Cloud Technology Sample Clauses

Cloud Technology. Adequate safeguards must ensure the confidentiality, integrity, and availability of Customer Data stored, processed or transmitted using cloud technology (either as a cloud customer or cloud provider, to include dependent suppliers), using industry standards.
AutoNDA by SimpleDocs
Cloud Technology. You will not intentionally (a) interfere with other customersaccess to, or use of, CampbellCloud, or with any of its security measures;
Cloud Technology. You will not intentionally (a) interfere with other customers’ access to, or use of, the XXXXXXXX CLOUD, or with any of its security measures; (b) facilitate any attack or disruption of the XXXXXXXX CLOUD, including a denial of service attack, unauthorized access, penetration testing, crawling, or distribution of malware (including viruses, trojan horses, worms, time bombs, spyware, adware, cancelbots and/or anything similar); (c) cause any usage spike that is irregular or improperly increase Your usage of the XXXXXXXX CLOUD in a manner that negatively impacts the XXXXXXXX CLOUD’s operation; or (d) use the XXXXXXXX CLOUD in a manner that is not contemplated as normal usage for the XXXXXXXX CLOUD for the primary purpose of the XXXXXXXX CLOUD, which is described in the terms of the CCDSA, generally available materials from Xxxxxxxx (“Technical Specifications”) and/or may be described separately in applicable terms and conditions and/or other applicable agreements, all of which You agree to as a condition of use of the XXXXXXXX CLOUD. You understand and agree that You are responsible for Your data and use of the XXXXXXXX CLOUD provides no guaranty or warranty against loss of data. You are responsible for protecting Your access to the XXXXXXXX CLOUD and will promptly notify Xxxxxxxx in the event of any known or suspected unauthorized use of the XXXXXXXX CLOUD.

Related to Cloud Technology

  • New Technology When new technology is introduced into a workplace, it will be the responsibility of the employer to provide appropriate training to the employees directly affected. Such training will include any health and safety implications or information that will enable employees to operate the equipment without discomfort and will help maintain their general well-being.

  • Technology Discoveries, innovations, Know-How and inventions, whether patentable or not, including computer software, recognized under U.S. law as intellectual creations to which rights of ownership accrue, including, but not limited to, patents, trade secrets, maskworks and copyrights developed under this Agreement.

  • Third Party Technology The Company makes use of third party technology to collect information required for traffic measurement, research, and analytics. Use of third party technology entails data collection. We therefore would like to inform clients the Company enables third parties to place or read cookies located on the browsers of users entering the Company’s domain. Said third parties may also use web beacons to collect information through advertising located on the Company’s web site. Please note that you may change your browser settings to refuse or disable Local Shared Objects and similar technologies; however, by doing so you may be disabling some of the functionality of Company’s services.

  • Science and Technology 1. Member States shall:

  • Foreground IP This subparagraph d. shall not apply to unmodified commercial off‐the‐shelf goods. If Services or goods are developed, modified or redesigned pursuant to this Contract then the paragraphs below apply.

  • Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.

  • Background IP As between the Parties, each Party will retain all right, title and interest in and to all of its Background IP.

  • Use of Technology Participants are subject to all existing laws (federal and state) and University regulations and policies on use of technology, including not only those laws and regulations that are specific to computers and networks, but also those that may apply generally to personal conduct such as:  UC Electronic Communications Policy: xxxx://xxxxxx.xxxx.xxx/doc/7000470/ElectronicCommunications  UCLA E-mail Policy and Guidelines: xxxx://xxx.xxxxxxxxxxxxx.xxxx.xxx/app/Default.aspx?&id=455  IT Services Acceptable Use Policy: xxxx://xxx.xxx.xxxx.xxx/policies/aupdetail.html  The UC Policy on Copyright Ownership: xxxx://xxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx.xxx/resources/copyright-ownership.html  Bruin OnLine Service Level Agreement: xxxx://xxx.xxx.xxxx.xxx/policies/BOL_SLA.pdf Any violation may result in technology related privileges being restricted or revoked and may also result in The University undertaking disciplinary or civil action. If the violation constitutes a criminal offense, appropriate legal action may be taken.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!