Unauthorised use We shall not be liable for any loss, liability or cost whatsoever arising from any unauthorised use of the Electronic Service. You shall on demand indemnify, protect and hold us harmless from and against all losses, liabilities, judgements, suits, actions, proceedings, claims, damages and costs resulting from or arising out of any act or omission by any person using an Electronic Service by using your designated passwords, whether or not you authorised such use.
Injury at Work Any employee who may be injured during the course of his day's employment shall be paid a minimum of eight (8) hours pay for that day, if such injury requires the employee to leave the job for medical treatment by a professional medical care provider.
Authorised Users individuals who are authorised by the Institution to access the Institution's information services whether on-site or off-site via Secure Authentication and who are affiliated to the Institution as a current student (including but not limited to undergraduates, postgraduates and guest students), member of staff (whether on a permanent or temporary basis including retired members of staff and any teacher who teaches Authorised Users) or contractor or registered user of the Institution. Persons who are not currently a student, member of staff, contractor or registered user of the Institution, but who are permitted to access the Institution's information services from computer terminals or otherwise within the physical premises of the Institution ["Walk-In Users"] are also deemed to be Authorised Users, only for the time they are within the physical premises of the Institution.
Unauthorized Use or Disclosure The Contractor shall notify COMMERCE within five (5) working days of any unauthorized use or disclosure of any confidential information, and shall take necessary steps to mitigate the harmful effects of such use or disclosure.
Unauthorised Use of Intellectual Property a) The Supplier/Service Provider agrees to notify Transnet in writing of any conflicting uses of, and applications of registrations of Patents, Designs and Trade Marks or any act of infringement, unfair competition or passing off involving the Intellectual Property of Transnet of which the Supplier/Service Provider acquires knowledge and Transnet shall have the right, as its own option, to proceed against any party infringing its Intellectual Property.
Unauthorised Use of Confidential Information The Supplier/Service Provider shall not authorise any party to act on or use in any way any Confidential Information belonging to Transnet whether or not such party is aware of such Confidential Information, and shall promptly notify Transnet of the information if it becomes aware of any party so acting, and shall provide Transnet the information with such assistance as Transnet reasonably requires, at Transnet’s cost and expense, to prevent such third party from so acting.
Unauthorised disclosure For the avoidance of doubt, a party will be responsible for any unauthorised disclosure of Confidential Information made by that party’s employees, directors, agents or advisors and by a bona fide potential purchaser to whom Confidential Information has been disclosed by that party under clause 22.2(f).
Malicious Software 12.1 The Supplier shall, as an enduring obligation throughout the Term, use the latest versions of anti-virus definitions available [from an industry accepted anti-virus software vendor] to check for and delete Malicious Software from the ICT Environment.
E10 Malicious Software E10.1 The Contractor shall, as an enduring obligation throughout the Contract Period, use the latest versions of anti-virus definitions available from an industry accepted anti-virus software vendor to check for and delete Malicious Software from the ICT Environment.
Approved User A user approved by the relevant Data Access Committee(s) to access one or more datasets for a specified period of time and only for the purposes outlined in the Principal Investigator (PI)’s approved Research Use Statement. The Information Technology (IT) Director indicated on the Data Access Request, as well as any staff members and trainees under the direct supervision of the PI are also Approved Users and must abide by the terms laid out in the Data Use Certification Agreement.