Sentences with phrase «unauthorized use of that information»

www.shop.thebettyrocker.com and The Betty Rocker, Inc. do not represent or warrant that unauthorized use of information from this or other websites does not infringe on the trademark rights of third parties.
www.workouts.thebettyrocker.com and The Betty Rocker, Inc. do not represent or warrant that unauthorized use of information from this or other websites does not infringe on the trademark rights of third parties.
There must have been an unauthorized use of that information to the detriment of the party communicating it (the «detriment» can be in the form of economic losses or psychological and emotional harm).

Not exact matches

NBCUniversal may, in its sole discretion, terminate your password, account (or any part thereof) or use of the online services, or remove and discard any User Content or information stored, sent, or received via the online services without prior notice and for any reason or no reason, including, but not limited to: (i) permitting another person or entity to use your identification to access the Site or online services, (ii) any unauthorized access or use of the online services, (iii) any violation of these Terms of Service, or (iv) tampering with or alteration of any of the software, data files, and / or Content contained in or accessed through, the online services.
«Both jurisdictions are satisfied with the confidentiality rules and data safeguards that are in place in the other jurisdiction to ensure the confidentiality of information exchanged and prevent its unauthorized use,» Australian Taxation Office and Inland Revenue Authority of Singapore said in a joint statement.
You acknowledge that monetary compensation for the consequences of unauthorized commercial use or republication of content or information from the App may not be sufficient or appropriate and in that event, Saucey will be entitled to temporary and permanent injunctive relief to prohibit such use.
Unauthorized use, disclosure or copying of this information or any part thereof is strictly prohibited and may be unlawful.
The information we collect is used to maintain the highest level of security for our clients by verifying your identity and preventing access by unauthorized individuals.
Unauthorized use of the web site or Services, including but not limited to unauthorized entry into Wellington Management's systems, misuse of passwords, or misuse of any information posted to a web site, is strictlyUnauthorized use of the web site or Services, including but not limited to unauthorized entry into Wellington Management's systems, misuse of passwords, or misuse of any information posted to a web site, is strictlyunauthorized entry into Wellington Management's systems, misuse of passwords, or misuse of any information posted to a web site, is strictly prohibited.
No such measure is ever 100 % effective though, so we do not guarantee that your personal and other information will be secure from theft, loss, or unauthorized access or use, and we make no representation as to the reasonableness, efficacy, or appropriateness of the measures we use to safeguard such information.
To prevent unauthorized access, maintain data accuracy, and ensure the correct use of information, we have put in place appropriate physical, electronic, and managerial procedures to safeguard and secure the information we collect online.
We take steps to protect the security, integrity and confidentiality of the personal information and other sensitive information that we collect, store or transmit, but can not guarantee that inadvertent or unauthorized use or disclosure will not occur or that third parties will not gain unauthorized access to this information despite our efforts.
If you become aware of, or believe there has been, any breach of security for any of your information stored on the Saxo Bank's website, such as the theft or unauthorized use of your User Name, password, or any other information, you will notify Saxo Bank immediately.
To the extent permitted by law, we will disclose your information to government authorities or third parties if: (a) required to do so by law, or in response to a subpoena or court order; (b) we believe in our sole discretion that disclosure is reasonably necessary to protect against fraud, to protect the property or other rights of us or other users, third parties or the public at large; or (c) we believe that you have abused the Sites or the Applications by using them to attack other systems or to gain unauthorized access to any other system, to engage in spamming or otherwise to violate applicable laws.
You shall not Post Content that: (1) infringes any proprietary rights of any third party; (2) violates any law or regulation; (3) is defamatory or trade libelous; (4) is harmful, threatening, abusive, harassing, defamatory, vulgar, obscene, intimidating, profane, pornographic, hateful, racially, ethnically or sexually discriminatory or otherwise objectionable in any way or that otherwise violates any right of another; (5) encourages conduct that would violate any conduct prohibited by this Agreement; (6) restricts or inhibits any other user from using the Website; (7) is or amounts to an unsolicited advertisement, promotion, or other form of solicitation; (8) impersonates any person or entity or that directly or indirectly attempts to gain unauthorized access to any portion of the Website or any computer, software, or data of any person, organization or entity that uses or accesses the Website; (9) provides or create links to external sites that violate the Agreement; (10) is intended to harm, exploit, solicit, or collect personally identifiable information of, any individual under the age of 18 («Minor») in any way; (11) invades anyone's privacy by attempting to harvest, collect, store, or publish private or personally identifiable information without their foreknowledge and willing consent or distributes or contains viruses or any other technologies that may harm the Website or any of its users; (12) is copyrighted, protected by trade secret or otherwise subject to third - party proprietary rights, including privacy and publicity rights, unless you are the owner of such rights or have permission from the rightful owner to post the material and to grant Non-GMO Project all of the license rights granted herein; and / or (13) contains or promotes an illegal or unauthorized copy of another person's copyrighted work.
Unauthorized use or removal of ownership information from the images is strictly prohibited.
Although we will use all reasonable efforts to safeguard the confidentiality of any personal information collected, we will not be liable for disclosure of personal information obtained due to errors in transmission or the unauthorized acts of third parties.
Security We will take reasonable steps to protect your personally identifiable information as you transmit your information from your computer to our Site and to protect such information from loss, misuse and unauthorized access, disclosure, alteration or destruction in accordance with this Privacy Policy and the Terms of Use.
You agree to defend, indemnify, and hold harmless the Action Network Group and its affiliates and their officers, directors, employees, consultants, agents, licensors, and suppliers from and against any and all claims, losses, expenses, liabilities, settlements, litigation, damages, and / or costs (including, but not limited to, fees, costs and other expenses of attorneys and expert witnesses) arising out of or related to: (i) your use of the Site, including, but not limited to, any Materials or User Content, (ii) any violation of these Terms of Use or applicable law by you in connection with your use of the Site, including, but not limited to, any Materials or User Content, (iii) any actual or alleged infringement by you, or any person accessing the Site, including, but not limited to, any Materials or User Content, using your password or account identifier, of any intellectual property or privacy or other right of any third party, or (iv) any unauthorized use of password protected Materials or User Content utilizing your account information, whether or not known or authorized by yuse of the Site, including, but not limited to, any Materials or User Content, (ii) any violation of these Terms of Use or applicable law by you in connection with your use of the Site, including, but not limited to, any Materials or User Content, (iii) any actual or alleged infringement by you, or any person accessing the Site, including, but not limited to, any Materials or User Content, using your password or account identifier, of any intellectual property or privacy or other right of any third party, or (iv) any unauthorized use of password protected Materials or User Content utilizing your account information, whether or not known or authorized by yUse or applicable law by you in connection with your use of the Site, including, but not limited to, any Materials or User Content, (iii) any actual or alleged infringement by you, or any person accessing the Site, including, but not limited to, any Materials or User Content, using your password or account identifier, of any intellectual property or privacy or other right of any third party, or (iv) any unauthorized use of password protected Materials or User Content utilizing your account information, whether or not known or authorized by yuse of the Site, including, but not limited to, any Materials or User Content, (iii) any actual or alleged infringement by you, or any person accessing the Site, including, but not limited to, any Materials or User Content, using your password or account identifier, of any intellectual property or privacy or other right of any third party, or (iv) any unauthorized use of password protected Materials or User Content utilizing your account information, whether or not known or authorized by yuse of password protected Materials or User Content utilizing your account information, whether or not known or authorized by you.
However, despite our efforts, no system can completely guaranty that there will never be unauthorized access to your personally identifiable information, and your use of the Site indicates that you are willing to assume this risk.
any unauthorized access to or use of our secure servers and / or any and all personal information stored therein,
(a) errors, mistakes, or inaccuracies of content; (b) personal injury or property damage, of any nature whatsoever, resulting from your access to and use of the Website; (c) any unauthorized access to or use of Science's secure servers and / or any and all personal information stored therein; (d) any interruption or cessation of transmission to or from the Website; (e) any bugs, viruses, trojan horses, or the like which may be transmitted to or through the Website by any third party; and / or (f) any errors or omissions in any content or for any loss or damage of any kind incurred as a result of the use of any content posted, e-mailed, transmitted, or otherwise made available via the Website.
(a) errors, mistakes, or inaccuracies of content; (b) personal injury or property damage, of any nature whatsoever, resulting from your access to and use of the Website; (c) any unauthorized access to or use of Science's secure servers and / or any and all personal information stored therein; (d) any interruption or cessation of transmission to or from the Website; (e) any bugs, viruses, trojan horses, or the like which may be transmitted to or through the Website by any third party; and / or (f) any errors or omissions in any content or for any loss or damage of any kind incurred as a result of the use of any content posted, e-mailed, transmitted, or otherwise made available via the Science Website.
The Endocrine Society is not responsible for, and expressly disclaims all liability for, damages of any kind arising out of use, reference to, reliance on, or performance of such information, as well as for any damages or injury caused by any failure of performance, error, omission, interruption, deletion, defect, delay in operation or transmission, computer virus, communication line failure, theft or destruction or unauthorized access to, alteration of, or use of any record.
You also agree to promptly notify us at [email protected] of any unauthorized use of your username, password, other account information, or any other breach of security that you become aware of involving or relating to the Website.
The information you submit is encrypted using Secure Sockets Layer Protocol (SSL) and stored on our servers to reduce the risk of unauthorized access.
It is possible for Other Users or unauthorized users to obtain and misuse information about the User as a result of the User's use of the Service.
f) attempt to gain unauthorized access to any information available on the Service or to any of the networks used in providing the Service;
This is the reason they have a very strict privacy policy and do not make unauthorized use of your personal information.
As a reputable dating service we at EliteSingles place a great emphasis on the responsible use and protection of your personal information against loss and unauthorized access.
Maggie Siff Online takes all measures reasonably necessary to protect against the unauthorized access, use, alteration or destruction of potentially personally - identifying and personally - identifying information.
Ensuring Student Privacy on the Internet The Children's Internet Protection Act requires that school districts develop an Internet safety plan addressing the unauthorized disclosure, use, and dissemination of personal identification information regarding minors.
The Children's Internet Protection Act (CIPA), in addition to requiring districts to monitor student use of the Internet and to implement technology protection measures, mandates the development of an Internet safety plan that addresses the unauthorized disclosure, use, and dissemination of personal identification information regarding minors.
The Children's Internet Protection Act requires that school districts develop an Internet safety plan addressing the unauthorized disclosure, use, and dissemination of personal identification information regarding minors.
Although we make good faith efforts to maintain the security of such Personal Information, we can not guarantee that it will remain free from unauthorized access, use, disclosure, or alteration.
Edweek.org can not be responsible for any unauthorized third party use of information that you disclose in a public area on the edweek.org site.
However, we can not control their use of that information outside this scope and we are not responsible for such unauthorized uses.
You expressly acknowledge and agree that the National Education Union shall not be liable for any direct, indirect, incidental, special, consequential or exemplary damages, including but not limited to, damages for loss of profits, goodwill, use, data or other intangible losses (even if the National Education Union has been advised of the possibility of such damages), resulting from: (i) the use or the inability to use the service; (ii) the cost of procurement of substitute goods and services resulting from any goods, data, information or services purchased or obtained or messages received or transactions entered into through or from the service; (iii) unauthorized access to or alteration of your transmissions or data; (iv) statements or conduct of any third party on the service; or (v) any other matter relating to the service.
Prohibit employees from engaging in financial transactions using nonpublic Government information, making unauthorized commitments, using public office for private gain, and engaging in nonofficial activities that conflict with the performance of duty.
All web sites have a System Use Notification message to inform potential users that (a) they are accessing a United States Government information system; (b) system usage may be monitored, recorded, or subject to audit; (c) unauthorized use of the system is prohibited and subject to criminal and civil penalties; and (d) the use of the system indicates consent to monitoring and recordiUse Notification message to inform potential users that (a) they are accessing a United States Government information system; (b) system usage may be monitored, recorded, or subject to audit; (c) unauthorized use of the system is prohibited and subject to criminal and civil penalties; and (d) the use of the system indicates consent to monitoring and recordiuse of the system is prohibited and subject to criminal and civil penalties; and (d) the use of the system indicates consent to monitoring and recordiuse of the system indicates consent to monitoring and recording.
Cars.com expressly reserves the right to release any personally identifiable information or other information you provide to third parties under the following circumstances: (a) when required by law or legal process, (b) to investigate and / or take action against illegal activity, suspected abuse or unauthorized use of the Site, (c) to protect the property or safety of our users or others, (d) to enforce our Terms of Service and (e) in connection with any sale or other transfer of ownership of all or a part of Cars.com.
To protect your information, and to prevent unauthorized access, maintain data accuracy, and ensure the correct use of information, we have put in place appropriate physical, electronic, and managerial procedures to safeguard and secure the information we collect online.
We use a variety of security technologies and procedures to help protect your personal information from unauthorized access, use, or disclosure.
IN NO EVENT SHALL EBOOK ARCHITECTS, ITS OFFICERS, DIRECTORS, EMPLOYEES, OR AGENTS, BE LIABLE TO YOU FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES WHATSOEVER RESULTING FROM ANY (I) ERRORS, MISTAKES, OR INACCURACIES OF CONTENT OR SOFTWARE, (II) PERSONAL INJURY OR PROPERTY DAMAGE, OF ANY NATURE WHATSOEVER, RESULTING FROM YOUR ACCESS TO AND USE OF OUR WEB SITE OR SOFTWARE, (III) ANY UNAUTHORIZED ACCESS TO OR USE OF OUR SECURE SERVERS OR SOFTWARE AND / OR ANY AND ALL PERSONAL INFORMATION AND / OR FINANCIAL INFORMATION STORED THEREIN, (IV) ANY INTERRUPTION OR CESSATION OF TRANSMISSION TO OR FROM OUR WEBSITE OR SOFTWARE, (IV) ANY BUGS, VIRUSES, TROJAN HORSES, OR THE LIKE, WHICH MAY BE TRANSMITTED TO OR THROUGH OUR WEB SITE OR SOFTWARE BY ANY THIRD PARTY, AND / OR (V) ANY ERRORS OR OMISSIONS IN ANY CONTENT OR FOR ANY LOSS OR DAMAGE OF ANY KIND INCURRED AS A RESULT OF YOUR USE OF ANY CONTENT POSTED, EMAILED, TRANSMITTED, OR OTHERWISE MADE AVAILABLE VIA THIS WEB SITE OR SOFTWARE, WHETHER BASED ON WARRANTY, CONTRACT, TORT, OR ANY OTHER LEGAL THEORY, AND WHETHER YOU HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
The federal Fair Credit Billing Act limits your liability for unauthorized charges to $ 50, and you're not responsible for any fraudulent purchases if you report suspected theft of your information before the card is actually used.
Use your Visa card to make purchases anywhere and you're protected from unauthorized use of your card or account informatiUse your Visa card to make purchases anywhere and you're protected from unauthorized use of your card or account informatiuse of your card or account information.
Shop online or in - store with the peace of mind knowing that you're entitled to certain protections from unauthorized use of your cards or account information.
We may disclose personal information (1) if we believe such sharing is appropriate to comply with the law or with legal process; (2) to protect and defend our rights, services or property; (3) to protect against misuse or unauthorized use of the Services; or (4) to protect the safety or property of our users or any member of the public (among other things, this means that if we believe you have provided false information or attempted to pose as someone else, information Simply you may be disclosed as part of any investigation into your actions).
You will not, and will not allow or authorize others to, use the Services, the Sites or any Materials therein to take any actions that: (i) infringe on PetSmart Charities» or any third party's copyright, patent, trademark, trade secret or other intellectual or proprietary rights, or rights of publicity or privacy; (ii) violate any applicable law, statute, ordinance or regulation (including those regarding export control); (iii) are defamatory, trade libelous, threatening, harassing, invasive of privacy, stalking, harassment, abusive, tortuous, hateful, constitute discrimination based on race, religion, ethnicity, gender, sex, disability or other protected grounds, or are pornographic or obscene; (iv) interfere with or disrupt any services or equipment with the intent of causing an excessive or disproportionate load on PetSmart Charities or its licensors or suppliers» infrastructure; (v) involve knowingly distributing viruses, Trojan horses, worms, or other similar harmful or deleterious programming routines; (vi) involve the preparation and / or distribution of «junk mail», «spam», «chain letters», «pyramid schemes» or other deceptive online marketing practices, or any unsolicited bulk email or unsolicited commercial email or otherwise in a manner that violate any applicable «anti-spam» legislation, including that commonly referred to as «CASL»; (vii) would be or encourage conduct that could constitute a criminal offense, give rise to civil liability or otherwise violate any applicable local, state, national or international laws or regulations; (viii) involve the unauthorized entry to any machine accessible via the Services or interference with the Sites or any servers or networks connected to the Sites or disobey any requirements, procedures, policies or regulations of networks connected to the Sites, or attempt to breach the security of or disrupt Internet communications on the Sites (including without limitation accessing data to which you are not the intended recipient or logging into a server or account for which you are not expressly authorized); (ix) impersonate any person or entity, including, without limitation, one of PetSmart Charities» or another party's officers or employees, or falsely state or otherwise misrepresent your affiliation with a person or entity; (x) forge headers or otherwise manipulate identifiers in order to disguise the origin of any information transmitted through the Sites; (xi) collect or store personal data about other account users or attempt to gain access to other account users» accounts or otherwise mine information about other account users or the Sites, or interfere with any other user's ability to access or use the Sites; (xii) execute any form of network monitoring or run a network analyzer or packet sniffer or other technology to intercept, decode, mine or display any packets used to communicate between the Sites» servers or any data not intended for you; (xiii) attempt to circumvent authentication or security of any content, host, network or account («cracking») on or from the Sites; or (xiv) in PetSmart Charities» sole discretion, are contrary to PetSmart Charities» public image, goodwill, reputation or mission, or otherwise not in furtherance of our Vision of a lifelong, loving home for every pet.
You will not, and will not allow or authorize others to, use the Services or the Sites to take any actions that: (i) infringe on any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy; (ii) violate any applicable law, statute, ordinance or regulation (including those regarding export control); (iii) are defamatory, trade libelous, threatening, harassing, invasive of privacy, stalking, harassment, abusive, tortuous, hateful, discriminatory based on race, ethnicity, gender, sex or disability, pornographic or obscene; (iv) interfere with or disrupt any services or equipment with the intent of causing an excessive or disproportionate load on the Animal League or its licensors or suppliers» infrastructure; (v) involve knowingly distributing viruses, Trojan horses, worms, or other similar harmful or deleterious programming routines; (vi) involve the preparation and / or distribution of «junk mail», «spam», «chain letters», «pyramid schemes» or other deceptive online marketing practices or any unsolicited bulk email or unsolicited commercial email or otherwise in a manner that violate the Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN - SPAM Act of 2003); (vii) would encourage conduct that could constitute a criminal offense, give rise to civil liability or otherwise violate any applicable local, state, federal or international laws, rules or regulations; (viii) involve the unauthorized entry to any machine accessible via the Services or interfere with the Sites or any servers or networks connected to the Sites or disobey any requirements, procedures, policies or regulations of networks connected to the Sites, or attempt to breach the security of or disrupt Internet communications on the Sites (including without limitation accessing data to which you are not the intended recipient or logging into a server or account for which you are not expressly authorized); (ix) impersonate any person or entity, including, without limitation, one of the Animal League's or other's officers or employees, or falsely state or otherwise misrepresent your affiliation with a person or entity; (x) forge headers or otherwise manipulate identifiers in order to disguise the origin of any information transmitted through the Sites; (xi) collect or store personal data about other Animal League members, Site users or attempt to gain access to other Animal League members information, or otherwise mine information about Animal League members, Site users, or the Sites; (xii) execute any form of network monitoring or run a network analyzer or packet sniffer or other technology to intercept, decode, mine or display any packets used to communicate between the Sites» servers or any data not intended for you; (xiii) attempt to circumvent authentication or security of any content, host, network or account («cracking») on or from the Sites; or (xiv) are contrary to the Animal League's public image, goodwill, reputation or mission or otherwise not in furtherance of the Animal Leagues stated purposes.
a b c d e f g h i j k l m n o p q r s t u v w x y z