Limitation on Encryption Technology Sample Clauses

Limitation on Encryption Technology. You acknowledge and agree that the MessageGuard Service is not guaranteed to be one hundred percent (100%) effective or error free and may permit unauthorized access to electronic mail messages and files that have been encrypted or decrypted by the MessageGuard Service. You acknowledge and agree that Network Solutions shall have no liability to you or any third party with respect to our MessageGuard Service, your failure to send or receive an encrypted electronic message or attachment, or the unauthorized access to your or your intended recipients' encrypted electronic messages or attachments.
AutoNDA by SimpleDocs
Limitation on Encryption Technology. You acknowledge and agree that the Guard Encryption Service is not guaranteed to be one hundred percent (100%) effective or error free and may permit unauthorized access to electronic mail messages and files that have been encrypted or decrypted by the Guard Encryption Service. You acknowledge and agree that Network Solutions shall have no liability to you or any third party with respect to our Guard Encryption Service, your failure to send or receive an encrypted electronic message or attachment, or the unauthorized access to your or your intended recipients' encrypted electronic messages or attachments.

Related to Limitation on Encryption Technology

  • Information Technology The following applies to all contracts for information technology commodities and contractual services. “Information technology” is defined in section 287.012(15), F.S., to have the same meaning as provided in section 282.0041, F.S.

  • Limitation on Services Except in cases of Emergency Services or Urgent Care, or as otherwise provided under this Certificate, services are available only from Participating Providers and HMO shall have no liability or obligation whatsoever on account of any service or benefit sought or received by a Member from any Physician, Hospital, Skilled Nursing Facility, home health care agency, or other person, entity, institution or organization unless prior arrangements are made by HMO.

  • Accessibility of Information Technology Contractor represents and warrants that any software/ hardware/ communications system/ equipment (collectively “technology”), if any, provided under this Agreement adheres to the standards and/or specifications as may be set forth in the Section 508 of the Rehabilitation Act of 1973 standards guide and is fully compliant with WCAG 2.0 AA standards for accessibility and compliant with any applicable FCC regulations. Technology that will be used on a mobile device must also be navigable with Voiceover on iOS devices in addition to meeting WCAG 2.0 level AA. If portions of the technology or user experience are alleged to be non-compliant or non- accessible at any point, District will provide Contractor with notice of such allegation and Contractor shall use its best efforts to make the technology compliant and accessible. If a state or federal department, office or regulatory agency, or if any other third party administrative agency or organization (“Claimants”), make a claim, allegation, initiates legal or regulatory process, or if a court finds or otherwise determines that technology is non-compliant or non-accessible, Contractor shall indemnify, defend and hold harmless the District from and against any and all such claims, allegations, liabilities, damages, penalties, fees, costs (including but not limited to reasonable attorneys’ fees), arising out of or related to Xxxxxxxxx’ claims. Contractor shall also fully indemnify District for the full cost of any user accommodation that is found to be necessary due to an identifiable lack of accessibility in the Contractor’s technology. If necessary, an independent 3rd party accessibility firm using POUR standards (Perceivable, Operable, Understandable and Robust) may be used to validate the accessibility of the technology.

  • Cooperation on Safety The Employer and Union will cooperate in continuing and perfecting regulations which will afford adequate protection to employees engaged in hazardous areas.

  • Limitation on Use of Information The Fund agrees neither to use the information received from the Intermediary for any purpose other than to comply with SEC Rule 22c-2 and other applicable laws, rules and regulations, nor to share the information with anyone other than its employees who legitimately need access to it. Neither the Fund nor any of its affiliates or subsidiaries may use any information provided pursuant to this Agreement for marketing or solicitation purposes. The Fund will take such steps as are reasonably necessary to ensure compliance with this obligation. The Fund shall indemnify and hold the Intermediaries, individually and collectively, (and any of their respective directors, officers, employees, or agents) harmless from any damages, loss, cost, or liability (including reasonable legal fees and the cost of enforcing this indemnity) arising out of or resulting from any unauthorized use of or disclosure by the Fund of the information received from the Intermediaries pursuant to this Agreement. In addition, because an award of money damages (whether pursuant to the foregoing sentence or otherwise) may be inadequate for any breach of this provision and any such breach may cause the Intermediaries irreparable harm, the Fund also agrees that, in the event of any breach or threatened breach of this provision, the Intermediaries will also be entitled, without the requirement of posting a bond or other security, to seek equitable relief, including injunctive relief and specific performance. Such remedies will not be the exclusive remedies for any breach of this provision but will be in addition to all other remedies available at law or in equity to the Intermediaries. In the event that the Fund is required by legal process, law, or regulation to disclose any information received from the Intermediaries pursuant to this Agreement, the Fund shall provide Intermediaries with prompt written notice of such requirement as far in advance of the proposed disclosure as possible so that the Intermediaries (at their expense) may either seek a protective order or other appropriate remedy which is necessary to protect their interests or waive compliance with this provision to the extent necessary.

  • Limitation on Use COLLEGE and SCHOOL DISTRICT shall use each student education record that he or she may receive pursuant to this CCAP Agreement solely for a purpose(s) consistent with his or her authority to access that information pursuant to Federal and State law, as may be as applicable. (34 C.F.R. § 99.31, 34 C.F.R. § 99.34, and Education Code § 49076.)

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Limitation on Publication The Contractor shall not publish or submit for publication any article, press release, or other writing relating to the Contractor's services for the Judicial Council without prior review and written permission by the Judicial Council.

  • Information Technology Enterprise Architecture Requirements If this Contract involves information technology-related products or services, the Contractor agrees that all such products or services are compatible with any of the technology standards found at xxxxx://xxx.xx.xxx/iot/2394.htm that are applicable, including the assistive technology standard. The State may terminate this Contract for default if the terms of this paragraph are breached.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!