Access to Bank’s Consumer Database Sample Clauses

Access to Bank’s Consumer Database. Except to the extent limited by the proprietary rights of third parties, including other Bank customers, other contractual obligations of Bank and Applicable Law, Bank shall provide JCPenney and other Authorized Entities, at their reasonable request and costs, information from its “prospect” database for the sole purpose of selling merchandise in stores or by catalog or Internet, but information from such database shall not be used for marketing by DMS.
AutoNDA by SimpleDocs

Related to Access to Bank’s Consumer Database

  • Access to Bank's Records (a) Bank shall create and maintain all records relating to its activities and obligations under this Agreement in such manner as will meet the obligations of Customer under the 1940 Act, with particular attention to Section 31 thereof and rules 31a-1 and 31a-2 thereunder. All such records shall be property of Customer. Bank will allow Customer's duly authorized officers, employees, and agents, including Customer's independent public accountants, and the employees and agents of the SEC access at all times during the regular business hours of Bank to such records. Except, in the case of access by the SEC as otherwise required by the SEC, such access will be subject to reasonable notice to Bank. Subject to restrictions under Applicable Law, Bank also will obtain an undertaking to permit Customer's independent public accountants reasonable access to the records of any Subcustodian of Securities held in the Securities Account as may be required in connection with such examination. (b) In addition, Bank shall cooperate with and supply necessary information to any entity or entities appointed by the Customer to keep its books of account and/or compute its net asset value. Bank shall provide reports and other data as Customer may from time to time reasonably request to enable Customer to obtain, from year to year, favorable opinions from Customer's independent accountants with respect to Bank's activities hereunder in connection with (i) the preparation of any registration statement of Customer and any other reports required by a governmental agency or regulatory authority with jurisdiction over the Fund, and (ii) the fulfillment by Customer of any other requirements of a governmental agency or regulatory authority with jurisdiction over the Fund. (c) Upon reasonable request of Customer, Bank shall provide Customer with a copy of Bank's Service Organizational Control (SOC) 1 reports (or any successor reports) prepared in accordance with the requirements of AT-C section 320, Reporting on an Examination of Controls at a Service Organization Relevant to User Entities' Internal Control Over Financial Reporting (or any successor attestation standard). In addition, from time to time as requested, Bank will furnish Customer a "gap" or "bridge" letter that will address any material changes that might have occurred in Customer's controls covered in the SOC Report from the end of the SOC Report period through a specified requested date. Bank shall use commercially reasonable efforts to provide Customer with such reports as Customer may reasonably request or otherwise reasonably require to fulfill its duties under Rule 38a-l of the 1940 Act or similar legal and regulatory requirements. Upon reasonable request by Customer, Bank shall also provide to Customer customary sub- certifications in connection with Xxxxxxxx-Xxxxx Act of 2002 certification requirements. Upon written request, Bank shall provide Customer with information about Bank's processes for the management and monitoring of Subcustodians for safeguarding Financial Assets.

  • System Agency Data A. As between the Parties, all data and information acquired, accessed, or made available to Grantee by, through, or on behalf of System Agency or System Agency contractors, including all electronic data generated, processed, transmitted, or stored by Grantee in the course of providing data processing services in connection with Xxxxxxx’s performance hereunder (the “System Agency Data”), is owned solely by System Agency. B. Grantee has no right or license to use, analyze, aggregate, transmit, create derivatives of, copy, disclose, or process the System Agency Data except as required for Grantee to fulfill its obligations under the Grant Agreement or as authorized in advance in writing by System Agency. C. For the avoidance of doubt, Grantee is expressly prohibited from using, and from permitting any third party to use, System Agency Data for marketing, research, or other non-governmental or commercial purposes, without the prior written consent of System Agency. D. Grantee shall make System Agency Data available to System Agency, including to System Agency’s designated vendors, as directed in writing by System Agency. The foregoing shall be at no cost to System Agency. E. Furthermore, the proprietary nature of Xxxxxxx’s systems that process, store, collect, and/or transmit the System Agency Data shall not excuse Xxxxxxx’s performance of its obligations hereunder.

  • Database The LERG is available through Telcordia. ICONN is available through the Qwest web site.

  • Protection of Customer Data The Supplier shall not delete or remove any proprietary notices contained within or relating to the Customer Data. The Supplier shall not store, copy, disclose, or use the Customer Data except as necessary for the performance by the Supplier of its obligations under this Call Off Contract or as otherwise Approved by the Customer. To the extent that the Customer Data is held and/or Processed by the Supplier, the Supplier shall supply that Customer Data to the Customer as requested by the Customer and in the format (if any) specified by the Customer in the Call Off Order Form and, in any event, as specified by the Customer from time to time in writing. The Supplier shall take responsibility for preserving the integrity of Customer Data and preventing the corruption or loss of Customer Data. The Supplier shall perform secure back-ups of all Customer Data and shall ensure that up-to-date back-ups are stored off-site at an Approved location in accordance with any BCDR Plan or otherwise. The Supplier shall ensure that such back-ups are available to the Customer (or to such other person as the Customer may direct) at all times upon request and are delivered to the Customer at no less than six (6) Monthly intervals (or such other intervals as may be agreed in writing between the Parties). The Supplier shall ensure that any system on which the Supplier holds any Customer Data, including back-up data, is a secure system that complies with the Security Policy and the Security Management Plan (if any). If at any time the Supplier suspects or has reason to believe that the Customer Data is corrupted, lost or sufficiently degraded in any way for any reason, then the Supplier shall notify the Customer immediately and inform the Customer of the remedial action the Supplier proposes to take. If the Customer Data is corrupted, lost or sufficiently degraded as a result of a Default so as to be unusable, the Supplier may: require the Supplier (at the Supplier's expense) to restore or procure the restoration of Customer Data to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer, and the Supplier shall do so as soon as practicable but not later than five (5) Working Days from the date of receipt of the Customer’s notice; and/or itself restore or procure the restoration of Customer Data, and shall be repaid by the Supplier any reasonable expenses incurred in doing so to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer.

  • Line Information Database LIDB is a transaction-oriented database accessible through Common Channel Signaling (CCS) networks. For access to LIDB, ONS must purchase appropriate signaling links pursuant to Section 10 of this Attachment. LIDB contains records associated with End User Line Numbers and Special Billing Numbers. LIDB accepts queries from other Network Elements and provides appropriate responses. The query originator need not be the owner of LIDB data. LIDB queries include functions such as screening billed numbers that provides the ability to accept Collect or Third Number Billing calls and validation of Telephone Line Number based non-proprietary calling cards. The interface for the LIDB functionality is the interface between BellSouth’s CCS network and other CCS networks. LIDB also interfaces to administrative systems.

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • Authoritative Root Database To the extent that ICANN is authorized to set policy with regard to an authoritative root server system (the “Authoritative Root Server System”), ICANN shall use commercially reasonable efforts to (a) ensure that the authoritative root will point to the top-­‐level domain nameservers designated by Registry Operator for the TLD, (b) maintain a stable, secure, and authoritative publicly available database of relevant information about the TLD, in accordance with ICANN publicly available policies and procedures, and (c) coordinate the Authoritative Root Server System so that it is operated and maintained in a stable and secure manner; provided, that ICANN shall not be in breach of this Agreement and ICANN shall have no liability in the event that any third party (including any governmental entity or internet service provider) blocks or restricts access to the TLD in any jurisdiction.

  • Domain Name Data 1.5.1 Query format: whois EXAMPLE.TLD 1.5.2 Response format:

  • CONSUMER REPORTS The Buyer is hereby notified that a consumer report containing credit and/or personal information may be referred to in connection with this transaction.

  • Originating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!