Sentences with phrase «use by an authorized user»

Electronic Reserve: Electronic copies of extracts, chapters, or articles made and stored on the Secure Network by the Licensee for use by Authorized Users in connection with specific courses of instruction offered by the Licensee.
Online material labeled «D» may only be displayed for use by an Authorized User on a classroom computer, whiteboard, or a home computer of parent or guardian of a current student.
To answer your question, Eli, this happens whether the card is actually used by the authorized user or not.

Not exact matches

Lists should be updated regularly, secured to protect confidential information and available to authorized users at the emergency operations center or an alternate location for use by members of the crisis communications team.
You, as the Authorizing Officer, together with the company are responsible for any use of the account by you, an authorized user or anyone else permitted to use the account.
And that's what Facebook's policies used to allow by letting Facebook «friends» basically authorize the use of a user's personal data for them.
By uploading, posting or submitting User Content to Daily Harvest through the Sites or through our pages or feeds on third party social media platforms, you represent and warrant that (a) such User Content is nonconfidential, (b) you own and control all of the rights to the User Content or you otherwise have all necessary rights to post such User Content, (c) you authorize Daily Harvest to use such User Content for the purposes described in these Terms, (d) the User Content is accurate and not misleading or harmful in any manner, and (e) the User Content, and your use and posting thereof, does not and will not violate these Terms or any applicable law, rule, regulation or third party right.
The Defense Alliance of Minnesota may enable third - party developers to create websites and applications that retrieve data made available by The Defense Alliance of Minnesota and its users and / or that retrieve authorized data from third - party sites for use through the Service.
Plus, you have the option to get an additional 5,000 ($ 50) points by adding an authorized user (which won't affect authorized users from getting their own card, btw), and you have more options when it comes time to use your Ultimate Rewards points.
Zero Liability Protection Zero Liability Protection does not apply to use of an account by an authorized user without the approval of the primary cardmember.
D. Without limiting the generality of the previous paragraphs, User authorizes Company to share User - posted content across all web sites, to include User content in a searchable format accessible by other Users of the Company web sites, now in use or later developed, to place advertisements in close proximity to such User content, and to use User's name, likeness and any other information in connection with Company's use of the material User provides.
Also, in connection with the exercise of these rights, you grant us and anyone authorized by us, the right to identify you as the author of such material by name, email address or user name, and to use your image and likeness if provided, in connection with such material.
You agree to defend, indemnify, and hold harmless the Action Network Group and its affiliates and their officers, directors, employees, consultants, agents, licensors, and suppliers from and against any and all claims, losses, expenses, liabilities, settlements, litigation, damages, and / or costs (including, but not limited to, fees, costs and other expenses of attorneys and expert witnesses) arising out of or related to: (i) your use of the Site, including, but not limited to, any Materials or User Content, (ii) any violation of these Terms of Use or applicable law by you in connection with your use of the Site, including, but not limited to, any Materials or User Content, (iii) any actual or alleged infringement by you, or any person accessing the Site, including, but not limited to, any Materials or User Content, using your password or account identifier, of any intellectual property or privacy or other right of any third party, or (iv) any unauthorized use of password protected Materials or User Content utilizing your account information, whether or not known or authorized by yuse of the Site, including, but not limited to, any Materials or User Content, (ii) any violation of these Terms of Use or applicable law by you in connection with your use of the Site, including, but not limited to, any Materials or User Content, (iii) any actual or alleged infringement by you, or any person accessing the Site, including, but not limited to, any Materials or User Content, using your password or account identifier, of any intellectual property or privacy or other right of any third party, or (iv) any unauthorized use of password protected Materials or User Content utilizing your account information, whether or not known or authorized by yUse or applicable law by you in connection with your use of the Site, including, but not limited to, any Materials or User Content, (iii) any actual or alleged infringement by you, or any person accessing the Site, including, but not limited to, any Materials or User Content, using your password or account identifier, of any intellectual property or privacy or other right of any third party, or (iv) any unauthorized use of password protected Materials or User Content utilizing your account information, whether or not known or authorized by yuse of the Site, including, but not limited to, any Materials or User Content, (iii) any actual or alleged infringement by you, or any person accessing the Site, including, but not limited to, any Materials or User Content, using your password or account identifier, of any intellectual property or privacy or other right of any third party, or (iv) any unauthorized use of password protected Materials or User Content utilizing your account information, whether or not known or authorized by yuse of password protected Materials or User Content utilizing your account information, whether or not known or authorized by you.
Unless otherwise expressly authorized by Alpha Mom ™, as a user, you may only use the Website and Services for your own personal use.
For the avoidance of doubt, neither recovery of direct cost by the Licensee from Authorized Users, nor use by Licensee or Authorized Users of the Licensed Materials in the course of research funded by a commercial organization is deemed to constitute Commercial Uuse by Licensee or Authorized Users of the Licensed Materials in the course of research funded by a commercial organization is deemed to constitute Commercial UseUse.
6.3 While Licensee is not bound to monitor or enforce the specific uses of the Licensed Materials made by Authorized Users, Licensee agrees to create and maintain reasonable security measures, and to regularly communicate policies and restrictions to ensure that only Authorized Users will access and use the Licensed Materials in accordance with the terms of this License.
(i) current employees / faculty of the Licensee who are doing work or conducting research for the Licensee who are authorized to access the Secure Network; (ii) current contractors or visiting faculty doing work or conducting research for the Licensee who are authorized to access the Secure Network; (iii) where applicable, retiree or emeritus faculty of the Licensee who are authorized to access the Secure Network; (iv) where applicable, individuals who are currently, officially enrolled as a registered student of a degree program at the Licensee's institution who are authorized to access the Secure Network; (v) walk - in users who are permitted to use the Licensee's library or information services and who are authorized to access the Secure Network, but only while on the physical premises of the Licensee; and (vi) Other users as may be authorized in writing by and at the sole discretion of the Publisher.
It's a tactic used by hackers to execute «masquerade attacks,» where they pretend to be authorized users of a system by replicating the writing styles of the compromised account.
A direct affiliation with the Licensee may include, for example, (a) current employees whether on a permanent, temporary, contract, or visiting basis, but excluding employees at a foreign affiliate or constituent university and (b) individuals who are: (1) officially enrolled as a registered student at the Licensee's institution; (2) authorized to use the library network from within the library premises or from such other places where such persons work or study (including but not limited to offices and homes, halls of residence, and student dormitories) and who have been issued by the Licensee with a password or other authentication method for such use of the library network, but (3) excluding students at a foreign affiliate or constituent university; or (c) walk - in users who are permitted to use Licensee's library or information service and permitted to access the library network but only from computer terminals within the Licensee's library premises («Authorized Userauthorized to use the library network from within the library premises or from such other places where such persons work or study (including but not limited to offices and homes, halls of residence, and student dormitories) and who have been issued by the Licensee with a password or other authentication method for such use of the library network, but (3) excluding students at a foreign affiliate or constituent university; or (c) walk - in users who are permitted to use Licensee's library or information service and permitted to access the library network but only from computer terminals within the Licensee's library premises («Authorized Users&raqusers who are permitted to use Licensee's library or information service and permitted to access the library network but only from computer terminals within the Licensee's library premises («Authorized UserAuthorized Users&raqUsers»).
This statement governs our privacy policies with respect to those users of the Site («Visitors») who visit without transacting business and Visitors who register to transact business on the Site and make use of the various services offered by Cyber-Dating Expert (collectively, «Services»)(«Authorized Customers»).
Reproduction (except temporary download from the web site to the user's pc hard drive or proxy servers), copy, use, distribution, reuse, exploit, doing second copies, email, transfer, modification, delegation oar any other act with the totality or part of the information contained in this platforms, that has been not explicitly authorized by the titular, are forbidden.
References to «you» in this Privacy Policy shall also include any Authorized Users (as defined in our Terms of Use, found here: https://www.cinemax.com/terms-of-use.html) established by you, if available.
We do not use or share our users» Personal Information in a way that is incompatible with the purposes for which such Personal Information was requested and authorized for use by us.
Audit provisions were also included to ensure that CoTs DOT LAN is used appropriately by authorized users and monitored for unauthorized usage.
Private networks and / or encryption technologies will be used during the transfer of information to ensure that Internet «eavesdropping» does not take place and that data is sent only to its intended destination and to an authorized user, by an authorized user.
Private networks and / or encryption technologies are used during the electronic transfer of information to ensure that «eavesdropping» is not allowed and that data is sent only to its intended destination and to an authorized user, by an authorized user.
Audit provisions were also included to ensure that A&I Online is used appropriately by authorized users and monitored for unauthorized usage.
The Mileage - Based Road User Charge System does not use PII for any secondary purposes that might require consent unless otherwise authorized by law.
Audit provisions are also included to ensure that CDLIS - Gateway is used appropriately by authorized users and monitored for unauthorized usage.
Adobe Vendor ID allows vendors to streamline the content authorization process by providing vendors with a unique ID which can be used to authorize content on behalf of its users.
In connection with any User Content you submit, you affirm, represent, and warrant that: (i) you own the necessary licenses, rights, consents and permissions to use and authorize both us and our service providers to use all patent, trademark, trade secret, copyright or other proprietary rights in and to any and all User Content to enable inclusion and use of User Content in the manner contemplated by the Site and these Terms of Use; (ii) you have the written consent, release, and / or permission of each and every identifiable individual person in the User Content to use the name or likeness of each and every such identifiable individual person to enable inclusion and use of the User Content in the manner contemplated by the Site and these Terms of Use, and (iii) any User Content you submit does not infringe or violate the rights of any third - paruse and authorize both us and our service providers to use all patent, trademark, trade secret, copyright or other proprietary rights in and to any and all User Content to enable inclusion and use of User Content in the manner contemplated by the Site and these Terms of Use; (ii) you have the written consent, release, and / or permission of each and every identifiable individual person in the User Content to use the name or likeness of each and every such identifiable individual person to enable inclusion and use of the User Content in the manner contemplated by the Site and these Terms of Use, and (iii) any User Content you submit does not infringe or violate the rights of any third - paruse all patent, trademark, trade secret, copyright or other proprietary rights in and to any and all User Content to enable inclusion and use of User Content in the manner contemplated by the Site and these Terms of Use; (ii) you have the written consent, release, and / or permission of each and every identifiable individual person in the User Content to use the name or likeness of each and every such identifiable individual person to enable inclusion and use of the User Content in the manner contemplated by the Site and these Terms of Use, and (iii) any User Content you submit does not infringe or violate the rights of any third - paruse of User Content in the manner contemplated by the Site and these Terms of Use; (ii) you have the written consent, release, and / or permission of each and every identifiable individual person in the User Content to use the name or likeness of each and every such identifiable individual person to enable inclusion and use of the User Content in the manner contemplated by the Site and these Terms of Use, and (iii) any User Content you submit does not infringe or violate the rights of any third - parUse; (ii) you have the written consent, release, and / or permission of each and every identifiable individual person in the User Content to use the name or likeness of each and every such identifiable individual person to enable inclusion and use of the User Content in the manner contemplated by the Site and these Terms of Use, and (iii) any User Content you submit does not infringe or violate the rights of any third - paruse the name or likeness of each and every such identifiable individual person to enable inclusion and use of the User Content in the manner contemplated by the Site and these Terms of Use, and (iii) any User Content you submit does not infringe or violate the rights of any third - paruse of the User Content in the manner contemplated by the Site and these Terms of Use, and (iii) any User Content you submit does not infringe or violate the rights of any third - parUse, and (iii) any User Content you submit does not infringe or violate the rights of any third - party.
These two roles go by many names, such as primary, applicant, co-applicant and authorized user, with, interestingly, no uniformly consistent set of terms used by card issuers to describe these two major ways in which credit accounts are shared.
What it means to be an authorized user An authorized user is someone who is designated by the legal holder of a card account to share in its use, with a card issued in the authorized user's name, but without responsibility for any of the debt incurred on the card.
The «authorized user» strategy is one of the most commonly used methods by people who want to build their credit from scratch and by people who are trying to rebuild their credit after some sort of credit disaster.
Dear Dex, As more consumers have come to know, an authorized user is someone who has been given permission to use a card account by the primary cardholder.
Authorized User accounts can be used to meet tradeline requirements if 12 months payment can be documented by the borrower.
The credit renews each cardmember year and can be used by both the primary cardholder and any authorized users.
It had become apparent to FICO that the price for discouraging piggybacking abuse by a relative few would be the denial of honestly - earned credit history for millions of legitimate authorized users — most often the spouses of primary cardholders — who use and manage these accounts no differently than those in the primary role.
A «piggybacker,» more commonly known as an «authorized user,» is a person permitted to use a credit card by a primary cardholder who maintains responsibility for all debt on the card, regardless of who makes the charges.
Zero Liability Protection does not apply to use of an account by an authorized user without the approval of the primary cardmember.
To the fullest extent permitted by law, in no event and under no circumstances shall PetSmart Charities or the contributors of information to the Sites or our sponsors, licensors or authorized representatives be liable to you or any third party for direct, indirect, special, incidental, punitive or consequential damages (including without limitation any loss of profits, lost savings, or loss of data) arising out of your (or any authorized user's) or any unrelated party's use or inability to use the Sites, or your (or any authorized user's) or any unrelated party's reliance or use of information, products or services provided on or through the Internet, or that result from mistakes, omissions, interruptions, deletions of files or other data loss, errors, defects, delays in operation, service or transmission or any failure of performance of the Sites, even if we, or any of our authorized representatives, have been advised of the possibility of such damage and even if the remedies stated in these Terms of Use fail of their essential purpouse or inability to use the Sites, or your (or any authorized user's) or any unrelated party's reliance or use of information, products or services provided on or through the Internet, or that result from mistakes, omissions, interruptions, deletions of files or other data loss, errors, defects, delays in operation, service or transmission or any failure of performance of the Sites, even if we, or any of our authorized representatives, have been advised of the possibility of such damage and even if the remedies stated in these Terms of Use fail of their essential purpouse the Sites, or your (or any authorized user's) or any unrelated party's reliance or use of information, products or services provided on or through the Internet, or that result from mistakes, omissions, interruptions, deletions of files or other data loss, errors, defects, delays in operation, service or transmission or any failure of performance of the Sites, even if we, or any of our authorized representatives, have been advised of the possibility of such damage and even if the remedies stated in these Terms of Use fail of their essential purpouse of information, products or services provided on or through the Internet, or that result from mistakes, omissions, interruptions, deletions of files or other data loss, errors, defects, delays in operation, service or transmission or any failure of performance of the Sites, even if we, or any of our authorized representatives, have been advised of the possibility of such damage and even if the remedies stated in these Terms of Use fail of their essential purpoUse fail of their essential purpose.
You are responsible for any use of your account by you, an authorized user or anyone else that you permit to use your account.
Plus, you have the option to get an additional 5,000 ($ 50) points by adding an authorized user (which won't affect authorized users from getting their own card, btw), and you have more options when it comes time to use your Ultimate Rewards points.
Award Availability and Fees The primary Cardmember can use miles to book award travel on any United - operated flight at the MileagePlus ® Everyday Award level, including award travel booked by the primary Cardmember for an authorized user under the primary Cardmember's MileagePlus number, as long as tickets are still available for sale for the applicable cabin on such flight.
Zero Liability Protection Zero Liability Protection does not apply to use of an account by an authorized user without the approval of the primary cardmember.
[+] The first year's annual fee is waived [+] Get 50,000 bonus points starting bonus [+] Earn the starting bonus by spending $ 4000 on your card within the first three months [+] The starter reward equals $ 625 in travel if you redeem them through Chase Ultimate Rewards [+] Earn an extra 5000 points if you add an authorized user who makes purchases in the first three months [+] Get two points per dollar spent in restaurants and on travel [+] Earn one point per dollar spent on most other things [+] They have a 1:1 point transfer system to their partners [+] Their partners includes 11 airline and various hotels and hospitality companies [+] There are no foreign - transaction fees with this card [+] You may use and earn discounts on your travel if you redeem via their Chase Ultimate Rewards platform
But, if you've already used your statement credit to pay for your own application for Global Entry or TSA PreCheck, some cards allow you to cover someone else's application fee by making them an authorized user on your account, according to Bisesto.
You do have the chance to earn an additional 7,500 points by adding an authorized user and using that card!
You agree not to engage in any of the following prohibited activities: (i) copying, distributing, or disclosing any part of the Service in any medium, including without limitation by any automated or non-automated «scraping»; (ii) using any automated system, including without limitation «robots,» «spiders,» «offline readers,» etc., to access the Service in a manner that sends more request messages to the Company servers than a human can reasonably produce in the same period of time by using a conventional on - line web browser (except that Humble Bundle grants the operators of public search engines revocable permission to use spiders to copy materials from Humble Bundle for the sole purpose of and solely to the extent necessary for creating publicly available searchable indices of the materials, but not caches or archives of such materials); (iii) transmitting spam, chain letters, or other unsolicited email; (iv) attempting to interfere with, compromise the system integrity or security or decipher any transmissions to or from the servers running the Service; (v) taking any action that imposes, or may impose in our sole judgment an unreasonable or disproportionately large load on our infrastructure; (vi) uploading invalid data, viruses, worms, or other software agents through the Service; (vii) collecting or harvesting any personally identifiable information, including account names, from the Service; (viii) using the Service for any commercial solicitation purposes; (ix) impersonating another person or otherwise misrepresenting your affiliation with a person or entity, conducting fraud, hiding or attempting to hide your identity; (x) interfering with the proper working of the Service; (xi) accessing any content on the Service through any technology or means other than those provided or authorized by the Service; (xii) bypassing the measures we may use to prevent or restrict access to the Service, including without limitation features that prevent or restrict use or copying of any content or enforce limitations on use of the Service or the content therein; (xiii) sell, assign, rent, lease, act as a service bureau, or grant rights in the Products, including, without limitation, through sublicense, to any other entity without the prior written consent of such Products» (defined below) licensors; (xiv) circumventing Service limitations on the number of Products you may purchase, including, without limitation, creating multiple accounts and purchasing a total number of Products through such multiple accounts which exceed the per - user limitations; or (xv) except as otherwise specifically set forth in a licensor's end user license agreement, as otherwise agreed upon by a licensor in writing or as otherwise allowed under applicable law, distributing, transmitting, copying (other than re-installing software or files previously purchased by you through the Service on computers, mobile or tablet devices owned by you, or creating backup copies of such software or files for your own personal use) or otherwise exploiting the Products (defined below) in any manner other than for your own private, non-commercial, personal use.
Cheats: Use any methods of game play not authorized by High Horse, including but not limited to exploits of any bugs, which grant you and / or other user an advantage over other players.
a b c d e f g h i j k l m n o p q r s t u v w x y z