Protection Against Misuse of Data Clause Samples

The Protection Against Misuse of Data clause is designed to prevent unauthorized or inappropriate use, disclosure, or handling of data shared between parties. Typically, this clause outlines the obligations of each party to safeguard confidential or sensitive information, restricts data use to specified purposes, and may require implementing security measures or reporting breaches. Its core function is to ensure that data is handled responsibly and to mitigate the risk of data breaches or misuse, thereby protecting the interests and privacy of the parties involved.
POPULAR SAMPLE Copied 1 times
Protection Against Misuse of Data. The Software contains a function that prevents loss or misuse of critical data in direct connection with theft of a computer. This function is switched off under the default settings of the Software and an ESET account under special Terms of Usage needs to be created for it to be activated, through which the function activates data collection in the event of computer theft. If you activate this function of the Software, you agree to data about the stolen computer being sent to the Provider, which can include data about the computer’s network location, data about the configuration of the computer, data recorded by a camera connected to the computer or failed attempts to unlock computer (hereinafter referred to as “Data”). The End User shall be entitled to use Data obtained in this way exclusively for rectifying an adverse situation caused by theft of a computer and also grants the Provider the necessary approval, as specified under the relevant legal regulations, for processing Data. The Provider shall allow End User to store the Data on its technical equipment for the period required to achieve the purpose for which the data was obtained. You can deactivate this function at any time. Protection against misuse of data shall be used exclusively with computers and accounts End User have legitimate access to. Any illegal use will be reported to competent authority. Provider will comply with relevant laws and assist law enforcement authorities in case of the misuse. You agree and acknowledge that You are responsible for safeguarding the password to access ESET account and you agree that You shall not disclose your password to any third party. End User is responsible for any activity using Protection Against Misuse of Data function and ESET account, authorized or not. If ESET account is compromised, notify Provider immediately.

Related to Protection Against Misuse of Data

  • Protection Against Dilution If the Corporation, with respect to the Common Stock, (1) pays a dividend or makes a distribution on shares of Common Stock that is paid in shares of Common Stock or in securities convertible into or exchangeable for Common Stock (in which latter event the number of shares of Common Stock initially issuable upon the conversion or exchange of such securities shall be deemed to have been distributed), (2) subdivides outstanding shares of Common Stock, (3) combines outstanding shares of Common Stock into a smaller number of shares, or (4) issues by reclassification of Common Stock any shares of capital stock of the Corporation, the number of shares as to which this Warrant is exercisable as of the date of such event and the Exercise Price in effect immediately prior thereto shall be adjusted so that each Holder thereafter shall be entitled to receive the number and kind of shares of Common Stock or other capital stock of the Corporation that it would have owned or been entitled to receive in respect of this Warrant immediately after the happening of any of the events described above had this Warrant been converted immediately prior to the happening of that event; provided that the aggregate purchase price payable for the total numbers of shares of Common Stock purchasable under this Warrant shall remain the same. An adjustment made in accordance with this section shall become effective immediately after the record date, in the case of a dividend, and shall become effective immediately after the effective date, in the case of a subdivision, combination, or reclassification. If, as a result of an adjustment made in accordance with this Section 4, the Holder becomes entitled to receive shares of two or more classes of capital stock or shares of Common Stock and other capital stock of the Corporation, the board of directors (whose determination shall be conclusive) shall determine the allocation of the adjusted Exercise Rate between or among shares of such classes of capital stock or shares of Common Stock and other capital stock.

  • Protection of Data The Contractor agrees to store Data on one or more of the following media and protect the Data as described: a. Hard disk drives. For Data stored on local workstation hard disks, access to the Data will be restricted to Authorized User(s) by requiring logon to the local workstation using a Unique User ID and Hardened Password or other authentication mechanisms which provide equal or greater security, such as biometrics or smart cards. b. Network server disks. For Data stored on hard disks mounted on network servers and made available through shared folders, access to the Data will be restricted to Authorized Users through the use of access control lists which will grant access only after the Authorized User has authenticated to the network using a Unique User ID and Hardened Password or other authentication mechanisms which provide equal or greater security, such as biometrics or smart cards. Data on disks mounted to such servers must be located in an area which is accessible only to authorized personnel, with access controlled through use of a key, card key, combination lock, or comparable mechanism. For DSHS Confidential Information stored on these disks, deleting unneeded Data is sufficient as long as the disks remain in a Secure Area and otherwise meet the requirements listed in the above paragraph. Destruction of the Data, as outlined below in Section 8 Data Disposition, may be deferred until the disks are retired, replaced, or otherwise taken out of the Secure Area. c. Optical discs (CDs or DVDs) in local workstation optical disc drives. Data provided by DSHS on optical discs which will be used in local workstation optical disc drives and which will not be transported out of a Secure Area. When not in use for the contracted purpose, such discs must be Stored in a Secure Area. Workstations which access DSHS Data on optical discs must be located in an area which is accessible only to authorized personnel, with access controlled through use of a key, card key, combination lock, or comparable mechanism. d. Optical discs (CDs or DVDs) in drives or jukeboxes attached to servers. Data provided by DSHS on optical discs which will be attached to network servers and which will not be transported out of a Secure Area. Access to Data on these discs will be restricted to Authorized Users through the use of access control lists which will grant access only after the Authorized User has authenticated to the network using a Unique User ID and Hardened Password or other authentication mechanisms which provide equal or greater security, such as biometrics or smart cards. Data on discs attached to such servers must be located in an area which is accessible only to authorized personnel, with access controlled through use of a key, card key, combination lock, or comparable mechanism.

  • Protections Against Violations of Agreement No purported sale, assignment, mortgage, hypothecation, transfer, pledge, encumbrance, gift, transfer in trust (voting or other) or other disposition of, or creation of a security interest in or lien on, any of the Restricted Stock Units by any holder thereof in violation of the provisions of this Agreement or the Certificate of Incorporation or the Bylaws of the Company, will be valid, and the Company will not transfer any shares resulting from the settlement of Restricted Stock Units on its books nor will any of such shares be entitled to vote, nor will any dividends be paid thereon, unless and until there has been full compliance with such provisions to the satisfaction of the Company. The foregoing restrictions are in addition to and not in lieu of any other remedies, legal or equitable, available to enforce such provisions.

  • Use of Data (a) In connection with the provision of the services and the discharge of its other obligations under this Agreement, State Street (which term for purposes of this Section XXIX includes each of its parent company, branches and affiliates (''Affiliates")) may collect and store information regarding a Trust and share such information with its Affiliates, agents and service providers in order and to the extent reasonably necessary (i) to carry out the provision of services contemplated under this Agreement and other agreements between the Trusts and State Street or any of its Affiliates and (ii) to carry out management of its businesses, including, but not limited to, financial and operational management and reporting, risk management, legal and regulatory compliance and client service management.

  • Prohibition Against Recording Except as provided in Section 29.4 of this Lease, neither this Lease, nor any memorandum, affidavit or other writing with respect thereto, shall be recorded by Tenant or by anyone acting through, under or on behalf of Tenant.