Sentences with phrase «in unauthorized use»

Companies rein in unauthorized use of listings; NAR hails step as key to keeping REALTORS ® first point of contact.
We will only pay this fee in the event that the reservations made through the secure server of Azores Getaways resulted in the unauthorized use of your credit card through our error or negligence, and you are not responsible in any way.

Not exact matches

Now, «it's all easily attainable, and possible to use in any number of unauthorized ways,» says Simpson.
NBCUniversal may, in its sole discretion, terminate your password, account (or any part thereof) or use of the online services, or remove and discard any User Content or information stored, sent, or received via the online services without prior notice and for any reason or no reason, including, but not limited to: (i) permitting another person or entity to use your identification to access the Site or online services, (ii) any unauthorized access or use of the online services, (iii) any violation of these Terms of Service, or (iv) tampering with or alteration of any of the software, data files, and / or Content contained in or accessed through, the online services.
To prevent unauthorized access, keep track of anyone entering and leaving your office at all times, use a sign - in sheet and require valid proof of identity.
«If we detect repeated use of unauthorized apps in violation of our terms, we reserve all rights, including suspending or terminating your account,» the email goes on to warn.
If you create something valuable, you may eventually find someone using your intellectual property in an unauthorized manner.
«Both jurisdictions are satisfied with the confidentiality rules and data safeguards that are in place in the other jurisdiction to ensure the confidentiality of information exchanged and prevent its unauthorized use,» Australian Taxation Office and Inland Revenue Authority of Singapore said in a joint statement.
In an interview with Bloomberg last week, a Ford Motor spokesperson stated that the company «did not grant permission for use of its logo,» and furthermore viewed it «as an unauthorized use of [their] trademark and have asked it to be stopped.»
In China, widespread use of unauthorized copies of software downloaded from websites run by pirates allows to insert malicious code to gain access to company networks, according to Wisniewski.
Elder financial abuse or exploitation is defined as the unauthorized, illegal or inappropriate use of an aging adult's financial resources by a person in a position of trust.
Sheryl Sandberg acknowledged on the conference call they did lose a handful of advertisers as the privacy concerns were raised, related to the unauthorized use of Facebook user data in the 2016 presidential campaign.
«Treasury Board will not have any discretion to use the funds for any other purpose, as this would be an unauthorized use of public funds,» Farees Nathoo wrote in an email.
Dedrone systems detect unauthorized drones in the sky, including drones used for gun smuggling.
Totem is billed as a tool to help photographers protect their work against unauthorized use and to connect clients in need of stock photos with images that suit their purposes.
«While many organizations and companies request it — and while it has become commonplace for many to collect and use it — they are, in fact, unauthorized uses and therefore you should not be required to provide the number,» says Cohen.
You acknowledge that monetary compensation for the consequences of unauthorized commercial use or republication of content or information from the App may not be sufficient or appropriate and in that event, Saucey will be entitled to temporary and permanent injunctive relief to prohibit such use.
The Once Upon A Child ®, Play It Again Sports ®, Music Go Round ®, Plato's Closet ® and Style Encore ® trademarks and logos utilized in this website are owned by Winmark Corporation and any unauthorized use of these trademarks by others is subject to action under federal and state trademark laws.
Exabeam, a leader in user behavior analytics, today announced that in all deployments, unauthorized use of credentials was detected.
To prevent unauthorized access, maintain data accuracy, and ensure the correct use of information, we have put in place appropriate physical, electronic, and managerial procedures to safeguard and secure the information we collect online.
«Using two ways to identify you when you log on will help better protect your account from unauthorized use and potential identity fraud,» the agency said in its announcement.)
As indicated elsewhere in this Agreement, we are not responsible for any unauthorized use of your Account with the Company or any third - party accounts which you use in connection with the Exchange.
We secure the Personal Information you provide on computer servers in a controlled, secure environment, protected from unauthorized access, use or disclosure.
However, in addition to signing up for the program, Equifax data beach victims should also check their credit to see if their information has already been used in unauthorized transactions.
Short of mass deportation, the most aggressive thing the federal government could do to crack down on the 11 million unauthorized immigrants currently in the US would be to require all employers to use the E-Verify system to check the legal status of anyone they've hired or are hiring.
Neither the approval to reprint, nor the decision to withhold action against unauthorized use in any specific event, shall constitute a waiver of copyright or control over content derived from the Hussman Funds website.
Cancellation of a subscription may result from any unauthorized use or reproduction or rebroadcast of any Hard Assets Alliance publication or website, any infringement or misappropriation of Hard Assets Alliance, LLC's proprietary rights, or any other reason determined in the sole discretion of Hard Assets Alliance, LLC.
It does give the impression that he was engaging in some unauthorized religious influence, violating the separation of church and state in that he was using his office as ambassador to further his private religious aims.
The rights of journalists to protect their sources and their unpublished notes (in whatever medium) from unauthorized use.
(a) use the Sites or the Applications for any unauthorized purpose including collecting usernames and / or email addresses of other users by electronic or other means for the purpose of sending unsolicited email or other electronic communications, or engaging in unauthorized framing of, or linking to, the Sites without our express written consent;
To the extent permitted by law, we will disclose your information to government authorities or third parties if: (a) required to do so by law, or in response to a subpoena or court order; (b) we believe in our sole discretion that disclosure is reasonably necessary to protect against fraud, to protect the property or other rights of us or other users, third parties or the public at large; or (c) we believe that you have abused the Sites or the Applications by using them to attack other systems or to gain unauthorized access to any other system, to engage in spamming or otherwise to violate applicable laws.
You shall not Post Content that: (1) infringes any proprietary rights of any third party; (2) violates any law or regulation; (3) is defamatory or trade libelous; (4) is harmful, threatening, abusive, harassing, defamatory, vulgar, obscene, intimidating, profane, pornographic, hateful, racially, ethnically or sexually discriminatory or otherwise objectionable in any way or that otherwise violates any right of another; (5) encourages conduct that would violate any conduct prohibited by this Agreement; (6) restricts or inhibits any other user from using the Website; (7) is or amounts to an unsolicited advertisement, promotion, or other form of solicitation; (8) impersonates any person or entity or that directly or indirectly attempts to gain unauthorized access to any portion of the Website or any computer, software, or data of any person, organization or entity that uses or accesses the Website; (9) provides or create links to external sites that violate the Agreement; (10) is intended to harm, exploit, solicit, or collect personally identifiable information of, any individual under the age of 18 («Minor») in any way; (11) invades anyone's privacy by attempting to harvest, collect, store, or publish private or personally identifiable information without their foreknowledge and willing consent or distributes or contains viruses or any other technologies that may harm the Website or any of its users; (12) is copyrighted, protected by trade secret or otherwise subject to third - party proprietary rights, including privacy and publicity rights, unless you are the owner of such rights or have permission from the rightful owner to post the material and to grant Non-GMO Project all of the license rights granted herein; and / or (13) contains or promotes an illegal or unauthorized copy of another person's copyrighted work.
Byrne Dairy secures the personally identifiable information you provide on computer servers in a controlled, secure environment, protected from unauthorized access, use or disclosure.
Use of the Site is unauthorized in any jurisdiction that does not give effect to all provisions of these Terms, including, without limitation, this section.
Your use of the Site does not entitle you to make any unauthorized use of any protected content, and in particular you will not delete or alter any proprietary rights or attribution notices in any content.
Although we will use all reasonable efforts to safeguard the confidentiality of any personal information collected, we will not be liable for disclosure of personal information obtained due to errors in transmission or the unauthorized acts of third parties.
Trademark infringement is the unauthorized use of a trademark or service mark on or in connection with goods and / or services in a manner that is likely to cause confusion, deception, or mistake about the source of the goods and / or services.
Security We will take reasonable steps to protect your personally identifiable information as you transmit your information from your computer to our Site and to protect such information from loss, misuse and unauthorized access, disclosure, alteration or destruction in accordance with this Privacy Policy and the Terms of Use.
You agree to defend, indemnify, and hold harmless the Action Network Group and its affiliates and their officers, directors, employees, consultants, agents, licensors, and suppliers from and against any and all claims, losses, expenses, liabilities, settlements, litigation, damages, and / or costs (including, but not limited to, fees, costs and other expenses of attorneys and expert witnesses) arising out of or related to: (i) your use of the Site, including, but not limited to, any Materials or User Content, (ii) any violation of these Terms of Use or applicable law by you in connection with your use of the Site, including, but not limited to, any Materials or User Content, (iii) any actual or alleged infringement by you, or any person accessing the Site, including, but not limited to, any Materials or User Content, using your password or account identifier, of any intellectual property or privacy or other right of any third party, or (iv) any unauthorized use of password protected Materials or User Content utilizing your account information, whether or not known or authorized by yuse of the Site, including, but not limited to, any Materials or User Content, (ii) any violation of these Terms of Use or applicable law by you in connection with your use of the Site, including, but not limited to, any Materials or User Content, (iii) any actual or alleged infringement by you, or any person accessing the Site, including, but not limited to, any Materials or User Content, using your password or account identifier, of any intellectual property or privacy or other right of any third party, or (iv) any unauthorized use of password protected Materials or User Content utilizing your account information, whether or not known or authorized by yUse or applicable law by you in connection with your use of the Site, including, but not limited to, any Materials or User Content, (iii) any actual or alleged infringement by you, or any person accessing the Site, including, but not limited to, any Materials or User Content, using your password or account identifier, of any intellectual property or privacy or other right of any third party, or (iv) any unauthorized use of password protected Materials or User Content utilizing your account information, whether or not known or authorized by yuse of the Site, including, but not limited to, any Materials or User Content, (iii) any actual or alleged infringement by you, or any person accessing the Site, including, but not limited to, any Materials or User Content, using your password or account identifier, of any intellectual property or privacy or other right of any third party, or (iv) any unauthorized use of password protected Materials or User Content utilizing your account information, whether or not known or authorized by yuse of password protected Materials or User Content utilizing your account information, whether or not known or authorized by you.
Use of the Challenge Success Web Site is unauthorized in any jurisdiction that does not give effect to all provisions of these terms and conditions, including without limitation this paragraph.
Challenge Success secures the personally identifiable information you provide on computer servers in a controlled, secure environment, protected from unauthorized access, use or disclosure.
Founding Moms grants you the rights set forth herein, subject to the following conditions: (i) you shall not modify, disassemble, reverse engineer or otherwise reduce to human - perceivable form all or any part of the Services; (ii) you agree not to submit or transmit any emails or materials through the Services that contain a virus, worm, Trojan horse or any other harmful component; (iii) you shall not obtain or attempt to obtain any data through any means from the Services, except if we intend to provide or make it available to you; (iv) you shall not copy or imitate part or all of the design, layout, or look - and - feel of the Services or individual sections of it, in any form or media; (v) you are responsible for the accuracy and quality of the data and content that you submit; (vi) you shall not submit content that is offensive, including without limitation, bigotry, racism, discrimination, hatred, or profanity; (vii) you will use commercially reasonable efforts to prevent unauthorized access to and / or use of the Services, and to notify Founding Moms promptly of any such unauthorized access and / or use; and / or (viii) you shall not use the Services for any unlawful purpose or to violate any federal, state, international law, code of conduct or other guidelines which may be applicable to the Services provided.
The Once Upon A Child ®, Play It Again Sports ®, Music Go Round ®, Plato's Closet ® and Style Encore ® trademarks and logos utilized in this website are owned by Winmark Corporation and any unauthorized use of these trademarks by others is subject to action under federal and state trademark laws.
If, in the Sponsor's opinion, there is any suspected or actual evidence of electronic or non-electronic tampering with any portion of the Promotion, or if computer virus, bugs, unauthorized intervention, fraud, or technical difficulties or failures compromise or corrupt or affect the administration, integrity, security, fairness, or proper conduct of the Promotion, the Sponsor reserves the right at their sole discretion to disqualify any individual who tampers with the entry process and void any entries submitted fraudulently, to modify or suspend the Promotion, or to terminate the Promotion and conduct a random drawing to award the prizes using all eligible, non-suspect entries received as of the termination date.
You shall comply with all copyright laws worldwide in your use of this website and prevent unauthorized copying.
The state Legislature approved START - UP NY in 2013, allowing new or expanding businesses to be free of sales and income taxes for 10 years — provided companies are not on the long list of unauthorized uses like hotels, restaurants, retail and wholesale distribution centers.
In real terms, these rules which exist in virtually every jurisdiction, include laws and regulations which forbid the unauthorized use of state resources for political purposes, contributions from dubious sources, violation of campaign funding limits as prescribed by enabling laws, the use of money to influence voters and election outcomes, non-disclosure of campaign spending, abuse of media, broadcasting and political advertising rules, and rules on declaration of assets, academic qualifications, health and other disclosures and internal party guidelines and ruleIn real terms, these rules which exist in virtually every jurisdiction, include laws and regulations which forbid the unauthorized use of state resources for political purposes, contributions from dubious sources, violation of campaign funding limits as prescribed by enabling laws, the use of money to influence voters and election outcomes, non-disclosure of campaign spending, abuse of media, broadcasting and political advertising rules, and rules on declaration of assets, academic qualifications, health and other disclosures and internal party guidelines and rulein virtually every jurisdiction, include laws and regulations which forbid the unauthorized use of state resources for political purposes, contributions from dubious sources, violation of campaign funding limits as prescribed by enabling laws, the use of money to influence voters and election outcomes, non-disclosure of campaign spending, abuse of media, broadcasting and political advertising rules, and rules on declaration of assets, academic qualifications, health and other disclosures and internal party guidelines and rules.
In addition, the resolution recalls that in 2014 the SLA found the applicants in violation for «improper conduct» and use of an «unauthorized trade name» in relation to another LLC known as 133 Essex RestauranIn addition, the resolution recalls that in 2014 the SLA found the applicants in violation for «improper conduct» and use of an «unauthorized trade name» in relation to another LLC known as 133 Essex Restauranin 2014 the SLA found the applicants in violation for «improper conduct» and use of an «unauthorized trade name» in relation to another LLC known as 133 Essex Restauranin violation for «improper conduct» and use of an «unauthorized trade name» in relation to another LLC known as 133 Essex Restauranin relation to another LLC known as 133 Essex Restaurant.
The FCT Commissioner of Police in compliance with the recent directive of Inspector - General of Police has constituted a taskforce to check the abuse and illegal use of Supernumerary (SPY) number plates and sirens by unauthorized persons in the Federal Capital Territory.
CNN reported in July that Trump used the mob - controlled concrete company S&A to build Trump Plaza condos in Manhattan, citing the investigation of Wayne Barrett, a journalist who wrote an unauthorized biography of Trump.
a b c d e f g h i j k l m n o p q r s t u v w x y z