Intentional Network Disruptions and Abusive Activity Sample Clauses

Intentional Network Disruptions and Abusive Activity. Using service for any activity that adversely affects the ability of other people or systems to use service or third party Internet-based resources. This specifically but without limitation includes excessive consumption of network or system resources whether intentional or unintentional. This also includes “denial of service” (DoS) attacks against another network host or individual user. Interference with or disruption of other network users, network services or network equipment is prohibited. The transmission of viruses, malware, or engaging in” mail bombing,” “chat flooding,” cybersquatting, and similar unlawful behavior is also prohibited.
AutoNDA by SimpleDocs
Intentional Network Disruptions and Abusive Activity. Using service for any activity that adversely affects the ability of other people or systems to use service or third-party Internet-based resources. This specifically, but without limitation, includes excessive consumption of network or system resources whether intentional or unintentional. This also includes denial of service (DoS) attacks against another network host or individual user. Interference with or disruption of other network users, network services or network equipment is prohibited. The transmission of viruses, malware, or engaging in mail bombing, chat flooding, cybersquatting, and similar unlawful behavior is also prohibited. Attempting to circumvent user authentication or security of any host, network, or account on ITC’s systems or the Internet at large (“cracking”). This includes scanning or probing ports without the consent of the owner of the machine being scanned. Email access may be limited from areas where ITC notices attacks to compromise customer’s accounts. ITC will provide VPN access for basic email access in these areas as needed, or the customer may use their own VPN. ITC strongly recommends customers use Encryption, VPNs, and stronger physical device security when traveling.
Intentional Network Disruptions and Abusive Activity. Using service for any activity that adversely affects the ability of other people or systems to use service or third-party Internet-based resources. This specifically, but without limitation, includes excessive consumption of network or system resources whether intentional or unintentional. This also includes denial of service (DoS) attacks against another network host or individual user. Interference with or disruption of other network users, network services or network equipment is prohibited. The transmission of viruses, malware, or engaging in mail bombing, chat flooding, cybersquatting, and similar unlawful behavior is also prohibited. Attempting to circumvent user authentication or security of any host, network, or account on ITC’s systems or the Internet at large (“cracking”). This includes scanning or probing ports without the consent of the owner of the machine being scanned.

Related to Intentional Network Disruptions and Abusive Activity

  • CHILD AND DEPENDENT ADULT/ELDER ABUSE REPORTING CONTRACTOR shall establish a procedure acceptable to ADMINISTRATOR to ensure that all employees, agents, subcontractors, and all other individuals performing services under this Agreement report child abuse or neglect to one of the agencies specified in Penal Code Section 11165.9 and dependent adult or elder abuse as defined in Section 15610.07 of the WIC to one of the agencies specified in WIC Section 15630. CONTRACTOR shall require such employees, agents, subcontractors, and all other individuals performing services under this Agreement to sign a statement acknowledging the child abuse reporting requirements set forth in Sections 11166 and 11166.05 of the Penal Code and the dependent adult and elder abuse reporting requirements, as set forth in Section 15630 of the WIC, and shall comply with the provisions of these code sections, as they now exist or as they may hereafter be amended.

  • Particular Methods of Procurement of Consultants’ Services 1. Quality- and Cost-based Selection. Except as otherwise provided in paragraph 2 below, consultants’ services shall be procured under contracts awarded on the basis of Quality and Cost-based Selection.

  • Reporting of Non-Force Majeure Events Each Party (the “Notifying Party”) shall notify the other Parties when the Notifying Party becomes aware of its inability to comply with the provisions of this Agreement for a reason other than a Force Majeure event. The Parties agree to cooperate with each other and provide necessary information regarding such inability to comply, including the date, duration, reason for the inability to comply, and corrective actions taken or planned to be taken with respect to such inability to comply. Notwithstanding the foregoing, notification, cooperation or information provided under this Article shall not entitle the Party receiving such notification to allege a cause for anticipatory breach of this Agreement.

  • Service Jointly Provisioned with an Independent Company or Competitive Local Exchange Company Areas 4.5.1 BellSouth will in some instances provision resold services in accordance with the General Subscriber Services Tariff and Private Line Tariffs jointly with an Independent Company or other Competitive Local Exchange Carrier.

  • Serious Health Condition An illness, injury, impairment, or physical or mental condition which warrants the participation of a family member to provide care during a period of treatment or supervision and involves either inpatient care in a hospital, hospice or residential health care facility or continuing treatment or continuing supervision by a health care provider (e.g. physician or surgeon) as defined by state and federal law.

  • Benefit Level Two Health Care Network Determination Issues regarding the health care networks for the 2017 insurance year shall be negotiated in accordance with the following procedures:

  • Certification Regarding Prohibition of Certain Terrorist Organizations (Tex Gov. Code 2270) Vendor certifies that Vendor is not a company identified on the Texas Comptroller’s list of companies known to have contracts with, or provide supplies or services to, a foreign organization designated as a Foreign Terrorist Organization by the U.S. Secretary of State. Does Vendor certify? Yes, Vendor certifies Certification Regarding Prohibition of Boycotting Israel (Tex. Gov. Code 2271) If (a) Vendor is not a sole proprietorship; (b) Vendor has ten (10) or more full-time employees; and (c) this Agreement or any agreement with a TIPS Member under this procurement has value of $100,000 or more, the following certification shall apply; otherwise, this certification is not required. Vendor certifies, where applicable, that neither the Vendor, nor any affiliate, subsidiary, or parent company of Vendor, if any, boycotts Israel, and Vendor agrees that Vendor and Vendor Companies will not boycott Israel during the term of this Agreement. For purposes of this Agreement, the term “boycott” shall mean and include refusing to deal with, terminating business activities with, or otherwise taking any action that is intended to penalize, inflict economic harm on, or limit commercial relations with Israel, or with a person or entity doing business in Israel or in an Israeli-controlled territory but does not include an action made for ordinary business purposes. When applicable, does Vendor certify? Yes, Vendor certifies 5 Certification Regarding Prohibition of Contracts with Certain Foreign-Owned Companies (Tex. Gov. 5 Code 2274) Certain public entities are prohibited from entering into a contract or other agreement relating to critical infrastructure that would grant Vendor direct or remote access to or control of critical infrastructure in this state, excluding access specifically allowed by a customer for product warranty and support purposes. Vendor certifies that neither it nor its parent company nor any affiliate of Vendor or its parent company, is (1) owned by or the majority of stock or other ownership interest of the company is held or controlled by individuals who are citizens of China, Iran, North Korea, Russia, or a designated country; (2) a company or other entity, including governmental entity, that is owned or controlled by citizens of or is directly controlled by the government of China, Iran, North Korea, Russia, or a designated country; or (3) headquartered in China, Iran, North Korea, Russia, or a designated country. For purposes of this certification, “critical infrastructure” means “a communication infrastructure system, cybersecurity system, electric grid, hazardous waste treatment system, or water treatment facility.” Vendor certifies that Vendor will not grant direct or remote access to or control of critical infrastructure, except for product warranty and support purposes, to prohibited individuals, companies, or entities, including governmental entities, owned, controlled, or headquartered in China, Iran, North Korea, Russia, or a designated country, as determined by the Governor. When applicable, does Vendor certify? Yes, Vendor certifies 5 Certification Regarding Prohibition of Discrimination Against Firearm and Ammunition Industries (Tex.

Time is Money Join Law Insider Premium to draft better contracts faster.