Consent to Monitoring. Supplier agrees that its access to and use of Internal Tesla Data and all acts in connection with Tesla’s internal systems are recorded and may be monitored. Supplier expressly consents to such recording and monitoring. If such recording or monitoring reveals possible evidence of criminal activities involving any individual, then Tesla may provide such evidence to the appropriate law enforcement organization and take any other appropriate action.
Consent to Monitoring. The XxxxXXxx.xxx public website and the Hack-A-Sat CTF network are property of the U.S. Government. Participants (teams and individuals of those teams) acknowledge they are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: ● The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. ● At any time, the USG may inspect and seize data stored on this IS. ● Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG authorized purpose. ● This IS includes security measures (e.g., authentication and access controls) to protect USG interests - not for your personal benefit or privacy. Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential.
Consent to Monitoring. Supplier agrees that its access to and use of Internal Applied Data and all acts in connection with Applied’s internal systems are recorded and may be monitored. Supplier expressly consents to such recording and monitoring. If such recording or monitoring reveals possible evidence of criminal activities involving any individual, then Applied may provide such evidence to the appropriate law enforcement organization and take any other appropriate action.
Consent to Monitoring. We use monitoring Software to track usage information, which allows us to more efficiently manage various service issues. The monitoring Software uses only a minimal amount of computing resources and will not materially impact your normal use of the Applications. You agree that we may access your computer system onsite or remotely to install monitoring Software, track User usage and implement updates to such Software. You agree that you will not interfere with any such monitoring Software.
Consent to Monitoring. Agent will permit Plan to monitor the performance of Agent on an ongoing basis, in any manner that Plan determines appropriate. Plan’s monitoring under this section does not relieve Agent of its obligations under this Agreement.
Consent to Monitoring. Service Provider may, in its sole discretion, at any time and without notice, access, monitor, search, review, collect, transfer, the use of the Service Provider Systems, including but not limited to its hardware, software, applications, storage devices, process control devices, telecommunications devices, access devices electronic equipment, computers, telephones, devices, internet and e-mail, whether directly attached or remotely connected. Customer and the Recipients hereby consent to such activity. Customer and the Recipients each represent that it has obtained, or will have obtained, from all persons who may or do utilize, or who are otherwise the subject of, any of the Services consents for the foregoing activities, which expressly include, but are not limited, to (1) the collection, processing and storage of data by Service Provider or its agents; (2) cross-border transfers of data as required to provide the Services or to exercise or evaluate rights and obligations wider the Agreement, or as otherwise permitted by Law or mutual agreement; and (3) the processing and disclosure of such data in accordance with applicable Law and to protect or identify the type of information and the corresponding legal rights and obligations of Customer, Recipient, the data subject, or Service Provider, including to comply with discovery obligations. Customer will maintain throughout the duration of the Agreement all such effective consents required by applicable Laws.
Consent to Monitoring. DC ACCESS RESERVES THE RIGHT TO, AND YOU ACKNOWLEDGE AND CONSENT THAT DC ACCESS MAY, BUT IS NOT REQUIRED TO, MONITOR YOUR COMMUNICATIONS AND ACTIVITIES VIA THIS SERVICE, INCLUDING THEIR CONTENT, DURING TRANSMISSION AND IN CONNECTION WITH USE OF THIS SERVICE, AND MAY DISCLOSE ANY SUCH INFORMATION FOR PURPOSES OF ENSURING YOUR COMPLIANCE WITH THIS AGREEMENT, APPLICABLE LAW, COOPERATING WITH LEGAL AUTHORITIES, AND OTHERWISE PROTECTING DC ACCESS'S RIGHTS, PROPERTY AND INTERESTS.
Consent to Monitoring. Supplier agrees that its access to and use of Internal Tesla Data and all acts in connection with Tesla’s internal systems are recorded and may be monitored. Supplier expressly consents to such recording and monitoring. If such recording or monitoring reveals possible evidence of criminal activities involving any individual, then Tesla may provide such evidence to the appropriate law enforcement organization and take any other appropriate action. [***] Information has been omitted and filed separately with the Securities and Exchange Commission. Confidential treatment has been requested with respect to the omitted portions. TESLA MOTORS CONFIDENTIAL/[***] Page 9 of 41 Confidential Treatment Requested by Tesla Motors, Inc. SUPPLY AGREEMENT
Consent to Monitoring. Austin Energy may monitor and record any access to the Network and Systems at any time without notice to Consultant. Consultant consents to this monitoring and recording, and Consultant will ensure that all persons obtaining access to the Network and Systems through Consultant consent to this monitoring and recording.
Consent to Monitoring. Customer authorizes Maxa AI to monitor and otherwise investigate Customer’s use of the Services, in order to ensure the security of the Services, verify compliance with this Agreement and make improvements to the Services.