Solution Integrity Sample Clauses

Solution Integrity. Registered user agrees not to: (i) use any device, software or technique to interfere with or attempt to interfere with the proper working of the Solution; (ii) post or send to the Solution anything that contains a virus, bug, cancelbot, worm, Trojan Horse or other harmful item; (iii) take any action which imposes an unreasonable or disproportionately large load on the Solution such that other users are adversely affected; or (iv) use any device or technology to provide repeated automated attempts to access password-protected portions of the Solution for which Registered user does not have a valid password issued to registered user by Swissmeda. Registered user may not allow any third parties to use Registered user's password without Swissmeda's prior written consent. Registered user also understands that Swissmeda cannot and does not guarantee or warrant that files or non-Swissmeda software of any kind, or from any source, available for downloading through the Solution, will be free of infection or viruses, worms, Trojan Horses or other code or defects that manifest contaminating or destructive properties. Registered user acknowledges that Swissmeda has the right, but no obligation, to take such actions related to use of the Solution (including but not limited to removing content or denying routing of certain data) if Swissmeda reasonably believes that such actions are needed to comply with the law.
AutoNDA by SimpleDocs

Related to Solution Integrity

  • Program Integrity The state must have processes in place to ensure that there is no duplication of federal funding for any aspect of the demonstration.

  • Data Integrity Contractor shall implement policies and procedures reasonably intended to ensure that Protected Health Information and Personally Identifiable Information in its possession is complete, accurate, and current, to the extent necessary for the Contractor’s intended purposes, and has not been altered or destroyed in an unauthorized manner.

  • Data Integrity Control Personal Data will remain intact, complete and current during processing activities.

  • Integrity 2.1 Transmission control ☒ VPN connections ☒ The use of private storage media is prohibited ☒ Special protection when physically transporting data media

  • Troubleshooting Please contact our tech support 24/7 for service issues at 0 (000) 000-0000 relating to internet and telephone.

  • Configuration Management The Contractor shall maintain a configuration management program, which shall provide for the administrative and functional systems necessary for configuration identification, control, status accounting and reporting, to ensure configuration identity with the UCEU and associated cables produced by the Contractor. The Contractor shall maintain a Contractor approved Configuration Management Plan that complies with ANSI/EIA-649 2011. Notwithstanding ANSI/EIA-649 2011, the Contractor’s configuration management program shall comply with the VLS Configuration Management Plans, TL130-AD-PLN-010-VLS, and shall comply with the following:

  • Information Integrity and Security Contractor shall immediately notify County of any known or suspected breach of personal, sensitive and confidential information related to Contractor’s work under this Agreement.

  • Industry Troubleshooter Where a difference arises between the parties relating to the dismissal, discipline, or suspension of an employee, or to the interpretation, application, operation, or alleged violation of this Agreement, including any question as to whether a matter is arbitrable, during the term of the Collective Agreement, Xxxxx XxXxxxxxxx, Xxxx Xxxxxx, Xxxxx Xxxxxxxx, or a substitute agreed to by the parties, shall at the request of either party:

  • Traceability 11.1 Under the terms of this Agreement, Supplier shall have and operate a process to ensure that all Products, sub-assemblies and the components contained therein supplied to the Buyer are completely Traceable back to manufacturer by batch or lot or date code.

  • Analytics 1.1. IFS may track and analyze the usage of the IFS Offering for purposes of determining usage made of the IFS Offering, for the purposes of security, to assist customers, and for improving the Software and Services and the user experience in using such Software and Services. For example, IFS may use this information to help customers derive more value from the Software and Services, to understand and analyze trends, or to track which features are used most often in order to improve the Software and Services. IFS may share anonymous usage data with its service providers for the purpose of helping in such tracking, analysis and improvements. Additionally, IFS may share such anonymous usage data on an aggregate basis in the normal course of operating their business; for example, IFS may share information publicly to show trends about the general use of its software and services. TERMS - SERVICES

Time is Money Join Law Insider Premium to draft better contracts faster.