User Database Sample Clauses

User Database. User may use the Chapter 13 Data to establish and maintain a database that is accessible only by User or Authorized Persons and that is only used for purposes consistent with this Agreement. User also agrees that it will not, either directly or indirectly, compile, store, maintain or use the Chapter 13 Data to build a database that is accessible by persons other than User or that is used for purposes that are inconsistent with this Agreement.
AutoNDA by SimpleDocs
User Database. ImmuneCyte shall provide to ThermoGenesis a user database within three (3) months of execution of this contract and update the database at least once per year to include end user name, contact name, address, e-mail, phone number.
User Database. (1) Data Recipient declares its agreement that details disclosed by it shall be removed by all users at the Data Recipient upon the termination of the scientific project in Article 1.2.
User Database. (1) Data Recipient declares its agreement that details disclosed by it in the context of this contract may be stored and processed by Data Provider. (2) The details in keeping with subsection 1 shall be used to control the user agreements, for obligations of Data Provider to account for its actions and for publication in user lists.
User Database. Buyer acknowledges and agrees that all ------------- information regarding users and members of the Business that is included in Seller's database of such information has been provided to Seller upon the terms and subject to the conditions of Seller's privacy policy and terms and conditions. Seller agrees that it will utilize such information in accordance with applicable Legal Requirements and such privacy policy and terms and conditions.

Related to User Database

  • User Data We will maintain certain data that you transmit to the Services for the purpose of managing the performance of the Services, as well as data relating to your use of the Services. Although we perform regular routine backups of data, you are solely responsible for all data that you transmit or that relates to any activity you have undertaken using the Services. You agree that we shall have no liability to you for any loss or corruption of any such data, and you hereby waive any right of action against us arising from any such loss or corruption of such data.

  • Customer Data 8.1 You, not bookinglab or JRNI, have sole responsibility for the entry, deletion, correction, accuracy, quality, integrity, legality, reliability, appropriateness, and right to use the Customer Data. bookinglab and JRNI is not responsible for any of the foregoing or for any destruction, damage, loss, or failure to store any Customer Data beyond its reasonable control or resulting from any failure in data transmission or operation of the Booking Service by you. 8.2 As of the MSA Start Date, JRNI is certified under ISO 27001 and shall maintain an information security program for the Services that complies with the ISO 27001 standards or such other standards as are substantially equivalent to ISO 27001. 8.3 If JRNI and/or bookinglab processes any Personal Data on your behalf when performing its obligations under this Agreement, the Parties acknowledge that you shall be the Data Controller and JRNI and/or bookinglab shall be a Data Processor and in any such case: (a) you shall ensure that you are entitled to transfer the relevant Customer Personal Data to JRNI and/or bookinglab so that they may lawfully use, process and transfer the Customer Personal Data in accordance with this Agreement on your behalf; (b) you shall ensure that the relevant third parties have been informed of, and have given their consent to, such use, processing, and transfer as required by all applicable Data Protection Laws; (c) each Party shall take appropriate technical and organisational measures against unauthorised or unlawful processing of the personal data or its accidental loss, destruction or damage; and (d) notwithstanding any other provision of this Agreement, but subject always to Appendix B(1) Data Protection and B(2) Data Processing Activities, nothing shall prevent JRNI or bookinglab from disclosing Customer Personal Data or Customer Data to their Group Companies, Affiliates and third party service providers as necessary to provide the Services in accordance with clause 3, and otherwise in order to comply with Applicable Law or at the request of a governmental, regulatory or supervisory authority. 8.4 From the MSA Start Date the Parties shall comply with Appendix B(1) Data Protection and Appendix B(2) Data Processing Activities 8.5 ensure that Customer Data and Personal Data deemed as a special category of Data under GDPR is not given to us in any form unless pre-agreed by us in writing 8.6 You are solely responsible and liable for any transfer of Customer Data made by you (or made by JRNI or bookinglab at your request) from the Booking Service to a third party and for ensuring that such transfer is in compliance with the Parties' obligations under the Data Protection Laws.

  • Database The LERG is available through Telcordia. ICONN is available through the Qwest web site.

  • Web Site Information on registration for and use of the E-Verify program can be obtained via the Internet at the Department of Homeland Security Web site: xxxx://xxx.xxx.xxx/E-Verify.

  • Line Information Database LIDB is a transaction-oriented database accessible through Common Channel Signaling (CCS) networks. For access to LIDB, MyLineToo must purchase appropriate signaling links pursuant to Section 10 of this Attachment. LIDB contains records associated with End User Line Numbers and Special Billing Numbers. LIDB accepts queries from other Network Elements and provides appropriate responses. The query originator need not be the owner of LIDB data. LIDB queries include functions such as screening billed numbers that provides the ability to accept Collect or Third Number Billing calls and validation of Telephone Line Number based non-proprietary calling cards. The interface for the LIDB functionality is the interface between BellSouth’s CCS network and other CCS networks. LIDB also interfaces to administrative systems.

  • User Content You retain your rights in Your Content, subject to the rights granted below and our rights in Our Property (as defined below). You hereby grant and agree to grant us a worldwide, non-exclusive, perpetual, irrevocable, royalty-free, fully-paid, transferable license, with the right to sublicense through multiple tiers, to copy, edit, modify, adapt, publish, transmit, distribute, prepare derivative works, perform, display and to otherwise use in any manner, Your Content in connection with operation and promotion of the Service and any other purposes reasonably related to the Service or our business. To the extent reasonably necessary or appropriate to effect or support the license granted by you above, you hereby waive and agree to waive (or if not waivable, agree not to assert) any rights of privacy or publicity, or any moral rights or other similar rights, with respect to Your Content. You agree that we are not responsible for any use or disclosure of Your Content by other Users or any third party who gains access to it through the Service (which may include unintended activities by third parties, such as by hackers). You represent and warrant that you own all proprietary rights in Your Content or, with respect to any of Your Content you do not own, that you have the full authority and right to create, upload, store and/or transmit Your Content, and to grant the licenses and rights you have granted in this Agreement, and that your creation, uploading, storage and/or transmission of Your Content, and the exercise by us and other Users of the licenses and rights granted by you herein, shall not infringe any third party intellectual property or proprietary rights, nor violate any rights of privacy or publicity. We do not control User Content, and we are not responsible for its content, accuracy or reliability. We are under no obligation to edit or control User Content, although we reserve the right to review, and take certain actions with respect to, User Content in accordance with this Agreement, including the Privacy Policy (as defined below). In the event that we deem, in our sole discretion, any User Content to be inconsistent with the terms of this Agreement, the Privacy Policy, or any other rules or policies we may publish from time to time, we may remove such User Content from the Service, including incomplete posts, duplicate posts, or any other User Content we deem, in our sole discretion, to be misleading or otherwise inappropriate. On termination of your account, or this Agreement, we have no obligation to return any User Content to you, so you should retain copies of all of Your Content. In addition to and without limiting any other rights herein (including in the Privacy Policy), you also grant us the rights to (i) de-identify Your Content (i.e., to remove your name and other identifying characteristics, consistent with applicable laws and regulations), (ii) use or disclose de-identified data for any purpose, and (iii) share de- identified data with third parties.

  • Protection of Customer Data The Supplier shall not delete or remove any proprietary notices contained within or relating to the Customer Data. The Supplier shall not store, copy, disclose, or use the Customer Data except as necessary for the performance by the Supplier of its obligations under this Call Off Contract or as otherwise Approved by the Customer. To the extent that the Customer Data is held and/or Processed by the Supplier, the Supplier shall supply that Customer Data to the Customer as requested by the Customer and in the format (if any) specified by the Customer in the Call Off Order Form and, in any event, as specified by the Customer from time to time in writing. The Supplier shall take responsibility for preserving the integrity of Customer Data and preventing the corruption or loss of Customer Data. The Supplier shall perform secure back-ups of all Customer Data and shall ensure that up-to-date back-ups are stored off-site at an Approved location in accordance with any BCDR Plan or otherwise. The Supplier shall ensure that such back-ups are available to the Customer (or to such other person as the Customer may direct) at all times upon request and are delivered to the Customer at no less than six (6) Monthly intervals (or such other intervals as may be agreed in writing between the Parties). The Supplier shall ensure that any system on which the Supplier holds any Customer Data, including back-up data, is a secure system that complies with the Security Policy and the Security Management Plan (if any). If at any time the Supplier suspects or has reason to believe that the Customer Data is corrupted, lost or sufficiently degraded in any way for any reason, then the Supplier shall notify the Customer immediately and inform the Customer of the remedial action the Supplier proposes to take. If the Customer Data is corrupted, lost or sufficiently degraded as a result of a Default so as to be unusable, the Supplier may: require the Supplier (at the Supplier's expense) to restore or procure the restoration of Customer Data to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer, and the Supplier shall do so as soon as practicable but not later than five (5) Working Days from the date of receipt of the Customer’s notice; and/or itself restore or procure the restoration of Customer Data, and shall be repaid by the Supplier any reasonable expenses incurred in doing so to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer.

  • Monthly Data Download Not later than fifteen (15) days after the end of each month, beginning with the month in which the Commencement Date occurs and ending with the Final Shared-Loss Recovery Month, Assuming Bank shall provide Receiver:

  • Device Data We may share certain personal information and device-identifying technical data about you and your devices with third party service providers, who will compare and add device data and fraud data from and about you to a database of similar device and fraud information in order to provide fraud management and prevention services, which include but are not limited to identifying and blocking access to the applicable service or Web site by devices associated with fraudulent or abusive activity. Such information may be used by us and our third party service providers to provide similar fraud management and prevention services for services or Web sites not provided by us. We will not share with service providers any information that personally identifies the user of the applicable device.

  • Use of Customer Data Verizon, Verizon Affiliates and their respective agents, may use, process and/or transfer Customer Data (including intra-group transfers and transfers to entities in countries that do not provide statutory protections for personal information) as set forth in the Privacy Policy and as necessary: (a) in connection with provisioning of Services; (b) to incorporate Customer Data into databases controlled by Verizon, Verizon Affiliates or their respective agents for the purpose of providing Services; administration; provisioning; invoicing and reconciliation; verification of Customer identity, solvency and creditworthiness; maintenance, support and product development; fraud detection and prevention; sales, revenue and customer analysis and reporting; market and customer use analysis including in the manner described in the Privacy Policy; and (c) to communicate to Customer regarding Services.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!