SP Surveillance Data Sample Clauses

SP Surveillance Data. The Service Provider will (a) generate SP Surveillance Data, (b) preserve and maintain all SP Surveillance Data, and (c) provide the Corporation with a copy of such SP Surveillance Data, all in accordance with the BCLC Services Manual, as required to comply with this Article 12.3 and in the manner and at the times Prescribed by the Corporation. The Corporation acknowledges and agrees that the SP Surveillance Data is the sole and exclusive property of the Service Provider. The Service Provider hereby grants to the Corporation an irrevocable, unconditional, perpetual, non-exclusive, royalty-free right (i) to possess, use, maintain, modify, translate, adapt and display the SP Surveillance Data for any purposes consistent with the Corporation’s business and operations and compliance with Applicable Law, including such purposes as the Corporation may, in its discretion, consider necessary or advisable in connection with the operation, security, maintenance of the Facility, (ii) to distribute and transfer such SP Surveillance Data to any third party, or any governmental authority, (iii) to use the SP Surveillance Data in conducting analysis for the purposes of improving or changing any BCLC Services Manual, Services, BCLC IP, and (iv) for the purposes of conduct, management and operation of the Facility.
AutoNDA by SimpleDocs

Related to SP Surveillance Data

  • Video Surveillance All video surveillance will be directed by the YSU police department.

  • Surveillance The COR will receive and document all complaints from Government personnel regarding the services provided. If appropriate, the COR will send the complaints to the Contractor for corrective action.

  • Electronic Surveillance The primary purpose of electronic surveillance is to ensure the health, welfare and safety of all educators, students and visitors to District property and to safeguard District facilities and equipment. As such, the District and the Association agree:

  • Information Technology Enterprise Architecture Requirements If this Contract involves information technology-related products or services, the Contractor agrees that all such products or services are compatible with any of the technology standards found at xxxxx://xxx.xx.xxx/iot/2394.htm that are applicable, including the assistive technology standard. The State may terminate this Contract for default if the terms of this paragraph are breached.

  • Return of University Records Contractor agrees that within thirty (30) days after the expiration or termination of this Agreement, for any reason, all University Records created or received from or on behalf of University will be (1) returned to University, with no copies retained by Contractor; or (2) if return is not feasible, destroyed. Twenty (20) days before destruction of any University Records, Contractor will provide University with written notice of Contractor’s intent to destroy University Records. Within five (5) days after destruction, Contractor will confirm to University in writing the destruction of University Records.

  • Program Integrity The state must have processes in place to ensure that there is no duplication of federal funding for any aspect of the demonstration.

  • Device Data We may share certain personal information and device-identifying technical data about you and your devices with third party service providers, who will compare and add device data and fraud data from and about you to a database of similar device and fraud information in order to provide fraud management and prevention services, which include but are not limited to identifying and blocking access to the applicable service or Web site by devices associated with fraudulent or abusive activity. Such information may be used by us and our third party service providers to provide similar fraud management and prevention services for services or Web sites not provided by us. We will not share with service providers any information that personally identifies the user of the applicable device.

  • Program Monitoring The Contractor will make all records and documents required under this Agreement as outlined here, in OEC Policies and NHECC Policies available to the SRO or its designee, the SR Fiscal Officer or their designee and the OEC. Scheduled monitoring visits will take place twice a year. The SRO and OEC reserve the right to make unannounced visits.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Evaluation Software If the Software is an evaluation version or is provided to You for evaluation purposes, then, unless otherwise approved in writing by an authorized representative of Licensor, Your license to use the Software is limited solely for internal evaluation purposes in non-production use and in accordance with the terms of the evaluation offering under which You received the Software, and expires 90 days from installation (or such other period as may be indicated within the Software). Upon expiration of the evaluation period, You must discontinue use of the Software, return to an original state any actions performed by the Software, and delete the Software entirely from Your system and You may not download the Software again unless approved in writing by an authorized representative of Licensor. The Software may contain an automatic disabling mechanism that prevents its use after a certain period of time. RESTRICTIONS

Time is Money Join Law Insider Premium to draft better contracts faster.