Use of Cookies 5.1 We use cookies to ensure that our website works effectively and to support your trading activities. Cookies are small text files sent from our web server to your computer. Our cookies do not contain any personal data, account numbers, or passwords.
Cooperation on Preventing End User Fraud The Parties agree to cooperate fully with one another to investigate, minimize, prevent, and take corrective action in cases of fraud.
Use of Trunk Forecasts Trunk forecasts provided pursuant to this Agreement must be prepared in good faith but are not otherwise binding on CBB or Verizon.
Use of First Samples Drawn For the purposes of all samples (Discovery Sample(s) and Full Sample(s)) discussed in this Appendix, the Paid Claims selected in each first sample shall be used (i.e., it is not permissible to generate more than one list of random samples and then select one for use with the Discovery Sample or Full Sample).
Definitions and Abbreviations 12. The following terms and definitions shall apply to this Agreement:
Use of Terms The terms “affiliated person,” “interested persons,” “assignment,” and “majority of the outstanding voting securities,” as used herein, shall have the same meanings as in the 1940 Act and any applicable regulations thereunder.
Exceptional Access to Thick Registration Data In case of a registrar failure, deaccreditation, court order, etc. that prompts the temporary or definitive transfer of its domain names to another registrar, at the request of ICANN, Registry Operator will provide ICANN with up-‐to-‐date data for the domain names of the losing registrar. The data will be provided in the format specified in Specification 2 for Data Escrow. The file will only contain data related to the domain names of the losing registrar. Registry Operator will provide the data as soon as commercially practicable, but in no event later than five (5) calendar days following ICANN’s request. Unless otherwise agreed by Registry Operator and ICANN, the file will be made available for download by ICANN in the same manner as the data specified in Section 3.1 of this Specification.
Use of Technology Participants are subject to all existing laws (federal and state) and University regulations and policies on use of technology, including not only those laws and regulations that are specific to computers and networks, but also those that may apply generally to personal conduct such as: UC Electronic Communications Policy: xxxx://xxxxxx.xxxx.xxx/doc/7000470/ElectronicCommunications UCLA E-mail Policy and Guidelines: xxxx://xxx.xxxxxxxxxxxxx.xxxx.xxx/app/Default.aspx?&id=455 IT Services Acceptable Use Policy: xxxx://xxx.xxx.xxxx.xxx/policies/aupdetail.html The UC Policy on Copyright Ownership: xxxx://xxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx.xxx/resources/copyright-ownership.html Bruin OnLine Service Level Agreement: xxxx://xxx.xxx.xxxx.xxx/policies/BOL_SLA.pdf Any violation may result in technology related privileges being restricted or revoked and may also result in The University undertaking disciplinary or civil action. If the violation constitutes a criminal offense, appropriate legal action may be taken.
Use of the Software licensed hereunder may require third party software or hardware (including but limited to databases, operating systems and servers). Unless specifically licensed in the Master Agreement, this Agreement does not contain a license to use such additional materials.
OBLIGATIONS AND ACTIVITIES OF CONTRACTOR AS BUSINESS ASSOCIATE 1. Contractor agrees not to use or further disclose PHI County discloses to Contractor other than as permitted or required by this Business Associate Contract or as required by law.