USE OF THE IT SYSTEM Sample Clauses

USE OF THE IT SYSTEM. 25.1. Predominantly, the Client shall transmit instructions to the Company using the IT system provided. The Company shall communicate with the Client exclusively via the IT system. It will be the Client’s responsibility to take all necessary action to ensure that he is able to access any communications that may be sent to him.
AutoNDA by SimpleDocs
USE OF THE IT SYSTEM. In general, the Client shall transmit instruc,ons to the Company using the IT system provided. The Company shall communicate with the Client exclusively via the IT system. It will be the Client’s responsibility to take all necessary ac,on to ensure that he is able to access any communica,ons that may be sent to him. The Client is aware of the fact that using computers and the Internet exposes him to a number of risks including, in par,cular: 1 The possibility that an unauthorized third party might access the Client’s account; 2 The possibility that the rela,onship between the Client and the Company might be revealed; 3 The possibility that computer viruses might infect the Client’s computer system without the Client’s knowledge; 4 The possibility that third par,es might send messages to the Client, claiming to represent the Company. The Client undertakes to obtain full informa,on (and acknowledges that he alone is responsible for doing so) regarding the risks to which he may be exposed and regarding any necessary security measures. The Company will not be liable for any loss suAered by the Client resul,ng from IT use, including in par,cular the ac,ons of unauthorised third par,es passing themselves oA as the Client or the Company, transmission errors, transmission failures, technical faults, overloads, breakdowns (including but not limited to maintenance ac,vi,es due to the maintenance system), system down,me, malfunc,ons, interference, a+acks (e.g. hacking), blocked communica,ons and networks (e.g. mail bombing) or other failures, regardless of who is responsible. The Client will therefore take the necessary precau,ons to ensure the conCden,ality of all informa,on, including, among other things, the system password, user ID, porEolio details, transac,on ac,vi,es, account balances, as well as all other informa,on and all orders. The Client undertakes to no,fy the Company immediately if it comes to his a+en,on that his system password is being used without authorisa,on. The Client hereby assumes all liability arising in connec,on with technical access to the Company’s services. The Client shall be responsible for acquiring, installing and conCguring the appropriate hardware and so$xxxx, in order to set up his connec,on with the Company’s online services. The Company shall not be liable for any ac,ons of the access provider and/or hardware that it has not supplied itself.
USE OF THE IT SYSTEM 

Related to USE OF THE IT SYSTEM

  • Use of the Website Unless otherwise stated, Xxxxxx Support Services owns the intellectual property and rights to all content and material on the Website. Subject to the license below, all intellectual property rights are reserved. You may view, download (for caching purposes only), and print pages for your personal use, subject to the restrictions set out below and elsewhere in these Terms of Use. The following uses are not permitted: ● Republication of content from the Website, unless content is specifically and expressly made available for republication; ● Sale, rental or sub-license of any content from the Website; ● Reproduction or duplication of any content on the Website for commercial purposes; ● Modification of any content on this website, unless content is specifically and expressly made available for modification; ● Redistribution of content of the Website, unless content is specifically and expressly made available for redistribution. Users are permitted to share content on social media channels, as long as a link to the Website is included. From time to time, the Website will utilize various plugins or widgets to allow sharing of content via social media channels, email or other methods. Use of these plugins or widgets does not constitute any waiver of Xxxxxx Support Services’ intellectual property rights. Such use is a limited license to republish the content on the approved social media channels, with full credit to Xxxxxx Support Services. You must not use the Website in a way that causes, or may cause, damage to the Website or impair the availability of access to the Website. You must not decompile, reverse engineer, disassemble or otherwise reduce the Website, except to the extent that such activity is expressly permitted by applicable law. You must not use the Website to copy, store, host, transmit, send, use, publish or distribute any material that consists of (or is linked to) any spyware, computer virus, Trojan horse, worm, keystroke logger, rootkit and/or other harmful code or malicious software. You must not conduct any systematic or automated data collection activities, including, but not limited to scraping, data mining, data extraction or data harvesting on or in relation to the Website without Xxxxxx Support Services' express written permission. You must not use the Website to transmit or send any unsolicited commercial communications. You must not use the Website for any third-party marketing without Xxxxxx Support Services' express written permission.

  • Use of the Card 1. The Cardmember must sign the Card in ink, using a ball point pen, as soon as he or she receives it; the Cardmember must also safeguard the Card and preserve any PIN in extreme secrecy and keep it separate from his or her Card. The Cardmember must not use the Card after the expiration of the validity period embossed on it, and not use the Card after it has been damaged, withdrawn or cancelled.

  • USE OF THE VEHICLE 15.1 The Customer agrees that, during the Rental Period, the Customer will not allow the Vehicle to be:

  • Use of the Site You understand that, except for information, products or services clearly identified as being supplied by OPERA INFOTECH does not operate, control or endorse any information, products or services on the Internet in any way. Except for OPERA INFOTECH identified information, products or services, all information, products and services offered through the Site or on the Internet generally are offered by third parties, that are not affiliated with OPERA INFOTECH a. You also understand that OPERA INFOTECH cannot and does not guarantee or warrant that files available for downloading through the Site will be free of infection or viruses, worms, Trojan horses or other code that manifest contaminating or destructive properties. You are responsible for implementing sufficient procedures and checkpoints to satisfy your particular requirements for accuracy of data input and output, and for maintaining a means external to the Site for the reconstruction of any lost data. YOU ASSUME TOTAL RESPONSIBILITY AND RISK FOR YOUR USE OF THE SITE AND THE INTERNET. OPERA INFOTECH PROVIDES THE SITE AND RELATED INFORMATION "AS IS" AND DOES NOT MAKE ANY EXPRESS OR IMPLIED WARRANTIES, REPRESENTATIONS OR ENDORSEMENTS WHATSOEVER (INCLUDING WITHOUT LIMITATION WARRANTIES OF TITLE OR NONINFRINGEMENT, OR THE IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE) WITH REGARD TO THE SERVICE, ANY MERCHANDISE INFORMATION OR SERVICE PROVIDED THROUGH THE SERVICE OR ON THE INTERNET GENERALLY, AND OPERA INFOTECH SHALL NOT BE LIABLE FOR ANY COST OR DAMAGE ARISING EITHER DIRECTLY OR INDIRECTLY FROM ANY SUCH TRANSACTION. IT IS SOLELY YOUR RESPONSIBILITY TO EVALUATE THE ACCURACY, COMPLETENESS AND USEFULNESS OF ALL OPINIONS, ADVICE, SERVICES, MERCHANDISE AND OTHER INFORMATION PROVIDED THROUGH THE SERVICE OR ON THE INTERNET GENERALLY. OPERA INFOTECH DOES NOT WARRANTI THAT THE SERVICE WILL BE UNINTERRUPTED OR ERROR-FREE OR THAT DEFECTS IN THE SERVICE WILL BE CORRECTED. YOU UNDERSTAND FURTHER THAT THE PURE NATURE OF THE INTERNET CONTAINS UNEDITED MATERIALS SOME OF WHICH ARE SEXUALLY EXPLICIT OR MAY BE OFFENSIVE TO YOU. YOUR ACCESS TO SUCH MATERIALS IS AT YOUR RISK. OPERA INFOTECH HAS NO CONTROL OVER AND ACCEPTS NO RESPONSIBILITY WHATSOEVER FOR SUCH MATERIALS. LIMITATION OF LIABILITYIN NO EVENT WILL OPERA INFOTECH. BE LIABLE FOR (I) ANY INCIDENTAL, CONSEQUENTIAL, OR INDIRECT DAMAGES (INCLUDING, BUT NOT LIMITED TO, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION, LOSS OF PROGRAMS OR INFORMATION, AND THE LIKE) ARISING OUT OF THE USE OF OR INABILITY TO USE THE SERVICE, OR ANY INFORMATION, OR TRANSACTIONS PROVIDED ON THE SERVICE, OR DOWNLOADED FROM THE SERVICE, OR ANY DELAY OF SUCH INFORMATION OR SERVICE. EVEN IF OPERA INFOTECH OR ITS AUTHORIZED REPRESENTATIVES HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES, OR (II) ANY CLAIM ATTRIBUTABLE TO ERRORS, OMISSIONS, OR OTHER INACCURACIES IN THE SERVICE AND/OR MATERIALS OR INFORMATION DOWNLOADED THROUGH THE SERVICE. BECAUSE SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES, THE ABOVE LIMITATION MAY NOT APPLY TO YOU. IN SUCH STATES, OPERA INFOTECH . LIABILITY IS LIMITED TO THE GREATEST EXTENT PERMITTED BY LAW. OPERA INFOTECH makes no representations whatsoever about any other web site which you may access through this one or which may link to this Site. When you access a non- OPERA INFOTECH web site, please understand that it is independent from OPERA INFOTECH. and that OPERA INFOTECH has no control over the content on that web site. In addition, a link to a OPERA INFOTECH web site does not mean that OPERA INFOTECH. endorses or accepts any responsibility for the content, or the use, of such web site.

  • Use of the Secondary Recall List (a) After the exhaustion of the Agency Layoff List for a specific classification within a geographic area, the Secondary Recall List shall be used to fill all positions within a specific classification and geographic area consistent with Section (c) above, until such secondary list is exhausted.

  • Access to System If Business Associate needs access to a Covered Entity Information Technology system to comply with its obligations under the Contract or this Agreement, Business Associate shall request, review, and comply with any and all policies applicable to Covered Entity regarding such system including, but not limited to, any policies promulgated by the Office of Information Technology and available at xxxx://xxx.xxxxx.xx.xx/about/policies.

  • Use of Software Any software that is available on the Services ("Software") is the copyrighted work of Red Hat and/or its licensors. Copying or reproducing the Software to any other server or location for further reproduction or redistribution is strictly prohibited, unless such reproduction or redistribution is permitted by a license agreement accompanying such Software. You may not create derivative works of the Software, or attempt to decompile or reverse-engineer the Software unless otherwise permitted by law. Use of the Software is subject to the license terms of any license agreement that may accompany or is provided with the Software. You may not download any Software until you have read and accepted the terms of the accompanying software license. WITHOUT LIMITING THE FOREGOING, THE SOFTWARE IS WARRANTED, IF AT ALL, ONLY ACCORDING TO THE TERMS OF THE SEPARATE LICENSE AGREEMENT ACCOMPANYING THE SOFTWARE. EXCEPT AS WARRANTED IN SUCH LICENSE AGREEMENT, RED HAT, ITS PARENT, SUBSIDIARY, AND AFFILIATE COMPANIES, AND ITS LICENSORS DISCLAIM ALL WARRANTIES AND CONDITIONS WITH REGARD TO THE SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT, TO THE MAXIMUM EXTENT PERMITTED BY LAW.

  • Use of the Equipment 9.1 The Equipment shall be used by Hospital only at the Site and shall not be removed therefrom. Hospital shall use the Equipment only in the regular and ordinary course of Hospital’s business operations and only within the capacity of the Equipment as determined by Elekta’s specifications. Hospital shall not use nor permit the Equipment to be used in any manner nor for any purpose which, in the opinion of Elekta or GKF, the Equipment is not designed or reasonably suitable.

  • Use of Project Issuer does hereby covenant and agree that it will not take any action during the term of this Agreement, other than pursuant to Article IX of this Agreement or Article IX of the Indenture, to interfere with Company's ownership of the Project or to prevent Company from having possession, custody, use and enjoyment of the Project.

  • Access to Software Access Rights to Software which is Results shall comprise: Access to the Object Code; and, where normal use of such an Object Code requires an Application Programming Interface (hereafter API), Access to the Object Code and such an API; and, if a Party can show that the execution of its tasks under the Project or the Exploitation of its own Results is technically or legally impossible without Access to the Source Code, Access to the Source Code to the extent necessary. Background shall only be provided in Object Code unless otherwise agreed between the Parties concerned.

Time is Money Join Law Insider Premium to draft better contracts faster.