UNAUTHORIZED USE OF SERVICES Sample Clauses

UNAUTHORIZED USE OF SERVICES. Firefly shall have the right (but not the obligation) to take protective action against Customer in order to protect Firefly’s network from any unauthorized use, which protective action may include, without limitation, the temporary blocking of Customer’s traffic until the applicable problem is resolved (in Firefly’s reasonable discretion. The Service does not support and Firefly will not accept 976/900 and such other call types in which charges are placed on an end-users bill and Firefly might be expected to act as a collection agent. Use of predictive dialers for more than five percent (5%) of all calls made is prohibited with Firefly’s written consent.
AutoNDA by SimpleDocs
UNAUTHORIZED USE OF SERVICES. ANZA ELECTRIC shall have the right (but not the obligation) to take protective action against Customer in order to protect ANZA ELECTRIC’s network from any unauthorized use, which protective action may include, without limitation, the temporary blocking of Customer’s traffic until the applicable problem is resolved (in ANZA ELECTRIC’s reasonable discretion. The Service does not support and ANZA ELECTRIC will not accept 976/900 and such other call types in which charges are placed on an end-user’s xxxx and ANZA ELECTRIC might be expected to act as a collection agent. Use of predictive dialers for more than five percent (5%) of all calls made is prohibited with ANZA ELECTRIC’s written consent.
UNAUTHORIZED USE OF SERVICES. Except as provided herein, Customer, and not Company, shall bear the risk of loss arising from any unauthorized or fraudulent usage of the Equipment or any services provided by Company to Customer. Company reserves the right, but is not required, to take any and all action it deems appropriate (including blocking access to particular calling numbers or geographic areas) to prevent or terminate any fraud or abuse, or any use thereof, provided, however, that any such action shall be consistent with applicable federal and state laws, rules, and regulations. Notwithstanding the foregoing, Customer shall not be liable for unauthorized or fraudulent usage to the extent that (i) Customer has previously notified Company of the problem in writing; (ii) the problem was within Company’s reasonable ability to correct or prevent, and (iii) Company negligently or willfully fails to correct or prevent such unauthorized or fraudulent usage.
UNAUTHORIZED USE OF SERVICES. Client shall bear the entire responsibility for, and risk of loss arising from, unauthorized, abusive, or fraudulent use of the Services. celito reserves the right, but is not required, to take any and all action it deems appropriate (including blocking access to the Services) to prevent any fraud or abuse in connection with the Services.
UNAUTHORIZED USE OF SERVICES. Customer, and not Carousel, shall bear the risk of loss and assume all liability arising from any unauthorized or fraudulent usage of Services provided under the SA to Customer. Carousel reserves the right, but is not required, to take any and all action it deems appropriate (including blocking access to calling numbers or geographic areas) to prevent or terminate any fraud or abuse in connection with the Services, or any use thereof, provided, however, that any such action shall be consistent with applicable federal and state laws, rules, and regulations. Any such action by Customer shall be deemed a material breach of the SA by Customer.
UNAUTHORIZED USE OF SERVICES. Customer and its Users shall knowingly use the Services only for lawful purposes. AT&T shall cooperate with Customer to implement security procedures necessary to limit access to and use of the Services to Customer’s authorized users. AT&T shall promptly report to Customer any incidents of suspected unauthorized access, and shall curtail access to or use of the Services from any Customer (including Users’) locations promptly upon Customer’s request. Customer shall maintain a procedure external to the Services for reconstruction of lost or altered files, data or programs.
UNAUTHORIZED USE OF SERVICES. For certain services (including, but not limited to Over the Phone Interpreter Services, Video Remote Interpreter Services) CLIENT may be issued a unique CLIENT Identification Number (“CID”). CLIENT agrees to safeguard its CID against use by unauthorized persons. CLIENT shall be solely and fully responsible for charges resulting from use of its CID, whether or not such use is authorized. Check if applicable to this AGREEMENT (completed by MASTERWORD representative).
AutoNDA by SimpleDocs
UNAUTHORIZED USE OF SERVICES. Customer shall bear the entire responsibility for, and risk of loss arising from, unauthorized, abusive, or fraudulent use of the Services. KsFiberNet reserves the right, but is not required, to take any and all action it deems appropriate (including blocking access to the Services) to prevent any fraud or abuse in connection with the Services.
UNAUTHORIZED USE OF SERVICES a) Except as provided in subsection (b) below, Client, and not BBS, shall bear the risk of loss arising from any unauthorized or fraudulent usage of Services provided under the Agreement to Client. BBS reserves the right, but is not required, to take any and all action it deems appropriate to prevent or terminate any fraud or abuse in connection with the Services, or any use thereof, provided, however, that any such action shall be consistent with applicable federal and state laws, rules, and regulations.
UNAUTHORIZED USE OF SERVICES. Customer will not use Services: (a) for fraudulent, abusive, unlawful or destructive purposes, including unauthorized or attempted unauthorized access to, or alteration, abuse or destruction of, any Bluepeak or third party information; (b) in any manner that causes interference with Bluepeak’s or another’s use of the Bluepeak- provided network; or (c) for any other purpose not specifically authorized by this Agreement. Customer will cooperate promptly with Bluepeak to prevent third parties from gaining unauthorized access to the Services via Customer’s facilities. Bluepeak shall have the right (but not the obligation) to take protective action against Customer in order to protect Bluepeak’s network from any unauthorized use, which protective action may include, without limitation, the temporary blocking of Customer’s traffic until the applicable problem is resolved in Bluepeak’s reasonable discretion.
Time is Money Join Law Insider Premium to draft better contracts faster.