAG Telecommunications Access Gateway

  • Infrastructure (a) The Borrower has and will maintain a sufficient infrastructure to conduct its business as presently conducted and as contemplated to be conducted following its execution of this Agreement.

  • Telemedicine Services This plan covers clinically appropriate telemedicine services when the service is provided via remote access through an on-line service or other interactive audio and video telecommunications system in accordance with R.I. General Law § 27-81-1. Clinically appropriate telemedicine services may be obtained from a network provider, and from our designated telemedicine service provider. When you seek telemedicine services from our designated telemedicine service provider, the amount you pay is listed in the Summary of Medical Benefits. When you receive a covered healthcare service from a network provider via remote access, the amount you pay depends on the covered healthcare service you receive, as indicated in the Summary of Medical Benefits. For information about telemedicine services, our designated telemedicine service provider, and how to access telemedicine services, please visit our website or contact our Customer Service Department.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • Streets and Municipal Services 4.1 Off-Site Disturbance Any disturbance to existing off-site infrastructure resulting from the development, including but not limited to, streets, sidewalks, curbs and gutters, street trees, landscaped areas and utilities, shall be the responsibility of the Developer, and shall be reinstated, removed, replaced or relocated by the Developer as directed by the Development Officer, in consultation with the Development Engineer.

  • System Monitoring to ensure safe and continuous operation, the Customer must monitor key services and resource use as recommended by Deswik, and provide Deswik with details of monitoring and any relevant alerts as needed. Services to be monitors include, without limitation, disk space, CPU usage, memory usage, database connectivity, and network utilization.

Time is Money Join Law Insider Premium to draft better contracts faster.