Use of Data by User Registry Operator will permit user to use the zone file for lawful purposes; provided that (a) user takes all reasonable steps to protect against unauthorized access to and use and disclosure of the data and (b) under no circumstances will Registry Operator be required or permitted to allow user to use the data to, (i) allow, enable, or otherwise support the transmission by email, telephone, or facsimile of mass unsolicited, commercial advertising or solicitations to entities other than user’s own existing customers, or (ii) enable high volume, automated, electronic processes that send queries or data to the systems of Registry Operator or any ICANN-‐accredited registrar.
Use of Volunteers The School covenants and represents that all volunteers it allows access to its students or the Facility will comply with state regulations regarding the use of volunteers set out in Section 6.50.18
Data Use Each party may use Connected Account Data in accordance with this Agreement and the consent (if any) each obtains from each Connected Account. This consent includes, as to Stripe, consent it receives via the Connected Account Agreement.
Malicious Software 43.1 The Supplier shall, as an enduring obligation throughout the Term and for a period of twelve (12) Months after expiry of the Term, use the latest versions of anti-virus definitions and software available from an industry accepted anti-virus software vendor to check for, contain the spread of, and minimise the impact of Malicious Software in the ICT Environment (or as otherwise agreed between the Parties).
Use of Software Any software that is available on the Services ("Software") is the copyrighted work of Red Hat and/or its licensors. Copying or reproducing the Software to any other server or location for further reproduction or redistribution is strictly prohibited, unless such reproduction or redistribution is permitted by a license agreement accompanying such Software. You may not create derivative works of the Software, or attempt to decompile or reverse-engineer the Software unless otherwise permitted by law. Use of the Software is subject to the license terms of any license agreement that may accompany or is provided with the Software. You may not download any Software until you have read and accepted the terms of the accompanying software license. WITHOUT LIMITING THE FOREGOING, THE SOFTWARE IS WARRANTED, IF AT ALL, ONLY ACCORDING TO THE TERMS OF THE SEPARATE LICENSE AGREEMENT ACCOMPANYING THE SOFTWARE. EXCEPT AS WARRANTED IN SUCH LICENSE AGREEMENT, RED HAT, ITS PARENT, SUBSIDIARY, AND AFFILIATE COMPANIES, AND ITS LICENSORS DISCLAIM ALL WARRANTIES AND CONDITIONS WITH REGARD TO THE SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT, TO THE MAXIMUM EXTENT PERMITTED BY LAW.
Cybersecurity; Data Protection The Company’s information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company has implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect its material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with its business, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same. The Company is presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except where the failure to be in compliance would not, individually or in the aggregate, have a Material Adverse Effect.
Description of Vendor Entity and Vendor's Goods & Services If awarded, this description of Vendor and Vendor's goods and services will appear on the TIPS website for customer/public viewing. Texas, Oklahoma for the majority Most states for - Industrial fabrication work Primary Contact Name Please identify the individual who will be primarily responsible for all TIPS matters and inquiries for the duration of the contract. Xxxxx Xxxxxx Primary Contact Title Primary Contact Title Administrator Primary Contact Email Please enter a valid email address that will definitely reach the Primary Contact. xxxxx@xxxxxxxx.xxx Primary Contact Phone Numbers only, no symbols or spaces (Ex. 8668398477). The system will auto-populate your entry with commas once submitted which is appropriate and expected (Ex. 8,668,398,477). Please provide the accurate and current phone number where the individual who will be primarily responsible for all TIPS matters and inquiries for the duration of the contract can be reached directly. 0000000000 Primary Contact Fax Numbers only, no symbols or spaces (Ex. 8668398477). The system will auto-populate your entry with commas once submitted which is appropriate and expected (Ex. 8,668,398,477). 1 0 No response Primary Contact Mobile Numbers only, no symbols or spaces (Ex. 8668398477). The system will auto-populate your entry with commas once submitted which is appropriate and expected (Ex. 8,668,398,477). 1 1 0000000000 Secondary Contact Name Please identify the individual who will be secondarily responsible for all TIPS matters and inquiries for the duration of the contract.
How to Update Your Records It is your responsibility to provide us with true, accurate and complete email addresses, contact, and other information related to your Account(s), and to maintain and update promptly any changes in this information. You can update this information by contacting us.
USE OF NASA NAME AND NASA EMBLEMS A. NASA Name and Initials Partner shall not use "National Aeronautics and Space Administration" or "NASA" in a way that creates the impression that a product or service has the authorization, support, sponsorship, or endorsement of NASA, which does not, in fact, exist. Except for releases under the "Release of General Information to the Public and Media" Article, Partner must submit any proposed public use of the NASA name or initials (including press releases and all promotional and advertising use) to the NASA Associate Administrator for the Office of Communications or designee ("NASA Communications") for review and approval. Approval by NASA Office of Communications shall be based on applicable law and policy governing the use of the NASA name and initials.
LIABILITY FOR UNAUTHORIZED USE-LOST/STOLEN CARD NOTIFICATION If You notice the loss or theft of Your credit card or a possible unauthorized use of Your Card, You should write to Us immediately at P.O. Box 9420, South Portland, ME, 00000-0000 or call Us at 000-000-0000, seven days a week 24 hours a day. You will not be liable for any unauthorized use that occurs after You notify Us. You may, however, be liable for unauthorized use that occurs before Your notice to Us. You will have no liability for unauthorized use unless You are found to be fraudulent or negligent in the handling of Your Account or Card. In any case, Your liability for unauthorized transactions will not exceed $50.