Subscription Access Customer Responsibilities and Restrictions Sample Clauses

Subscription Access Customer Responsibilities and Restrictions 
AutoNDA by SimpleDocs

Related to Subscription Access Customer Responsibilities and Restrictions

  • Customer Responsibilities Notwithstanding the above, Customer agrees that except as provided by this DPA, Customer is responsible for its secure use of the Services, including securing its account authentication credentials, protecting the security of Customer Data when in transit to and from the Services and taking any appropriate steps to securely encrypt or backup any Customer Data uploaded to the Services.

  • REMOTE ACCESS SERVICES ADDENDUM The Custodian and each Fund agree to be bound by the terms of the Remote Access Services Addendum hereto.

  • Requester and Approved User Responsibilities The Requester agrees through the submission of the DAR that the PI named has reviewed and understands the principles for responsible research use and data management of the genomic datasets as defined in the NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy. The Requester and Approved Users further acknowledge that they are responsible for ensuring that all uses of the data are consistent with national, tribal, and state laws and regulations, as appropriate, as well as relevant institutional policies and procedures for managing sensitive genomic and phenotypic data. The Requester certifies that the PI is in good standing (i.e., no known sanctions) with the institution, relevant funding agencies, and regulatory agencies and is eligible to conduct independent research (i.e., is not a postdoctoral fellow, student, or trainee). The Requester and any Approved Users may use the dataset(s) only in accordance with the parameters described on the study page and in the 1 If contractor services are to be utilized, PI requesting the data must provide a brief description of the services that the contractor will perform for the PI (e.g., data cleaning services) in the research use statement of the DAR. Additionally, the Key Personnel section of the DAR must include the name of the contractor’s employee(s) who will conduct the work. These requirements apply whether the contractor carries out the work at the PI’s facility or at the contractor’s facility. In addition, the PI is expected to include in any contract agreement requirements to ensure that any of the contractor’s employees who have access to the data adhere to the NIH GDS Policy, this Data Use Certification Agreement, and the NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy. Note that any scientific collaborators, including contractors, who are not at the Requester must submit their own DAR. Addendum to this Agreement for the appropriate research use, as well as any limitations on such use, of the dataset(s), as described in the DAR, and as required by law. Through the submission of this DAR, the Requester and Approved Users acknowledge receiving and reviewing a copy of the Addendum which includes Data Use Limitation(s) for each dataset requested. The Requester and Approved Users agree to comply with the terms listed in the Addendum. Through submission of the DAR, the PI and Requester agree to submit a Project Renewal or Project Close-out prior to the expiration date of the one (1) year data access period. The PI also agrees to submit an annual Progress Update prior to the one (1) year anniversary2 of the project, as described under Research Use Reporting (Term 10) below. By approving and submitting the attached DAR, the Institutional Signing Official provides assurance that relevant institutional policies and applicable local, state, tribal, and federal laws and regulations, as applicable, have been followed, including IRB approval, if required. Approved Users may be required to have IRB approval if they have access to personal identifying information for research participants in the original study at their institution, or through their collaborators. The Institutional Signing Official also assures, through the approval of the DAR, that other institutional departments with relevant authorities (e.g., those overseeing human subjects research, information technology, technology transfer) have reviewed the relevant sections of the NIH GDS Policy and the associated procedures and are in agreement with the principles defined. The Requester acknowledges that controlled-access datasets subject to the NIH GDS Policy may be updated to exclude or include additional information. Unless otherwise indicated, all statements herein are presumed to be true and applicable to the access and use of all versions of these datasets.

  • Customer Responsibility You agree that you are responsible for all access to and use of the Service through your account or password(s) and for any fees incurred for the Service, or for software or other merchandise purchased through the Service, or any other expenses incurred in accordance with the terms of this Agreement. You agree that you are responsible for backing up (a) any data you submit, receive or transfer over the Service, including, without limitation, your email; and (b) any data, files, programs, or applications on any device you connect to the Service. You acknowledge that you are aware that content accessible on or through the Service may contain material that is unsuitable for minors (persons under 18 years of age). You agree to supervise usage of your account by minors. You ratify and confirm any obligations incurred by a minor using your account.

  • The Web Services E-Verify Employer Agent agrees to, consistent with applicable laws, regulations, and policies, commit sufficient personnel and resources to meet the requirements of this MOU.

  • Customer’s Responsibilities 2.1. A properly configured hardware firewall is required for each Customer Location using a persistent connection to the public internet or any private network where there is a potential for unauthorized access. This requirement is Customer’s responsibility. 2.2. Unless you subscribe to the Network and Security Services option known as “Antivirus Service” (or its successor product), Customer will be required to have and maintain in place third party malware and anti-virus protection software, including periodic and routine updates in accordance with the manufacturer’s recommendations, and security for the Customer’s POS System Network, which security includes unique, strong passwords per user, physical security and access control policies. Customer acknowledges and agrees that security and protection of all of its networks, including the Customer POS System Network, and the data and applications on such networks, including protections against unauthorized access, is Customer’s responsibility. Customer acknowledges that, to be effective, malware protection software, system passwords and other security software and hardware components require periodic and routine updates, which Customer must obtain or perform as applicable. Customer agrees to not use or attempt to install remote access software on the Customer POS System Network unless approved by NCR Voyix.

  • Detailed Description of Services / Statement of Work Describe fully the services that Contractor will provide, or add and attach Exhibit B to this Agreement.

  • User Responsibilities i. Users are required to follow good security practices in the selection and use of passwords; ii. Users shall ensure that unattended equipment is protected; and iii. Users shall adopt a clear desk policy for papers and removable storage media and a clear screen policy for information processing facilities.

  • Network Services Local Access Services In lieu of any other rates and discounts, Customer will pay fixed monthly recurring local loop charges ranging from $1,200 to $2,000 for TDM-based DS-3 Network Services Local Access Services at 2 CLLI codes mutually agreed upon by Customer and Company.

  • Responsibilities of Customer 5.1 To the extent that the Supplier requires access to the Customer Site to perform the Services, the Customer shall provide such access during Normal Business Hours and to provide a suitable work environment to enable the Supplier to perform such Services subject to the Supplier complying with such internal policies and procedures of the Customer (including those relating to security and health and safety) as may be notified to the Supplier in writing from time to time. 5.2 The Customer shall co-operate with the Supplier in all matters relating to the Services and shall appoint a minimum of two Representatives (“Customer Representatives”), who shall have authority to commit the Customer on all matters relating to the relevant Service. 5.3 The Customer agrees and acknowledges the terms of the applicable Licence Agreements and the terms of the CSP Agreement shall form part of this Agreement. For the avoidance of doubt, in the event the applicable Licence Agreements, and/or the CSP Agreement is not applicable to the Services being received or delivered by the Supplier to the Customer under this Agreement, such agreements shall not apply. 5.4 Customer shall: (a) adhere to the Fair Usage Policy; (b) ensure it has suitable licences in place for any third party software required (which is not issued by the Supplier) to allow the Supplier and its subcontractors full use in relation to the Services provided; (c) co-operate with the Supplier in all matters relating to the Services as reasonably requested by the Supplier; (d) adhere to the dates scheduled for provision of Services by the Supplier to the Customer as stated in the applicable Statement of Work or otherwise agreed between the Parties in writing. In the event the Customer wishes to reschedule or cancel the dates for the provision of Services, liquidated damages (“Liquidated Damages”) will become payable from the Customer to the Supplier on the following basis: (i) if dates are changed or cancelled at the Customer’s request more than fourteen (14) days before the scheduled start date no Liquidated Damages are payable; (ii) if dates are changed or cancelled between seven (7) days and fourteen

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!