CLIENT DATA AND CLIENT OBLIGATIONS Sample Clauses

CLIENT DATA AND CLIENT OBLIGATIONS. 2.1 Client Data. “Client Data” means electronic data and information submitted by or for Client to the Software Services or collected and processed by or for Client using the Software Services.
AutoNDA by SimpleDocs

Related to CLIENT DATA AND CLIENT OBLIGATIONS

  • Client Data The Subrecipient shall maintain client data demonstrating client eligibility for services provided. Such data shall include, but not be limited to, client name, address, income level or other basis for determining eligibility, and description of service provided. Such information shall be made available to Grantee monitors or their designees for review upon request.

  • Interconnection Customer Obligations The Interconnection Customer shall maintain the Large Generating Facility and the Interconnection Customer’s Interconnection Facilities in a safe and reliable manner and in accordance with this LGIA.

  • Business Associate Obligations Business Associate agrees to comply with applicable federal confidentiality and security laws, specifically the provisions of the HIPAA Rules and the HITECH Act applicable to business associates, including: 2.1 Use and Disclosure of PHI. Except as otherwise permitted by this Agreement, the HIPAA Rules, or applicable law, Business Associate shall not make any uses or disclosures of PHI except as necessary to provide services to, or on behalf of, Covered Entity as described in the Underlying Agreement, and shall not use or disclose PHI that would violate the HIPAA Rules or HITECH Act if used or disclosed by Covered Entity; provided, however, Business Associate may use and disclose PHI as necessary for the proper management and administration of Business Associate, or to carry out its legal responsibilities, consistent with Covered Entity’s minimum necessary policies and procedures. Business Associate may not use or disclose PHI which it creates, receives, maintains or transmits for or on behalf of the Covered Entity for any purpose except as otherwise provided by the Agreement and this BAA. Business Associate agrees to review and understand any state privacy and security laws to the extent that such laws are not preempted by HIPAA, as may be amended from time to time. Business Associate acknowledges that it shall comply specifically with the HIPAA Security Rule, and, to the extent that Business Associate is to carry out one or more of Covered Entity’s obligations under the Privacy Rule, it shall comply with the requirements of the Privacy Rule which apply to Covered Entity in the performance of such obligation(s). Business Associate shall in such cases: 2.1.1 provide information to members of its workforce using or disclosing PHI regarding the confidentiality requirements in the HIPAA Rules and this Agreement; 2.1.2 obtain reasonable assurances, in writing from the person or entity to whom the PHI is disclosed that: (i) the PHI will be held in confidence and further used and disclosed only as required by law or for the purpose for which it was disclosed to the person or entity; and (ii) the person or entity will notify Business Associate of any instances of which it is aware in which confidentiality of the PHI has been breached; and 2.1.3 agree to notify the Privacy Officer of Covered Entity of any instances of which it is aware in which the PHI is used or disclosed for a purpose that is not otherwise provided for in this Agreement or for a purpose not expressly permitted by the HIPAA Rules or HITECH Act. 2.2 Marketing; Sale of PHI. Business Associate may not use or disclose PHI for marketing purposes. Marketing includes any communication which would encourage the recipient to use or purchase a product or service. Business Associate may not use or disclose PHI where it has directly or indirectly received remuneration, financial or otherwise, from or on behalf of the recipient of the PHI in exchange for the PHI. “Sale” is not limited to circumstances where a transfer of ownership occurs, and would include access, license or lease agreements.

  • Customer Data 8.1 You, not bookinglab or JRNI, have sole responsibility for the entry, deletion, correction, accuracy, quality, integrity, legality, reliability, appropriateness, and right to use the Customer Data. bookinglab and JRNI is not responsible for any of the foregoing or for any destruction, damage, loss, or failure to store any Customer Data beyond its reasonable control or resulting from any failure in data transmission or operation of the Booking Service by you. 8.2 As of the MSA Start Date, JRNI is certified under ISO 27001 and shall maintain an information security program for the Services that complies with the ISO 27001 standards or such other standards as are substantially equivalent to ISO 27001. 8.3 If JRNI and/or bookinglab processes any Personal Data on your behalf when performing its obligations under this Agreement, the Parties acknowledge that you shall be the Data Controller and JRNI and/or bookinglab shall be a Data Processor and in any such case: (a) you shall ensure that you are entitled to transfer the relevant Customer Personal Data to JRNI and/or bookinglab so that they may lawfully use, process and transfer the Customer Personal Data in accordance with this Agreement on your behalf; (b) you shall ensure that the relevant third parties have been informed of, and have given their consent to, such use, processing, and transfer as required by all applicable Data Protection Laws; (c) each Party shall take appropriate technical and organisational measures against unauthorised or unlawful processing of the personal data or its accidental loss, destruction or damage; and (d) notwithstanding any other provision of this Agreement, but subject always to Appendix B(1) Data Protection and B(2) Data Processing Activities, nothing shall prevent JRNI or bookinglab from disclosing Customer Personal Data or Customer Data to their Group Companies, Affiliates and third party service providers as necessary to provide the Services in accordance with clause 3, and otherwise in order to comply with Applicable Law or at the request of a governmental, regulatory or supervisory authority. 8.4 From the MSA Start Date the Parties shall comply with Appendix B(1) Data Protection and Appendix B(2) Data Processing Activities 8.5 ensure that Customer Data and Personal Data deemed as a special category of Data under GDPR is not given to us in any form unless pre-agreed by us in writing 8.6 You are solely responsible and liable for any transfer of Customer Data made by you (or made by JRNI or bookinglab at your request) from the Booking Service to a third party and for ensuring that such transfer is in compliance with the Parties' obligations under the Data Protection Laws.

  • Customer Obligations To facilitate NCR Voyix’s provision of the Hosting Services hereunder and Xxxxxxxx’s access and use of the Hosted NCR Voyix Software hereunder, Customer agrees to undertake the following: (a) Provide and maintain the Customer Equipment at each of the Customer Locations in accordance with the minimum standards established by NCR Voyix, which as of the Effective Date include a windows-based PC and store level file server that each include a Windows operating system actively supported by Microsoft Corporation, an internet browser that is actively supported by Microsoft Corporation, and Customer Equipment maintained in good working order in accordance with the minimum standards recommended by the manufacturer; (b) Provide and maintain access to the internet at each of the Customer Locations through a competent internet service provider (ISP), maintaining telephone or other telecommunication services necessary to connect each of Customer’s Locations to Customer’s ISP; (c) Abide by the security procedures specified by NCR Voyix and perform reasonable and customary security practices to preclude attempts to circumvent any security procedures or utilize any unauthorized systems in an attempt to access the data of another Customer; (d) Provide timely notification of any issues and give appropriate lead time to NCR Voyix for any special requests; (e) Make all reasonable efforts to assist NCR Voyix in identifying, isolating and replicating issues found in the System; and (f) Customer shall be solely responsible for the manner in which Customer and Customer’s users use the System and the Hosted Software. Customer shall ensure that only authorized users have access to any user identifications or passwords for use in connection with the System and the Hosted Software and that such authorized users shall not disclose such identifications or passwords to any other individual. Customer acknowledges and agrees that it is solely responsible for strictly maintaining the confidentiality and integrity of such identifications and passwords and Customer shall indemnify and hold harmless NCR Voyix from and against any liability, damages, or costs arising from Customer’s failure to comply with this obligation including, but not limited to, improper or unauthorized account access using Customer’s user identifications or passwords, provided such identifications or passwords were not improperly disseminated by NCR Voyix or any of its agent or representatives. Customer shall notify NCR Voyix immediately in writing if the security or integrity of an identification or password has been compromised.

  • Obligations of Business Associate a. Business Associate agrees to not use or disclose Protected Health Information other than as permitted or required by this Agreement or as Required By Law. b. Business Associate agrees to use appropriate safeguards to prevent use or disclosure of the Protected Health Information other than as provided for by this Agreement. c. Business Associate agrees to mitigate, to the extent practicable, any harmful effect that is known to Business Associate of a use or disclosure of Protected Health Information by Business Associate in violation of the requirements of this Agreement. d. Business Associate agrees to report to Covered Entity any use or disclosure of the Protected Health Information not provided for by this Agreement of which it becomes aware. e. Business Associate agrees to ensure that any agent, including a subcontractor, to whom it provides Protected Health Information received from, or created or received by Business Associate on behalf of Covered Entity, agrees to the same restrictions and conditions that apply through this Agreement to Business Associate with respect to such information. f. Business Associate agrees to provide access, at the request of Covered Entity, to Protected Health Information in a Designated Record Set to Covered Entity or, as directed by Covered Entity, to an Individual in order to meet the requirements under 45 CFR 164.524. g. Business Associate agrees, at the request of the Covered Entity, to make any amendment(s) to Protected Health Information in a Designated Record Set that the Covered Entity directs or agrees to pursuant to 45 CFR 164.526. h. Unless otherwise prohibited by law, Business Associate agrees to make internal practices, books, and records, including policies and procedures and Protected Health Information, relating to the use and disclosure of Protected Health Information received from, or created or received by Business Associate on behalf of, Covered Entity available to the Covered Entity, or to the Davidson County Department of Social Services, in a time and manner designated by the Secretary, for purposes of the Davidson County Department of Social Services determining Covered Entity's compliance with the Privacy Rule. i. Business Associate agrees to document such disclosures of Protected Health Information and information related to such disclosures as would be required for Covered Entity to respond to a request by an Individual for an accounting of disclosures of Protected Health Information in accordance with 45 CFR 164.528, and to provide this information to Covered Entity or an Individual to permit such a response.

  • Protection of Customer Data The Supplier shall not delete or remove any proprietary notices contained within or relating to the Customer Data. The Supplier shall not store, copy, disclose, or use the Customer Data except as necessary for the performance by the Supplier of its obligations under this Call Off Contract or as otherwise Approved by the Customer. To the extent that the Customer Data is held and/or Processed by the Supplier, the Supplier shall supply that Customer Data to the Customer as requested by the Customer and in the format (if any) specified by the Customer in the Call Off Order Form and, in any event, as specified by the Customer from time to time in writing. The Supplier shall take responsibility for preserving the integrity of Customer Data and preventing the corruption or loss of Customer Data. The Supplier shall perform secure back-ups of all Customer Data and shall ensure that up-to-date back-ups are stored off-site at an Approved location in accordance with any BCDR Plan or otherwise. The Supplier shall ensure that such back-ups are available to the Customer (or to such other person as the Customer may direct) at all times upon request and are delivered to the Customer at no less than six (6) Monthly intervals (or such other intervals as may be agreed in writing between the Parties). The Supplier shall ensure that any system on which the Supplier holds any Customer Data, including back-up data, is a secure system that complies with the Security Policy and the Security Management Plan (if any). If at any time the Supplier suspects or has reason to believe that the Customer Data is corrupted, lost or sufficiently degraded in any way for any reason, then the Supplier shall notify the Customer immediately and inform the Customer of the remedial action the Supplier proposes to take. If the Customer Data is corrupted, lost or sufficiently degraded as a result of a Default so as to be unusable, the Supplier may: require the Supplier (at the Supplier's expense) to restore or procure the restoration of Customer Data to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer, and the Supplier shall do so as soon as practicable but not later than five (5) Working Days from the date of receipt of the Customer’s notice; and/or itself restore or procure the restoration of Customer Data, and shall be repaid by the Supplier any reasonable expenses incurred in doing so to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer.

  • Supplier Obligations 2.1 Deliverables Supplier agrees to supply, and Xxxxx NZT agrees to acquire, the Deliverables subject to and in accordance with the terms of the Agreement. 2.2 Performance standards Supplier will perform its obligations under the Agreement in a timely manner and in accordance with Good Industry Practice. 2.3 Laws, licences and approvals In carrying out its activities in connection with this Agreement, Supplier will comply with all applicable Laws and will not commit any act or omit to do anything that causes or has the potential to cause Spark NZT to breach any Laws. Supplier will have all the licences, consents and approvals needed to supply the Deliverables and perform and observe its other obligations in accordance with the Agreement. 2.4 Requirements Supplier will provide the Deliverables to Spark NZT free of Defects and in accordance with all applicable Requirements, Service Levels and timeframes for delivery set out in a Side Letter or PO. 2.5 Co-operation Supplier will co-operate in good faith and in a timely manner with other Spark NZT suppliers, and if reasonably requested by Spark NZT, will provide information and assistance as necessary to facilitate the supply of goods or services to Spark NZT by those suppliers. A breach of this clause will be deemed a material breach of the Agreement. 2.6 Policies Supplier will use its best endeavours to follow Spark NZT’s applicable policies as provided to Supplier in writing from time to time, and a persistent or material breach of any of those policies will constitute a material breach of the Agreement. Supplier will advise Spark NZT immediately that it becomes aware that it has breached or is likely to have breached any of Spark NZT’s policies including if Spark NZT’s security has been compromised. 2.7 Key Personnel Supplier will assign the Key Personnel to the corresponding roles specified in the Agreement, and will not re-assign those Key Personnel without Spark NZT’s prior written consent, not to be unreasonably withheld or delayed. 2.8 Documentation Accompanying each Deliverable, Supplier will provide Spark NZT with corresponding Documentation. Supplier will ensure that the Documentation includes a complete set of operating, technical and user manuals with a level of specificity to enable a reasonably competent user to make effective use of each Deliverable. If Spark NZT discovers any error in the Documentation, Spark NZT may notify Supplier in writing of the error and Supplier will promptly correct it and provide Spark NZT with amended Documentation at no additional cost to Spark NZT. Spark NZT may copy Documentation as reasonably necessary to enable Spark NZT to enjoy the benefit of the Deliverables in accordance with the Agreement. 2.9 Information Supplier will prepare, and retain during the term of the Agreement and for a reasonable period afterwards, accurate records and accounts in relation to all material aspects of its activities under the Agreement, including the Charges and Deliverables, in each case to a level of detail, completeness and accuracy consistent with Good Industry Practice and any relevant terms in this Agreement.

  • Customer Equipment “Customer Equipment” means any Customer-owned or provided software, hardware or services that you elect to use in connection with the Service(s). You agree to allow us and our agents the rights to insert CableCARDs and other hardware in the Customer Equipment, send software and/or downloads to the Customer Equipment and install, configure, maintain, inspect and upgrade the Customer Equipment. You warrant you are either the owner of the Customer Equipment or that you have the authority to give us access to the Customer Equipment. You should call Customer Service at 0-000-XXX-XXXX to find out if it meets our technical, security and other requirements. We reserve the right to disallow the use of Customer Equipment that we determine is not compatible with our network. We shall have no obligation to provide, maintain, or service Customer Equipment, including, but not limited to, Customer Equipment to which the Company or a third party has sent software or downloads. If you use Customer Equipment, you agree that the following limitation of liability shall apply: THE COMPANY DOES NOT WARRANT THAT CUSTOMER EQUIPMENT WILL ENABLE YOU TO SUCCESSFULLY INSTALL, ACCESS, OPERATE, OR USE THE SERVICE(S). YOU ACKNOWLEDGE THAT ANY SUCH INSTALLATION, ACCESS, OPERATION, OR USE COULD CAUSE CUSTOMER EQUIPMENT TO FAIL TO OPERATE OR COULD CAUSE DAMAGE TO CUSTOMER EQUIPMENT, YOU, YOUR PREMISES OR COMPANY EQUIPMENT. NEITHER THE COMPANY NOR ANY OF ITS AFFILIATES, SUPPLIERS OR AGENTS SHALL HAVE ANY LIABILITY WHATSOEVER FOR ANY SUCH FAILURE OR DAMAGE, INCLUDING LACK OF 911/E911 CAPABILITY OR DIALING ASSOCIATED WITH A SECURITY SYSTEM. YOUR USE OF CUSTOMER EQUIPMENT MAY PREVENT PROVISION OF SERVICE. The foregoing limitation of liability is in addition to and shall not limit any other limitation of liability set forth in this Agreement.

  • ENTERPRISE SERVICES’ OBLIGATION In the event that Enterprise Services receives a public records disclosure request pertaining to records that Contractor has submitted and marked either as (a) statutorily exempt from disclosure; or (b) sensitive, Enterprise Services, prior to disclosure, will do the following: Enterprise Services’ Public Records Officer will review any records marked by Contractor as statutorily exempt from disclosure. In those situations, where the designation comports with the stated statutory exemption from disclosure, Enterprise Services will redact or withhold the record(s) as appropriate. For records marked ‘sensitive’ or for records where Enterprise Services determines that no statutory exemption to disclosure applies or is unable to determine whether the stated statutory exemption to disclosure properly applies, Enterprise Services will notify Contractor, at the address provided in the Contract, of the public records disclosure request and identify the date that Enterprise Services intends to release the record(s) (including records marked ‘sensitive’ or exempt from disclosure) to the requester unless Contractor, at Contractor’s sole expense, timely obtains a court order enjoining Enterprise Services from such disclosure. In the event Contractor fails to timely file a motion for a court order enjoining such disclosure, Enterprise Services will release the requested record(s) on the date specified. Contractor’s failure properly to identify exempted or sensitive information or timely respond after notice of request for public disclosure has been given shall be deemed a waiver by Contractor of any claim that such records are exempt or protected from public disclosure.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!