Use of Video Security Records Sample Clauses

Use of Video Security Records. Fraudulent use or unauthorized disclosure of information contained in video feeds or tampering of equipment by unauthorized personnel without proper legal authority may result in violation and prosecution IAW appropriate law, rule, and regulation.
AutoNDA by SimpleDocs

Related to Use of Video Security Records

  • Malicious Use of Orphan Glue Records Registry Operator shall take action to remove orphan glue records (as defined at xxxx://xxx.xxxxx.xxx/en/committees/security/sac048.pdf) when provided with evidence in written form that such records are present in connection with malicious conduct.

  • Collection and Use of Your Information You acknowledge that when you download, install, or use the Application, Company may use automatic means (including, for example, cookies and web beacons) to collect information about your Mobile Device and about your use of the Application. You also may be required to provide certain information about yourself as a condition to downloading, installing, or using the Application or certain of its features or functionality, and the Application may provide you with opportunities to share information about yourself with others. All information we collect through or in connection with this Application is subject to our Privacy Policy. By downloading, installing, using, and providing information to or through this Application, you consent to all actions taken by us with respect to your information in compliance with the Privacy Policy.

  • Web site Information on registration for and use of the E-Verify program can be obtained via the Internet at the Department of Homeland Security Web site: xxxx://xxx.xxx.xxx/E-Verify.

  • System Security and Data Safeguards When SAP is given access to Licensee’s systems and data, SAP shall comply with Licensee’s reasonable administrative, technical, and physical safeguards to protect such data and guard against unauthorized access. In connection with such access, Licensee shall be responsible for providing Consultants with user authorizations and passwords to access its systems and revoking such authorizations and terminating such access, as Licensee deems appropriate from time to time. Licensee shall not grant SAP access to Licensee systems or personal information (of Licensee or any third party) unless such access is essential for the performance of Services under the Agreement. The parties agree that no breach of this provision shall be deemed to have occurred in the event of SAP non-conformance with the aforementioned safeguard but where no personal information has been compromised.

  • Use of the Website Unless otherwise stated, Xxxxxx Support Services owns the intellectual property and rights to all content and material on the Website. Subject to the license below, all intellectual property rights are reserved. You may view, download (for caching purposes only), and print pages for your personal use, subject to the restrictions set out below and elsewhere in these Terms of Use. The following uses are not permitted: ● Republication of content from the Website, unless content is specifically and expressly made available for republication; ● Sale, rental or sub-license of any content from the Website; ● Reproduction or duplication of any content on the Website for commercial purposes; ● Modification of any content on this website, unless content is specifically and expressly made available for modification; ● Redistribution of content of the Website, unless content is specifically and expressly made available for redistribution. Users are permitted to share content on social media channels, as long as a link to the Website is included. From time to time, the Website will utilize various plugins or widgets to allow sharing of content via social media channels, email or other methods. Use of these plugins or widgets does not constitute any waiver of Xxxxxx Support Services’ intellectual property rights. Such use is a limited license to republish the content on the approved social media channels, with full credit to Xxxxxx Support Services. You must not use the Website in a way that causes, or may cause, damage to the Website or impair the availability of access to the Website. You must not decompile, reverse engineer, disassemble or otherwise reduce the Website, except to the extent that such activity is expressly permitted by applicable law. You must not use the Website to copy, store, host, transmit, send, use, publish or distribute any material that consists of (or is linked to) any spyware, computer virus, Trojan horse, worm, keystroke logger, rootkit and/or other harmful code or malicious software. You must not conduct any systematic or automated data collection activities, including, but not limited to scraping, data mining, data extraction or data harvesting on or in relation to the Website without Xxxxxx Support Services' express written permission. You must not use the Website to transmit or send any unsolicited commercial communications. You must not use the Website for any third-party marketing without Xxxxxx Support Services' express written permission.

  • Domain Name Data 1.5.1 Query format: whois EXAMPLE.TLD

  • Use of Customer Data Verizon, Verizon Affiliates and their respective agents, may use, process and/or transfer Customer Data (including intra-group transfers and transfers to entities in countries that do not provide statutory protections for personal information) as set forth in the Privacy Policy and as necessary:

  • Line Information Database 9.1 LIDB is a transaction-oriented database accessible through Common Channel Signaling (CCS) networks. For access to LIDB, e-Tel must purchase appropriate signaling links pursuant to Section 10 of this Attachment. LIDB contains records associated with End User Line Numbers and Special Billing Numbers. LIDB accepts queries from other Network Elements and provides appropriate responses. The query originator need not be the owner of LIDB data. LIDB queries include functions such as screening billed numbers that provides the ability to accept Collect or Third Number Billing calls and validation of Telephone Line Number based non-proprietary calling cards. The interface for the LIDB functionality is the interface between BellSouth’s CCS network and other CCS networks. LIDB also interfaces to administrative systems.

  • MARC Records When applicable to the Licensed Materials, at Licensee’s request, Licensor shall provide full OCLC-quality batched sets of MARC records incorporating Licensee specifications at no additional cost by the date of the execution of this License Agreement. Updates to existing records and new title records, matching the schedule of release and delivery of new publications, will be provided on a mutually agreed-upon schedule and in a format that renders them useful to the Licensee and/or the Participating Institutions.

  • Use of Data by User Registry Operator will permit user to use the zone file for lawful purposes; provided that (a) user takes all reasonable steps to protect against unauthorized access to and use and disclosure of the data and (b) under no circumstances will Registry Operator be required or permitted to allow user to use the data to, (i) allow, enable, or otherwise support the transmission by email, telephone, or facsimile of mass unsolicited, commercial advertising or solicitations to entities other than user’s own existing customers, or (ii) enable high volume, automated, electronic processes that send queries or data to the systems of Registry Operator or any ICANN-­‐accredited registrar.

Time is Money Join Law Insider Premium to draft better contracts faster.