Additional Acceptable Uses of Student Data Contractor is prohibited from using Student Data for any secondary use not described in this agreement except:
Internet Use 7.1. Customer is prohibited from posting or transmitting unlawful material on or via the Internet or the World Wide Web.
Internet Access Data and information may be made electronically accessible to the Company through Internet access to one or more links provided by the Administrator or a sub-administrator (“Web Link”). All rights in Web Link (including text and “look and feel” attributes) are owned by the sub-administrator. Any commercial use of the content or any other aspect of Web Link requires the written permission of the sub-administrator. Use of the Web Link by the Company will be subject to any terms of use set forth on the web site. Web Link and the information (including text, graphics and functionality) in the Web Link is presented “As Is” and “As Available” without express or implied warranties including, but not limited to, implied warranties of non-infringement, merchantability and fitness for a particular purpose. The sub-administrator neither warrants that the Web Link will be uninterrupted or error free, nor guarantees the accessibility, reliability, performance, timeliness, sequence, or completeness of information provided on the Web Link.
Internet Warnings If the Settling Entity offers for sale any of the Products to California consumers through websites such as xxxxxx.xxx that are not reformulated as set forth in subsection 2.2 above, it shall ensure that the required warning (with the language set forth in subsection 2.3 above) is prominently displayed to the purchaser prior to completion of the transaction without requiring the potential buyer to use considerable effort to be made aware of the health hazard advisory. The warning (or a clearly marked hyperlink to the warning using the word “WARNING”) given in conjunction with the online sale of the Products may appear either: (a) prominently placed on a webpage in which the Product’s photograph, price, or “add to cart” section are displayed; (b) on the same webpage as the order form for the Product; or (c) on any webpage displayed to the purchaser during the checkout process and prior to its completion for any purchaser with a California shipping address. The symbol “” may be placed adjacent to the signal word. The internet warning may use the Short-Form Warning content described in subsection 2.3(b). The URL "xxx.X00Xxxxxxxx.xx.xxx" in the Warning may be substituted with an equivalent reference to the official "Proposition 65 Warnings Website."
Public Posting of Approved Users’ Research Use Statement The PI agrees that information about themselves and the approved research use will be posted publicly on the dbGaP website. The information includes the PI’s name and Requester, project name, Research Use Statement, and a Non-Technical Summary of the Research Use Statement. In addition, and if applicable, this information may include the Cloud Computing Use Statement and name of the CSP or PCS. Citations of publications resulting from the use of controlled-access datasets obtained through this DAR may also be posted on the dbGaP website.
Exceptional Access to Thick Registration Data In case of a registrar failure, deaccreditation, court order, etc. that prompts the temporary or definitive transfer of its domain names to another registrar, at the request of ICANN, Registry Operator will provide ICANN with up-‐to-‐date data for the domain names of the losing registrar. The data will be provided in the format specified in Specification 2 for Data Escrow. The file will only contain data related to the domain names of the losing registrar. Registry Operator will provide the data as soon as commercially practicable, but in no event later than five (5) calendar days following ICANN’s request. Unless otherwise agreed by Registry Operator and ICANN, the file will be made available for download by ICANN in the same manner as the data specified in Section 3.1 of this Specification.
Internet Traffic Any traffic that is transmitted to or returned from the Internet at any point during the duration of the transmission.
Use of the Card 1. The Cardmember must sign the Card in ink, using a ball point pen, as soon as he or she receives it; the Cardmember must also safeguard the Card and preserve any PIN in extreme secrecy and keep it separate from his or her Card. The Cardmember must not use the Card after the expiration of the validity period embossed on it, and not use the Card after it has been damaged, withdrawn or cancelled.
Misuse of Internet-based Services You may not use these services in any way that could harm them or impair anyone else’s use of them. You may not use the services to try to gain unauthorized access to any service, data, account or network by any means.
INTERNET-BASED SERVICES Microsoft provides Internet-based services with the software. It may change or cancel them at any time.