Sentences with phrase «through unauthorized persons»

Coupons will not be honored if presented through unauthorized persons or companies.
After getting caught conducting final product inspections through unauthorized people, Japan - based Nissan loses ISO Certification for its domestic plants.

Not exact matches

NBCUniversal may, in its sole discretion, terminate your password, account (or any part thereof) or use of the online services, or remove and discard any User Content or information stored, sent, or received via the online services without prior notice and for any reason or no reason, including, but not limited to: (i) permitting another person or entity to use your identification to access the Site or online services, (ii) any unauthorized access or use of the online services, (iii) any violation of these Terms of Service, or (iv) tampering with or alteration of any of the software, data files, and / or Content contained in or accessed through, the online services.
GrowthCap makes no warranty whatsoever to you, express or implied, regarding the security of the website, including with respect to the ability of unauthorized persons to intercept or access information transmitted by you through this services.
A person who can prove a book sold through Kindle's publishing platform is a work whose copyright he owns, and the copyright is being infringed through its unauthorized listing for sale, then Amazon «will pay you the Royalties due in connection with any sales of the Digital Book through the Program, and will remove the Digital Book from future sale through the Program, as your sole and exclusive remedy.»
There are a variety of complaints including people who claimed they got scammed out of their TEACH Grant, FedLoan taking unauthorized payments, and payments not going through resulting in additional penalties.
You will not, and will not allow or authorize others to, use the Services, the Sites or any Materials therein to take any actions that: (i) infringe on PetSmart Charities» or any third party's copyright, patent, trademark, trade secret or other intellectual or proprietary rights, or rights of publicity or privacy; (ii) violate any applicable law, statute, ordinance or regulation (including those regarding export control); (iii) are defamatory, trade libelous, threatening, harassing, invasive of privacy, stalking, harassment, abusive, tortuous, hateful, constitute discrimination based on race, religion, ethnicity, gender, sex, disability or other protected grounds, or are pornographic or obscene; (iv) interfere with or disrupt any services or equipment with the intent of causing an excessive or disproportionate load on PetSmart Charities or its licensors or suppliers» infrastructure; (v) involve knowingly distributing viruses, Trojan horses, worms, or other similar harmful or deleterious programming routines; (vi) involve the preparation and / or distribution of «junk mail», «spam», «chain letters», «pyramid schemes» or other deceptive online marketing practices, or any unsolicited bulk email or unsolicited commercial email or otherwise in a manner that violate any applicable «anti-spam» legislation, including that commonly referred to as «CASL»; (vii) would be or encourage conduct that could constitute a criminal offense, give rise to civil liability or otherwise violate any applicable local, state, national or international laws or regulations; (viii) involve the unauthorized entry to any machine accessible via the Services or interference with the Sites or any servers or networks connected to the Sites or disobey any requirements, procedures, policies or regulations of networks connected to the Sites, or attempt to breach the security of or disrupt Internet communications on the Sites (including without limitation accessing data to which you are not the intended recipient or logging into a server or account for which you are not expressly authorized); (ix) impersonate any person or entity, including, without limitation, one of PetSmart Charities» or another party's officers or employees, or falsely state or otherwise misrepresent your affiliation with a person or entity; (x) forge headers or otherwise manipulate identifiers in order to disguise the origin of any information transmitted through the Sites; (xi) collect or store personal data about other account users or attempt to gain access to other account users» accounts or otherwise mine information about other account users or the Sites, or interfere with any other user's ability to access or use the Sites; (xii) execute any form of network monitoring or run a network analyzer or packet sniffer or other technology to intercept, decode, mine or display any packets used to communicate between the Sites» servers or any data not intended for you; (xiii) attempt to circumvent authentication or security of any content, host, network or account («cracking») on or from the Sites; or (xiv) in PetSmart Charities» sole discretion, are contrary to PetSmart Charities» public image, goodwill, reputation or mission, or otherwise not in furtherance of our Vision of a lifelong, loving home for every pet.
You will not, and will not allow or authorize others to, use the Services or the Sites to take any actions that: (i) infringe on any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy; (ii) violate any applicable law, statute, ordinance or regulation (including those regarding export control); (iii) are defamatory, trade libelous, threatening, harassing, invasive of privacy, stalking, harassment, abusive, tortuous, hateful, discriminatory based on race, ethnicity, gender, sex or disability, pornographic or obscene; (iv) interfere with or disrupt any services or equipment with the intent of causing an excessive or disproportionate load on the Animal League or its licensors or suppliers» infrastructure; (v) involve knowingly distributing viruses, Trojan horses, worms, or other similar harmful or deleterious programming routines; (vi) involve the preparation and / or distribution of «junk mail», «spam», «chain letters», «pyramid schemes» or other deceptive online marketing practices or any unsolicited bulk email or unsolicited commercial email or otherwise in a manner that violate the Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN - SPAM Act of 2003); (vii) would encourage conduct that could constitute a criminal offense, give rise to civil liability or otherwise violate any applicable local, state, federal or international laws, rules or regulations; (viii) involve the unauthorized entry to any machine accessible via the Services or interfere with the Sites or any servers or networks connected to the Sites or disobey any requirements, procedures, policies or regulations of networks connected to the Sites, or attempt to breach the security of or disrupt Internet communications on the Sites (including without limitation accessing data to which you are not the intended recipient or logging into a server or account for which you are not expressly authorized); (ix) impersonate any person or entity, including, without limitation, one of the Animal League's or other's officers or employees, or falsely state or otherwise misrepresent your affiliation with a person or entity; (x) forge headers or otherwise manipulate identifiers in order to disguise the origin of any information transmitted through the Sites; (xi) collect or store personal data about other Animal League members, Site users or attempt to gain access to other Animal League members information, or otherwise mine information about Animal League members, Site users, or the Sites; (xii) execute any form of network monitoring or run a network analyzer or packet sniffer or other technology to intercept, decode, mine or display any packets used to communicate between the Sites» servers or any data not intended for you; (xiii) attempt to circumvent authentication or security of any content, host, network or account («cracking») on or from the Sites; or (xiv) are contrary to the Animal League's public image, goodwill, reputation or mission or otherwise not in furtherance of the Animal Leagues stated purposes.
Activating a password - protected screensaver is a simple and very effective way to prevent an unauthorized person from rifling through the data on a computer or other device that's been inadvertently left on or lost.
These stakeholders say this program is offensive and invasive; areas of concern include unauthorized or unnecessary data collection, use and disclosure of personal information, forensic usage, usage as unique identifier — which can identify a person and his or her day - to - day activities through the linkage of various activities and databases — as well as function creep or biometric information collected being used for different or additional purposes than originally stated by the authorities.
If any person knowingly violates any of the provisions of G.S. 84 - 4 through G.S. 84 - 6 or G.S. 84 - 9, fraudulently holds himself or herself out as a North Carolina certified paralegal by use of the designations set forth in G.S. 84 - 37 (a), or knowingly aids and abets another person to commit the unauthorized practice of law, in addition to any other liability imposed pursuant to this Chapter or any other applicable law, any person who is damaged by the unlawful acts set out in this section shall be entitled to maintain a private cause of action to recover damages and reasonable attorneys» fees and other injunctive relief as ordered by court.
Activating a password - protected screensaver is a simple and very effective way to prevent an unauthorized person from rifling through the data on a computer or other device that's been inadvertently...
The Minister may also authorize his IT people «to intercept private communications in relation to an activity or class of activities specified in the authorization, if such communications originate from, are directed to or transit through any such computer system or network, in the course of and for the sole purpose of identifying, isolating or preventing any harmful unauthorized use of, any interference with or any damage to those systems or networks, or any damage to the data that they contain.»
a b c d e f g h i j k l m n o p q r s t u v w x y z