Secure use Sample Clauses

Secure use. You are responsible for the secure use of the Services. This includes securing Your account authentication credentials, protecting the security of Your data when in transit to and from the Services and taking any appropriate steps to securely encrypt or export any of Your data uploaded to the Services. You are additionally responsible for ensuring that You do not accidentally make any private content publicly available. COMPU-DATA strongly recommends You use COMPU-DATA’s advanced security (Circle of Trust) encryption (which is solely Your decision) to protect against unauthorized access to documents, information and data stored on the System, in particular with respect to documents that contain information and data that may be subject to federal, state or foreign laws, regulations, rules or pronouncements relating to maintenance and protection of the privacy of such information and data, including, without limitation, any such data or information that may be considered as “personal information” or “personally identifiable information” (or any variant thereof) or “protected health information” (or any variant thereof). You agree to use commercially reasonable efforts such as the data encryption option (Circle of Trust) offered by COMPU-DATA to prevent unauthorized access to or use of Services and notify us promptly of any such unauthorized access or use.
AutoNDA by SimpleDocs
Secure use. Licensee must maintain and support administrative, technical or physical methods used to monitor compliance with the Permissible Use(s) authorized in this Agreement across all Licensee business practices, including Subrecipients. Methods may include any of the following:
Secure use. Any improper access or use of HPC secure data resources may result in suspension of the HSDA and the members’ access until the ITS security group can investigate and decide to either re-enstate or permanently disable the account.
Secure use. You are responsible for the secure use of the Services. This includes securing Your account authentication credentials, protecting the security of Your data when in transit to and from the Services and taking any appropriate steps to securely encrypt or export any of Your data uploaded to the Services. You are additionally responsible for ensuring that You do not accidentally make any private content publicly available. You agree to use commercially reasonable efforts to prevent unauthorized access to or use of Services, and notify us promptly of any such unauthorized access or use.

Related to Secure use

  • Vehicle Use 5.2.1 Each Lessee may use Lease Vehicles leased hereunder in connection with its car rental business, including use by such Lessee’s and its subsidiaries’ employees, directors, officers, agents, representatives and other business associates in their personal or professional capacities, subject to Sub-Clause 6.1 (

  • Exclusive Use (A) After the Occupancy Date, Lessee expressly agrees and warrants that the Leased Premises will be used exclusively as a Champps Restaurant or other casual dining sit-down restaurant. In any other such case, after obtaining Lessor's prior written consent, such consent not to be unreasonably withheld or delayed, Lessee may conduct any lawful business from the Leased Premises. Lessee acknowledges and agrees that any other use without the prior written consent of Lessor will constitute a default under and a violation and breach of this Lease. Lessee agrees: To open for business within a reasonable period of time after completion of construction of the contemplated Improvements; to operate all of the Leased Premises during the Term or Renewal Terms during regular and customary hours for businesses similar to the permitted exclusive use stated herein, unless prevented from doing so by causes beyond Lessee's control or due to remodeling; and to conduct its business in a professional and reputable manner.

  • Generating Facility The Interconnection Customer’s device for the production of electricity identified in the Interconnection Request, but shall not include the Interconnection Customer’s Interconnection Facilities.

  • Data Use Each party may use Connected Account Data in accordance with this Agreement and the consent (if any) each obtains from each Connected Account. This consent includes, as to Stripe, consent it receives via the Connected Account Agreement.

  • License; Use Upon delivery to an Authorized Person or a person reasonably believed by Custodian to be an Authorized Person of the Fund of software enabling the Fund to obtain access to the System (the “Software”), Custodian grants to the Fund a personal, nontransferable and nonexclusive license to use the Software solely for the purpose of transmitting Written Instructions, receiving reports, making inquiries or otherwise communicating with Custodian in connection with the Account(s). The Fund shall use the Software solely for its own internal and proper business purposes and not in the operation of a service bureau. Except as set forth herein, no license or right of any kind is granted to the Fund with respect to the Software. The Fund acknowledges that Custodian and its suppliers retain and have title and exclusive proprietary rights to the Software, including any trade secrets or other ideas, concepts, know-how, methodologies, or information incorporated therein and the exclusive rights to any copyrights, trademarks and patents (including registrations and applications for registration of either), or other statutory or legal protections available in respect thereof. The Fund further acknowledges that all or a part of the Software may be copyrighted or trademarked (or a registration or claim made therefor) by Custodian or its suppliers. The Fund shall not take any action with respect tot the Software inconsistent with the foregoing acknowledgement, nor shall the Fund attempt to decompile, reverse engineer or modify the Software. The Fund may not xxx, sell, lease or provide, directly or indirectly, any of the Software of any portion thereof to any other person or entity without Custodian’s prior written consent. The Fund may not remove any statutory copyright notice or other notice included in the Software or on any media containing the Software. The Fund shall reproduce any such notice on any reproduction of the Software and shall add any statutory copyright notice or other notice to the Software or media upon Custodian’s request.

  • Software Use Case Red Hat Enterprise Linux Developer Suite Subscription Services for Red Hat Enterprise Linux Developer Suite are available for Development Purposes only.

  • Modification of the Small Generating Facility The Interconnection Customer must receive written authorization from the NYISO and Connecting Transmission Owner before making any change to the Small Generating Facility that may have a material impact on the safety or reliability of the New York State Transmission System or the Distribution System. Such authorization shall not be unreasonably withheld. Modifications shall be done in accordance with Good Utility Practice. If the Interconnection Customer makes such modification without the prior written authorization of the NYISO and Connecting Transmission Owner, the Connecting Transmission Owner shall have the right to temporarily disconnect the Small Generating Facility. If disconnected, the Small Generating Facility will not be reconnected until the unauthorized modifications are authorized or removed.

  • Master Use The Licensor hereby grants to Licensee a non-exclusive license (this "License) to record vocal synchronization to the Composition partly or in its entirety and substantially in its original form ("Master Recording")

  • Facility Use The Employer shall allow individuals the use of gender- segregated facilities, such as restrooms, locker rooms, and dressing rooms that are consistent with that individual's gender expression or gender identity. In such facilities where undressing in the presence of others occurs, the Employer shall allow access to and use of a facility consistent with that individual's gender expression or gender identity.

  • Preservation, Maintenance, and Protection of the Property Inspections. Borrower will not destroy, damage, or impair the Property, allow the Property to deteriorate, or commit waste on the Property. Whether or not Borrower is residing in the Property, Borrower must maintain the Property in order to prevent the Property from deteriorating or decreasing in value due to its condition. Unless Lender determines pursuant to Section 5 that repair or restoration is not economically feasible, Borrower will promptly repair the Property if damaged to avoid further deterioration or damage. If insurance or condemnation proceeds are paid to Lender in connection with damage to, or the taking of, the Property, Borrower will be responsible for repairing or restoring the Property only if Xxxxxx has released proceeds for such purposes. Lender may disburse proceeds for the repairs and restoration in a single payment or in a series of progress payments as the work is completed, depending on the size of the repair or restoration, the terms of the repair agreement, and whether Borrower is in Default on the Loan. Lender may make such disbursements directly to Borrower, to the person repairing or restoring the Property, or payable jointly to both. If the insurance or condemnation proceeds are not sufficient to repair or restore the Property, Borrower remains obligated to complete such repair or restoration. Lender may make reasonable entries upon and inspections of the Property. If Lender has reasonable cause, Xxxxxx may inspect the interior of the improvements on the Property. Lender will give Borrower notice at the time of or prior to such an interior inspection specifying such reasonable cause.

Time is Money Join Law Insider Premium to draft better contracts faster.