Sentences with phrase «against unauthorized use»

NAR is taking the real estate industry's battle against the unauthorized use of real estate listing data to a new front: the U.S. Copyright Office.
Unlikely, so the search continues at Google and elsewhere on how to protect against the unauthorized use of copyrighted content.
To guard against unauthorized use, information that is passed between your browser and Effective Coverage is encrypted with the Secure Socket Layer (SSL) system.
As stated in our Terms of Service, «we employ industry - standard best practices for storing and transmitting your content to protect its integrity and safeguard it against unauthorized use or access.»
We safeguard our clients» social media presences, protecting them against the unauthorized use of their marks.
The US already has a law against unauthorized use of computers, in the Computer Fraud and Abuse Act.
The card also comes with $ 0 fraud liability protection, so you are completely protected against unauthorized use.
You are solely responsible for maintaining the secrecy of your password and protecting it against unauthorized use.
You are responsible for maintaining the secrecy of your password and protecting against unauthorized use of your password.
A private code means added protection against unauthorized use of your card when you shop at participating online merchants.
Considering that consumer liability for debit transactions can be much greater than for credit card transactions — and that Chase says all its cards will come with zero fraud liability protection against unauthorized use — this is also a bit of good news for Chase customers.
A private code means added protection against unauthorized use of your card when you shop online at participating merchants.
• We Report to all Three Major Credit Bureaus: TransUnion, Equifax and Experian • Maximum Credit Lines up to $ 5,000 • Free Fraud Protection Against Unauthorized Use • $ 0 Fraud Liability if your card is lost or stolen • Safe... You'll never pay for unauthorized purchases with our $ 0 Fraud Liability Guarantee.
Your account is protected against unauthorized use as provided in this Agreement.
Protect your card against unauthorized use by registering for Verified by Visa, which uses a personal password for online purchases.
Protection against unauthorized use in a particular country depends, basically, on the national laws of that country.»
DRM protects against unauthorized use or copying of an author's work.
Neither the approval to reprint, nor the decision to withhold action against unauthorized use in any specific event, shall constitute a waiver of copyright or control over content derived from the Hussman Funds website.
Totem is billed as a tool to help photographers protect their work against unauthorized use and to connect clients in need of stock photos with images that suit their purposes.

Not exact matches

The Conflict: The estate of the late author has filed suit against Sony for unauthorized use (and misquoting) of Faulkner's famous line «The past is never dead.
Daddy Yankee also criticized both the unauthorized use of the song and the Venezuelan government's action against citizens.
Vision Critical has implemented commercially reasonable safeguards and precautions to protect your personal information, including technical and organizational measures against unauthorized access, improper use, alteration, unlawful or accidental destruction, and accidental loss.
We use commercially reasonable security measures designed to protect against unauthorized access to Personal Information under our control, including physical, electronic and procedural safeguards.
To the extent permitted by law, we will disclose your information to government authorities or third parties if: (a) required to do so by law, or in response to a subpoena or court order; (b) we believe in our sole discretion that disclosure is reasonably necessary to protect against fraud, to protect the property or other rights of us or other users, third parties or the public at large; or (c) we believe that you have abused the Sites or the Applications by using them to attack other systems or to gain unauthorized access to any other system, to engage in spamming or otherwise to violate applicable laws.
We use appropriate security safeguards to protect your personal information against loss, theft, and unauthorized access.
You agree to defend, indemnify, and hold harmless the Action Network Group and its affiliates and their officers, directors, employees, consultants, agents, licensors, and suppliers from and against any and all claims, losses, expenses, liabilities, settlements, litigation, damages, and / or costs (including, but not limited to, fees, costs and other expenses of attorneys and expert witnesses) arising out of or related to: (i) your use of the Site, including, but not limited to, any Materials or User Content, (ii) any violation of these Terms of Use or applicable law by you in connection with your use of the Site, including, but not limited to, any Materials or User Content, (iii) any actual or alleged infringement by you, or any person accessing the Site, including, but not limited to, any Materials or User Content, using your password or account identifier, of any intellectual property or privacy or other right of any third party, or (iv) any unauthorized use of password protected Materials or User Content utilizing your account information, whether or not known or authorized by yuse of the Site, including, but not limited to, any Materials or User Content, (ii) any violation of these Terms of Use or applicable law by you in connection with your use of the Site, including, but not limited to, any Materials or User Content, (iii) any actual or alleged infringement by you, or any person accessing the Site, including, but not limited to, any Materials or User Content, using your password or account identifier, of any intellectual property or privacy or other right of any third party, or (iv) any unauthorized use of password protected Materials or User Content utilizing your account information, whether or not known or authorized by yUse or applicable law by you in connection with your use of the Site, including, but not limited to, any Materials or User Content, (iii) any actual or alleged infringement by you, or any person accessing the Site, including, but not limited to, any Materials or User Content, using your password or account identifier, of any intellectual property or privacy or other right of any third party, or (iv) any unauthorized use of password protected Materials or User Content utilizing your account information, whether or not known or authorized by yuse of the Site, including, but not limited to, any Materials or User Content, (iii) any actual or alleged infringement by you, or any person accessing the Site, including, but not limited to, any Materials or User Content, using your password or account identifier, of any intellectual property or privacy or other right of any third party, or (iv) any unauthorized use of password protected Materials or User Content utilizing your account information, whether or not known or authorized by yuse of password protected Materials or User Content utilizing your account information, whether or not known or authorized by you.
We will protect personal information by reasonable security safeguards against loss or theft, as well as unauthorized access, disclosure, copying, use or modification.
This prohibition against unlawful or unauthorized reproduction is intended to include all U.S. domestic use as well as protections afforded under any international forum or law, including, but not limited to G.A.T.T.
Furthermore, all of the customer data we collect is protected against unauthorized access with the use of digital certificates.
Unauthorized use and / or duplication of the material on The Key To Chic without express and written permission from The Key To Chic's author is strictly prohibited, and immediate legal action will be taken against any infringement of copyright.
We will protect personal information by reasonable security safeguards against loss or theft, as well as unauthorized access, disclosure, copying, use or modification.
As a reputable dating service we at EliteSingles place a great emphasis on the responsible use and protection of your personal information against loss and unauthorized access.
It is the members responsibility to protect his or her computer and associated IT systems, equipment on which the Services are used and his or her software against unauthorized access, bugs, viruses, worms, spyware, adware, malware, trojan horses etc..
Maggie Siff Online takes all measures reasonably necessary to protect against the unauthorized access, use, alteration or destruction of potentially personally - identifying and personally - identifying information.
Cars.com expressly reserves the right to release any personally identifiable information or other information you provide to third parties under the following circumstances: (a) when required by law or legal process, (b) to investigate and / or take action against illegal activity, suspected abuse or unauthorized use of the Site, (c) to protect the property or safety of our users or others, (d) to enforce our Terms of Service and (e) in connection with any sale or other transfer of ownership of all or a part of Cars.com.
When you shop using your Orange County's Credit Union Mastercard credit card, you have peace of mind because you're protected against unauthorized charges as long as: 1.
Let us know before you go so we can help protect against theft or unauthorized card use.
Consumers that make purchases using their credit cards are protected against unauthorized purchases.
If you are getting ready to travel, please contact us before your trip so we can help protect you against theft or unauthorized card use.
Before your trip, let us know so we can help protect against theft or unauthorized card use.
To protect against theft and unauthorized use of your Tower credit and debit cards, Tower monitors your card activity 24 hours a day.
We may disclose personal information (1) if we believe such sharing is appropriate to comply with the law or with legal process; (2) to protect and defend our rights, services or property; (3) to protect against misuse or unauthorized use of the Services; or (4) to protect the safety or property of our users or any member of the public (among other things, this means that if we believe you have provided false information or attempted to pose as someone else, information Simply you may be disclosed as part of any investigation into your actions).
The RCHS uses generally accepted, industry - standard security systems, software and encryption technologies to protect against unauthorized access to the RCHS servers, equipment, and other components of our online presence.
National Humane Society takes all measures reasonably necessary to protect against the unauthorized access, use, alteration or destruction of potentially personally - identifying and personally - identifying information.
FUNCTIONAL FOR YOUR BUSY LIFE: use them to Shield against unauthorized RFID NFC and BLE scans as reported in the media;
Amateur Traveler takes all measures reasonably necessary to protect against the unauthorized access, use, alteration or destruction of potentially personally - identifying and personally - identifying information.
Chip technology: A microchip inserted into a credit card that adds an increased level of protection against fraud, either from duplicating the card or from the card being used by unauthorized users if stolen.
Twin Galaxies takes all measures reasonably necessary to protect against the unauthorized access, use, alteration or destruction of potentially personally - identifying and personally - identifying information.
Koch Media may take criminal or civil action against you for unauthorized use of intellectual property.
Digital Extremes is not responsible for any misuse of your Account or your User ID, you agree to accept all risks of unauthorized access to your Account and to hold Digital Extremes harmless from and against any improper use of your Account or your User ID, including, but not limited to, improper use by someone to whom you revealed your password.
a b c d e f g h i j k l m n o p q r s t u v w x y z