Use of Anonymous Information for Research Sample Clauses

Use of Anonymous Information for Research. By using the Services, you agree to allow CasualStar to use anonymised information from you and your experiences, in order to improve Services. Research conducted may be published in academic journals. However, all identification details will be made anonymous.
AutoNDA by SimpleDocs
Use of Anonymous Information for Research. By using the Site and/or Services, you agree to allow Lendingfax to anonymously use the information from you and your experiences through the Services to continue Lendingfax’s research into successful business practices and to improve the Services.
Use of Anonymous Information for Research. By using the site, you agree to allow Polo Singles LLP to anonymously use the information from you and your experiences through the Services to continue Polo Singles LLP research into successful relationships and to improve the Service. However, all of your responses will be anonymous, and we will not publish research containing your personal identifying information.
Use of Anonymous Information for Research. By using the Services, you agree to allow Compatibility to anonymously use the information from you and your experiences through the Services to continue Compatibility's research into successful relationships and to improve the Services. This research, conducted by psychologists and behavior research scientists, may be published in academic journals. However, all of your responses will be anonymous, and we will not publish research containing your personal identifying information.
Use of Anonymous Information for Research. By using the Site and/or Services, you agree to allow FHL to anonymously use the information from you and your experiences through the Services to continue FHL’s research into successful business practices and to improve the Services.

Related to Use of Anonymous Information for Research

  • Use of Confidential Information The parties agree that during the term of this Agreement and thereafter, Confidential Information is to be used solely in connection with satisfying their obligations pursuant to this Agreement, and that a party shall neither disclose Confidential Information to any third party, nor use Confidential Information for its own benefit, except as may be necessary to perform its obligations pursuant to this Agreement or as expressly authorized in writing by the other party, as the case may be. Neither party shall disclose any Confidential Information to any other persons or entities, except on a “need to know” basis and then only: (i) to their own employees and Agents (as defined below); (ii) to their own accountants and legal representatives, provided that any such representatives shall be subject to subsection(iv) below; (iii) to their own affiliates, provided that such affiliates shall be restricted in use and redisclosure of the Confidential Information to the same extent as the parties hereto. “Agents”, for purposes of this Section, mean each of the parties’ advisors, directors, officers, employees, contractors, consultants affiliated entities (i.e., an entity controlling, controlled by, or under common control with a party), or other agents. If and to the extent any Agent of the recipient receive Confidential Information, such recipient party shall be responsible for such Agent’s full compliance with the terms and conditions of this Agreement and shall be liable for any such Agent’s non-compliance.

  • Account Information Disclosure We will disclose information to third parties about your account or the transfers you make: - As necessary to complete transfers; - To verify the existence of sufficient funds to cover specific transactions upon the request of a third party, such as a credit bureau or merchant; - If your account is eligible for emergency cash and/or emergency card replacement services and you request such services, you agree that we may provide personal information about you and your account that is necessary to provide you with the requested service(s); - To comply with government agency or court orders; or - If you give us your written permission.

  • Use of Customer Data Verizon, Verizon Affiliates and their respective agents, may use, process and/or transfer Customer Data (including intra-group transfers and transfers to entities in countries that do not provide statutory protections for personal information) as set forth in the Privacy Policy and as necessary:

  • Confidentiality of Contractor Information The Contractor acknowledges and agrees that this Contract and any and all Contractor information obtained by the State in connection with this Contract are subject to the State of Vermont Access to Public Records Act, 1 V.S.A. § 315 et seq. The State will not disclose information for which a reasonable claim of exemption can be made pursuant to 1 V.S.A. § 317(c), including, but not limited to, trade secrets, proprietary information or financial information, including any formulae, plan, pattern, process, tool, mechanism, compound, procedure, production data, or compilation of information which is not patented, which is known only to the Contractor, and which gives the Contractor an opportunity to obtain business advantage over competitors who do not know it or use it. The State shall immediately notify Contractor of any request made under the Access to Public Records Act, or any request or demand by any court, governmental agency or other person asserting a demand or request for Contractor information. Contractor may, in its discretion, seek an appropriate protective order, or otherwise defend any right it may have to maintain the confidentiality of such information under applicable State law within three business days of the State’s receipt of any such request. Contractor agrees that it will not make any claim against the State if the State makes available to the public any information in accordance with the Access to Public Records Act or in response to a binding order from a court or governmental body or agency compelling its production. Contractor shall indemnify the State for any costs or expenses incurred by the State, including, but not limited to, attorneys’ fees awarded in accordance with 1 V.S.A. § 320, in connection with any action brought in connection with Contractor’s attempts to prevent or unreasonably delay public disclosure of Contractor’s information if a final decision of a court of competent jurisdiction determines that the State improperly withheld such information and that the improper withholding was based on Contractor’s attempts to prevent public disclosure of Contractor’s information. The State agrees that (a) it will use the Contractor information only as may be necessary in the course of performing duties, receiving services or exercising rights under this Contract; (b) it will provide at a minimum the same care to avoid disclosure or unauthorized use of Contractor information as it provides to protect its own similar confidential and proprietary information; (c) except as required by the Access to Records Act, it will not disclose such information orally or in writing to any third party unless that third party is subject to a written confidentiality agreement that contains restrictions and safeguards at least as restrictive as those contained in this Contract; (d) it will take all reasonable precautions to protect the Contractor’s information; and (e) it will not otherwise appropriate such information to its own use or to the use of any other person or entity. Contractor may affix an appropriate legend to Contractor information that is provided under this Contract to reflect the Contractor’s determination that any such information is a trade secret, proprietary information or financial information at time of delivery or disclosure.

  • Use of De-identified information De-identified information may be used by the Contractor for the purposes of development, research, and improvement of educational sites, services, or applications, as any other member of the public or party would be able to use de-identified data pursuant to 34 CFR 99.31(b). Contractor agrees not to attempt to re-identify de-identified Student Data.

  • Unauthorised Use of Confidential Information The Supplier/Service Provider shall not authorise any party to act on or use in any way any Confidential Information belonging to Transnet whether or not such party is aware of such Confidential Information, and shall promptly notify Transnet of the information if it becomes aware of any party so acting, and shall provide Transnet the information with such assistance as Transnet reasonably requires, at Transnet’s cost and expense, to prevent such third party from so acting.

  • Confidentiality and Safeguarding of University Records; Press Releases; Public Information Under this Agreement, Contractor may (1) create, (2) receive from or on behalf of University, or (3) have access to, records or record systems (collectively, University Records). Among other things, University Records may contain social security numbers, credit card numbers, or data protected or made confidential or sensitive by Applicable Laws. [Option (Include if University Records are subject to FERPA.): Additional mandatory confidentiality and security compliance requirements with respect to University Records subject to the Family Educational Rights and Privacy Act, 20 United States Code (USC) §1232g (FERPA) are addressed in Section 12.41.] [Option (Include if University is a HIPAA Covered Entity and University Records are subject to HIPAA.): Additional mandatory confidentiality and security compliance requirements with respect to University Records subject to the Health Insurance Portability and Accountability Act and 45 Code of Federal Regulations (CFR) Part 160 and subparts A and E of Part 164 (collectively, HIPAA) are addressed in Section 12.26.] Contractor represents, warrants, and agrees that it will: (1) hold University Records in strict confidence and will not use or disclose University Records except as (a) permitted or required by this Agreement, (b) required by Applicable Laws, or (c) otherwise authorized by University in writing; (2) safeguard University Records according to reasonable administrative, physical and technical standards (such as standards established by the National Institute of Standards and Technology and the Center for Internet Security [Option (Include if Section 12.39 related to Payment Card Industry Data Security Standards is not include in this Agreement.):, as well as the Payment Card Industry Data Security Standards]) that are no less rigorous than the standards by which Contractor protects its own confidential information; (3) continually monitor its operations and take any action necessary to assure that University Records are safeguarded and the confidentiality of University Records is maintained in accordance with all Applicable Laws and the terms of this Agreement; and (4) comply with University Rules regarding access to and use of University’s computer systems, including UTS165 at xxxx://xxx.xxxxxxxx.xxx/board-of-regents/policy-library/policies/uts165-information-resources-use-and-security-policy. At the request of University, Contractor agrees to provide University with a written summary of the procedures Contractor uses to safeguard and maintain the confidentiality of University Records.

  • CONTRACT INFORMATION 1. The State of Arkansas may not contract with another party:

  • Use of Data by User Registry Operator will permit user to use the zone file for lawful purposes; provided that (a) user takes all reasonable steps to protect against unauthorized access to and use and disclosure of the data and (b) under no circumstances will Registry Operator be required or permitted to allow user to use the data to, (i) allow, enable, or otherwise support the transmission by email, telephone, or facsimile of mass unsolicited, commercial advertising or solicitations to entities other than user’s own existing customers, or (ii) enable high volume, automated, electronic processes that send queries or data to the systems of Registry Operator or any ICANN-­‐accredited registrar.

  • Verizon OSS Information 8.5.1 Subject to the provisions of this Section 8, in accordance with, but only to the extent required by, Applicable Law, Verizon grants to CBB a non-exclusive license to use Verizon OSS Information.

Time is Money Join Law Insider Premium to draft better contracts faster.