Access Keys. An Access Key may be pre-installed by Fluidigm. If an Access Key is required, then You shall provide Fluidigm with the appropriate identification codes, as specified by Fluidigm support personnel, to generate an Access Key. The Access Key will be promptly sent to You via e-mail.
Access Keys. Sintak may provide Lessee with keys or security cards to access the Property (“Keys”). Upon termination (or end of the Rental Period), Lessee will immediately return to Sintak all Keys. Lessee agrees to pay Sintak a twenty-five dollar ($25.00) charge for each damaged or non-returned Key.
Access Keys. Within a reasonable period of time after executing this Agreement, Mastercard will issue You one or more access keys, which are required to access the Mastercard Developers Materials and to interface with a Web Service via a Service API. Mastercard may require You to go through an approval process to obtain access keys. You must use the access keys solely for the Permitted Evaluation Purpose and not share the access keys with any third party (except as permitted pursuant to Section 4). You are responsible for any access to or use of Web Services attributable to Your access key. Mastercard has the right to monitor Your use of access keys and access to Web Services to ensure that You are complying with this Agreement. Mastercard may revoke access keys at any time in its sole discretion. /Users/e037202/Desktop/Mastercard Developers - Revised Terms - September 2017.docx
Access Keys. The Authority agrees to develop a written policy regarding access keys or codes to any and all Authority facilities. The Authority will meet and confer with the Union prior to implementation of such policy.
Access Keys. MM shall issue to Licensee two access keys to provide access to the portion of the Marina in which the Slip is located. The access keys shall be surrendered to MM upon termination of this License. Access keys shall remain the property of MM at all times, and MM may revoke the right of Licensee to use the access keys if Licensee is in default under this License. Licensee agrees to notify MM immediately if any access key is lost or stolen. A non-refundable replacement fee of $25 shall be charged for any lost or stolen keys.
Access Keys eBay will provide you with Access Keys that permit you to access eBay’s databases. The Access Keys are the property of eBay and may be revoked if you share them with any third party (other than as allowed under this Agreement), if they are compromised, if you violate any term of this Agreement, or if eBay terminates this Agreement.
Access Keys. The property should be vacated on time and secured. All windows and doors are to be locked. All keys must be returned to the Owner or as otherwise directed. Access will be provided via a key that is located in a lockbox near the red front door. The combination code will be communicated to you a few days prior to your arrival. Keys to open other doors are included inside the house and are to be left in the doors as they were when you arrived. Please ensure all these other doors are locked before exiting via the front door. Please put the front door key back in the lockbox near the front door after you check out. If the keys are lost there will be a charge of $150 to replace (ONE OR ALL). There may also be a need to change the locks and if this is the case then you will be on charged the locksmith’s charge.
Access Keys. Customer may elect to provide Pulsar access to keys, credentials, or passwords (“Keys”) to access Customer’s applications and/or technology infrastructure. By providing Pulsar any such Keys, Customer authorizes Pulsar to use those Keys and to access Customer applications and infrastructure for the purpose of providing services under this Agreement.
Access Keys. Atos Unify will provide Partner with an access key consisting of a user ID and password to access internet based tools and platforms of Atos Unify (e.g. the Partner Portal). Partner shall keep the access key strictly confidential.
Access Keys. Use of the Access Methods and access to the ThreatScape Subscription and the Content by Customer’s End Users is provided through access keys or login credentials. Access keys in association with the Access Methods and ThreatScape Subscription shall be kept in confidence by Customer and Customer’s End Users. Access keys will be issued to individual End Users by iSIGHT in accordance with each particular Access Method’s parameters and will not be shared between End Users. Customer may not establish group accounts. Any unauthorized disclosure or dissemination of access keys by Customer or End Users shall be deemed a material breach of this Agreement. Customer shall inform iSIGHT of any data breach concerning login credentials in a timely manner. iSIGHT reserves the right to change, suspend, remove, or disable Customer’s access keys to the Access Methods, ThreatScape Subscription , and Content upon notice if a material breach is suspected and not rectified upon notification.