Protection Against Misuse of Data Sample Clauses

Protection Against Misuse of Data. The Software contains a function that prevents loss or misuse of critical data in direct connection with theft of a computer. This function is switched off under the default settings of the Software and an ESET account under special Terms of Usage needs to be created for it to be activated, through which the function activates data collection in the event of computer theft. If you activate this function of the Software, you agree to data about the stolen computer being sent to the Provider, which can include data about the computer’s network location, data about the configuration of the computer, data recorded by a camera connected to the computer or failed attempts to unlock computer (hereinafter referred to as “Data”). The End User shall be entitled to use Data obtained in this way exclusively for rectifying an adverse situation caused by theft of a computer and also grants the Provider the necessary approval, as specified under the relevant legal regulations, for processing Data. The Provider shall allow End User to store the Data on its technical equipment for the period required to achieve the purpose for which the data was obtained. You can deactivate this function at any time. Protection against misuse of data shall be used exclusively with computers and accounts End User have legitimate access to. Any illegal use will be reported to competent authority. Provider will comply with relevant laws and assist law enforcement authorities in case of the misuse. You agree and acknowledge that You are responsible for safeguarding the password to access ESET account and you agree that You shall not disclose your password to any third party. End User is responsible for any activity using Protection Against Misuse of Data function and ESET account, authorized or not. If ESET account is compromised, notify Provider immediately.
AutoNDA by SimpleDocs

Related to Protection Against Misuse of Data

  • Protection of Data The Contractor agrees to store Data on one or more of the following media and protect the Data as described:

  • Use of Data (a) In connection with the provision of the services and the discharge of its other obligations under this Agreement, State Street (which term for purposes of this Section XXIX includes each of its parent company, branches and affiliates (''Affiliates")) may collect and store information regarding a Trust and share such information with its Affiliates, agents and service providers in order and to the extent reasonably necessary (i) to carry out the provision of services contemplated under this Agreement and other agreements between the Trusts and State Street or any of its Affiliates and (ii) to carry out management of its businesses, including, but not limited to, financial and operational management and reporting, risk management, legal and regulatory compliance and client service management.

  • Protection of Customer Data The Supplier shall not delete or remove any proprietary notices contained within or relating to the Customer Data. The Supplier shall not store, copy, disclose, or use the Customer Data except as necessary for the performance by the Supplier of its obligations under this Call Off Contract or as otherwise Approved by the Customer. To the extent that the Customer Data is held and/or Processed by the Supplier, the Supplier shall supply that Customer Data to the Customer as requested by the Customer and in the format (if any) specified by the Customer in the Call Off Order Form and, in any event, as specified by the Customer from time to time in writing. The Supplier shall take responsibility for preserving the integrity of Customer Data and preventing the corruption or loss of Customer Data. The Supplier shall perform secure back-ups of all Customer Data and shall ensure that up-to-date back-ups are stored off-site at an Approved location in accordance with any BCDR Plan or otherwise. The Supplier shall ensure that such back-ups are available to the Customer (or to such other person as the Customer may direct) at all times upon request and are delivered to the Customer at no less than six (6) Monthly intervals (or such other intervals as may be agreed in writing between the Parties). The Supplier shall ensure that any system on which the Supplier holds any Customer Data, including back-up data, is a secure system that complies with the Security Policy and the Security Management Plan (if any). If at any time the Supplier suspects or has reason to believe that the Customer Data is corrupted, lost or sufficiently degraded in any way for any reason, then the Supplier shall notify the Customer immediately and inform the Customer of the remedial action the Supplier proposes to take. If the Customer Data is corrupted, lost or sufficiently degraded as a result of a Default so as to be unusable, the Supplier may: require the Supplier (at the Supplier's expense) to restore or procure the restoration of Customer Data to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer, and the Supplier shall do so as soon as practicable but not later than five (5) Working Days from the date of receipt of the Customer’s notice; and/or itself restore or procure the restoration of Customer Data, and shall be repaid by the Supplier any reasonable expenses incurred in doing so to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer. Confidentiality

  • Source of Data A description of (1) the process used to identify Paid Claims in the Population and (2) the specific documentation relied upon by the IRO when performing the Claims Review (e.g., medical records, physician orders, certificates of medical necessity, requisition forms, local medical review policies (including title and policy number), CMS program memoranda (including title and issuance number), Medicare carrier or intermediary manual or bulletins (including issue and date), other policies, regulations, or directives).‌‌‌

  • Consent to Use of Data You agree that the Licensor may collect and use technical data and related information, including but not limited to technical information about your device, system and application software, and peripherals, that is gathered periodically to facilitate the provision of software updates, product support and other services (if any) related to the Software. The Licensor may use this information, as long as it is in a form that does not personally identify you, to improve its products or to provide services or technologies.

  • Government Data Practices and Intellectual Property The Contractor and State shall comply with the Minnesota Government Data Practices Act, Minn. Stat. ch.

  • Use of Data by User Registry Operator will permit user to use the zone file for lawful purposes; provided that (a) user takes all reasonable steps to protect against unauthorized access to and use and disclosure of the data and (b) under no circumstances will Registry Operator be required or permitted to allow user to use the data to, (i) allow, enable, or otherwise support the transmission by email, telephone, or facsimile of mass unsolicited, commercial advertising or solicitations to entities other than user’s own existing customers, or (ii) enable high volume, automated, electronic processes that send queries or data to the systems of Registry Operator or any ICANN-­‐accredited registrar.

  • Protection of Confidential Information The Servicer shall keep confidential and shall not divulge to any party, without the Seller’s prior written consent, any nonpublic information pertaining to the Mortgage Loans or any borrower thereunder, except to the extent that it is appropriate for the Servicer to do so in working with legal counsel, auditors, taxing authorities or other governmental agencies or it is otherwise in accordance with Accepted Servicing Practices.

  • Rights of Data Subjects 3.1 Data Subject Requests. ClickDimensions shall, to the extent legally permitted, promptly notify Customer if ClickDimensions receives a request from a Data Subject to exercise the Data Subject's right of access, right to rectification, restriction of Processing, erasure (“right to be forgotten”), data portability, object to the Processing, or its right not to be subject to an automated individual decision making (“Data Subject Request”). Taking into account the nature of the Processing, ClickDimensions shall assist Customer by appropriate technical and organizational measures, insofar as this is possible, for the fulfilment of Customer’s obligation to respond to a Data Subject Request under Data Protection Laws and Regulations. In addition, to the extent Customer, in its use of the Services, does not have the ability to address a Data Subject Request, ClickDimensions shall upon Customer’s request provide commercially reasonable efforts to assist Customer in responding to such Data Subject Request, to the extent ClickDimensions is legally permitted to do so and the response to such Data Subject Request is required under Data Protection Laws and Regulations. To the extent legally permitted, Customer shall be responsible for any costs arising from ClickDimensions’ provision of such assistance.

  • Protection of Trade Secrets or Confidential Information If the Contractor considers any portion of materials made or received in the course of performing the Contract (“contract-related materials”) to be trade secret under section 688.002 or 812.081, F.S., or otherwise confidential under Florida or federal law, the Contractor must clearly designate that portion of the materials as trade secret or otherwise confidential when submitted to the Department. The Contractor will be responsible for responding to and resolving all claims for access to contract-related materials it has designated trade secret or otherwise confidential. If the Department is served with a request for discovery of contract-related materials designated by the Contractor as trade secret or otherwise confidential, the Contractor will be responsible for filing the appropriate motion or objection in response to the request for discovery. The Department will provide materials designated trade secret or otherwise confidential if the Contractor fails to take appropriate and timely action to protect the materials designated as trade secret or otherwise confidential. The Contractor will protect, defend, indemnify, and hold harmless the Department for claims, costs, fines, and attorney’s fees arising from or relating to its designation of contract-related materials as trade secret or otherwise confidential.

Time is Money Join Law Insider Premium to draft better contracts faster.