User Interaction Sample Clauses

User Interaction. You are solely responsible for your interactions with other users. You understand that the Owner does not conduct criminal background checks or screenings on its users. The Owner also does not inquire into the backgrounds of its users or attempt to verify the statements of its users, including any commercial or third-party organizations promoted or featured in the Service. The Owner makes no representations or warranties as to the conduct of users or their compatibility with current or future users. The Owner reserves the right to conduct any criminal background check or other screenings (such as sex offender register searches), at any time and using available public records.
AutoNDA by SimpleDocs
User Interaction. ‌ Traditional data collecting platforms like Amazon mTurk provide a platform where workers can provide contribution to the data set in exchange for monetary rewards. To the workers, on the other hand, the optimal strategy would be to minimize the amount of time spent on each task to maximize the reward. The quality assurance check from the requester serves as a bar raiser for the quality of the work. But for tasks such as those in verification phase where the worker is asked to attempt questions of which ground-truth answers are unknown to the requester, manually performing the quality assurance requires the same amount of work as the work to be done by the workers. Therefore, it is infeasible for the requester to perform quality control on tasks like these.
User Interaction. 3.1.1. You are solely responsible for your interactions with other users of the Service and any other parties with whom you interact through the Service and/or Pixion Games Limited games. Pixion Games Limited reserves the right, but has no obligation, to become involved in any way with these disputes. You will fully cooperate with Pixion Games Limited to investigate any suspected unlawful, fraudulent or improper activity, including, but not limited to, granting Pixion Games Limited access to any password-protected portions of your Account.

Related to User Interaction

  • Originating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • Local Interconnection Data Exchange for Billing 7.7.1 There are certain types of calls or types of Interconnection that require exchange of Billing records between the Parties, including, for example, alternate billed and Toll Free Service calls. The Parties agree that all call types must be routed between the networks, accounted for, and settled among the Parties. Certain calls will be handled via the Parties' respective operator service platforms. The Parties agree to utilize, where possible and appropriate, existing accounting and settlement systems to xxxx, exchange records and settle revenue.

  • Data Input Control It will be possible to retrospectively examine and establish whether and by whom Personal Data have been entered, modified or removed from SAP data processing systems. Measures: • SAP only allows authorized personnel to access Personal Data as required in the course of their duty. • SAP has implemented a logging system for input, modification and deletion, or blocking of Personal Data by SAP or its subprocessors within the Cloud Service to the extent technically possible.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage. Measures: • As part of the SAP Security Policy, Personal Data requires at least the same protection level as “confidential” information according to the SAP Information Classification standard. • Access to Personal Data is granted on a need-to-know basis. Personnel have access to the information that they require in order to fulfill their duty. SAP uses authorization concepts that document grant processes and assigned roles per account (user ID). All Customer Data is protected in accordance with the SAP Security Policy. • All production servers are operated in the Data Centers or in secure server rooms. Security measures that protect applications processing Personal Data are regularly checked. To this end, SAP conducts internal and external security checks and penetration tests on its IT systems. • SAP does not allow the installation of software that has not been approved by SAP. • An SAP security standard governs how data and data carriers are deleted or destroyed once they are no longer required.

  • Traffic Measurement and Billing over Interconnection Trunks 6.1 For billing purposes, each Party shall pass Calling Party Number (CPN) information on at least ninety-five percent (95%) of calls carried over the Interconnection Trunks.

  • Purchase Order Flip via Ariba Network (AN) The online process allows suppliers to submit invoices via the AN for catalog and non- catalog goods and services. Contractors have the ability to create an invoice directly from their Inbox in their AN account by simply “flipping” the purchase order into an invoice. This option does not require any special software or technical capabilities. For the purposes of this section, the Contractor warrants and represents that it is authorized and empowered to and hereby grants the State and the third-party provider of MFMP the right and license to use, reproduce, transmit, distribute, and publicly display within the system the information outlined above. In addition, the Contractor warrants and represents that it is authorized and empowered to and hereby grants the State and the third-party provider the right and license to reproduce and display within the system the Contractor’s trademarks, system marks, logos, trade dress, or other branding designation that identifies the products made available by the Contractor under the Contract.

  • Switched Exchange Access Service The offering of transmission and switching services for the purpose of the origination or termination of Toll Traffic. Switched Exchange Access Services include but may not be limited to: Feature Group A, Feature Group B, Feature Group D, 700 access, 800 access, 888 access and 900 access.

  • Local Switching Interfaces 4.2.13.1 Deland Actel shall order ports and associated interfaces compatible with the services it wishes to provide as listed in Exhibit A. BellSouth shall provide the following local switching interfaces:

Time is Money Join Law Insider Premium to draft better contracts faster.