Access to the Platform and Account Security Sample Clauses

Access to the Platform and Account Security. The Company reserves the right to amend or withdraw the Platform, and any of the services provide on the Platform, at any time in its sole discretion without notice. The Company will not be liable if, for any reason, all or any part of the Platform is unavailable at any time or for any period. From time to time, the Company may restrict access to some parts of the Platform, or the entire Platform, to users. You are responsible for making all arrangements necessary for You to have access to the Platform. The Company has the right to disable any username, password, or other identifier, whether chosen by You or provided by the Company, at any time in Company’s sole discretion for any or no reason, including if, in Company’s opinion, you have violated any provision of this Agreement. The Company will employ commercially reasonable physical, administrative, and technical safeguards to secure any data, media, and other materials that users submit to the Platform from unauthorized use or disclosure, however, except as expressly required by applicable laws you release and hold Company harmless from and against any claim, damage, loss, action, or expense attributable to any unauthorized use or disclosure of data, media, or other materials users submit to the Platform.
AutoNDA by SimpleDocs

Related to Access to the Platform and Account Security

  • Accessing the Website and Account Security We reserve the right to withdraw or amend this Website and any service or material we provide on the Website in our sole discretion without notice. We will not be liable if for any reason all or any part of the Website is unavailable at any time or for any period. From time to time, we may restrict access to some parts of the Website, or the entire Website, to users, including registered users. To access the Website or some of the resources it offers, you may be asked to provide certain registration details or other information. It is a condition of your use of the Website and any resources downloaded from the Website that all the information you provide on the Website is correct, current, and complete. You agree that all information you provide to register with this Website or otherwise, including but not limited to through the use of any interactive features on the Website, is governed by our Privacy Policy, and you consent to all actions we take with respect to your information consistent with our Privacy Policy. If you choose, or are provided with, a user name, password or any other piece of information as part of our security procedures, you must treat such information as confidential, and you must not disclose it to any other person or entity. You also acknowledge that your account is personal to you and agree not to provide any other person with access to this Website or portions of it using your user name, password or other security information. You agree to notify us immediately of any unauthorized access to or use of your user name or password or any other breach of security. You also agree to ensure that you exit from your account at the end of each session. You should use particular caution when accessing your account from a public or shared computer so that others are not able to view or record your password or other personal information. We have the right to disable any user name, password or other identifier, whether chosen by you or provided by us, at any time in our sole discretion for any or no reason, including if, in our opinion, you have violated any provision of these Terms of Use.

  • Account Security User agrees and acknowledges that to the extent applicable, it will: (i) maintain strict confidentiality of all names, passwords, or other credentials of User’s Authorized End Users; (ii) instructing its Authorized End Users not to allow others to obtain or use their credentials or to access the Software. User is responsible for any costs or damages incurred due to unauthorized use or access through User’s Authorized End Users’ account credentials or systems.

  • Certificate Account; Security Distributions On or before the issuance of the Lower Tier Classes, Xxxxxx Xxx shall either (i) open with an Eligible Depository one or more trust accounts in the name of the Trustee of the Lower Tier REMIC that shall collectively be the “Certificate Account,” (ii) in lieu of maintaining any such account or accounts, maintain the Certificate Account by means of appropriate entries on its books and records designating all amounts credited thereto in respect of the Mortgage Securities and all investments of any such amounts as being held by it in its capacity as Trustee for the benefit of the Holders of the Lower Tier Classes or (iii) maintain the Certificate Account in the form of any combination of accounts or book entries described in clauses (i) and (ii) above. Any manner or manners in which the Certificate Account is maintained may at any time be changed without notice to, or the approval of, Holders of the Lower Tier Classes so long as funds held in the Lower Tier REMIC by, or for the account of, the Trustee shall at all times be identified. To the extent that the Certificate Account is maintained by the Trustee in the manner provided for in clause (ii) above, all references herein to deposits and withdrawals from the Certificate Account shall be deemed to refer to credits and debits to the related books of the Trustee. Xxxxxx Mae shall deposit in the Certificate Account all Security Distributions received by it as Trustee hereunder. All Security Distributions deposited from time to time in the Certificate Account, all investments made with such moneys, including all income or other gain from such investments, shall be held by the Trustee in the Certificate Account as part of the Lower Tier REMIC as herein provided, subject to withdrawal by Xxxxxx Xxx for the purposes set forth in Section 4.05.

  • Security Violations and Accounts Updates Grantee will adhere to the Confidentiality Article requirements and HHS Data Usage Agreement of this contract and immediately contact System Agency if a security violation is detected, or if Grantee has any reason to suspect that the security or integrity of the CMBHS data has been or may be compromised in any way.

  • Dissemination of Research Findings and Acknowledgement of Controlled-Access Datasets Subject to the NIH GDS Policy It is NIH’s intent to promote the dissemination of research findings from use of controlled-access dataset(s) subject to the NIH GDS Policy as widely as possible through scientific publication or other appropriate public dissemination mechanisms. Approved Users are strongly encouraged to publish their results in peer-reviewed journals and to present research findings at scientific meetings.

  • Terms and Conditions Pertaining to Individual Account Service Title Title to Firm Full-Requirements Power Supply will transfer from Competitive Supplier to Participating Customers at the Point of Sale. In accordance with the Distribution Utility's Terms and Conditions for Competitive Suppliers, the Competitive Supplier will be responsible for any and all losses incurred on the local network transmission systems and distribution systems, as determined by the Distribution Utility. Billing and Payment Unless otherwise specified in an Exhibit to this ESA, all billing under this ESA shall be based on the meter readings of each Participating Customer's meter(s) performed by the Distribution Utility. Competitive Supplier shall cause the Distribution Utility to prepare and mail bills to Participating Customers monthly. The Competitive Supplier shall adopt the billing and payment terms offered by the Distribution Utility to its Eligible Customers on Default Service. If actual meter date is unavailable, the Competitive Supplier may cause the Distribution Utility to xxxx based on its good faith estimates of usage. Any overcharge or under-charge will be accounted for in the next billing period for which actual meter data is available. Regional and Local Transmission The prices quoted in Exhibit A do not include current and future charges for distribution service costs collected by the Distribution Utility under its distribution service tariff or local transmission costs as may be imposed by NYISO or individual electric utilities that have FERC transmission tariffs. The Competitive Supplier understands that these costs will be collected by the Distribution Utility. If, in the future, Competitive Supplier becomes responsible for such distribution or transmission costs, Competitive Supplier shall be entitled to collect such costs from Participating Customers to the extent permitted by any Governmental Rules. These costs are "pass through" costs as determined by the appropriate regulatory agencies.

  • Links from the Website If the Website contains links to other sites and resources provided by third parties, these links are provided for your convenience only. This includes links contained in advertisements, including banner advertisements and sponsored links. We have no control over the contents of those sites or resources, and accept no responsibility for them or for any loss or damage that may arise from your use of them. If you decide to access any of the third-party websites linked to this Website, you do so entirely at your own risk and subject to the terms and conditions of use for such websites.

  • ACCESS TO SECURITY LOGS AND REPORTS Upon request, the Contractor shall provide access to security logs and reports to the State or Authorized User in a format as specified in the Authorized User Agreement.

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • Review Procedures for Identifying Entity Accounts With Respect to Which Reporting Is Required For Preexisting Entity Accounts described in paragraph B of this section, the Reporting Finnish Financial Institution must apply the following review procedures to determine whether the account is held by one or more Specified U.S. Persons, by Passive NFFEs with one or more Controlling Persons who are U.S. citizens or residents, or by Nonparticipating Financial Institutions:

Time is Money Join Law Insider Premium to draft better contracts faster.