Configuration and Use Sample Clauses

Configuration and Use. Subscriber may not allow any person or entity to use or access the Subscription or iCIMS Content except its Affiliates, Users, and Candidates. Use of the Subscription and iCIMS Content under this Agreement is limited to authorized Users only, and other limitations set forth in the applicable Order Form or Documentation. Subscriber and its Affiliates and Users shall comply with iCIMS’ Acceptable Use Policy that may be accessed at ▇▇▇▇▇://▇▇▇.▇▇▇▇▇.▇▇▇/gc, and shall not authorize its Candidates to violate the Acceptable Use Policy. Subscriber is solely responsible for any configuration of the Subscription and any electronic forms, materials, communications, content and processes selected by Subscriber or its Affiliate or User for use in or in connection with the Subscription. Subscriber is solely responsible for any use of the Subscription by Subscriber or its Affiliate or User, including any recruiting, hiring or employment-related process, action or decision, and shall ensure that any process, action or decision does not violate any law or regulation. Subject to iCIMS’ compliance with Section 4 of this Agreement, Subscriber is solely responsible for and shall ensure that use or disclosure of any Subscriber Data in accordance with this Agreement complies with applicable laws and regulations, including any required notices or consents.
Configuration and Use. Subscriber may not allow any person or entity to use or access the Subscription, Documentation, or iCIMS Content except its Affiliates, Users, and Candidates. Use of the Subscription, Documentation, and iCIMS Content under this Agreement is limited to authorized Users only, and other limitations set forth in the applicable Order Form or Documentation. Subscriber and its Affiliates and Users shall comply with iCIMS’ Acceptable Use Policy that may be accessed at ▇▇▇▇▇://▇▇▇.▇▇▇▇▇.▇▇▇/gc, and shall not authorize its Candidates to violate the Acceptable Use Policy. Subscriber is solely responsible for any configuration of the Subscription and any electronic forms, materials, communications, content and processes selected by Subscriber or its Affiliate or User for use in or in connection with the Subscription. Subscriber acknowledges and agrees that any output, recommendation, suggestion, explanation, or analysis provided by the Subscription is for informational purposes only. Subscriber is solely responsible for any use of the Subscription by Subscriber or its Affiliate or User, including any recruiting, hiring or employment-related process, action or decision, and shall ensure that any process, action or decision does not violate any law or regulation. Subject to iCIMS’ compliance with Section 4 of this Agreement, Subscriber is solely responsible for and shall ensure that use or disclosure of any Subscriber Data in accordance with this Agreement complies with applicable laws and regulations, including any required notices or consents.
Configuration and Use. 8.1. The Software provided under this Agreement include storage for Customer Data up to a limit (herein “Storage Limit”) of five hundred Gigabytes (500 GB). Additional storage may be purchased separately by contacting Athena. 8.2. In the event that Customer Data exceeds the Storage Limit, Customer will pay Athena a volume- based overage fee for each month Customer Data exceeds the Storage Limit. For the purposes of calculating Customer Data storage size, the size of the data is the sum of (i) the database files containing Customer Data (as calculated by the file system); (ii) the unencrypted and uncompressed files uploaded to the Software or generated by the use of the Software; and (iii) excluding any Backups, data files generated by system logs or logs generated by the Software. Volume-based overage fees will be assessed on the last day of each month during the Service Term or subsequent Renewal Term(s). 8.3. If Customer’s usage of resources including bandwidth, CPU and memory is excessive (as determined solely by Athena), Athena reserves the right to: (a) immediately disable Customer’s Software services, or throttle Customer’s Software services until Customer can reduce resource consumption; and/or (b) impose an appropriate fee commensurate with such excess usage. 8.4. Should unintended or undesirable performance impact on desired or promised service level response times and/or overall performance to the Customer or other Athena customers’ experience, the Customer agrees to work on a best efforts, good faith basis to design, reconfigure and implement changes to remedy the unintended or undesirable consequences.
Configuration and Use. Any use of the SkillSurvey Service by Subscriber, its Affiliates, Users, Candidates and/or Survey Recipients shall be within the United States only. Subscriber is solely responsible for any use of the SkillSurvey Service by Subscriber, its Affiliate, or its Users, and any Subscriber Data, including any recruiting, hiring or employment‐related process, action or decision, and shall ensure that any process, action or decision does not violate any law or regulation.
Configuration and Use. Client may not allow any person or entity to use or access the Subscription or Visibility Content except its Affiliates and Users. Use of the Subscription and Visibility Content under this Agreement is limited to authorized Users only, and other limitations set forth in the applicable Order Form or Documentation. Client and its Affiliates and Users shall comply with Visibility’s Acceptable Use Policy that may be accessed at ▇▇▇▇▇://▇▇▇.▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇/terms. Client is solely responsible for any configuration of the Subscription and any electronic forms, materials, communications, content and processes selected by Client or its Affiliate or User for use in or in connection with the Subscription. Client is solely responsible for any use of the Subscription by Client or its Affiliate or User, including any recruiting, hiring or employment-related process, action or decision, and shall ensure that any process, action or decision does not violate any law or regulation. Subject to Visibility’s compliance with Section 4 of this Agreement, Client is solely responsible for and shall ensure that use or disclosure of any Client Data in accordance with this Agreement complies with applicable laws and regulations, including any required notices or consents.
Configuration and Use. Client may not allow any person or entity to use or access the Subscription or Visibility Content except its Affiliates, Users, and Candidates. Use of the Subscription and Visibility Content under this Agreement is limited to authorized Users only, and other limitations set forth in the applicable Order Form or Documentation. Client and its Affiliates and Users shall comply with Visibility’ Acceptable Use Policy that may be accessed at ▇▇▇▇▇://▇▇▇.▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇/gc, and shall not authorize its Candidates to violate the Acceptable Use Policy. Client is solely responsible for any configuration of the Subscription and any electronic forms, materials, communications, content and processes selected by Client or its Affiliate or User for use in or in connection with the Subscription. Client is solely responsible for any use of the Subscription by Client or its Affiliate or User, including any recruiting, hiring or employment-related process, action or decision, and shall ensure that any process, action or decision does not violate any law or regulation. Subject to Visibility’ compliance with Section 4 of this Agreement, Client is solely responsible for and shall ensure that use or disclosure of any Client Data in accordance with this Agreement complies with applicable laws and regulations, including any required notices or consents.
Configuration and Use. Subscriber is solely responsible for any use of the Opportunity Marketplace Services by Subscriber, its Affiliate, or its User, and any Subscriber Data, including any recruiting, hiring or employment-related process, action or decision, and shall ensure that any process, action or decision does not violate any law or regulation. Subscriber acknowledges and agrees that any output, recommendation, suggestion, explanation, or analysis, including via artificial intelligence or machine learning, provided by the Opportunity Marketplace Service is for informational purposes only. Subscriber shall not, and shall not permit any User to: (i) use the Opportunity Marketplace Service to harvest, collect, gather or assemble information or data regarding any job candidate or other person without his or her consent; or (ii) access or copy any data or information of a job candidate or other person without his or her consent. Subject to iCIMS’ compliance with Section 5 of this OMP Addendum, Subscriber is solely responsible for and shall ensure that use or disclosure of any Subscriber Data in accordance with the Subscription Agreement complies with applicable laws and regulations, including any required notices or consents. Subscriber shall obtain any consent, permission, license, or other Intellectual Property Right that may be required for uploading, importing, or using any Subscriber Data in the Opportunity Marketplace Service. Subscriber agrees that it will not use the Opportunity Marketplace Service to collect, process, or store bank account information, credit or debit card information, personal information pertaining to children under thirteen (13) years of age, or health or medical information.
Configuration and Use. The Broker shall, at its cost, obtain, develop and configure the Broker's Terminal, operating system, web browser and additional software to be compatible with the Broker's Software and shall use the Broker's Software and Broker's Terminal in accordance with standards and protocols established by SEG from time to time and in accordance with this Agreement;
Configuration and Use. (a) Notwithstanding anything to the contrary in any iCIMS Content or Documentation, Subscriber may use the Test Builder Service solely for Subscriber’s and its Affiliate’s own pre-employment and employment purposes. Subscriber is solely responsible for any use of the Test Builder Service by Subscriber or its Affiliate or User, including any recruiting, hiring, or employment-related process, and shall ensure that any aforementioned process, action or decision based on the information provided by the Test Builder Services does not violate any applicable law or regulation. (b) Subscriber agrees that it will not use the Test Builder Services to (i) harvest, collect, gather or assemble information or data regarding any job candidate or other person without his or her consent, or (ii) collect, process, or store bank account information, credit or debit card information, personal information pertaining to minors, health or medical information, or to create or store any educational records. (c) Subscriber is solely responsible for and shall ensure that use of, or disclosure of, any Subscriber Data in accordance with this Agreement complies with applicable laws and regulations, including any required notices or consent. Further, Subscriber shall obtain any consent, permission, license, or other Intellectual Property Right that may be required for uploading, importing, or using any Subscriber Data in the Test Builder Service.

Related to Configuration and Use

  • Installation and Use You may install and use the Software only for the number of licenses acquired by you. In order to exercise your rights to the Software under this Agreement, you must activate your copy of the Software in the manner described during the launch sequence.

  • Operation and Use So long as the Aircraft, Airframe or any Engine is subject to the Lien of this Trust Indenture, the Owner shall not operate, use or locate the Aircraft, Airframe or any Engine, or allow the Aircraft, Airframe or any Engine to be operated, used or located, (i) in any area excluded from coverage by any insurance required by the terms of Section 4.06, except in the case of a requisition by the U.S. Government where the Owner obtains indemnity in lieu of such insurance from the U.S. Government, or insurance from the U.S. Government, against substantially the same risks and for at least the amounts of the insurance required by Section 4.06 covering such area, or (ii) in any recognized area of hostilities unless covered in accordance with Section 4.06 by war risk insurance, or in either case unless the Aircraft, the Airframe or any Engine is only temporarily operated, used or located in such area as a result of an emergency, equipment malfunction, navigational error, hijacking, weather condition or other similar unforeseen circumstance, so long as Owner diligently and in good faith proceeds to remove the Aircraft from such area. So long as the Aircraft, the Airframe or any Engine is subject to the Lien of this Trust Indenture, the Owner shall not permit such Aircraft, Airframe or any Engine, as the case may be, to be used, operated, maintained, serviced, repaired or overhauled (x) in violation of any Law binding on or applicable to such Aircraft, Airframe or Engine or (y) in violation of any airworthiness certificate, license or registration of any Government Entity relating to the Aircraft, the Airframe or any Engine, except (i) immaterial or non-recurring violations with respect to which corrective measures are taken promptly by Owner or Permitted Lessee, as the case may be, upon discovery thereof, or (ii) to the extent the validity or application of any such Law or requirement relating to any such certificate, license or registration is being contested in good faith by Owner or Permitted Lessee in any reasonable manner which does not involve any material risk of the sale, forfeiture or loss of the Aircraft, Airframe or any Engine, any material risk of criminal liability or material civil penalty against Mortgagee or impair the Mortgagee's security interest in the Aircraft, Airframe or any Engine.

  • Installation and Use Rights You may install and use any number of copies of the software on your devices.

  • System Use (a) An electronic site access system may be used on site, subject to the requirements of this statement. (b) The system operates via: (i) a facial recognition device; and (ii) an electronic gate. (c) The system will be installed at the access and egress point/s of the site and will only be utilised to identify presence on site. (d) The purpose for which the electronic site access system will be implemented is to ensure: (i) avoiding unauthorised access to site; (ii) confirmation and co-ordination of effort in emergency situations; and (iii) confirmation that all entrants to site have received a site specific induction; (e) The only personal data collected by the system is a site entrant’s: (i) image; (ii) first & last name; (iii) mobile phone number; (iv) email address; and (v) employer’s name. (the Collected Data) (f) The Collected Data will only be held or used for the purposes specified above, unless otherwise by consent or required by law. (g) The Employer will not use the electronic site access control system to verify who was on a site at a particular time for the purpose of: (i) evaluating whether a variation claim regarding labour costs made by a subcontractor can be substantiated; (ii) taking disciplinary action against an Employee, or assisting a subcontractor to take disciplinary action against its own employees, regarding their start and finish times; or (iii) otherwise generally tracking a worker’s movements whilst on the site.

  • LICENSE AND USE 2.1 Subject to the terms and conditions of this Agreement, Polar hereby grants You, and You accept, a royalty-free, non-transferable, non-exclusive, worldwide and limited license to use the Licensed Materials solely for the purposes of proprietary application or services development and/or setting their priorities in application development purposes interacting through AccessLink with Polar Ecosystem, as well as to distribute the software parts of the Licensed Materials in binary form and grant sublicense to use Licensed Materials to Your Corporate Customers, if applicable, but then always under Your own license terms and conditions protecting sufficiently, but in no case with less stringent terms than in this Agreement Polar’s Intellectual Property Rights, the use and handling of Data and Licensed Materials and Member’s privacy settings. Any other use of the AccessLink is strictly prohibited. 2.2 In no event You may copy, export, re-export, sublicense, rent, loan, lease, disclose, sell, market, commercialize, re-license, otherwise transfer to any third party (other than Your Corporate Customers) or use or permit use of the Licensed Materials in any manner inconsistent with or not expressly permitted under this Agreement. You shall not (or attempt to) itself or permit others to decompile, reverse engineer, or disassemble, derive or determine the source code (including the logic, protocols or specifications incorporated or implemented therein) of the Licensed Materials or enable any disabled logic, protocols or specifications incorporated or implemented in the Licensed Materials. You may not use, or permit others use the Licensed Materials in creating a service similar to or competing with Polar Ecosystem and the primary purpose of your application and service shall be extending and improving the Member’s experience. There are no implied licenses or other implied rights granted under this Agreement, and all rights, save for those expressly granted hereunder, shall remain with Polar and its licensors. Also, any and all licenses with respect to Polar or third party patents (including essential patents) are specifically excluded from the scope of this Agreement, and those licenses need to be acquired separately from Polar or the respective right holders, as the case may be. 2.3 Your application or service must not interfere or attempt to interfere in any manner with the proper working of Polar Ecosystem, or any related Polar service, application or activity. Load testing without prior approval by Polar will be construed as interfering with the proper working of Polar Ecosystem and may result in blacklisting of Your application or service by Polar. Polar may use any technical means to overcome such interference, including without limitation, suspending or terminating access to the Polar Ecosystem. Your application or service must pass a consistent and accurate identification of itself to Polar Ecosystem as outlined in the Polar AccessLink API documentation (link). Except as expressly permitted by Polar, You may not use any automated means (e.g., scraping and robots) other than Your application or software to access, query or otherwise collect Data or any other information from Polar Ecosystem, or any Web site owned or operated by Polar.