Use of Access Data Prohibited Sample Clauses

Use of Access Data Prohibited. If Vendor stores, collects or maintains data electronically as a condition of accessing Contract information, such data shall only be used internally by Vendor for the purpose of implementing or marketing the Contract, and shall not be disseminated to third parties or used for other marketing purposes. The Contract constitutes a public document under the laws of the State and Vendor shall not restrict access to Contract terms and conditions including pricing, i.e., through use of restrictive technology or passwords.
AutoNDA by SimpleDocs
Use of Access Data Prohibited. If Contractor stores, collects or maintains data electronically as a condition of accessing State Contract information, such data shall only be used internally by Contractor for the purpose of implementing or marketing the State Contract, and shall not be disseminated to third parties or used for other marketing purposes. This Contract constitutes a public document under the laws of the State of New York and Contractor cannot restrict access to the Contract terms and conditions including pricing, e.g., through use of restrictive technology or passwords.
Use of Access Data Prohibited. If Vendor stores, collects or maintains data electronically as a condition of accessing CTSA information, such data shall only be used internally by Vendor for the purpose of implementing or marketing the CTSA, and shall not be disseminated to third par- ties or used for other marketing purposes. The CTSA constitutes a public document under the laws of the State and Vendor shall not restrict access to CTSA terms and conditions including pricing, i.e., through use of restrictive technology or passwords.
Use of Access Data Prohibited. If Vendor stores, collects or maintains data electronically as a condition of accessing Contract information, such data shall only be used internally by Vendor for the purpose of implementing or marketing the Contract, and shall not be disseminated to third parties, other than Order Fulfillers or Subcontractors, as necessary, or used for other marketing purposes. The Contract constitutes a public document under the laws of the State and Vendor shall not restrict access to Contract terms and conditions including pricing, so long as DIR publically posts the document. However, Vendor may agree with an individual Customer to implement security measures such as password protected online ordering. Upon request, Vendor shall provide DIR with a list of any Premier Pages existing under this Contract. By purchasing under this Contract, a Customer acknowledges that DIR may request from Customerread only access” to Customer’s online ordering page with Vendor that is under this Contract (also known as a Dell Premier Page).
Use of Access Data Prohibited. If Vendor stores, collects or maintains data electronically as a condition of accessing Contract information, such data shall only be used internally by Vendor for the purpose of implementing or marketing the Contract, and shall not be disseminated to third parties, other than Resellers or used for other marketing purposes. The Contract constitutes a public document under the laws of the State and Vendor shall not restrict access to Contract terms and conditions including pricing, i.e., through use of restrictive technology or passwords. DIR Contract No. DIR-TSO-4158 Vendor Contract No. _US-GMA-1889764

Related to Use of Access Data Prohibited

  • Use of Attachment Facilities by Third Parties Purpose of Attachment Facilities.‌‌ Except as may be required by Applicable Laws and Regulations, or as otherwise agreed to among the Parties, the Attachment Facilities shall be constructed for the sole purpose of interconnecting the Large Generating Facility to the New York State Transmission System and shall be used for no other purpose.

  • USE OF TBS ACCESS CODE (a) An Account Holder may operate the TBS in relation to his Account by using his TBS Access Code.

  • Access to and Use of Content Customer has the right to access and use applicable Content subject to the terms of applicable Order Forms, this Agreement and the Documentation.

  • Use of Data by User Registry Operator will permit user to use the zone file for lawful purposes; provided that (a) user takes all reasonable steps to protect against unauthorized access to and use and disclosure of the data and (b) under no circumstances will Registry Operator be required or permitted to allow user to use the data to, (i) allow, enable, or otherwise support the transmission by email, telephone, or facsimile of mass unsolicited, commercial advertising or solicitations to entities other than user’s own existing customers, or (ii) enable high volume, automated, electronic processes that send queries or data to the systems of Registry Operator or any ICANN-­‐accredited registrar.

  • Use of Customer Data Verizon, Verizon Affiliates and their respective agents, may use, process and/or transfer Customer Data (including intra-group transfers and transfers to entities in countries that do not provide statutory protections for personal information) as set forth in the Privacy Policy and as necessary:

  • Terms of Access Access restrictions must receive approval from your advisor and the Graduate School. NOTE: Your access choices on the Proquest/ UMI Publishing Agreement ( at page 3 ) should correspond with the choices you have made on this form. In addition, if you choose to restrict access to your abstract and/or table of contents in the Emory’s ETD repository, then you will need to contact Proquest/ UMI Publishing to ensure they do not publish material you wish to restrict.* Choose Option 1 or 2 by checking one box in the left hand column below:

  • Use of Contractors (a) If the employer wishes to engage contractors and their employees to perform work in the classifications covered by this agreement, the employer must first consult in good faith with the union. Consultation will occur prior to the engagement of sub-contractors.

  • Confidentiality and Safeguarding of University Records; Press Releases; Public Information Under this Agreement, Contractor may (1) create, (2) receive from or on behalf of University, or (3) have access to, records or record systems (collectively, University Records). However, it is expressly agreed that University will not provide to Contractor, and Contractor will never seek to access, any University Records that contain personally identifiable information regarding any individual that is not available to any requestor under the Texas Public Information Act, Chapter 552, Texas Government Code, including “directory information” of any student who has opted to prohibit the release of their “directory information” as that term is defined under the Family Educational Rights and Privacy Act, 20 USC §1232g (FERPA) and its implementing regulations. [Option (Include if University is a HIPAA Covered Entity and University Records are subject to HIPAA.): Additional mandatory confidentiality and security compliance requirements with respect to University Records subject to the Health Insurance Portability and Accountability Act and 45 CFR Part 160 and subparts A and E of Part 164 (collectively HIPAA) are addressed in Section 12.26.] Contractor represents, warrants, and agrees that it will: (1) hold University Records in strict confidence and will not use or disclose University Records except as (a) permitted or required by this Agreement, (b) required by Applicable Laws, or (c) otherwise authorized by University in writing; (2) safeguard University Records according to reasonable administrative, physical and technical standards (such as standards established by the National Institute of Standards and Technology and the Center for Internet Security [Option (Include if Section 12.39 related to Payment Card Industry Data Security Standards is not include in this Agreement.):, as well as the Payment Card Industry Data Security Standards]) that are no less rigorous than the standards by which Contractor protects its own confidential information; (3) continually monitor its operations and take any action necessary to assure that University Records are safeguarded and the confidentiality of University Records is maintained in accordance with all Applicable Laws and the terms of this Agreement; and (4) comply with University Rules regarding access to and use of University’s computer systems, including UTS 165 at xxxx://xxx.xxxxxxxx.xxx/board-of-regents/policy-library/policies/uts165-information-resources-use-and-security-policy. At the request of University, Contractor agrees to provide University with a written summary of the procedures Contractor uses to safeguard and maintain the confidentiality of University Records.]

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!