РЕЙТИНГ Sample Clauses

РЕЙТИНГ. 14.1. Main parameters of the ranking are outlined in section 5.3 of these General Terms. The main parameters are applied on the Bolt Food Platform in the following order (listed from the most important to the least important one):
AutoNDA by SimpleDocs

Related to РЕЙТИНГ

  • Data Deletion As stated in the Student Data Transfer or Destruction Section of this Agreement, Provider shall ensure that all Student Data in its possession and in the possession of any subcontractors, or agents to whom Provider may have transferred Student Data, is destroyed or, as directed by the Board, transferred to the Board in a format determined by the Board within the time periods provided in the Student Data Transfer or Destruction Section of this Agreement.

  • Data Ownership BA acknowledges that BA has no ownership rights with respect to the Protected Information.

  • Single User License A Single-User license is for a named individual who is identified as the only Authorized User. This user is not permitted to re-assign, transfer, or sublicense the software, except as described in Section 5, Transfer. This user may install and use the software on up to three computers, as long as the single-user Customer is the sole user of the software. If the computer on which this Software is loaded is attached to a network, this Software must not be accessible by any other user on such network. Single-user licenses may not be installed or used in a virtualized environment in order to or in a manner that circumvents the single user license type.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage. Measures: • As part of the SAP Security Policy, Personal Data requires at least the same protection level as “confidential” information according to the SAP Information Classification standard. • Access to Personal Data is granted on a need-to-know basis. Personnel have access to the information that they require in order to fulfill their duty. SAP uses authorization concepts that document grant processes and assigned roles per account (user ID). All Customer Data is protected in accordance with the SAP Security Policy. • All production servers are operated in the Data Centers or in secure server rooms. Security measures that protect applications processing Personal Data are regularly checked. To this end, SAP conducts internal and external security checks and penetration tests on its IT systems. • SAP does not allow the installation of software that has not been approved by SAP. • An SAP security standard governs how data and data carriers are deleted or destroyed once they are no longer required.

  • DATABASE OF RESTRICTED SUPPLIER The process of restriction is used to exclude a company/person from conducting future business with Transnet and other organs of state for a specified period. No Bid shall be awarded to a Bidder whose name (or any of its members, directors, partners or trustees) appear on the Register of Tender Defaulters kept by National Treasury, or who have been placed on National Treasury’s List of Restricted Suppliers. Transnet reserves the right to withdraw an award, or cancel a contract concluded with a Bidder should it be established, at any time, that a bidder has been restricted with National Treasury by another government institution. Thus signed by the Parties and witnessed on the following dates and at the following places: For and on behalf of For and on behalf of TRANSNET SOC LTD …………………………………………………… duly authorised hereto duly authorised hereto Name: Name: Position: Position: Signature: Signature: Date: Date: Place: Place: AS WITNESS: AS WITNESS: Name: Name: Signature: Signature: AS WITNESS: AS WITNESS: Name: Name:

  • Access to Software Access Rights to Software which is Results shall comprise: Access to the Object Code; and, where normal use of such an Object Code requires an Application Programming Interface (hereafter API), Access to the Object Code and such an API; and, if a Party can show that the execution of its tasks under the Project or the Exploitation of its own Results is technically or legally impossible without Access to the Source Code, Access to the Source Code to the extent necessary. Background shall only be provided in Object Code unless otherwise agreed between the Parties concerned.

  • Privacy Shield To the extent that MailChimp processes any Customer Data protected by EU Data Protection Law under the Agreement and/or that originates from the EEA, in a country that has not been designated by the European Commission or Swiss Federal Data Protection Authority (as applicable) as providing an adequate level of protection for Personal Data, the parties acknowledge that MailChimp shall be deemed to provide adequate protection (within the meaning of EU Data Protection Law) for any such Customer Data by virtue of having self-certified its compliance with Privacy Shield. MailChimp agrees to protect such Personal Data in accordance with the requirements of the Privacy Shield Principles. If MailChimp is unable to comply with this requirement, MailChimp shall inform Customer.

  • XXX Hosting 10.1 XXX Hosting is not required for resale in the BellSouth region.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • License Restrictions You shall not:

Time is Money Join Law Insider Premium to draft better contracts faster.