Use of Limited Data Set by Third Parties Sample Clauses

Use of Limited Data Set by Third Parties. Data Recipient shall ensure that its agents, contractors and subcontractors (collectively “Contractors”) to whom it provides any portion of the Limited Data Set shall comply with all restrictions and conditions that apply to Data Recipient with respect to the use of the Limited Data Set and that no Contractor shall use or disclose such information except as permitted under the terms of this Agreement or as required by law. Data Recipient further agrees that it shall obtain and maintain, throughout the term of this Agreement, an agreement with each Contractor that has or will have access to the Limited Data Set by or through Data Recipient, under which such Contractor agrees to be bound by the same restrictions, terms and conditions that apply to Data Recipient pursuant to this Agreement.
AutoNDA by SimpleDocs
Use of Limited Data Set by Third Parties. Data Recipient shall obtain and maintain, throughout the term of this Agreement, an agreement with each Contractor that has or will have access to the Limited Data Set by or through Data Recipient, under which such Contractor agrees to be bound by the same restrictions, terms and conditions that apply to Data Recipient pursuant to this Agreement.

Related to Use of Limited Data Set by Third Parties

  • Use by Third Parties You may permit Authorized Third Parties to exercise the Usage Rights on Your behalf, provided that You are responsible for (a) ensuring that such Authorized Third Parties comply with this XXXX and (b) any breach of this XXXX by such Authorized Third Parties.

  • Use of Attachment Facilities by Third Parties Purpose of Attachment Facilities.‌‌ Except as may be required by Applicable Laws and Regulations, or as otherwise agreed to among the Parties, the Attachment Facilities shall be constructed for the sole purpose of interconnecting the Large Generating Facility to the New York State Transmission System and shall be used for no other purpose.

  • REQUESTS FOR DATA BY THIRD PARTIES Unless prohibited by law, Contractor shall notify the Authorized User in Writing within 24 hours of any request for Data (including requestor, nature of Data requested and timeframe of response) by a person or entity other than the Authorized User, and the Contractor shall secure Written acknowledgement of such notification from the Authorized User before responding to the request for Data. Unless compelled by law, the Contractor shall not release Data without the Authorized User’s prior Written approval.

  • Use of Data by User Registry Operator will permit user to use the zone file for lawful purposes; provided that (a) user takes all reasonable steps to protect against unauthorized access to and use and disclosure of the data and (b) under no circumstances will Registry Operator be required or permitted to allow user to use the data to, (i) allow, enable, or otherwise support the transmission by email, telephone, or facsimile of mass unsolicited, commercial advertising or solicitations to entities other than user’s own existing customers, or (ii) enable high volume, automated, electronic processes that send queries or data to the systems of Registry Operator or any ICANN-­‐accredited registrar.

  • Reliance by Third Parties Notwithstanding anything to the contrary in this Agreement, any Person dealing with the Partnership shall be entitled to assume that the General Partner and any officer of the General Partner authorized by the General Partner to act on behalf of and in the name of the Partnership has full power and authority to encumber, sell or otherwise use in any manner any and all assets of the Partnership and to enter into any authorized contracts on behalf of the Partnership, and such Person shall be entitled to deal with the General Partner or any such officer as if it were the Partnership’s sole party in interest, both legally and beneficially. Each Limited Partner hereby waives, to the fullest extent permitted by law, any and all defenses or other remedies that may be available against such Person to contest, negate or disaffirm any action of the General Partner or any such officer in connection with any such dealing. In no event shall any Person dealing with the General Partner or any such officer or its representatives be obligated to ascertain that the terms of this Agreement have been complied with or to inquire into the necessity or expedience of any act or action of the General Partner or any such officer or its representatives. Each and every certificate, document or other instrument executed on behalf of the Partnership by the General Partner or its representatives shall be conclusive evidence in favor of any and every Person relying thereon or claiming thereunder that (a) at the time of the execution and delivery of such certificate, document or instrument, this Agreement was in full force and effect, (b) the Person executing and delivering such certificate, document or instrument was duly authorized and empowered to do so for and on behalf of the Partnership and (c) such certificate, document or instrument was duly executed and delivered in accordance with the terms and provisions of this Agreement and is binding upon the Partnership.

  • Data Security and Unauthorized Data Release The Requester and Approved Users, including the Requester’s IT Director, acknowledge NIH’s expectation that they have reviewed and agree to manage the requested controlled-access dataset(s) and any Data Derivatives of controlled-access datasets according to NIH’s expectations set forth in the current NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy and the Requester’s IT security requirements and policies. The Requester, including the Requester’s IT Director, agree that the Requester’s IT security requirements and policies are sufficient to protect the confidentiality and integrity of the NIH controlled-access data entrusted to the Requester. If approved by NIH to use cloud computing for the proposed research project, as outlined in the Research and Cloud Computing Use Statements of the Data Access Request, the Requester acknowledges that the IT Director has reviewed and understands the cloud computing guidelines in the NIH Security Best Practices for Controlled-Access Data Subject to the NIH GDS Policy. The Requester and PI agree to notify the appropriate DAC(s) of any unauthorized data sharing, breaches of data security, or inadvertent data releases that may compromise data confidentiality within 24 hours of when the incident is identified. As permitted by law, notifications should include any known information regarding the incident and a general description of the activities or process in place to define and remediate the situation fully. Within 3 business days of the DAC notification, the Requester agrees to submit to the DAC(s) a detailed written report including the date and nature of the event, actions taken or to be taken to remediate the issue(s), and plans or processes developed to prevent further problems, including specific information on timelines anticipated for action. The Requester agrees to provide documentation verifying that the remediation plans have been implemented. Repeated violations or unresponsiveness to NIH requests may result in further compliance measures affecting the Requester. All notifications and written reports of data security incidents and policy compliance violations should be sent to the DAC(s) indicated in the Addendum to this Agreement. NIH, or another entity designated by NIH may, as permitted by law, also investigate any data security incident or policy violation. Approved Users and their associates agree to support such investigations and provide information, within the limits of applicable local, state, tribal, and federal laws and regulations. In addition, Requester and Approved Users agree to work with the NIH to assure that plans and procedures that are developed to address identified problems are mutually acceptable and consistent with applicable law.

  • Use of Likeness As part of the consideration for this Housing Agreement, Resident authorizes Owner and its affiliates to make photographs and video recordings of Resident in community and resident amenity areas, and irrevocably grants Owner and its affiliates a royalty-free license to use Resident’s image and likeness for all lawful purposes, including promotional purposes in advertising, video, web, social media and other formats.

  • Contract (Rights of Third Parties) Xxx 0000 22.1 No person who is not a party to this Grant Agreement shall have the right to enforce any of its terms.

  • Use of Interconnection Facilities by Third Parties 6551 Error! Hyperlink reference not valid.9.9.1 Purpose of Interconnection Facilities. 6551

  • Use of Image I hereby consent to the use of my image by EMPOWER for any and all purposes, including, without limitation or compensation: Video, still photographs, publication and any trade or advertising purposes, providing such uses are not made as to constitute a direct endorsement of any product or service. PARTICIPANT INFORMATION (MUST BE COMPLETED FOR ALL PARTICIPANT(S) Name of Participant: (Print Clearly) Initial Date of Birth: _ Weight: Check In on Facebook Street Address: City: State: Zip: Phone Number: Email Address: Emergency Contact: Phone Number: Emergency Contact’s Relationship to Participant: By signing this document, I acknowledge that I may be found by a court of law to have waived my right to a lawsuit against the Released Parties on the basis of any claim herein from which I have released them. I HAVE HAD THE SUFFICIENT OPPORTUNITY TO READ THIS ENTIRE DOCUMENT. I HAVE CAREFULLY READ AND UNDERSTOOD IT AND AGREE TO BE BOUND BY ITS TERMS. Participant’s Signature: (Over 18 years of age) Date: PARENT OR GUARDIAN’S ADDITIONAL INDEMNIFICATION (MUST BE COMPLETED FOR PARTICIPANTS UNDER THE AGE OF 18) I, (parent/guardian name), the parent/guardian of (Xxxxx’s name) whose date of birth is / / give permission for my child to participate in the activities and utilize the equipment and facilities provided by EMPOWER. I have reviewed the terms of the above Agreement and, as parent/guardian, accept its terms. I have discussed the terms of the above Agreement with my child and am assured by my child that he/she understands the Agreement and has also freely accepted its terms. I agree to fully release, indemnify and hold harmless the Released Parties from any claims which I may have and, to the fullest extent allowed by law, to release the Released Parties on behalf of my child for any claim(s) that my child may have. I further agree to indemnify and hold harmless the Released Parties from any and all claims which are brought by, or on behalf of the above stated minor and which are in any way connected with such use or participation by the above stated minor. I HAVE HAD THE SUFFICIENT OPPORTUNITY TO READ THIS ENTIRE DOCUMENT. I HAVE READ AND UNDERSTOOD IT AND AGREE THAT MYSELF AND MY MINOR CHILD ARE TO BE BOUND BY ITS TERMS. Parent/Guardian’s Signature: Date:

Time is Money Join Law Insider Premium to draft better contracts faster.