Partner Use of Data Sample Clauses

Partner Use of Data. You acknowledge and agree that if You place an Order for Partner Products UiPath will share Your information with the Partner, in accordance with this Agreement and the applicable laws. Partner may use the data You make available by using Partner Products, including by transmitting, transferring, modifying, or deleting such data, or storing such data on Partner or third-party systems. Any Partner’s use of accessed data (whether data in the UiPath Products or separately collected from You or Your device) is subject to the applicable Partner Product Terms, any agreement between UiPath and Partner made available upon Your request. UiPath is not responsible for any access, use, transfer or security of data or information by Partners or by Partner Products, or for the security or privacy practices of any third-party Partner, Partner Product, or their processors. You are solely responsible for Your decision to permit any Partner or Partner Product to access or use data to which You have granted access through use of the Partner Product or otherwise. It is Your responsibility to carefully review the Partner Product Terms, as provided by the applicable Partner.
AutoNDA by SimpleDocs

Related to Partner Use of Data

  • Use of Data (a) In connection with the provision of the services and the discharge of its other obligations under this Agreement, State Street (which term for purposes of this Section XXIX includes each of its parent company, branches and affiliates (''Affiliates")) may collect and store information regarding a Trust and share such information with its Affiliates, agents and service providers in order and to the extent reasonably necessary (i) to carry out the provision of services contemplated under this Agreement and other agreements between the Trusts and State Street or any of its Affiliates and (ii) to carry out management of its businesses, including, but not limited to, financial and operational management and reporting, risk management, legal and regulatory compliance and client service management.

  • Use of Data by User Registry Operator will permit user to use the zone file for lawful purposes; provided that (a) user takes all reasonable steps to protect against unauthorized access to and use and disclosure of the data and (b) under no circumstances will Registry Operator be required or permitted to allow user to use the data to, (i) allow, enable, or otherwise support the transmission by email, telephone, or facsimile of mass unsolicited, commercial advertising or solicitations to entities other than user’s own existing customers, or (ii) enable high volume, automated, electronic processes that send queries or data to the systems of Registry Operator or any ICANN-­‐accredited registrar.

  • Consent to Use of Data You agree that the Licensor may collect and use technical data and related information, including but not limited to technical information about your device, system and application software, and peripherals, that is gathered periodically to facilitate the provision of software updates, product support and other services (if any) related to the Software. The Licensor may use this information, as long as it is in a form that does not personally identify you, to improve its products or to provide services or technologies.

  • Use of Software Any software that is available on the Services ("Software") is the copyrighted work of Red Hat and/or its licensors. Copying or reproducing the Software to any other server or location for further reproduction or redistribution is strictly prohibited, unless such reproduction or redistribution is permitted by a license agreement accompanying such Software. You may not create derivative works of the Software, or attempt to decompile or reverse-engineer the Software unless otherwise permitted by law. Use of the Software is subject to the license terms of any license agreement that may accompany or is provided with the Software. You may not download any Software until you have read and accepted the terms of the accompanying software license. WITHOUT LIMITING THE FOREGOING, THE SOFTWARE IS WARRANTED, IF AT ALL, ONLY ACCORDING TO THE TERMS OF THE SEPARATE LICENSE AGREEMENT ACCOMPANYING THE SOFTWARE. EXCEPT AS WARRANTED IN SUCH LICENSE AGREEMENT, RED HAT, ITS PARENT, SUBSIDIARY, AND AFFILIATE COMPANIES, AND ITS LICENSORS DISCLAIM ALL WARRANTIES AND CONDITIONS WITH REGARD TO THE SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT, TO THE MAXIMUM EXTENT PERMITTED BY LAW.

  • Use of Content The content on the App is provided to you “as is” for your personal use only and may not be used, copied, distributed, transmitted, broadcast, displayed, sold, licensed, de-compiled, or otherwise exploited for any other purposes whatsoever without our prior written consent. If you download or print a copy of the content you must retain all copyright and other proprietary notices contained therein.

  • Use of Customer Data Verizon, Verizon Affiliates and their respective agents, may use, process and/or transfer Customer Data (including intra-group transfers and transfers to entities in countries that do not provide statutory protections for personal information) as set forth in the Privacy Policy and as necessary:

  • Use of Technology Participants are subject to all existing laws (federal and state) and University regulations and policies on use of technology, including not only those laws and regulations that are specific to computers and networks, but also those that may apply generally to personal conduct such as:  UC Electronic Communications Policy: xxxx://xxxxxx.xxxx.xxx/doc/7000470/ElectronicCommunications  UCLA E-mail Policy and Guidelines: xxxx://xxx.xxxxxxxxxxxxx.xxxx.xxx/app/Default.aspx?&id=455  IT Services Acceptable Use Policy: xxxx://xxx.xxx.xxxx.xxx/policies/aupdetail.html  The UC Policy on Copyright Ownership: xxxx://xxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx.xxx/resources/copyright-ownership.html  Bruin OnLine Service Level Agreement: xxxx://xxx.xxx.xxxx.xxx/policies/BOL_SLA.pdf Any violation may result in technology related privileges being restricted or revoked and may also result in The University undertaking disciplinary or civil action. If the violation constitutes a criminal offense, appropriate legal action may be taken.

  • USE OF WORK PRODUCTS 2.13.1 The City may use all Documents that Contractor prepares or obtains under this Agreement. In addition, Contractor shall provide the Director with supporting schedules, flow charts or other analysis necessary to understand the reported findings and recommendations. Generally, this information is attached as exhibits to the final report; however, if requested by the Director, Contractor shall provide this information from its work paper files.

  • Source of Data A description of (1) the process used to identify Paid Claims in the Population and (2) the specific documentation relied upon by the IRO when performing the Claims Review (e.g., medical records, physician orders, certificates of medical necessity, requisition forms, local medical review policies (including title and policy number), CMS program memoranda (including title and issuance number), Medicare carrier or intermediary manual or bulletins (including issue and date), other policies, regulations, or directives).‌‌‌

  • Use of Site 4.13.1 The Contractor shall confine operations at the site to areas permitted by law, including areas designated for operations or prohibited from operations by any applicable permit and or regulation, ordinances, permits and the Contract Documents and shall not unreasonably encumber the site with any materials or equipment.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!