Access and Authentication Sample Clauses

Access and Authentication. Licensor will provide the Licensee and its Authorized Users with access to the Licensed Materials pursuant to the terms, conditions, and specifications set forth in Schedule 3, which is attached hereto. Licensor will use reasonable efforts to provide authentication methods that conform to current industry standards, and will cooperate with Licensee in the implementation of new authentication protocols and procedures as they are developed during the term of this Agreement. {Liblicense editors suggest that the above issues be negotiated and addressed in a separate Schedule attached to the main Agreement. Like pricing models, access and authentication specifications vary widely in licensing contracts. The options include the following: • IP addresses (both authenticated and non-authenticated); • Proxy servers; • Passwords; • Public keys or certificates; • Xxxxxxxxxx; and • Developing protocols not yet developed or tested at the time of Agreement signing. These access and authentication specifications may require the expertise of networking professionals, information security specialists, and/or the institution’s chief information officer. For these and other reasons, the LMLA includes a template for Schedule 3, which should be edited to meet your specific needs.}
AutoNDA by SimpleDocs
Access and Authentication. The Project MUSE file server permits entry by recognizing authorized IP addresses. Distance learners and alumni who access the internet via campus IP accounts or a secure proxy server may use Project MUSE, but direct access is not available through independent service providers. Referring URL is offered as an alternative method for remote access, so long as a secure system is in place allowing only Authorized Users, as described above, access to Project MUSE via the referring URL. Project MUSE also supports access via Shibboleth authentication. At the time an order is placed, the Subscriber provides IP addresses for all institutional networks and computers that require access to MUSE content, as well as any relevant details for enabling access via referring URL or Shibboleth. The Subscriber will make reasonable efforts to create and maintain appropriate security measures to ensure that only Authorized Users can access subscribed content online. The Subscriber also affirms that all IP addresses provided for use of MUSE content are controlled by its institution exclusively for internet access by Authorized Users. Valid IP addresses must not include those of publicly accessible proxy or cache servers.
Access and Authentication. The Project MUSE file server permits entry by recognizing the authorized IP addresses. Distance learners and alumni who access the internet via campus IP accounts or a secure proxy server may use Project MUSE, but direct access is not available through independent service providers. Referring URL is also offered as an alternative method for remote access, so long as a secure system is in place allowing only Authorized Users, as described above, access to Project MUSE via the referring URL. Project MUSE also supports access via Athens or Shibboleth authentication. At the time an order is placed, the Participating Member provides IP addresses for all institutional networks and computers that require access to MUSE journal and/or book content, as well as any relevant details for enabling access via referring URL, Athens, or Shibboleth. No credit is given for the submission of incorrect or incomplete IP ranges or access details, or for IP information or access details submitted late. Any changes or additions to IP addresses may be submitted at any time and will be updated in a timely manner. The Participating Members will make reasonable efforts to create and maintain appropriate security measures to ensure that only Authorized Users can access subscribed or purchased content online. The Participating Members will use reasonable efforts to ensure that all IP addresses provided for access to MUSE content are controlled by its institution exclusively for internet access by Authorized Users. Valid IP addresses must not include those of publicly accessible proxy or cache servers. Project MUSE prefers that content be accessed on its servers, as there is value to be gained from MUSE’s integrated interface and other tools offered for research and discovery. If a non-negotiable condition for purchase of a UPCC Book Collection is local loading of content by a Participating Library, MUSE will accept this condition so long as it can be accomplished through a mutually agreeable process that does not create an undue burden on MUSE’s technical staff. Local loading of subscribed, not purchased, content (book collections or journal collections) is not allowed. A Participating Library that chooses to locally load and serve UPCC Book Collection content must provide Project MUSE with COUNTER-compliant statistics reports for the usage of content on its local server.
Access and Authentication. For purposes of the Single-Site License, an “Authorized Site” is a localized site (one geographical location) that is under a single administration. For an organization with locations in more than one city, each city is considered to be a different site. For an organization that has multiple locations in the same city that are administered independently, each location is considered to be a differe nt site. No access from remote campuses or remote sites and no consortia or other forms of subscription sharing are allowed under this License.
Access and Authentication. Licensor will provide the Licensee and its Authorized Users with access to the Licensed Materials pursuant to the terms, conditions, and specifications set forth in Schedule 3, which is attached hereto. Licensor will use reasonable efforts to provide authentication methods that conform to current industry standards, and will cooperate with Licensee in the implementation of new authentication protocols and procedures as they are developed during the term of this Agreement. {Liblicense editors suggest that the above issues be negotiated and addressed in a separate Schedule attached to the main Agreement. Like pricing models, access and authentication specifications vary widely in licensing contracts. The options include the following: IP addresses (both authenticated and non-authenticated); Proxy servers;
Access and Authentication. The Project MUSE file server permits entry by recognizing authorized IP addresses. Distance learners and alumni who access the internet via campus IP accounts or a secure proxy server may use Project MUSE, but direct access is not available through independent service providers. Referring URL is offered as an alternative method for remote access, so long as a secure system is in place allowing only Authorized Users, as described above, access to Project MUSE via the referring URL. Project MUSE also supports access via Shibboleth authentication, and via email domain authentication utilizing a MyMUSE account. At the time an order is placed, the Subscriber provides IP addresses for all institutional networks and computers that require access to MUSE content, as well as any relevant details for enabling access via referring URL, Shibboleth, or email domain. The Subscriber will make reasonable efforts to create and maintain appropriate security measures to ensure that only Authorized Users can access subscribed content online. The Subscriber also affirms that all IP addresses provided for use of MUSE content are controlled by its institution exclusively for internet access by Authorized Users. Valid IP addresses must not include those of publicly accessible proxy or cache servers.
Access and Authentication. To access Internet Banking you must use the user identification name or number we provide you together with a Password. You may receive more than one method of authentication, depending upon the types of services you request and the levels of security you select for those services. The Password or other authentication means has the same effect as your signature authorizing transactions and/or information changes. You agree to keep the Password safe, not to record the Password or otherwise disclose or make the Password available to anyone other than authorized users of your accounts. Anyone to whom you disclose your Password and anyone who has access to your Password may have full access to the services you can perform on Internet Banking, including full access to your accounts. You have no ability to limit any such person's authority. If anyone uses your Password with your permission, you will be responsible for any transactions performed by that person. If you have given someone your Password or other means of access and want to terminate that person's authority, you must change your Password or means of access or take additional steps to prevent further access by such person. If a third party should gain access to your Password, you alone are responsible for changing the Password so as to deny the third party's access to your banking information. Given the electronic nature of these transactions, the Bank shall have no liability to you in the event a third party should gain access to your Password through no fault of the Bank. You are liable for any and all unauthorized use of Internet Banking in connection with your accounts. You should carefully select a Password that is difficult to guess. Minimum password requirements are enforced. We suggest you stay away from dates and any other information that may be easily deciphered. Do not use the same password that you use for other accounts, such as email. Change your password often, and immediately change your password if you think it may be compromised. You will be required to change your password periodically, as well as update/confirm your email address and authentication questions.
AutoNDA by SimpleDocs
Access and Authentication. Online identity and access information for the site(s) of each Member should be listed in Appendix
Access and Authentication. 2.1. The access and authentication procedures are subject to the WWF Mobile Office User Guide which you either has already received from us or shall request from us by using the means stipulated in the General Terms.
Access and Authentication. Licensor will allow the Licensee and its Authorized Users to have access to the Licensed Materials pursuant to the terms, conditions, and specifications set forth in Schedule 2, which is attached hereto. Licensor will use reasonable efforts to provide authentication methods which are current industry standards.
Time is Money Join Law Insider Premium to draft better contracts faster.