Aggregate & De-Identified Data Sample Clauses

Aggregate & De-Identified Data. Notwithstanding the above provisions of this Article 4, the Vendor may use, reproduce, sell, publicize, or otherwise exploit Aggregate Data and De-Identified Data in any way, in its sole
AutoNDA by SimpleDocs
Aggregate & De-Identified Data. Notwithstanding the provisions above of this Article 4, Vendor may use, reproduce, sell, publicize, or otherwise exploit Aggregate Data and De- Identified Data in any way, in its sole discretion. “Aggregate Data” refers to summaries of User Data, or of data that includes User Data, that do not include personally identifiable information or the names or addresses of User. “De-Identified Data” refers to User Data with the following removed: personally identifiable information and the name and addresses of User.
Aggregate & De-Identified Data. Client hereby grants to LICENSOR a non-exclusive, non- transferrable, limited license to use permanently De- Identified aggregate data (“Aggregate Data”) related to Client’s use of the Licensed Software for its own internal business purposes, consistent with the terms of this Agreement and applicable law, provided however, that LICENSOR may not disclose, distribute, sell, resell, rent, or otherwise share the Aggregate Data with any third parties. For Aggregate Data, as defined herein relating to the provision, use and performance of various aspects of the Services and related systems and technologies, LICENSOR may, consistent with the terms of this Agreement, (during and after the Term hereof) use such Aggregate Data to improve and enhance the Services and for other development, diagnostic and corrective purposes in connection with the Services and other LICENSOR offerings, provided, however, the LICENSOR may not disclose, distribute, sell, resell, or otherwise share such Aggregate Information with third parties. No rights or licenses are granted except as expressly set forth herein.

Related to Aggregate & De-Identified Data

  • De-Identified Data Provider agrees not to attempt to re-identify de-identified Student Data. De-Identified Data may be used by the Provider for those purposes allowed under FERPA and the following purposes: (1) assisting the LEA or other governmental agencies in conducting research and other studies; and (2) research and development of the Provider's educational sites, services, or applications, and to demonstrate the effectiveness of the Services; and (3) for adaptive learning purpose and for customized student learning. Provider's use of De-Identified Data shall survive termination of this DPA or any request by XXX to return or destroy Student Data. Except for Subprocessors, Xxxxxxxx agrees not to transfer de- identified Student Data to any party unless (a) that party agrees in writing not to attempt re-identification, and (b) prior written notice has been given to the LEA who has provided prior written consent for such transfer. Prior to publishing any document that names the LEA explicitly or indirectly, the Provider shall obtain the LEA’s written approval of the manner in which de-identified data is presented.

  • Customer Identification Program Notice To help the U.S. government fight the funding of terrorism and money laundering activities, U.S. Federal law requires each financial institution to obtain, verify, and record certain information that identifies each person who initially opens an account with that financial institution on or after October 1, 2003. Certain of PNC’s affiliates are financial institutions, and PNC may, as a matter of policy, request (or may have already requested) the Fund’s name, address and taxpayer identification number or other government-issued identification number, and, if such party is a natural person, that party’s date of birth. PNC may also ask (and may have already asked) for additional identifying information, and PNC may take steps (and may have already taken steps) to verify the authenticity and accuracy of these data elements.

  • If Identified If the HSP is Identified it will: (a) work towards applying the principles of Active Offer in the provision of services; (b) provide services to the public in French in accordance with its existing French language services capacity; (c) develop, and provide to the Funder upon request from time to time, a plan to become Designated by the date agreed to by the HSP and the Funder; (d) continuously work towards improving its capacity to provide services in French and toward becoming Designated within the time frame agreed to by the parties; (e) provide a report to the Funder that outlines progress in its capacity to provide services in French and toward becoming Designated; (f) annually, provide a report to the Funder that outlines how it addresses the needs of its local Francophone community; and (g) collect and submit to the Funder, as requested by the Funder from time to time, French language services data.

  • Personally Identifiable Information (PII); Security a. If Grantee or any of its subcontractors may or will create, receive, store or transmit PII under the terms of this Agreement, Grantee must provide for the security of such PII, in a form acceptable to Florida Housing, without limitation, non-disclosure, use of appropriate technology, security practices, computer access security, data access security, data storage encryption, data transmission encryption, security inspections and audits. Grantee shall take full responsibility for the security of all data in its possession or in the possession of its subcontractors and shall hold Florida Housing harmless for any damages or liabilities resulting from the unauthorized disclosure of loss thereof. b. If Grantee or any of its subcontractors may or will create, receive, store or transmit PII under the terms of this Agreement, Grantee shall provide Florida Housing with insurance information for stand-alone cyber liability coverage, including the limits available and retention levels. If Grantee does not carry stand-alone cyber liability coverage, Grantee agrees to indemnify costs related to notification, legal fees, judgments, settlements, forensic experts, public relations efforts, and loss of any business income related to this Agreement. c. Grantee agrees to maintain written policies and procedures for PII and/or data classification. This plan must include disciplinary processes for employees that violate these guidelines. d. Grantee agrees at all times to maintain reasonable network security that, at a minimum, includes a network firewall. e. Grantee agrees to protect and maintain the security of data with protection security measures that include maintaining secure environments that are patched and up to date with all appropriate security updates as designated by a relevant authority (e.g. Microsoft notifications, Common Vulnerabilities and Exposures (CVE) database, etc.) Grantee agrees that PII shall be appropriately destroyed based on the format stored upon the expiration of any applicable retention schedules. f. Grantee agrees that any and all transmission or exchange of system application data with Florida Housing and/or any other parties shall take place via secure Advanced Encryption Standards (AES), e.g. HTTPS, FTPS, SFTP or equivalent means. All data stored as a part of backup and recovery processes shall be encrypted, using AES. g. If Grantee reasonably suspects that a cybersecurity event or breach of security has occurred, they must notify Florida Housing’s Contract Administrator within 48 hours. h. In the event of a breach of PII or other sensitive data, Grantee must abide by provisions set forth in Section 501.171, Fla. Stat. Additionally, Grantee must immediately notify Florida Housing in writing of the breach and any actions taken in response to such a breach. As the information becomes available the statement must include, at a minimum, the date(s) and number of records affected by unauthorized access, distribution, use, modification or disclosure of PII; Grantee’s corrective action plan; and the timelines associated with the corrective action plan.

  • Categories of Data Subjects Any individual accessing and/or using the Services through the Customer's account ("Users"); and any individual: (i) whose email address is included in the Customer's Distribution List; (ii) whose information is stored on or collected via the Services, or (iii) to whom Users send emails or otherwise engage or communicate with via the Services (collectively, "Subscribers").

  • Personally Identifiable Information By submitting any of your personally identifiable information, such as your name, address, email address, phone number or fax number, to us, you consent to our privacy policy located at xxx.xxxxxxxx.xxx/xxxxx.

  • Customer Identification - USA Patriot Act Notice The Lender hereby notifies the Borrower that pursuant to the requirements of the USA Patriot Act (Title III of Pub. L. 107-56, signed into law October 26, 2001) (the “Act”), and the Lender’s policies and practices, the Lender is required to obtain, verify and record certain information and documentation that identifies the Borrower, which information includes the name and address of the Borrower and such other information that will allow the Lender to identify the Borrower in accordance with the Act.

  • Customer Identification Unless Elastic has first obtained Customer's prior written consent, Elastic shall not identify Customer as a user of the Products, on its website, through a press release issued by Elastic and in other promotional materials.

  • Customer Identification Program (A) To assist the Fund in complying with requirements regarding a customer identification program in accordance with applicable regulations promulgated by U.S. Department of Treasury under Section 326 of the USA PATRIOT Act ("CIP Regulations"), BNYM will do the following: (i) Implement procedures which require that prior to establishing a new account in the Fund BNYM obtain the name, date of birth (for natural persons only), address and government-issued identification number (collectively, the "Data Elements") for the "Customer" (defined for purposes of this Agreement as provided in 31 CFR 1024.100(c)) associated with the new account. (ii) Use collected Data Elements to attempt to reasonably verify the identity of each new Customer promptly before or after each corresponding new account is opened. Methods of verification may consist of non-documentary methods (for which BNYM may use unaffiliated information vendors to assist with such verifications) and documentary methods (as permitted by 31 CFR 1024.220), and may include procedures under which BNYM personnel perform enhanced due diligence to verify the identities of Customers the identities of whom were not successfully verified through the first- level (which will typically be reliance on results obtained from an information vendor) verification process(es). (iii) Record the Data Elements and maintain records relating to verification of new Customers consistent with 31 CFR 1024.220(a)(3). (iv) Regularly report to the Fund about measures taken under (i)-(iii) above. (v) If BNYM provides services by which prospective Customers may subscribe for shares in the Fund via the Internet or telephone, BNYM will work with the Fund to notify prospective Customers, consistent with 31 CFR 1024.220(a)(5), about the program conducted by the Fund in accordance with the CIP Regulations. (B) To assist the Fund in complying with the Customer Due Diligence Requirements for Financial Institutions promulgated by FinCEN (31 CFR § 1020.230) pursuant to the Bank Secrecy Act ("CDD Rule"), BNYM will maintain and implement written procedures that are reasonably designed to: (i) Obtain information of a nature and in a manner permitted or required by the CCD Rule in order to identify each natural person who is a "beneficial owner" (as that term is defined in the CDD Rule) of a legal entity at the time that such legal entity seeks to open an account as a shareholder of the Fund, unless that legal entity is excluded from the CDD Rule or an exemption provided for in the CDD Rule applies; and (ii) Verify the identity of each beneficial owner so identified according to risk based procedures to the extent reasonable and practicable, in accordance with the minimum requirements of the CDD Rule. (C) Nothing in Section (3) shall be construed to require BNYM to perform any course of conduct that is not required for Fund compliance with the CIP Regulations or CDD Rule, including by way of illustration not limitation the collection of Data Elements or verification of identity for individuals opening Fund accounts through financial intermediaries which use the facilities of the NSCC. (D) BNYM agrees to permit inspections relating to the CIP services provided hereunder by U.S. Federal departments or regulatory' agencies with appropriate jurisdiction and to make available to examiners from such departments or regulatory agencies such information and records relating to the CIP services provided hereunder as such examiners shall reasonably request.

  • Separate Identity The Seller acknowledges that the Administrative Agent, the Lenders and the other Secured Parties are entering into the transactions contemplated by the Credit Agreement in reliance upon the Buyer’s identity as a legal entity that is separate from the Seller and each other Affiliate of the Seller. Therefore, from and after the date hereof, the Seller will take all reasonable steps to maintain the Buyer’s identity as a legal entity that is separate from the Seller and each other Affiliate of the Seller and to make it manifest to third parties that the Buyer is an entity with assets and liabilities distinct from those of the Seller and each other Affiliate thereof and not just a division of the Seller or any such other Affiliate (except as otherwise required under GAAP or applicable tax law). Without limiting the generality of the foregoing and in addition to the other covenants set forth herein, the Seller agrees that: (i) the Seller will take all other actions necessary on its part to ensure that the Buyer is at all times in compliance with Section 5.18 of the Credit Agreement (provided, however, that the Seller does not hereby guaranty the solvency of the Buyer or agree to pay any of the Buyer’s obligations or liabilities); (ii) the Seller shall maintain corporate records and books of account separate from those of the Buyer; (iii) the annual financial statements of the Seller shall disclose the effects of the Seller’s transactions in accordance with GAAP and the annual financial statements of the Seller shall not reflect in any way that the assets of the Buyer, including, without limitation, the Collateral, could be available to pay creditors of the Seller or any other Affiliate of the Seller; (iv) the resolutions, agreements and other instruments underlying the transactions described in this Agreement shall be continuously maintained by the Seller as official records; (v) the Seller shall maintain an arm’s-length relationship with the Buyer and will not hold itself out as being liable for the debts of the Buyer; (vi) except as otherwise permitted under the Credit Agreement, the Seller shall keep its assets and its liabilities wholly separate from those of the Buyer or, other than by reason of owning equity interests of the Buyer, for any decisions or actions relating to the Buyer; (vii) the Seller will avoid the appearance, and promptly correct any known misperception of any of the Seller’s creditors, that the assets of the Buyer are available to pay the obligations and debts of the Seller; (viii) to the extent that the Seller services the Collateral and performs other services on the Buyer’s behalf, the Seller will clearly identify itself as an agent for the Buyer in the performance of such duties; provided, however, that the Seller will not be required to so identify itself when communicating with the Obligors not in its capacity as agent for the Buyer but rather in its capacity as agent for a group of lenders; and (ix) the Seller shall take or refrain from taking, as applicable, each of the activities specified or assumed in the true sale and non-consolidation opinions of Dechert LLP delivered on the Warehouse Closing Date, upon which the conclusions expressed therein are based.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!