SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes. 11.2 We may (i) compile statistical and other information related to the performance, operation and use of the Services, and (ii) use data from the Services in aggregated form for security and operations management, to create statistical analyses, and for research and development purposes (clauses i and ii are collectively referred to as “Service Analyses”). We may make Service Analyses publicly available; however, Service Analyses will not incorporate Your Content, Personal Data or Confidential Information in a form that could serve to identify You or any individual. We retain all intellectual property rights in Service Analyses. 11.3 We may provide You with the ability to obtain certain Oracle Software (as defined below) for use with the Services. If we provide Oracle Software to You and do not specify separate terms for such software, then such Oracle Software is provided as part of the Services and You have the non-exclusive, worldwide, limited right to use such Oracle Software, subject to the terms of this Agreement and Your order (except for separately licensed elements of the Oracle Software, which separately licensed elements are governed by the applicable separate terms), solely to facilitate Your use of the Services. You may allow Your Users to use the Oracle Software for this purpose, and You are responsible for their compliance with the license terms. Your right to use any Oracle Software will terminate upon the earlier of our notice (by web posting or otherwise) or the end of the Services associated with the Oracle Software. Notwithstanding the foregoing, if Oracle Software is licensed to You under separate terms, then Your use of such software is governed by the separate terms. Your right to use any part of the Oracle Software that is licensed under the separate terms is not restricted in any way by this Agreement.
Third Party Service Providers Unless otherwise prohibited by Apple in the Documentation or this Agreement, You are permitted to employ or retain a third party (“Service Provider”) to assist You in using the Apple Software and Services provided pursuant to this Agreement, including, but not limited to, engaging any such Service Provider to maintain and administer Your Applications’ servers on Your behalf, provided that any such Service Provider’s use of the Apple Software and Services or any materials associated therewith is done solely on Your behalf and only in accordance with these terms. Notwithstanding the foregoing, You may not use a Service Provider to submit an Application to the App Store or use TestFlight on Your behalf. You agree to have a binding written agreement with Your Service Provider with terms at least as restrictive and protective of Apple as those set forth herein. Any actions undertaken by any such Service Provider in relation to Your Applications or use of the Apple Software or Apple Services and/or arising out of this Agreement shall be deemed to have been taken by You, and You (in addition to the Service Provider) shall be responsible to Apple for all such actions (or any inactions). In the event of any actions or inactions by the Service Provider that would constitute a violation of this Agreement or otherwise cause any harm, Apple reserves the right to require You to cease using such Service Provider.
Third Party Proprietary Data The Disclosing Party's Third Party Proprietary Data, if any, will be identified in a separate technical document.
Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.
Third Party Technology The Company makes use of third party technology to collect information required for traffic measurement, research, and analytics. Use of third party technology entails data collection. We therefore would like to inform clients the Company enables third parties to place or read cookies located on the browsers of users entering the Company’s domain. Said third parties may also use web beacons to collect information through advertising located on the Company’s web site. Please note that you may change your browser settings to refuse or disable Local Shared Objects and similar technologies; however, by doing so you may be disabling some of the functionality of Company’s services.
Licensed Materials The materials that are the subject of this Agreement are set forth in Appendix A ("Licensed Materials").
Licensed Software Computer program(s) provided by Contractor in connection with the Deliverables, subject to Section 14 of this Contract.
The Service Provider upon receipt of a notice contemplated under clause 19.1 shall discontinue the supply of all services or goods under this Agreement, to the extent specified, and on the date specified in the notice.
Service Provided 2.1 AT&T OKLAHOMA will use the practices and procedures and the rules and regulations applicable to its provision of White Pages directories on a nondiscriminatory basis. AT&T OKLAHOMA will include in appropriate White Pages directories the primary alphabetical listings of all CLEC customers (other than non-published or non-list Customers) located within the local directory area. When CLEC provides its subscriber listing information to AT&T OKLAHOMA’s listings database, CLEC will receive for its End User, one primary listing in AT&T OKLAHOMA’s White Pages directory and a listing in AT&T OKLAHOMA’s directory assistance database. 2.2 CLEC will furnish to AT&T OKLAHOMA subscriber listing information pertaining to CLEC customers located within the AT&T OKLAHOMA local directory area, along with such additional information as AT&T OKLAHOMA may require to prepare and print the alphabetical listings of said directory. AT&T OKLAHOMA will accept listing information from CLEC according to the manual and mechanized listing methods, procedures and ordering instructions provided via the CLEC Online website. CLEC agrees to submit listing information via the mechanized process within six (6) months of the effective date of this Attachment, or upon CLEC reaching a volume of two hundred (200) listing updates per day, whichever comes first. Notwithstanding the foregoing, CLEC may continue to manually submit directory listing information for complex caption sets with two (2) or greater degrees of indent. CLEC will submit listing information within three (3) Business Days of installation, disconnection or other change in service (including change of non-listed or non-published status) affecting the Directory Assistance database or the directory listing of a CLEC retail end users. AT&T OKLAHOMA shall process CLEC orders for updates to subscriber listing information within three (3) Business Days of receipt. CLEC must submit all listing information intended for publication by the directory close date. Both parties will use commercially reasonable efforts to ensure the accuracy of the submission and processing of the listing updates. 2.3 AT&T OKLAHOMA will include the listing information for CLEC’s customers for Resale services in AT&T OKLAHOMA’s White Pages directory database in the same manner as it includes listing information for AT&T OKLAHOMA’s end user customers. 2.4 AT&T OKLAHOMA will provide, via the AT&T CLEC Online web site, the directory listing criteria, methods, procedures and ordering information to CLEC for White Pages listings and will provide changes to such criteria not later than thirty (30) days in advance of such changes becoming effective. This information will include, but not be limited to: 2.4.1 Business rules for standard White Pages listings (e.g., space restrictions, non-listed and non- published listings, abbreviated listings, secondary, additional and foreign listings); 2.4.2 Business rules for residential Enhanced White Pages (e.g., bold, indent, italics) listings available. 2.5 Publication schedules for the White Pages: CLEC can access via the AT&T CLEC Online website, the directory close dates for areas where CLEC is providing local service. AT&T OKLAHOMA will provide directory schedule updates, including the directory schedule for a new calendar year, not later than thirty
Proprietary Software Depending upon the products and services You elect to access through Electronic Access, You may be provided software owned by BNY Mellon or licensed to BNY Mellon by a BNY Mellon Supplier (“Proprietary Software”). You are granted a limited, non-exclusive, non-transferable license to install the Proprietary Software on Your authorized computer system (including mobile devices registered with BNY Mellon) and to use the Proprietary Software solely for Your own internal purposes in connection with Electronic Access and solely for the purposes for which it is provided to You. You and Your Users may make copies of the Proprietary Software for backup purposes only, provided all copyright and other proprietary information included in the original copy of the Proprietary Software are reproduced in or on such backup copies. You shall not reverse engineer, disassemble, decompile or attempt to determine the source code for, any Proprietary Software. Any attempt to circumvent or penetrate security of Electronic Access is strictly prohibited.