Unauthorised Usage Sample Clauses

The Unauthorised Usage clause defines restrictions on the use of certain materials, information, or resources, prohibiting any use that has not been expressly permitted by the agreement. Typically, this clause applies to intellectual property, confidential information, or proprietary systems, and may specify that copying, distributing, or modifying such materials without consent is not allowed. Its core function is to protect the rights of the owner by preventing misuse or unauthorized exploitation, thereby reducing the risk of infringement or loss of control over valuable assets.
Unauthorised Usage. 6.3.1 Notwithstanding any other provision of this Agreement the Reseller shall be liable for all charges incurred for the use of the Services, irrespective of whether the Services have been used by the User, its employees, agents or representatives or by any third party (including if unauthorised or fraudulently). 6.3.2 The Reseller shall be responsible for: 6.3.2.1 preventing unauthorised and fraudulent use of the Portal; 6.3.2.2 maintaining the security of all systems, network elements and equipment within its (or its employees’, agents’ or contractors’) and the Users’ control; 6.3.2.3 maintaining (and ensuring that each of User maintains) the integrity and secrecy of all passwords, log-in details and access codes used for the purposes of accessing or using the Services or any systems, network elements or equipment; and 6.3.2.4 ensuring that neither it nor its Users attempt to change any user name or password without the Supplier’s prior written consent.
Unauthorised Usage. 9.1 Any attempt to access or modify unauthorised computer system information or to interfere with normal system operations, whether on the equipment of ours or any computer system or network that is accessed by our services, may result in the suspension or termination of the Clients Services. Unauthorised activities include, but are not limited to, guessing or using passwords other than the Clients own, accessing information that does not have public permission, and accessing any system on which the Client is not welcome. 9.2 Any attempt to disrupt or interfere with users, services or equipment, may result in the termination or suspension of the Clients Service. Disruptions include, but are not limited to, distribution of unsolicited advertising or spamming, monopolisation of services, propagation of, or transmission of information or software which contains, computer worms, trojan horses, viruses or other harmful components, using the network to make unauthorised entry to any other machine accessible via our network, sending harassing or threatening e-mail and forgery or attempted forgery of e-mail messages.
Unauthorised Usage. 9.1 Any attempt to access or modify unauthorised computer system information or to interfere with normal system operations, whether on the equipment of ours or any computer system or network that is accessed by our services, may result in the suspension or termination of your access. Unauthorised activities include, but are not limited to, guessing or using passwords other than your own, accessing information that does not have public permission, and accessing any system on which you are not welcome. 9.2 Any attempt to disrupt or interfere with users, services or equipment, may result in the termination or suspension of your access. Disruptions include, but are not limited to, distribution of unsolicited advertising or spamming, monopolisation of services, propagation of, or transmission of information or software which contains, computer worms, trojan horses, viruses or other harmful components, using the network to make unauthorised entry to any other machine accessible via our network, sending harassing or threatening e-mail and forgery or attempted forgery of e-mail messages. 9.3 You will be held liable for, and indemnify Powernet for, all costs and damages, attributable to your unauthorised activities or disruptions.
Unauthorised Usage. If an End User claims that an unauthorized payment or fraudulent transaction is made via FOMO Pay platform, the Merchant shall provide relevant proof to prove that the it has been properly delivered or rendered the goods and services with respect to the order of the transaction. The proofs include but are not limited to closed circuit television record in the Merchant’s outline, as well as product names and prices. The specific type of the proof is subject to the nature of the products and shall be reasonable enough for its purpose. If the Merchant fails to provide such proof or the proof provided is not adequate or the unauthorized payment is due to the Merchant’s wilful default or negligence, the Merchant shall reimburse FOMO Pay for any losses sustained and will be netted against any amount owed by FOMO Pay to the Merchant.
Unauthorised Usage. In the course of the Challenge, Participants shall never knowingly use software or processes that have been obtained or retained either illegally or unethically.