Circumvention of Managed Settings Sample Clauses

Circumvention of Managed Settings. All student iPads are provisioned by the Technology Department for the purposes of initializing and managing all iPads in a secure and organized fashion. Any attempts by students to circumvent any district management settings through software restoration, iOS setting manipulation, remote proxy settings or jailbreaking will result in the confiscation of the iPad and/or disciplinary action.
AutoNDA by SimpleDocs

Related to Circumvention of Managed Settings

  • Circumvention of TIPS Sales When a public entity initiates a purchase with Vendor, if the Member inquires verbally or in writing whether Vendor holds a TIPS Contract, it is the duty of the Vendor to verify whether the Member is seeking a TIPS purchase. Any request for quote, customer communication, or customer purchase initiated through or referencing a TIPS Contract shall be completed through TIPS pursuant to this Agreement. Any encouragement or participation by Vendor in circumventing a TIPS sale being completed may result in immediate termination of Vendor’s TIPS Contract(s) for cause as well as preclusion from future TIPS opportunities at TIPS sole discretion.

  • Permitted Uses and Disclosures of Phi by Business Associate Except as otherwise indicated in this Agreement, Business Associate may use or disclose PHI, inclusive of de-identified data derived from such PHI, only to perform functions, activities or services specified in this Agreement on behalf of DHCS, provided that such use or disclosure would not violate HIPAA or other applicable laws if done by DHCS.

  • Termination of License Agreement This Agreement will terminate automatically in the event that the License Agreement is terminated, provided that prior to such termination of this Agreement becoming effective, the Parties shall cooperate to wind down the activities being conducted hereunder as set forth in Section 15.5(b).

  • Benefits of Agreement; No Third-Party Rights The provisions of this Agreement are intended solely to benefit the Member and, to the fullest extent permitted by applicable law, shall not be construed as conferring any benefit upon any creditor of the Company (and no such creditor shall be a third-party beneficiary of this Agreement), and the Member shall have no duty or obligation to any creditor of the Company to make any contributions or payments to the Company.

  • Protection of Customer Data The Supplier shall not delete or remove any proprietary notices contained within or relating to the Customer Data. The Supplier shall not store, copy, disclose, or use the Customer Data except as necessary for the performance by the Supplier of its obligations under this Call Off Contract or as otherwise Approved by the Customer. To the extent that the Customer Data is held and/or Processed by the Supplier, the Supplier shall supply that Customer Data to the Customer as requested by the Customer and in the format (if any) specified by the Customer in the Call Off Order Form and, in any event, as specified by the Customer from time to time in writing. The Supplier shall take responsibility for preserving the integrity of Customer Data and preventing the corruption or loss of Customer Data. The Supplier shall perform secure back-ups of all Customer Data and shall ensure that up-to-date back-ups are stored off-site at an Approved location in accordance with any BCDR Plan or otherwise. The Supplier shall ensure that such back-ups are available to the Customer (or to such other person as the Customer may direct) at all times upon request and are delivered to the Customer at no less than six (6) Monthly intervals (or such other intervals as may be agreed in writing between the Parties). The Supplier shall ensure that any system on which the Supplier holds any Customer Data, including back-up data, is a secure system that complies with the Security Policy and the Security Management Plan (if any). If at any time the Supplier suspects or has reason to believe that the Customer Data is corrupted, lost or sufficiently degraded in any way for any reason, then the Supplier shall notify the Customer immediately and inform the Customer of the remedial action the Supplier proposes to take. If the Customer Data is corrupted, lost or sufficiently degraded as a result of a Default so as to be unusable, the Supplier may: require the Supplier (at the Supplier's expense) to restore or procure the restoration of Customer Data to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer, and the Supplier shall do so as soon as practicable but not later than five (5) Working Days from the date of receipt of the Customer’s notice; and/or itself restore or procure the restoration of Customer Data, and shall be repaid by the Supplier any reasonable expenses incurred in doing so to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer.

  • Permitted Uses and Disclosures by Business Associate Except as otherwise limited by this Agreement, Business Associate may make any uses and disclosures of Protected Health Information necessary to perform its services to Covered Entity and otherwise meet its obligations under this Agreement, if such use or disclosure would not violate the Privacy Rule if done by Covered Entity. All other uses or disclosures by Business Associate not authorized by this Agreement or by specific instruction of Covered Entity are prohibited.

  • Processing of Customer Personal Data 3.1 UKG will: 3.1.1 comply with all applicable Data Protection Laws in the Processing of Customer Personal Data; and 3.1.2 not Process Customer Personal Data other than for the purpose, and in accordance with, the relevant Customer’s instructions as documented in the Agreement and this DPA, unless Processing is required by the Data Protection Laws to which the relevant UKG Processor is subject, in which case UKG to the extent permitted by the Data Protection Laws, will inform Customer of that legal requirement before the Processing of that Customer Personal Data. 3.2 Customer hereby: 3.2.1 instructs UKG (and authorizes UKG to instruct each Subprocessor) to: (a) Process Customer Personal Data; and (b) in particular, transfer Customer Personal Data to any country or territory subject to the provisions of this DPA, in each case as reasonably necessary for the provision of the Services and consistent with the Agreement. 3.2.2 warrants and represents that it is and will at all relevant times remain duly and effectively authorized to give the instructions set out in Section 3.2.1 on behalf of each relevant Customer Affiliate; and 3.2.3 warrants and represents that it has all necessary rights in relation to the Customer Personal Data and/or has collected all necessary consents from Data Subjects to Process Customer Personal Data to the extent required by Applicable Law. 3.3 Schedule 1 to this DPA sets out certain information regarding UKG’s Processing of Customer Personal Data as required by Article 28(3) of the GDPR (and equivalent requirements of other Data Protection Laws).

  • Termination of Licenses Subject to Clause 33.3 (Licence granted by the Supplier: Supplier Background IPR), all licences granted pursuant to Clause 33 (Intellectual Property Rights) (other than those granted pursuant to Clause 33.6 (Third Party IPR) and 33.7 (Licence granted by the Customer)) shall survive the Call Off Expiry Date. The Supplier shall, if requested by the Customer in accordance with Call Off Schedule 9 (Exit Management), grant (or procure the grant) to the Replacement Supplier of a licence to use any Supplier Background IPR and/or Third Party IPR on terms equivalent to those set out in Clause 33.3 (Licence granted by the Supplier: Supplier Background IPR) subject to the Replacement Supplier entering into reasonable confidentiality undertakings with the Supplier. The licence granted pursuant to Clause 33.7 (Licence granted by the Customer ) and any sub-licence granted by the Supplier in accordance with Clause 33.7.1 (Licence granted by the Customer) shall terminate automatically on the Call Off Expiry Date and the Supplier shall: immediately cease all use of the Customer Background IPR and the Customer Data (as the case may be); at the discretion of the Customer, return or destroy documents and other tangible materials that contain any of the Customer Background IPR and the Customer Data, provided that if the Customer has not made an election within six months of the termination of the licence, the Supplier may destroy the documents and other tangible materials that contain any of the Customer Background IPR and the Customer Data (as the case may be); and ensure, so far as reasonably practicable, that any Customer Background IPR and Customer Data that are held in electronic, digital or other machine-readable form ceases to be readily accessible from any computer, word processor, voicemail system or any other device of the Supplier containing such Customer Background IPR and/or Customer Data. The Supplier shall, during and after the Call Off Contract Period, on written demand, indemnify the Customer against all Losses incurred by, awarded against, or agreed to be paid by the Customer (whether before or after the making of the demand pursuant to the indemnity hereunder) arising from an IPR Claim. If an IPR Claim is made, or the Supplier anticipates that an IPR Claim might be made, the Supplier may, at its own expense and sole option, either: procure for the Customer the right to continue using the relevant item which is subject to the IPR Claim; or replace or modify the relevant item with non-infringing substitutes provided that: the performance and functionality of the replaced or modified item is at least equivalent to the performance and functionality of the original item; the replaced or modified item does not have an adverse effect on any other Goods and/or Services; there is no additional cost to the Customer; and the terms and conditions of this Call Off Contract shall apply to the replaced or modified Goods and/or Services. If the Supplier elects to procure a licence in accordance with Clause 33.9.2(a) or to modify or replace an item pursuant to Clause 33.9.2(b), but this has not avoided or resolved the IPR Claim, then: the Customer may terminate this Call Off Contract by written notice with immediate effect; and without prejudice to the indemnity set out in Clause 33.9.1, the Supplier shall be liable for all reasonable and unavoidable costs of the substitute goods and/or services including the additional costs of procuring, implementing and maintaining the substitute items.

  • Your Liability for Unauthorized Transfers Immediately following your discovery of an unauthorized Payment Instruction, you shall communicate with customer care for the Service in the manner set forth in Section 6 of the General Terms above. You acknowledge and agree that time is of the essence in such situations. If you tell us within two (2) Business Days after you discover your password or other means to access your account through which you access the Service has been lost or stolen, your liability is no more than $50.00 should someone access your account without your permission. If you do not tell us within two (2) Business Days after you learn of such loss or theft, and we can prove that we could have prevented the unauthorized use of your password or other means to access your account if you had told us, you could be liable for as much as $500.00. If your monthly financial institution statement contains payments that you did not authorize, you must tell us at once. If you do not tell us within sixty (60) days after the statement was sent to you, you may lose any amount transferred without your authorization after the sixty (60) days if we can prove that we could have stopped someone from taking the money had you told us in time. If a good reason (such as a long trip or a hospital stay) prevented you from telling us, we will extend the time periods specified above to a reasonable period.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes. 11.2 We may (i) compile statistical and other information related to the performance, operation and use of the Services, and (ii) use data from the Services in aggregated form for security and operations management, to create statistical analyses, and for research and development purposes (clauses i and ii are collectively referred to as “Service Analyses”). We may make Service Analyses publicly available; however, Service Analyses will not incorporate Your Content, Personal Data or Confidential Information in a form that could serve to identify You or any individual. We retain all intellectual property rights in Service Analyses. 11.3 We may provide You with the ability to obtain certain Oracle Software (as defined below) for use with the Services. If we provide Oracle Software to You and do not specify separate terms for such software, then such Oracle Software is provided as part of the Services and You have the non-exclusive, worldwide, limited right to use such Oracle Software, subject to the terms of this Agreement and Your order (except for separately licensed elements of the Oracle Software, which separately licensed elements are governed by the applicable separate terms), solely to facilitate Your use of the Services. You may allow Your Users to use the Oracle Software for this purpose, and You are responsible for their compliance with the license terms. Your right to use any Oracle Software will terminate upon the earlier of our notice (by web posting or otherwise) or the end of the Services associated with the Oracle Software. Notwithstanding the foregoing, if Oracle Software is licensed to You under separate terms, then Your use of such software is governed by the separate terms. Your right to use any part of the Oracle Software that is licensed under the separate terms is not restricted in any way by this Agreement.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!