Server Abuse Sample Clauses

Server Abuse. Any attempts to undermine or cause harm to a Full Stack Team Six Company Limited server or customer of Full Stack Team Six Company Limited is strictly prohibited. Full Stack Team Six Company Limited will pursue legal action to the fullest extent for all abuse of the Full Stack Team Six Company Limited Network.
AutoNDA by SimpleDocs
Server Abuse. Any attempts to undermine or cause harm to any of the Company’s servers or Subscriber of the Company is strictly prohibited including, but not limited to: • Logging into a server or account that you are not authorized to access • Accessing data or taking any action to obtain services not intended for you or your use • Attempting to probe, scan or test the vulnerability of any system, subsystem or network • Tampering, hacking, modifying, or otherwise corrupting or breaching security or authentication measures without proper authorization • Transmitting material that contains viruses, Trojan horses, worms, time bombs, cancelbots or other computer programming routines or engines with the intent or effect of damaging, destroying, disrupting or otherwise impairing a computer's functionality or the operation of the System • Interfering with, intercepting or expropriating any system, data or information • Interfering with service to any user, host or network including, without limitation, by means of overloading, "flooding," "mailbombing," or "crashing" any computer system You will be held responsible for all actions performed by your account whether it be done by you or by others. All sub-networks of the Company and all Subscribers must adhere to the above policies.
Server Abuse. Any attempt to undermine or cause harm to a server, or customer, of ML Cloud is strictly prohibited. Unauthorized use of other people’s accounts or computers ML Xxxxx will strongly react to any use or attempted use of an Internet account or computer without the owner’s authorization. Such attempts include “Internet scamming” (tricking other people into releasing their passwords), password robbery, security hole scanning etc. Any unauthorized use of accounts or computers by a ML Cloud customer, whether or not the attacked account or computer belongs to ML Cloud, will result in action against the attacker. Possible actions include warnings, account suspension or cancellation, and civil or criminal legal action, depending on the seriousness of the attack. Unacceptable uses of servers include, but are NOT limited to: mass mailing, bulk emailing, unsolicited emailing/commercial advertising/information announcements, newsgroup spamming, pornographic content, illegal content, copyright infringement, trademark infringement, warez, cracks, software serial numbers, and/or anything else determined by ML Cloud to be unacceptable use of ML Cloud’s services including abuse of server resources. All customer accounts or servers/projects may be terminated, that include the following content or which have links to the following content: ✓ Providing material that is grossly offensive to the Web community including blatant expressions of bigotry, racism or hatred. ✓ Promoting or providing instructional information about illegal activities, or promoting physical harm or injury against any group or individual. ✓ Displaying material that exploits children under 18 years of age. ✓ Acts of copyright infringement including offering pirated computer programs or links to such programs, information used to circumvent manufacturer-installed copy-protect devices, including serial or registration numbers for software programs, or any type of cracker utilities. ✓ Distributing information regarding the creation of and sending Internet viruses, worms, Trojan horses, pinging, flooding, mail bombing, or denial of service attacks. Also, activities that disrupt the use of or interfere with the ability of others to effectively use the network or any connected network, system, service, or equipment. ✓ Advertising, transmitting, or otherwise making available any software, program, product, or service that is designed to violate this AUP, which includes the facilitation of the means to spam, initia...
Server Abuse. 16.1 Any attempts to undermine or cause harm to LEAP’S servers, or a Client of LEAP, is strictly prohibited. LEAP reserve the right to seek compensation for loss of business and damage done to their servers by the Client, or dedicated server lessee.
Server Abuse. Any attempt to undermine or cause harm to a server, or Client, of ours is strictly prohibited. This includes, but is not limited to, attempting to gain access to password files other than Client’s own, attempting to gain unauthorized access to other accounts on Client’s server, or anything that causes server malfunction. Failure to comply is subject to immediate account deactivation without refund.
Server Abuse. Any attempt to undermine or cause harm to a server or Client of PDNC is strictly prohibited. PDNC will strongly react to any use or attempted use of an Internet account or computer without the owner’s authorization. Such attempts include Internet scamming (tricking other people into releasing their passwords), password theft, security hole scanning, etc. Any unauthorized use of accounts or computers by YOU, whether the attacked account or computer belongs to PDNC, will result in action against YOU. Possible actions include warnings, account suspension or cancellation, as well as civil or criminal legal action, depending on the seriousness of the attack. IMPORTANT NOTE – PDNC has the right to discontinue service or deny access to anyone who violates our policies, or the terms and conditions shown below WITHOUT WARNING or PRIOR NOTICE. No refunds of fees paid will be made if account termination is due to violation of the terms described herein. YOU may not run IRC, bots or clients on shared servers. Unacceptable uses also include, but are NOT limited to: Bulk emailing, unsolicited emailing, newsgroup spamming, pornographic content, illegal content, copyright infringement, trademark infringement, warez sites (including links to/from), cracks, software serial numbers, proxy-relaying, link farming (the act of or by use of scripts), link grinding, link- only sites, spamdexing, FFA (Free-For-All) and/or anything else determined by PDNC in its sole discretion to be unacceptable use of our services, including abuse of server resources.
Server Abuse. Any attempts to undermine or cause harm to any Company server or customer of ours is strictly prohibited. We hold no responsibility for the use of our clients’ accounts. Any account the abuses resources and actions are not taken to desist, calls for immediate deactivation without any refund of payments made thus far. Any site using what we deem to be using excessive cpu cycles or any resources that cause strain to other sites may also be offered new terms. Use of our service to access, or to attempt to access, the accounts of others, or to penetrate, or attempt to penetrate, security measures of our or another entity’s computer software or hardware, electronic communications system, or telecommunications system. Full details are available in the NodeSpace AUP.
AutoNDA by SimpleDocs
Server Abuse. Any attempt to undermine or cause harm to a server or customer that is on NodeClusters is strictly prohibited. As our customer, you are responsible for all your accounts and actions. If you violate our Terms Of Service, your account will be cancelled and terminated without a refund.
Server Abuse. 19.1 Any attempts to undermine or cause harm to the Provider’s servers, or a Customer of the Provider, is strictly prohibited. The Provider reserves the right to seek compensation for loss of business and damage done to their servers by the Customer, or dedicated server lessee.

Related to Server Abuse

  • Server Use This agreement does not permit you to install or Use the Software on a computer file server. For information on Use of Software on a computer file server please refer to xxxx://xxx.xxxxx.xxx/go/acrobat_distribute for information about Adobe Reader; or xxxx://xxx.xxxxx.xxx/go/licensing for information about the Adobe Runtimes.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Market Abuse 13.1 The Client acknowledges that he will not enter into any transaction which falls within the definition of market abuses of Seychelles Securities Xxx 0000 as amended. This rule applies to all forms of market abuse such as xxxxxxx xxxxxxx (an abusive exploitation of privileged confidential information), the misuse of information and directors trading in shares of their own companies;

  • Anti-­‐Abuse Registry Operator may suspend, delete or otherwise make changes to domain names in compliance with its anti-­‐abuse policy.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Servers Marco backs up the following servers only: Windows Servers, SQL servers, Exchange server, and Virtual Machines images running VMWare or Hyper V.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage. Measures: • As part of the SAP Security Policy, Personal Data requires at least the same protection level as “confidential” information according to the SAP Information Classification standard. • Access to Personal Data is granted on a need-to-know basis. Personnel have access to the information that they require in order to fulfill their duty. SAP uses authorization concepts that document grant processes and assigned roles per account (user ID). All Customer Data is protected in accordance with the SAP Security Policy. • All production servers are operated in the Data Centers or in secure server rooms. Security measures that protect applications processing Personal Data are regularly checked. To this end, SAP conducts internal and external security checks and penetration tests on its IT systems. • SAP does not allow the installation of software that has not been approved by SAP. • An SAP security standard governs how data and data carriers are deleted or destroyed once they are no longer required.

  • Substance Abuse Program The SFMTA General Manager or designee will manage all aspects of the FTA-mandated Substance Abuse Program. He/she shall have appointing and removal authority over all personnel working for the Substance Abuse Program personnel, and shall be responsible for the supervision of the SAP.

  • Server Software Subject to the terms and conditions of this XXXX, Vocera grants you the non-exclusive right to (i) install and run (“Use”) the Server Software on computer systems (each, a “Server Computer”) located at End User’s Facilities in the geographic territory designated above (“Territory”); (ii) to Use the Client Software in conjunction with Authorized Client Devices and such Server Computers; and (iii) for pilot licenses for certain Software provided on a trial basis, use such Software for the limited term specified by Vocera in writing. You may Use the standard Server Software on one primary Server Computer (or a primary cluster of computers suitably configured for productive use of the Server Software). You may install backup copies of the Server Software on backup Server Computers to provide redundancy in the event of failure of the primary Server Computer(s) but, unless you have acquired additional licenses or a failover license from Vocera, you may not run such backup or additional copies concurrently with the primary copies. Vocera grants you the right to use the applicable License Key issued by Vocera only to enable Use of the Server Software in conjunction with the licensed Server Computers. Server Software may be licensed for a Subscription Term as specified in the Quote.

  • Evaluation, Testing, and Monitoring 1. The System Agency may review, test, evaluate and monitor Grantee’s Products and services, as well as associated documentation and technical support for compliance with the Accessibility Standards. Review, testing, evaluation and monitoring may be conducted before and after the award of a contract. Testing and monitoring may include user acceptance testing. Neither the review, testing (including acceptance testing), evaluation or monitoring of any Product or service, nor the absence of review, testing, evaluation or monitoring, will result in a waiver of the State’s right to contest the Grantee’s assertion of compliance with the Accessibility Standards.

Time is Money Join Law Insider Premium to draft better contracts faster.