Use Of Your Device To Access PICKUP App Sample Clauses

Use Of Your Device To Access PICKUP App. You acknowledge and agree that you are responsible for the acquisition, cost, and maintenance of Your Device as well as any necessary wireless data plan. Following execution of this Agreement, the Company will grant you a personal, non-exclusive, non-transferable license to install and use the PICKUP App on Your Device solely for the purpose of providing Delivery Services. You agree to not provide, distribute, share, or enable the provision, distribution or sharing of the PICKUP App (or any data associated therewith) with any third party. The foregoing license grant shall immediately terminate and you will delete and fully remove the PICKUP App from Your Device in the event that you cease to provide Delivery Services using Your Device. You agree that: (1) use of the PICKUP App on Your Device requires an active data plan with a wireless carrier associated with Your Device, which data plan will be provided by you at your own expense; and (2) use of the PICKUP App on Your Device as an interface with the PICKUP Services may consume very large amounts of data through the data plan. The Company shall not be responsible or liable for any fees, costs, or overage charges associated with any data plan.
AutoNDA by SimpleDocs

Related to Use Of Your Device To Access PICKUP App

  • Use of Your Information 6.1 We will use the information we have about you and your use of the Services for marketing purposes. However, we will not do so if you ask us not to.

  • USE OF YOUR CARD You may use Your Card to buy goods and services in any place that it is honored and to get cash advances at participating financial institutions. You agree not to use Your Card for illegal transactions including, but not limited to, advances made for the purpose of gambling and/or wagering where such practices are in violation of applicable state and/or federal law.

  • USE OF TBS ACCESS CODE (a) An Account Holder may operate the TBS in relation to his Account by using his TBS Access Code.

  • Collection and Use of Your Information You acknowledge that when you download, install, or use the Application, Company may use automatic means (including, for example, cookies and web beacons) to collect information about your Mobile Device and about your use of the Application. You also may be required to provide certain information about yourself as a condition to downloading, installing, or using the Application or certain of its features or functionality, and the Application may provide you with opportunities to share information about yourself with others. All information we collect through or in connection with this Application is subject to our Privacy Policy. By downloading, installing, using, and providing information to or through this Application, you consent to all actions taken by us with respect to your information in compliance with the Privacy Policy.

  • PROTECTION OF YOUR CONTENT 5.1 In order to protect Your Content provided to Oracle as part of the provision of the Services, Oracle will comply with the applicable administrative, physical, technical and other safeguards, and other applicable aspects of system and content management, available at xxxx://xxx.xxxxxx.xxx/us/corporate/contracts/cloud-services/index.html.

  • Transmission and Routing of Exchange Access Traffic PURSUANT TO 251(c)(2) 13 5.1 Scope of Traffic 13 5.2 Trunk Group Architecture and Traffic Routing 13 5.3 Logical Trunk Groups 13 5.4 End Office Access 13 ARTICLE VI MEET-POINT BILLING ARRANGEMENTS 14 6.1 Meet-Point Billing Services 14 6.2 Data Format and Data Transfer 14 6.3 Errors or Loss of Access Usage Data 15 6.4 Payment 15 6.5 Additional Limitation of Liability Applicable to Meet-Point Billing Arrangements 16 ARTICLE VII BLV/BLVI TRAFFIC 16

  • Protection of Your Data We will maintain administrative, physical, and technical safeguards for protection of the security, confidentiality and integrity of Your Data, as described in the Documentation. Those safeguards will include, but will not be limited to, measures for preventing access, use, modification or disclosure of Your Data by Our personnel except (a) to provide the Purchased Services and prevent or address service or technical problems, (b) as compelled by law in accordance with Section 8.3 (Compelled Disclosure) below, or (c) as You expressly permit in writing.

  • HOW WE MAY USE YOUR PERSONAL INFORMATION 8.1 We will use the personal information You provide to Us to:

  • Use of Trunk Forecasts Trunk forecasts provided pursuant to this Agreement must be prepared in good faith but are not otherwise binding on CBB or Verizon.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization. Measures: • Multiple authorization levels are used when granting access to sensitive systems, including those storing and processing Personal Data. Authorizations are managed via defined processes according to the SAP Security Policy • All personnel access SAP’s systems with a unique identifier (user ID). • SAP has procedures in place so that requested authorization changes are implemented only in accordance with the SAP Security Policy (for example, no rights are granted without authorization). In case personnel leaves the company, their access rights are revoked. • SAP has established a password policy that prohibits the sharing of passwords, governs responses to password disclosure, and requires passwords to be changed on a regular basis and default passwords to be altered. Personalized user IDs are assigned for authentication. All passwords must fulfill defined minimum requirements and are stored in encrypted form. In the case of domain passwords, the system forces a password change every six months in compliance with the requirements for complex passwords. Each computer has a password-protected screensaver. • The company network is protected from the public network by firewalls. • SAP uses up–to-date antivirus software at access points to the company network (for e-mail accounts), as well as on all file servers and all workstations. • Security patch management is implemented to provide regular and periodic deployment of relevant security updates. Full remote access to SAP’s corporate network and critical infrastructure is protected by strong authentication.

Time is Money Join Law Insider Premium to draft better contracts faster.