Your Access and Use Sample Clauses

Your Access and Use. For the Filing Analytics Software, you agree that we collect data in relation to your organisation’s activity during your use of or access to the Software. Such data may be made available by us to another user of the Software. This may or may not include the identity of your organisation, depending on your Licence Package. For the avoidance of doubt, no personal information of individual users will be disclosed to another party.
AutoNDA by SimpleDocs
Your Access and Use. Your access and use of each Service Exchange Service (and any interfaces relating thereto) is subject to the applicable dependencies, requirements, and restrictions in the Service Description Schedule and this Agreement, including the following: • If you are licensing/leasing space and power and/or receiving colocation services from us or our affiliates under a separate agreement you must not be in default of that agreement so long as you access and use the Service Exchange Services. • You must supply and configure your own compatible equipment at the Service Exchange Supported DC to connect to the Service Exchange Services. • You must comply with our then current Acceptable Use Policy available at xxx.xxxxxxxxxxxxx.xxx/xxxxxxxxxx-xxx-xxxxxx/ and other generally applicable operational procedures, technical specifications and directions, rules and regulations relating to the Service Exchange Services made known to you by us, Megaport, or applicable service providers. • You must take reasonable and customary precautions to avoid damage, disruption, or interference with the equipment, network, sites, and systems used to provide the Service Exchange Services or that could expose us or our affiliates or suppliers or licensors to risks or liability. • You must comply with applicable laws and regulations. • You may only use the Service Exchange Services for your internal business purposes and may not resell or make the Service Exchange Services available to any third party without our prior written consent. • You must implement and maintain reasonable and appropriate security measures, including with respect to equipment, networks, data transmissions, and malicious code or activities (e.g., denial of service attacks or overloading networks or systems with data). • You may not reverse engineer or decompile the Service Exchange Services or any interfaces or components relating thereto.
Your Access and Use. Subject to your compliance with this XXXX, as well as any other applicable policies, Xxxx Xxxx Labs grants you non-exclusive, non-transferable, license to install, access to, modify, and use of, the Products worldwide (subject to applicable export laws) during the term of this XXXX (as described below) solely for research, private study and personal use of Products. This license is personal to you, and you may not resell our Products, permit other users access to our Products through your account. Your right to use our Products is limited by all terms and conditions set forth in this XXXX. Except for your pre-existing rights and this license granted to you, we and our licensors retain all rights, titles and interests in and to our Products, all related intellectual property rights, including trademarks (whether registered or pending), domain and business names. Our Products are protected by applicable intellectual property laws, including United States copyright law and international treaties. Except for the foregoing license, you have no other rights in the Products and you may not modify, edit, copy, reproduce, create derivative works of, reverse engineer, alter, enhance or in any way exploit the Products in any manner. If you breach any of this XXXX, the above license will terminate automatically. You will be deemed to have taken any action that you permit, assist or facilitate any person or entity to take related to this XXXX, your content or use of the Products. You are responsible for end usersuse of your content and the Products. You will ensure that all end users comply with your obligations under this XXXX and that the terms of your agreement with each end user are consistent with this XXXX. If you become aware of any violation of your obligations under this XXXX caused by an end user, you will immediately suspend access to your content and the Products by such end user. We do not provide any support or services to end users unless we have a separate agreement with you or an end user obligating us to provide such support or services.

Related to Your Access and Use

  • Access and Use 1. Each Party shall ensure that enterprises of the other Party have access to and use of any public telecommunications network or service, including leased circuits, offered in its territory or across its borders on a timely basis and on terms and conditions that are reasonable and non-discriminatory such as those set out in paragraphs 2 to 6.

  • User Access Transfer Agent shall have a process to promptly disable access to Fund Data by any Transfer Agent personnel who no longer requires such access. Transfer Agent will also promptly remove access of Fund personnel upon receipt of notification from Fund.

  • General Access BCA agrees to provide Agency with access to the Minnesota Criminal Justice Data Communications Network (CJDN) and those systems and tools which the Agency is authorized by law to access via the CJDN for the purposes outlined in Minn. Stat. § 299C.46.

  • Network Services Local Access Services In lieu of any other rates and discounts, Customer will pay fixed monthly recurring local loop charges ranging from $1,200 to $2,000 for TDM-based DS-3 Network Services Local Access Services at 2 CLLI codes mutually agreed upon by Customer and Company.

  • Union Access to Premises Representatives of the Union shall have access to the Company’s premises to carry on inspections or investigations pertaining to the terms and conditions of this Agreement, upon reasonable advance notice to the Company. Such access shall be carried on at reasonable hours and in such a manner so as not to interfere with the normal operations of the Company. The Union will advise the Company of its designated representatives who wish to gain access to the premises and the Union agrees to comply with all reasonable Company security precautions as may be in force from time to time.

  • Technology Access A. Contractor expressly acknowledges that state funds may not be expended in connection with the purchase of an automated information system unless that system meets certain statutory requirements relating to accessibility by persons with visual impairments. Accordingly, Contractor represents and warrants to System Agency that the technology provided to System Agency for purchase (if applicable under this Contract or any related Solicitation) is capable, either by virtue of features included within the technology or because it is readily adaptable by use with other technology, of:

  • Elsevier Open Access Terms and Conditions You can publish open access with Elsevier in hundreds of open access journals or in nearly 2000 established subscription journals that support open access publishing. Permitted third party re-use of these open access articles is defined by the author's choice of Creative Commons user license. See our open access license policy for more information. Terms & Conditions applicable to all Open Access articles published with Elsevier: Any reuse of the article must not represent the author as endorsing the adaptation of the article nor should the article be modified in such a way as to damage the author's honour or reputation. If any changes have been made, such changes must be clearly indicated. The author(s) must be appropriately credited and we ask that you include the end user license and a DOI link to the formal publication on ScienceDirect. If any part of the material to be used (for example, figures) has appeared in our publication with credit or acknowledgement to another source it is the responsibility of the user to ensure their reuse complies with the terms and conditions determined by the rights holder. Additional Terms & Conditions applicable to each Creative Commons user license:

  • Maintaining Confidentiality of Access Passwords Where access to the Licensed Materials is to be controlled by use of passwords, Licensee shall secure that Participating Institutions will use reasonable efforts to inform Authorized Users that they should not divulge their numbers and passwords to any third party. Licensee shall secure that Participating Institutions will also use reasonable efforts to maintain the confidentiality of any institutional passwords provided by Licensor.

  • WILEY OPEN ACCESS TERMS AND CONDITIONS Wiley Publishes Open Access Articles in fully Open Access Journals and in Subscription journals offering Online Open. Although most of the fully Open Access journals publish open access articles under the terms of the Creative Commons Attribution (CC BY) License only, the subscription journals and a few of the Open Access Journals offer a choice of Creative Commons Licenses. The license type is clearly identified on the article.

  • ICANN Access Registry Operator shall provide bulk access to the zone files for the TLD to ICANN or its designee on a continuous basis in the manner ICANN may reasonably specify from time to time. Access will be provided at least daily. Zone files will include SRS data committed as close as possible to 00:00:00 UTC.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!