Permitted Uses BA shall use Protected Information only for the purpose of performing BA’s obligations under the Contract and as permitted or required under the Contract and Addendum, or as required by law. Further, BA shall not use Protected Information in any manner that would constitute a violation of the Privacy Rule or the HITECH Act if so used by CE. However, BA may use Protected Information as necessary (i) for the proper management and administration of BA;
Permitted Use (a) Tenant shall, at all times during the Term, and at any other time that Tenant shall be in possession of any Property, continuously use and operate, or cause to be used and operated, such Property as a skilled nursing/ intermediate care/independent living/assisted living/ special care/group home facility as currently operated, and any uses incidental thereto. Tenant shall not use (and shall not permit any Person to use) any Property, or any portion thereof, for any other use without the prior written consent of Landlord, which approval shall not be unreasonably withheld, delayed or conditioned. No use shall be made or permitted to be made of any Property and no acts shall be done thereon which will cause the cancellation of any insurance policy covering such Property or any part thereof (unless another adequate policy is available) or which would constitute a default under any ground lease affecting such Property, nor shall Tenant sell or otherwise provide to residents or patients therein, or permit to be kept, used or sold in or about any Property any article which may be prohibited by law or by the standard form of fire insurance policies, or any other insurance policies required to be carried hereunder, or fire underwriter’s regulations. Tenant shall, at its sole cost (except as expressly provided in Section 5.1.2(b)), comply or cause to be complied with all Insurance Requirements. Tenant shall not take or omit to take, or permit to be taken or omitted to be taken, any action, the taking or omission of which materially impairs the value or the usefulness of any Property or any part thereof for its Permitted Use. (b) In the event that, in the reasonable determination of Tenant, it shall no longer be economically practical to operate any Property as currently operated, Tenant shall give Landlord Notice thereof, which Notice shall set forth in reasonable detail the reasons therefor. Thereafter, Landlord and Tenant shall negotiate in good faith to agree on an alternative use for such Property, appropriate adjustments to the Additional Rent and other related matters; provided, however, in no event shall the Minimum Rent be reduced or abated as a result thereof. If Landlord and Tenant fail to agree on an alternative use for such Property within sixty (60) days after commencing negotiations as aforesaid, Tenant may market such Property for sale to a third party. If Tenant receives a bona fide offer (an “Offer”) to purchase such Property from a Person having the financial capacity to implement the terms of such Offer, Tenant shall give Landlord Notice thereof, which Notice shall include a copy of the Offer executed by such third party. In the event that Landlord shall fail to accept or reject such Offer within thirty (30) days after receipt of such Notice, such Offer shall be deemed to be rejected by Landlord. If Landlord shall sell the Property pursuant to such Offer, then, effective as of the date of such sale, this Agreement shall terminate with respect to such Property, and the Minimum Rent shall be reduced by an amount equal to the product of the net proceeds of sale received by Landlord multiplied by the Interest Rate. If Landlord shall reject (or be deemed to have rejected) such Offer, then, effective as of the proposed date of such sale, this Agreement shall terminate with respect to such Property, and the Minimum Rent shall be reduced by an amount equal to the product of the projected net proceeds determined by reference to such Offer multiplied by the Interest Rate.
Use of the Services 1.1 We will make the Oracle services listed in Your order (the “Services”) available to You pursuant to this Agreement and Your order. Except as otherwise stated in this Agreement or Your order, You have the non- exclusive, worldwide, limited right to use the Services during the period defined in Your order, unless earlier terminated in accordance with this Agreement or Your order (the “Services Period”), solely for Your internal business operations. You may allow Your Users (as defined below) to use the Services for this purpose, and You are responsible for their compliance with this Agreement and Your order. 1.2 The Service Specifications describe and govern the Services. During the Services Period, we may update the Services and Service Specifications (with the exception of the Data Processing Agreement as described below) to reflect changes in, among other things, laws, regulations, rules, technology, industry practices, patterns of system use, and availability of Third Party Content (as defined below). Oracle updates to the Services or Service Specifications will not materially reduce the level of performance, functionality, security or availability of the Services during the Services Period of Your order. 1.3 You may not, and may not cause or permit others to: (a) use the Services to harass any person; cause damage or injury to any person or property; publish any material that is false, defamatory, harassing or obscene; violate privacy rights; promote bigotry, racism, hatred or harm; send unsolicited bulk e-mail, junk mail, spam or chain letters; infringe property rights; or otherwise violate applicable laws, ordinances or regulations; (b) perform or disclose any benchmarking or availability testing of the Services; (c) perform or disclose any performance or vulnerability testing of the Services without Oracle’s prior written approval, or perform or disclose network discovery, port and service identification, vulnerability scanning, password cracking or remote access testing of the Services; or (d) use the Services to perform cyber currency or crypto currency mining ((a) through (d) collectively, the “Acceptable Use Policy”). In addition to other rights that we have in this Agreement and Your order, we have the right to take remedial action if the Acceptable Use Policy is violated, and such remedial action may include removing or disabling access to material that violates the policy.
Use of the Service 12.1 When using the Service you must comply with: (a) our CRA, including clause 4 of the General Terms, and this clause 12; and (b) any rules, including any acceptable use conditions, imposed by any third party whose content or services you access using the Service or whose Network on which your data transmits. 12.2 Any use of the Service at the Premises is your responsibility. The terms of our CRA apply to you and also to anyone else who uses the Service (regardless of whether you give them permission to do so or not). 12.3 You must ensure that any software you use in relation to the Service is properly licensed. 12.4 The use of a Local Area Network (LAN) for personal use is permitted, however the set-up and configuration of a LAN connected to the modem is not supported by customer service. 12.5 All IP addresses provided by us for your use remain our property. Most Services include a dynamic IP address. A new IP address is usually allocated whenever the computer and modem are rebooted. The IP address remains until the next time the computer and modem are switched off. Where provided, you may configure your computer or modem to connect using a static IP address. 12.6 We may at any time adjust aspects of the Service for security or Network management reasons, including, without limitation: (a) deleting transitory data that has been stored on our servers for longer than 90 days; (b) deleting stored email messages that are older than 90 days; (c) rejecting any incoming email messages and attachments that exceed 30 Megabytes (including encapsulation); (d) delivering access and content via proxy servers; (e) limiting the number of addresses to whom an outgoing email can be sent; (f) refusing to accept incoming email messages to mailboxes that have exceeded the email storage limit; (g) managing the Network to prioritise certain types of Internet traffic over others; and (h) blocking or filtering specific Internet ports. 12.7 You are responsible for providing any security or privacy measures for your computer networks and any data stored on those networks or accessed through the Service. We will not be liable to you in respect of any loss, damage, costs or expenses incurred by you in connection with your failure to provide that security. 12.8 You may request additional users on the Service in accordance with the Pricing Schedule. 12.9 You must take reasonable steps to ensure that others do not gain unauthorised access to the Service through your account. We recommend that you do not disclose your password to others and that you change your password regularly. 12.10 We may monitor use of the Service to investigate a breach (or suspected breach) of the Fair Use Policy or upon the request of an authorised authority. 12.11 Where you provide your own wireless computer connection device, you are responsible for any loss caused by an unauthorised interception of the Service.