Subscriber A Person who lawfully receives Cable Service over the Cable System with Franchisee’s express permission.
Information on Subscriber The Subscriber is, and will be at the time of the conversion of the Notes and exercise of the Warrants, an "accredited investor", as such term is defined in Regulation D promulgated by the Commission under the 1933 Act, is experienced in investments and business matters, has made investments of a speculative nature and has purchased securities of United States publicly-owned companies in private placements in the past and, with its representatives, has such knowledge and experience in financial, tax and other business matters as to enable the Subscriber to utilize the information made available by the Company to evaluate the merits and risks of and to make an informed investment decision with respect to the proposed purchase, which represents a speculative investment. The Subscriber has the authority and is duly and legally qualified to purchase and own the Securities. The Subscriber is able to bear the risk of such investment for an indefinite period and to afford a complete loss thereof. The information set forth on the signature page hereto regarding the Subscriber is accurate.
Subscriber Data Subscriber will timely supply Netgateway, in a form acceptable to Netgateway, with all data necessary for Netgateway to perform the ongoing services to be provided hereunder. It is the sole responsibility of Subscriber to insure the completeness and accuracy of such data.
Mobile Subscriber Information You authorize your wireless carrier to disclose information about your account, such as subscriber status, payment method and device details, if available, to support identity verification, fraud avoidance and other uses in support of transactions for the duration of your business relationship with us. This information may also be shared with other companies to support your transactions with us and for identity verification and fraud avoidance purposes.
The Buyer is not an employee benefit or other plan subject to the prohibited transaction provisions of the Employee Retirement Income Security Act of 1974, as amended ("ERISA"), or Section 4975 of the Internal Revenue Code of 1986, as amended (the "Code") (a "Plan"), or any other person (including an investment manager, a named fiduciary or a trustee of any Plan) acting, directly or indirectly, on behalf of or purchasing any Certificate with "plan assets" of any Plan; or
Investor 2.1 The Investor, by following a Strategy of a Strategy Provider, hereby agrees to the following: A. To authorize and instruct the Strategy Provider to act on his/her behalf in accordance with the specific Strategy in connection to the Investment Account; B. To authorize and instruct the Company to take any necessary action to follow the Strategy of the Strategy Provider selected by the Investor; C. Any Strategy selected to be followed by the Investor should be followed in the proportion of the funds of the Investor in the Investment Account; D. To authorize and instruct the Company to transfer the Strategy Provider’s commission from the Investment Account to the account allocated by the Strategy Provider for this purpose at the end of each Social Trading Period. 2.2 Details and/or information in relation to the Investor‘s trading activities while using the Social Trading service shall be available on the Social Trading website and/or Social Trading mobile application. 2.3 The Investor may start copying a Strategy, deposit and transfer funds and/or withdraw any available funds to and from his/her Investment Account in accordance with the procedures and restrictions available from time to time on the Social Trading mobile applications and/or Website and/or any other website maintained by the Company for Social Trading and subject to the Agreement. 2.4 The Investor can transfer the funds allocated for following a specific Strategy from his/her Investment Account after he/she stops following a Strategy. 2.5 The Investor may stop following Strategy at any time during the time the market is open and the relevant Open Position(s) shall be closed at market price. 2.6 The Company reserves the right at its absolute discretion to close any or all Open Position(s) of a Strategy Provider at any time and the Investor’s Account shall be adjusted accordingly. 2.7 The Social Trading system may close any or all Open Position(s) of an Investor at any time. 2.8 The Investor may deposit via the payment systems/methods available by the Company for the Social Trading service from time to time. 2.9 The Investor acknowledges and accepts that by following a Strategy of a specific Strategy Provider he/she accepts the commission and Leverage set by the respective Strategy Provider. 2.10 The Investor acknowledges and understands that he/she should always maintain the required Balance reflected in his/her Investment Account in order to follow the specific Strategy selected. 2.11 The Investor acknowledges and agrees that once he/she selects to start following and copying a specific Strategy, all the existing Open Positions under that particular Strategy will automatically be followed and copied by the Investor together with any further new trading orders performed by the Strategy Provider under the specific Strategy. 2.12 The Investor acknowledges and accepts that variations in the pricing may occur from the moment that the Investor selects to copy a specific Strategy to the actual moment that the Investor starts copying such a Strategy. 2.13 In addition to clause 11.1 of Part A of the current Agreement, each of the following constitutes an “Event of Default” for the Investor: A. Which can be characterized as excessive, without legitimate intent, to profit from market movements; B. While relying on price latency or arbitrage opportunities; C. Which can be considered as market abuse; D. During abnormal market/trading conditions. 2.14 If an Event of Default occurs the Company may, at its absolute discretion, at any time and without prior Written Notice, take one or more of the following actions in addition to Clause 11.2 of Part A:
Personally Identifiable Information (PII); Security a. If Grantee or any of its subcontractors may or will create, receive, store or transmit PII under the terms of this Agreement, Grantee must provide for the security of such PII, in a form acceptable to Florida Housing, without limitation, non-disclosure, use of appropriate technology, security practices, computer access security, data access security, data storage encryption, data transmission encryption, security inspections and audits. Grantee shall take full responsibility for the security of all data in its possession or in the possession of its subcontractors and shall hold Florida Housing harmless for any damages or liabilities resulting from the unauthorized disclosure of loss thereof. b. If Grantee or any of its subcontractors may or will create, receive, store or transmit PII under the terms of this Agreement, Grantee shall provide Florida Housing with insurance information for stand-alone cyber liability coverage, including the limits available and retention levels. If Grantee does not carry stand-alone cyber liability coverage, Grantee agrees to indemnify costs related to notification, legal fees, judgments, settlements, forensic experts, public relations efforts, and loss of any business income related to this Agreement. c. Grantee agrees to maintain written policies and procedures for PII and/or data classification. This plan must include disciplinary processes for employees that violate these guidelines. d. Grantee agrees at all times to maintain reasonable network security that, at a minimum, includes a network firewall. e. Grantee agrees to protect and maintain the security of data with protection security measures that include maintaining secure environments that are patched and up to date with all appropriate security updates as designated by a relevant authority (e.g. Microsoft notifications, Common Vulnerabilities and Exposures (CVE) database, etc.) Grantee agrees that PII shall be appropriately destroyed based on the format stored upon the expiration of any applicable retention schedules. f. Grantee agrees that any and all transmission or exchange of system application data with Florida Housing and/or any other parties shall take place via secure Advanced Encryption Standards (AES), e.g. HTTPS, FTPS, SFTP or equivalent means. All data stored as a part of backup and recovery processes shall be encrypted, using AES. g. If Grantee reasonably suspects that a cybersecurity event or breach of security has occurred, they must notify Florida Housing’s Contract Administrator within 48 hours. h. In the event of a breach of PII or other sensitive data, Grantee must abide by provisions set forth in Section 501.171, Fla. Stat. Additionally, Grantee must immediately notify Florida Housing in writing of the breach and any actions taken in response to such a breach. As the information becomes available the statement must include, at a minimum, the date(s) and number of records affected by unauthorized access, distribution, use, modification or disclosure of PII; Grantee’s corrective action plan; and the timelines associated with the corrective action plan.
User Subscriptions 2.1 Subject to the Customer purchasing the User Subscriptions in accordance with 3.3 and 8.1, the restrictions set out in this 2 and the other terms and conditions of this agreement, the Supplier hereby grants to the Customer a non-exclusive, non-transferable right, without the right to grant sublicences, to permit the Authorised Users to use the Services and the Documentation during the Subscription Term solely for the Customer's internal business operations. 2.2 In relation to the Authorised Users, the Customer undertakes that: (a) the maximum number of Authorised Users that it authorises to access and use the Services and the Documentation shall not exceed the number of User Subscriptions it has purchased from time to time; (b) it will not allow or suffer any User Subscription to be used by more than one individual Authorised User unless it has been reassigned in its entirety to another individual Authorised User, in which case the prior Authorised User shall no longer have any right to access or use the Services and/or Documentation; (c) each Authorised User shall keep a secure password for their use of the Services and Documentation and that each Authorised User shall keep their password confidential; (d) it shall permit the Supplier or the Supplier's designated auditor to audit the Services in order to establish the name and password of each Authorised User and the Customer's data processing facilities to audit compliance with this agreement. Each such audit may be conducted no more than once per quarter, at the Supplier's expense, and this right shall be exercised with reasonable prior notice, in such a manner as not to substantially interfere with the Customer's normal conduct of business; (e) if any of the audits referred to in clause 2.2(d) reveal that any password has been provided to any individual who is not an Authorised User, then without prejudice to the Supplier's other rights, the Customer shall promptly disable such passwords and the Supplier shall not issue any new passwords to any such individual; and (f) if any of the audits referred to in 2.2(d) reveal that the Customer has underpaid Subscription Fees to the Supplier, then without prejudice to the Supplier's other rights, the Customer shall pay to the Supplier an amount equal to such underpayment as calculated in accordance with the prices set out in paragraph 1 of Schedule 1 within 10 Business Days of the date of the relevant audit. 2.3 The Customer shall not access, store, distribute or transmit any Viruses, or any material during the course of its use of the Services that: (a) is unlawful, harmful, threatening, defamatory, obscene, infringing, harassing or racially or ethnically offensive; (b) facilitates illegal activity; (c) depicts sexually explicit images; (d) promotes unlawful violence; (e) is discriminatory based on race, gender, colour, religious belief, sexual orientation, disability; or (f) is otherwise illegal or causes damage or injury to any person or property; and the Supplier reserves the right, without liability or prejudice to its other rights to the Customer, to disable the Customer's access to any material that breaches the provisions of this clause. 2.4 The Customer shall not: (a) except as may be allowed by any applicable law which is incapable of exclusion by agreement between the parties and except to the extent expressly permitted under this agreement: (i) attempt to copy, modify, duplicate, create derivative works from, frame, mirror, republish, download, display, transmit, or distribute all or any portion of the Software and/or Documentation (as applicable) in any form or media or by any means; or (ii) attempt to de-compile, reverse compile, disassemble, reverse engineer or otherwise reduce to human-perceivable form all or any part of the Software; or (b) access all or any part of the Services and Documentation in order to build a product or service which competes with the Services and/or the Documentation; or (c) use the Services and/or Documentation to provide services to third parties; or (d) subject to 22.1, license, sell, rent, lease, transfer, assign, distribute, display, disclose, or otherwise commercially exploit, or otherwise make the Services and/or Documentation available to any third party except the Authorised Users, or (e) attempt to obtain, or assist third parties in obtaining, access to the Services and/or Documentation, other than as provided under this 2; or (f) introduce or permit the introduction of any Virus [or Vulnerability] into the Supplier's network and information systems. 2.5 The Customer shall use all reasonable endeavours to prevent any unauthorised access to, or use of, the Services and/or the Documentation and, in the event of any such unauthorised access or use, promptly notify the Supplier. 2.6 The rights provided under this 2 are granted to the Customer only, and shall not be considered granted to any subsidiary or holding company of the Customer.
Subscribers identification and contact data (name, date of birth, gender, general, occupation or other demographic information, address, title, contact details, including email address), personal interests or preferences (including purchase history, marketing preferences and publically available social media profile information); IT information (IP addresses, usage data, cookies data, online navigation data, location data, browser data); financial information (credit card details, account details, payment information).
Ownership of FINRA Member Securities Except as disclosed in the Questionnaires provided to the Representatives, to the Company’s knowledge, no Company Affiliate is an owner of stock or other securities of any Member (other than securities purchased on the open market).