Use of Data by User Registry Operator will permit user to use the zone file for lawful purposes; provided that (a) user takes all reasonable steps to protect against unauthorized access to and use and disclosure of the data and (b) under no circumstances will Registry Operator be required or permitted to allow user to use the data to, (i) allow, enable, or otherwise support the transmission by email, telephone, or facsimile of mass unsolicited, commercial advertising or solicitations to entities other than user’s own existing customers, or (ii) enable high volume, automated, electronic processes that send queries or data to the systems of Registry Operator or any ICANN-‐accredited registrar.
Use of Data (a) In connection with the provision of the services and the discharge of its other obligations under this Agreement, State Street (which term for purposes of this Section XXIX includes each of its parent company, branches and affiliates (''Affiliates")) may collect and store information regarding a Trust and share such information with its Affiliates, agents and service providers in order and to the extent reasonably necessary (i) to carry out the provision of services contemplated under this Agreement and other agreements between the Trusts and State Street or any of its Affiliates and (ii) to carry out management of its businesses, including, but not limited to, financial and operational management and reporting, risk management, legal and regulatory compliance and client service management.
Use of Customer Data Verizon, Verizon Affiliates and their respective agents, may use, process and/or transfer Customer Data (including intra-group transfers and transfers to entities in countries that do not provide statutory protections for personal information) as set forth in the Privacy Policy and as necessary: (a) in connection with provisioning of Services; (b) to incorporate Customer Data into databases controlled by Verizon, Verizon Affiliates or their respective agents for the purpose of providing Services; administration; provisioning; invoicing and reconciliation; verification of Customer identity, solvency and creditworthiness; maintenance, support and product development; fraud detection and prevention; sales, revenue and customer analysis and reporting; market and customer use analysis including in the manner described in the Privacy Policy; and (c) to communicate to Customer regarding Services.
Use of websites (a) The Guarantor may satisfy its obligation to deliver any public information to the Lenders by posting this information onto an electronic website designated by the Guarantor and the Administrative Agent (the “Designated Website”) by notifying the Administrative Agent (i) of the address of the website together with any relevant password specifications and (ii) that such information has been posted on the website; provided, that in any event the Guarantor shall supply the Administrative Agent with one copy in paper form of any information which is posted onto the website. (b) The Administrative Agent shall supply each Lender with the address of and any relevant password specifications for the Designated Website following designation of that website by the Guarantor and the Administrative Agent. (c) The Guarantor shall promptly upon becoming aware of its occurrence notify the Administrative Agent if: (i) the Designated Website cannot be accessed due to technical failure; (ii) the password specifications for the Designated Website change; (iii) any new information which is required to be provided under this Guaranty is posted onto the Designated Website; (iv) any existing information which has been provided under this Guaranty and posted onto the Designated Website is amended; or (v) the Guarantor becomes aware that the Designated Website or any information posted onto the Designated Website is or has been infected by any electronic virus or similar software. If the Guarantor notifies the Administrative Agent under Section 8.3(c)(i) or Section 8.3(c)(v) above, all information to be provided by the Guarantor under this Guaranty after the date of that notice shall be supplied in paper form unless and until the Administrative Agent is satisfied that the circumstances giving rise to the notification are no longer continuing.
Use of Software Any software that is available on the Services ("Software") is the copyrighted work of Red Hat and/or its licensors. Copying or reproducing the Software to any other server or location for further reproduction or redistribution is strictly prohibited, unless such reproduction or redistribution is permitted by a license agreement accompanying such Software. You may not create derivative works of the Software, or attempt to decompile or reverse-engineer the Software unless otherwise permitted by law. Use of the Software is subject to the license terms of any license agreement that may accompany or is provided with the Software. You may not download any Software until you have read and accepted the terms of the accompanying software license. WITHOUT LIMITING THE FOREGOING, THE SOFTWARE IS WARRANTED, IF AT ALL, ONLY ACCORDING TO THE TERMS OF THE SEPARATE LICENSE AGREEMENT ACCOMPANYING THE SOFTWARE. EXCEPT AS WARRANTED IN SUCH LICENSE AGREEMENT, RED HAT, ITS PARENT, SUBSIDIARY, AND AFFILIATE COMPANIES, AND ITS LICENSORS DISCLAIM ALL WARRANTIES AND CONDITIONS WITH REGARD TO THE SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT, TO THE MAXIMUM EXTENT PERMITTED BY LAW.
Use of Materials There should be no limitations or restrictions by Union upon a Contractor's choice of materials or design, nor, regardless of source or location, upon the full use and utilization, of equipment, machinery, packaging, precast, prefabricated, prefinished, or preassembled materials, tools or other labor saving devices, subject to the application of the California Public Contract and Labor Codes. Generally, the onsite installation or application of such items shall be performed by the craft having jurisdiction over such work.
Use of Likeness As part of the consideration for this Housing Agreement, Resident authorizes Owner and its affiliates to make photographs and video recordings of Resident in community and resident amenity areas, and irrevocably grants Owner and its affiliates a royalty-free license to use Resident’s image and likeness for all lawful purposes, including promotional purposes in advertising, video, web, social media and other formats.
Use of Issuer PII The Issuer does not grant the Asset Representations Reviewer any rights to Issuer PII except as provided in this Agreement. The Asset Representations Reviewer will use Issuer PII only to perform its obligations under this Agreement or as specifically directed in writing by the Issuer and will only reproduce Issuer PII to the extent necessary for these purposes. The Asset Representations Reviewer must comply with all laws applicable to PII, Issuer PII and the Asset Representations Reviewer’s business, including any legally required codes of conduct, including those relating to privacy, security and data protection. The Asset Representations Reviewer will protect and secure Issuer PII. The Asset Representations Reviewer will implement privacy or data protection policies and procedures that comply with applicable law and this Agreement. The Asset Representations Reviewer will implement and maintain reasonable and appropriate practices, procedures and systems, including administrative, technical and physical safeguards to (i) protect the security, confidentiality and integrity of Issuer PII, (ii) ensure against anticipated threats or hazards to the security or integrity of Issuer PII, (iii) protect against unauthorized access to or use of Issuer PII and (iv) otherwise comply with its obligations under this Agreement. These safeguards include a written data security plan, employee training, information access controls, restricted disclosures, systems protections (e.g., intrusion protection, data storage protection and data transmission protection) and physical security measures.
Use of Marks To the extent one party’s Marks must be utilized by the other party in connection with the operation of a particular Component System or the Licensed Services related to the particular Component System: the Company hereby grants to BNYM a non-exclusive, limited license to use its Marks solely in connection with the Licensed Services provided by the Component System; BNYM hereby grants to the Company a non-exclusive, limited license to use its Marks solely in connection with the Licensed Services provided by the Component System; all use of Marks shall be in accordance with the granting party’s reasonable policies regarding the advertising and usage of its Marks as established from time to time; the Company hereby grants BNYM the right and license to display the Company’s Mark’s on applicable BNYM Web Applications and in advertising and marketing materials related to the BNYM Web Application and the Licensed Services provided by the relevant Component System; each party shall retain all right, title and interest in and to its Marks worldwide, including any goodwill associated therewith, subject to the limited license granted in this Section 4.5; use of the Marks hereunder by the grantee pursuant to this limited license shall inure to the benefit of the trademark owner and grantees shall take no action that is inconsistent with the trademark owner’s ownership thereof; each party shall exercise reasonable efforts within commercially reasonable limits, to maintain all on-screen disclaimers and copyright, trademark and service xxxx notifications, if any, provided to it by the other party in writing from time to time, and all “point and click” features relating to Authorized Persons’ acknowledgment and acceptance of such disclaimers and notifications; and a party shall immediately cease using another party’s Marks immediately upon termination of the Licensed Rights governing the relevant Component System.
Use of Technology Participants are subject to all existing laws (federal and state) and University regulations and policies on use of technology, including not only those laws and regulations that are specific to computers and networks, but also those that may apply generally to personal conduct such as: • UC Electronic Communications Policy: xxxx://xxx.xxxx.xxx/ucophome/policies/ec/ • UCLA E-mail Policy and Guidelines: xxxx://xxx.xxxxxxxxxxxxx.xxxx.xxx/app/Default.aspx?&id=455 • IT Services Acceptable Use Policy: xxxx://xxx.xxx.xxxx.xxx/policies/aupdetail.html • The UC Policy on Copyright Ownership: xxxx://xxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx.xxx/resources/copyright-ownership.html • Bruin OnLine Service Level Agreement: xxxx://xxx.xxx.xxxx.xxx/policies/BOL_SLA.pdf Any violation may result in technology related privileges being restricted or revoked and may also result in The University undertaking disciplinary action. If the violation constitutes a criminal offense, appropriate legal action may be taken.