Use of Limited Data Set Sample Clauses

Use of Limited Data Set. Data Recipient shall not use or disclose the Limited Data Set except as permitted under the terms of this Agreement or as required by law.
AutoNDA by SimpleDocs
Use of Limited Data Set. The Data User may use and disclose the Limited Data Set only as permitted under the terms of this Agreement or required by law, but shall not otherwise use or disclose the Limited Data Set in any manner that would constitute a violation of the privacy regulations if used or disclosed by the University. Data User agrees not to use the Limited Data Set in such a way as to identify any individual and further agrees not to contact any individual. Data User shall limit the use or receipt of the Limited Data Set to the following individuals or classes of individuals who need the Limited Data Set for the performance of the Activities. ____________________________________________________________________________. [Implementation Guideline: Parties should insert a description of who is permitted to use or receive the Limited Data Set.]
Use of Limited Data Set. The Data User may use and disclose the Limited Data Set only as permitted under the terms of this Agreement or required by law, but shall not otherwise use or disclose the Limited Data Set and shall ensure that its directors, officers, employees, contractors and agents do not use or disclose the Limited Data Set in any manner that would constitute a violation of the Privacy Standards if used by the Covered Entity. Data User agrees not to use the Limited Data Set in such a way as to identify any individual and further agrees not to contact any individual. Data User shall limit the use or receipt of the Limited Data Set to the following individuals or classes of individuals who need the Limited Data Set for the performance of the Activities. _____________________________________________________.
Use of Limited Data Set. Data Recipient (including without limitation its employees, officers, directors, and volunteers) shall not use or disclose the Limited Data Set except as permitted under the terms of this Agreement or as required by law. Data Recipient shall not use or disclose PHI for fundraising or marketing purposes, in accordance with 42 USC 17936(a). Data Recipient shall not disclose PHI to a health plan for payment or health care operations purposes if the patient has requested this special restriction, and has paid out of pocket in full for the health care item or service to which the PHI solely relates. Data Recipient shall not directly or indirectly receive remuneration in exchange for PHI, except with the prior written consent of Covered Entity; however, this prohibition shall not affect payment by Covered Entity to Data Recipient for services provided pursuant to the Underlying Agreements.
Use of Limited Data Set a. The Data User may use and disclose the Limited Data Set only as permitted under the terms of this DUA or required by law, but will not otherwise use or disclose the Limited Data Set and will ensure that its directors, officers, employees, contractors and agents do not use or disclose the Limited Data Set in any manner that would constitute a violation of the Privacy Standards if so used or disclosed by UChicago.
Use of Limited Data Set. Authorized User may use and disclose the Limited Data Set only as permitted under the terms of this Agreement or as required by law, but shall not otherwise use or disclose the Limited Data Set and shall ensure that its directors, officers, employees, contractors and agents do not use or disclose the Limited Data Set in any manner that would constitute a violation of the Privacy Rule if used by Covered Entity. Authorized User agrees not to use the Limited Data Set in such a way as to identify any individual and further agrees not to contact any individual. Authorized User shall limit the use or receipt of the Limited Data Set to the individuals or classes of individuals set forth on Exhibit C.

Related to Use of Limited Data Set

  • Use of Image I hereby consent to the use of my image by EMPOWER for any and all purposes, including, without limitation or compensation: Video, still photographs, publication and any trade or advertising purposes, providing such uses are not made as to constitute a direct endorsement of any product or service. PARTICIPANT INFORMATION (MUST BE COMPLETED FOR ALL PARTICIPANT(S) Name of Participant: (Print Clearly) Initial Date of Birth: _ Weight: Check In on Facebook Street Address: City: State: Zip: Phone Number: Email Address: Emergency Contact: Phone Number: Emergency Contact’s Relationship to Participant: By signing this document, I acknowledge that I may be found by a court of law to have waived my right to a lawsuit against the Released Parties on the basis of any claim herein from which I have released them. I HAVE HAD THE SUFFICIENT OPPORTUNITY TO READ THIS ENTIRE DOCUMENT. I HAVE CAREFULLY READ AND UNDERSTOOD IT AND AGREE TO BE BOUND BY ITS TERMS. Participant’s Signature: (Over 18 years of age) Date: PARENT OR GUARDIAN’S ADDITIONAL INDEMNIFICATION (MUST BE COMPLETED FOR PARTICIPANTS UNDER THE AGE OF 18) I, (parent/guardian name), the parent/guardian of (Xxxxx’s name) whose date of birth is / / give permission for my child to participate in the activities and utilize the equipment and facilities provided by EMPOWER. I have reviewed the terms of the above Agreement and, as parent/guardian, accept its terms. I have discussed the terms of the above Agreement with my child and am assured by my child that he/she understands the Agreement and has also freely accepted its terms. I agree to fully release, indemnify and hold harmless the Released Parties from any claims which I may have and, to the fullest extent allowed by law, to release the Released Parties on behalf of my child for any claim(s) that my child may have. I further agree to indemnify and hold harmless the Released Parties from any and all claims which are brought by, or on behalf of the above stated minor and which are in any way connected with such use or participation by the above stated minor. I HAVE HAD THE SUFFICIENT OPPORTUNITY TO READ THIS ENTIRE DOCUMENT. I HAVE READ AND UNDERSTOOD IT AND AGREE THAT MYSELF AND MY MINOR CHILD ARE TO BE BOUND BY ITS TERMS. Parent/Guardian’s Signature: Date:

  • Use of Data by User Registry Operator will permit user to use the zone file for lawful purposes; provided that (a) user takes all reasonable steps to protect against unauthorized access to and use and disclosure of the data and (b) under no circumstances will Registry Operator be required or permitted to allow user to use the data to, (i) allow, enable, or otherwise support the transmission by email, telephone, or facsimile of mass unsolicited, commercial advertising or solicitations to entities other than user’s own existing customers, or (ii) enable high volume, automated, electronic processes that send queries or data to the systems of Registry Operator or any ICANN-­‐accredited registrar.

  • Data Security and Unauthorized Data Release The Requester and Approved Users, including the Requester’s IT Director, acknowledge NIH’s expectation that they have reviewed and agree to manage the requested controlled-access dataset(s) and any Data Derivatives of controlled-access datasets according to NIH’s expectations set forth in the current NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy and the Requester’s IT security requirements and policies. The Requester, including the Requester’s IT Director, agree that the Requester’s IT security requirements and policies are sufficient to protect the confidentiality and integrity of the NIH controlled-access data entrusted to the Requester. If approved by NIH to use cloud computing for the proposed research project, as outlined in the Research and Cloud Computing Use Statements of the Data Access Request, the Requester acknowledges that the IT Director has reviewed and understands the cloud computing guidelines in the NIH Security Best Practices for Controlled-Access Data Subject to the NIH GDS Policy. The Requester and PI agree to notify the appropriate DAC(s) of any unauthorized data sharing, breaches of data security, or inadvertent data releases that may compromise data confidentiality within 24 hours of when the incident is identified. As permitted by law, notifications should include any known information regarding the incident and a general description of the activities or process in place to define and remediate the situation fully. Within 3 business days of the DAC notification, the Requester agrees to submit to the DAC(s) a detailed written report including the date and nature of the event, actions taken or to be taken to remediate the issue(s), and plans or processes developed to prevent further problems, including specific information on timelines anticipated for action. The Requester agrees to provide documentation verifying that the remediation plans have been implemented. Repeated violations or unresponsiveness to NIH requests may result in further compliance measures affecting the Requester. All notifications and written reports of data security incidents and policy compliance violations should be sent to the DAC(s) indicated in the Addendum to this Agreement. NIH, or another entity designated by NIH may, as permitted by law, also investigate any data security incident or policy violation. Approved Users and their associates agree to support such investigations and provide information, within the limits of applicable local, state, tribal, and federal laws and regulations. In addition, Requester and Approved Users agree to work with the NIH to assure that plans and procedures that are developed to address identified problems are mutually acceptable and consistent with applicable law.

  • Use of Software Any software that is available on the Services ("Software") is the copyrighted work of Red Hat and/or its licensors. Copying or reproducing the Software to any other server or location for further reproduction or redistribution is strictly prohibited, unless such reproduction or redistribution is permitted by a license agreement accompanying such Software. You may not create derivative works of the Software, or attempt to decompile or reverse-engineer the Software unless otherwise permitted by law. Use of the Software is subject to the license terms of any license agreement that may accompany or is provided with the Software. You may not download any Software until you have read and accepted the terms of the accompanying software license. WITHOUT LIMITING THE FOREGOING, THE SOFTWARE IS WARRANTED, IF AT ALL, ONLY ACCORDING TO THE TERMS OF THE SEPARATE LICENSE AGREEMENT ACCOMPANYING THE SOFTWARE. EXCEPT AS WARRANTED IN SUCH LICENSE AGREEMENT, RED HAT, ITS PARENT, SUBSIDIARY, AND AFFILIATE COMPANIES, AND ITS LICENSORS DISCLAIM ALL WARRANTIES AND CONDITIONS WITH REGARD TO THE SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT, TO THE MAXIMUM EXTENT PERMITTED BY LAW.

  • Use of Likeness As part of the consideration for this Housing Agreement, Resident authorizes Owner and its affiliates to make photographs and video recordings of Resident in community and resident amenity areas, and irrevocably grants Owner and its affiliates a royalty-free license to use Resident’s image and likeness for all lawful purposes, including promotional purposes in advertising, video, web, social media and other formats.

  • Specific Restrictions on Use of Licensed Materials Unauthorized Use. Licensee shall not knowingly permit anyone other than Authorized Users to use the Licensed Materials.

  • Confidentiality and Data Security (a) The Custodian agrees to keep confidential, and to cause its employees and agents to keep confidential, all records of the Funds and information relating to the Funds, including without limitation information as to their respective shareholders and their respective portfolio holdings, unless the release of such records or information is made (i) in connection with the services provided under this Agreement, (ii) at the written direction of the applicable Fund or otherwise consented to, in writing, by the respective Funds, (iii) in response to a request of a governmental, regulatory or self-regulatory authority or agency or pursuant to a subpoena, court order or other legal process, in each case with respect to which the Custodian has determined, on the advice of counsel, that it is required to comply, or (iv) where the Custodian has determined, on the advice of counsel, that the failure to release such information would expose the Custodian to civil or criminal contempt proceedings; provided in the case of clause (iii) or (iv) the Custodian provides the applicable Fund written notice of such requirement to release such records or information, to the extent such notice is permitted. The foregoing shall not be applicable to any information that is publicly available when provided and shall cease to be applicable to any information that thereafter becomes publicly available, other than through a breach of this Section 10(a), or that is independently derived by any party hereto without the use of any information derived in connection with the services provided under this Agreement. Notwithstanding the foregoing but subject to Section 10(d), (1) the Custodian may use information regarding the Funds in connection with certain functions performed on a centralized basis by the Custodian, its affiliates or its or their service providers (including audit, accounting, risk, legal, compliance, sales, administration, product communication, relationship management, compilation and analysis of customer-related data and storage) and disclose such information to its affiliates and to its or their service providers who are subject to the confidentiality obligations hereunder with respect to such information, but only for the purpose of servicing the Funds in connection with the relationship contemplated by this Agreement or providing additional services to the Funds, and (2) the Custodian may aggregate Fund or Portfolio data with similar data of other customers of the Custodian (“Aggregated Data”) and may use Aggregated Data so long as such Aggregated Data represents such a sufficiently large sample that no Fund or Portfolio data can be identified either directly or by inference or implication.

  • Data Security and Privacy Plan As more fully described herein, throughout the term of the Master Agreement, Vendor will have a Data Security and Privacy Plan in place to protect the confidentiality, privacy and security of the Protected Data it receives from the District. Vendor’s Plan for protecting the District’s Protected Data includes, but is not limited to, its agreement to comply with the terms of the District’s Bill of Rights for Data Security and Privacy, a copy of which is set forth below and has been signed by the Vendor. Additional components of Vendor’s Data Security and Privacy Plan for protection of the District’s Protected Data throughout the term of the Master Agreement are as follows:

  • USE OF U.S. FOREST SERVICE INSIGNIA In order for the Cooperators to use the U.S. Forest Service insignia on any published media, such as a Web page, printed publication, or audiovisual production, permission must be granted from the U.S. Forest Service’s Office of Communications. A written request must be submitted and approval granted in writing by the Office of Communications (Washington Office) prior to use of the insignia.

  • Use of Communication Services The Website may contain bulletin board services, chat areas, news groups, forums, communities, personal web pages, calendars, blog comment sections and/or other message or communication facilities designed to enable you to communicate with the public at large or with a group (collectively, “Communication Services”), you agree to use the Communication Services only to post, send and receive messages and material that are proper and related to the particular Communication Service. By way of example, and not as a limitation, you agree that when using a Communication Service, you will not: defame, abuse, harass, stalk, threaten or otherwise violate the legal rights (such as rights of privacy and publicity) of others; publish, post, upload, distribute or disseminate any inappropriate, profane, defamatory, infringing, obscene, indecent or unlawful topic, name, material or information; upload files that contain software or other material protected by intellectual property laws (or by rights of privacy of publicity) unless you own or control the rights thereto or have received all necessary consents; upload files that contain viruses, corrupted files, or any other similar software or programs that may damage the operation of another's computer; advertise or offer to sell or buy any goods or services for any business purpose, unless such Communication Service specifically allows such messages; conduct or forward surveys, contests, pyramid schemes or chain letters; download any file posted by another user of a Communication Service that you know, or reasonably should know, cannot be legally distributed in such manner; falsify or delete any author attributions, legal or other proper notices or proprietary designations or labels of the origin or source of software or other material contained in a file that is uploaded, restrict or inhibit any other user from using and enjoying the Communication Services; violate any code of conduct or other guidelines which may be applicable for any particular Communication Service; harvest or otherwise collect information about others, including e-mail addresses, without their consent; violate any applicable laws or regulations. The Company has no obligation to monitor the Communication Services. However, the Company reserves the right to review materials posted to a Communication Service and to remove any materials in its sole discretion. The Company reserves the right to terminate your access to any or all of the Communication Services at any time without notice for any reason whatsoever. The Company reserves the right at all times to disclose any information as necessary to satisfy any applicable law, regulation, legal process or governmental request, or to edit, refuse to post or to remove any information or materials, in whole or in part, in the Company’s sole discretion. Always use caution when giving out any personally identifying information about yourself in any Communication Service. The Company does not control or endorse the content, messages or information found in any Communication Service and, therefore, the Company specifically disclaims any liability with regard to the Communication Services and any actions resulting from your participation in any Communication Service. Managers and hosts are not authorized the Company spokespersons, and their views do not necessarily reflect those of the Company. Materials uploaded to a Communication Service may be subject to posted limitations on usage, reproduction and/or dissemination. You are responsible for adhering to such limitations if you upload the materials.

Time is Money Join Law Insider Premium to draft better contracts faster.