IDX Data Subscriber and Third Party Service Provider Security and Audit Sample Clauses

IDX Data Subscriber and Third Party Service Provider Security and Audit. IDX Data Subscriber and Third Party Service Provider shall utilize appropriate security protection measures, such as firewalls and shall maintain an audit trail of Consumers’ activity on Subscriber Website and through any Third Party Service Provider server and make that information available to KWAR, if KWAR has determined in its sole discretion that any Subscriber Website or Third Party Service Provider server has been the cause of, and/or permitted a breach in, the security of the IDX System or any part thereof, KWAR’s MLS® System or a violation of any KWAR Requirements.
AutoNDA by SimpleDocs

Related to IDX Data Subscriber and Third Party Service Provider Security and Audit

  • Third Party Service Providers Unless otherwise prohibited by Apple in the Documentation or this Agreement, You are permitted to employ or retain a third party (“Service Provider”) to assist You in using the Apple Software and Services provided pursuant to this Agreement, including, but not limited to, engaging any such Service Provider to maintain and administer Your Applications’ servers on Your behalf, provided that any such Service Provider’s use of the Apple Software and Services or any materials associated therewith is done solely on Your behalf and only in accordance with these terms. Notwithstanding the foregoing, You may not use a Service Provider to submit an Application to the App Store or use TestFlight on Your behalf. You agree to have a binding written agreement with Your Service Provider with terms at least as restrictive and protective of Apple as those set forth herein. Any actions undertaken by any such Service Provider in relation to Your Applications or use of the Apple Software or Apple Services and/or arising out of this Agreement shall be deemed to have been taken by You, and You (in addition to the Service Provider) shall be responsible to Apple for all such actions (or any inactions). In the event of any actions or inactions by the Service Provider that would constitute a violation of this Agreement or otherwise cause any harm, Apple reserves the right to require You to cease using such Service Provider.

  • Reliance on Third Party Service Providers Each Party may allow Reporting Financial Institutions to use third party service providers to fulfill the obligations imposed on such Reporting Financial Institutions by a Party, as contemplated in this Agreement, but these obligations shall remain the responsibility of the Reporting Financial Institutions.

  • Links to Third Party Sites/Third Party Services xxxxxxxxxx.xxx may contain links to other websites ("Linked Sites"). The Linked Sites are not under the control of CURLYWORLD and CURLYWORLD is not responsible for the contents of any Linked Site, including without limitation any link contained in a Linked Site, or any changes or updates to a Linked Site. CURLYWORLD is providing these links to you only as a convenience, and the inclusion of any link does not imply endorsement by CURLYWORLD of the site or any association with its operators. Certain services made available via xxxxxxxxxx.xxx are delivered by third party sites and organizations. By using any product, service or functionality originating from the xxxxxxxxxx.xxx domain, you hereby acknowledge and consent that CURLYWORLD may share such information and data with any third party with whom CURLYWORLD has a contractual relationship to provide the requested product, service or functionality on behalf of xxxxxxxxxx.xxx users and customers.

  • Third Party Vendors Nothing herein shall impose any duty upon DST in connection with or make DST liable for the actions or omissions to act of the following types of unaffiliated third parties: (a) courier and mail services including but not limited to Airborne Services, Federal Express, UPS and the U.S. Mails, (b) telecommunications companies including but not limited to AT&T, Sprint, MCI and other delivery, telecommunications and other such companies not under the party’s reasonable control, and (c) third parties not under the party’s reasonable control or subcontract relationship providing services to the financial industry generally, such as, by way of example and not limitation, the National Securities Clearing Corporation (processing and settlement services), Fund custodian banks (custody and fund accounting services) and administrators (blue sky and Fund administration services), and national database providers such as Choice Point, Acxiom, TransUnion or Lexis/Nexis and any replacements thereof or similar entities, provided, if DST selected such company, DST shall have exercised due care in selecting the same. Such third party vendors shall not be deemed, and are not, subcontractors for purposes of this Agreement.

  • Third Party Services Any services required for or contemplated by the performance of the above-referenced services by the Administrator to be provided by unaffiliated third parties (including independent auditors’ fees and counsel fees) may, if provided for or otherwise contemplated by the Financing Order and if the Issuer deems it necessary or desirable, be arranged by the Issuer or by the Administrator at the direction (which may be general or specific) of the Issuer. Costs and expenses associated with the contracting for such third-party professional services may be paid directly by the Issuer or paid by the Administrator and reimbursed by the Issuer in accordance with Section 2, or otherwise as the Administrator and the Issuer may mutually arrange.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • Third Party Users If required by Applicable Laws and Regulations or if the Parties mutually agree, such agreement not to be unreasonably withheld, to allow one or more third parties to use the Connecting Transmission Owner’s Attachment Facilities, or any part thereof, Developer will be entitled to compensation for the capital expenses it incurred in connection with the Attachment Facilities based upon the pro rata use of the Attachment Facilities by Connecting Transmission Owner, all third party users, and Developer, in accordance with Applicable Laws and Regulations or upon some other mutually-agreed upon methodology. In addition, cost responsibility for ongoing costs, including operation and maintenance costs associated with the Attachment Facilities, will be allocated between Developer and any third party users based upon the pro rata use of the Attachment Facilities by Connecting Transmission Owner, all third party users, and Developer, in accordance with Applicable Laws and Regulations or upon some other mutually agreed upon methodology. If the issue of such compensation or allocation cannot be resolved through such negotiations, it shall be submitted to FERC for resolution.

  • Services and Third Party Materials A. The tvOS Software may enable access to Apple’s iTunes Store, App Store, Game Center, iCloud and other Apple and third party services, and web sites (collectively and individually, “Services”). Such Services may not be available in all languages or in all countries. Use of these Services requires Internet access and use of certain Services may require an Apple ID, may require you to accept additional terms and may be subject to additional fees. By using this software in connection with an Apple ID, or other Apple Service, you agree to the applicable terms of service for that Service, such as the latest iTunes Store Terms and Conditions, which you may access and review at xxxx://xxx.xxxxx.xxx/legal/itunes/ ww/.

  • The Service Provider upon receipt of a notice contemplated under clause 19.1 shall discontinue the supply of all services or goods under this Agreement, to the extent specified, and on the date specified in the notice.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!