What Are the Intended Uses of Our Wireless Data Service? Sample Clauses

What Are the Intended Uses of Our Wireless Data Service?. The wireless data network offered or provided by Kynect is a shared resource, which each respective network operator manages for the benefit of all of its customers so that they can enjoy a consistent, high quality mobile broadband experience and a broad range of mobile Internet services, applications and content. However, certain activities and uses of the network by an individual customer or small group of customers can negatively impact the use and enjoyment of the network by others. Therefore, certain activities and uses of either carrier’s wireless data service are permitted and others are prohibited. The terms and conditions of your use of the wireless data service are set forth below. Permitted Activities on Our network offering. Our wireless data services are intended to be used for the following permitted activities: (i) web browsing; (ii) email; and (iii) intranet access if permitted by your rate plan (for example, access to corporate intranets, email, and individual productivity applications like customer relationship management, sales force, and field service automation); (iv) uploading and downloading applications and content to and from the Internet or third-party application stores, and (v) using applications and content without excessively contributing to network congestion. You agree to use Our wireless data services only for these permitted activities. Prohibited Activities on Our network: The wireless data services by Kynect are not intended to be used in any manner which has any of the following effects and such use is prohibited if it: (a) conflicts with applicable law or is otherwise unauthorized, abusive, or fraudulent, (b) hinders other customers’ access to the wireless network, (c) compromises network security or capacity, (d) excessively and disproportionately contributes to network congestion, (e) adversely impacts network service levels or legitimate data flows, (f) degrades network performance, (g) causes harm to the network or other customers, (h) is resold either alone or as part of any other good or service, (i) tethers a wireless device to a computing device (such as a computer, Smartphone, eBook or eReader, media player, laptop, or other devices with similar functions) through use of connection kits, applications, devices or accessories (using wired or wireless technology) and you have not subscribed to a specific data plan designed for this purpose, or (j) there is a specific data plan required for a particular use and yo...
AutoNDA by SimpleDocs

Related to What Are the Intended Uses of Our Wireless Data Service?

  • Exceptional Access to Thick Registration Data In case of a registrar failure, deaccreditation, court order, etc. that prompts the temporary or definitive transfer of its domain names to another registrar, at the request of ICANN, Registry Operator will provide ICANN with up-­‐to-­‐date data for the domain names of the losing registrar. The data will be provided in the format specified in Specification 2 for Data Escrow. The file will only contain data related to the domain names of the losing registrar. Registry Operator will provide the data as soon as commercially practicable, but in no event later than five (5) calendar days following ICANN’s request. Unless otherwise agreed by Registry Operator and ICANN, the file will be made available for download by ICANN in the same manner as the data specified in Section 3.1 of this Specification.

  • PROHIBITION ON CERTAIN TELECOMMUNICATIONS AND VIDEO SURVEILLANCE SERVICES OR EQUIPMENT To the extent applicable, Supplier certifies that during the term of this Contract it will comply with applicable requirements of 2 C.F.R. § 200.216.

  • Access to Personal Information by Subcontractors Supplier agrees to require any subcontractors or agents to which it discloses Personal Information under this Agreement or under any SOW to provide reasonable assurance, evidenced by written contract, that they will comply with the same or substantially similar confidentiality, privacy and security obligations with respect to such Personal Information as apply to Supplier under this Agreement or any SOW. Supplier shall confirm in writing to DXC that such contract is in place as a condition to DXC’s approval of use of a subcontractor in connection with any SOW. Upon request of DXC, Supplier will provide to DXC a copy of the subcontract or an extract of the relevant clauses. Supplier shall ensure that any failure on the part of any subcontractor or agent to comply with the Supplier obligations under this Agreement or any SOW shall be grounds to promptly terminate such subcontractor or agent. If during the term of this Agreement or any SOW, DXC determines, in its exclusive discretion, that any Supplier subcontractor or agent cannot comply with the Supplier obligations under this Agreement or with any SOW, then DXC may terminate this Agreement in whole or in part (with respect to any SOW for which such subcontractor or agent is providing services), if not cured by Supplier within the time prescribed in the notice of such deficiency.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • Use of Basement and Service Areas The basement(s) and service areas, if any, as located within the (project name), shall be earmarked for purposes such as parking spaces and services including but not limited to electric sub-station, transformer, DG set rooms, underground water tanks, pump rooms, maintenance and service rooms, fire fighting pumps and equipment's etc. and other permitted uses as per sanctioned plans. The Allottee shall not be permitted to use the services areas and the basements in any manner whatsoever, other than those earmarked as parking spaces, and the same shall be reserved for use by the association of allottees formed by the Allottees for rendering maintenance services.

  • Your Billing Rights: Keep This Document For Future Use This notice tells you about your rights and our responsibilities under the Fair Credit Billing Act.

  • Public Posting of Approved Users’ Research Use Statement The PI agrees that information about themselves and the approved research use will be posted publicly on the dbGaP website. The information includes the PI’s name and Requester, project name, Research Use Statement, and a Non-Technical Summary of the Research Use Statement. In addition, and if applicable, this information may include the Cloud Computing Use Statement and name of the CSP or PCS. Citations of publications resulting from the use of controlled-access datasets obtained through this DAR may also be posted on the dbGaP website.

  • Internet Access to Contract and Pricing Information Access by Authorized Users to Contract terms and pricing information shall be made available and publically posted on the OGS website. To that end, OGS shall publically post the Contract Pricelist, including all subsequent changes in the Contract offerings (adds, deletes, price revisions), Contractor contact information, and the Contract terms and conditions, throughout the Contract term.

  • Information and Services Required of the Owner § 3.1.1 The Owner shall provide information with reasonable promptness, regarding requirements for and limitations on the Project, including a written program which shall set forth the Owner’s objectives, constraints, and criteria, including schedule, space requirements and relationships, flexibility and expandability, special equipment, systems, sustainability and site requirements.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

Time is Money Join Law Insider Premium to draft better contracts faster.