Protection Against Misuse of Data Sample Clauses

Protection Against Misuse of Data. The Software contains a function that prevents loss or misuse of critical data in direct connection with theft of a computer. This function is switched off under the default settings of the Software and an ESET account under special Terms of Usage needs to be created for it to be activated, through which the function activates data collection in the event of computer theft. If you activate this function of the Software, you agree to data about the stolen computer being sent to the Provider, which can include data about the computer’s network location, data about the configuration of the computer, data recorded by a camera connected to the computer or failed attempts to unlock computer (hereinafter referred to as “Data”). The End User shall be entitled to use Data obtained in this way exclusively for rectifying an adverse situation caused by theft of a computer and also grants the Provider the necessary approval, as specified under the relevant legal regulations, for processing Data. The Provider shall allow End User to store the Data on its technical equipment for the period required to achieve the purpose for which the data was obtained. You can deactivate this function at any time. Protection against misuse of data shall be used exclusively with computers and accounts End User have legitimate access to. Any illegal use will be reported to competent authority. Provider will comply with relevant laws and assist law enforcement authorities in case of the misuse. You agree and acknowledge that You are responsible for safeguarding the password to access ESET account and you agree that You shall not disclose your password to any third party. End User is responsible for any activity using Protection Against Misuse of Data function and ESET account, authorized or not. If ESET account is compromised, notify Provider immediately.

Related to Protection Against Misuse of Data

  • Protection Against Dilution If the Corporation, with respect to the Common Stock, (1) pays a dividend or makes a distribution on shares of Common Stock that is paid in shares of Common Stock or in securities convertible into or exchangeable for Common Stock (in which latter event the number of shares of Common Stock initially issuable upon the conversion or exchange of such securities shall be deemed to have been distributed), (2) subdivides outstanding shares of Common Stock, (3) combines outstanding shares of Common Stock into a smaller number of shares, or (4) issues by reclassification of Common Stock any shares of capital stock of the Corporation, the number of shares as to which this Warrant is exercisable as of the date of such event and the Exercise Price in effect immediately prior thereto shall be adjusted so that each Holder thereafter shall be entitled to receive the number and kind of shares of Common Stock or other capital stock of the Corporation that it would have owned or been entitled to receive in respect of this Warrant immediately after the happening of any of the events described above had this Warrant been converted immediately prior to the happening of that event; provided that the aggregate purchase price payable for the total numbers of shares of Common Stock purchasable under this Warrant shall remain the same. An adjustment made in accordance with this section shall become effective immediately after the record date, in the case of a dividend, and shall become effective immediately after the effective date, in the case of a subdivision, combination, or reclassification. If, as a result of an adjustment made in accordance with this Section 4, the Holder becomes entitled to receive shares of two or more classes of capital stock or shares of Common Stock and other capital stock of the Corporation, the board of directors (whose determination shall be conclusive) shall determine the allocation of the adjusted Exercise Rate between or among shares of such classes of capital stock or shares of Common Stock and other capital stock.

  • Protection of Data The Contractor agrees to store Data on one or more of the following media and protect the Data as described: a. Hard disk drives. For Data stored on local workstation hard disks, access to the Data will be restricted to Authorized User(s) by requiring logon to the local workstation using a Unique User ID and Hardened Password or other authentication mechanisms which provide equal or greater security, such as biometrics or smart cards. b. Network server disks. For Data stored on hard disks mounted on network servers and made available through shared folders, access to the Data will be restricted to Authorized Users through the use of access control lists which will grant access only after the Authorized User has authenticated to the network using a Unique User ID and Hardened Password or other authentication mechanisms which provide equal or greater security, such as biometrics or smart cards. Data on disks mounted to such servers must be located in an area which is accessible only to authorized personnel, with access controlled through use of a key, card key, combination lock, or comparable mechanism. For DSHS Confidential Information stored on these disks, deleting unneeded Data is sufficient as long as the disks remain in a Secure Area and otherwise meet the requirements listed in the above paragraph. Destruction of the Data, as outlined below in Section 8 Data Disposition, may be deferred until the disks are retired, replaced, or otherwise taken out of the Secure Area. c. Optical discs (CDs or DVDs) in local workstation optical disc drives. Data provided by DSHS on optical discs which will be used in local workstation optical disc drives and which will not be transported out of a Secure Area. When not in use for the contracted purpose, such discs must be Stored in a Secure Area. Workstations which access DSHS Data on optical discs must be located in an area which is accessible only to authorized personnel, with access controlled through use of a key, card key, combination lock, or comparable mechanism. d. Optical discs (CDs or DVDs) in drives or jukeboxes attached to servers. Data provided by DSHS on optical discs which will be attached to network servers and which will not be transported out of a Secure Area. Access to Data on these discs will be restricted to Authorized Users through the use of access control lists which will grant access only after the Authorized User has authenticated to the network using a Unique User ID and Hardened Password or other authentication mechanisms which provide equal or greater security, such as biometrics or smart cards. Data on discs attached to such servers must be located in an area which is accessible only to authorized personnel, with access controlled through use of a key, card key, combination lock, or comparable mechanism.

  • Protections Against Violations of Agreement No purported sale, assignment, mortgage, hypothecation, transfer, pledge, encumbrance, gift, transfer in trust (voting or other) or other disposition of, or creation of a security interest in or lien on, any of the Restricted Stock Units by any holder thereof in violation of the provisions of this Agreement or the Certificate of Incorporation or the Bylaws of the Company, will be valid, and the Company will not transfer any shares resulting from the settlement of Restricted Stock Units on its books nor will any of such shares be entitled to vote, nor will any dividends be paid thereon, unless and until there has been full compliance with such provisions to the satisfaction of the Company. The foregoing restrictions are in addition to and not in lieu of any other remedies, legal or equitable, available to enforce such provisions.

  • Use of Data (a) In connection with the provision of the services and the discharge of its other obligations under this Agreement, State Street (which term for purposes of this Section XXIX includes each of its parent company, branches and affiliates (''Affiliates")) may collect and store information regarding a Trust and share such information with its Affiliates, agents and service providers in order and to the extent reasonably necessary (i) to carry out the provision of services contemplated under this Agreement and other agreements between the Trusts and State Street or any of its Affiliates and (ii) to carry out management of its businesses, including, but not limited to, financial and operational management and reporting, risk management, legal and regulatory compliance and client service management.

  • Prohibition Against Recording Except as provided in Section 29.4 of this Lease, neither this Lease, nor any memorandum, affidavit or other writing with respect thereto, shall be recorded by Tenant or by anyone acting through, under or on behalf of Tenant.

  • SAFEGUARD AGAINST FRAUD 11.1 The Supplier shall take all reasonable steps, in accordance with Good Industry Practice, to prevent any fraudulent activity (including Fraud) by the Supplier and the Supplier’s Staff (which for the purposes of this Clause 11 (Safeguard Against Fraud) shall include its shareholders holding in excess of the fifty (50) percent of the entire issued share capital of the Supplier and directors). 11.2 The Supplier shall notify the Authority immediately if it has reason to suspect that any Fraud has occurred, is occurring or is likely to occur save where complying with this provision would cause the Supplier or its employees to commit an offence under the Proceeds of Crime Act 2002 or the Terrorism Act 2000. 11.3 If the Supplier or the Supplier’s Staff commits Fraud in relation to this Framework Agreement, a Call-Off Contract or any other contract with the Crown (including the Authority), the Authority may: 11.3.1 terminate this Framework Agreement with immediate effect by giving the Supplier notice in writing, and recover from the Supplier the amount of any loss suffered by the Authority resulting from such termination, including the cost reasonably incurred by the Authority of making other arrangements for the supply of the Services and any additional expenditure incurred by the Authority throughout the remainder of the Term; or 11.3.2 recover in full from the Supplier and the Supplier shall on demand indemnify in full and hold the Authority harmless from and against any other loss sustained by the Authority in consequence of any breach of this Clause 11 (Safeguard Against Fraud).

  • Protection of Customer Data The Supplier shall not delete or remove any proprietary notices contained within or relating to the Customer Data. The Supplier shall not store, copy, disclose, or use the Customer Data except as necessary for the performance by the Supplier of its obligations under this Call Off Contract or as otherwise Approved by the Customer. To the extent that the Customer Data is held and/or Processed by the Supplier, the Supplier shall supply that Customer Data to the Customer as requested by the Customer and in the format (if any) specified by the Customer in the Call Off Order Form and, in any event, as specified by the Customer from time to time in writing. The Supplier shall take responsibility for preserving the integrity of Customer Data and preventing the corruption or loss of Customer Data. The Supplier shall perform secure back-ups of all Customer Data and shall ensure that up-to-date back-ups are stored off-site at an Approved location in accordance with any BCDR Plan or otherwise. The Supplier shall ensure that such back-ups are available to the Customer (or to such other person as the Customer may direct) at all times upon request and are delivered to the Customer at no less than six (6) Monthly intervals (or such other intervals as may be agreed in writing between the Parties). The Supplier shall ensure that any system on which the Supplier holds any Customer Data, including back-up data, is a secure system that complies with the Security Policy and the Security Management Plan (if any). If at any time the Supplier suspects or has reason to believe that the Customer Data is corrupted, lost or sufficiently degraded in any way for any reason, then the Supplier shall notify the Customer immediately and inform the Customer of the remedial action the Supplier proposes to take. If the Customer Data is corrupted, lost or sufficiently degraded as a result of a Default so as to be unusable, the Supplier may: require the Supplier (at the Supplier's expense) to restore or procure the restoration of Customer Data to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer, and the Supplier shall do so as soon as practicable but not later than five (5) Working Days from the date of receipt of the Customer’s notice; and/or itself restore or procure the restoration of Customer Data, and shall be repaid by the Supplier any reasonable expenses incurred in doing so to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer.

  • Claims Against Third Parties The Licensee shall, as soon as it becomes aware, give DACS in writing full particulars of any infringements or violations of any of DACS’ / the Artist’s rights in the Work.

  • Source of Data A description of (1) the process used to identify claims in the Population, and (2) the specific documentation relied upon by the IRO when performing the Quarterly Claims Review (e.g., medical records, physician orders, certificates of medical necessity, requisition forms, local medical review policies (including title and policy number), CMS program memoranda (including title and issuance number), Medicare contractor manual or bulletins (including issue and date), other policies, regulations, or directives).‌‌‌

  • Complaints Against Teachers Communication between the Community and the School ideally should be such that most complaints may be resolved through personal conferences at the School level. Various avenues of contact between teacher, pupil, parent, principal and other appropriate staff personnel should be pursued before using the formal procedures outlined below. The following process shall not be used when allegations involve legal or criminal violations or allegations of misconduct towards a student, such as abuse or discrimination. Such allegations shall be investigated in accordance with board policy and in conjunction with the authorities, consistent with principles of due process. 1. The Complainant shall be given a copy of this Part II, Section J and be told that there are contractual requirements for the District to follow. 2. If such conferences do not lead to understanding and resolution of problems involved, a parent may pursue further action by submitting a complaint against a teacher, which must be submitted in writing to the principal of the school. The principal shall give a copy to the teacher. Likewise, the teacher may request in writing to the principal that such a written complaint must be filed or the matter shall be considered closed. The principal shall give a copy to the parent. 3. After a written complaint is filed, if requested by the complainant or the teacher, a meeting involving the teacher, the principal, and the complainant will be arranged as soon as possible to discuss the complaint. 4. If it is not resolved at that level to the satisfaction of the Complainant, the Complainant may appeal to the Superintendent. 5. If it is still unresolved to the satisfaction of the Complainant, the Complainant may appeal to the Board of Education.