Third-Party Data Sources Clause Samples
POPULAR SAMPLE Copied 1 times
Third-Party Data Sources. ▇▇▇▇▇▇▇ is not responsible for the accuracy of, or liable for the inaccuracy of, any third party sources of data utilized in connection with the Service.
Third-Party Data Sources. A list of third-party data sources, if any, likely to 14 contain discoverable ESI (e.g., third-party email providers, mobile device providers, cloud 15 storage) and, for each such source, the extent to which a party is (or is not) able to preserve 16 information stored in the third-party data source.
Third-Party Data Sources. To the extent that any Content provided by Licensee includes data from third party sources, or Licensee is otherwise granted access to data from third party sources through the Services, Licensee represents that it holds a valid and current license from such third party data sources to access and use such data (each, a “Data License”). Licensee acknowledges and agrees that certain analytics functionality offered as part of the Services will not be available to Licensee without Licensee’s licensed right to access and use any and all such third party data. Licensee agrees to notify Veritone promptly upon the expiration or termination of any such Data License.
Third-Party Data Sources. A list of third-party data sources, if any, likely to 12 13 14 preserve information stored in the third-party data source.
Third-Party Data Sources. Use of third party data sources within Elements is subject to the corresponding terms of use, further details of which are available on the Support Site.
Third-Party Data Sources. The Service includes data and other materials provided by third parties and is subject to certain additional third party terms and conditions. These third party third party terms and conditions are attached hereby as Exhibit A, and are incorporated into this Agreement by reference.
Third-Party Data Sources. The Threat Response Product interoperates with certain supported: (a) third party data sources (“Event Source”); and (b) third party security enforcement platforms (e.g. firewalls, and web proxy servers) (“Enforcement Device”). The Threat Response Auto Pull feature can only be used with Proofpoint’s Targeted Attack Protection data as the Event Source and may only be integrated with either Microsoft Exchange Server or Microsoft Office 365 as an Enforcement Device. Customer is required to have a current subscription for the Proofpoint Targeted Attack Protection product in order to license and use Threat Response Auto Pull. With respect to Threat Response Auto Pull, upon written notice (via email) to Customer’s Named Support Contact, Proofpoint may to monitor Customer’s specific system configuration. With respect to such Event Source or Enforcement Device, as between Proofpoint and Customer, Proofpoint shall have no liability whatsoever with respect to the accuracy, availability, or quality of such Event Sources or Enforcement Devices.
