Unauthorized Conduct Clause Samples

The Unauthorized Conduct clause defines actions or behaviors that are not permitted under the agreement. It typically outlines specific activities, such as unauthorized use of confidential information, intellectual property, or company resources, and may detail the consequences of such actions, including disciplinary measures or termination of the contract. This clause serves to protect the interests of the parties by clearly establishing boundaries and deterring misconduct, thereby reducing the risk of disputes and safeguarding sensitive assets.
POPULAR SAMPLE Copied 1 times
Unauthorized Conduct. You shall not engage in, encourage, or incite any of the following conduct in connection with the Site, regardless of whether you are aware or unaware of such conduct: (a) impersonate any person or entity; (b) use, download, copy, reproduce, modify, adapt, publish, translate, create derivative works from, transmit, distribute, perform, display, or otherwise exploit the Site or any content found thereon in a manner contrary to these Terms of Use; (c) engage in activities which involve or concern decryption, security bypassing, computer, software or network hacking, data mining, harvesting of client or personal information, reverse engineering, copying, or the like; (d) gain or attempt to gain unauthorized access to computer systems, networks, information or materials through the Site; (e) use the Site or the Site’s features or servers in any manner with the intent to interrupt, damage, disable, overburden, or impair the Site or the Site’s
Unauthorized Conduct. 4.3.1 Customer will not, directly or indirectly, transmit or permit End Users to transmit, directly or indirectly, to any of Socure’s servers any Unauthorized Code. “Unauthorized Code” means any virus, software program or segment of code, or other programming design, instruction, or routine that permits unauthorized access to any Socure server, or the Services and is intended to damage, detrimentally interfere with, surreptitiously intercept, or expropriate any of the foregoing or any system, data, or personal information. 4.3.2 Customer will not (a) breach or attempt to breach the security of any network, servers, data, computers or other hardware or software relating to or used in connection with the Services or belonging to or used or leased by any other customer of Socure or any third party that is hosting or interfacing with any part of the Services; or (b) use or distribute through the Services any software, files or other tools or devices designed to interfere with or compromise the privacy, security or use of the Services or the operations or assets of any other customer of Socure or any third party. 4.3.3 Customer will not modify or tamper with the Services (including the Service Platform) in any way. Furthermore, Customer will not, and will not permit any End User to, reproduce, copy, translate, modify, adapt, create derivative works from, distribute, transmit, transfer, republish, reverse engineer, decompile, or otherwise attempt to discover any object code, compile or attempt to compile any object code from any source code, or remove or delete any portion of the Services (including the Service Platform). 4.3.4 Customer will not remove or alter any of Socure’s Marks (as defined below), or co-brand its own products, services or material with Socure’s Marks, without Socure’s prior written consent. Customer will not incorporate any of Socure’s Marks into Customer’s trademarks, service marks, company names, Internet addresses, domain names, or any other similar designations, for use on or in connection with Customer’s business or any of
Unauthorized Conduct. 5.2.1. Customer will not, directly or indirectly, transmit or permit End Users, Personnel or third parties to transmit, directly or indirectly, to any of Company’s servers any virus, software program or segment of code, or other programming design, instruction, or routine that permits unauthorized access to any Company server, or the Services and is intended to damage, detrimentally interfere with, surreptitiously intercept, or expropriate any of the foregoing or any system, data, or personal information. 5.2.2. Customer will not (a) breach or attempt to breach the security of any network, servers, data, computers or other hardware or software relating to or used in connection with the Services or belonging to or used or leased by any other customer of Company or any third party that is hosting or interfacing with any part of the Services; or (b) use or distribute through the Services any software, files, data, or other tools, devices or information designed or reasonably expected to interfere with, infringe upon or compromise the privacy of any entities, the security or use of the Services, or the operations or assets of any other customer or end user of Company or any third party.
Unauthorized Conduct. The Lessee shall not engage or authorize the following conduct: (a) Unlawful transaction, business operation, occupancy, visit or other activities (b) Conduct constituting the Lessee’s default of contract or tort that causes or may cause impairment, inconvenience, damages, etc. to users or the owner of the Lease Building or nearby land or buildings, or allowing a party who engages in such a conduct to remain in the Lease Building (c) Installation of machinery that causes noise, odor, smoke or vibration that could be heard, smelled or sensed outside of the Lease Property (d) Tort involving the Lease Property

Related to Unauthorized Conduct

  • Unauthorized Disclosure The Executive agrees and understands that in the Executive’s position with the Company, the Executive has been and will be exposed to and has and will receive information relating to the confidential affairs of the Company Group, including, without limitation, technical information, intellectual property, business and marketing plans, strategies, customer information, software, other information concerning the products, promotions, development, financing, expansion plans, business policies and practices of the Company Group and other forms of information considered by the Company Group to be confidential or in the nature of trade secrets (including, without limitation, ideas, research and development, know-how, formulas, technical data, designs, drawings, specifications, customer and supplier lists, pricing and cost information and business and marketing plans and proposals) (collectively, the “Confidential Information”). Confidential Information shall not include information that is generally known to the public or within the relevant trade or industry other than due to the Executive’s violation of this Section 4.1 or disclosure by a third party who is known by the Executive to owe the Company an obligation of confidentiality with respect to such information. The Executive agrees that at all times during the Executive’s employment with the Company and thereafter, the Executive shall not disclose such Confidential Information, either directly or indirectly, to any individual, corporation, partnership, limited liability company, association, trust or other entity or organization, including a government or political subdivision or an agency or instrumentality thereof (each a “Person”) without the prior written consent of the Company and shall not use or attempt to use any such information in any manner other than in connection with his employment with the Company, unless required by law to disclose such information, in which case the Executive shall provide the Company with written notice of such requirement as far in advance of such anticipated disclosure as possible. This confidentiality covenant has no temporal, geographical or territorial restriction. Upon termination of the Executive’s employment with the Company, the Executive shall promptly supply to the Company all property, keys, notes, memoranda, writings, lists, files, reports, customer lists, correspondence, tapes, disks, cards, surveys, maps, logs, machines, technical data and any other tangible product or document which has been produced by, received by or otherwise submitted to the Executive during or prior to the Executive’s employment with the Company, and any copies thereof in his (or reasonably capable of being reduced to his) possession; provided that nothing in this Employment Agreement or elsewhere shall prevent the Executive from retaining and utilizing: documents relating to his personal benefits, entitlements and obligations; documents relating to his personal tax obligations; his desk calendar, rolodex, and the like; and such other records and documents as may reasonably be approved by the Company.

  • Unauthorized Work The contractor is not authorized at any time to commence task order performance prior to issuance of a signed TO or other written approval provided by the CO to begin work.

  • Unauthorized Acts Each Party shall (a) notify the other Party promptly of any unauthorized possession, use, or knowledge of any Confidential Information by any person which shall become known to it, any attempt by any person to gain possession of Confidential Information without authorization or any attempt to use or acquire knowledge of any Confidential Information without authorization (collectively, "Unauthorized Access"), (b) promptly furnish to the other Party full details of the Unauthorized Access and use reasonable efforts to assist the other Party in investigating or preventing the reoccurrence of any Unauthorized Access, (c) cooperate with the other Party in any litigation and investigation against third parties deemed necessary by such Party to protect its proprietary rights, and (d) use commercially reasonable efforts to prevent a reoccurrence of any such Unauthorized Access.

  • Unauthorized Use The Participating Institutions, or the Authorized Users shall not knowingly permit anyone other than the Authorized Users to access the Licensed Materials.

  • Unauthorized Use or Disclosure The Contractor shall notify COMMERCE within five (5) working days of any unauthorized use or disclosure of any confidential information, and shall take necessary steps to mitigate the harmful effects of such use or disclosure.