Service Subject to Interception and Unauthorized Use Sample Clauses

Service Subject to Interception and Unauthorized Use. Student and Customer acknowledge that communications over the Optimum WiFi Network may be subject to interception by unauthorized third parties. Although Altice uses commercially reasonable efforts to provide Student and Customer with a secure and reliable service, use of Student WiFi is AS IS and AS AVAILABLE and does not make any general or specific warranties regarding the security, availability, performance or other functionality of Student WiFi. Student and Customer are responsible for implementing security protections while using Student WiFi. In the event Student and Customer become aware of any unauthorized use of Student WiFi or any other security breach, Student and Customer agree to immediately notify us. Altice expressly disclaims any responsibility or liability for your use of Student WiFi and for any lack of security that may result from the use of Student WiFi. Student and Customer agree to hold Altice harmless for the loss of any file, data or other information while using Student WiFi, and for any unauthorized access to or utilization by any third party of any of your personal, financial, or other sensitive information. Student and Customer understand and agree that the Optimum WiFi “watermark” bearing its logo may appear superimposed from time to time over portions of website pages Student and Customer visit, that the watermark is intended solely to identify Optimum WiFi as the source of your wireless Internet access service, and that this in no way indicates Altice's approval of or responsibility for the content of such websites, which are solely the responsibility of the website operators and/or content providers. Student and Customer further agree that Student and Customer will not seek to hold Altice responsible in any way for any third party website content or the operation of any third party website accessed via Student WiFi, or for the appearance of the Optimum WiFi "watermark" over a portion of any website.
AutoNDA by SimpleDocs

Related to Service Subject to Interception and Unauthorized Use

  • Liability for Unauthorized Use If any Card is lost or stolen or otherwise may be used without your permission (express or implied), you must immediately notify us orally or in writing at the following phone number or address: 0-000-000-0000 or at TIB, National Association, P.O Box 569120, Dallas, Texas 75356-9120. If unauthorized use of a Card occurs before you notify us of the loss, theft or unauthorized use, you may be liable up to a maximum amount of $50. If unauthorized use of a Credit Device occurs, you may be liable for all of the unauthorized use.

  • Reliance on Third Party Service Providers Each Party may allow Reporting Financial Institutions to use third party service providers to fulfill the obligations imposed on such Reporting Financial Institutions by a Party, as contemplated in this Agreement, but these obligations shall remain the responsibility of the Reporting Financial Institutions.

  • Accessibility of Information Technology Contractor represents and warrants that any software/ hardware/ communications system/ equipment (collectively “technology”), if any, provided under this Agreement adheres to the standards and/or specifications as may be set forth in the Section 508 of the Rehabilitation Act of 1973 standards guide and is fully compliant with WCAG 2.0 AA standards for accessibility and compliant with any applicable FCC regulations. Technology that will be used on a mobile device must also be navigable with Voiceover on iOS devices in addition to meeting WCAG 2.0 level AA. If portions of the technology or user experience are alleged to be non-compliant or non- accessible at any point, District will provide Contractor with notice of such allegation and Contractor shall use its best efforts to make the technology compliant and accessible. If a state or federal department, office or regulatory agency, or if any other third party administrative agency or organization (“Claimants”), make a claim, allegation, initiates legal or regulatory process, or if a court finds or otherwise determines that technology is non-compliant or non-accessible, Contractor shall indemnify, defend and hold harmless the District from and against any and all such claims, allegations, liabilities, damages, penalties, fees, costs (including but not limited to reasonable attorneys’ fees), arising out of or related to Xxxxxxxxx’ claims. Contractor shall also fully indemnify District for the full cost of any user accommodation that is found to be necessary due to an identifiable lack of accessibility in the Contractor’s technology. If necessary, an independent 3rd party accessibility firm using POUR standards (Perceivable, Operable, Understandable and Robust) may be used to validate the accessibility of the technology.

  • Performance of Services in Accordance with Regulatory Requirements; Furnishing of Books and Records In performing the services set forth in this Agreement, the Manager: A. shall conform with the 1940 Act and all rules and regulations thereunder, with all other applicable federal, state and foreign laws and regulations, with any applicable procedures adopted by the Trust’s Board of Trustees, and with the provisions of the Trust’s Registration Statement filed on Form N-1A as supplemented or amended from time to time; B. will make available to the Trust, promptly upon request, any of the Fund’s books and records as are maintained under this Agreement, and will furnish to regulatory authorities having the requisite authority any such books and records and any information or reports in connection with the Manager’s services under this Agreement that may be requested in order to ascertain whether the operations of the Trust are being conducted in a manner consistent with applicable laws and regulations.

  • INFORMATION OF THE PARTIES Information of the Company Information of the Lessees

  • Access to Information and Records During the period commencing thirty (30) days prior to the Closing Date, the Seller shall give Buyer, its counsel, accountants and other representatives (i) access during normal business hours to all of the properties, books, records, contracts and documents of the Seller for the purpose of such inspection, investigation and testing as Buyer deems appropriate (and the Seller shall furnish or cause to be furnished to Buyer and its representatives all information with respect to the business and affairs of the Seller as Buyer may request); (ii) access to employees, agents and representatives for the purposes of such meetings and communications as Buyer reasonably desires; and (iii) access to vendors, customers, manufacturers of its machinery and equipment, and others having business dealings with the Seller. Through the Closing Date, the Buyer and its Affiliates shall not disclose any Proprietary Information obtained pursuant to this paragraph to any third parties and until the Closing Date will not use any such Proprietary Information in the Buyer's business or any affiliated business without the prior written consent of the Seller and then only to the extent specified in that consent. Consent may be granted or withheld at the sole discretion of the Seller. The Buyer shall not contact any suppliers, customers, employees, affiliates or associates to circumvent the purposes of this provision. The Buyer shall take all steps reasonably necessary or appropriate to maintain the strict confidentiality of the Proprietary Information through the Closing Date.

  • Permitted Uses and Disclosures of Phi by Business Associate Except as otherwise indicated in this Agreement, Business Associate may use or disclose PHI, inclusive of de-identified data derived from such PHI, only to perform functions, activities or services specified in this Agreement on behalf of DHCS, provided that such use or disclosure would not violate HIPAA or other applicable laws if done by DHCS.

  • Information and Services Required of the Owner The Owner shall provide information with reasonable promptness, regarding requirements for and limitations on the Project, including a written program which shall set forth the Owner’s objectives, constraints, and criteria, including schedule, space requirements and relationships, flexibility and expandability, special equipment, systems, sustainability and site requirements.

  • Access to Personal Information by Subcontractors Supplier agrees to require any subcontractors or agents to which it discloses Personal Information under this Agreement or under any SOW to provide reasonable assurance, evidenced by written contract, that they will comply with the same or substantially similar confidentiality, privacy and security obligations with respect to such Personal Information as apply to Supplier under this Agreement or any SOW. Supplier shall confirm in writing to DXC that such contract is in place as a condition to DXC’s approval of use of a subcontractor in connection with any SOW. Upon request of DXC, Supplier will provide to DXC a copy of the subcontract or an extract of the relevant clauses. Supplier shall ensure that any failure on the part of any subcontractor or agent to comply with the Supplier obligations under this Agreement or any SOW shall be grounds to promptly terminate such subcontractor or agent. If during the term of this Agreement or any SOW, DXC determines, in its exclusive discretion, that any Supplier subcontractor or agent cannot comply with the Supplier obligations under this Agreement or with any SOW, then DXC may terminate this Agreement in whole or in part (with respect to any SOW for which such subcontractor or agent is providing services), if not cured by Supplier within the time prescribed in the notice of such deficiency.

  • LIABILITY FOR UNAUTHORIZED USE-LOST/STOLEN CARD NOTIFICATION You agree to notify Credit Union immediately, orally or in writing at Florida Credit Union, X.X. Xxx 0000, Xxxxxxxxxxx, XX 00000 or telephone (000) 000-0000 twenty four

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!