Technology and Security Disclaimer Sample Clauses

Technology and Security Disclaimer. Exhibitor acknowledges that the Platform might be affected by circumstances beyond PDAC’s control, might not be continuous, uninterrupted or secure, and are subject to limitations, delays and other problems inherent in the use of the internet and electronic communications. Except as set out in these Terms & Conditions, PDAC has not made and specifically disclaims any representation or warranty, whether express, implied or statutory, including without limitation, the implied warranties of merchantibility and fitness of the Platform and/or Online Convention for a particular purpose. PDAC makes no representation that the operation of the Platform or the Online Convention will be uninterrupted or error-free, and provides no assurances that Exhibitor will achieve any specific business results from the use of the Platform or the Online Convention. PDAC is not responsible or liable for any delays, failures or any damage, loss or liability resulting from any such delays, limitations or problems. Exhibitor acknowledges that security measures used by PDAC might not protect the Platform, the Website or Exhibitor’s account or the security, integrity or confidentiality of data stored in the Platform or the website. PDAC is not responsible or liable for any unauthorized access to, or use, alteration, theft or destruction of, the Platform or the Website or any related data, whether through accident, fraudulent means or any other method. PDAC is not required to verify the actual identity or authority of Exhibitor, and PDAC may act on any information, instruction or document given through Exhibitor’s Account, provided, however, that PDAC reserves the right to suspend or terminate any Exhibitor’s Account in the event it becomes aware or suspects that that the Exhibitor is utilizing its Account to misrepresent themselves or their products or services, or to engage in malfeasance contrary to these Terms & Conditions.
AutoNDA by SimpleDocs
Technology and Security Disclaimer. Exhibitor acknowledges that the platform might be affected by circumstances beyond PDAC’s control, might not be continuous, uninterrupted or secure, and are subject to limitations, delays and other problems inherent in the use of the internet and electronic communications. PDAC is not responsible or liable for any delays, failures or any damage, loss or liability resulting from any of those problems. Exhibitor acknowledges that security measures used by PDAC might not protect the platform, the website or Exhibitor’s account or the security, integrity or confidentiality of data stored in the platform or the website. PDAC is not responsible or liable for any unauthorized access to, or use, alteration, theft or destruction of, the Platform or the website or any related data, whether through accident, fraudulent means or any other method. PDAC is not required to verify the actual identity or authority of Exhibitor, and PDAC may act on any information, instruction or document given through Exhibitor’s account.

Related to Technology and Security Disclaimer

  • Confidentiality and Security Section 1: Service Provider agrees that all of its employees, contractors, subcontractors, or associates will comply with all state and federal law and with TJJD policies regarding maintaining the confidentiality of TJJD youth, including, but not limited to, maintaining confidentiality of student records and identifying information.

  • Data Privacy and Security Bank will implement and maintain a written information security program, in compliance with all federal, state and local laws and regulations (including any similar international laws) applicable to Bank, that contains reasonable and appropriate security measures designed to safeguard the personal information of the Funds' shareholders, employees, trustees and/or officers that Bank or any Subcustodian receives, stores, maintains, processes, transmits or otherwise accesses in connection with the provision of services hereunder. In this regard, Bank will establish and maintain policies, procedures, and technical, physical, and administrative safeguards, designed to (i) ensure the security and confidentiality of all personal information and any other confidential information that Bank receives, stores, maintains, processes or otherwise accesses in connection with the provision of services hereunder, (ii) protect against any reasonably foreseeable threats or hazards to the security or integrity of personal information or other confidential information, (iii) protect against unauthorized access to or use of personal information or other confidential information, (iv) maintain reasonable procedures to detect and respond to any internal or external security breaches, and (v) ensure appropriate disposal of personal information or other confidential information. Bank will monitor and review its information security program and revise it, as necessary and in its sole discretion, to ensure it appropriately addresses any applicable legal and regulatory requirements. Bank shall periodically test and review its information security program. Bank shall respond to Customer's reasonable requests for information concerning Bank's information security program and, upon request, Bank will provide a copy of its applicable policies and procedures, or in Bank's discretion, summaries thereof, to Customer, to the extent Bank is able to do so without divulging information Bank reasonably believes to be proprietary or Bank confidential information. Upon reasonable request, Bank shall discuss with Customer the information security program of Bank. Bank also agrees, upon reasonable request, to complete any security questionnaire provided by Customer to the extent Bank is able to do so without divulging sensitive, proprietary, or Bank confidential information and return it in a commercially reasonable period of time (or provide an alternative response that reasonably addresses the points included in the questionnaire). Customer acknowledges that certain information provided by Bank, including internal policies and procedures, may be proprietary to Bank, and agrees to protect the confidentiality of all such materials it receives from Bank. Bank agrees to resolve promptly any applicable control deficiencies that come to its attention that do not meet the standards established by federal and state privacy and data security laws, rules, regulations, and/or generally accepted industry standards related to Bank's information security program. Bank shall: (i) promptly notify Customer of any confirmed unauthorized access to personal information or other confidential information of Customer ("Breach of Security"); (ii) promptly furnish to Customer appropriate details of such Breach of Security and assist Customer in assessing the Breach of Security to the extent it is not privileged information or part of an investigation; (iii) reasonably cooperate with Customer in any litigation and investigation of third parties reasonably deemed necessary by Customer to protect its proprietary and other rights; (iv) use reasonable precautions to prevent a recurrence of a Breach of Security; and (v) take all reasonable and appropriate action to mitigate any potential harm related to a Breach of Security, including any reasonable steps requested by Customer that are practicable for Bank to implement. Nothing in the immediately preceding sentence shall obligate Bank to provide Customer with information regarding any of Bank's other customers or clients that are affected by a Breach of Security, nor shall the immediately preceding sentence limit Bank's ability to take any actions that Bank believes are appropriate to remediate any Breach of Security unless such actions would prejudice or otherwise limit Customer's ability to bring its own claims or actions against third parties related to the Breach of Security. If Bank discovers or becomes aware of a suspected data or security breach that may involve an improper access, use, disclosure, or alteration of personal information or other confidential information of Customer, Bank shall, except to the extent prohibited by Applicable Law or directed otherwise by a governmental authority not to do so, promptly notify Customer that it is investigating a potential breach and keep Customer informed as reasonably practicable of material developments relating to the investigation until Bank either confirms that such a breach has occurred (in which case the first sentence of this paragraph will apply) or confirms that no data or security breach involving personal information or other confidential information of Customer has occurred. For these purposes, "personal information" shall mean (i) an individual's name (first initial and last name or first name and last name), address or telephone number plus (a) social security number, (b) driver's license number, (c) state identification card number, (d) debit or credit card number, (e) financial account 22 number, (f) passport number, or (g) personal identification number or password that would permit access to a person's account or (ii) any combination of the foregoing that would allow a person to log onto or access an individual's account. This provision will survive termination or expiration of the Agreement for so long as Bank or any Subcustodian continues to possess or have access to personal information related to Customer. Notwithstanding the foregoing "personal information" shall not include information that is lawfully obtained from publicly available information, or from federal, state or local government records lawfully made available to the general public.

  • Data Protection and Security A. In this Agreement the following terms shall have the meanings respectively ascribed to them:

  • Privacy and Security (a) The Service Provider shall not transmit or store any AHS data outside the borders of Canada, nor transmit any AHS data in Canada to any party not specifically contemplated in this Agreement, without AHS’s prior written consent to each such data transmittal, which consent may be arbitrarily and unreasonably withheld.

  • Limited Warranty; Disclaimer JCI warrants that the Service will perform substantially in conformance with its Documentation throughout the Term. Except to the extent prohibited by applicable law, JCI’s sole obligation and your sole and exclusive remedy for breach of the foregoing warranty shall be that JCI will use commercially reasonable efforts to correct the non-conforming Service functionality without charge. JCI shall not be liable for warranty nonconformance caused by use or combination with hardware and software not provided by JCI, misuse of the Service, or your negligence or willful misconduct. EXCEPT AS PROVIDED IN THIS SECTION, THE SERVICES, TRIAL SERVICES, SOFTWARE, THIRD PARTY SOFTWARE AND ANY DATA, INFORMATION OR RESULTS OBTAINED THROUGH THE SERVICES OR TRIAL SERVICES ARE PROVIDED ON AN “AS AVAILABLE,” “AS IS” BASIS. TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, JCI AND ITS AFFILIATES, AND THEIR RESPECTIVE DIRECTORS, OFFICERS, AGENTS, LICENSORS, SERVICE PROVIDERS, SUPPLIERS, SUBCONTRACTORS, DISTRIBUTORS, AND VENDORS (THE “JCI PARTIES”) MAKE NO (AND SPECIFICALLY DISCLAIM ALL) REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE SERVICES, TRIAL SERVICES, SOFTWARE, THIRD PARTY SOFTWARE AND ANY DATA, INFORMATION, OR RESULTS OBTAINED THROUGH THE SERVICES OR TRIAL SERVICES, WHETHER EXPRESS, IMPLIED, STATUTORY OR OTHERWISE, INCLUDING, WITHOUT LIMITATION: (A) THE IMPLIED WARRANTIES OF ACCURACY, NON- INFRINGEMENT, TITLE, MERCHANTABILITY, QUIET ENJOYMENT, QUALITY OF INFORMATION, AND FITNESS FOR A PARTICULAR PURPOSE; (B) ANY WARRANTY THAT: (I) THE SERVICES, TRIAL SERVICES, SOFTWARE OR THIRD PARTY SOFTWARE WILL MEET YOUR REQUIREMENTS; (II) THE SERVICES, TRIAL SERVICES, SOFTWARE, OR THIRD PARTY SOFTWARE WILL BE UNINTERRUPTED, ERROR-FREE (INCLUDING INTERRUPTIONS DUE TO CYBERATTACKS OR MALICIOUS CODE OR OTHERWISE), FREE OF HARMFUL COMPONENTS, TIMELY OR SECURE; OR (III) THE SERVICES, TRIAL SERVICES, OR SOFTWARE WILL BE COMPATIBLE WITH ANY HARDWARE OR SOFTWARE NOT EXPLICITLY SPECIFIED IN THE DOCUMENTATION, OR THAT DEFECTS IN THE SERVICES, TRIAL SERVICES OR SOFTWARE WILL BE CORRECTED; AND (C) ANY WARRANTY ARISING OUT OF ANY COURSE OF PERFORMANCE, COURSE OF DEALING, OR USAGE OF TRADE. NO ORAL OR WRITTEN INFORMATION OR ADVICE GIVEN BY JCI OR ANY OF ITS PERSONNEL OR AGENTS WILL CREATE ANY ADDITIONAL WARRANTIES OR IN ANY WAY INCREASE THE SCOPE OF JCI’S OBLIGATIONS HEREUNDER. SOME JURISDICTIONS DO NOT ALLOW THE FOREGOING EXCLUSIONS. IN SUCH AN EVENT, SUCH EXCLUSION WILL NOT APPLY TO YOUR SOLELY TO THE EXTENT PROHIBITED BY APPLICABLE LAW.

  • Warranty Disclaimer YOUR USE OF THE PLATFORM IS ENTIRELY AT YOUR OWN RISK. WE MAKE NO REPRESENTATIONS OR WARRANTIES ABOUT THE PLATFORM. THE PLATFORM ARE PROVIDED "AS IS", “WITH ALL FAULTS,” AND “AS AVAILABLE.” WITHOUT LIMITING THE GENERALITY OF THE FOREGOING, WE DISCLAIM ALL WARRANTIES, EXPRESS, STATUTORY OR IMPLIED, INCLUDING, BUT NOT LIMITED TO: (1) THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, WORKMANLIKE EFFORT, TITLE, QUIET ENJOYMENT, NO LIENS AND NO ENCUMBRANCES; (2) THE WARRANTIES AGAINST INFRINGEMENT, MISAPPROPRIATION OR VIOLATION OF ANY INTELLECTUAL PROPERTY OR PROPRIETARY RIGHTS OF ANY PERSON; (3) THE WARRANTIES ARISING THROUGH COURSE OF DEALING OR USAGE IN TRADE; AND (4) THE WARRANTIES RELATING TO THE ACCURACY, RELIABILITY, CORRECTNESS, OR COMPLETENESS OF DATA OR CONTENT MADE AVAILABLE ON THE PLATFORM OR OTHERWISE BY SNAPPET. THERE IS NO WARRANTY THAT THE PLATFORM WILL MEET YOUR NEEDS OR REQUIREMENTS OR THE NEEDS OR REQUIREMENTS OF ANY OTHER PERSON OR THE NEEDS OR REQUIREMENTS SET FORTH IN ANY DOCUMENTATION. WE MAKE NO WARRANTIES, EXPRESS, STATUTORY OR IMPLIED THAT THE PLATFORM WILL BE TIMELY, SECURE, ACCURATE, ERROR-FREE, COMPLETE, UP-TO-DATE, FREE OF VIRUSES, OR UNINTERRUPTED. IF APPLICABLE LAW DOES NOT ALLOW THE EXCLUSION OF SOME OR ALL OF THE ABOVE IMPLIED OR STATUTORY WARRANTIES TO APPLY TO YOU, THE ABOVE EXCLUSIONS WILL APPLY TO YOU TO THE FULLEST EXTENT PERMITTED BY APPLICABLE LAW.

  • Information Integrity and Security Contractor shall immediately notify County of any known or suspected breach of personal, sensitive and confidential information related to Contractor’s work under this Agreement.

  • Access and Security Customer shall employ all physical, administrative and technical controls, screening and security procedures and other safeguards necessary to: (a) securely administer the distribution and use of all Access Credentials and protect against any unauthorized access to or use of the Hosted Services; and (b) control the content and use of Customer Data, including the uploading or other provision of Customer Data for Processing by the Hosted Services.

  • Warranty Disclaimers UNLESS OTHERWISE EXPRESSLY STATED IN THIS SONIFI LIMITED WARRANTY, THE LICENSED SOFTWARE TERMS, OR THE AGREEMENT, SONIFI IS NOT RESPONSIBLE FOR ANY DEFECTS, BUGS, ERRORS, DEFICIENCIES OR VULNERABILITIES IN LICENSED SOFTWARE INSTALLED ON, EMBEDDED INTO, INCORPORATED WITHIN OR USED IN CONNECTION WITH HEADEND EQUIPMENT AND IN-ROOM EQUIPMENT, AND SONIFI DOES NOT PROVIDE AND HEREBY DISCLAIMS ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY WITH RESPECT TO SUCH LICENSED SOFTWARE, INCLUDING WITHOUT LIMITATION ANY WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON- INFRINGEMENT. EXCEPT AS EXPLICITLY STATED IN THIS SONIFI LIMITED WARRANTY OR ELSEWHERE IN THE AGREEMENT, SONIFI DOES NOT MAKE AND SPECIFICALLY DISCLAIMS ALL REPRESENTATIONS, COVENANTS, GUARANTEES AND WARRANTIES OF ANY KIND, STATUTORY, EXPRESS OR IMPLIED, WITH RESPECT TO THE HEADEND EQUIPMENT, IN-ROOM EQUIPMENT, LICENSED SOFTWARE, DOCUMENTATION AND ASSOCIATED SERVICES, INCLUDING WITHOUT LIMITATION ANY EXPRESS OR IMPLIED REPRESENTATION, COVENANT, GUARANTEE OR WARRANTY: (A) OF CONDITION, MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT; (B) ARISING BY USAGE OR TRADE PRACTICES, COURSE OF DEALING OR COURSE OF PERFORMANCE; (C) THAT THE HEADEND EQUIPMENT, THE IN-ROOM EQUIPMENT, THE LICENSED SOFTWARE, THE DOCUMENTATION AND ASSOCIATED SERVICES WILL BE ERROR FREE, UNINTERRUPTED, SECURE FROM THIRD PARTY ATTACK OR FREE OF VIRUSES, BUGS, WORMS, TROJAN HORSES, MALWARE, CANCELBOTS OR OTHER MALICIOUS CODE; (D) THAT FUNCTIONS AND FEATURES CONTAINED IN THE HEADEND EQUIPMENT, THE IN-ROOM EQUIPMENT, THE DOCUMENTATION OR THE LICENSED SOFTWARE WILL MEET COMPANY’S OR ITS GUESTS’, EMPLOYEES’ AND INVITEES’ NEEDS, REQUIREMENTS OR EXPECTATIONS; AND (E) THAT THE HEADEND EQUIPMENT, THE IN-ROOM EQUIPMENT, THE LICENSED SOFTWARE, THE DOCUMENTATION AND ASSOCIATED SERVICES ARE FREE FROM DEFECTS, FIT TO BE SOLD, WILL PERFORM IN A PARTICULAR MANNER OR SPEED OR TO A PARTICULAR STANDARD OR ANY QUALITY OF SERVICE. IMPORTANT: DO NOT OPEN OR TAMPER WITH ANY OF THE HEADEND EQUIPMENT OR IN- ROOM EQUIPMENT. OPENING OR TAMPERING WITH A COMPONENT OF THE HEADEND EQUIPMENT OR IN-ROOM EQUIPMENT MAY CAUSE DAMAGE THAT IS NOT COVERED BY THE SONIFI LIMITED WARRANTY OR MAY CAUSE THE HEADEND EQUIPMENT OR IN-ROOM EQUIPMENT TO STOP FUNCTIONING. The specific limited warranties set forth in this SONIFI Limited Warranty do not apply to damage or failure to Equipment or Licensed Software or inability to perform resulting from Company’s failure (i) to comply with the Agreement (including the SOW, the Licensed Software Terms and the Service Terms) or (ii) to follow Documentation or oral or written instructions from SONIFI personnel or the applicable hardware manufacturer, hardware supplier, software developer or software publisher pertaining to the Headend Equipment, In-Room Equipment, Licensed Software and/or Updates. Unless otherwise expressly stated in the Agreement, this SONIFI Limited Warranty sets forth Company’s sole and exclusive remedies in the event of a breach of warranty herein during the Limited Warranty Period.

  • Data and Security If Contractor is granted access to Court Data, Confidential Information or Court Work Locations in the performance of the Work;

Time is Money Join Law Insider Premium to draft better contracts faster.