Distributor or Publisher - Administered Authentication Sample Clauses

Distributor or Publisher - Administered Authentication. Where the Distributor or the Publisher provides alternative methods of access and authentication beyond the Licensee-administered methods described herein, e.g. by allowing users to establish a personal login from an on-campus IP address (thereby enabling access via username and password when logging in to a website of the Distributor) or device authentication, which affiliates the device or application by use of a token, cookie, or vendor-managed proxy prefix, neither the Licensee nor any Participating Institution will be responsible or liable for claims of breach or validity of such use. Neither the Licensee nor any of the Participating Institutions shall be responsible or liable for the processing of personally identifiable information (personal data) by the Distributor or Publisher in this matter as this remains its full liability.
AutoNDA by SimpleDocs
Distributor or Publisher - Administered Authentication. Where the Distributor or the Publisher provides alternative methods of access and authentication beyond the Licensee-administered methods described herein, e.g. by allowing users to establish a personal login from an on-campus IP address (thereby enabling access via username and password when logging in to a website of the Distributor) or device authentication, which affiliates the device or application by use of a token, cookie, or vendor-managed proxy prefix, neither the Licensee nor any Participating Institution will be responsible or liable for claims of breach or validity of such use.
Distributor or Publisher - Administered Authentication. Where the Publisher provides alternative methods of access and authentication beyond the Licensee- administered methods described herein, e.g. by allowing users to establish a personal login from an on-campus IP address (thereby enabling access via username and password when logging in to a website of the Distributor) or device authentication, which affiliates the device or application by use of a token, cookie, or vendor-managed proxy prefix, the Licensee shall not be responsible or liable for the processing of personally identifiable information (personal data) by the Distributor or Publisher in this matter as this remains its full liability. The Licensee acknowledges that the Distributor or Publisher – Administered Authentication may require processing of personally identifiable information (personal data), however in any case only the Participating Institution and the Distributor or Publisher will process personal data as independent controllers without any involvement of the Licensee.
Distributor or Publisher - Administered Authentication. Where the Distributor or the Publisher provides alternative methods of access and authentication beyond the Licensee-administered methods described herein, e.g. by allowing users to establish a personal login from an on-campus IP address (thereby enabling access via username and password when logging in to a website of the Distributor) or device authentication, which affiliates the device or application by use of a token, cookie, or vendor-managed proxy prefix, neither the Licensee nor any Participating Institution will be responsible or liable for claims of breach or validity of such use so long as the Authorized User does not breach any terms of this Agreement in its access and use of the Licensed Materials. Neither the Licensee nor any of the Participating Institutions shall be responsible or liable for the processing of personally identifiable information (personal data) by the Distributor or Publisher in this matter. Distributor and Publisher shall act as data controllers for any personal data collected under this Section 4.2(b), in accordance with Section 16. as this remains its full liability.

Related to Distributor or Publisher - Administered Authentication

  • Access by and Authentication of Authorized Users Authorized Users of the Participating Institutions shall be granted access to the Licensed Materials pursuant to the following:

  • Execution and Authentication At least one Officer must sign the Notes for the Company by manual or facsimile signature. If an Officer whose signature is on a Note no longer holds that office at the time a Note is authenticated, the Note will nevertheless be valid. A Note will not be valid until authenticated by the manual signature of the Trustee. The signature will be conclusive evidence that the Note has been authenticated under this Indenture. The Trustee will, upon receipt of a written order of the Company signed by an Officer (an “Authentication Order”), authenticate Notes for original issue that may be validly issued under this Indenture, including any Additional Notes. The aggregate principal amount of Notes outstanding at any time may not exceed the aggregate principal amount of Notes authorized for issuance by the Company pursuant to one or more Authentication Orders, except as provided in Section 2.07 hereof. The Trustee may appoint an authenticating agent acceptable to the Company to authenticate Notes. An authenticating agent may authenticate Notes whenever the Trustee may do so. Each reference in this Indenture to authentication by the Trustee includes authentication by such agent. An authenticating agent has the same rights as an Agent to deal with Holders or an Affiliate of the Company.

  • Authorization, Authentication, and Access In order to ensure that access to the Data is limited to authorized staff, the Contractor must:

  • Execution, Authentication, Delivery and Dating of Rights Certificates (a) The Rights Certificates shall be executed on behalf of the Company by any of its Chairman of the Board, President, Chief Executive Officer and Chief Financial Officer. The signature of any of these officers on the Rights Certificates may be manual or facsimile. Rights Certificates bearing the manual or facsimile signatures of individuals who were at any time the proper officers of the Company shall bind the Company, notwithstanding that such individuals or any of them have ceased to hold such offices either before or after the countersignature and delivery of such Rights Certificates.

  • Authentication This Note shall not be valid until authenticated by the manual signature of the Trustee or an authenticating agent.

  • Security Administrator and Authorized Users Grantee shall:

  • POPULATION TO BE SERVED A. In accordance with the Contract, Contractor is required, within the limits of the Contractor’s service capacity, to serve individuals who meet the financial and clinical eligibility criteria for an adult who is Seriously Mentally Ill (SMI) and is eligible for services as described in the DARMHA manual.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!