Forwarded Data Sample Clauses

Forwarded Data. The Managed Services may operate by forwarding certain portions of End Users’ data (“Forwarded Data”) to F5 owned or controlled servers located in the United States and other countries. MSP represents and warrants that MSP: (i) is legally permitted and authorized to access, and to provide F5 with access to, the Forwarded Data and agrees to provide F5 with evidence of such authorization upon request; (ii) authorizes F5 to act as End User’s data processing agent as MSP’s subcontractor and at their discretion in conjunction with the Managed Services; (iii) undertakes to inform the source of the Forwarded Data, to the extent required by local law, of the scope and purpose of the Managed Services, which may entail the transfer of Forwarded Data to servers located outside of the jurisdiction where MSP or End User are located; (iv) is responsible for deciding if and how MSP and/or End User use the Products and Managed Services; and (v) will, together with End User, otherwise use the Products and Managed Services only in a legal manner. In the event of any breach of the foregoing, F5 may, with prior notice and without prejudice to its other rights, disallow any Forwarded Data or use of the Products until MSP can show to F5’s satisfaction that any such breach has been cured.
AutoNDA by SimpleDocs
Forwarded Data. The Services may operate by forwarding certain portions of the Subscriber Data (“Forwarded Data”) to A10 owned or controlled servers in the United States and other countries. Subscriber represents and warrants that Subscriber: (a) is legally permitted and authorized to access, and to provide A10 with access to, the Forwarded Data and agrees to provide A10 with evidence of such authorization upon request; (b) is responsible for deciding if and how Subscriber uses the Services; and (c) will use the Services only in a legal manner. In the event of any breach of this representation and warranty, A10 may, without prejudice to its other rights, disallow any Forwarded Data or use of the Services until Subscriber can show to A10’s reasonable satisfaction, that any such breach has been cured.

Related to Forwarded Data

  • De-Identified Data Provider agrees not to attempt to re-identify de-identified Student Data. De-Identified Data may be used by the Provider for those purposes allowed under FERPA and the following purposes: (1) assisting the LEA or other governmental agencies in conducting research and other studies; and (2) research and development of the Provider's educational sites, services, or applications, and to demonstrate the effectiveness of the Services; and (3) for adaptive learning purpose and for customized student learning. Provider's use of De-Identified Data shall survive termination of this DPA or any request by XXX to return or destroy Student Data. Except for Subprocessors, Xxxxxxxx agrees not to transfer de- identified Student Data to any party unless (a) that party agrees in writing not to attempt re-identification, and (b) prior written notice has been given to the LEA who has provided prior written consent for such transfer. Prior to publishing any document that names the LEA explicitly or indirectly, the Provider shall obtain the LEA’s written approval of the manner in which de-identified data is presented.

  • Covered Data All instances of "Student Data" should be replaced with "LEA Data". The protections provided within this DPA extend to all data provided to or collected by the Provider.

  • Source of Data A description of (1) the process used to identify claims in the Population, and (2) the specific documentation relied upon by the IRO when performing the Quarterly Claims Review (e.g., medical records, physician orders, certificates of medical necessity, requisition forms, local medical review policies (including title and policy number), CMS program memoranda (including title and issuance number), Medicare contractor manual or bulletins (including issue and date), other policies, regulations, or directives).‌‌‌

  • User Data We will maintain certain data that you transmit to the Services for the purpose of managing the performance of the Services, as well as data relating to your use of the Services. Although we perform regular routine backups of data, you are solely responsible for all data that you transmit or that relates to any activity you have undertaken using the Services. You agree that we shall have no liability to you for any loss or corruption of any such data, and you hereby waive any right of action against us arising from any such loss or corruption of such data.

  • Marking of Data Pursuant to Paragraph A above, any Data delivered under this Agreement shall be marked with the following legend: Use, duplication, or disclosure is subject to the restrictions as stated in Agreement HR0011-XX-9-XXXX between the Government and the Performer.

  • Privacy Statement The Parties agree to keep all information related to the signing and fulfillment of this Agreement confidential, and not to disclose it to any third parties, except for subcontractors involved in this agreement, unless prior written consent is obtained from the other Party. Should subcontractors be engaged under this agreement, they are required to adhere to its terms and conditions.

  • Client Records 25.2.1 CONTRACTOR shall prepare and maintain accurate and 26 complete records of clients served and dates and type of services provided 27 under the terms of this Agreement in a form acceptable to ADMINISTRATOR.

  • Encounter Data Party shall provide encounter data to the Agency of Human Services and/or its departments and ensure further that the data and services provided can be linked to and supported by enrollee eligibility files maintained by the State.

  • Usage Data 7.1. The parties shall supply data on usage of the Licensed Work that is available to them during the term of this Licence. Notwithstanding the foregoing, the parties shall neither assemble nor provide data from which an individual user could be identified.

  • Device Data We may share certain personal information and device-identifying technical data about you and your devices with third party service providers, who will compare and add device data and fraud data from and about you to a database of similar device and fraud information in order to provide fraud management and prevention services, which include but are not limited to identifying and blocking access to the applicable service or Web site by devices associated with fraudulent or abusive activity. Such information may be used by us and our third party service providers to provide similar fraud management and prevention services for services or Web sites not provided by us. We will not share with service providers any information that personally identifies the user of the applicable device.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!