Use of the Information System Sample Clauses

Use of the Information System. 3.1. The right of Customer to use the Information System is subject to the Service Agreement, subject to Customer’s compliance with all of the terms and conditions thereof and of this Agreement, and subject to the respective technical stage of development and technical 3.2. Upon the execution of the Service Agreement, UD Trucks Group (or Importer, as applicable) shall, where applicable, provide to Customer the login information in order for Customer to access the Portal, register/accept its vehicles to the Portal and start using the Services Customer subscribes to. Customer shall comply with Article 32 of the GDPR and shall protect the security of the Information System at all times by ensuring that access and login credentials are maintained safely. 3.3. Customer shall ensure and be responsible for compliance with UD Trucks Group’s user guidelines and manuals in respect of each vehicle. 3.4. Customer is aware that the Information System may not be available in all countries. The availability requires in particular that UD Trucks Group: (i) has made relevant actions to set up the Portal for the use of the Services in the specific country; (ii) received required certificates and other necessary permits regarding the use of the Services and the Hardware in the specific country; and (iii) entered into relevant agreements with GSM/GPRS and/or satellite operators. If any of above conditions is not fulfilled, UD Trucks Group and/or Authorized Providers may, at any time, deactivate or not activate any or all the Hardware on the relevant vehicle. Customer may only use the Portal for such vehicles for which Customer has obtained the necessary Hardware and registry for the Services. 3.5. Customer is responsible for any registration, deregistration, and other processes in relation to the Services and/or any recording of data in respect of each vehicle, effected by its personnel. Customer is in particular solely responsible for ensuring that: (i) any and all actions required for the collection, processing and use of data related to the Services are taken; (ii) Customer informs UD Trucks Group (and Importer, as applicable) about any sale or change in ownership of a registered vehicle; (iii) Customer deregisters any registered vehicle in due course if Customer no longer owns or otherwise has a registered vehicle at Customer’s disposal; (iv) Customer’s passwords and access information in relation to the access and use of the Services are restricted to authorized users on...
AutoNDA by SimpleDocs
Use of the Information System. To facilitate the Services, CORD shall provide to Orphan access to CORD's or an affiliate of CORD's Information System, consisting of the computer hardware and software and other components described in the attached Exhibit E (the "System"), and shall provide the services relating to Orphan's use of the System which are described in that Exhibit. Access to the System shall be provided pursuant to a System Access Agreement in the form of the attached Exhibit F, which agreement (the "System Access Agreement") shall be executed by the Parties concurrently with this agreement. As ----------------- *** Denotes confidential information that has been omitted from the exhibit and filed separately, accompanied by a confidential treatment request, with the Securities and Exchange Commission pursuant to Rule 24b-2 of the Securities Exchange Act of 1934. consideration for its use of the System, Orphan shall pay to CORD the information systems development, monthly and unit of measure fees described in ss.8 of this agreement and listed on the attached Exhibit D. The System shall be made available to Orphan's Facility (including provision of up to five CRT terminals or terminal emulation cards for personal computers), so long as Orphan first has in place a local area network sufficient to support all Orphan terminals and personal computers which will have access to the System and a centralized server sufficient for data storage related to Orphan' use of the System. All costs and expenses associated with establishing initial hook-up of all communication and electronic information lines necessary for interface of the System with Orphan's information systems located in Minnetonka, Minnesota will be included in the Information Systems Development Fee; provided that Orphan will pay all such costs and expenses should Orphan choose to relocate the CORD computer terminals or re-direct the flow of information from its current location in Minnetonka, Minnesota. Orphan shall have sole responsibility for payment of all costs and expenses of maintaining all such communication and electronic information lines. CORD shall designate an employee of it or one of its affiliates who shall be responsible for acting as liaison between Orphan and CORD, and providing support and maintenance to Orphan, in connection with its use of the System. CORD and Orphan shall each assign knowledgeable and qualified employees of that party or its affiliates, as reasonably determined by that party, to facili...

Related to Use of the Information System

  • Access to Information Systems Access, if any, to DXC’s Information Systems is granted solely to perform the Services under this Order, and is limited to those specific DXC Information Systems, time periods and personnel as are separately agreed to by DXC and Supplier from time to time. DXC may require Supplier’s employees, subcontractors or agents to sign individual agreements prior to access to DXC’s Information Systems. Use of DXC Information Systems during other time periods or by individuals not authorized by DXC is expressly prohibited. Access is subject to DXC business control and information protection policies, standards and guidelines as may be modified from time to time. Use of any other DXC Information Systems is expressly prohibited. This prohibition applies even when an DXC Information System that Supplier is authorized to access, serves as a gateway to other Information Systems outside Supplier’s scope of authorization. Supplier agrees to access Information Systems only from specific locations approved for access by DXC. For access outside of DXC premises, DXC will designate the specific network connections to be used to access Information Systems.

  • Voice Information Service Traffic 5.1 For purposes of this Section 5, (a) Voice Information Service means a service that provides [i] recorded voice announcement information or [ii] a vocal discussion program open to the public, and (b) Voice Information Service Traffic means intraLATA switched voice traffic, delivered to a Voice Information Service. Voice Information Service Traffic does not include any form of Internet Traffic. Voice Information Service Traffic also does not include 555 traffic or similar traffic with AIN service interfaces, which traffic shall be subject to separate arrangements between the Parties. Voice Information Service Traffic is not subject to Reciprocal Compensation charges under Section 7 of the Interconnection Attachment. 5.2 If a PNG Customer is served by resold Verizon dial tone line Telecommunications Service or a Verizon Local Switching UNE, to the extent reasonably feasible, Verizon will route Voice Information Service Traffic originating from such Service or UNE to the appropriate Voice Information Service connected to Verizon’s network unless a feature blocking such Voice Information Service Traffic has been installed. For such Voice Information Service Traffic, PNG shall pay to Verizon without discount any Voice Information Service provider charges billed by Verizon to PNG. PNG shall pay Verizon such charges in full regardless of whether or not PNG collects such charges from its Customer. 5.3 PNG shall have the option to route Voice Information Service Traffic that originates on its own network to the appropriate Voice Information Service connected to Verizon’s network. In the event PNG exercises such option, PNG will establish, at its own expense, a dedicated trunk group to the Verizon Voice Information Service serving switch. This trunk group will be utilized to allow PNG to route Voice Information Service Traffic originated on its network to Verizon. For such Voice Information Service Traffic, unless PNG has entered into a written agreement with Verizon under which PNG will collect from PNG’s Customer and remit to Verizon the Voice Information Service provider’s charges, PNG shall pay to Verizon without discount any Voice Information Service provider charges billed by Verizon to PNG. PNG shall pay Verizon such charges in full regardless of whether or not PNG collects such charges from its own Customer.

  • Use of websites (a) The Borrower may satisfy its obligation to deliver any public information to the Lenders by posting this information onto an electronic website designated by the Borrower and the Administrative Agent (the “Designated Website”) by notifying the Administrative Agent (i) of the address of the website together with any relevant password specifications and (ii) that such information has been posted on the website; provided, that in any event the Borrower shall supply the Administrative Agent with one copy in paper form of any information which is posted onto the website. (b) The Administrative Agent shall supply each Lender with the address of and any relevant password specifications for the Designated Website following designation of that website by the Borrower and the Administrative Agent. (c) The Borrower shall promptly upon becoming aware of its occurrence notify the Administrative Agent if: (i) the Designated Website cannot be accessed due to technical failure; (ii) the password specifications for the Designated Website change; (iii) any new information which is required to be provided under this Agreement is posted onto the Designated Website; (iv) any existing information which has been provided under this Agreement and posted onto the Designated Website is amended; or (v) the Borrower becomes aware that the Designated Website or any information posted onto the Designated Website is or has been infected by any electronic virus or similar software. If the Borrower notifies the Administrative Agent under Section 5.3(c)(i) or Section 5.3(c)(v) above, all information to be provided by the Borrower under this Agreement after the date of that notice shall be supplied in paper form unless and until the Administrative Agent is satisfied that the circumstances giving rise to the notification are no longer continuing.

  • Information Systems The Customer is aware that vehicles manufactured, supplied or marketed by a company within the Volvo Group are equipped with one or more systems which may gather and store information about the vehicle (the “Information Systems”), including but not limited to information relating to vehicle condition and performance and information relating to the operation of the vehicle (together, the “Vehicle Data”). The Customer agrees not to interfere with the operation of the Information System in any way.

  • Line Information Database LIDB is a transaction-oriented database accessible through Common Channel Signaling (CCS) networks. For access to LIDB, MyLineToo must purchase appropriate signaling links pursuant to Section 10 of this Attachment. LIDB contains records associated with End User Line Numbers and Special Billing Numbers. LIDB accepts queries from other Network Elements and provides appropriate responses. The query originator need not be the owner of LIDB data. LIDB queries include functions such as screening billed numbers that provides the ability to accept Collect or Third Number Billing calls and validation of Telephone Line Number based non-proprietary calling cards. The interface for the LIDB functionality is the interface between BellSouth’s CCS network and other CCS networks. LIDB also interfaces to administrative systems.

  • Use of De-identified information De-identified information may be used by the Contractor for the purposes of development, research, and improvement of educational sites, services, or applications, as any other member of the public or party would be able to use de-identified data pursuant to 34 CFR 99.31(b). Contractor agrees not to attempt to re-identify de-identified Student Data.

  • zone Information Publication ICANN’s publication of root-zone contact information for the TLD will include Registry Operator and its administrative and technical contacts. Any request to modify the contact information for the Registry Operator must be made in the format specified from time to time by ICANN at xxxx://xxx.xxxx.xxx/domains/root/.

  • WHO WILL BE MADE AWARE OF THE INFORMATION DISCLOSED ON THE SPR AND ANY UPDATES?

  • Web Site Information on registration for and use of the E-Verify program can be obtained via the Internet at the Department of Homeland Security Web site: xxxx://xxx.xxx.xxx/E-Verify.

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!