Unauthorized Use and Access Sample Clauses

Unauthorized Use and Access. Except in accordance with this Agreement, Customer will not frame, mirror, scrape or data-mine the Services or any Content in any form or by any means. Neither Customer nor any Authorized User will attempt to access any restricted areas of the Services or CIBC’s systems or attempt to perform any functions that are not authorized under this Agreement.
AutoNDA by SimpleDocs
Unauthorized Use and Access. Each User understands and agrees that (s)he may use Xxxxx only for the purposes defined in the PI’s approved allocation request under which User is participating, the terms of which are incorporated into this Agreement by reference. In the event of a conflict between the terms of the allocation request and the terms of this Agreement, the terms of this Agreement shall prevail. In the event the allocation is extended or subsequent access is granted, such allocation and access must be used solely for specific approved research purposes—nothing else. Users must operate within sanctioned parameters regardless of what may be technically possible.
Unauthorized Use and Access. Neither Client nor any Authorized Administrator or Authorized User will (i) frame, mirror, scrape or data-mine the Services or any Content in any form or by any means, (ii) attempt to access any restricted areas of the Services or ATB Financial’s systems or attempt to perform any functions that are not authorized under this Agreement, (iii) reverse engineer, decompile, disassemble, modify or create derivative works of any portion of the Services (iv) disclose the results of performance benchmarks for the Services to any third party; (v) remove any copyright or other proprietary notices on or in any aspect of the Services or (vi) access or interact in any automated or technology assisted manner with the Services other than through the authorized use of an applicable applications programming interface, if any, that ATB Financial has licensed to Client.
Unauthorized Use and Access. End User agrees not to use reclaimed water for potable or sanitary purposes or any other use not expressly authorized by this Agreement. End User agrees not to make reclaimed water accessible or available to its employees, licensees or the general public for unauthorized use.
Unauthorized Use and Access. Each User understands and agrees that (s)he may use Anton only for the purposes defined in the PI’s approved allocation request under which User is participating, the terms of which are incorporated into this Agreement by reference. In the event of a conflict between the terms of the allocation request and the terms of this Agreement, the terms of this Agreement shall prevail. In the event the allocation is extended or subsequent access is granted, such allocation and access must be used solely for specific approved research purposes—nothing else. Users must operate within sanctioned parameters regardless of what may be technically possible.
Unauthorized Use and Access. Customer will prevent unauthorized use of the Services by its End Users and terminate any unauthorized use of or access to the Services. Customer will ensure that it does not allow any person under 13 to use the Services. Customer will promptly notify SpiderOak of any unauthorized use of or access to the Services.

Related to Unauthorized Use and Access

  • Unauthorized Use or Disclosure The Contractor shall notify COMMERCE within five (5) working days of any unauthorized use or disclosure of any confidential information, and shall take necessary steps to mitigate the harmful effects of such use or disclosure.

  • Authorized Uses The Participating Institutions and the Authorized Users may make all use of the Licensed Materials as is consistent with the applicable law and with this Agreement, including but not limited to the following licensing conditions ("Authorized Uses"). In addition, the Licensed Materials may be used for purposes of research, education or other non-commercial use as particularly follows:

  • Authorized Use The Student Data shared pursuant to the Service Agreement, including persistent unique identifiers, shall be used for no purpose other than the Services outlined in Exhibit A or stated in the Service Agreement and/or otherwise authorized under the statutes referred to herein this DPA.

  • Unauthorized Access Notification LEA shall notify Provider promptly of any known or suspected unauthorized access. LEA will assist Provider in any efforts by Provider to investigate and respond to any unauthorized access.

Time is Money Join Law Insider Premium to draft better contracts faster.