Scanning Data Sample Clauses

Scanning Data. Subject to the terms and conditions of this Agreement, Trend Micro Products may operate by forwarding certain data (“Scanning Data”) to Trend Micro owned or controlled servers for scanning. These servers employ proprietary technology to identify and then screen malicious or potentially unwanted content based on user-proscribed parameters. By using any Trend Micro Products and by accepting this Agreement MSP Reseller represents and warrants that MSP Reseller: (i) is legally permitted and authorized to access, and to provide Trend Micro with access to, the Scanning Data and agree to provide Trend Micro with evidence of such authorization upon request; (ii) authorizes Trend Micro to act as MSP Reseller and has the authority to appoint Trend Micro as MSP End Customer’s data processing agent and at their discretion when performing Trend Micro Software-Based Services; (iii) undertakes to inform the source of the Scanning Data, to the extent required by local law, of the scope and purpose of Trend Micro Software-Based Services, which may entail the transfer of Scanning Data to servers located outside of the jurisdiction where MSP Reseller or MSP End Customer are located; (iv) is responsible for deciding if and how MSP Reseller and/or MSP End Customer use Trend Micro Software-Based Services; and (v) will, together with MSP End Customer, otherwise use the Trend Micro Software-Based Services only in a legal manner. In the event of any breach of the representation and warranty set forth herein. Trend Micro may, without prior notice and without prejudice to its other rights, suspend the performance of Trend Micro Software-Based Services until MSP Reseller can show to Trend Micro's satisfaction that any such breach has been cured.
AutoNDA by SimpleDocs

Related to Scanning Data

  • Device Data We may share certain personal information and device-identifying technical data about you and your devices with third party service providers, who will compare and add device data and fraud data from and about you to a database of similar device and fraud information in order to provide fraud management and prevention services, which include but are not limited to identifying and blocking access to the applicable service or Web site by devices associated with fraudulent or abusive activity. Such information may be used by us and our third party service providers to provide similar fraud management and prevention services for services or Web sites not provided by us. We will not share with service providers any information that personally identifies the user of the applicable device.

  • Metering Data At Developer’s expense, the metered data shall be telemetered to one or more locations designated by Connecting Transmission Owner, Developer and NYISO. Such telemetered data shall be used, under normal operating conditions, as the official measurement of the amount of energy delivered from the Large Generating Facility to the Point of Interconnection.

  • Data To permit evaluation of requests under paragraph (c) of this clause based on unreasonable cost, the Contractor shall include the following information and any applicable supporting data based on the survey of suppliers: Foreign and Domestic Construction Materials Cost Comparison Construction material description Unit of measure Quantity Cost (dollars) * Item 1: Foreign construction material Domestic construction material Item 2 Foreign construction material Domestic construction material [List name, address, telephone number, and contact for suppliers surveyed. Attach copy of response; if oral, attach summary.] [Include other applicable supporting information.] (*Include all delivery costs to the construction site.]

  • Encounter Data Party shall provide encounter data to the Agency of Human Services and/or its departments and ensure further that the data and services provided can be linked to and supported by enrollee eligibility files maintained by the State.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • MOBILE DATA COMPUTERS 20 1. As part of the law enforcement services to be provided to CITY, COUNTY 21 has provided, or will provide, mobile data computers (hereinafter called 22 “MDCs”) that are or will be mounted in patrol vehicles and motorcycles, 23 designated by COUNTY for use within CITY limits.

  • Location Data Apple and its partners, licensees and third party developers may provide certain services through the Apple Software that rely upon location information. To provide and improve these services, where available, Apple and its partners, licensees and third party developers may transmit, collect, maintain, process and use your location data, including the real-time geographic location of your computer, and location search queries. The location data and queries collected by Apple are collected in a form that does not personally identify you and may be used by Apple and its partners, licensees and third party developers to provide and improve location-based products and services. By using any location-based services provided by or through the Apple Software, you agree and consent to Apple's and its partners', licensees' and third party developers’ transmission, collection, maintenance, processing and use of your location data and queries to provide and improve such products and services. You may withdraw this consent at any time by going to the Location Services setting in the Apple Software and either turning off the global Location Services setting or turning off the individual location setting of each location-aware application on your computer. The Location Services setting is found in the Security & Privacy pane within System Preferences. When using third party applications or services on your computer that use or provide location data, you are subject to and should review such third party's terms and privacy policy on use of location data by such third party applications or services.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • User Data In addition to any disclosures authorized by Section 24, You and Your Authorised Users consent and agree that the RIM Group of Companies may access, preserve, and disclose Your or Your Authorised Users' data, including personal information, contents of your communication or information about the use of Your BlackBerry Solution functionality and the services or software and hardware utilized in conjunction with Your BlackBerry Solution where available to RIM ("User Data"), to third parties, including foreign or domestic government entities, without providing notice to You or Your Authorized Users under the laws of countries where the RIM Group of Companies and its service providers, other partners and affiliates are located in order to: (i) comply with legal process or enforceable governmental request, or as otherwise required by law; (ii) cooperate with third parties in investigating acts in violation of this Agreement; or (iii) cooperate with system administrators at Internet service providers, networks or computing facilities in order to enforce this Agreement. You warrant that You have obtained all consents necessary under applicable law from Your Authorised Users to disclose User Data to the RIM Group of Companies and for the RIM Group of Companies to collect, use, process, transmit, and/or disclose such User Data as described above.

  • Invoice Data The Contractor shall report invoice data from each paid or remitted invoice within 30 calendar days after the end of the reporting quarter, including the invoice data on task orders issued through the GSA AAS Business System Portal. (Note: Whatever method the Contractor chooses (e.g., “each paid” or “remitted”) the Contractor must be consistent in their reporting method throughout the term of the OASIS Contract). If no Invoice Data was received during a required reporting period for a specific task order, the Contractor shall report in the “Zero Invoice Data” screen located in the CPRM system for that particular task order. Regardless of contract type, the Contractor shall report the following into the CPRM:

Time is Money Join Law Insider Premium to draft better contracts faster.