Your Access and Use Sample Clauses

The "Your Access and Use" clause defines the terms under which users are permitted to access and utilize a service, website, or application. It typically outlines acceptable and prohibited behaviors, such as restrictions on unauthorized copying, sharing, or misuse of the platform, and may specify requirements like account registration or compliance with applicable laws. This clause serves to set clear boundaries for user conduct, helping to protect the service provider from misuse and ensuring a safe and lawful environment for all users.
Your Access and Use. For the Filing Analytics Software, you agree that we collect data in relation to your organisation’s activity during your use of or access to the Software. Such data may be made available by us to another user of the Software. This may or may not include the identity of your organisation, depending on your Licence Package. For the avoidance of doubt, no personal information of individual users will be disclosed to another party.
Your Access and Use. Your access and use of each Service Exchange Service (and any interfaces relating thereto) is subject to the applicable dependencies, requirements, and restrictions in the Service Description Schedule and this Agreement, including the following:
Your Access and Use. Subject to your compliance with this ▇▇▇▇, as well as any other applicable policies, ▇▇▇▇ ▇▇▇▇ Labs grants you non-exclusive, non-transferable, license to install, access to, modify, and use of, the Products worldwide (subject to applicable export laws) during the term of this ▇▇▇▇ (as described below) solely for research, private study and personal use of Products. This license is personal to you, and you may not resell our Products, permit other users access to our Products through your account. Your right to use our Products is limited by all terms and conditions set forth in this ▇▇▇▇. Except for your pre-existing rights and this license granted to you, we and our licensors retain all rights, titles and interests in and to our Products, all related intellectual property rights, including trademarks (whether registered or pending), domain and business names. Our Products are protected by applicable intellectual property laws, including United States copyright law and international treaties. Except for the foregoing license, you have no other rights in the Products and you may not modify, edit, copy, reproduce, create derivative works of, reverse engineer, alter, enhance or in any way exploit the Products in any manner. If you breach any of this ▇▇▇▇, the above license will terminate automatically. You will be deemed to have taken any action that you permit, assist or facilitate any person or entity to take related to this ▇▇▇▇, your content or use of the Products. You are responsible for end usersuse of your content and the Products. You will ensure that all end users comply with your obligations under this ▇▇▇▇ and that the terms of your agreement with each end user are consistent with this ▇▇▇▇. If you become aware of any violation of your obligations under this ▇▇▇▇ caused by an end user, you will immediately suspend access to your content and the Products by such end user. We do not provide any support or services to end users unless we have a separate agreement with you or an end user obligating us to provide such support or services.
Your Access and Use. Your access and use of each Service Exchange Service (and any interfaces relating thereto) is subject to the applicable dependencies, requirements, and restrictions in the Service Description Schedule and this Agreement, including the following: • If you are licensing/leasing space and power and/or receiving colocation services from us or our affiliates under a separate agreement you must not be in default of that agreement so long as you access and use the Service Exchange Services.‌ • You must supply and configure your own compatible equipment at the Service Exchange Supported DC to connect to the Service Exchange Services. • You must comply with our then current Acceptable Use Policy available at ▇▇▇.▇▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇/▇▇▇▇▇▇▇▇▇▇-▇▇▇-▇▇▇▇▇▇/ and other generally applicable operational procedures, technical specifications and directions, rules and regulations relating to the Service Exchange Services made known to you by us, Megaport, or applicable service providers. • You must take reasonable and customary precautions to avoid damage, disruption, or interference with the equipment, network, sites, and systems used to provide the Service Exchange Services or that could expose us or our affiliates or suppliers or licensors to risks or liability. • You must comply with applicable laws and regulations. • You may only use the Service Exchange Services for your internal business purposes and may not resell or make the Service Exchange Services available to any third party without our prior written consent. • You must implement and maintain reasonable and appropriate security measures, including with respect to equipment, networks, data transmissions, and malicious code or activities (e.g., denial of service attacks or overloading networks or systems with data). • You may not reverse engineer or decompile the Service Exchange Services or any interfaces or components relating thereto.

Related to Your Access and Use

  • Access and Use Grantee agrees to license or otherwise make available to MassCEC in perpetuity, without charge, ▇▇▇▇▇▇▇’s interest in and copyright (if any) to all non-confidential materials prepared and produced in relation to the Project, including, without limitation, all plans, specifications, and analyses developed in connection with the Project and specified as being for MassCEC’s use and public dissemination; provided, however, that any and all inventions that are conceived or first reduced to use during the course of the Project shall be the sole property of Grantee (except that if jointly invented, title shall flow in accordance with United States patent law), and any licensing requests for such inventions shall be subject to good faith negotiations between the Parties. Grantee represents and warrants that Deliverables will not infringe on any copyright, right of privacy, or personal or proprietary rights of others.

  • REMOTE ACCESS SERVICES ADDENDUM The Custodian and each Fund agree to be bound by the terms of the Remote Access Services Addendum hereto.

  • Data Access and Proprietary Information 6.1 The Fund acknowledges that the databases, computer programs, screen formats, report formats, interactive design techniques, and documentation manuals furnished to the Fund by the Transfer Agent as part of the Fund’s ability to access certain Fund Confidential Information maintained by the Transfer Agent on databases under the control and ownership of the Transfer Agent or other third party (“Data Access Services”) constitute copyrighted, trade secret, or other proprietary information of substantial value to the Transfer Agent or other third party (collectively, “Transfer Agent Proprietary Information”). In no event shall Transfer Agent Proprietary Information be deemed Fund Confidential Information. The Fund agrees to treat all Transfer Agent Proprietary Information as proprietary to the Transfer Agent and further agrees that it shall not divulge any Transfer Agent Proprietary Information to any person or organization except as may be provided hereunder. Without limiting the foregoing, the Fund agrees for itself and its employees and agents to: (a) Use such programs and databases (i) solely on the Fund’s computers or on computers of Federated Services Company or its affiliates (collectively, “Fund Computers”), or (ii) solely from equipment at the location agreed to between the Fund and the Transfer Agent and (iii) solely in accordance with the Transfer Agent’s applicable user documentation; (b) Refrain from copying or duplicating in any way (other than in the normal course of performing processing on the Fund Computers), the Transfer Agent Proprietary Information; (c) Refrain from obtaining unauthorized access to any portion of the Transfer Agent Proprietary Information, and if such access is inadvertently obtained, to inform Transfer Agent in a timely manner of such fact and dispose of such information in accordance with the Transfer Agent’s instructions; (d) Refrain from causing or allowing information transmitted from the Transfer Agent’s computer to the Fund’s terminal to be retransmitted to any other computer terminal or other device except as expressly permitted by the Transfer Agent (such permission not to be unreasonably withheld); (e) Allow the Fund to have access only to those authorized transactions as agreed to between the Fund and the Transfer Agent; and (f) Honor all reasonable written requests made by the Transfer Agent to protect at the Transfer Agent’s expense the rights of the Transfer Agent in the Transfer Agent Proprietary Information at common law, under federal copyright law and under other federal or state law. 6.2 The Fund shall take reasonable efforts to advise its employees of their obligations pursuant to this Section 6. The obligations of this Section shall survive any earlier termination of this Agreement. 6.3 If the Fund notifies the Transfer Agent that any of the Data Access Services do not operate in material compliance with the most recently issued user documentation for such services, the Transfer Agent shall use its best efforts in a timely manner to correct such failure. Organizations from which the Transfer Agent may obtain certain data included in the Data Access Services are solely responsible for the contents of such data and the Fund agrees to make no claim against the Transfer Agent arising out of the contents of such third-party data, including, but not limited to, the accuracy thereof; provided, however, that the Fund shall be entitled to insist that the Transfer Agent, and the Transfer Agent for the benefit of the Fund shall, enforce any and all rights under applicable contracts for the Data Access Services. SUBJECT TO THE FOREGOING OBLIGATIONS OF THE TRANSFER AGENT, DATA ACCESS SERVICES AND ALL COMPUTER PROGRAMS AND SOFTWARE SPECIFICATIONS USED IN CONNECTION THEREWITH ARE PROVIDED ON AN AS IS, AS AVAILABLE BASIS. EXCEPT AS OTHERWISE PROVIDED HEREIN TO THE CONTRARY, THE TRANSFER AGENT EXPRESSLY DISCLAIMS ALL WARRANTIES INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. 6.4 If the transactions available to the Fund include the ability to originate Proper Instructions through electronic instructions to the Transfer Agent in order to: (i) effect the transfer or movement of cash or Shares; or (ii) transmit Shareholder information or other information, then in such event the Transfer Agent shall be entitled to rely on the validity and authenticity of such Proper Instructions without undertaking any further inquiry as long as such Proper Instruction is undertaken in conformity with applicable security procedures.

  • User Access Transfer Agent shall have a process to promptly disable access to Fund Data by any Transfer Agent personnel who no longer requires such access. Transfer Agent will also promptly remove access of Fund personnel upon receipt of notification from Fund.

  • General Access BCA agrees to provide Agency with access to the Minnesota Criminal Justice Data Communications Network (CJDN) and those systems and tools which the Agency is authorized by law to access via the CJDN for the purposes outlined in Minn. Stat. § 299C.46.