Abuse of Computer Resources Sample Clauses

Abuse of Computer Resources. Abuse of Diocese of Orlando computer resources are prohibited. This abuse includes, but is not limited to, the following:
AutoNDA by SimpleDocs

Related to Abuse of Computer Resources

  • Use of Communication Services The Website may contain bulletin board services, chat areas, news groups, forums, communities, personal web pages, calendars, blog comment sections and/or other message or communication facilities designed to enable you to communicate with the public at large or with a group (collectively, “Communication Services”), you agree to use the Communication Services only to post, send and receive messages and material that are proper and related to the particular Communication Service. By way of example, and not as a limitation, you agree that when using a Communication Service, you will not: defame, abuse, harass, stalk, threaten or otherwise violate the legal rights (such as rights of privacy and publicity) of others; publish, post, upload, distribute or disseminate any inappropriate, profane, defamatory, infringing, obscene, indecent or unlawful topic, name, material or information; upload files that contain software or other material protected by intellectual property laws (or by rights of privacy of publicity) unless you own or control the rights thereto or have received all necessary consents; upload files that contain viruses, corrupted files, or any other similar software or programs that may damage the operation of another's computer; advertise or offer to sell or buy any goods or services for any business purpose, unless such Communication Service specifically allows such messages; conduct or forward surveys, contests, pyramid schemes or chain letters; download any file posted by another user of a Communication Service that you know, or reasonably should know, cannot be legally distributed in such manner; falsify or delete any author attributions, legal or other proper notices or proprietary designations or labels of the origin or source of software or other material contained in a file that is uploaded, restrict or inhibit any other user from using and enjoying the Communication Services; violate any code of conduct or other guidelines which may be applicable for any particular Communication Service; harvest or otherwise collect information about others, including e-mail addresses, without their consent; violate any applicable laws or regulations. The Company has no obligation to monitor the Communication Services. However, the Company reserves the right to review materials posted to a Communication Service and to remove any materials in its sole discretion. The Company reserves the right to terminate your access to any or all of the Communication Services at any time without notice for any reason whatsoever. The Company reserves the right at all times to disclose any information as necessary to satisfy any applicable law, regulation, legal process or governmental request, or to edit, refuse to post or to remove any information or materials, in whole or in part, in the Company’s sole discretion. Always use caution when giving out any personally identifying information about yourself in any Communication Service. The Company does not control or endorse the content, messages or information found in any Communication Service and, therefore, the Company specifically disclaims any liability with regard to the Communication Services and any actions resulting from your participation in any Communication Service. Managers and hosts are not authorized the Company spokespersons, and their views do not necessarily reflect those of the Company. Materials uploaded to a Communication Service may be subject to posted limitations on usage, reproduction and/or dissemination. You are responsible for adhering to such limitations if you upload the materials.

  • Use of Customer Name Contractor may use County’s name without County’s prior written consent only in Contractor’s customer lists. Any other use of County’s name by Contractor must have the prior written consent of County.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • Use of Software Any software that is available on the Services ("Software") is the copyrighted work of Red Hat and/or its licensors. Copying or reproducing the Software to any other server or location for further reproduction or redistribution is strictly prohibited, unless such reproduction or redistribution is permitted by a license agreement accompanying such Software. You may not create derivative works of the Software, or attempt to decompile or reverse-engineer the Software unless otherwise permitted by law. Use of the Software is subject to the license terms of any license agreement that may accompany or is provided with the Software. You may not download any Software until you have read and accepted the terms of the accompanying software license. WITHOUT LIMITING THE FOREGOING, THE SOFTWARE IS WARRANTED, IF AT ALL, ONLY ACCORDING TO THE TERMS OF THE SEPARATE LICENSE AGREEMENT ACCOMPANYING THE SOFTWARE. EXCEPT AS WARRANTED IN SUCH LICENSE AGREEMENT, RED HAT, ITS PARENT, SUBSIDIARY, AND AFFILIATE COMPANIES, AND ITS LICENSORS DISCLAIM ALL WARRANTIES AND CONDITIONS WITH REGARD TO THE SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT, TO THE MAXIMUM EXTENT PERMITTED BY LAW.

  • Contact Information for Privacy and Security Officers and Reports 2.1 Business Associate shall provide, within ten (10) days of the execution of this Agreement, written notice to the Contract or Grant manager the names and contact information of both the HIPAA Privacy Officer and HIPAA Security Officer of the Business Associate. This information must be updated by Business Associate any time these contacts change.

  • Use of Cookies 5.1 We use cookies to ensure that our website works effectively and to support your trading activities. Cookies are small text files sent from our web server to your computer. Our cookies do not contain any personal data, account numbers, or passwords.

  • Updating Contact Information I understand and agree that I am responsible for keeping Lock Haven University records up to date with my current physical addresses, email addresses, and phone numbers by following the procedure at MyHaven Change of Address/ Phone Form. The linked procedure is incorporated herein by reference. Upon leaving Lock Haven University for any reason, it is my responsibility to provide Lock Haven University with updated contact information for purposes of continued communication regarding any amounts that remain due and owing to Lock Haven University. ENTIRE AGREEMENT This agreement supersedes all prior understandings, representations, negotiations and correspondence between the student and Lock Haven University constitutes the entire agreement between the parties with respect to the matters described, and shall not be modified or affected by any course of dealing or course of performance. This agreement may be modified by Lock Haven University if the modification is signed by me. Any modification is specifically limited to those policies and/or terms addressed in the modification. FINANCIAL AID I understand that aid described as “estimated” on my Financial Aid Award does not represent actual or guaranteed payment, but is an estimate of the aid I may receive if I meet all requirements stipulated by that aid program. I understand that my Financial Aid Award is contingent upon my continued enrollment and attendance in each class upon which my financial aid eligibility was calculated. If I drop any class before completion, I understand that my financial aid eligibility may decrease and some or all of the financial aid awarded to me may be revoked. If some or all of my financial aid is revoked because I dropped or failed to attend class, I agree to repay all revoked aid that was disbursed to my account and resulted in a credit balance that was refunded to me. I agree to allow financial aid I receive to pay any and all charges assessed to my account at Lock Haven University such as tuition, fees, campus housing and meal plans, student health insurance, parking permits, service fees, fines, bookstore charges, or any other amount, in accordance with the terms of the aid. Federal Aid: I understand that any federal Title IV financial aid that I receive, except for Federal Work Study wages, will first be applied to any outstanding balance on my account for tuition, fees, room and board. Title IV financial aid includes aid from the Pell Grant, Supplemental Educational Opportunity Grant (SEOG), Direct Loan, PLUS Loan, Xxxxxxx Loan, and TEACH Grant programs. I authorize Lock Haven University to apply my Title IV financial aid to other charges assessed to my student account such as student health insurance, parking permits, bookstore charges, service fees and fines, and any other education related charges. I may withdraw it at any time by notifying the Financial Aid Office in writing. Prizes, Awards, Scholarships, Grants: I understand that all prizes, awards, scholarships and grants awarded to me by Lock Haven University will be credited to my student account and applied toward any outstanding balance. I further understand that my receipt of a prize, award, scholarship or grant is considered a financial resource according to federal Title IV financial aid regulations, and may therefore reduce my eligibility for other federal and/or state financial aid (i.e., loans, grants, Federal Work Study) which, if already disbursed to my student account, may need to be reversed and returned to the aid source.

  • Use of Customer Statements The Contractor shall not use any statement attributable to the Customer or its employees for the Contractor’s promotions, press releases, publicity releases, marketing, corporate communications, or other similar communications, without first notifying the Customer’s Contract Manager and securing the Customer’s prior written consent.

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • Access to Information Systems Access, if any, to DXC’s Information Systems is granted solely to perform the Services under this Order, and is limited to those specific DXC Information Systems, time periods and personnel as are separately agreed to by DXC and Supplier from time to time. DXC may require Supplier’s employees, subcontractors or agents to sign individual agreements prior to access to DXC’s Information Systems. Use of DXC Information Systems during other time periods or by individuals not authorized by DXC is expressly prohibited. Access is subject to DXC business control and information protection policies, standards and guidelines as may be modified from time to time. Use of any other DXC Information Systems is expressly prohibited. This prohibition applies even when an DXC Information System that Supplier is authorized to access, serves as a gateway to other Information Systems outside Supplier’s scope of authorization. Supplier agrees to access Information Systems only from specific locations approved for access by DXC. For access outside of DXC premises, DXC will designate the specific network connections to be used to access Information Systems.

Time is Money Join Law Insider Premium to draft better contracts faster.