Participant Use of Data Sample Clauses

Participant Use of Data. 5.1 All use of Data submitted to DNS-OARC will take place on DNS-OARC computers. DNS-OARC will provide powerful server computers with high-speed access to the file servers and databases holding the Data to which Participant is permitted access. Participant will copy its data-analysis software to DNS-OARC computers and run that software there. Results of such analysis are considered Derivative Data, and when exported back to Participant’s computers are not permitted to contain Raw Data nor can any exported results contain identifying information. 5.2 Participant shall not use or circulate Confidential Data within its own organization or its affiliates (i.e. entities controlled by or under common control with Participant) other than as strictly necessary on a need-to-know basis, and then with appropriate written confidentiality agreements. In no event shall Participant cause, permit or enable any third party to have access to or use Confidential Data in any manner whatsoever without the prior written consent of both the disclosing party and the Board of Directors and the execution by such third party of an appropriate written confidentiality agreement. In no event shall Participant (or anyone to whom it discloses Confidential Data) package or repackage any Confidential Data into a commercial product or service. 5.3 Participants are encouraged to publish the results of their analysis of the Data at DNS-OARC workshops and other public fora. All publication of Derivative Data must include acknowledgment of DNS-OARC as the source of the Data. Prior to publication, Participant must seek and obtain written permission from DNS-OARC for such publication, to allow DNS- OARC to verify that all terms of this Agreement are being adhered to.
AutoNDA by SimpleDocs
Participant Use of Data. When accessing or using Patient Data pursuant to the Agreement, Participant and Authorized Users may access and/or use Patient Data to perform any activities Participant is allowed to perform under the Agreement (including the Policies). Participant and Authorized Users may also access Patient Data when Participant is acting as a Business Associate of another Covered Entity, provided that: all documentation of that relationship is completed to MX’s satisfaction: Participant complies with that documentation; and the arrangement complies with Law. Notwithstanding any other provision of the Agreement, if Participant or an Authorized User accesses any Patient Data that it is not permitted to access under the Agreement at the time of that access, then Participant: (i) will be in breach of the Agreement, (ii) will not have or obtain any right to that Patient Data, and (iii) must immediately return or destroy that Patient Data.
Participant Use of Data. When accessing or using Patient Data pursuant to the Agreement, Participant and Authorized Users may access and/or use Patient Data to perform any activities Participant is allowed to perform under the Agreement (including the Policies).
Participant Use of Data. 5.1 All use of Data submitted to DNS-OARC will take place on DNS-OARC computers. DNS-OARC will provide powerful server computers with high-speed access to the file servers and databases holding the Data to which Participant is permitted access. Participant will copy its data-analysis software to DNS-OARC computers and run that software there. Results of such analysis are considered Derivative Data, and when exported back to Participant’s computers are not permitted to contain Raw Data nor can any exported results contain identifying information. 5.2 Participant shall not use or circulate Confidential Data within its own organization or its affiliates (i.e., entities controlled by or under common control with Participant) other than as strictly necessary on a need-to-know basis, and then with appropriate written confidentiality agreements. In no event shall Participant cause, permit or enable any third party to have access to or use Confidential Data in any manner whatsoever without the prior written consent of both the disclosing party and the Board of Directors and the execution by such third party of an appropriate written confidentiality agreement. In no event shall Participant (or anyone to whom it discloses Confidential Data) package or repackage any Confidential Data into a commercial product or service.

Related to Participant Use of Data

  • Use of Data by User Registry Operator will permit user to use the zone file for lawful purposes; provided that (a) user takes all reasonable steps to protect against unauthorized access to and use and disclosure of the data and (b) under no circumstances will Registry Operator be required or permitted to allow user to use the data to, (i) allow, enable, or otherwise support the transmission by email, telephone, or facsimile of mass unsolicited, commercial advertising or solicitations to entities other than user’s own existing customers, or (ii) enable high volume, automated, electronic processes that send queries or data to the systems of Registry Operator or any ICANN-­‐accredited registrar.

  • Use of Data (a) In connection with the provision of the services and the discharge of its other obligations under this Agreement, State Street (which term for purposes of this Section XXIX includes each of its parent company, branches and affiliates (''Affiliates")) may collect and store information regarding a Trust and share such information with its Affiliates, agents and service providers in order and to the extent reasonably necessary (i) to carry out the provision of services contemplated under this Agreement and other agreements between the Trusts and State Street or any of its Affiliates and (ii) to carry out management of its businesses, including, but not limited to, financial and operational management and reporting, risk management, legal and regulatory compliance and client service management.

  • Participant Information My address is: My Social Security Number is:

  • Use of Customer Data Verizon, Verizon Affiliates and their respective agents, may use, process and/or transfer Customer Data (including intra-group transfers and transfers to entities in countries that do not provide statutory protections for personal information) as set forth in the Privacy Policy and as necessary: (a) in connection with provisioning of Services; (b) to incorporate Customer Data into databases controlled by Verizon, Verizon Affiliates or their respective agents for the purpose of providing Services; administration; provisioning; invoicing and reconciliation; verification of Customer identity, solvency and creditworthiness; maintenance, support and product development; fraud detection and prevention; sales, revenue and customer analysis and reporting; market and customer use analysis including in the manner described in the Privacy Policy; and (c) to communicate to Customer regarding Services.

  • Sharing of Participant Information 20 7.4 REPORTING AND DISCLOSURE AND COMMUNICATIONS TO PARTICIPANTS..................................................20 7.5 NON-TERMINATION OF EMPLOYMENT; NO THIRD-PARTY BENEFICIARIES.................................................20 7.6

  • Use of Software Any software that is available on the Services ("Software") is the copyrighted work of Red Hat and/or its licensors. Copying or reproducing the Software to any other server or location for further reproduction or redistribution is strictly prohibited, unless such reproduction or redistribution is permitted by a license agreement accompanying such Software. You may not create derivative works of the Software, or attempt to decompile or reverse-engineer the Software unless otherwise permitted by law. Use of the Software is subject to the license terms of any license agreement that may accompany or is provided with the Software. You may not download any Software until you have read and accepted the terms of the accompanying software license. WITHOUT LIMITING THE FOREGOING, THE SOFTWARE IS WARRANTED, IF AT ALL, ONLY ACCORDING TO THE TERMS OF THE SEPARATE LICENSE AGREEMENT ACCOMPANYING THE SOFTWARE. EXCEPT AS WARRANTED IN SUCH LICENSE AGREEMENT, RED HAT, ITS PARENT, SUBSIDIARY, AND AFFILIATE COMPANIES, AND ITS LICENSORS DISCLAIM ALL WARRANTIES AND CONDITIONS WITH REGARD TO THE SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT, TO THE MAXIMUM EXTENT PERMITTED BY LAW.

  • Company Creation and Use of Confidential Information The Executive understands and acknowledges that the Company has invested, and continues to invest, substantial time, money and specialized knowledge into developing its resources, creating a customer base, generating customer and potential customer lists, training its employees, and improving its product offerings in the field of financial services. The Executive understands and acknowledges that as a result of these efforts, the Company has created, and continues to use and create Confidential Information. This Confidential Information provides the Company with a competitive advantage over others in the marketplace.

  • Use of Service Areas The service areas, as located within the Project, shall be ear- marked for purposes such as parking spaces and services including but not limited to electric sub-station, transformer, DG set rooms, underground water tanks, Pump rooms, maintenance and service rooms, firefighting pumps and equipment etc. and other permitted uses as per sanctioned plans. The Allottee shall not be permitted to use the services areas in any manner whatsoever, other than those earmarked as parking spaces and the same shall be reserved for use by the Association for rendering maintenance services.

  • Consent to Use of Data You grant NCR Voyix a perpetual, non-exclusive, irrevocable, sub-licensable, transferrable license to use the data transmitted through the Platform: (a) to provide the NCR Voyix Product and the Platform as well as related products, software, materials and services under this Agreement or another agreement between you and NCR Voyix; (b) for product and service enhancements, as well as research and development purposes; and (c) after it has been aggregated, for analytics, commercial and benchmarking purposes.

  • Use of Vehicles Use or authorize the Vehicles to be used in any manner (i) that would make such Vehicles that are Program Vehicles ineligible for repurchase or sale under the applicable Eligible Vehicle Disposition Program, (ii) for any illegal purposes or (iii) that could subject the Vehicles to confiscation.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!