User Rights and Responsibilities Sample Clauses
The 'User Rights and Responsibilities' clause defines the permissions granted to users and outlines the obligations they must follow when using a service or product. Typically, this clause specifies what users are allowed to do, such as accessing certain features or content, and what they are prohibited from doing, like engaging in illegal activities or violating intellectual property rights. By clearly delineating acceptable and unacceptable behavior, this clause helps ensure proper use of the service and protects both the provider and users from misuse or legal disputes.
POPULAR SAMPLE Copied 2 times
User Rights and Responsibilities. 2.1 TTP grants You a limited license to use the TDM Service, data, files and other materials provided by TTP for which a subscription fee has been paid by the institute to which You are affiliated as an authorized user (the “Dataset”), to use the TDM Service:
2.1.1 to continuously and automatically extract semantic entities from full-text articles retrieved through the TDM service for the purpose of recognition and classification of the relations and associations between them and mount, load and integrate the results (the “TDM Output”) used for the User’s text-mining system for access and use by the User or the company, institute or organization the User is affiliated with;
2.1.2 to distribute the TDM Output externally, which may include a few lines of query- dependent text of individual full text articles or book chapters which shall be up to a maximum length of 200 characters surrounding and excluding the text entity matched (“Snippets”) or bibliographic metadata. Where Snippets and/or bibliographic metadata are distributed, they should be accompanied by a DOI link that points back to the individual full text article or book chapter. Where images are used You should clear the rights for reuse with the relevant copyright owner and/or rightsholder. Notwithstanding anything to the contrary contained in this Agreement, more extensive usage terms might be permitted for open access content in the Subscribed Products as identified in the individual journal article as stated in the applicable user (e.g. CC) license. Further the TDM Output should include a proprietary notice in the following form:
2.2 The User may not other than for the uses as permitted above:
2.3 The User will be solely responsible for all costs, expenses, losses and liabilities incurred, and activities undertaken by the User in connection with TDM Service. The User will provide TTP access to the TDM Output and any other content or material related to the use of the TDM Output as requested by TTP to ensure compliance with the terms and conditions of this Agreement. In the event TTP detects non-compliance the User shall be granted thirty days to remediate prior to denying access to the TDM Service by TTP.
2.4 User shall obtain written permission in advance from TTP to use TTP’s trademarks, logos or other brand features solely for the purpose of promoting the User’s TDM Output. In the event permission is granted by TTP, You will not display the TTP brand features that is misleading, defamatory, o...
User Rights and Responsibilities. This User Rights and Responsibilities section governs proper use of ODJFS owned equipment, county agency owned equipment, and the ODJFS network. It is intended for the use of all county agency employees. County agency employees must comply with responsibilities outlined in this section to ensure the proper operation and maintain the security of the ODJFS network. County agency employees should refer to the User Responsibilities section contained within IPP.3001 Information Security Policy for additional information on the responsibilities delineated in this section. All ODJFS Internal Policies including IPP.3001 Information Security Policy can be found on the ODJFS Innerweb located under popular links.
User Rights and Responsibilities. 7.2.1 For the “curriculum only” portion of this Agreement, USER shall be responsible for providing and supervising Washington state certified course instructors for teaching the courses. USER shall be responsible for observing and evaluating its certified course instructor performances.
7.2.2 USER agrees to limit their classroom size to follow USER’s collective bargaining standards in a student to teacher ratio not to exceed 30:1.
7.2.3 USER shall require all of its certified course instructors to sign and submit the Instructor Nondisclosure Agreement in Exhibit C, attached hereto and incorporated herein by reference, to SPS prior to any access to SPS’s SVL curriculum or undergoing any SPS provided training relating to said curriculum.
7.2.4 USER enrolled students shall have priority registration for courses taught by USER instructors. After USER’s priority registration period ends, USER shall provide students enrolled in SPS access to these courses during its open registration period; provided the course(s) has not been deemed “full” by USER.
7.2.5 USER shall invoice SPS on or about October 5th for first semester USER courses and, on or about March 5th for second semester USER courses, and on or about July 5th for summer USER courses for each SPS enrolled student registered for USER courses. The invoice shall be accompanied by a list of registered SPS enrolled students. SPS students have until the invoice date to withdraw from USER taught courses before SPS is obligated to pay the applicable course fee. There will be no refunds.
7.2.6 USER shall provide monthly student registration and progress information to the designated SPS facilitator by the 6th day of each month for each SPS enrolled student registered in USER taught courses.
User Rights and Responsibilities. A. The school provides students, staff and other users with access to the school’s technologies. However, this use is a privilege and is not to be considered a guaranteed right.
B. Each user assumes full responsibility for their actions while using school–owned resources. Any inappropriate use considered by most prudent and discerning adults as unsuitable for use by elementary and secondary students will be subject to consequences as stated in this agreement.
C. Students should never use teacher Computer/Tablets without that teacher’s permission and supervision.
D. Each user is to notify the Technology Director and homeroom teacher if he/she believes others know their password and if any user files have been altered. A student that shares his or her passwords will be considered responsible for any results of such use.
E. A Network/Internet User Form needs to be read and signed at the beginning of each school year for grades K-‐12 before students will be allowed to use school’s technology resources. All new students to the district will need to sign a Network/Internet User form and have it on file with the school prior to network access being granted. Each student’s parent/guardian must also sign this form before use is allowed. Access can be removed at any time and a new Network/Internet User form will need to be submitted.
F. For K-‐12 grade students who are receiving a laptop or a tablet, a signed Student Laptop/Tablet Program Acknowledgement Form must be on file prior to that student receiving their assigned laptop computer/tablet.
G. Users are not to post private, identifying information about themselves or others including, but not limited to, home, school, or work addresses and telephone numbers, identification numbers, full names, account numbers, access codes or passwords without that person’s consent.
User Rights and Responsibilities. 1.1 Access to the AXA Mansard Pensions Website You are responsible for providing all hardware, software, telephone or other communications equipment and/or service to connect to the Internet and access the AXA Mansard Pensions Website and are responsible for all Internet access charges, telephone charges or other fees or charges incurred in connecting to the Internet and accessing the AXA Mansard Pensions Website.
User Rights and Responsibilities. The user must not: - abridge, modify, translate or create any derivative work based on the Dataset; - delete, obscure or modify in any way any copyright notices, other notices or disclaimers as they appear in the Dataset; - substantially or systematically reproduce, retain or redistribute the Dataset; - extract, develop or use the Dataset in any direct or indirect commercial activity. The user will bear all costs, expenses, losses and liabilities related to the TDM service and all activities undertaken by the user. The user shall provide IIETA with access to the TDM output and any other content or material related to the use of the TDM output in accordance with IIETA's requirements to ensure compliance with the terms and conditions of this Agreement. The user shall obtain prior written permission from IIETA to use IIETA's trademarks, logos or other brand features solely for the purpose of facilitating the user's TDM output. In the event permission is granted by IIETA, You will not display IIETA brand features that are misleading, defamatory, obscene, or otherwise detrimental to IIETA, or imply that IIETA creates, sponsors or endorses Your TDM output. TDM output must not violate any laws required in any region that IIETA lists the link with TDM output, including but not limited to data protection laws, copyright infringement and/or other intellectual property rights. If the TDM output collects or otherwise processes or uses personal data, You are responsible for complying with relevant data protection and privacy laws. The user acknowledges that, except as expressly provided in this Agreement, all rights, ownership and benefits of the Dataset are owned by IIETA and its suppliers, and unauthorized redistribution of Datasets or TDM outputs could seriously harm IIETA and its suppliers. Notwithstanding anything to the contrary in this Agreement, open access content in the Dataset is subject to the terms and conditions set out in the applicable user licenses identified in each journal article.
User Rights and Responsibilities. 5.1. The User has, subject to limitations of the Agreement and provided that payments have been received in full, unlimited access to the Service supplied by the Supplier.
5.2. The Service Agreement entitles the User to:
5.2.1. Use the Service in accordance with the provisions of this Agreement.
5.2.2. Receive User support, training and technical support in accordance with the specifications in Schedule A.
5.2.3. Receive advice by electronic mail, telephone, facsimile or post on the use of the Service
5.2.4. Receive the Supplier’s bulletin reports of errors and “patches” and receive new updates of the Service incorporating the same.
5.2.5. Receive upgrades from time to time that improve existing functionality or remedy problems with existing functionality not known at the Agreement commencement date or upgrades necessary to migrate to supported platforms as shown in Schedule A.
5.2.6. Receive information on customised solutions and modifications beyond the standard release. Such releases are subject to separate Agreement unless specified in Schedule A.
5.3. The User shall at all times comply with the Acceptable Use Policy posted at ▇▇▇▇://▇▇▇.▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇/legal/aup.htm
5.4. The User must at all times ensure that competent staff are suitably trained to manage and use the Service, and are aware of its technical limitations and procedures.
5.5. The User may not allow the Service to be repaired, serviced or otherwise attended to except by the Supplier’s staff.
5.6. The User shall keep possession of and control the Related Application provided to it and shall effect and maintain adequate security measures to safeguard the Related Application from access or use by any unauthorised person.
5.7. The User will indemnify and save harmless the Supplier and any of its employees or representatives from and against all damages, losses, liabilities, fines, costs and expenses (including actual legal fees and costs), incurred by or awarded, asserted or claimed against the Supplier or any of its employees or representatives in connection with this Agreement which are attributable, in whole or in part, to any negligent or wilful activities or omissions of the User or any breaches by the User of its obligations under this Agreement.
5.8. Except to the extent and in the circumstances expressly permitted by law, the User shall not alter, modify, adapt or translate the whole or any part of the Related Application in any way nor permit the whole or any part of the Related App...
User Rights and Responsibilities. 1.1 Access to the Tangerine Pensions Website You are responsible for providing all hardware, software, telephone or other communications equipment and/or service to connect to the Internet and access the Tangerine Pensions Website and are responsible for all Internet access charges, telephone charges or other fees or charges incurred in connecting to the Internet and accessing the Tangerine Pensions Website.
User Rights and Responsibilities. 5.1. The User shall be held responsible as follows:
i) For all transactions made in all of the User’s trading accounts, including the responsibility to avoid the transactions that may violate the law, legislation, norms, or rules applied to the User.
ii) To deposit only funds acquired by legal means.
iii) To maintain the accuracy of their registration information, including Surname, First Name, Address, Phone number, and any other data submitted to the Company, and notifying the Company of any changes.
iv) To avoid any profit-making strategies that are based on manipulation or exploitation of hardware or software vulnerabilities.
v) To maintain the secrecy of their passwords, and be solely responsible for any use, authorized or otherwise, of their passwords or their trading accounts.
vi) To declare their income as is appropriate to their local jurisdiction.
5.2. The User may request in writing the termination of this Agreement in writing at any time.
User Rights and Responsibilities. 1. The User shall be required to:
a) operate the User Account in accordance with this agreement;
b) uphold all principles for ensuring the security of funds, in particular: • not to record their PIN or PUK in an easily recognisable form especially, yet not exclusively, in the memory of the Registered Mobile Telephone or the SIM card of the Registered MSISDN and not to share the PIN or PUK with any third party; • to protect the Registered Mobile Telephone and the SIM card of the Registered MSISDN from loss or theft; • in the event of loss or theft of the Registered Mobile Telephone and/or the SIM card of the Registered MSISDN to inform the Issuer at the infoline of the Issuer specified in Article XX of these General Conditions, no later than the day that such circumstances are discovered; • in the case of the PIN and/or PUK becoming accessible or merely at risk of becoming inaccessible to an unauthorised person, to report this fact to the Issuer without delay at the infoline of the Issuer specified in Article XX of these General Conditions no later than the day that such circumstances are discovered; • to cooperate with the Issuer when resolving claims of both the User and other Users or Partners; • to inform the Issuer in the event that a payment was registered to their User Account which does not belong to them, and to proceed in such cases according to the instructions of the Issuer; • in the event that after executing this agreement the User becomes a Politically Exposed Person, to inform the Issuer of this fact and to complete Personalised Registration with the Issuer; • to provide the Issuer with all possible support in cases when the Issuer is required to analyse the source of funds or electronic money received by the User or sent to another User or Partner;
2. The User shall bear any losses for unauthorised payment transactions in the manner and to the extent specified in §116 of the ZPS.
3. The User acknowledges that the Issuer will in no cases request the entry of any identification data, PIN, or PUK via email (so-called phishing or another form of electronic crime). Any email requesting the entry of such data have not been sent by the Issuer and the User is required not to respond to any such emails. On the contrary, the User shall bear responsibility for any abuse of identification data, PIN, or PUK, which is in conflict with these provisions or which in some way leads to a response to such email.
4. The contracting parties have agreed that if t...