Access Use and Restrictions Sample Clauses

Access Use and Restrictions. You: (a) are responsible for maintaining the security and privacy of your unique access information, and must not provide it to any other person; (b) are responsible for maintaining and monitoring your registered administrative email address inbox to which messages will be sent relating to the use of or access to the WAPHA portal, including any spam and/or junk folder; (c) are responsible for updating WAPHA as to any change to your registered administrative email address; (d) are responsible for ensuring all security updates and/or patches issued by your clinical information system provider, or by your relevant data extraction provider (if one is used) are installed promptly on becoming available; (e) must not access and/or use the WAPHA portal other than for the permitted purpose; (f) must not or attempt to modify, copy, adapt, reproduce, disassemble, decompile, tamper, interfere or reverse engineer the WAPHA portal or in any manner affect the functionality or proper working of the WAPHA portal; (g) must not manipulate or attempt to manipulate any content or material of the WAPHA portal or the shared data; (h) remove or obscure WAPHA’s trade xxxx or other proprietary notices from any of the materials displayed on or downloaded from the WAPHA portal; (i) must not sell, rent, lease, sub- licence, transfer, assign, distribute, grant a security interest over, provide outsourced services for or in any way commercially exploit the WAPHA portal; (j) must immediately notify WAPHA of any unauthorised use of your unique access information or any unauthorised access to the WAPHA portal; (k) must not make illegal use of the WAPHA portal or use it for illegal purposes; (l) must not interfere with anyone who is a user of the WAPHA portal in their use of the WAPHA portal; (m) must not access the WAPHA portal in any manner contrary to WAPHA’s instructions; (n) must not breach or attempt to breach any security measures of the WAPHA portal; and (o) must not impersonate any person, entity or general practice or misrepresent yourself, your affiliation with any third party, or a general practice.
AutoNDA by SimpleDocs
Access Use and Restrictions 

Related to Access Use and Restrictions

  • Use Restrictions (a) Company will not do or attempt to do, and Company will not permit any other person or entity to do or attempt to do, any of the following, directly or indirectly: (i) use any Proprietary Item for any purpose, at any location or in any manner not specifically authorized by this Agreement; (ii) make or retain any copy of any Proprietary Item except as specifically authorized by this Agreement; (iii) create, recreate or obtain the source code for any Proprietary Item; (iv) refer to or otherwise use any Proprietary Item as part of any effort to develop other software, programs, applications, interfaces or functionalities or to compete with BNYM or a Third Party Provider; (v) modify, adapt, translate or create derivative works based upon any Proprietary Item, or combine or merge any Proprietary Item or part thereof with or into any other product or service not provided for in this Agreement and not authorized in writing by BNYM; (vi) remove, erase or tamper with any copyright or other proprietary notice printed or stamped on, affixed to, or encoded or recorded in any Proprietary Item, or fail to preserve all copyright and other proprietary notices in any copy of any Proprietary Item made by Company; (vii) sell, transfer, assign or otherwise convey in any manner any ownership interest or Intellectual Property Right of BNYM, or market, license, sublicense, distribute or otherwise grant, or subcontract or delegate to any other person, including outsourcers, vendors, consultants, joint venturers and partners, any right to access or use any Proprietary Item, whether on Company’s behalf or otherwise; (viii) subcontract for or delegate the performance of any act or function involved in accessing or using any Proprietary Item, whether on Company’s behalf or otherwise; (ix) reverse engineer, re-engineer, decrypt, disassemble, decompile, decipher, reconstruct, re-orient or modify the circuit design, algorithms, logic, source code, object code or program code or any other properties, attributes, features or constituent parts of any Proprietary Item; (x) take any action that would challenge, contest, impair or otherwise adversely effect an ownership interest or Intellectual Property Right of BNYM; (xi) use any Proprietary Item to provide remote processing, network processing, network communications, a service bureau or time sharing operation, or services similar to any of the foregoing to any person or entity, whether on a fee basis or otherwise; (xii) allow Harmful Code into any Proprietary Item, as applicable, or into any interface or other software or program provided by it to BNYM, through Company’s systems or personnel or Company’s use of the Licensed Services or Company’s activities in connection with this Agreement. (b) Company shall, promptly after becoming aware of such, notify BNYM of any facts, circumstances or events regarding its or a Permitted User’s use of the Licensed System that are reasonably likely to constitute or result in a breach of this Section 2.12, and take all reasonable steps requested by BNYM to prevent, control, remediate or remedy any such facts, circumstances or events or any future occurrence of such facts, circumstances or events.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!