Changes and Upgrades to Subscription Phone(s) Sample Clauses

Changes and Upgrades to Subscription Phone(s). Bark may upgrade, replace, remove, add or otherwise change the Subscription Phone(s) provide as part of your Bark Wireless Services at our discretion at any time during which your Bark Wireless Services are active or following the termination of your Bark Wireless Services. You consent to such changes including software, firmware and other code updates or downloads, with or without notice to you, which may alter, add to, or remove features or functionalities of the Subscription Phone or the Bark Wireless Services. You acknowledge and agree that our addition or removal of or change to the Subscription Phone(s) may interrupt your Bark Wireless Services. Bark may, at its option, provide new or reconditioned Subscription Phones, including replacing your existing Subscription Phone(s). You agree that such changes may be performed within Bark’s sole discretion at any time and in any manner. If Bark requests that you replace, or offers to replace your Subscription Phone(s) in order to provide you with better Bark Wireless Services or stronger security, and you do not do so, Bark is not responsible for any resulting degradation of service or security vulnerabilities. If Bark requires that you replace Subscription Phone(s) and you do not do so, your Bark Wireless Services may be disconnected and/or terminated and applicable fees will apply if your Subscription Phone is not returned as described in Section 8.2.3.
AutoNDA by SimpleDocs

Related to Changes and Upgrades to Subscription Phone(s)

  • Notifications of Outages and Maintenance In the event that a Registry Operator plans maintenance, it will provide notice to the ICANN emergency operations department, at least, twenty-­‐four (24) hours ahead of that maintenance. ICANN’s emergency operations department will note planned maintenance times, and suspend Emergency Escalation services for the monitored services during the expected maintenance outage period. If Registry Operator declares an outage, as per its contractual obligations with ICANN, on services under a service level agreement and performance requirements, it will notify the ICANN emergency operations department. During that declared outage, ICANN’s emergency operations department will note and suspend emergency escalation services for the monitored services involved.

  • Conditions for International Processing SAP shall be entitled to process Personal Data, including by using Subprocessors, in accordance with this DPA outside the country in which the Customer is located as permitted under Data Protection Law.

  • Consent to Emails and Automated Text Messages By participating as a User, you represent that you are the owner of the email address, mobile phone number, and/or other alias you enrolled, or that you have the delegated legal authority to act on behalf of the owner of such email address, mobile phone number and/or other alias to send or receive money as described in this Agreement. You consent to the receipt of emails or text messages from us, from Zelle, from other Users that are sending you money or requesting money from you, and from other Network Banks or their agents regarding the Services or related transfers between Network Banks and you. You agree that we may, Zelle may or either of our agents may use automatic telephone dialing systems in connection with text messages sent to any mobile phone number you enroll. You further acknowledge and agree:

  • Use of artificial intelligence or data analytics You acknowledge that we may use artificial intelligence or data analytics (i.e. technologies that assist or replace human decision-making) whilst providing products and services to you, for purposes including but not limited to risk assessment, statistical, trend analysis and planning; and to make decisions, provide, operate, process and administer your accounts and services with us.

  • Order to Submit to Testing A member's refusal or failure, when ordered, to submit within the time limits provided hereinafter to a test permitted by this Article shall subject the member to discipline. By taking a test under this Article, however, a member shall not be construed as waiving any objection or rights that he or she may possess. Within seventy-two (72) hours of the time the member is ordered to submit to reasonable suspicion testing, the City shall provide the member with a written notice setting forth the information and observations which form the basis of the order to test.

  • Specific Provisions for Access Rights to Software For the avoidance of doubt, the general provisions for Access Rights provided for in this Section 9 are applicable also to Software. Parties’ Access Rights to Software do not include any right to receive source code or object code ported to a certain hardware platform or any right to receive respective Software documentation in any particular form or detail, but only as available from the Party granting the Access Rights.

  • Installation and Use Rights You may install and use any number of copies of the software on your devices.

  • Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.

  • Access to Software Access Rights to Software which is Results shall comprise: Access to the Object Code; and, where normal use of such an Object Code requires an Application Programming Interface (hereafter API), Access to the Object Code and such an API; and, if a Party can show that the execution of its tasks under the Project or the Exploitation of its own Results is technically or legally impossible without Access to the Source Code, Access to the Source Code to the extent necessary. Background shall only be provided in Object Code unless otherwise agreed between the Parties concerned.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

Time is Money Join Law Insider Premium to draft better contracts faster.