Access and logins Sample Clauses

Access and logins. When a centre is approved, a general access login and password is provided for access to the Linx2 area of the website. Centres must also obtain a secure login from xxxx0xxxx@xxxx.xx.xx; the secure login provides access to Linx2Online, Linx2Record and/or Linx2Achieve and will normally be required by an examinations officer.
AutoNDA by SimpleDocs

Related to Access and logins

  • Access and Records A. County, the State of California and the United States Government and/or their representatives, shall have access, for purposes of monitoring, auditing, and examining, to Subrecipient’s activities, books, documents and papers (including computer records and emails) and to records of Subrecipient’s subcontractors, consultants, contracted employees, bookkeepers, accountants, employees and participants related to this Contract. Subrecipient shall insert this condition in each Contract between Subrecipient and a subcontractor that is pursuant to this Contract shall require the subcontractor to agree to this condition. Such departments or representatives shall have the right to make excerpts, transcripts and photocopies of such records and to schedule on site monitoring at their discretion. Monitoring activities also may include, but are not limited to, questioning employees and participants and entering any premises or onto any site in which any of the services or activities funded hereunder are conducted or in which any of the records of Subrecipient are kept. Subrecipient shall make available its books, documents, papers, financial records, etc., within three (3) days after receipt of written demand by Director which shall be deemed received upon date of sending. In the event Subrecipient does not make the above referenced documents available within the County of Orange, California, Subrecipient agrees to pay all necessary and reasonable expenses incurred by County, or County’s designee, in conducting any audit at the location where said records and books of account are maintained.

  • Access and Security Customer shall employ all physical, administrative and technical controls, screening and security procedures and other safeguards necessary to: (a) securely administer the distribution and use of all Access Credentials and protect against any unauthorized access to or use of the Hosted Services; and (b) control the content and use of Customer Data, including the uploading or other provision of Customer Data for Processing by the Hosted Services.

  • Information Access and Audit Rights 25.1 Information Access 25.2 Reporting of Non-Force Majeure Events 25.3 Audit Rights 25.3.1 25.3.2 25.4 Audit Rights Periods

  • Access and Use 1. Each Party shall ensure that enterprises of the other Party have access to and use of any public telecommunications network or service, including leased circuits, offered in its territory or across its borders on a timely basis and on terms and conditions that are reasonable and non-discriminatory such as those set out in paragraphs 2 to 6.

  • Maintaining Confidentiality of Access Passwords Where access to the Licensed Materials is to be controlled by use of passwords, Licensee shall secure that Participating Institutions will use reasonable efforts to inform Authorized Users that they should not divulge their numbers and passwords to any third party. Licensee shall secure that Participating Institutions will also use reasonable efforts to maintain the confidentiality of any institutional passwords provided by Licensor.

  • Access and Retention of Records Contractor agrees to provide the department, Legislative Auditor, or their authorized agents, access to any records necessary to determine contract compliance. (Section 18-1-118, MCA). Contractor agrees to create and retain records supporting the services rendered or supplies delivered for a period of eight years after either the completion date of the contract or the conclusion of any claim, litigation, or exception relating to the contract taken by the State of Montana or third party.

  • Additional Access Rights For the avoidance of doubt any grant of Access Rights not covered by the Grant Agreement or this Consortium Agreement shall be at the absolute discretion of the owning Party and subject to such terms and conditions as may be agreed between the owning and receiving Parties.

  • Personal Data, Confidentiality, Recording of Telephone Calls and Records 22.1. The Company may collect client information directly from the Client (in his completed Account Opening Application Form or otherwise) or from other persons including, for example, the credit reference agencies, fraud prevention agencies, banks, other financial institutions, third authentication service providers and the providers of public registers.

  • Ingress and Egress Seller represents that there is ingress and egress to the Real Property and title to 400 the Real Property is insurable in accordance with STANDARD A without exception for lack of legal right of access.

  • Access to PHI Business Associate shall provide access to PHI in a Designated Record Set to Covered Entity or as directed by Covered Entity to an Individual to meet the requirements under 45 CFR § 164.524. Business Associate shall provide such access in the time and manner reasonably designated by Covered Entity. Within three (3) business days, Business Associate shall forward to Covered Entity for handling any request for access to PHI that Business Associate directly receives from an Individual.

Time is Money Join Law Insider Premium to draft better contracts faster.