Security of Mobile Value-added Service Sample Clauses

Security of Mobile Value-added Service. 6.1 Party B shall observe the State laws, regulations and policies concerning telecommunication and Internet contents, ensure that the content of its information services is not in violation of relevant State laws, regulations and policies, and not send through Party A’s system such illegal information listed in the “Information Security Guarantee Letter “ . Party B’s violation of the preceding sentence shall be deemed as material breach of this
AutoNDA by SimpleDocs
Security of Mobile Value-added Service. 5.1 Party A shall have the right to conduct necessary testing and data statistics from time to time during the service operation period upon such services provided by Party B, and, in light of the testing results, to require Party B carry out rectification in accordance with Party A's mobile value-added service management procedures.
Security of Mobile Value-added Service. 6.1 Party B shall observe the State laws, regulations and policies concerning telecommunication and Internet content, ensure that the content of its information services is not in violation of relevant State laws, regulations and policies, and not send through Party A's system such illegal information listed in the "Information Security Guarantee Letter ." Party B's violation of the preceding sentence shall be deemed a material breach of this Agreement. If Party A's business operation suffers any losses due to Party B's violation hereof, Party B shall compensate Party A for its losses. If Party A suffers any negative impact due to Party B's violation hereof, Party B shall publicly acknowledge its liabilities thereto, and make public apology to Party A. 6.2 Party B shall be responsible to solve all disputes in connection with the security and legality of the information it provides. 6.3 Party B shall ensure that the services it provides have no existing or potential material hidden defect that will be exploited by individual Subscribers to cause damage to Party A's mobile telecom network, data service platform or the profit of other Subscribers.

Related to Security of Mobile Value-added Service

  • Value Added Services Any product or service provided by a third party unaffiliated with Servicer to assist Carrier in processing Card Transactions, including internet payment gateways, integrated Terminals, global distribution systems, inventory management and accounting tools, loyalty programs, fraud prevention programs, and any other product or service that participates, directly or indirectly, in the flow of Card Transaction data.

  • Contractor Security Clearance Customers may designate certain duties and/or positions as positions of “special trust” because they involve special trust responsibilities, are located in sensitive locations, or have key capabilities with access to sensitive or confidential information. The designation of a special trust position or duties is at the sole discretion of the Customer. Contractor or Contractor’s employees and Staff who, in the performance of this Contract, will be assigned to work in positions determined by the Customer to be positions of special trust, may be required to submit to background screening and be approved by the Customer to work on this Contract.

  • Procurement of Goods and Services (a) If the HSP is subject to the procurement provisions of the BPSAA, the HSP will abide by all directives and guidelines issued by the Management Board of Cabinet that are applicable to the HSP pursuant to the BPSAA. (b) If the HSP is not subject to the procurement provisions of the BPSAA, the HSP will have a procurement policy in place that requires the acquisition of supplies, equipment or services valued at over $25,000 through a competitive process that ensures the best value for funds expended. If the HSP acquires supplies, equipment or services with the Funding it will do so through a process that is consistent with this policy.

  • Procurement of Goods and Works Except as ADB may otherwise agree, Goods and Works shall only be procured on the basis of the methods of procurement set forth below:

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes. 11.2 We may (i) compile statistical and other information related to the performance, operation and use of the Services, and (ii) use data from the Services in aggregated form for security and operations management, to create statistical analyses, and for research and development purposes (clauses i and ii are collectively referred to as “Service Analyses”). We may make Service Analyses publicly available; however, Service Analyses will not incorporate Your Content, Personal Data or Confidential Information in a form that could serve to identify You or any individual. We retain all intellectual property rights in Service Analyses. 11.3 We may provide You with the ability to obtain certain Oracle Software (as defined below) for use with the Services. If we provide Oracle Software to You and do not specify separate terms for such software, then such Oracle Software is provided as part of the Services and You have the non-exclusive, worldwide, limited right to use such Oracle Software, subject to the terms of this Agreement and Your order (except for separately licensed elements of the Oracle Software, which separately licensed elements are governed by the applicable separate terms), solely to facilitate Your use of the Services. You may allow Your Users to use the Oracle Software for this purpose, and You are responsible for their compliance with the license terms. Your right to use any Oracle Software will terminate upon the earlier of our notice (by web posting or otherwise) or the end of the Services associated with the Oracle Software. Notwithstanding the foregoing, if Oracle Software is licensed to You under separate terms, then Your use of such software is governed by the separate terms. Your right to use any part of the Oracle Software that is licensed under the separate terms is not restricted in any way by this Agreement.

  • How to Obtain Warranty Service The Warranty Holder must inspect the Flooring for Manufacturing Defects caused by improper milling, grading, staining, and coating, and report any such defects to Cali Bamboo, prior to installation of the Flooring. To obtain warranty service, the Warranty Holder must contact Cali Bamboo’s Customer Experience Department: xxxxxxxxxxxxxxx@xxxxxxxxxx.xxx/ 000- 000-0000. Warranty claims must be received within 30 calendar days after the Warranty Holder identifies the Manufacturing Defect or other basis for a warranty claim. To be covered under this Cali Bamboo limited warranty, the Warranty Holder must provide documentation of sales order and proof that the Flooring was properly installed in accordance with the Installation Guide (defined below). Cali Bamboo reserves the right to retain a certified and independent National Wood Flooring Association inspector (“NWFA Inspector”) to verify the Warranty Holder’s warranty claims. The determination of the NWFA Inspector regarding the warranty claim is not binding on either Cali Bamboo or on the Warranty Holder. A determination that does not verify the warranty claim shall not affect the Warranty Holder’s right to submit its claim to arbitration in accordance with the terms of the Arbitration Agreement (as defined in Cali Bamboo’s Terms and Conditions of Purchase). The performance of the inspection, however, if requested by Xxxx Xxxxxx and assuming that Xxxx Xxxxxx advances the full cost of the inspection as described above, is a requirement for the Warranty Holder to submit a warranty claim to arbitration under the Arbitration Agreement. For specific instructions on how to obtain warranty service for defective Flooring, visit the Cali Bamboo website xxxxx://xxx.xxxxxxxxxx.xxx/flooring-warranty/. This limited warranty covers Flooring that is both (i) installed with strict adherence to Cali Bamboo’s Odyssey Engineered flooring installation guide found online at xxxxx://xxx.xxxxxxxxxx.xxx/flooring-installation/ (the “Installation Guide”) and

  • Particular Methods of Procurement of Goods and Works International Competitive Bidding. Goods and works shall be procured under contracts awarded on the basis of International Competitive Bidding.

  • Bill of Rights for Data Privacy and Security As required by Education Law Section 2-d, the Parents Bill of Rights for Data Privacy and Security and the supplemental information for the Service Agreement are included as Exhibit A and Exhibit B, respectively, and incorporated into this DPA. Contractor shall complete and sign Exhibit B and append it to this DPA. Pursuant to Education Law Section 2-d, the EA is required to post the completed Exhibit B on its website.

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • Other Methods of Procurement of Goods and Works The following table specifies the methods of procurement, other than International Competitive Bidding, which may be used for goods and works. The Procurement Plan shall specify the circumstances under which such methods may be used: (a) National Competitive Bidding (b) Shopping (c) Direct Contracting

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!