Your Access and Use Sample Clauses

Your Access and Use. For the Filing Analytics Software, you agree that we collect data in relation to your organisation’s activity during your use of or access to the Software. Such data may be made available by us to another user of the Software. This may or may not include the identity of your organisation, depending on your Licence Package. For the avoidance of doubt, no personal information of individual users will be disclosed to another party.
AutoNDA by SimpleDocs
Your Access and Use. Your access and use of each Service Exchange Service (and any interfaces relating thereto) is subject to the applicable dependencies, requirements, and restrictions in the Service Description Schedule and this Agreement, including the following:
Your Access and Use. Subject to your compliance with this XXXX, as well as any other applicable policies, Xxxx Xxxx Labs grants you non-exclusive, non-transferable, license to install, access to, modify, and use of, the Products worldwide (subject to applicable export laws) during the term of this XXXX (as described below) solely for research, private study and personal use of Products. This license is personal to you, and you may not resell our Products, permit other users access to our Products through your account. Your right to use our Products is limited by all terms and conditions set forth in this XXXX. Except for your pre-existing rights and this license granted to you, we and our licensors retain all rights, titles and interests in and to our Products, all related intellectual property rights, including trademarks (whether registered or pending), domain and business names. Our Products are protected by applicable intellectual property laws, including United States copyright law and international treaties. Except for the foregoing license, you have no other rights in the Products and you may not modify, edit, copy, reproduce, create derivative works of, reverse engineer, alter, enhance or in any way exploit the Products in any manner. If you breach any of this XXXX, the above license will terminate automatically. You will be deemed to have taken any action that you permit, assist or facilitate any person or entity to take related to this XXXX, your content or use of the Products. You are responsible for end usersuse of your content and the Products. You will ensure that all end users comply with your obligations under this XXXX and that the terms of your agreement with each end user are consistent with this XXXX. If you become aware of any violation of your obligations under this XXXX caused by an end user, you will immediately suspend access to your content and the Products by such end user. We do not provide any support or services to end users unless we have a separate agreement with you or an end user obligating us to provide such support or services.
Your Access and Use. Your access and use of each Service Exchange Service (and any interfaces relating thereto) is subject to the applicable dependencies, requirements, and restrictions in the Service Description Schedule and this Agreement, including the following: • If you are licensing/leasing space and power and/or receiving colocation services from us or our affiliates under a separate agreement you must not be in default of that agreement so long as you access and use the Service Exchange Services.‌ • You must supply and configure your own compatible equipment at the Service Exchange Supported DC to connect to the Service Exchange Services. • You must comply with our then current Acceptable Use Policy available at xxx.xxxxxxxxxxxxx.xxx/xxxxxxxxxx-xxx-xxxxxx/ and other generally applicable operational procedures, technical specifications and directions, rules and regulations relating to the Service Exchange Services made known to you by us, Megaport, or applicable service providers. • You must take reasonable and customary precautions to avoid damage, disruption, or interference with the equipment, network, sites, and systems used to provide the Service Exchange Services or that could expose us or our affiliates or suppliers or licensors to risks or liability. • You must comply with applicable laws and regulations. • You may only use the Service Exchange Services for your internal business purposes and may not resell or make the Service Exchange Services available to any third party without our prior written consent. • You must implement and maintain reasonable and appropriate security measures, including with respect to equipment, networks, data transmissions, and malicious code or activities (e.g., denial of service attacks or overloading networks or systems with data). • You may not reverse engineer or decompile the Service Exchange Services or any interfaces or components relating thereto.

Related to Your Access and Use

  • Access and Use 1. Each Party shall ensure that any service supplier of the other Party is accorded access to and use of public telecommunications transport networks and services in a timely fashion, on transparent, reasonable and nondiscriminatory terms and conditions. This obligation shall be applied, inter alia, through paragraphs 2 through 6. 2. Each Party shall ensure that service suppliers of the other Party have access to and use of any public telecommunications transport network or service offered within or across the border of that Party, including private leased circuits, and to this end shall ensure, subject to the provisions of paragraphs 5 and 6, that such suppliers are permitted: (a) to purchase or lease and attach terminal or other equipment which interfaces with the network and which is necessary to supply their services; (b) to interconnect private leased or owned circuits with public telecommunications transport networks and services or with circuits leased or owned by other service suppliers; (c) to use operating protocols of their choice in the supply of any service, other than as necessary to ensure the availability of telecommunications transport networks and services to the public generally; and (d) to perform switching, signaling and processing functions. 3. Each Party shall ensure that service suppliers of the other Party may use public telecommunications transport networks and services for the movement of information 4. Notwithstanding the provisions of paragraph 3, a Party may take such measures as are necessary: (a) to ensure the security and confidentiality of messages; or (b) to protect the personal data of users of public telecommunications transport networks or services, subject to the requirement that such measures are not applied in a manner which would constitute a means of arbitrary or unjustifiable discrimination or a disguised restriction on trade in services. 5. Each Party shall ensure that no condition is imposed on access to and use of public telecommunications transport networks and services other than as necessary: (a) to safeguard the public service responsibilities of suppliers of public telecommunications transport networks and services, in particular their ability to make their networks or services available to the public generally; or (b) to protect the technical integrity of public telecommunications transport networks or services.

  • REMOTE ACCESS SERVICES ADDENDUM The Custodian and each Fund agree to be bound by the terms of the Remote Access Services Addendum hereto.

  • Access and Confidentiality (a) Until the earlier of the Closing Date and the date on which this Agreement is terminated pursuant to Article 10, Seller shall afford to Purchaser and its officers and authorized agents and representatives reasonable access during normal business hours to the properties, books, records, contracts, documents, files and other information of or relating to the Assets and the Assumed Liabilities; provided, however, that nothing herein shall afford Purchaser the right to review any information to the extent relating solely to loans held by Seller not constituting Loans, including information regarding borrowers, or any information to the extent relating solely to Seller’s other branches, facilities and operations not subject to this Agreement. Seller shall identify to Purchaser, within fifteen (15) calendar days after the date hereof, a group of its salaried personnel (with the necessary expertise and experience to assist Purchaser) that shall constitute a “transition group” who will be available to Purchaser at reasonable times during normal business hours to provide information and assistance in connection with Purchaser’s investigation of matters relating to the Assets, the Assumed Liabilities and transition matters. Such transition group will also work cooperatively to identify and resolve issues arising from any commingling of Records with Seller’s records for its other branches, assets and operations not subject to this Agreement. Seller shall furnish Purchaser with such additional financial and operating data and other information about its business operations at the Branches as may be reasonably necessary for the orderly transfer of the business operations of the Branches and any mutually agreeable cooperative customer retention effort; provided, however, that nothing herein shall afford Purchaser the right to review any information relating to loans held by Seller not constituting Loans, including information regarding borrowers or any information relating to Seller’s other branches, facilities and operations not subject to this Agreement. Any investigation pursuant to this Section 7.2(a) shall be conducted in such manner as not to unreasonably interfere with the conduct of Seller’s business. Notwithstanding the foregoing, Seller shall not be required to provide access to or disclose information where such access or disclosure would impose an unreasonable burden on Seller, or any employee of Seller, or would violate or prejudice the rights of customers, jeopardize any attorney-client privilege or contravene any law, rule, regulation, order, judgment, decree, fiduciary duty or binding agreement entered into and disclosed to Purchaser prior to the date of this Agreement. Seller and Purchaser shall use Commercially Reasonable Efforts to make appropriate substitute disclosure arrangements under circumstances in which the restrictions of the preceding sentence apply. (b) From and after the Closing, Seller shall keep confidential non-public information in its possession (other than information which was or becomes available to Seller on a non-confidential basis from a source other than Purchaser or any of its Affiliates) relating to Purchaser, its Affiliates, the Branches, the Assets and the Assumed Liabilities; provided, however, that Seller shall not be liable hereunder with respect to any disclosure to the extent such disclosure is required pursuant to legal process (including pursuant to the assertion of Seller’s rights under this Agreement) (by interrogatories, subpoena, civil investigative demand or similar process), regulatory process or request, or to the extent such disclosure is reasonably necessary for purposes of compliance by Seller or its Affiliates with tax or regulatory reporting requirements; provided that in the event of any disclosure pursuant to legal process Seller exercises Commercially Reasonable Efforts to preserve the confidentiality of the non-public information disclosed, including by cooperating with Purchaser to obtain an appropriate protective order or other reliable assurance that confidential treatment will be accorded the non-public information required to be disclosed. (c) From and after the Closing, Purchaser shall keep confidential non-public information in its possession (other than information which was or becomes available to Purchaser on a non-confidential basis from a source other than Seller or any of its Affiliates) relating to Seller and its Affiliates other than the Branches, the Assets and the Assumed Liabilities; provided, however that Purchaser shall not be liable hereunder with respect to any disclosure to the extent such disclosure is required pursuant to legal process (including pursuant to the assertion of Purchaser’s rights under this Agreement) (by interrogatories, subpoena, civil investigative demand or similar process) or regulatory process or request; provided that in the event of any disclosure pursuant to legal process Purchaser exercises Commercially Reasonable Efforts to preserve the confidentiality of the non-public information disclosed, including by cooperating with Seller to obtain an appropriate protective order or other reliable assurance that confidential treatment will be accorded the non-public information required to be disclosed.

  • Data Access and Proprietary Information 6.1 The Fund acknowledges that the databases, computer programs, screen formats, report formats, interactive design techniques, and documentation manuals furnished to the Fund by the Transfer Agent as part of the Fund’s ability to access certain Fund Confidential Information maintained by the Transfer Agent on databases under the control and ownership of the Transfer Agent or other third party (“Data Access Services”) constitute copyrighted, trade secret, or other proprietary information of substantial value to the Transfer Agent or other third party (collectively, “Transfer Agent Proprietary Information”). In no event shall Transfer Agent Proprietary Information be deemed Fund Confidential Information. The Fund agrees to treat all Transfer Agent Proprietary Information as proprietary to the Transfer Agent and further agrees that it shall not divulge any Transfer Agent Proprietary Information to any person or organization except as may be provided hereunder. Without limiting the foregoing, the Fund agrees for itself and its employees and agents to: (a) Use such programs and databases (i) solely on the Fund’s computers or on computers of Federated Services Company or its affiliates (collectively, “Fund Computers”), or (ii) solely from equipment at the location agreed to between the Fund and the Transfer Agent and (iii) solely in accordance with the Transfer Agent’s applicable user documentation; (b) Refrain from copying or duplicating in any way (other than in the normal course of performing processing on the Fund Computers), the Transfer Agent Proprietary Information; (c) Refrain from obtaining unauthorized access to any portion of the Transfer Agent Proprietary Information, and if such access is inadvertently obtained, to inform Transfer Agent in a timely manner of such fact and dispose of such information in accordance with the Transfer Agent’s instructions; (d) Refrain from causing or allowing information transmitted from the Transfer Agent’s computer to the Fund’s terminal to be retransmitted to any other computer terminal or other device except as expressly permitted by the Transfer Agent (such permission not to be unreasonably withheld); (e) Allow the Fund to have access only to those authorized transactions as agreed to between the Fund and the Transfer Agent; and (f) Honor all reasonable written requests made by the Transfer Agent to protect at the Transfer Agent’s expense the rights of the Transfer Agent in the Transfer Agent Proprietary Information at common law, under federal copyright law and under other federal or state law. 6.2 The Fund shall take reasonable efforts to advise its employees of their obligations pursuant to this Section 6. The obligations of this Section shall survive any earlier termination of this Agreement. 6.3 If the Fund notifies the Transfer Agent that any of the Data Access Services do not operate in material compliance with the most recently issued user documentation for such services, the Transfer Agent shall use its best efforts in a timely manner to correct such failure. Organizations from which the Transfer Agent may obtain certain data included in the Data Access Services are solely responsible for the contents of such data and the Fund agrees to make no claim against the Transfer Agent arising out of the contents of such third-party data, including, but not limited to, the accuracy thereof; provided, however, that the Fund shall be entitled to insist that the Transfer Agent, and the Transfer Agent for the benefit of the Fund shall, enforce any and all rights under applicable contracts for the Data Access Services. SUBJECT TO THE FOREGOING OBLIGATIONS OF THE TRANSFER AGENT, DATA ACCESS SERVICES AND ALL COMPUTER PROGRAMS AND SOFTWARE SPECIFICATIONS USED IN CONNECTION THEREWITH ARE PROVIDED ON AN AS IS, AS AVAILABLE BASIS. EXCEPT AS OTHERWISE PROVIDED HEREIN TO THE CONTRARY, THE TRANSFER AGENT EXPRESSLY DISCLAIMS ALL WARRANTIES INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. 6.4 If the transactions available to the Fund include the ability to originate Proper Instructions through electronic instructions to the Transfer Agent in order to: (i) effect the transfer or movement of cash or Shares; or (ii) transmit Shareholder information or other information, then in such event the Transfer Agent shall be entitled to rely on the validity and authenticity of such Proper Instructions without undertaking any further inquiry as long as such Proper Instruction is undertaken in conformity with applicable security procedures.

  • User Access Transfer Agent shall have a process to promptly disable access to Fund Data by any Transfer Agent personnel who no longer requires such access. Transfer Agent will also promptly remove access of Fund personnel upon receipt of notification from Fund.

  • General Access BCA agrees to provide Agency with access to the Minnesota Criminal Justice Data Communications Network (CJDN) and those systems and tools which the Agency is authorized by law to access via the CJDN for the purposes outlined in Minn. Stat. § 299C.46.

  • Network Services Local Access Services In lieu of any other rates and discounts, Customer will pay fixed monthly recurring local loop charges ranging from $1,200 to $2,000 for TDM-based DS-3 Network Services Local Access Services at 2 CLLI codes mutually agreed upon by Customer and Company.

  • Technology Access Contractor expressly acknowledges that state funds may not be expended in connection with the purchase of an automated information system unless that system meets certain statutory requirements relating to accessibility by persons with visual impairments. Accordingly, Contractor represents and warrants to System Agency that the technology provided to System Agency for purchase (if applicable under this Contract or any related Solicitation) is capable, either by virtue of features included within the technology or because it is readily adaptable by use with other technology, of: • providing equivalent access for effective use by both visual and non-visual means; • presenting information, including prompts used for interactive communications, in formats intended for non-visual use; and • being integrated into networks for obtaining, retrieving, and disseminating information used by individuals who are not blind or visually impaired. For purposes of this Section, the phrase “equivalent access” means a substantially similar ability to communicate with or make use of the technology, either directly by features incorporated within the technology or by other reasonable means such as assistive devices or services which would constitute reasonable accommodations under the Americans With Disabilities Act or similar state or federal laws. Examples of methods by which equivalent access may be provided include, but are not limited to, keyboard alternatives to mouse commands and other means of navigating graphical displays, and customizable display appearance. In accordance with Section 2157.005 of the Texas Government Code, the Technology Access Clause contract provision remains in effect for any contract entered into before September 1, 2006.

  • Access and Cooperation Each Party will, and will cause its Other Indemnified Persons to, cooperate and assist in all reasonable respects regarding such Third Party Claim, including by promptly making available to such other Party (and its legal counsel and other professional advisers with a reasonable need to know) all books and records of such Person relating to such Third Party Claim, subject to reasonable confidentiality precautions.

  • ICANN Access Registry Operator shall provide bulk access to the zone files for the TLD to ICANN or its designee on a continuous basis in the manner ICANN may reasonably specify from time to time. Access will be provided at least daily. Zone files will include SRS data committed as close as possible to 00:00:00 UTC.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!