Compliance in Use of Domain Name Sample Clauses

Compliance in Use of Domain Name. That the registration and/or use of the Domain Name Registration shall be in full compliance with the principles and terms set out in the AUPT.
AutoNDA by SimpleDocs

Related to Compliance in Use of Domain Name

  • LICENSE TO USE WEBSITE The Company may provide You with certain information as a result of Your use of the Website or Services. Such information may include, but is not limited to, documentation, data, or information developed by the Company, and other materials which may assist in Your use of the Website or Services ("Company Materials"). Subject to this Agreement, the Company grants You a non-exclusive, limited, non-transferable and revocable license to use the Company Materials solely in connection with Your use of the Website and Services. The Company Materials may not be used for any other purpose, and this license terminates upon Your cessation of use of the Website or Services or at the termination of this Agreement.

  • Domain Name Data 1.5.1 Query format: whois EXAMPLE.TLD

  • Freedom to Use Ideas Subject to Section 9 and Client’s rights in Client Information and notwithstanding anything to the contrary contained in this Agreement or an Order Form, the ideas, methods, concepts, know-how, structures, techniques, inventions, developments, processes, discoveries, improvements and other information and materials developed in and during the course of any Order Form may be used by Red Hat, without an obligation to account, in any way Red Hat deems appropriate, including by or for itself or its clients or customers.

  • Protection of Customer Data The Supplier shall not delete or remove any proprietary notices contained within or relating to the Customer Data. The Supplier shall not store, copy, disclose, or use the Customer Data except as necessary for the performance by the Supplier of its obligations under this Call Off Contract or as otherwise Approved by the Customer. To the extent that the Customer Data is held and/or Processed by the Supplier, the Supplier shall supply that Customer Data to the Customer as requested by the Customer and in the format (if any) specified by the Customer in the Call Off Order Form and, in any event, as specified by the Customer from time to time in writing. The Supplier shall take responsibility for preserving the integrity of Customer Data and preventing the corruption or loss of Customer Data. The Supplier shall perform secure back-ups of all Customer Data and shall ensure that up-to-date back-ups are stored off-site at an Approved location in accordance with any BCDR Plan or otherwise. The Supplier shall ensure that such back-ups are available to the Customer (or to such other person as the Customer may direct) at all times upon request and are delivered to the Customer at no less than six (6) Monthly intervals (or such other intervals as may be agreed in writing between the Parties). The Supplier shall ensure that any system on which the Supplier holds any Customer Data, including back-up data, is a secure system that complies with the Security Policy and the Security Management Plan (if any). If at any time the Supplier suspects or has reason to believe that the Customer Data is corrupted, lost or sufficiently degraded in any way for any reason, then the Supplier shall notify the Customer immediately and inform the Customer of the remedial action the Supplier proposes to take. If the Customer Data is corrupted, lost or sufficiently degraded as a result of a Default so as to be unusable, the Supplier may: require the Supplier (at the Supplier's expense) to restore or procure the restoration of Customer Data to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer, and the Supplier shall do so as soon as practicable but not later than five (5) Working Days from the date of receipt of the Customer’s notice; and/or itself restore or procure the restoration of Customer Data, and shall be repaid by the Supplier any reasonable expenses incurred in doing so to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer. Confidentiality

  • Prohibition on Unauthorized Use or Disclosure The Business Associate will neither use nor disclose the Covered Entity’s Protected Health Information, except as permitted or required by this Addendum or in writing by the Covered Entity or as Required by Law. This Agreement does not authorize the Business Associate to use or disclose the Covered Entity’s Protected Health Information in a manner that will violate Subpart E of 45 CFR Part 164 if done by the Covered Entity.

  • Unauthorised Use of Intellectual Property a) The Supplier/Service Provider agrees to notify Transnet in writing of any conflicting uses of, and applications of registrations of Patents, Designs and Trade Marks or any act of infringement, unfair competition or passing off involving the Intellectual Property of Transnet of which the Supplier/Service Provider acquires knowledge and Transnet shall have the right, as its own option, to proceed against any party infringing its Intellectual Property.

  • CONFIDENTIAL, PROPRIETARY, AND TRADE SECRET INFORMATION AND MATERIALS a. Buyer and Seller shall each keep confidential and protect from unauthorized use and disclosure all (i) confidential, proprietary and/or trade secret information of a Party or third party disclosed by a Party; (ii) software provided under this Contract in source code form or identified as subject to this Article; and (iii) tooling identified as subject to this Article: in each case that is obtained, directly or indirectly, from the other in connection with this Contract or Buyer’s contract with its customer, if any, (collectively referred to as "Proprietary Information and Materials"). Proprietary Information and Materials excludes information that is, as evidenced by competent records provided by the receiving Party, known to the receiving party or lawfully in the public domain, in the same form as disclosed hereunder, disclosed to the receiving Party without restriction by a third party having the right to disclose it, or developed by the receiving Party independently without use of or reference to the disclosing Party’s Proprietary Information and Materials.

  • Malicious Use of Orphan Glue Records Registry Operator shall take action to remove orphan glue records (as defined at xxxx://xxx.xxxxx.xxx/en/committees/security/sac048.pdf) when provided with evidence in written form that such records are present in connection with malicious conduct.

  • Single User License A Single-User license is for a named individual who is identified as the only Authorized User. This user is not permitted to re-assign, transfer, or sublicense the software, except as described in Section 5, Transfer. This user may install and use the software on up to three computers, as long as the single-user Customer is the sole user of the software. If the computer on which this Software is loaded is attached to a network, this Software must not be accessible by any other user on such network. Single-user licenses may not be installed or used in a virtualized environment in order to or in a manner that circumvents the single user license type.

  • Unauthorized Use or Disclosure The Contractor shall notify COMMERCE within five (5) working days of any unauthorized use or disclosure of any confidential information, and shall take necessary steps to mitigate the harmful effects of such use or disclosure.

Time is Money Join Law Insider Premium to draft better contracts faster.