Third Party Access Client is prohibited from disclosing data from the Data Set to any third party without obtaining written permission from Oracle.
Party Access Each Party shall supply information to the other Party as required by this Agreement. Information shall be treated as Confidential Information under this Agreement if (i) it has been clearly marked or otherwise designated as “Confidential information” by the Party supplying the information, or (ii) it is information designated as Confidential Information by applicable provisions of the ISO Tariffs; provided, however, Confidential Information does not include information: (i) in the public domain or that has been previously publicly disclosed without violation of this Agreement, (ii) required by law to be publicly submitted or disclosed (with notice to the other Party), or (iii) necessary to be divulged in an action to enforce this Agreement. Notwithstanding anything in this Section to the contrary, the NTO shall not have a right hereunder to receive or review any documents, data or other information of another Market Participant or the ISO, including documents, data or other information provided to the ISO, to the extent such documents, data or information have been designated as confidential pursuant to the procedures specified in the ISO Tariffs or to the extent that they have been designated as confidential by such other Market Participant; provided, however, that the NTO may receive and review any composite documents, data and other information that may be developed based on such confidential documents, data or information if the composite does not disclose any individual Market Participant’s confidential data or information.
Authorized Access Transfer Agent shall have controls that are designed to maintain the logical separation such that access to systems hosting Fund Data and/or being used to provide services to Fund will uniquely identify each individual requiring access, grant access only to authorized personnel based on the principle of least privileges, and prevent unauthorized access to Fund Data.
Unauthorized Access Using service to access, or to attempt to access without authority, the accounts of others, or to penetrate, or attempt to penetrate, security measures of Company’s or a third party’s computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in disruption of service or the corruption or loss of data.
Links to Third Party Websites In your use of the Service and/or the Company’s website, you may encounter various types of links that enable you to visit websites operated or owned by third parties (“Third Party Site”). These links are provided to you as a convenience and are not under the control or ownership of the Company. The inclusion of any link to a Third Party Site is not (i) an endorsement by the Company of the Third Party Site, (ii) an acknowledgement of any affiliation with its operators or owners, or (iii) a warranty of any type regarding any information or offer on the Third Party Site. Your use of any Third Party Site is governed by the various legal agreements and policies posted at that website.
Third Party Websites The Service may contain or reference links to websites operated by third parties ("Third Party Websites"). These links are provided as a convenience only. Such Third Party Websites are not under our control. We are not responsible for the content of any Third Party Website or any link contained in a Third Party Website. We do not review, approve, monitor, endorse, warrant, or make any representations with respect to Third Party Websites, and the inclusion of any link in the Service, Debit Rewards Offers or any other services provided in connection with them is not and does not imply an affiliation, sponsorship, endorsement, approval, investigation, verification or monitoring by us of any information contained in any Third Party Website. In no event will we be responsible for the information contained in such Third Party Website or for your use of or inability to use such website. Access to any Third Party Website is at your own risk, and you acknowledge and understand that linked Third Party Websites may contain terms and privacy policies that are different from ours. We are not responsible for such provisions, and expressly disclaim any liability for them.
Technology Access Contractor expressly acknowledges that state funds may not be expended in connection with the purchase of an automated information system unless that system meets certain statutory requirements relating to accessibility by persons with visual impairments. Accordingly, Contractor represents and warrants to System Agency that the technology provided to System Agency for purchase (if applicable under this Contract or any related Solicitation) is capable, either by virtue of features included within the technology or because it is readily adaptable by use with other technology, of: • providing equivalent access for effective use by both visual and non-visual means; • presenting information, including prompts used for interactive communications, in formats intended for non-visual use; and • being integrated into networks for obtaining, retrieving, and disseminating information used by individuals who are not blind or visually impaired. For purposes of this Section, the phrase “equivalent access” means a substantially similar ability to communicate with or make use of the technology, either directly by features incorporated within the technology or by other reasonable means such as assistive devices or services which would constitute reasonable accommodations under the Americans With Disabilities Act or similar state or federal laws. Examples of methods by which equivalent access may be provided include, but are not limited to, keyboard alternatives to mouse commands and other means of navigating graphical displays, and customizable display appearance. In accordance with Section 2157.005 of the Texas Government Code, the Technology Access Clause contract provision remains in effect for any contract entered into before September 1, 2006.
Unauthorized Access Notification XXX shall notify Provider promptly of any known unauthorized access. XXX will assist Provider in any efforts by Provider to investigate and respond to any unauthorized access.
Third Party Providers Except for those terms and conditions that specifically apply to Third Party Providers, under no circumstances shall any other person be considered a third party beneficiary of this Agreement or otherwise entitled to any rights or remedies under this Agreement. Except as may be provided in Third Party Agreements, Company shall have no rights or remedies against Third Party Providers, Third Party Providers shall have no liability of any nature to the Company, and the aggregate cumulative liability of all Third Party Providers to the Company shall be $1.
Contact with Third Parties In the event that Supplier receives a request from a third party (including an individual) to access any Personal Information in Supplier’s possession, Supplier will promptly forward a copy of such request to DXC and will cooperate with DXC in responding to any such request. Upon DXC’s request, Supplier will make Personal Information in its possession available to DXC or any Third Party designated in writing by DXC and will update Personal Information in Supplier’s possession in accordance with DXC's written instructions. If any government or competent authority requests Supplier to disclose or allow access to Personal Information, Supplier shall, unless legally prohibited, immediately notify DXC of such request and shall not disclose or allow access to such Personal Information without first giving DXC an opportunity to consult with the requesting government or authority to seek to prevent such disclosure or access. Supplier will respond to any such government or enforcement authority request only after consultation with DXC and at DXC’s discretion, unless otherwise required by law. Supplier shall promptly notify DXC if any complaints are received from Third Parties about its Processing of Personal Information, and Supplier shall not make any admissions or take any action that may be prejudicial to the defense or settlement of any such complaint. Supplier shall provide DXC with such reasonable assistance as it may require in connection with resolving any such complaint.