Unauthorised Usage Sample Clauses

The Unauthorised Usage clause defines restrictions on the use of certain materials, information, or resources, prohibiting any use that has not been expressly permitted by the agreement. Typically, this clause applies to intellectual property, confidential information, or proprietary systems, and may specify that copying, distributing, or modifying such materials without consent is not allowed. Its core function is to protect the rights of the owner by preventing misuse or unauthorized exploitation, thereby reducing the risk of infringement or loss of control over valuable assets.
Unauthorised Usage. 6.3.1 Notwithstanding any other provision of this Agreement the Reseller shall be liable for all charges incurred for the use of the Services, irrespective of whether the Services have been used by the User, its employees, agents or representatives or by any third party (including if unauthorised or fraudulently). 6.3.2 The Reseller shall be responsible for: 6.3.2.1 preventing unauthorised and fraudulent use of the Portal; 6.3.2.2 maintaining the security of all systems, network elements and equipment within its (or its employees’, agents’ or contractors’) and the Users’ control; 6.3.2.3 maintaining (and ensuring that each of User maintains) the integrity and secrecy of all passwords, log-in details and access codes used for the purposes of accessing or using the Services or any systems, network elements or equipment; and 6.3.2.4 ensuring that neither it nor its Users attempt to change any user name or password without the Supplier’s prior written consent.
Unauthorised Usage. 9.1 Any attempt to access or modify unauthorised computer system information or to interfere with normal system operations, whether on the equipment of ours or any computer system or network that is accessed by our services, may result in the suspension or termination of the Clients Services. Unauthorised activities include, but are not limited to, guessing or using passwords other than the Clients own, accessing information that does not have public permission, and accessing any system on which the Client is not welcome. 9.2 Any attempt to disrupt or interfere with users, services or equipment, may result in the termination or suspension of the Clients Service. Disruptions include, but are not limited to, distribution of unsolicited advertising or spamming, monopolisation of services, propagation of, or transmission of information or software which contains, computer worms, trojan horses, viruses or other harmful components, using the network to make unauthorised entry to any other machine accessible via our network, sending harassing or threatening e-mail and forgery or attempted forgery of e-mail messages.
Unauthorised Usage. 9.1 Any attempt to access or modify unauthorised computer system information or to interfere with normal system operations, whether on the equipment of ours or any computer system or network that is accessed by our services, may result in the suspension or termination of your access. Unauthorised activities include, but are not limited to, guessing or using passwords other than your own, accessing information that does not have public permission, and accessing any system on which you are not welcome. 9.2 Any attempt to disrupt or interfere with users, services or equipment, may result in the termination or suspension of your access. Disruptions include, but are not limited to, distribution of unsolicited advertising or spamming, monopolisation of services, propagation of, or transmission of information or software which contains, computer worms, trojan horses, viruses or other harmful components, using the network to make unauthorised entry to any other machine accessible via our network, sending harassing or threatening e-mail and forgery or attempted forgery of e-mail messages. 9.3 You will be held liable for, and indemnify Powernet for, all costs and damages, attributable to your unauthorised activities or disruptions.
Unauthorised Usage. If an End User claims that an unauthorized payment or fraudulent transaction is made via FOMO Pay platform, the Merchant shall provide relevant proof to prove that the it has been properly delivered or rendered the goods and services with respect to the order of the transaction. The proofs include but are not limited to closed circuit television record in the Merchant’s outline, as well as product names and prices. The specific type of the proof is subject to the nature of the products and shall be reasonable enough for its purpose. If the Merchant fails to provide such proof or the proof provided is not adequate or the unauthorized payment is due to the Merchant’s wilful default or negligence, the Merchant shall reimburse FOMO Pay for any losses sustained and will be netted against any amount owed by FOMO Pay to the Merchant.
Unauthorised Usage. In the course of the Challenge, Participants shall never knowingly use software or processes that have been obtained or retained either illegally or unethically.

Related to Unauthorised Usage

  • Unauthorised use We shall not be liable for any loss, liability or cost whatsoever arising from any unauthorised use of the Electronic Service. You shall on demand indemnify, protect and hold us harmless from and against all losses, liabilities, judgements, suits, actions, proceedings, claims, damages and costs resulting from or arising out of any act or omission by any person using an Electronic Service by using your designated passwords, whether or not you authorised such use.

  • Authorised Users 2.1 Subject to the Customer purchasing and using the Services in accordance with and subject to the terms and conditions of this Agreement, Boomerang hereby grants to the Customer a non-exclusive, non-transferable right to permit the Authorised Users to use the Services and the Documentation during the Subscription Term solely for the Customer's internal business operations. 2.2 The Customer undertakes that: 2.2.1 it will not allow or suffer any user subscription to be used by more than one individual Authorised User unless it has been reassigned in its entirety to another individual Authorised User, in which case the prior Authorised User shall no longer have any right to access or use the Services and/or Documentation; 2.2.2 each Authorised User shall keep a secure password for his use of the Services and Documentation, that such password shall be changed no less frequently than monthly and that each Authorised User shall keep his password confidential; 2.2.3 it shall maintain a written, up to date list of current Authorised Users and provide such list to Boomerang within 5 Business Days of Boomerang's written request at any time or times; 2.2.4 it agrees that it and all Authorised Users will follow and comply with all instructions, guidelines and/or provisions of the Documentation in relation to the use of the Services; 2.2.5 it agrees that Boomerang’s records regarding Customer’s use of the Services shall be accepted at all times as correct (save for manifest error) and that if there are any issues regarding the Services the Customer hereby consents to Boomerang accessing the Customer account through its admins to view and endeavour to resolve any such issue including permitting Boomerang to audit the use of the Services in order to gather information and establish the facts relating to such issues. Boomerang shall in any event have the right to audit Customer’s use of the Services provided that such audit may be conducted no more than once per quarter, at Boomerang's expense, and this right shall be exercised with reasonable prior notice, in such a manner as not to substantially interfere with the Customer's normal conduct of business; 2.2.6 if any of the audits referred to in clause 2.2.5 reveal that any password has been provided to any individual who is not an Authorised User, then without prejudice to Boomerang's other rights, the Customer shall promptly disable such passwords and Boomerang shall not issue any new passwords to any such individual; and 2.2.7 if any of the audits referred to in clause 2.2.5 reveal that the Customer has underpaid Fees to Boomerang, then without prejudice to Boomerang's other rights, the Customer shall pay to Boomerang an amount equal to such underpayment as calculated in accordance with the prices set out in the Customer’s UI within 10 Business Days of the date of the relevant audit. 2.3 The Customer shall not access, store, distribute or transmit any material, information, documentation, messages and/or viruses (including any destructive and/or disabling code) during the course of its use of the Services that: 2.3.1 is used in any way for, in relation to and/or in connection with emergency services (including 999 and 112 calls and/or where there could be a risk of personal injury or death) except to the extent that such use is expressly and specifically agreed by Boomerang in writing; 2.3.2 is unlawful, harmful, threatening, defamatory, obscene, infringing, harassing or racially or ethnically offensive; 2.3.3 facilitates illegal activity; 2.3.4 depicts sexually explicit images; 2.3.5 promotes unlawful violence; 2.3.6 is discriminatory based on race, gender, colour, religious belief, sexual orientation, disability; 2.3.7 is in breach of any agreement with any user, customer or client or any laws, regulations or other provisions that are applicable to the Customer, users, customers or clients in any territory; and/or 2.3.8 in a manner that is otherwise illegal or causes damage or injury to any person or property. Boomerang reserves the right, without liability (of whatever nature and/or howsoever arising) and/or prejudice of whatever nature to any of its other rights to the Customer, to disable the Customer's access to any material that breaches the provisions of this clause. 2.4 The Customer shall not except as may be allowed by any applicable law which is incapable of exclusion by agreement between the parties and except to the extent expressly permitted under this Agreement: 2.4.1 attempt to copy, modify, duplicate, create derivative works from, frame, mirror, republish, download, display, transmit, or distribute all or any portion of the Software and/or Documentation (as applicable) in any form or media or by any means; 2.4.2 attempt to reverse compile, disassemble, reverse engineer or otherwise reduce to human- perceivable form all or any part of the Software; 2.4.3 access all or any part of the Services and Documentation in order to build a product or service which competes (directly or indirectly) with the Services and/or the Documentation; 2.4.4 use the Services and/or Documentation to provide services to third parties; 2.4.5 subject to clause 21.1, license, sell, rent, lease, transfer, assign, distribute, display, disclose, or otherwise commercially exploit, or otherwise make the Services and/or Documentation available to any third party except the Authorised Users; and/or 2.4.6 attempt to obtain, or assist third parties in obtaining, access to the Services and/or Documentation, other than as provided under this clause 2; and 2.4.7 shall not use any Plug-Ins apart from expressly authorised by Boomerang and shall follow all of Boomerangs instructions and directions regarding use of such Plug-Ins including any restrictions set out in the Customer’s UI or in any communications from Boomerang to the Customer. 2.5 The Customer shall use all reasonable endeavours to prevent any unauthorised access to, or use of, the Services and/or the Documentation and, in the event of any such unauthorised access or use, promptly notify Boomerang. 2.6 The rights provided under this clause 2 are granted to the Customer only, and shall not be considered granted to any subsidiary or holding company of the Customer.

  • Unauthorized Leave Leave other than that provided for in this section may be cause for disciplinary action.

  • Unauthorized Use The Participating Institutions, or the Authorized Users shall not knowingly permit anyone other than the Authorized Users to access the Licensed Materials.

  • Unauthorised Use of Intellectual Property a) The Supplier/Service Provider agrees to notify Transnet in writing of any conflicting uses of, and applications of registrations of Patents, Designs and Trade Marks or any act of infringement, unfair competition or passing off involving the Intellectual Property of Transnet of which the Supplier/Service Provider acquires knowledge and Transnet shall have the right, as its own option, to proceed against any party infringing its Intellectual Property. b) It shall be within the sole and absolute discretion of Transnet to determine what steps shall be taken against the infringer and the Supplier/Service Provider shall co-operate fully with Transnet, at Transnet’s cost, in whatever measure including legal action to bring any infringement of illegal use to an end. c) The Supplier/Service Provider shall cooperate to provide Transnet promptly with all relevant ascertainable facts. d) If proceedings are commenced by Transnet alone, Transnet shall be responsible for all expenses but shall be entitled to all damages or other awards arising out of such proceedings. If proceedings are commenced by both Parties, both Parties will be responsible for the expenses and both Parties shall be entitled to damages or other awards arising out of proceedings.