Administered Authentication. Where the Distributor or the Publisher provides alternative methods of access and authentication beyond the Licensee- administered methods described herein, e.g. by allowing users to establish a personal login from an on-campus IP address (thereby enabling access via username and password when logging in to a website of the Distributor) or device authentication, which affiliates the device or application by use of a token, cookie, or vendor-managed proxy prefix, neither the Licensee nor any Participating Institution will be responsible or liable for claims of breach or validity of such use. Neither the Licensee nor any of the Participating Institutions shall be responsible or liable for the processing of personally identifiable information (personal data) by the Distributor or Publisher in this matter as this remains its full liability.
Administered Authentication. In the event that Distributor or Publisher provide alternative methods of access and authentication beyond the Licensee-administered methods described herein, e.g. by allowing users to establish a personal login from an on-campus IP address (thereby enabling access via username and password when logging in to a vendor website) or device authentication, which affiliates the device or application by use of a token, cookie, or vendor-managed proxy prefix, neither Licensee nor any Participating institution will be responsible or liable for claims of breach or validity of such use.
Administered Authentication. Where Publisher provides alternative methods of access and authentication beyond the Participating Institution-administered methods described herein, e.g. by allowing users to establish a personal login from an on-campus IP address (thereby enabling access via username and password when logging in to a vendor website) or device authentication, which affiliates the device or application by use of a token, cookie, or vendor- managed proxy prefix, neither NTK nor any Participating institution will be responsible or liable for claims of breach or validity of such use is replaced by the text: Administered Authentication. Where Publisher provides alternative methods of access and authentication beyond the Participating Institution-administered methods described herein, e.g. by allowing users to establish a personal login from an on-campus IP address (thereby enabling access via username and password when logging in to a vendor website) or device authentication, which affiliates the device or application by use of a token, cookie, or vendor- managed proxy prefix, neither NTK nor any Participating institution will be responsible or liable for claims of breach or validity of such use so long as the Licensee’s users do not use the feature intentionally for malicious purposes. Art.IV. and Art. 3, 3.1-3.15