Use Policy Sample Clauses

Use Policy.  The Library hall may be reserved for use by education, civic, cultural and governmental groups. Profit- making organizations sponsoring an educational program of a non-profit nature will be permitted to use the hall provided the meetings are open freely to the general public. No activity that created or results in a profit to any individual will be considered. The Library Hall is not available for use for games of chance.  All users will be provided with a copy of the Library hall policy, agreement/booking form as well as a checklist to be completed and returned (where applicable) with hall key immediately following the booking of the Library hall.  Refreshments may be provided and served by the group. No alcoholic beverages are allowed on premises.  No smoking or vaping is allowed in the building, on the grounds, in parked vehicles, or within 100 feet of any library door. This is regulated by New York State Law Public Health Law §1399-o, subdivision 6.  No animals other than service animals are allowed in the building without advance permission by the library director.  No persons under the age of twenty-one shall be allowed in the library hall, unattended, without an adult age twenty-one or older.  No open flames are allowed on the premises with the exception of small birthday-style candles and sterno cans used to maintain food temperature.  The noise level should be maintained such that library patrons are not disturbed.  The door to the back entrance of the building shall be kept closed at all times, except for passage to the lift, as necessary.  No posters, banners, streamers, etc. are to be affixed to the walls that will create damage, nor are they to be left following the use of the hall. No tape, etc. should be left on the walls.  There is to be no decorating done near the lift, and no tables or other items set-up near the lift door or operating system. A clear pathway of at least 48 inches must be maintained from the entrance door to the lift. When the Library Hall is to be used outside of Library operating hours, users shall make no attempt to enter the upstairs portion of the Library, storage rooms, or to operate the lift, except as needed by legitimate users for handicap access.  In case of fire or other emergencies, all building occupants should be notified immediately to allow for evacuation of the building before calling 911 to report the emergency; the address of the building is 0 Xxxxxxx Xxxxxx, Xxxxxxx XX 00000. After hours a...
AutoNDA by SimpleDocs
Use Policy. 21.1 This acceptable use policy sets out the rules governing the transmission, storage and processing of content by the Customer, or by any person on his behalf, using the Services. By using the Services, the Customer agrees to the rules set out in this Policy.
Use Policy a) Membership - Membership in the Marketing Service is subject to the prior approval of Creative Clicks. Creative Clicks reserves the right to withhold approval of membership or to refuse service to any new or existing Advertiser, at its sole and absolute discretion, without needing to provide reasons.
Use Policy. The use of City Social Media shall be subject to the following:
Use Policy. (1) There are no exceptions or discounts to the adopted fee schedule for any individuals or groups renting the Park Casino.
Use Policy. Westminster uses photos, videos, and other forms of imaging and information as illustrations of our life together as a Church community. Any use of child or youth images or information will be solely for the purposes of promoting the related activity or event, in which the child or youth is participating.
Use Policy. Radio Devices Inside the data centre the use of GSM, GPRS, UMTS or other communications devices that work through radio communication (‘Radio Devices”) is prohibited to
AutoNDA by SimpleDocs
Use Policy. There is a defined terminal device use policy in the company. Workplace - Sealable Containers: There are lockable containers available at every workplace to securely store documents and data carriers in the company.
Use Policy. All Internet Access provided by DirectLink to the customer is to be used for the sole purpose of Internet Access Only. We reserve the right to monitor the connection with prudence and cancel or terminate the connection if we reasonably believe that the customer is using the connection for other purposes, other than Internet access, without our express permission and understanding. Customer is still liable for the remainder of the contract if they are terminated in the manner. The customer does have the option, however, to upgrade their account if available to our Premium or Dedicated Point-to-Point commercial services at additional costs if customer needs more options with their data connection. DirectLink customers are not allowed to use the Internet Service in a way that will result in excessive consumption or utilization of the system or network resources and bandwidth in a way that may weaken network performance as determined by DirectLink. Any action causing high bandwidth usage as determined by DirectLink may result in termination of service. The customer may be held liable for the excessive usage and agrees to pay for any extra usage of bandwidth. Any usage causing excessive bandwidth such a using our service to host a web server site which attracts excessive traffic to your location, continuously uploading or downloading streaming video or audio use, net hosting or continuous FTP Up/Down loading, Bit Torrent or any other activity causing an unusual amount of data usage as determined by DirectLink will NO BE TOLERATED your service may be terminated. You are not allowed to use DirectLink services to store, transmit or receive any material that infringes on any patent, trademark, trade secret, copyright, or other proprietary or intellectual right or any party. You are not allowed to use DirectLink’s Email Service to transmit or facilitate any unsolicited or unauthorized advertising, telemarketing, promotional materials, “junk mail”, unsolicited bulk e-mail, unsolicited duplicative e-mail, unsolicited commercial e-mail, fax broadcasting, fax blasting, or other activity that invade another person’s privacy (collectively, “Spam”). Participation in any such activity is grounds for service suspension or termination. Any and all software activities involving Viruses, Worms, Trojan Horses, Cancelbots, Ransomware, corrupted files, or other code that manifests contaminating or destructive properties are strictly prohibited and will result in immediate terminat...
Use Policy. Customer shall not, directly or indirectly, use the Avanan Services as follows: (1) to encumber, sublicense, transfer, distribute, rent, lease, time-share or use the Service in any service bureau arrangement or otherwise for the benefit of any third party without the prior written consent of Avanan; (2) in a manner that imposes or may impose (as determined by Avanan in its sole discretion) an unreasonable or disproportionately large load on the infrastructure of Avanan (or its third party providers) or beyond the limits of licensed usage (including without limitation the Service specific usage limitations below); (3) in a manner that interferes or attempt to interfere with the proper working of the Service or any activities conducted on the Service; (4) to bypass any privacy settings or measures used to prevent or restrict access to the Service (or other accounts, computer systems or networks connected to the Service); (5) run mail list, Listserv, any form of auto-responder or “spam” on the Service; (6) to use manual or automated software, devices, robot, spider, or other processes to “crawl” or “spider” or to retrieve, index, “scrape”, “data mine” or in any way gather information, content or other materials from the Service in an unauthorized manner or reproduce or circumvent the navigational structure or presentation of the Service; (7) for purposes other than its intended use as a cloud security solution or in a manner that is inconsistent with the customary use of the Service; (8) to store or transmit viruses or malicious code; (9) to attempt to gain unauthorized access to the Avanan Service or their related systems or networks; (10) in a manner which interferes with or disrupt the integrity or performance of the Service; (11) use or allow the transmission, transfer, export, re-export or other transfer of any software, technology or information forming a part of the Service in violation of any export control or other laws and regulations of the United States or any other relevant jurisdiction; or (12) in any way that is unlawful, illegal, fraudulent or harmful.
Time is Money Join Law Insider Premium to draft better contracts faster.