Distribution of Data Sample Clauses

Distribution of Data. Licensee may only use and exchange Confidential Information for the purposes as expressly described and allowed in this Agreement. In addition to any other restrictions on Permissible Use, Confidential Information may not be distributed, repurposed or shared across other applications, environments, or business units of Licensee. Licensee must assure that no Confidential Information of any kind is transmitted, exchanged or otherwise passed to other contractors/vendors or interested parties except Licensee and/or Subrecipients who have an authorized legal Permissible Use according to this Agreement, and who are under contract with Licensee.
AutoNDA by SimpleDocs
Distribution of Data. Licensee agrees that any and all DOL data exchanged shall be used solely for the purposes as expressly described in this Agreement. Data shall not be distributed, repurposed or shared across other applications, environments, or business units of Licensee. Licensee further agrees that no DOL data of any kind shall be transmitted, exchanged or otherwise passed to other contractors/vendors or Interested Parties except Subscribers who have an authorized legal permissible use according to the current agreement, right to receive DOL data, and who are under contract with the Licensee. Any exception shall be on a case-by-case basis as mutually agreed to in writing by the execution of an amendment to this Agreement.
Distribution of Data. The DATA is to be solely retained by the LICENSEE. In no instance is the Data to be sold, lease, published, sub-licensed, loaned or transferred, in whole or part to any other party including but not limited to unlicensed employees. LICENSEE shall protect the DATA from unauthorized use, reproduction, distribution or publication.
Distribution of Data. Contractor may only use and exchange Confidential Information for the purposes as expressly described and allowed in this Agreement. In addition to any other restrictions on Permissible Use, Confidential Information may not be distributed, repurposed or shared across other applications, environments, or business units of Contractor. Contractor must assure that no Confidential Information of any kind is transmitted, exchanged or otherwise passed to other contractors/vendors or interested Parties except Contractor and/or Subcontractors who have an authorized legal Permissible Use according to this Agreement, and who are under contract with Contractor.
Distribution of Data. Licensee shall ensure no DOL data of any kind shall be transmitted, exchanged, or otherwise passed to other Licensees/vendors or interested parties except on a case-by-case basis as specifically agreed to in writing by XXX. Licensee further agrees not to provide screen prints outside their control. Any screen print must be destroyed as referenced in the Data Disposal section.

Related to Distribution of Data

  • Collection of Data The Insured acknowledges being informed that the Insurer processes his personal data in accordance with regulations relative to the protection of personal data in effect and that, moreover: - the answers to the questions asked are mandatory and that in the event of false declarations or omissions, the consequences for him may be invalidity of the subscription to the contract (article L 113-8 of the Insurance Code) or the reduction of indemnities (article L 113-9 of the Insurance Code), • The processing of personal data is necessary for acceptance and execution of its contract and its guarantees, for the management of commercial and contractual relationships, and for the execution of legal, regulatory or administrative provisions in effect. • The data collected and processed is kept for the period necessary for execution of the contract or the legal obligation. This data is then archived in accordance with the durations specified by the provisions relative to time limits. • The recipients of the data concerning him are, within the limits of their powers, the services of the Insurer in charge of signature, management and execution of the Insurance Contract and guarantees, its delegates, agents, partners, subcontractors and reinsurers, within the framework of their duties. It can also be sent, if necessary, to professional bodies as well as to all persons involved in the contract such as lawyers, experts, court officials and ministerial officers, trustees, guardians or investigators. Information concerning him may also be transmitted to the Underwriter, as well as to all persons authorized as Authorized Third Parties (courts, arbitrators, mediators, relevant ministries, supervisory and regulatory authorities and all public bodies authorized to receive it as well as departments in charge of control such as statutory auditors, auditors as well as departments in charge of internal control). • In its capacity as a financial organization, the Insurer is subject to the legal obligations resulting mainly from the Monetary and Financial Code with regard to money laundering and against the financing of terrorism and, as such, it monitors contracts, which may result in the drafting of a declaration of suspicion or a measure of freezing of assets. The data and documents concerning the Insured are kept for a period of five (5) years from the end of the contract or termination of the relationship. • His personal information will also be able to be used within the framework of processing to fight against insurance fraud, which may lead, if applicable, to placement on a list of persons presenting a risk of fraud. This registration may have the effect of extending examination of his case, or even the reduction or refusal of the benefit of a right, benefit, contract or service offered. In this context, personal data concerning him (or concerning persons or parties who are interested in the contract may be processed by any authorized persons working within the entities of the Insurer Group in the context of the fight against fraud. This data may also be intended for the authorized personnel of organizations directly concerned by fraud (other insurance organizations or intermediaries; judicial authorities, mediators, arbitrators, court officials, legal officers; third-party organizations authorized by a legal provision and, if applicable, victims of acts of fraud or their representatives). In the event of a fraud alert, the data is kept for a maximum of six (6) months to qualify the alert and then deleted, unless the alert is relevant. In the event of a relevant alert, the data is kept for up to five (5) years following closure of the fraud case, or until the end of the legal proceedings and the applicable limitation periods. For people registered on a list of suspected fraudsters, their data is deleted after 5 years from the date of placement on this list. • In its capacity as insurer, it is founded in carrying out the processing of data relative to violations, condemnations and measures of security, either at the time of subscription of the insurance contract, or during the period of execution, or within the framework of the handling of legal action. • Personal data may be used by the Insurer within the framework of processing implemented by the insurer, the purpose of which is research and development to improve the quality or relevance of its future insurance or assistance products and service offers • Personal data concerning him may be accessible to some of the Insurer's employees or service providers established in countries outside the European Union. • By proving his identity, the Insured has a right of access, rectification, deletion and opposition concerning the data processed. He also has the right to ask to limit the use of his data when it is no longer necessary, or to recover, in a structured format, the data that he has provided when it was necessary for the contract or when he consented to the use of this data. He has the right to provide instructions relative to the fate of his personal data after his death. These instructions, general or specific, concern the storage, removal and communication of his data after his death. These rights can be exercised with the Insurer's Data Protection Representative: - by email: sent to XXXX@XXXXXXXX.xx or - by postal mail: by writing to the following address: Délégué représentant à la protection des données – MUTUAIDE ASSISTANCE – 000, xxx xx xx Xxxxxx – 93196 Noisy le Grand. After having made a request to the Data Protection Representative without having received satisfaction, he has the possibility of contacting the CNIL (Commission Nationale de l'informatique et des Libertés).

  • Distribution of Literature FSFSA representatives may, during non-working hours or during any breaks, distribute employee organization literature. The FSFSA agrees that nothing of a libelous, racist, sexist, obscene, or partisan political nature shall be so distributed.

  • Disposition of Data Upon written request from the LEA, Provider shall dispose of or provide a mechanism for the LEA to transfer Student Data obtained under the Service Agreement, within sixty (60) days of the date of said request and according to a schedule and procedure as the Parties may reasonably agree. Upon termination of this DPA, if no written request from the LEA is received, Provider shall dispose of all Student Data after providing the LEA with reasonable prior notice. The duty to dispose of Student Data shall not extend to Student Data that had been De-Identified or placed in a separate student account pursuant to section II 3. The LEA may employ a “Directive for Disposition of Data” form, a copy of which is attached hereto as Exhibit “D”. If the LEA and Provider employ Exhibit “D,” no further written request or notice is required on the part of either party prior to the disposition of Student Data described in Exhibit “D.

  • Retention of data With regard to business transactions covered by this Agreement, Licensee must retain any records for a period of ten years starting on 1th of January of the year following the year during which the data were transmitted or otherwise transferred, or for the minimum period prescribed by applicable law, whichever is longer. In addition, Licensee must maintain current, complete and accurate reports on all of SAP’s Confidential Information in its possession or in the possession of its representatives.

  • Protection of Data The Contractor agrees to store Data on one or more of the following media and protect the Data as described:

  • Identification of Data a. All Background, Third Party Proprietary and Controlled Government Data provided by Disclosing Party shall be identified in the Annex under which it will be provided.

  • Description of Data Instructions to the drafter; delete after completion of this section: This section of this attachment should provide sufficient information such that each party understands the information that will be transmitted under this Agreement. Examples of information that should be provided include: * Whether the data is obtained from human subjects and, if so, a description of the population included in the data. * If the data is from animal subjects, the species of animal the data was obtained using. * If not from human or animal subjects, a description of the focus of the data. * The number of subjects and/or experiments included * Name of the study that the data was obtained under If there is a particular study that needs to be acknowledged/cited as the source of the data, this information should be included here.

  • Distribution of Union Literature (a) The Employer will provide space to the Union during Employee orientation to allow the Union to distribute Union literature related to the orientation of new Union members.

  • Deletion of Data You can delete the information saved on your device at any time by uninstalling the App via your operating system. If you have activated a cloud solution to synchronize your device (e.g. Samsung Cloud or Apple iCloud), it may be necessary for you to delete the safeguard saved in the cloud to delete the data saved in the cloud. Images taken with the treasure xxxx App are saved on your device and are not automatically deleted from your device when the app is uninstalled. The TabTracks App is not authorized to do this under requested permissions. This is a security setting for the iOS and Android operating systems. The information saved on our servers under your user account can be deleted at any time upon your request. Please write an email with your request to xxxxxxxxxxx@xxxxxxxxx.xxx.

  • Distribution of UDP and TCP queries DNS probes will send UDP or TCP “DNS test” approximating the distribution of these queries.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!