Use Data definition
Examples of Use Data in a sentence
However, Northern States Power Company shall remain liable for its own inappropriate release of Subscriber’s Account Information and Subscriber’s Energy Use Data.
Customer understands and agrees that Motorola may collect and use Service Use Data for its own purposes, including the uses described below.
It is Customer’s responsibility to notify Authorized Users of Motorola’s collection and use of Service Use Data and to obtain any required consents, provide all necessary notices, and meet any other applicable legal requirements with respect to such collection and use, and Customer represents and warrants to Motorola that it has complied and will continue to comply with this Section.
In line with NHS Secondary Use Data Governance Tool guidance any data used for Secondary Purposes will be anonymised (according to the ICO Code of Practice) or pseudonymised.
Motorola may use Service Use Data to (a) operate, maintain, manage, and improve existing and create new products and services, (b) test products and services, (c) to aggregate Service Use Data and combine it with that of other users, and (d) to use anonymized or aggregated data for marketing, research or other business purposes.
Your grant of licence to Us to copy, anonymize, aggregate, process, use, and display Customer Data and Use Data shall survive the expiry or termination for this Agreement.
Detail on the legal basis on which all uses must be based is available in the NHS England Secondary Use Data Governance Tool .
Your grant of licence to Us to copy, anonymise, aggregate, process, use, and display Customer Data and Use Data shall survive the expiry or termination for this Agreement.
Except to the extent that it is Personal Information, Customer understands and agrees that Motorola may collect and use Service Use Data for its own purposes, provided that such purposes are compliant with applicable Data Protection Laws.
The Data Importer has written, approved policies governing Account Management, Acceptable Use, Data Retention, Employee Code of Conduct, Encryption, Incident Response, Information Sensitivity, Use of Mobile Devices, Password Protection, Patch Management and Risk Management.