Other Users/Occupants of your Vehicle Sample Clauses

Other Users/Occupants of your Vehicle. You promise to educate and inform all users and occupants of your Vehicle about the Services and System features and limitations, the terms of the Agreement, and the Privacy Policy. Neither we nor any Service Provider has any obligation to inquire about the authority of anyone using your Vehicle.
AutoNDA by SimpleDocs
Other Users/Occupants of your Vehicle. YOU'RE SOLELY RESPONSIBLE FOR ANY USE OF ACURALINK SERVICE IN YOUR VEHICLE, EVEN IF YOU AREN'T THE ONE USING IT, AND EVEN IF YOU LATER CLAIM THE USE WASN'T AUTHORIZED. YOU'RE ALSO SOLELY RESPONSIBLE FOR THE SERVICES REQUESTED BY YOU, OR BY ANYONE USING YOUR VEHICLE, THROUGH YOUR ACURALINK SYSTEM. You promise to educate and inform all users and occupants of your Vehicle about the AcuraLink services and system features and limitations, the terms of the Agreement, and the AcuraLink Privacy Policy, and to ensure that such users and occupants agree with them. Neither we nor any Service Provider has any obligation to inquire about the authority of anyone using your Vehicle. If you or a driver of your Vehicle uses the AcuraLink system to commit a crime or for another improper purpose, you will be responsible for any damages owed by us as a result of such use.
Other Users/Occupants of your Vehicle. You promise to educate and inform all users and occupants of your Vehicle about the SUBARU STARLINK Services and system features and limitations. YOU ARE SOLELY RESPONSIBLE FOR ANY USE OF SUBARU STARLINK SERVICES IN YOUR VEHICLE, EVEN IF YOU ARE NOT THE ONE USING IT, AND EVEN IF YOU LATER CLAIM THE USE WAS NOT AUTHORIZED. YOU ARE ALSO SOLELY RESPONSIBLE FOR THE SERVICES REQUESTED BY YOU, OR BY ANYONE USING YOUR VEHICLE, THROUGH SUBARU STARLINK. We have no obligation to inquire about the authority of anyone using your Vehicle. If you, another driver or a passenger of your Vehicle uses the SUBARU STARLINK System to commit a crime or for another improper purpose, you agree to indemnify, defend and hold SUBARU STARLINK harmless from and against any and all costs, expenses (including attorneys’ fees), losses, damages and other liabilities which arise from such improper use.
Other Users/Occupants of your Vehicle. You promise to educate and inform all users and occupants of your Vehicle about the Services and System features and limitations, the terms of the Agreement, including terms concerning data collection and use and privacy, and the Infiniti Privacy Policy. Neither any Service Provider nor we have any obligation to inquire about the authority of anyone using your Vehicle.
Other Users/Occupants of your Vehicle. You promise to educate and inform all users and occupants of your Vehicle about NissanConnect Services, the System, and its limitations. YOU, AS THE PRIMARY SUBSCRIBER, ARE SOLELY RESPONSIBLE FOR ANY USE OF NISSANCONNECT SERVICES IN YOUR VEHICLE, EVEN IF YOU ARE NOT THE ONE USING IT, AND EVEN IF YOU LATER CLAIM THE USE WAS NOT AUTHORIZED. YOU ARE ALSO SOLELY RESPONSIBLE FOR THE SERVICES REQUESTED BY YOU, OR BY ANYONE USING YOUR VEHICLE, THROUGH NISSANCONNECT SERVICES. Neither we nor any Service Provider has any obligation to inquire about the authority of anyone using your Vehicle. If you, another driver or a passenger of your Vehicle uses the NissanConnect Services System to commit a crime or for another improper purpose, you will be responsible for any damages owed by any of us as a result of such use.

Related to Other Users/Occupants of your Vehicle

  • HOW WE MAY USE YOUR PERSONAL INFORMATION 8.1 We will use the personal information You provide to Us to:

  • PROTECTION OF YOUR CONTENT 5.1 In order to protect Your Content provided to Oracle as part of the provision of the Services, Oracle will comply with the applicable administrative, physical, technical and other safeguards, and other applicable aspects of system and content management, available at xxxx://xxx.xxxxxx.xxx/us/corporate/contracts/cloud-services/index.html.

  • Collection and Use of Your Information You acknowledge that when you download, install, or use the Application, Company may use automatic means (including, for example, cookies and web beacons) to collect information about your Mobile Device and about your use of the Application. You also may be required to provide certain information about yourself as a condition to downloading, installing, or using the Application or certain of its features or functionality, and the Application may provide you with opportunities to share information about yourself with others. All information we collect through or in connection with this Application is subject to our Privacy Policy. By downloading, installing, using, and providing information to or through this Application, you consent to all actions taken by us with respect to your information in compliance with the Privacy Policy.

  • Malicious Software 12.1 The Supplier shall, as an enduring obligation throughout the Term, use the latest versions of anti-virus definitions available [from an industry accepted anti-virus software vendor] to check for and delete Malicious Software from the ICT Environment.

  • Public Posting of Approved Users’ Research Use Statement The PI agrees that information about themselves and the approved research use will be posted publicly on the dbGaP website. The information includes the PI’s name and Requester, project name, Research Use Statement, and a Non-Technical Summary of the Research Use Statement. In addition, and if applicable, this information may include the Cloud Computing Use Statement and name of the CSP or PCS. Citations of publications resulting from the use of controlled-access datasets obtained through this DAR may also be posted on the dbGaP website.

  • E10 Malicious Software E10.1 The Contractor shall, as an enduring obligation throughout the Contract Period, use the latest versions of anti-virus definitions available from an industry accepted anti-virus software vendor to check for and delete Malicious Software from the ICT Environment.

  • Reporting of Abuse, Neglect, or Exploitation Consistent with provisions of 33 V.S.A. §4913(a) and §6903, any agent or employee of a Contractor who, in the performance of services connected with this agreement, has contact with clients or is a caregiver and who has reasonable cause to believe that a child or vulnerable adult has been abused or neglected as defined in Chapter 49 or abused, neglected, or exploited as defined in Chapter 69 of Title 33 V.S.A. shall make a report involving children to the Commissioner of the Department for Children and Families within 24 hours or a report involving vulnerable adults to the Division of Licensing and Protection at the Department of Disabilities, Aging, and Independent Living within 48 hours. This requirement applies except in those instances where particular roles and functions are exempt from reporting under state and federal law. Reports involving children shall contain the information required by 33 V.S.A. §4914. Reports involving vulnerable adults shall contain the information required by 33 V.S.A. §6904. The Contractor will ensure that its agents or employees receive training on the reporting of abuse or neglect to children and abuse, neglect or exploitation of vulnerable adults.

  • Permitted Uses and Disclosures of Phi by Business Associate Except as otherwise indicated in this Agreement, Business Associate may use or disclose PHI, inclusive of de-identified data derived from such PHI, only to perform functions, activities or services specified in this Agreement on behalf of DHCS, provided that such use or disclosure would not violate HIPAA or other applicable laws if done by DHCS.

  • Return of Your Data Upon request by You made within 30 days after the effective date of termination of a Purchased Services subscription, We will make available to You for download a file of Your Data in comma separated value (.csv) format along with attachments in their native format. After such 30-day period, We shall have no obligation to maintain or provide any of Your Data and shall thereafter, unless legally prohibited, delete all of Your Data in Our systems or otherwise in Our possession or under Our control.

  • Protecting Your Personal Information In addition to protecting your access codes, you should also take precautions to protect your personal identification information, such as your driver’s license, Social Security number, or tax identification number. This information by itself or together with account information may allow unauthorized access to your accounts. You should treat personal information with the same level of care that you would for your account information. You should also protect and secure all information and data stored in any personal computer or other equipment you use to access our Online Banking service.

Time is Money Join Law Insider Premium to draft better contracts faster.