Lisensi Data Sample Clauses

Lisensi Data. (a) Semua informasi yang diberikan SAP kepada Pelanggan (kecuali informasi yang diberikan Pelanggan kepada SAP, yang kemudian dikembalikan SAP kepada Pelanggan) (“Informasi Basis Data”) disediakan hanya untuk penggunaan komersial internal be provided to third parties (excluding Contractors and authorized Affiliates). Customer will not use the Database Information as a factor in establishing an individual's eligibility for (i) credit or insurance to be used primarily for personal, family or household purposes; or (ii) employment.
AutoNDA by SimpleDocs
Lisensi Data. (a) Semua informasi yang diberikan SAP kepada Pelanggan (kecuali informasi yang diberikan Pelanggan kepada SAP, yang kemudian dikembalikan SAP kepada Pelanggan) (“Informasi Basis Data”) disediakan hanya untuk penggunaan komersial internal Pelanggan (terkait dengan selain konsumen) xxx tidak dapat diberikan kepada pihak ketiga (kecuali Kontraktor xxx Afiliasi resmi). Pelanggan tidak dapat menggunakan Informasi Basis Data sebagai faktor dalam menetapkan kelayakan seorang individu untuk mendapatkan (i) kredit atau jaminan yang akan digunakan terutama untuk tujuan pribadi, keluarga atau rumah tangga; atau (ii) pekerjaan. (b) Untuk kepentingan Tambahan ini, "Kontraktor" berarti pihak ketiga yang dapat mengakses Informasi Basis Data atas nama Pelanggan xxx dalam lingkungan yang dikendalikan Pelanggan, dengan ketentuan bahwa kontraktor tersebut menggunakan Informasi Basis Data sesuai dengan Perjanjian ini. Pelanggan bertanggung jawab atas setiap penggunaan atau pengungkapan Informasi Basis Data oleh Kontraktor mana pun yang jika dilakukan oleh Pelanggan sendiri akan menjadi pelanggaran terhadap Perjanjian ini. Pelanggan tidak dapat menjual kembali atau melisensikan kembali Informasi Basis Data. Semua Informasi Basis Data yang diberikan kepada Pelanggan adalah informasi berhak milik SAP atau penyedia informasi pihak ketiga ("Penyedia"). Informasi Basis Data diberikan completeness or timeliness of the Database Information, and SAP advises Customer to independently verify such Database Information. SAP and its Providers shall not be liable for any loss arising out of or in any way relating to the Database Information. SAP’s Providers are third party beneficiaries of these terms. SAP and its Providers (i) shall not be liable to Customer for any loss or injury arising out of or in any way relating to the Database Information and (ii) will not be liable for consequential, incidental, special, punitive or other indirect damages.
Lisensi Data. (a) Semua informasi yang diberikan SAP kepada Pelanggan (kecuali informasi yang diberikan Pelanggan kepada SAP, yang kemudian dikembalikan SAP kepada Pelanggan) (“Informasi Basis Data”) disediakan hanya untuk penggunaan komersial internal Pelanggan (terkait dengan selain konsumen) xxx tidak dapat diberikan kepada pihak ketiga (kecuali Kontraktor xxx Afiliasi resmi). Pelanggan tidak dapat menggunakan Informasi Basis Data sebagai faktor dalam menetapkan kelayakan seorang individu untuk mendapatkan (i) kredit atau jaminan yang akan digunakan terutama untuk tujuan pribadi, keluarga atau rumah tangga; atau (ii) pekerjaan. (b) Untuk kepentingan Tambahan ini, "Kontraktor" berarti pihak ketiga yang dapat mengakses Informasi Basis Data atas nama Pelanggan xxx dalam lingkungan yang dikendalikan Pelanggan, dengan ketentuan bahwa kontraktor tersebut menggunakan Informasi Basis Data sesuai dengan Perjanjian ini. Pelanggan bertanggung jawab atas setiap penggunaan atau pengungkapan Informasi Basis Data oleh Kontraktor mana pun yang jika dilakukan oleh Pelanggan sendiri akan menjadi pelanggaran terhadap Perjanjian ini. Pelanggan tidak dapat menjual kembali atau melisensikan kembali Informasi Basis Data. Semua Informasi Basis Data yang diberikan kepada Pelanggan adalah informasi berhak milik SAP atau penyedia informasi pihak ketiga ("Penyedia"). Informasi Basis Data diberikan

Related to Lisensi Data

  • INFORMATION TECHNOLOGY The following applies to all contracts for information technology commodities and contractual services. “Information technology” is defined in section 287.012(15), F.S., to have the same meaning as provided in section 282.0041, F.S.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • Device Data We may share certain personal information and device-identifying technical data about you and your devices with third party service providers, who will compare and add device data and fraud data from and about you to a database of similar device and fraud information in order to provide fraud management and prevention services, which include but are not limited to identifying and blocking access to the applicable service or Web site by devices associated with fraudulent or abusive activity. Such information may be used by us and our third party service providers to provide similar fraud management and prevention services for services or Web sites not provided by us. We will not share with service providers any information that personally identifies the user of the applicable device.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Sensitive data Where the transfer involves personal data revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, or trade union membership, genetic data, or biometric data for the purpose of uniquely identifying a natural person, data concerning health or a person’s sex life or sexual orientation, or data relating to criminal convictions and offences (hereinafter ‘sensitive data’), the data importer shall apply the specific restrictions and/or additional safeguards described in Annex I.B.

  • CONTRACT INFORMATION 1. The State of Arkansas may not contract with another party:

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Technology Discoveries, innovations, Know-How and inventions, whether patentable or not, including computer software, recognized under U.S. law as intellectual creations to which rights of ownership accrue, including, but not limited to, patents, trade secrets, maskworks and copyrights developed under this Agreement.

  • Client Data The Subrecipient shall maintain client data demonstrating client eligibility for services provided. Such data shall include, but not be limited to, client name, address, income level or other basis for determining eligibility, and description of service provided. Such information shall be made available to Grantee monitors or their designees for review upon request.

  • Information Technology Enterprise Architecture Requirements If this Contract involves information technology-related products or services, the Contractor agrees that all such products or services are compatible with any of the technology standards found at xxxxx://xxx.xx.xxx/iot/2394.htm that are applicable, including the assistive technology standard. The State may terminate this Contract for default if the terms of this paragraph are breached.

Time is Money Join Law Insider Premium to draft better contracts faster.