Risk of Unintended Access to Your Data Sample Clauses

Risk of Unintended Access to Your Data. The Xxxxx.xxx Sites service enables You to provide public access to Your data stored in Our online services. It is very important that You carefully follow the instructions in the user guide and review Your Xxxxx.xxx Sites settings (including but not limited to settings for sharing of objects and visibility of list views) before publishing a Xxxxx.xxx Site or enabling web services for a Xxxxx.xxx Site. If You publish a Xxxxx.xxx Site or enable web services for a Xxxxx.xxx Site with settings that You did not intend, You could cause Your confidential information stored in Our online services to be disclosed to unintended third parties or to the public.
AutoNDA by SimpleDocs
Risk of Unintended Access to Your Data. The platform enables you to provide public access to your data stored in our online databases. It is very important that you carefully follow the instructions in the documentation and review your platform settings (including but not limited to settings for sharing of content, records, objects and visibility of list views) before publishing a site or enabling access to anyone to your data on the platform. If you publish a site or enable access to your data with settings that you did not intend, you could cause your confidential information stored in our online databases on the platform to be disclosed to unintended third parties or to the public. HSPL is not responsible to you for unauthorized access to your data or the unauthorized use of the services unless the unauthorized access or use results from HSPL's failure to meet its security obligations stated in the agreement. You are responsible for the use of the services by any employee of yours, any individual you authorize to use the services, any individual to whom you have given access to the Services, your linked users and any individual who gains access to your data or the services as a result of your failure to use reasonable security precautions, even if such use was not authorized by you.
Risk of Unintended Access to Your Data. The Developer Services enables You to provide public access to Your data stored in Our Online Services. It is very important that You carefully follow the instructions in the user guide and review Your Developer Services settings before deploying an Application or enabling Non­WorkXpress Applications for an Application. If You deploy an Application or enable Non­WorkXpress Applications for an Application with settings that You did not intend, You could cause Your confidential information stored in Our Online Services to be disclosed to unintended third parties or to the public.

Related to Risk of Unintended Access to Your Data

  • Customer Information CPNI of a Customer and any other non-public, individually identifiable information about a Customer or the purchase by a Customer of the services or products of a Party.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • Line Information Database (LIDB 9.1 BellSouth will store in its Line Information Database (LIDB) records relating to service only in the BellSouth region. The LIDB Storage Agreement is included in this Attachment as Exhibit B.

  • Line Information Database 9.1 LIDB is a transaction-oriented database accessible through Common Channel Signaling (CCS) networks. For access to LIDB, e-Tel must purchase appropriate signaling links pursuant to Section 10 of this Attachment. LIDB contains records associated with End User Line Numbers and Special Billing Numbers. LIDB accepts queries from other Network Elements and provides appropriate responses. The query originator need not be the owner of LIDB data. LIDB queries include functions such as screening billed numbers that provides the ability to accept Collect or Third Number Billing calls and validation of Telephone Line Number based non-proprietary calling cards. The interface for the LIDB functionality is the interface between BellSouth’s CCS network and other CCS networks. LIDB also interfaces to administrative systems.

  • The Web Services E-Verify Employer Agent agrees to, consistent with applicable laws, regulations, and policies, commit sufficient personnel and resources to meet the requirements of this MOU.

  • Your Data Subject to the limited rights granted by You hereunder, We acquire no right, title or interest from You or Your licensors under this Agreement in or to Your Data, including any intellectual property rights therein.

  • Customer Data 5.1 The Customer shall own all right, title and interest in and to all of the Customer Data and shall have sole responsibility for the legality, reliability, integrity, accuracy and quality of the Customer Data.

  • Access to Customer Data You agree that we may, for the purposes of providing Maintenance and Customer Support and/or for the purpose of otherwise protecting the integrity of the Software, access and/or download your Customer Data on a limited basis.

  • DISCLOSURE OF TBS ACCESS CODE TO THIRD PARTY (a) The Account Holder must exercise all care to ensure that the TBS Access Code is not disclosed to any person and shall take all steps to prevent forgery or fraud in connection with the use of his TBS Access Code and/or the operation of the TBS. If the TBS Access Code is disclosed to any person, the Account Holder must forthwith give the Bank written notice thereof, thereupon the Account Holder shall immediately cease to use the TBS Access Code.

  • Links to Third Party Websites In your use of the Service and/or the Company’s website, you may encounter various types of links that enable you to visit websites operated or owned by third parties (“Third Party Site”). These links are provided to you as a convenience and are not under the control or ownership of the Company. The inclusion of any link to a Third Party Site is not (i) an endorsement by the Company of the Third Party Site, (ii) an acknowledgement of any affiliation with its operators or owners, or (iii) a warranty of any type regarding any information or offer on the Third Party Site. Your use of any Third Party Site is governed by the various legal agreements and policies posted at that website.

Time is Money Join Law Insider Premium to draft better contracts faster.