We use cookies on our site to analyze traffic, enhance your experience, and provide you with tailored content.

For more information visit our privacy policy.

Usage of Data Sample Clauses

Usage of Data. Company or its suppliers may (i) use uploaded data from installed licensed Software to improve products and services; (ii) share data that has been identified as malicious or unwanted content with affiliates and security partners; and (iii) use and disclose uploaded data for analysis or reporting purposes only if any such use, sharing or disclosure does not identify Customer or include any information that can be used to identify any individual person.
Usage of DataYou acknowledge that in connection with your use of Digital (online and/or mobile) Banking, the Bank and its affiliates and service providers may receive and may share with one another names, domain names, addresses, Passwords, telephone and device numbers, the content of messages, data files and other data and information provided by you or from other sources in connection with Digital (online and/or mobile) Banking or the Software (collectively, "User Information"). The Bank and its affiliates and service providers will maintain reasonable safeguards to protect the information from unauthorized disclosure or use, but reserve the right to use and disclose this information as reasonably necessary to deliver Digital (online and/or mobile) Banking and as otherwise permitted by law, including compliance with court orders or lawful instructions from a government agency, to protect the personal safety of subscribers or the public, to defend claims, and as otherwise authorized by you. The Bank and its affiliates and service providers also reserve the right to monitor use of Digital (online and/or mobile) Banking and the Software for purposes of verifying compliance with the law, these terms and conditions, and any applicable license, but disclaims any obligation to monitor, filter, or edit any content.
Usage of Data a) The Client must not use the Licensed Product prescribed in Schedule II for Demo Accounts. Invast may, acting reasonably, impose any conditions as it deems necessary on the use of the Licensed Product. b) The Client acknowledges that Invast, in its absolute discretion, may choose to discontinue its transmission of any or all of the Licensed Product or to change the nature or transmission format of the Licensed Product at any time. Invast will use commercially reasonable efforts to provide the Client with reasonable advanced notice of such discontinuation or changes. c) The Client agrees not to format, display or alter the information or data received through and from Invast in violation of Invast’s specifications. d) The Client agrees not to affect materially the integrity of the information, to alter the information in any manner that adversely affects its accuracy or integrity or render the information inaccurate, unfair, uninformative, fictitious, misleading, deceptive or discriminatory. e) The Client’s use of the Licensed Product is restricted to the areas on the Client’s own platform that are only accessible through a Secure Log In. The Licensed Product must not be disseminated, reproduced or reconfigured by or to third parties outside of Invast’s or the Client’s Secure Log In areas. f) The Client must not directly or indirectly procure the Licensed Product to be used for other servers or systems which has the effect of bypassing the Secure Log In or which impede the ability of Invast to undertake an audit of the usage of the Licensed Product. g) Invast retains the right to direct the Client to terminate any external transmission (i.e. to a third-party site) or distribution of the Licensed Product for any reason or no reason, in which event Invast shall notify the Client and the Client shall cease retransmitting the Licensed Product immediately. h) When the Client distributes the Licensed Product to its Customers, it must be accompanied by a disclaimer or other display requirement which relates to the source information of that particular Data Feed, at the written direction of Invast. The Client must use the disclaimer or other display requirement as set out in Schedule III, IV or Schedule V, as appropriate or required. Invast shall provide the Client with thirty (30) days’ written notice of any changes to any disclaimer or other display requirement already notified, unless amendments are required under law, regulation or by a relevant Exchange. i) ...
Usage of Data. The CSO has agreed with Teagasc that the data file transmitted will be used for statistical purposes only and specifically to inform interviewers of the location/type of farms to be surveyed. The data file sent to Teagasc will include farmer name, farm address, farm size and type of farm, on a random sample of farms taken from the CSO farm register. Names, addresses and farm size have been collected from the FSS, COA and DAFM administrative data over time. Farm type is derived using an extensive procedure set out by Eurostat in 1242/20085 and again this process uses multiple sources including the FSS, COA and DAFM administrative data. CSO uses DAFM administrative data as well as FSS and COA data internally when classifying both the farm type and assigning size categories. By providing farm type and size, the CSO is not directly providing data obtained from DAFM administrative sources. Teagasc have also agreed to have a number of safeguards put in place for the use of this data. The data transferred is strictly confidential; an encrypted CD-ROM is sent and is destroyed when it is no longer needed. Any Teagasc interviewer collecting information from farm holdings will do so using a secure encrypted laptop machine. Individuals in Teagasc with access to the data file are required to abide by the standard agreement6 and be appointed as Officers of Statistics7. 3 xxxx://xxx-xxx.xxxxxx.xx/LexUriServ/XxxXxxXxxx.xx?uri=OJ:L:2008:321:0014:0034:EN:PDF 5 xxxx://xxx-xxx.xxxxxx.xx/legal-content/EN/TXT/PDF/?uri=CELEX:32008R1242&from=EN Section 20(b) within the Statistics Act specifies that the following persons shall be Officers of Statistics “every other person who, consequent on arrangements made under subsection (1) of section 11 of this Act, is for the time being engaged in and about the collection, extraction, compilation or dissemination of information under this Act”. Before they may access the data provided by CSO to Teagasc, the relevant staff in Teagasc must be appointed as Officers of Statistics and must sign an undertaking as specified in Section 21 of the Statistics Act. Only the Director General of the CSO may appoint Officer of Statistics. The process for appointment of Officers of Statistics will be managed by the CSO Data Office. Any staff newly assigned by Teagasc to work which requires access to the data must be appointed as Officers of Statistics before they undertake any such work. Teagasc will notify the CSO of any such changes in staff. In the even...
Usage of DataYou acknowledge that in connection with your use of Mobile Banking, the Bank and its affiliates and service providers may receive and may share with one another names, domain names, addresses, passwords, telephone and device numbers, the content of messages, data files and other data and information provided by you or from other sources in connection with Mobile Banking or the Software (collectively, "User Information"). The Bank and its affiliates and service providers will maintain reasonable safeguards to protect the information from unauthorized disclosure or use, but reserve the right to use and disclose this information as reasonably necessary to deliver Mobile Banking and as otherwise permitted by law, including compliance with court orders or lawful instructions from a government agency, to protect the personal safety of subscribers or the public, to defend claims, and as otherwise authorized by you. The Bank and its affiliates and service providers also reserve the right to monitor use of Mobile Banking and the Software for purposes of verifying compliance with the law, these terms and conditions, and any applicable license, but disclaims any obligation to monitor, filter, or edit any content.
Usage of DataYou acknowledge that in connection with your use of E- Banking and the Mobile MyLBC App, the Bank and its affiliates and service providers may receive and may share with one another names, domain names, addresses, passwords, telephone and device numbers, the content of messages, data files and other data and information provided by you or from other sources in connection with E-Banking or the Software (collectively, "User Information"). The Bank and its affiliates and service providers will maintain reasonable safeguards to protect the information from unauthorized disclosure or use, but reserve the right to use and disclose this information as reasonably necessary to deliver E-Banking and as otherwise permitted by law, including compliance with court orders or lawful instructions from a government agency, to protect the personal safety of subscribers or the public, to defend claims, and as otherwise authorized by you. The Bank and its affiliates and service providers also reserve the right to monitor use of E-Banking and the Software for purposes of verifying compliance with the law, these terms and conditions, and any applicable license, but disclaims any obligation to monitor, filter, or edit any content.
Usage of Data. IMMERI will use and/or process the personal data for, among others, the following reasons: • Inform you of sales promotions and products updates Name, identity card number, sex, date of birth, race, religion, nationality, etc. • Disclose your contact information to your sponsor upon their request to inform you the latest sales promotion, products update, company’s events and etc. Spouse’s name, identity card number and beneficiary’s name, identity card number etc.
Usage of Data. The Client guarantees and warrants that: 14.1 Creditrisk may utilise any of the data secured, processed and stored by the Client on the Creditrisk website pursuant to the usage of any of Creditrisk’s Services and Products (including any of the data contained in any of the Credit Bureau reports ordered by the Client), for any prescribed purpose and in order to enhance its products and service offering to the client from time to time. 14.2 The Client hereby specifically warrants and guarantees that: 14.2.1 it has obtained the necessary consent from its credit applicant(s), client(s) and/or principal(s) of the client(s) / credit applicant(s) (as the case may be) to perform any credit profile search in respect of such a credit applicant(s), client(s) and/or principal(s) for credit vetting purposes. 14.2.2 all the default data submitted for publication by the Credit Bureau are true and correct in every aspect. 14.2.3 it has verified the accuracy and correctness of the default data submitted for publication by the Credit Bureau. 14.2.4 it has obtained the consent from the Defaulter(s) that its/their default may be submitted for publication by a Credit Bureau. 14.2.5 all defaults submitted for publication to the Credit Bureau relate to a debt for services rendered and disbursements incurred for and/or on behalf of the Defaulter by the Client and/or to goods sold and delivered by the Client to the Defaulter at the Defaulter’s special instance and request and to no other cause of action. 14.2.6 the default submitted for publication to the Credit Bureau has not prescribed in terms of the provisions of the Prescription Act : 68 of 1969. 14.2.7 it shall immediately notify the Credit Bureau in writing, should it, after the publication of the default, transpire that the Defaulter has a valid dispute. 14.2.8 the default submitted for publication is not subject to any valid dispute. 14.2.9 it has provided the Defaulter(s) with the appropriate and proper written notification in terms of Regulation 19(4) of the National Credit Act: 34 of 2005 of its intention to submit adverse information concerning that person to a Credit Bureau. 14.2.10 the Defaulter(s) is/are still in default after expiry of the 20(twenty) day period as stipulated in the Notice given to the Defaulter in terms of Regulation 19(4) of the National Credit Act: 34 of 2005. 14.2.11 in the event of a surety being submitted for publication as a Defaulter based on the default of the Principal Debtor, the suretysh...
Usage of Data. 8.1. Without limiting the provisions of Clause 7, other than your Personal Data, all other Data, including non-personally identifiable information about you are, upon collection (or conversion into non-personally identifiable information), owned by MHC, and MHC shall be entitled to freely share such information within MHC, and any entity within the MHC group of companies may freely commercialise and monetise such Data without informing you or being accountable to you. 8.2. Without limiting the provisions of Clause 7, we are entitled to use and apply the Data in market and product development which may not necessarily be related to this App. 8.3. MHC may share your personal information with: 8.3.1. Service Providers who may view certain information about you through the Application; 8.3.2. Our affiliates and third party service providers who assist us in providing the Application and who perform certain functions on our behalf; 8.3.3. Parties involved in a transaction involving the purchase, sale, lease, merger or amalgamation or any other acquisition, disposal, or financing of our business or a portion of our business; 8.3.4. Other parties if required to do so by law or if we believe that such disclosure is necessary to prevent fraud or crime or to protect the application or the rights, property or personal safety of any person.

Related to Usage of Data

  • Storage of Data The Company agrees to store and process the School District Data in a manner that is no less protective than those methods used to secure the Company’s own data. The Company agrees that School District Data will be stored on equipment or systems located within the United States.

  • Use of Data (a) In connection with the provision of the services and the discharge of its other obligations under this Agreement, State Street (which term for purposes of this Section XXIX includes each of its parent company, branches and affiliates (''Affiliates")) may collect and store information regarding a Trust and share such information with its Affiliates, agents and service providers in order and to the extent reasonably necessary (i) to carry out the provision of services contemplated under this Agreement and other agreements between the Trusts and State Street or any of its Affiliates and (ii) to carry out management of its businesses, including, but not limited to, financial and operational management and reporting, risk management, legal and regulatory compliance and client service management.

  • Use of Data by User Registry Operator will permit user to use the zone file for lawful purposes; provided that (a) user takes all reasonable steps to protect against unauthorized access to and use and disclosure of the data and (b) under no circumstances will Registry Operator be required or permitted to allow user to use the data to, (i) allow, enable, or otherwise support the transmission by email, telephone, or facsimile of mass unsolicited, commercial advertising or solicitations to entities other than user’s own existing customers, or (ii) enable high volume, automated, electronic processes that send queries or data to the systems of Registry Operator or any ICANN-­‐accredited registrar.

  • Marking of Data Pursuant to Paragraph A above, any Data delivered under this Agreement shall be marked with the following legend: Use, duplication, or disclosure is subject to the restrictions as stated in Agreement HR0011-XX-9-XXXX between the Government and the Performer.

  • Source of Data A description of (1) the process used to identify claims in the Population, and (2) the specific documentation relied upon by the IRO when performing the Quarterly Claims Review (e.g., medical records, physician orders, certificates of medical necessity, requisition forms, local medical review policies (including title and policy number), CMS program memoranda (including title and issuance number), Medicare contractor manual or bulletins (including issue and date), other policies, regulations, or directives).‌‌‌

  • Usage Data 7.1. The parties shall supply data on usage of the Licensed Work that is available to them during the term of this Licence. Notwithstanding the foregoing, the parties shall neither assemble nor provide data from which an individual user could be identified.

  • Protection of Data The Contractor agrees to store Data on one or more of the following media and protect the Data as described: a. Hard disk drives. For Data stored on local workstation hard disks, access to the Data will be restricted to Authorized User(s) by requiring logon to the local workstation using a Unique User ID and Hardened Password or other authentication mechanisms which provide equal or greater security, such as biometrics or smart cards. b. Network server disks. For Data stored on hard disks mounted on network servers and made available through shared folders, access to the Data will be restricted to Authorized Users through the use of access control lists which will grant access only after the Authorized User has authenticated to the network using a Unique User ID and Hardened Password or other authentication mechanisms which provide equal or greater security, such as biometrics or smart cards. Data on disks mounted to such servers must be located in an area which is accessible only to authorized personnel, with access controlled through use of a key, card key, combination lock, or comparable mechanism. For DSHS Confidential Information stored on these disks, deleting unneeded Data is sufficient as long as the disks remain in a Secure Area and otherwise meet the requirements listed in the above paragraph. Destruction of the Data, as outlined below in Section 8 Data Disposition, may be deferred until the disks are retired, replaced, or otherwise taken out of the Secure Area. c. Optical discs (CDs or DVDs) in local workstation optical disc drives. Data provided by DSHS on optical discs which will be used in local workstation optical disc drives and which will not be transported out of a Secure Area. When not in use for the contracted purpose, such discs must be Stored in a Secure Area. Workstations which access DSHS Data on optical discs must be located in an area which is accessible only to authorized personnel, with access controlled through use of a key, card key, combination lock, or comparable mechanism. d. Optical discs (CDs or DVDs) in drives or jukeboxes attached to servers. Data provided by DSHS on optical discs which will be attached to network servers and which will not be transported out of a Secure Area. Access to Data on these discs will be restricted to Authorized Users through the use of access control lists which will grant access only after the Authorized User has authenticated to the network using a Unique User ID and Hardened Password or other authentication mechanisms which provide equal or greater security, such as biometrics or smart cards. Data on discs attached to such servers must be located in an area which is accessible only to authorized personnel, with access controlled through use of a key, card key, combination lock, or comparable mechanism.

  • Consent to Use of Data You grant NCR Voyix a perpetual, non-exclusive, irrevocable, sub-licensable, transferrable license to use the data transmitted through the Platform: (a) to provide the NCR Voyix Product and the Platform as well as related products, software, materials and services under this Agreement or another agreement between you and NCR Voyix; (b) for product and service enhancements, as well as research and development purposes; and (c) after it has been aggregated, for analytics, commercial and benchmarking purposes.

  • Protection of Customer Data The Supplier shall not delete or remove any proprietary notices contained within or relating to the Customer Data. The Supplier shall not store, copy, disclose, or use the Customer Data except as necessary for the performance by the Supplier of its obligations under this Call Off Contract or as otherwise Approved by the Customer. To the extent that the Customer Data is held and/or Processed by the Supplier, the Supplier shall supply that Customer Data to the Customer as requested by the Customer and in the format (if any) specified by the Customer in the Call Off Order Form and, in any event, as specified by the Customer from time to time in writing. The Supplier shall take responsibility for preserving the integrity of Customer Data and preventing the corruption or loss of Customer Data. The Supplier shall perform secure back-ups of all Customer Data and shall ensure that up-to-date back-ups are stored off-site at an Approved location in accordance with any BCDR Plan or otherwise. The Supplier shall ensure that such back-ups are available to the Customer (or to such other person as the Customer may direct) at all times upon request and are delivered to the Customer at no less than six (6) Monthly intervals (or such other intervals as may be agreed in writing between the Parties). The Supplier shall ensure that any system on which the Supplier holds any Customer Data, including back-up data, is a secure system that complies with the Security Policy and the Security Management Plan (if any). If at any time the Supplier suspects or has reason to believe that the Customer Data is corrupted, lost or sufficiently degraded in any way for any reason, then the Supplier shall notify the Customer immediately and inform the Customer of the remedial action the Supplier proposes to take. If the Customer Data is corrupted, lost or sufficiently degraded as a result of a Default so as to be unusable, the Supplier may: require the Supplier (at the Supplier's expense) to restore or procure the restoration of Customer Data to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer, and the Supplier shall do so as soon as practicable but not later than five (5) Working Days from the date of receipt of the Customer’s notice; and/or itself restore or procure the restoration of Customer Data, and shall be repaid by the Supplier any reasonable expenses incurred in doing so to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer.

  • Removal of Data County PHI or PI must not be removed from the premises of the Contractor except with express written permission of County.