Use of SaaS Services Sample Clauses

POPULAR SAMPLE Copied 7 times
Use of SaaS Services. Customer shall be solely responsible for the actions of its Personnel while using the SaaS Services and the contents of its transmissions through the SaaS Services (including, without limitation, Customer Data), and any resulting charges. Customer agrees to: (i) abide by all local, state, national, and international laws and regulations applicable to Customer's use of the SaaS Services, including without limitation all laws and administrative regulations (including, all U.S. and applicable foreign) relating to the control of exports of commodities and technical and/or Personal Data, and shall not allow any of its Personnel or Data Subjects to access or use the SaaS Service in violation of any export embargo, prohibition or restriction, including but not limited to any party on a U.S. government restricted party list; (ii) provide any required notifications to Data Subjects, and obtain all rights and requisite consents from Data Subjects in accordance with all applicable Privacy Laws and other laws in relation to the collection, use, disclosure, creation and processing of Personal Data in connection with this Agreement and the use and delivery of the SaaS Services; (iii) not use the SaaS Services for illegal purposes; (iv) not knowingly upload or distribute in any way files that contain viruses, corrupted files, or any other similar software or programs that may damage the operation of the Hosted Environment, SaaS Services or another's computer; (v) not knowingly interfere with another customer's use and enjoyment of the SaaS Services or another entity's use and enjoyment of similar services; (vi) not knowingly engage in contests, chain letters or post or transmit "junk mail," "spam," "chain letters," or unsolicited mass distribution of email through or in any way using the SaaS Services; (vii) not to interfere or disrupt networks connected to the Hosted Environment or SaaS Services; (viii) not to post, promote or transmit through the SaaS Services any unlawful, harassing, defamatory, privacy invasive, abusive, threatening, offensive, harmful, vulgar, obscene, tortuous, hateful, racially, ethnically or otherwise objectionable information or content of any kind or nature; and (ix) not to transmit or post any material that encourages conduct that could constitute a criminal offense or give rise to civil liability. Verint may remove any violating content posted on the SaaS Services or transmitted through the SaaS Services, without notice to Customer.
Use of SaaS Services. Customer will not use the SaaS Services to transmit, store or publish any content that is obscene, libelous, threatening or unlawful or that infringes or violates any rights. Subject to the terms and conditions of this Agreement and any applicable Order, ▇▇▇▇▇ ▇▇▇ impose limits on Customer’s bandwidth use and file hosting storage used by Customer with the ▇▇▇▇▇ Platform or impose additional fees or throttle Customer’s file hosting with the ▇▇▇▇▇ Platform if Customer exceeds such limits. ▇▇▇▇▇ further reserves the right to suspend performance of SaaS Services in the event of Customer’s, or a Customer User’s, unauthorized use, disruption or abuse of Robin’s resources (as reasonably determined by ▇▇▇▇▇); provided ▇▇▇▇▇ shall provide Customer with such notice (which may be by email) as is feasible under the circumstances. Customer will, and will cause each Customer User to, comply with the Acceptable Use Requirements. If the Acceptable Use Requirements require Customer to implement specific safeguards, Customer agrees to implement those safeguards and Customer will require all Customer Users to comply as well.
Use of SaaS Services. Customer shall be solely responsible for the actions of its Personnel while using the SaaS Services and the contents of its transmissions through the SaaS Services (including, without limitation, Customer Data), and any resulting charges. Customer agrees: (i) to abide by all local, state, national, and international laws and regulations applicable to Customer's use of the SaaS Services, including without limitation all laws and administrative regulations (including, all U.S. and applicable foreign) relating to the control of exports of commodities and technical and/or personal data; (ii) not to upload or distribute in any way files that contain viruses, corrupted files, or any other similar software or programs that may damage the operation of the Hosted Environment, SaaS Services or another's computer; (iii) not to use the SaaS Services for illegal purposes; (iv) not to interfere or disrupt networks connected to the Hosted Environment or SaaS Services; (v) not to post, promote or transmit through the SaaS Services any unlawful, defamatory, privacy invasive, tortious or otherwise objectionable information or content of any kind or nature; (vi) not to transmit or post any material that encourages conduct that could constitute a criminal offense or give rise to civil liability; (vii) not to interfere with another customer's use and enjoyment of the SaaS Services or another entity's use and enjoyment of similar services; (viii) not to engage in contests, chain letters or post or transmit "junk mail," "spam," or unsolicited mass distribution of email through or in any way using the SaaS Services; and (ix) to comply with all regulations, policies and procedures of networks through which Customer connects to, or uses in connection with the SaaS Services.
Use of SaaS Services. Customer is granted the right to access and use the SaaS Services solely for the intended purpose set forth in the Order Form. Customer will not use the SaaS Services to transmit, store or publish any content that is obscene, libelous, threatening or unlawful or that infringes or violates any rights. ▇▇▇▇▇ reserves the right to suspend performance of SaaS Services in the event of Customer’s, or a Customer User’s, unauthorized use, disruption or abuse of ▇▇▇▇▇’s resources (as reasonably determined by ▇▇▇▇▇); provided ▇▇▇▇▇ shall provide Customer with such notice (which may be by email) as is feasible under the circumstances. Customer will, and will cause each Customer User to, comply with the Acceptable Use Requirements. If the Acceptable Use Requirements require Customer to implement specific safeguards, Customer agrees to implement those safeguards and Customer will require all Customer Users to comply as well.
Use of SaaS Services. Customer shall be solely responsible for the actions of its Personnel while using the SaaS Services and the contents of its transmissions through the SaaS Services (including, without limitation, Customer Data), and any resulting charges. Customer agrees: (i) to abide by all local, state, national, and international laws and regulations applicable to Customer's use of the SaaS Services, including without limitation all laws and administrative regulations (including, all U.S. and applicable foreign) relating to the control of exports of commodities and technical and/or personal data;
Use of SaaS Services. Customer will not use the SaaS Services to transmit, store or publish any content that is obscene, libelous, threatening or unlawful or that infringes or violates any rights. Subject to the terms and conditions of this Agreement and any applicable Order, ▇▇▇▇▇ ▇▇▇ impose limits on Customer’s bandwidth use and file hosting storage used by Customer with the ▇▇▇▇▇ Platform or impose additional fees or throttle Customer’s file hosting with the ▇▇▇▇▇ Platform if Customer exceeds such limits. ▇▇▇▇▇ further reserves the right to immediately disable Customer’s access to the ▇▇▇▇▇ Platform in the event of Customer’s, or a Customer User’s, unauthorized use, disruption or abuse of Robin’s resources (as reasonably determined by ▇▇▇▇▇). Customer will comply with Robin’s user policy as may be in effect from time to time. If Robin’s user policy requires Customer to implement specific safeguards, Customer agrees to implement those safeguards and Customer will require all Customer Users to comply as well.
Use of SaaS Services. 2.1. Customer shall Use the SaaS Services in compliance with the Agreement, the applicable Order Form(s), and all applicable laws. Customer shall be liable for all activities conducted under its subscription to Use the SaaS Services. Customer shall not: (i) copy, sell, distribute, assign, lease, or otherwise transfer any rights to the SaaS Services, or make the SaaS Services available to anyone other than its Users; (ii) Use the SaaS Services to store or send infringing or unlawful material; (iii) Use the SaaS Services to store or send any viruses, worms, trojan horses, cancelbots, or other contaminants including, but not limited to, any code or instructions that may be or will be used to access, modify, delete, or damage any data files or other computer programs used by Customer; (iv) attempt to gain unauthorized access to, or disrupt the integrity or performance of, the SaaS Services or the data contained therein; (v) modify, copy, or create derivative works based on the Services, or any portion thereof; or (vi) access the Services for the purpose of building a competitive product or service or copying its features or user interface. Customer shall be liable for and shall indemnify and hold BeyondID harmless if Customer violates any restrictions in this Section 2.1
Use of SaaS Services 

Related to Use of SaaS Services

  • SaaS Services 6.1 Our SaaS Services are audited at least yearly in accordance with the AICPA’s Statement on Standards for Attestation Engagements (“SSAE”) No. 18. We have attained, and will maintain, SOC 1 and SOC 2 compliance, or its equivalent, for so long as you are timely paying for SaaS Services. Upon execution of a mutually agreeable Non-Disclosure Agreement (“NDA”), we will provide you with a summary of our compliance report(s) or its equivalent. Every year thereafter, for so long as the NDA is in effect and in which you make a written request, we will provide that same information. 6.2 You will be hosted on shared hardware in a Tyler data center or in a third-party data center. In either event, databases containing your Data will be dedicated to you and inaccessible to our other customers. 6.3 Our Tyler data centers have fully-redundant telecommunications access, electrical power, and the required hardware to provide access to the Tyler Software in the event of a disaster or component failure. In the event any of your Data has been lost or damaged due to an act or omission of Tyler or its subcontractors or due to a defect in Tyler’s software, we will use best commercial efforts to restore all the Data on servers in accordance with the architectural design’s capabilities and with the goal of minimizing any Data loss as greatly as possible. In no case shall the recovery point objective (“RPO”) exceed a maximum of twenty-four (24) hours from declaration of disaster. For purposes of this subsection, RPO represents the maximum tolerable period during which your Data may be lost, measured in relation to a disaster we declare, said declaration will not be unreasonably withheld. 6.4 In the event we declare a disaster, our Recovery Time Objective (“RTO”) is twenty-four (24) hours. For purposes of this subsection, RTO represents the amount of time, after we declare a disaster, within which your access to the Tyler Software must be restored. 6.5 We conduct annual penetration testing of either the production network and/or web application to be performed. We will maintain industry standard intrusion detection and prevention systems to monitor malicious activity in the network and to log and block any such activity. We will provide you with a written or electronic record of the actions taken by us in the event that any unauthorized access to your database(s) is detected as a result of our security protocols. We will undertake an additional security audit, on terms and timing to be mutually agreed to by the parties, at your written request. You may not attempt to bypass or subvert security restrictions in the SaaS Services or environments related to the Tyler Software. Unauthorized attempts to access files, passwords or other confidential information, and unauthorized vulnerability and penetration test scanning of our network and systems (hosted or otherwise) is prohibited without the prior written approval of our IT Security Officer. 6.6 We test our disaster recovery plan on an annual basis. Our standard test is not client-specific. Should you request a client-specific disaster recovery test, we will work with you to schedule and execute such a test on a mutually agreeable schedule. At your written request, we will provide test results to you within a commercially reasonable timeframe after receipt of the request. 6.7 We will be responsible for importing back-up and verifying that you can log-in. You will be responsible for running reports and testing critical processes to verify the returned Data. 6.8 We provide secure Data transmission paths between each of your workstations and our servers. 6.9 Tyler data centers are accessible only by authorized personnel with a unique key entry. All other visitors to Tyler data centers must be signed in and accompanied by authorized personnel. Entry attempts to the data center are regularly audited by internal staff and external auditors to ensure no unauthorized access. 6.10 Where applicable with respect to our applications that take or process card payment data, we are responsible for the security of cardholder data that we possess, including functions relating to storing, processing, and transmitting of the cardholder data and affirm that, as of the Effective Date, we comply with applicable requirements to be considered PCI DSS compliant and have performed the necessary steps to validate compliance with the PCI DSS. We agree to supply the current status of our PCI DSS compliance program in the form of an official Attestation of Compliance, which can be found at ▇▇▇▇▇://▇▇▇.▇▇▇▇▇▇▇▇▇.▇▇▇/about- us/compliance, and in the event of any change in our status, will comply with applicable notice requirements.

  • Use of Services Mobile Banking will not work unless you use it properly. You accept responsibility for making sure that you understand how to use Mobile Banking before you actually do so, and you use Mobile Banking in accordance with any online instructions posted on our website. You also accept responsibility for making sure that you know how to properly use your wireless device and the Mobile Banking software ("Software") required to use the Service. The Software is provided by a service provider not affiliated with the Credit Union and you are solely responsible for entering a license agreement to use the software. We will not be liable to you for any losses caused by your failure to properly use the Mobile Banking service, the Software or your wireless device. You may experience technical or other difficulties related to the Mobile Banking service that may result in loss of data, personalization settings or other Mobile Banking service interruptions. We assume no responsibility for the timeliness, deletion, misdelivery or failure to store any user data, communications or personalization settings in connection with your use of the Mobile Banking service. We assume no responsibility for the operation, security, or functionality of any wireless device or mobile network which you utilize to access the Mobile Banking service. Financial information shown on the Mobile Banking service reflects the most recent account information available through the Mobile Banking service. You agree that we will not be liable for any delays in the content, or for any actions you take in reliance thereon. If you need current account information you agree to contact us directly.

  • Use of Software Any software that is available on the Services ("Software") is the copyrighted work of Red Hat and/or its licensors. Copying or reproducing the Software to any other server or location for further reproduction or redistribution is strictly prohibited, unless such reproduction or redistribution is permitted by a license agreement accompanying such Software. You may not create derivative works of the Software, or attempt to decompile or reverse-engineer the Software unless otherwise permitted by law. Use of the Software is subject to the license terms of any license agreement that may accompany or is provided with the Software. You may not download any Software until you have read and accepted the terms of the accompanying software license. WITHOUT LIMITING THE FOREGOING, THE SOFTWARE IS WARRANTED, IF AT ALL, ONLY ACCORDING TO THE TERMS OF THE SEPARATE LICENSE AGREEMENT ACCOMPANYING THE SOFTWARE. EXCEPT AS WARRANTED IN SUCH LICENSE AGREEMENT, RED HAT, ITS PARENT, SUBSIDIARY, AND AFFILIATE COMPANIES, AND ITS LICENSORS DISCLAIM ALL WARRANTIES AND CONDITIONS WITH REGARD TO THE SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT, TO THE MAXIMUM EXTENT PERMITTED BY LAW.

  • Use of Verizon Telecommunications Services 2.1 Verizon Telecommunications Services may be purchased by PNG under this Resale Attachment only for the purpose of resale by PNG as a Telecommunications Carrier. Verizon Telecommunications Services to be purchased by PNG for other purposes (including, but not limited to, PNG’s own use) must be purchased by PNG pursuant to other applicable Attachments to this Agreement (if any), or separate written agreements, including, but not limited to, applicable Verizon Tariffs. 2.2 PNG shall not resell: 2.2.1 Residential service to persons not eligible to subscribe to such service from Verizon (including, but not limited to, business or other nonresidential Customers); 2.2.2 Lifeline, Link Up America, or other means-tested service offerings, to persons not eligible to subscribe to such service offerings from Verizon; 2.2.3 Grandfathered or discontinued service offerings to persons not eligible to subscribe to such service offerings from Verizon; or 2.2.4 Any other Verizon service in violation of a restriction stated in this Agreement (including, but not limited to, a Verizon Tariff) that is not prohibited by Applicable Law. 2.2.5 In addition to any other actions taken by PNG to comply with this Section 2.2, PNG shall take those actions required by Applicable Law to determine the eligibility of PNG Customers to purchase a service, including, but not limited to, obtaining any proof or certification of eligibility to purchase Lifeline, Link Up America, or other means-tested services, required by Applicable Law. PNG shall indemnify Verizon from any Claims resulting from PNG’s failure to take such actions required by Applicable Law. 2.2.6 Verizon may perform audits to confirm PNG’s conformity to the provisions of this Section 2.2. Such audits may be performed twice per calendar year and shall be performed in accordance with Section 7 of the General Terms and Conditions. 2.3 PNG shall be subject to the same limitations that Verizon’s Customers are subject to with respect to any Telecommunications Service that Verizon grandfathers or discontinues offering. Without limiting the foregoing, except to the extent that Verizon follows a different practice for Verizon Customers in regard to a grandfathered Telecommunications Service, such grandfathered Telecommunications Service: (a) shall be available only to a Customer that already has such Telecommunications Service; (b) may not be moved to a new service location; and (c) will be furnished only to the extent that facilities continue to be available to provide such Telecommunications Service. 2.4 PNG shall not be eligible to participate in any Verizon plan or program under which Verizon Customers may obtain products or services, which are not Verizon Telecommunications Services, in return for trying, agreeing to purchase, purchasing, or using Verizon Telecommunications Services. 2.5 In accordance with 47 CFR § 51.617(b), Verizon shall be entitled to all charges for Verizon Exchange Access services used by interexchange carriers to provide service to PNG Customers.

  • Use of the Services 1.1 We will make the Oracle services listed in Your order (the “Services”) available to You pursuant to this Agreement and Your order. Except as otherwise stated in this Agreement or Your order, You have the non- exclusive, worldwide, limited right to use the Services during the period defined in Your order, unless earlier terminated in accordance with this Agreement or Your order (the “Services Period”), solely for Your internal business operations. You may allow Your Users (as defined below) to use the Services for this purpose, and You are responsible for their compliance with this Agreement and Your order. 1.2 The Service Specifications describe and govern the Services. During the Services Period, we may update the Services and Service Specifications (with the exception of the Data Processing Agreement as described below) to reflect changes in, among other things, laws, regulations, rules, technology, industry practices, patterns of system use, and availability of Third Party Content (as defined below). Oracle updates to the Services or Service Specifications will not materially reduce the level of performance, functionality, security or availability of the Services during the Services Period of Your order. 1.3 You may not, and may not cause or permit others to: (a) use the Services to harass any person; cause damage or injury to any person or property; publish any material that is false, defamatory, harassing or obscene; violate privacy rights; promote bigotry, racism, hatred or harm; send unsolicited bulk e-mail, junk mail, spam or chain letters; infringe property rights; or otherwise violate applicable laws, ordinances or regulations; (b) perform or disclose any benchmarking or availability testing of the Services; (c) perform or disclose any performance or vulnerability testing of the Services without Oracle’s prior written approval, or perform or disclose network discovery, port and service identification, vulnerability scanning, password cracking or remote access testing of the Services; or (d) use the Services to perform cyber currency or crypto currency mining ((a) through (d) collectively, the “Acceptable Use Policy”). In addition to other rights that we have in this Agreement and Your order, we have the right to take remedial action if the Acceptable Use Policy is violated, and such remedial action may include removing or disabling access to material that violates the policy.