Common use of Access by and Authentication of Authorized Users Clause in Contracts

Access by and Authentication of Authorized Users. Licensee and its Authorized Users shall be granted access to the Licensed Materials pursuant to the following: {Include all that apply; delete those that do not:} IP Addresses. Authorized Users shall be identified and authenticated by the use of Internet Protocol ("IP") addresses provided by Licensee to Licensor. Passwords. Authorized Users shall be identified and authenticated by the use of usernames and passwords assigned by Licensee. Licensee shall be responsible for issuing and terminating passwords, verifying the status of Authorized Users, providing lists of valid passwords to Licensor and updating such lists on a regular basis. Public keys/Certificates. Authorized Users shall be identified and authenticated by means of public-key and X.509 certificates. Developing Protocols. Authorized Users shall be identified and authenticated by such means and protocols as may be developed during the term of this Agreement.

Appears in 3 contracts

Samples: License Agreement, License Agreement, License Agreement

AutoNDA by SimpleDocs

Access by and Authentication of Authorized Users. Licensee and its Authorized Users shall may also be granted access to the Licensed Materials pursuant to the following: {Include all that apply; delete those that do not:} IP AddressesAddress. Authorized Users shall be identified and authenticated by the use of Internet Protocol ("IP") addresses provided by Licensee to Licensor. PasswordsPassword. Authorized Users shall be identified and authenticated by the use of usernames and passwords assigned by Licensee. Licensee shall be responsible for issuing and terminating passwords, verifying the status of Authorized Users, providing lists of valid passwords to Licensor and updating such lists on a regular basis. Public keys/Certificates. Authorized Users shall be identified and authenticated by means of public-key and X.509 certificates. Developing Protocols. Authorized Users shall be identified and authenticated by such means and protocols as may be developed during the term of this Agreement.

Appears in 1 contract

Samples: Voicetoons ™ License Agreement

Access by and Authentication of Authorized Users. Licensee and its Authorized Users shall be granted access to the Licensed Materials pursuant to the following: {Include all that apply; delete those that do not:} IP Addresses. Authorized Users shall be identified and authenticated by the use of Internet Protocol ("IP") addresses provided by Licensee Licensor to LicensorLicensee. Passwords. Authorized Users shall be identified and authenticated by the use of usernames and passwords assigned by Licensee. Licensee shall be responsible for issuing and terminating passwords, verifying the status of Authorized Users, providing lists of valid passwords to Licensor and updating such lists on a regular basis. Public keys/Certificates. Authorized Users shall be identified and authenticated by means of public-key and X.509 certificatesand/or registered email address. Developing Protocols. Authorized Users shall be identified and authenticated by such means and protocols as may be developed during the term of this Agreement.

Appears in 1 contract

Samples: Standard License Agreement

AutoNDA by SimpleDocs

Access by and Authentication of Authorized Users. Licensee and its Authorized Users shall be granted access to the Licensed Materials pursuant to the following: {Include all that apply; delete those that do not:} IP Addresses. Authorized Users shall be identified and authenticated by the use of Internet Protocol ("IP") addresses provided by Licensee to Licensor. Passwords. Authorized Users shall be identified and authenticated by the use of usernames and passwords assigned by Licensee. Licensee shall be responsible for issuing and terminating passwords, verifying the status of Authorized Users, providing lists of valid passwords to Licensor and updating such lists on a regular basis. Public keys/Certificates. Authorized Users shall be identified and authenticated by means of public-key and X.509 certificates. Developing Protocols. Authorized Users shall be identified and authenticated by such means and protocols as may be developed during the term of this Agreement.

Appears in 1 contract

Samples: Standard License Agreement

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!