Security Violations Sample Clauses

Security Violations. 4.01 The CGA must report security violations to the CJIS Systems Officer (CSO) and the Director, FBI, along with indications of actions taken by the CGA and Contractor.
AutoNDA by SimpleDocs
Security Violations. Use of the Product to violate the security or integrity of any network, computer or communications system, software application or network or computing device.
Security Violations. BellSouth reserves the right to interview PTLLC’s employees, agents, or suppliers in the event of wrongdoing in or around BellSouth’s property or involving BellSouth’s or another collocated telecommunications carrier’s property or personnel, provided that BellSouth shall provide reasonable notice to PTLLC’s Security representative of such interview. PTLLC and its suppliers shall reasonably cooperate with BellSouth’s investigation into allegations of wrongdoing or criminal conduct committed by, witnessed by, or involving PTLLC’s employees, agents, or suppliers. Additionally, BellSouth reserves the right to xxxx PTLLC for all reasonable costs associated with investigations involving its employees, agents, or suppliers if it is established and mutually agreed in good faith that PTLLC’s employees, agents, or suppliers are responsible for the alleged act. BellSouth shall xxxx PTLLC for BellSouth property, which is stolen or damaged where an investigation determines the culpability of PTLLC’s employees, agents, or suppliers and where PTLLC agrees, in good faith, with the results of such investigation. PTLLC shall notify BellSouth in writing immediately in the event that PTLLC discovers one of its employees already working on the BellSouth Premises is a possible security risk. Upon request of the other Party, the Party who is the employer shall discipline consistent with its employment practices, up to and including removal from BellSouth’s Premises, any employee found to have violated the security and safety requirements of this Section. PTLLC shall hold BellSouth harmless for any damages resulting from such removal of its personnel from a BellSouth Premises.
Security Violations. You are responsible for ensuring and maintaining security of your systems and the machines that connect to and use Service(s), including implementation of necessary patches and operating system updates. The Services may not be used to interfere with, gain unauthorized access to, or otherwise violate the security of any server, network, network access, personal computer or control devices, software or data, or other system, or to attempt to do any of the foregoing.
Security Violations. BellSouth reserves the right to interview Neutral Tandem’s employees, agents, suppliers, or Guests in the event of wrongdoing in or around a BellSouth Premises or involving BellSouth’s or another collocated telecommunications carrier’s property or personnel, provided that BellSouth shall provide reasonable notice to Neutral Tandem’s Security representative of such interview. Neutral Tandem and its employees, agents, suppliers, or Guests shall reasonably cooperate with BellSouth’s investigation into allegations of wrongdoing or criminal conduct committed by, witnessed by, or involving Neutral Tandem’s employees, agents, suppliers, or Guests. Additionally, BellSouth reserves the right to xxxx Neutral Tandem for all reasonable costs associated with investigations involving its employees, agents, suppliers, or Guests if it is established and mutually agreed in good faith that Neutral Tandem’s employees, agents, suppliers, or Guests are responsible for the alleged act(s). BellSouth shall xxxx Neutral Tandem for BellSouth property, which is stolen or damaged, where an investigation determines the culpability of Neutral Tandem’s employees, agents, suppliers, or Guests and where Neutral Tandem agrees, in good faith, with the results of such investigation. Neutral Tandem shall notify BellSouth in writing immediately in the event that Neutral Tandem discovers one of its employees, agents, suppliers, or Guests already working on the BellSouth Premises is a possible security risk. Upon request of the other Party, the Party who is the employer shall discipline consistent with its employment practices, up to and including removal from BellSouth’s Premises, any employee found to have violated the security and safety requirements of this Section. Neutral Tandem shall hold BellSouth harmless for any damages resulting from such removal of Neutral Tandem’s personnel from a BellSouth Premises.
Security Violations. You may not use Services Offerings to violate the security or integrity of any network, computer, communications system, software application, network or computing device (each, a “System”).
Security Violations. You may not use the Platform to violate the security or integrity of any network, computer or communications system, software application, or network or computing device (each, a “System”). Prohibited activities include:
AutoNDA by SimpleDocs
Security Violations. You are prohibited from engaging in any violations of system or network security. Our internet service may not be used in connection with attempts - whether or not successful - to violate the security of a network, service, or other system. Examples of prohibited activities include, without limitation, hacking, cracking into, monitoring, or using systems without authorization; scanning ports; conducting denial of service attacks; and distributing viruses or other harmful software. We reserve the right to suspend the Internet access upon notification from a recognized Internet authority or ISP regarding such abuse. We may disconnect Your equipment and withhold services if We consider Your hardware or software is, or has become, inappropriate for connection to Our network. You are responsible for Your own virus or malware protection on Your systems and hardware.
Security Violations. Customers are responsible for ensuring and maintaining security of their systems and the machines that connect to and use IP Service(s), including implementation of necessary patches and operating system updates. IP Services may not be used to interfere with, gain unauthorized access to, or otherwise violate the security of AT&T's (or another party's) server, network, network access, personal computer or control devices, software or data, or other system, or to attempt to do any of the foregoing. Examples of system or network security violations include but are not limited to: • unauthorized monitoring, scanning or probing of network or system or any other action aimed at the unauthorized interception of data or harvesting of e-mail addresses; • hacking, attacking, gaining access to, breaching, circumventing or testing the vulnerability of the user authentication or security of any host, network, server, personal computer, network access and control devices, software or data without express authorization of the owner of the system or network; • impersonating others or secretly or deceptively obtaining personal information of third parties (phishing, etc.); • using any program, file, script, command or transmission of any message or content of any kind, designed to interfere with a terminal session, the access to or use of the Internet or any other means of communication; • distributing or using tools designed to compromise security (including but not limited to SNMP tools), including cracking tools, password guessing programs, packet sniffers or network probing tools (except in the case of authorized legitimate network security operations); • knowingly uploading or distributing files that contain viruses, spyware, Trojan horses, worms, time bombs, cancel bots, corrupted files, root kits or any other similar software or programs that may damage the operation of another's computer, network system or other property, or be used to engage in modem or system hi-jacking; • engaging in the transmission of pirated software; • with respect to dial-up accounts, using any software or device designed to defeat system time-out limits or to allow Customer's account to stay logged on while Customer is not actively using the IP Services or using such account for the purpose of operating a server of any type; • using manual or automated means to avoid any use limitations placed on the IP Services; • providing guidance, information or assistance with respect to causing damag...
Security Violations. 2.1 The Buyer and its End Users shall not access and/or use, or encourage, promote, facilitate or instruct others to access and/or use the Service Elements, the Buyer Content or the Buyer Account in a manner that would compromise or harm the security or integrity of any information technology service or system (including any network, computer, device, communication system or software application), including by means of:
Time is Money Join Law Insider Premium to draft better contracts faster.