Sentences with phrase «intended use of the data»

The significance of any quality shortcomings depends, to some extent, on the intended use of the data.
What is the intended use of the data?

Not exact matches

Following this model, realtors transfer data from the MLS system into password - protected websites of their own making, which they intend for use by consumers, who assume the tasks of determining appropriate listing prices and open houses from their realtors.
The inquiry Ramirez intends to launch could uncover data and evidence to be used by Congress, federal courts, the Department of Justice and other agencies to combat the harm caused by patent trolls.
The law is intended to prevent the widespread use of privacy - infringing data such as that involved in the Cambridge Analytica scandal.
However, such license is subject to these Terms and does not include any right to (a) sell, resell or use commercially the Sites or Content, (b) distribute, publicly perform or publicly display any Content, (c) modify or otherwise make any derivative uses of the Sites or Content, or any portion thereof, (d) use any data mining, robots or similar data gathering or extraction methods, (e) download (other than the page caching) any portion of the Sites or Content, except as expressly permitted by us, and (f) use the Sites or Content other than for their intended purposes.
Web site security and restrictions on use As a condition to your use of Services, you agree that you will not, and you will not take any action intended to: (i) access data that is not intended for you; (ii) invade the privacy of, obtain the identity of, or obtain any personal information about any other user of this web site; (iii) probe, scan, or test the vulnerability of this web site or Wellington Management's network or breach security or authentication measures without proper authorization; (iv) attempt to interfere with service to any user, host, or network or otherwise attempt to disrupt our business; or (v) send unsolicited mail, including promotions and / or advertising of products and services.
Web site Security As a condition to your use of this Web site, you agree that you will not, and you will not take any action intended to: (i) access data that is not intended for you; (ii) invade the privacy of, obtain the identity of, or obtain any personal information about any other user of this Web site; (iii) probe, scan or test the vulnerability of this Web site or MFS» network or breach security or authentication measures without proper authorization; (iv) attempt to interfere with service to any user, host or network or otherwise attempt to disrupt our business; or (v) send unsolicited mail, including promotions and / or advertising of products and services.
You shall not Post Content that: (1) infringes any proprietary rights of any third party; (2) violates any law or regulation; (3) is defamatory or trade libelous; (4) is harmful, threatening, abusive, harassing, defamatory, vulgar, obscene, intimidating, profane, pornographic, hateful, racially, ethnically or sexually discriminatory or otherwise objectionable in any way or that otherwise violates any right of another; (5) encourages conduct that would violate any conduct prohibited by this Agreement; (6) restricts or inhibits any other user from using the Website; (7) is or amounts to an unsolicited advertisement, promotion, or other form of solicitation; (8) impersonates any person or entity or that directly or indirectly attempts to gain unauthorized access to any portion of the Website or any computer, software, or data of any person, organization or entity that uses or accesses the Website; (9) provides or create links to external sites that violate the Agreement; (10) is intended to harm, exploit, solicit, or collect personally identifiable information of, any individual under the age of 18 («Minor») in any way; (11) invades anyone's privacy by attempting to harvest, collect, store, or publish private or personally identifiable information without their foreknowledge and willing consent or distributes or contains viruses or any other technologies that may harm the Website or any of its users; (12) is copyrighted, protected by trade secret or otherwise subject to third - party proprietary rights, including privacy and publicity rights, unless you are the owner of such rights or have permission from the rightful owner to post the material and to grant Non-GMO Project all of the license rights granted herein; and / or (13) contains or promotes an illegal or unauthorized copy of another person's copyrighted work.
... [Wh] ile a small percentage of intended home birth deaths are wrongly attributed to hospital deaths using birth certificate data, a much larger percentage of home births with no injury to mother or baby are wrongly attributed to hospitals as well.
Founding Moms grants you the rights set forth herein, subject to the following conditions: (i) you shall not modify, disassemble, reverse engineer or otherwise reduce to human - perceivable form all or any part of the Services; (ii) you agree not to submit or transmit any emails or materials through the Services that contain a virus, worm, Trojan horse or any other harmful component; (iii) you shall not obtain or attempt to obtain any data through any means from the Services, except if we intend to provide or make it available to you; (iv) you shall not copy or imitate part or all of the design, layout, or look - and - feel of the Services or individual sections of it, in any form or media; (v) you are responsible for the accuracy and quality of the data and content that you submit; (vi) you shall not submit content that is offensive, including without limitation, bigotry, racism, discrimination, hatred, or profanity; (vii) you will use commercially reasonable efforts to prevent unauthorized access to and / or use of the Services, and to notify Founding Moms promptly of any such unauthorized access and / or use; and / or (viii) you shall not use the Services for any unlawful purpose or to violate any federal, state, international law, code of conduct or other guidelines which may be applicable to the Services provided.
You understand and agree that the owners of this site shall not be liable for any direct, indirect, incidental, consequential or exemplary damages, including but not limited to, damages for loss of profits, data or other intangible losses (even if the owners of this site have been advised of the possibility of such damages), resulting from the use or the inability to use the product (s) and or service (s) or any misuse of the product (s) and or service (s) in a manner not in accordance with their intended use.
I find it interesting that one of Gordon's objections to using birth certificate data is that it doesn't capture intended place of birth.
To prevent the exploitation or coercion of research participants, universities and other organizations conducting or sponsoring research require that all researchers who intend to use data collected from human subjects be familiar with national and state - level guidelines for working with human subjects data.
Yet another important piece of the puzzle when using birth certificate data is that birth certificates do not capture where the mother intended to give birth, only where she ultimately did give birth.
The MANAstats registry contains high - quality data that uses the gold standard — the medical record — instead of birth certificate data, which research shows is unreliable for studying intended place of birth and newborn outcomes.
More than half of people (57.6 %) intending to vote for UKIP in the May 2014 European Parliament election also intend to vote for UKIP in the 2015 general election, whereas the same proportion, those who intended to vote UKIP in the 2009 European election and who intended to vote UKIP in the 2010 UK general election, (using 2009 BES panel data) was less than half that number (25.5 %) in 2009.
Gig.U intends to accelerate the deployment of next - generation networks in the U.S. by encouraging researchers — students and professors alike — to develop new applications and services that can make use of ultrafast data - transfer rates.
«What's nicest about this study is that it uses data that wasn't originally intended for this purpose, so you know there couldn't be any bias and that makes it quite convincing,» says neuroscientist Kristin Tessmar - Raible of the Max F. Perutz Laboratories in Vienna who was not involved in the new work.
The goal of the $ 8 million, 8 - year project is to collect baseline data that can be used to assess whether the protected areas are working as intended.
Normally, data intended to be secret is added to the pixels in digital images, or used to change the transmission timing of internet packets.
An analysis of data from a previous study of more than 1,350 smokers intending to quit after a hospitalization found that those who reported using electronic cigarettes (e-cigarettes) during the study period were less likely to have successfully quit smoking 6 months after entering the study.
By submitting User Materials to or using the Site, you represent that you have the full legal right to provide the User Materials, that such User Materials will not: (a) divulge any protected health information or infringe any intellectual property rights of any person or entity or any rights of publicity, personality, or privacy of any person or entity, including without limitation as a result of your failure to obtain consent to post personally identifying or otherwise private information about a person or which impersonates another person; (b) violate any law, statute, ordinance, or regulation; (c) be defamatory, libelous or trade libelous, unlawfully threatening, or unlawfully harassing or embarrassing; (d) be obscene, child pornographic, or indecent; (e) violate any community or Internet standard; (f) contain any viruses, Trojan horses, worms, time bombs, cancelbots, or other computer programming routines that damage, detrimentally interfere with, surreptitiously intercept, or expropriate any system, data or personal information, or that facilitate or enable such or that are intended to do any of the foregoing; (g) result in product liability, tort, breach of contract, personal injury, death, or property damage; (h) constitute misappropriation of any trade secret or know - how; or (i) constitute disclosure of any confidential information owned by any third party.
Hottel and Leckner data is intended to be used to calculate heat transfer in things like boilers and flue gas where the temperature is high and the concentrations of CO2 and H2O from fuel combustion are also high.
The BDGP intends to use an updated version of BioViews to give the Drosophila research community access to our rapidly expanding store of Drosophila sequence data, and is committed to using future versions of BioViews and other Java - based bioinformatics components as the public front end to Drosophila genomic data.
The data therefore suggest that triceps brachii muscle activity is superior with greater relative loads regardless of whether maximal intended velocity is used during each repetition.
This regulations set rules for how and when we can collect personal data from users on our website, so is now required by law to be transparent about the persona data we collect, also be relevant and limited to what is necessary for the intended purpose of collection, but, specially, gain consent from individuals before using it.
How does the timeline sit alongside availability of any data you intend to use as evidence?
They keep students informed of their learning progress and the intended learning targets, using both qualitative and quantitative data.
College Access and Success State Data: A compilation of links to the many state - specific resources intended for use by researchers, policy analysts, and practitioners to facilitate the development of a complete picture of the pathway to and through college.
My dissertation intends to extend the understanding of the roles teachers and peers play in education production through using novel empirical approaches to analyze high - resolution data that record the process of education.
Using data from surveys, focus groups and program observations in the summer of 2013, the reports listed below are intended to help education leaders and program providers understand specific strategies to meet time - sensitive priorities around Common Core preparation, students» social and emotional growth, and teacher and staff development.
For example, the student questionnaire on the National Assessment of Educational Progress, or NAEP, will gather information on students» social - emotional skills in 2017.51 Researchers intend to use these data to analyze the relationship between SEL and academic achievement on the NAEP exam.52 Districts and schools may find this information particularly useful to inform local interventions and improve student performance and behavior.
Underlying her commentary is the importance of paying attention to the intended and unintended consequences of using such metrics, or any data or evidence, for education improvement.
Private networks and / or encryption technologies will be used during the transfer of information to ensure that Internet «eavesdropping» does not take place and that data is sent only to its intended destination and to an authorized user, by an authorized user.
Private networks and / or encryption technologies are used during the electronic transfer of information to ensure that «eavesdropping» is not allowed and that data is sent only to its intended destination and to an authorized user, by an authorized user.
Porsche intends to use GPS data, including the radius of bends and the elevation of hills, to help cars automatically choose the most efficient driving mode.
The devices aren't intended for communication of sensitive data, although they can be used to access the Internet and e-mail.
Using a complex system of voice and data encryption (by way of a built - in Secusmart Security Card), the SecuTablet intends to protect any and all sensitive data the device contains.
He also asked the Seattle based online retailer on what Amazon intends on using all of the data they collect for.
Amazon intends on rolling out a new pre-paid SIM card used for 4G / LTE data, helping you get the most out of your tablets.
While this is not intended to be an exhaustive list it will hopefully shed light on a few key principles, using data and reasoning, that may help improve investors» odds of investment success in the long run.
Like cash from some secured loans, personal loans can generally be used for any purpose — according to data from LendingTree, MagnifyMoney's parent company, nearly 34 % of personal loans are intended for debt consolidation and just under 33 % are targeted toward credit card refinancing.
Site users are prohibited from violating or attempting to violate the security of this Site, including without limitation: (1) accessing data not intended for such user or logging onto a server or an account which the user is not authorized to access; (2) using this Site for unintended purposes or trying to change the behavior of this Site; (3) attempting to probe, scan or test the vulnerability of a system or network or breach security or authentication measures without proper authorization; (4) attempting to interfere with service to any user, host or network, including without limitation, via means of submitting a virus to this Site, overloading, «flooding,» «spamming,» «mailbombing» or «crashing»; (5) forging any TCP / IP packet header or any part of the header information in any e-mail or newsgroup posting; and (6) forging communications on behalf of this Site (impersonating this site) or to this Site (impersonating a legitimate user).
You will not, and will not allow or authorize others to, use the Services, the Sites or any Materials therein to take any actions that: (i) infringe on PetSmart Charities» or any third party's copyright, patent, trademark, trade secret or other intellectual or proprietary rights, or rights of publicity or privacy; (ii) violate any applicable law, statute, ordinance or regulation (including those regarding export control); (iii) are defamatory, trade libelous, threatening, harassing, invasive of privacy, stalking, harassment, abusive, tortuous, hateful, constitute discrimination based on race, religion, ethnicity, gender, sex, disability or other protected grounds, or are pornographic or obscene; (iv) interfere with or disrupt any services or equipment with the intent of causing an excessive or disproportionate load on PetSmart Charities or its licensors or suppliers» infrastructure; (v) involve knowingly distributing viruses, Trojan horses, worms, or other similar harmful or deleterious programming routines; (vi) involve the preparation and / or distribution of «junk mail», «spam», «chain letters», «pyramid schemes» or other deceptive online marketing practices, or any unsolicited bulk email or unsolicited commercial email or otherwise in a manner that violate any applicable «anti-spam» legislation, including that commonly referred to as «CASL»; (vii) would be or encourage conduct that could constitute a criminal offense, give rise to civil liability or otherwise violate any applicable local, state, national or international laws or regulations; (viii) involve the unauthorized entry to any machine accessible via the Services or interference with the Sites or any servers or networks connected to the Sites or disobey any requirements, procedures, policies or regulations of networks connected to the Sites, or attempt to breach the security of or disrupt Internet communications on the Sites (including without limitation accessing data to which you are not the intended recipient or logging into a server or account for which you are not expressly authorized); (ix) impersonate any person or entity, including, without limitation, one of PetSmart Charities» or another party's officers or employees, or falsely state or otherwise misrepresent your affiliation with a person or entity; (x) forge headers or otherwise manipulate identifiers in order to disguise the origin of any information transmitted through the Sites; (xi) collect or store personal data about other account users or attempt to gain access to other account users» accounts or otherwise mine information about other account users or the Sites, or interfere with any other user's ability to access or use the Sites; (xii) execute any form of network monitoring or run a network analyzer or packet sniffer or other technology to intercept, decode, mine or display any packets used to communicate between the Sites» servers or any data not intended for you; (xiii) attempt to circumvent authentication or security of any content, host, network or account («cracking») on or from the Sites; or (xiv) in PetSmart Charities» sole discretion, are contrary to PetSmart Charities» public image, goodwill, reputation or mission, or otherwise not in furtherance of our Vision of a lifelong, loving home for every pet.
You will not, and will not allow or authorize others to, use the Services or the Sites to take any actions that: (i) infringe on any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy; (ii) violate any applicable law, statute, ordinance or regulation (including those regarding export control); (iii) are defamatory, trade libelous, threatening, harassing, invasive of privacy, stalking, harassment, abusive, tortuous, hateful, discriminatory based on race, ethnicity, gender, sex or disability, pornographic or obscene; (iv) interfere with or disrupt any services or equipment with the intent of causing an excessive or disproportionate load on the Animal League or its licensors or suppliers» infrastructure; (v) involve knowingly distributing viruses, Trojan horses, worms, or other similar harmful or deleterious programming routines; (vi) involve the preparation and / or distribution of «junk mail», «spam», «chain letters», «pyramid schemes» or other deceptive online marketing practices or any unsolicited bulk email or unsolicited commercial email or otherwise in a manner that violate the Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN - SPAM Act of 2003); (vii) would encourage conduct that could constitute a criminal offense, give rise to civil liability or otherwise violate any applicable local, state, federal or international laws, rules or regulations; (viii) involve the unauthorized entry to any machine accessible via the Services or interfere with the Sites or any servers or networks connected to the Sites or disobey any requirements, procedures, policies or regulations of networks connected to the Sites, or attempt to breach the security of or disrupt Internet communications on the Sites (including without limitation accessing data to which you are not the intended recipient or logging into a server or account for which you are not expressly authorized); (ix) impersonate any person or entity, including, without limitation, one of the Animal League's or other's officers or employees, or falsely state or otherwise misrepresent your affiliation with a person or entity; (x) forge headers or otherwise manipulate identifiers in order to disguise the origin of any information transmitted through the Sites; (xi) collect or store personal data about other Animal League members, Site users or attempt to gain access to other Animal League members information, or otherwise mine information about Animal League members, Site users, or the Sites; (xii) execute any form of network monitoring or run a network analyzer or packet sniffer or other technology to intercept, decode, mine or display any packets used to communicate between the Sites» servers or any data not intended for you; (xiii) attempt to circumvent authentication or security of any content, host, network or account («cracking») on or from the Sites; or (xiv) are contrary to the Animal League's public image, goodwill, reputation or mission or otherwise not in furtherance of the Animal Leagues stated purposes.
On top of that, the figurines are supposed to work across multiple games, so it's more likely that they're just a character data storage system than that they're intended to be used to unlock anything important inside any specific game.
As for the Menne paper itself, I'm rather disturbed by their use of preliminary data at 43 percent, especially since I warned them that the data set they had lifted from my Web site (placed for volunteers to track what had been surveyed, never intended for analysis) had not been quality controlled at the time.
John, it appears to this layman onlooker that in this case (and probably in many, many others) the thermometer data is being put to uses never originally intended, to wit, to measure «global warming» as evidenced by a hacked - together «global thermometer grid» that does not and was never intended to collect the «pure» ambient air temperatures of the locations where the thermometers have been placed.
Over some years I have developed unique software intended for use on climatic kind of data.
a b c d e f g h i j k l m n o p q r s t u v w x y z