T-Mobile Sample Clauses

T-Mobile. As between T-Mobile and Content Provider, and except for the licenses and rights granted herein by Content Provider, which shall remain the sole property of Content Provider and its licensors, T-Mobile reserves and retains all right, title and interest, including but not limited to all Intellectual Property Rights in the technology owned or licensed from third parties by T-Mobile in connection with this Agreement, and no title to or ownership of any of the technology is transferred to Content Provider or any other Person under this Agreement. Without limiting the foregoing, as between the parties, T-Mobile retains all Intellectual Property Rights and all other right, title and interest in and to the T-Mobile Internet Service (but excluding any items supplied by Content Provider) and the T-Mobile Marks. Except as specifically set forth in this Agreement, Content Provider obtains no right to use T-Mobile Intellectual Property Rights beyond the term of this Agreement.
AutoNDA by SimpleDocs
T-Mobile. 59 U under common control with ............................................. 56
T-Mobile. T-Mobile, in their role as a mobile communication operator also intends to incorporate PICOS approaches and concepts within existing products and services in the mobile market. In addition PICOS results may be integrated or applied to further product developments. The overall goal of T- Mobile is to enhance the privacy for customers on the mobile operators’ level. This may complement privacy enhancing efforts on services, provided by other parties e.g. service providers. T-Mobile sees benefits from the PICOS participation especially in the following areas: • User to user interaction At the moment, the main focus of privacy enhancing techniques is related to user data exchange between the mobile operator and 3rd parties, where the user has to give his consent so that the mobile operator is allowed to deliver the data to enable the 3rd party to provide a service. With the results of the PRIME project17, T-Mobile was able to implement a significant enhancement in his network to control and monitor such data flow by the user. Nowadays, (mobile) community applications are emerging and the control and monitoring capabilities need to be enhanced so that also the data flow between users is under the user’s control. With PICOS, we will gain substantial knowledge to enhance privacy here. Applications to support users in the context of community features are already on the horizon. • Usability
T-Mobile shall pay to the District the one-time amount of
T-Mobile. T-Mobile US, Inc., together with its subsidiaries, provides mobile communications services in the United States, Puerto Rico, and the U.S. Virgin Islands. The company offers voice, messaging, and data services in the postpaid, prepaid, and wholesale markets. It also provides wireless devices, including smartphones, tablets, and other mobile communication devices, as well as accessories that are manufactured by various suppliers. It serves approximately 63 million customers. The company was founded in 1994 and is headquartered in Bellevue, Washington. In 2015 earnings exceeded $733 million and EBITA was over $7.4 billion. The company's recent market capitalization was approximately $33 billion. CONFIDENTIALITY AND NON-DISCLOSURE COMMITMENT THIS CONFIDENTIALITY AND NON-DISCLOSURE COMMITMENT (“Commitment”) is made this day of , 2017, for the benefit of 135th and Aurora LLC, a Washington limited liability company (hereinafter referred to as “Company”); by , its investors, employees, directors, officers, agents, partners, attorneys, accountants, consultants, members, managers, and brokers and representatives (hereinafter collectively referred to as “Confidant”).
T-Mobile shall pay to the District the one-time amount of $5,000.00 as additional consideration for execution by District of this Access Agreement, payable within thirty days following the execution and delivery by the District of this Access

Related to T-Mobile

  • Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.

  • Cloud Services You will not intentionally (a) interfere with other customers’ access to, or use of, the Cloud Service, or with its security; (b) facilitate the attack or disruption of the Cloud Service, including a denial of service attack, unauthorized access, penetration testing, crawling, or distribution of malware (including viruses, trojan horses, worms, time bombs, spyware, adware, and cancelbots); (c) cause an unusual spike or increase in Your use of the Cloud Service that negatively impacts the Cloud Service’s operation; or (d) submit any information that is not contemplated in the applicable Documentation.

  • Authorized Users Authorized Users" are:

  • Web Services Our Web Services are designed to enable you to easily establish a presence on the Internet. Our Web Hosting and Design is composed of our Web Hosting and Design Publishing Component and other miscellaneous components. These components may be used independently or in conjunction with each other.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • End Users Customer will control access to and use of the Products by End Users and is responsible for any use of the Products that does not comply with this Agreement.

  • Authorized User You may request us to issue a Card to an individual who has no financial responsibility under this Agreement. An Authorized User has the same access to your Account as you do, subject to any limitations we may impose. An Authorized User has no authority to add or delete Cardholders, request a replacement Card or terminate or modify this Agreement. You may terminate an Authorized User’s authority to access your Account at any time. To do this, you must return the Card to PenFed. You agree that you are responsible for all charges and cash advances made by an Authorized User, including charges made before the Card is returned, recurring charges, or charges made without the use of the Card initiated by the Authorized User after termination of the Authorized User’s access.

  • Voice Services In lieu of any other rates and discounts, Customer will pay fixed per-minute rates ranging from $0.000 to $0.000 for the following Voice Services: Domestic Voice Service: Domestic Outbound Voice Service, including Calling Card and Domestic Inbound Voice Service based on origination and termination type. Data Services:

  • End User This agreement shall bind the ordering activity as end user but shall not operate to bind a Government employee or person acting on behalf of the Government in his or her personal capacity.

  • Online Services Microsoft warrants that each Online Service will perform in accordance with the applicable SLA during Customer’s use. Customer’s remedies for breach of this warranty are described in the SLA.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!