Use of Data (a) In connection with the provision of the services and the discharge of its other obligations under this Agreement, State Street (which term for purposes of this Section XXIX includes each of its parent company, branches and affiliates (''Affiliates")) may collect and store information regarding a Trust and share such information with its Affiliates, agents and service providers in order and to the extent reasonably necessary (i) to carry out the provision of services contemplated under this Agreement and other agreements between the Trusts and State Street or any of its Affiliates and (ii) to carry out management of its businesses, including, but not limited to, financial and operational management and reporting, risk management, legal and regulatory compliance and client service management.
Use of Data by User Registry Operator will permit user to use the zone file for lawful purposes; provided that (a) user takes all reasonable steps to protect against unauthorized access to and use and disclosure of the data and (b) under no circumstances will Registry Operator be required or permitted to allow user to use the data to, (i) allow, enable, or otherwise support the transmission by email, telephone, or facsimile of mass unsolicited, commercial advertising or solicitations to entities other than user’s own existing customers, or (ii) enable high volume, automated, electronic processes that send queries or data to the systems of Registry Operator or any ICANN-‐accredited registrar.
Consent to Use of Data You grant NCR Voyix a perpetual, non-exclusive, irrevocable, sub-licensable, transferrable license to use the data transmitted through the Platform: (a) to provide the NCR Voyix Product and the Platform as well as related products, software, materials and services under this Agreement or another agreement between you and NCR Voyix; (b) for product and service enhancements, as well as research and development purposes; and (c) after it has been aggregated, for analytics, commercial and benchmarking purposes.
Use of Name (a) The Sub-Adviser hereby consents to the use of its name and the names of its affiliates in the Fund’s disclosure documents, shareholder communications, advertising, sales literature and similar communications. The Sub-Adviser shall not use the name or any tradename, trademark, trade device, service xxxx, symbol or any abbreviation, contraction or simulation thereof of the Adviser, the Trust, the Fund or any of their affiliates in its marketing materials unless it first receives prior written approval of the Trust and the Adviser. (b) It is understood that the name of each party to this Agreement, and any derivatives thereof or logos associated with that name, is the valuable property of the party in question and its affiliates, and that each other party has the right to use such names pursuant to the relationship created by, and in accordance with the terms of, this Agreement only so long as this Agreement shall continue in effect. Upon termination of this Agreement, the parties shall forthwith cease to use the names of the other parties (or any derivative or logo) as appropriate and to the extent that continued use is not required by applicable laws, rules and regulations.
Use of Names and Logos It is expressly understood that the names “DoubleLine” and “DoubleLine Capital” or any derivation thereof, or any logo associated with those names, are the valuable property of the Manager and its affiliates, and in certain cases are protected under applicable trademark law. The Fund shall have the limited right to use such names (or derivations thereof or associated logos) only so long as the Manager shall consent and this Agreement shall remain in effect. Upon reasonable notice from the Manager to the Fund or upon termination of this Agreement, the Fund shall forthwith cease to use such names (or derivations thereof or associated logos) and shall promptly amend its Agreement and Declaration of Trust and other public documents to change its name accordingly. The covenants on the part of the Fund in this Section 9 shall be binding upon it, its Trustees, officers, stockholders, creditors and all other persons claiming under or through it, and shall survive the termination of this Agreement.
Use of Names The Manager and the Fund agree that the Manager has a proprietary interest in the names “DFA” and “Dimensional,” and that the Fund and/or Portfolio may use such names only as permitted by the Manager, and the Fund further agrees to cease use of such names promptly after receipt of a written request to do so from the Manager.
Protection of Data The Contractor agrees to store Data on one or more of the following media and protect the Data as described: a. Hard disk drives. For Data stored on local workstation hard disks, access to the Data will be restricted to Authorized User(s) by requiring logon to the local workstation using a Unique User ID and Hardened Password or other authentication mechanisms which provide equal or greater security, such as biometrics or smart cards. b. Network server disks. For Data stored on hard disks mounted on network servers and made available through shared folders, access to the Data will be restricted to Authorized Users through the use of access control lists which will grant access only after the Authorized User has authenticated to the network using a Unique User ID and Hardened Password or other authentication mechanisms which provide equal or greater security, such as biometrics or smart cards. Data on disks mounted to such servers must be located in an area which is accessible only to authorized personnel, with access controlled through use of a key, card key, combination lock, or comparable mechanism. For DSHS Confidential Information stored on these disks, deleting unneeded Data is sufficient as long as the disks remain in a Secure Area and otherwise meet the requirements listed in the above paragraph. Destruction of the Data, as outlined below in Section 8 Data Disposition, may be deferred until the disks are retired, replaced, or otherwise taken out of the Secure Area. c. Optical discs (CDs or DVDs) in local workstation optical disc drives. Data provided by DSHS on optical discs which will be used in local workstation optical disc drives and which will not be transported out of a Secure Area. When not in use for the contracted purpose, such discs must be Stored in a Secure Area. Workstations which access DSHS Data on optical discs must be located in an area which is accessible only to authorized personnel, with access controlled through use of a key, card key, combination lock, or comparable mechanism. d. Optical discs (CDs or DVDs) in drives or jukeboxes attached to servers. Data provided by DSHS on optical discs which will be attached to network servers and which will not be transported out of a Secure Area. Access to Data on these discs will be restricted to Authorized Users through the use of access control lists which will grant access only after the Authorized User has authenticated to the network using a Unique User ID and Hardened Password or other authentication mechanisms which provide equal or greater security, such as biometrics or smart cards. Data on discs attached to such servers must be located in an area which is accessible only to authorized personnel, with access controlled through use of a key, card key, combination lock, or comparable mechanism.
OWNERSHIP AND USE OF DELIVERABLES The City shall own all rights, titles, and interests throughout the world in and to the deliverables.
Source of Data A description of (1) the process used to identify claims in the Population, and (2) the specific documentation relied upon by the IRO when performing the Quarterly Claims Review (e.g., medical records, physician orders, certificates of medical necessity, requisition forms, local medical review policies (including title and policy number), CMS program memoranda (including title and issuance number), Medicare contractor manual or bulletins (including issue and date), other policies, regulations, or directives).
Use of Names and Marks All names, trademarks, trade names or symbols (collectively, “Branding”) of each Party are and will remain the exclusive property of such Party. Neither Party will acquire any right to the Branding of the other Party. Accenture will have the limited right to use Supplier’s Branding in connection with the activities described in this Purchase Order. Neither Party may: (i) publicize this Purchase Order, or their subject matter; (ii) state that a Party has approved or endorsed any product or service provided by the other Party as contemplated by this Purchase Order; or (iii) otherwise use the Branding of such other Party or its Affiliates, without the other Party’s prior written consent.