Access to Product; Terms of Use Sample Clauses

Access to Product; Terms of Use. Second Street will provide Subscriber with all necessary access to create passwords to enable Subscriber Users to access the administrative tools and features of the Product(s) to customize and rebrand the Product for use on the applicable Subscriber sites. Subscriber will promptly notify Second Street if Subscriber becomes aware that any such password has been obtained by any third- party without Subscriber authorization. Subscriber shall be responsible for any customization it makes, any text, image, photograph, video or other content it adds to the Product (excluding Second Street Content), and any customization it engages Second Street to provide primarily for its benefit, such as through the delivery of Professional Services (“Subscriber Content”). Subscriber’s access to the Products through the Second Street website (“Site”) will be subject to such additional guidelines, restrictions, or rules applicable to such Site, including without limitation any technical specifications that Second Street may provide from time to time and Second Street’s Site Terms of Use and Privacy Policy which are available at xxx.xxxxxxxxxxxx.xxx, or such other URL as Second Street may provide from time to time (collectively “Policies”). The Policies are hereby incorporated into this Agreement by reference. Subscriber is responsible for all activity that occurs in its Subscriber accounts and for its Subscribers’ compliance with this Agreement. Subscriber shall: (i) have sole responsibility for the accuracy, quality, integrity, legality, reliability and appropriateness of all Subscriber Data; (ii) prevent unauthorized access to, or use of, the Service, and notify Second Street promptly of any such unauthorized access or use. Subscriber shall display its privacy policy (the “Subscriber Privacy Policy”), and Subscriber’s terms of use (the “Subscriber Terms of Use”) as part of its Subscriber Content, and when applicable, a link to Second Street’s official rules for contests, sweepstakes and promotions conducted and administered by Second Street (the “Official Rules”) (collectively “Links”). The Links shall be placed in conspicuous locations. In addition, your Subscriber Privacy Policy and Subscriber Terms of Use will contain terms regarding prohibited content that are no less restrictive than the limitations and prohibitions set forth in this Section 1.1.
AutoNDA by SimpleDocs

Related to Access to Product; Terms of Use

  • Terms of Use 1. The Contribution will be made Open Access under the terms of the Creative Commons Attribution License which permits use, distribution and reproduction in any medium, provided that the Contribution is properly cited.

  • Access to Network Interface Device (NID 2.4.3.1. Due to the wide variety of NIDs utilized by BellSouth (based on subscriber size and environmental considerations), Mpower may access the on-premises wiring by any of the following means: BellSouth shall allow Mpower to connect its loops directly to BellSouth’s multi-line residential NID enclosures that have additional space and are not used by BellSouth or any other telecommunications carriers to provide service to the premise. Mpower agrees to install compatible protectors and test jacks and to maintain the protection system and equipment and to indemnify BellSouth pursuant to Section 8 of the General Terms and Conditions of this Agreement.

  • Access to Software Access Rights to Software which is Results shall comprise: Access to the Object Code; and, where normal use of such an Object Code requires an Application Programming Interface (hereafter API), Access to the Object Code and such an API; and, if a Party can show that the execution of its tasks under the Project or the Exploitation of its own Results is technically or legally impossible without Access to the Source Code, Access to the Source Code to the extent necessary. Background shall only be provided in Object Code unless otherwise agreed between the Parties concerned.

  • Software License Terms (a) Software that is made available by a Provider to Recipient in connection with any Service (any such Software being referred to herein as “TSA-Licensed Software”) provided hereunder will be subject to the terms set forth in this Section 3.5 except as otherwise provided in the applicable Service Schedule. The Provider hereby grants to the Recipient a non-exclusive, non-transferable license to use, in object code form, any TSA-Licensed Software that is made available by the Provider pursuant to a Service Schedule. For the avoidance of doubt, the Provider that makes available any TSA-Licensed Software in connection with the provision of any Service retains the unrestricted right to enhance or otherwise modify such TSA-Licensed Software at any time, provided that such enhancements or other modifications do not disrupt the provision of such Service to the Recipient.

  • Purchase Order Flip via Ariba Network (AN) The online process allows suppliers to submit invoices via the AN for catalog and non- catalog goods and services. Contractors have the ability to create an invoice directly from their Inbox in their AN account by simply “flipping” the purchase order into an invoice. This option does not require any special software or technical capabilities. For the purposes of this section, the Contractor warrants and represents that it is authorized and empowered to and hereby grants the State and the third-party provider of MFMP the right and license to use, reproduce, transmit, distribute, and publicly display within the system the information outlined above. In addition, the Contractor warrants and represents that it is authorized and empowered to and hereby grants the State and the third-party provider the right and license to reproduce and display within the system the Contractor’s trademarks, system marks, logos, trade dress, or other branding designation that identifies the products made available by the Contractor under the Contract.

  • End User License Agreement This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License. xxxx://xxxxxxxxxxxxxxx.xxx/licenses/by-nc-nd/3.0/ You are free to: Share: to copy, distribute and transmit the work Under the following conditions: Attribution: You must attribute the work in the manner specified by the author (but not in any way that suggests that they endorse you or your use of the work).

  • License Terms This license is for one full Semester. It cannot be cancelled or terminated except under the conditions cited in this license.

  • Access to System If Business Associate needs access to a Covered Entity Information Technology system to comply with its obligations under the Contract or this Agreement, Business Associate shall request, review, and comply with any and all policies applicable to Covered Entity regarding such system including, but not limited to, any policies promulgated by the Office of Information Technology and available at xxxx://xxx.xxxxx.xx.xx/about/policies.

  • Access to PHI Business Associate shall provide access to PHI in a Designated Record Set to Covered Entity or as directed by Covered Entity to an Individual to meet the requirements under 45 CFR § 164.524. Business Associate shall provide such access in the time and manner reasonably designated by Covered Entity. Within three (3) business days, Business Associate shall forward to Covered Entity for handling any request for access to PHI that Business Associate directly receives from an Individual.

  • Specific Restrictions on Use of Licensed Materials Unauthorized Use. Licensee shall not knowingly permit anyone other than Authorized Users to use the Licensed Materials.

Time is Money Join Law Insider Premium to draft better contracts faster.