Use of Systems Clause Samples
Use of Systems. The Architect shall provide as part of Basic Services a total of person-hours performing the services described in Subparagraph 3.4.17. Basic Services do not include the services described in Subparagraph 3.4.17.
Use of Systems. Customer must not use the Products & Services for any illegal purpose whatsoever including any breaches of the Australian SPAM ▇▇▇ ▇▇▇▇, Telecommunications ▇▇▇ ▇▇▇▇ or any other similar Act in the country of operation of the Customer. It is the Customers responsibility to seek appropriate advice on use of the Products & Services to ensure all legal requirements are met within the country of use.
Use of Systems. Third Party agrees to not, and shall ensure its Personnel do not (i) store or communicate unlawful, abusive, defamatory, obscene, pornographic, profane, indecent information of any kind on or through a Verint Network,
Use of Systems. The Self-employed Operator agrees that they will only use the Company's systems for the proper performance of the Services and will not promote, advertise, sell or in any way discuss other services or products with users or customers of the Company's services. Any Self-employed Operator found to be promoting or selling unauthorised or non-compliant services or products will have their contract terminated immediately. The Self-employed Operator may also be liable to a claim for loss of profits arising from their actions. TERMINATION This agreement may be terminated by the Company the Supplier at any time by notice with immediate effect to the other party. information considered confidential which shall have come to their knowledge during the course of this agreement. The Self-employed Operator shall use their best endeavours to prevent the publication or disclosure of any such information. The Self-employed Operator shall at any time during the continuance of this agreement if so required by the Company and in the event of the termination of this agreement for whatever reason (whether lawfully or otherwise) give to the Company all original and copy documents in their possession, custody or control (including, without limitation, all books, manuals, documents, papers, materials) belonging to the Company or relating to the business of the Company together with any other property belonging to the Company. The Self-employed Operator shall, if requested by the Company, irretrievably delete any information relating to the business of the Company stored in an y magnetic or optical disc or memory and all matter derived from them which is in their possession, custody, care or control outside the premises of the Company and produce such evidence of deletion as the Company may require. The restrictions and obligations contained in this clause shall not apply to:
Use of Systems. 13.1 The Client may require AIIQ to use particular systems from time-to-time.
13.2 By agreeing to a Project, the Client agrees that it grants AIIQ access to systems, probe any hardware and do all such things so required to undertake the Project.
Use of Systems. You must install and use the System in accordance with the terms of this Agreement and the User Manual and your use of the System is subject to any conditions and qualifications set out in this Agreement and the User Manual.
Use of Systems. 12.1 The Client may make use of the Systems during the Assignment. The Client will use and maintain the Systems with due care. The Client will take effective measures in good time to prevent damage to the Systems. If damage occurs to the Systems, the Client will immediately notify Twelve of this In Writing.
12.2 The Client may not use the Systems or any part thereof as collateral or object of security with respect to third parties.
12.3 If an event occurs, the Client and all entrepreneurs at the event (the Entrepreneurs) may make use of the Systems, subject to the terms and conditions included in these Conditions and the Agreement. The Client is responsible for the Systems used by the Entrepreneurs and all liabilities arising from it. The Client may not provide use of the Systems to someone other than the Entrepreneurs by way of a sublease or any other form.
12.4 The Client shall only use or allow use of the Systems at the place agreed to by the Parties (the Place). Twelve will install, mount and prepare the Systems for use at the Place.
12.5 The Client may not bring about changes (Modifications) to the leased Systems in whole or in part, nor add anything to it without prior consent In Writing from Twelve. Twelve may specify terms to this consent, such as specifying terms relating to the manner and quality of the Modifications or increasing the rental or purchase price. The Client must undo or remove Modifications before the end of the Agreement, unless otherwise agreed to by the Parties.
12.6 The Client is not entitled to any compensation, on any account, in relation to
Use of Systems.
A. Ownership and Rights in the HCSA Systems Any shared information provided by Participant as a Data Provider and provided to other Program Participants in accordance with the SHIE Data Sharing Agreement shall be retained by and may be further used and disclosed by such other Participants in any lawful manner.
B. General CHR Data Request, Transmission, Frequency and Security
1. HCSA and Participant shall submit a data request with specifics on:
a) Requesting Organization
b) Disclosing Entity (DE)
c) Date of Request:
d) Request and Purpose
e) Data Recipient (Recipient)
f) Test File Due
g) Frequency of data needed
h) Timeframe for data needed
i) Recipient Contacts
j) Recipient Organization
k) Recipient Phone and Email
l) DE Contacts
m) DE Organization
n) DE Phone and Email
o) DE Data Systems/Sources
p) DE Individual Population q) DE Data Fields and Format The preferred data request form is supplied in Appendix D.
2. General Transmittal Methods Supported by HCSA: FTP VPN TUNNEL - HL7
3. General Transmittal Frequency (Unless otherwise agreed upon): Daily Weekly Monthly Annually As Needed/On request One-time Other_ Data will not be transmitted; users will access data.
4. Transmittal security: All HIPAA protected data will be encrypted using FIPS 140-2 certified algorithm prior to transmission.
C. Data Accuracy
1. Ensuring that data are accurate, relevant, timely, and complete for the purposes they are intended to be used should be a high priority issue.
2. Participants will maintain a proactive approach to data governance that requires establishing and regularly updating strategies for preventing, detecting, and correcting errors and misuses of data.
3. Participants will have policies and procedures in place to ensure that data are accurate, complete, timely, and relevant to stakeholder needs.
4. Regular data quality audits will be conducted to ensure that its strategies for enforcing quality control are up-to-date and that any corrective measures undertaken in the past have been successful.
D. Use and Disclosures for HCSA and Participants
1. Access to PHI and SUD information should only be available to those staff members who require access to PHI and SUD information to perform their individual duties.
2. Routine requests for PHI that are not related to treatment shall be periodically reviewed to ensure that only the information reasonably necessary to accomplish the purpose of the request is provided. Disclosure of PHI is subject to the separate Use and Dis...
Use of Systems. The Contractor is required to use these systems to optimize service performance and follow in accordance with procedures established by CapMetro.
Use of Systems. Client expressly agrees that your use of the systems described in this agreement are at your sole risk. In no event shall ▇▇▇▇▇▇ be liable for damages caused or allegedly caused by any failure of performance, error, omission, interruption or deletion, computer virus, communications line failure, theft or destruction or unauthorized access to, alteration, or use of records, whether for breach of contract, tortious behavior, negligence or under any other cause of action.