Mobile Subscriber Information You authorize your wireless carrier to disclose information about your account, such as subscriber status, payment method and device details, if available, to support identity verification, fraud avoidance and other uses in support of transactions for the duration of your business relationship with us. This information may also be shared with other companies to support your transactions with us and for identity verification and fraud avoidance purposes.
Subscriber A Person who lawfully receives Cable Service over the Cable System with Franchisee’s express permission.
Other Authorized Payments For other authorized transactions of the Fund, or other obligations of the Fund incurred for proper Fund purposes; provided that before making any such payment the Bank will also receive a certified copy of a resolution of the Board signed by an Authorized Person (other than the Person certifying such resolution) and certified by its Secretary or Assistant Secretary, naming the person or persons to whom such payment is to be made, and either describing the transaction for which payment is to be made and declaring it to be an authorized transaction of the Fund, or specifying the amount of the obligation for which payment is to be made, setting forth the purpose for which such obligation was incurred and declaring such purpose to be a proper corporate purpose.
Authorized Persons Concurrently with the execution of this Agreement and from time to time thereafter, as appropriate, each Fund shall deliver to the Custodian, duly certified as appropriate by a Treasurer or any Deputy or Assistant Treasurer of such Fund, a certificate setting forth: (a) the names, titles, signatures and scope of authority of all persons authorized to give Proper Instructions or any other notice, request, direction, instruction, certificate or instrument on behalf of such Fund (collectively, the "Authorized Persons" and individually, an "Authorized Person"); and (b) the names, titles and signatures of those persons authorized to issue Special Instructions. Such certificate may be accepted and relied upon by the Custodian as conclusive evidence of the facts set forth therein and shall be considered to be in full force and effect until delivery to the Custodian of a similar certificate to the contrary. Upon delivery of a certificate which deletes the name(s) of a person previously authorized by a Fund to give Proper Instructions or to issue Special Instructions, such persons shall no longer be considered an Authorized Person or authorized to issue Special Instructions for that Fund.
User Subscriptions 2.1 Subject to the Customer purchasing the User Subscriptions in accordance with 3.3 and 8.1, the restrictions set out in this 2 and the other terms and conditions of this agreement, the Supplier hereby grants to the Customer a non-exclusive, non-transferable right, without the right to grant sublicences, to permit the Authorised Users to use the Services and the Documentation during the Subscription Term solely for the Customer's internal business operations. 2.2 In relation to the Authorised Users, the Customer undertakes that: (a) the maximum number of Authorised Users that it authorises to access and use the Services and the Documentation shall not exceed the number of User Subscriptions it has purchased from time to time; (b) it will not allow or suffer any User Subscription to be used by more than one individual Authorised User unless it has been reassigned in its entirety to another individual Authorised User, in which case the prior Authorised User shall no longer have any right to access or use the Services and/or Documentation; (c) each Authorised User shall keep a secure password for their use of the Services and Documentation and that each Authorised User shall keep their password confidential; (d) it shall permit the Supplier or the Supplier's designated auditor to audit the Services in order to establish the name and password of each Authorised User and the Customer's data processing facilities to audit compliance with this agreement. Each such audit may be conducted no more than once per quarter, at the Supplier's expense, and this right shall be exercised with reasonable prior notice, in such a manner as not to substantially interfere with the Customer's normal conduct of business; (e) if any of the audits referred to in clause 2.2(d) reveal that any password has been provided to any individual who is not an Authorised User, then without prejudice to the Supplier's other rights, the Customer shall promptly disable such passwords and the Supplier shall not issue any new passwords to any such individual; and (f) if any of the audits referred to in 2.2(d) reveal that the Customer has underpaid Subscription Fees to the Supplier, then without prejudice to the Supplier's other rights, the Customer shall pay to the Supplier an amount equal to such underpayment as calculated in accordance with the prices set out in paragraph 1 of Schedule 1 within 10 Business Days of the date of the relevant audit. 2.3 The Customer shall not access, store, distribute or transmit any Viruses, or any material during the course of its use of the Services that: (a) is unlawful, harmful, threatening, defamatory, obscene, infringing, harassing or racially or ethnically offensive; (b) facilitates illegal activity; (c) depicts sexually explicit images; (d) promotes unlawful violence; (e) is discriminatory based on race, gender, colour, religious belief, sexual orientation, disability; or (f) is otherwise illegal or causes damage or injury to any person or property; and the Supplier reserves the right, without liability or prejudice to its other rights to the Customer, to disable the Customer's access to any material that breaches the provisions of this clause. 2.4 The Customer shall not: (a) except as may be allowed by any applicable law which is incapable of exclusion by agreement between the parties and except to the extent expressly permitted under this agreement: (i) attempt to copy, modify, duplicate, create derivative works from, frame, mirror, republish, download, display, transmit, or distribute all or any portion of the Software and/or Documentation (as applicable) in any form or media or by any means; or (ii) attempt to de-compile, reverse compile, disassemble, reverse engineer or otherwise reduce to human-perceivable form all or any part of the Software; or (b) access all or any part of the Services and Documentation in order to build a product or service which competes with the Services and/or the Documentation; or (c) use the Services and/or Documentation to provide services to third parties; or (d) subject to 22.1, license, sell, rent, lease, transfer, assign, distribute, display, disclose, or otherwise commercially exploit, or otherwise make the Services and/or Documentation available to any third party except the Authorised Users, or (e) attempt to obtain, or assist third parties in obtaining, access to the Services and/or Documentation, other than as provided under this 2; or (f) introduce or permit the introduction of any Virus [or Vulnerability] into the Supplier's network and information systems. 2.5 The Customer shall use all reasonable endeavours to prevent any unauthorised access to, or use of, the Services and/or the Documentation and, in the event of any such unauthorised access or use, promptly notify the Supplier. 2.6 The rights provided under this 2 are granted to the Customer only, and shall not be considered granted to any subsidiary or holding company of the Customer.