Third Party Terms of Agreement. You must state in the XXXX that the end-user must comply with applicable third party terms of agreement when using Your Application, e.g., if You have a VoIP application, then the end-user must not be in violation of their wireless data service agreement when using Your Application.
Third Party Terms of Agreement. You must comply with applicable third party terms of agreements when using Your Application, e.g., if use VoIP, then You must not be in violation of Your wireless data service agreement when using the Licensed Application.
Third Party Terms of Agreement. You will comply with any applicable third-party terms when using the Services.
Third Party Terms of Agreement. You must comply with applicable third party terms of agreement when using the App.
Third Party Terms of Agreement. You must comply with any applicable third party terms of agreement when using the Software.
Third Party Terms of Agreement. The End User must comply with applicable third party terms of agreement when using the Lost Summer.
Third Party Terms of Agreement. Vendor must state, in the Vendor Terms, that the User must comply with applicable third- party terms of agreement when using any Approved Vendor Products. SCHEDULE 2 HP COMMAND CENTER PRIVACY REQUIREMENTS These HP Command Center Privacy Requirements contain additional provisions which form part of the HP Command Center Service Catalogue Agreement. HP recognizes that privacy is a fundamental human right and further recognizes the importance of privacy, security and data protection to our customers and partners worldwide. As a Command Center Service Catalogue partner, HP expects Vendor to view data privacy as an important part of Vendor’s solution, and expects Vendor’s privacy policies to be materially consistent with HP’s privacy statement found at xxx.xx.xxx/xx/xxxxxxx . Within HP Command Center, HP conducts privacy reviews on a semi-annual basis. HP’s review identifies the User Data and any other personal data that Command Center maintains, the methods that we employ to protect the data, and ensures specifically that HP is up to date on global privacy policies (e.g. GDPR). For Command Center Service Catalogue Vendors, HP reserves the right to request and, upon such request, Vendor shall promptly provide the following: • Architectural/design details on how User Data and any other personal data is accessed using the HP ID session token. If Vendor Product retains local/cached copies of this data, Vendor will include details describing methods deployed to protect this data in transit and at rest. • A description of User Data and any other personal data that is collected within the Vendor Product and methods employed to protect this data. • Most recent copy of partner GDPR Compliance Statement. SCHEDULE 3 HP COMMAND CENTER SECURITY REQUIREMENTS These HP Command Center Security Requirements contain additional provisions which form part of the HP Command Center Service Catalogue Agreement. HP conducts security reviews of all HP Command Center services on an ongoing basis. Internally, our security review process can be summarized as follows (see information on the hp,io portal for details on the HP “V + V” security process):
Third Party Terms of Agreement. You must state in the EULA that the end-user must comply with applicable third-party terms of agreement when using Your Application, e.g., if You have a VoIP application, then the end-user must not be in violation of their wireless data service agreement when using Your Application.
Third Party Terms of Agreement. 8.1 You will comply with applicable third party terms of agreement when using Citicus MOCA Product & Services, including Apple's terms of service and terms of sale for its iTunes App Store.
Third Party Terms of Agreement. Both parties of this Agreement acknowledge and agree that Apple, and Apple’s subsidiaries, are third party beneficiaries of this agreement, and that, upon the user’s acceptance of the terms and conditions of this agreement, Apple will have the right (and will be deemed to have accepted the right) to enforce this agreement against the user as a third party beneficiary thereof.