End User’s Responsibilities Sample Clauses

End User’s Responsibilities. 4.3.1. End User’s Facilities and Users. End User shall be responsible for providing the required environment for the Subscription Services, including, without limitation, preparation of any mobile devices and provision of Wi-Fi access and/or data plan coverage at End User’s facilities. End User shall be responsible for downloading and installing the Subscription Services on a secure mobile device and configuring mobile devices as may be necessary. End User shall monitor all Users utilizing the Subscription Services to ensure continuous compliance with these terms and any training provided to End User by Vocera. End User shall be solely responsible for its User’s failure to comply with these terms, training provided by Vocera, or any applicable state and federal laws.
End User’s Responsibilities. End User warrants that it (i) has validly entered into this Agreement and has the legal power to do so and (ii) will not intentionally upload a file containing Malicious Code into the Subscription Services or other intentionally breach End User’s responsibilities set forth herein. End User shall (i) be responsible for the accuracy, quality and legality of End User’s Data and of the means by which End User and its Users acquired the Data; (ii) use commercially reasonable efforts to prevent unauthorized access to or use of the Subscription Services, and notify Vocera promptly of any such unauthorized access or use; and (iii) use the Subscription Services only in accordance with the applicable Product Documentation and applicable laws and government regulations. End User shall not (a) sell, resell, rent or lease the Subscription Services; (b) use the Subscription Services to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third- party privacy rights; (c) use the Subscription Services to store or transmit Malicious Code; (d) interfere with or disrupt the integrity or performance of the Subscription Services or third-party data contained therein or the servers or networks connected to the Subscription Services; (e) attempt to gain unauthorized access to the Subscription Services or their related systems or networks; or (f) circumvent any technological measure provided from time to time to
End User’s Responsibilities. End User agrees to comply with the applicable provisions of the Master Agreement as well as those terms set forth below. End User hereby grants Company all consents, authorization and approvals necessary to enable Company to perform its obligations under this Agreement as well as the Master Agreement. Company has no responsibility to identify, evaluate or assist End User in End User’s decision to participate in any Special Program. End User is solely responsible for determining whether to participate in such opportunities. Company is not required to take or
End User’s Responsibilities. Somnetics’ provision of Support to End user is subject to the following: 5.1. End user shall provide Somnetics with necessary access to End user’s equipment. This access includes the ability to dial-in to the equipment on which the product is installed / operating and may also include the ability to obtain the same access to the equipment, as those of End user’s employees and their IT Administrator, for such time and period, for the purpose of resolving the problems and issues faced by the End user in the product supplied by Somnetics. 5.2. End user shall implement procedures for the protection of information and ensure implementation of backup facilities, to enable restoration of data, in the event of errors or malfunction of the software product or equipment. 5.3. End user shall promptly report all detected errors or malfunctions of the product to Somnetics. End user shall take all steps necessary to carry out procedures for the rectification of errors or malfunctions within a reasonable time, as and when such procedures have been received from Somnetics. 5.4. End user shall maintain a current backup copy of all Programs and data. 5.5. The End user shall not permit or authorize anyone other than Somnetics to provide any maintenance services in respect of the Product during the Tenure of this agreement. 5.6. End user shall appoint up to two (2) individuals, skilled technically within each of End users’ sites who serve as primary contacts between End user and Somnetics regarding the registry and report of Support Calls. The names of the said personnel shall be promptly intimated to Somnetics. All of End user’s Support inquiries shall be initialized through these contacts.
End User’s Responsibilities. 11.1 Clock’s commitments under this Agreement shall not release End User from its obligations as Controller. End User undertakes to develop, implement, control update its internal data protection and privacy policies. 11.2 End User undertakes to comply with any requirements of the applicable legislation as well as to follow Clock’s instructions related to data protection. End user shall continuously take all reasonable security action, such as but not limited to implementing virus protection software, network security policies or periodic update of passwords, to improve the general system security of your hardware and networks which are in a direct relation with the data protection. 11.3 Customer is solely responsible for its use of the Services, including: (a) setting the character of Customer Personal Data to be processed; (b) making appropriate use of the Services to ensure a level of security appropriate to the risk in respect of the Customer Personal Data; (c) securing the account authentication credentials, systems and devices End User uses to access the Services; and (d) backing up its Customer Personal Data; (e) securing Customer Personal Data that End User elects to transfer or store outside of Clock’s systems. (f) evaluating for itself whether the Web Hosted Services, including Cock’s security measures and control meets End User’s needs and obligations as a Controller. 11.4 Clock has no obligation to protect Customer Personal Data that End User elects to store or transfer outside of Clock’s systems (for example, offline or on-premise storage). 11.5 End User accepts and agrees that Clock provides a level of security appropriate to the risk in respect of the Customer Personal Data and meets all requirements of the data protection legislation of the country where End User’s business is based. If the said legislation requires from Clock any registration, permission or licensing End User shall promptly notify Clock and Clock shall be entitled to terminate Main Agreement at its sole discretion without any liability for Clock. Failing to notify, End User shallindemnify Clock against any penalties imposed or damages incurred in relation with any inconformity with the said legislation. 11.6 End User accepts and agrees that despite Clock’s reasonable efforts data incidents are possible (for example, as a result of technical malfunction, programming error, or hacker attack etc.) End User shall implement all reasonable efforts to protect itself against conse...

Related to End User’s Responsibilities

  • Customer’s Responsibilities 2.1. A properly configured hardware firewall is required for each Customer Location using a persistent connection to the public internet or any private network where there is a potential for unauthorized access. This requirement is Customer’s responsibility. 2.2. Unless you subscribe to the Network and Security Services option known as “Antivirus Service” (or its successor product), Customer will be required to have and maintain in place third party malware and anti-virus protection software, including periodic and routine updates in accordance with the manufacturer’s recommendations, and security for the Customer’s POS System Network, which security includes unique, strong passwords per user, physical security and access control policies. Customer acknowledges and agrees that security and protection of all of its networks, including the Customer POS System Network, and the data and applications on such networks, including protections against unauthorized access, is Customer’s responsibility. Customer acknowledges that, to be effective, malware protection software, system passwords and other security software and hardware components require periodic and routine updates, which Customer must obtain or perform as applicable. Customer agrees to not use or attempt to install remote access software on the Customer POS System Network unless approved by NCR Voyix.

  • Supplier’s Responsibilities 14.1 The Supplier shall supply all the Goods and Related Services included in the Scope of Supply in accordance with GCC Clause 12, and the Delivery and Completion Schedule, as per GCC Clause 13.

  • Buyer’s Responsibilities 14.1 All sites at which the Products shall be delivered or installed shall be prepared by Buyer in accordance with Nortel's standards, including, without limitation, environmental requirements. 14.2 Buyer shall provide Nortel-designated personnel access to the Products during the times deemed necessary by Nortel to install, maintain and service the Products in accordance with Nortel's obligations. Nortel personnel shall comply with Buyer's reasonable site and security regulations, provided Nortel receives written notice of any such regulations reasonably in advance of the arrival of Nortel's personnel at the site. 14.3 Buyer shall provide reasonable working space and facilities, including heat, light, ventilation, telephones, electrical current, trash removal and other necessary utilities for use by Nortel-designated maintenance personnel, and adequate secure storage space, if required by Nortel, for Products and materials. Buyer shall also provide adequate security for the Products while on Buyer's site. 14.4 Buyer shall obtain all necessary governmental permits applicable to Buyer in connection with the installation, operation, and maintenance of Products furnished hereunder, excluding any applicable permits required in the normal course of Nortel's doing business. 14.5 Any information which Nortel reasonably requests from Buyer and which is necessary for Nortel to properly install or maintain the Products shall be provided by Buyer to Nortel in a timely fashion and in a form reasonably specified by Nortel.

  • SELLER’S RESPONSIBILITIES (a) Seller shall act in performance of this Agreement as an independent contractor and not as an agent for Company or the Government in performing this Agreement, maintaining complete control over its employees and all lower-tier subcontractors. Nothing contained in this Agreement or any lower-tier subcontract shall create any contractual relationship between any such lower-tier subcontractor and the Government or Company. Seller is solely responsible for the actions of itself and its lower-tier subcontractors, agents or employees. (b) Seller shall be responsible for all liability and related expenses resulting from (1) injury, death, damage to or loss of property or (2) violation of Part 1.12a Compliance with Laws, which is in any way connected with its performance of work under this Agreement. Seller's responsibility shall apply to activities of Seller, its agents, lower-tier subcontractors, or employees and such responsibility includes the obligation to indemnify, defend, and hold harmless the Government and the Company for Seller's conduct. However, such liability and indemnity does not apply to injury, death, or damage to property to the extent it arises from the negligent or willful misconduct of Company. (c) If Company’s costs are determined to be unallowable, its fee reduced, or it incurs any cost or damages as a result of Seller’s violation of applicable laws, orders, rules, regulations, or ordinances, or the submission of defective cost or pricing data, Company may make an equivalent reduction in amounts due Seller. (d) If Seller is a State agency, such as an Educational Institution, all liabilities and remedies shall be determined in accordance with the laws applicable to this Agreement under Part 1.2.

  • Customer’s Responsibility The policies in this document apply to the use of Data by Customers, Redistributors and their End Customers. Customers are responsible for compliance with this policy by all members of the Customer’s Group and by all persons to whom they distribute Data where authorised to do so. Turquoise recommends that Customers make this Schedule available to all Subscribers to their services having access to Data which is subject to Charges, reporting requirements or usage restrictions.