Access Rights Policies Sample Clauses

Access Rights Policies. Policies and procedures regarding the granting of access rights to Raytheon Data to permit only the appropriate personnel to create, modify, or cancel the rights of access of the Seller’s employees, agents, and subcontractors. Such policies and procedures must ensure that only designated information asset owners and their delegates may authorize and grant access to Raytheon Data.
AutoNDA by SimpleDocs
Access Rights Policies. Policies and procedures regarding the granting of access rights to Personal Data to permit only the appropriate personnel to create, modify or cancel the rights of access of VMT’s employees, agents and subcontractors. Such policies and procedures must ensure that only designated information asset owners and their delegates may authorize and grant access to Personal Data. Systems or applications that can be used to access Personal Data must have strong passwords. On a monthly basis, VMT shall conduct reviews to ensure compliance with this Section (b)(1)(i).
Access Rights Policies. HappyML shall implement appropriate policies and procedures regarding the granting of access rights to Customer Data in HappyML’s possession or control, in order to ensure that only the personnel expressly authorized pursuant to the terms of the Services Agreement or by Customer in writing may create, modify or cancel the rights of access of the personnel. HappyML shall maintain an accurate and up to date list of all personnel who have access to the Customer Data and shall have the facility to promptly disable access by any individual personnel. For purposes of this Schedule, the term “personnel” as to Customer or HappyML shall mean a Party’s employees, consultants, subcontractor or other agents. HappyML shall use appropriate security measures and procedures (a) to ensure that Customer Data in HappyML’s possession and control, and /or systems being used to provide Services, is protected against the risk of intrusion and the effects of viruses, Trojan horses, worms, and other forms of malware, and (b) to monitor and record each and every instance of access to the HappyML’s assets and information systems and to Customer Data to detect the same, and to promptly respond to the same. If any malicious code is found to have been introduced by HappyML or any third party into any of HappyML’s information systems handling or holding Customer Data, HappyML shall take appropriate measures to prevent any unauthorized access or disclosure of any Customer Data and in any case (wherever the code originated), HappyML shall, at no additional charge to Customer, remove the malicious code and eliminate the effects of the malicious code. If the malicious code causes a loss of operational efficiency or loss of data, HappyML shall monitor the losses and restore lost data in accordance with the terms of the Agreement. Unless, and to the extent, prohibited by law enforcement authorities, HappyML shall immediately notify Customer’s Chief Information Security Officer if it knows or reasonably suspects that there has been an actual instances of unauthorized access to the Customer Data and/or systems holding or handling Customer Data and shall cooperate fully in assisting Customer as necessary to enable Customer to comply with its statutory and other legal breach notice requirements, if any. 1. Implement and maintain appropriate incident response measures and procedures for systems that handle or hold Customer Data
Access Rights Policies. Policies and procedures regarding the granting of access rights to Personal Data to permit only the appropriate personnel to create, modify or cancel the rights of access of MPP’s employees, agents and subcontractors. Such policies and procedures must ensure that only designated information asset owners and their delegates may authorize and grant access to Personal Data. Systems or applications that can be used to access Personal Data must have strong passwords. On a monthly basis, MPP shall conduct reviews to ensure compliance with this Section (b)(1)(i).
Access Rights Policies appropriate policies and procedures regarding the granting of access rights to UBS Data, in order to ensure that only the personnel expressly authorized by UBS in writing may create, modify or cancel the rights of access of the Staff. The Supplier shall maintain an accurate and up to date list of all Staff who have access to the UBS Data and shall have the facility to promptly disable access by any individual Staff.

Related to Access Rights Policies

  • Access Rights Upon reasonable notice and supervision by the Granting Party, and subject to any required or necessary regulatory approvals, either the Connecting Transmission Owner or Developer (“Granting Party”) shall furnish to the other of those two Parties (“Access Party”) at no cost any rights of use, licenses, rights of way and easements with respect to lands owned or controlled by the Granting Party, its agents (if allowed under the applicable agency agreement), or any Affiliate, that are necessary to enable the Access Party to obtain ingress and egress at the Point of Interconnection to construct, operate, maintain, repair, test (or witness testing), inspect, replace or remove facilities and equipment to: (i) interconnect the Large Generating Facility with the New York State Transmission System; (ii) operate and maintain the Large Generating Facility, the Attachment Facilities and the New York State Transmission System; and (iii) disconnect or remove the Access Party’s facilities and equipment upon termination of this Agreement. In exercising such licenses, rights of way and easements, the Access Party shall not unreasonably disrupt or interfere with normal operation of the Granting Party’s business and shall adhere to the safety rules and procedures established in advance, as may be changed from time to time, by the Granting Party and provided to the Access Party. The Access Party shall indemnify the Granting Party against all claims of injury or damage from third parties resulting from the exercise of the access rights provided for herein.

  • Zone File Access Agreement Registry Operator will enter into an agreement with any Internet user, which will allow such user to access an Internet host server or servers designated by Registry Operator and download zone file data. The agreement will be standardized, facilitated and administered by a Centralized Zone Data Access Provider, which may be ICANN or an ICANN designee (the “CZDA Provider”). Registry Operator (optionally through the CZDA Provider) will provide access to zone file data per Section 2.1.3 of this Specification and do so using the file format described in Section 2.1.4 of this Specification. Notwithstanding the foregoing, (a) the CZDA Provider may reject the request for access of any user that does not satisfy the credentialing requirements in Section 2.1.2 below; (b) Registry Operator may reject the request for access of any user that does not provide correct or legitimate credentials under Section 2.1.2 below or where Registry Operator reasonably believes will violate the terms of Section 2.1.5. below; and, (c) Registry Operator may revoke access of any user if Registry Operator has evidence to support that the user has violated the terms of Section 2.1.5 below.

  • Parent Right to Access and Challenge Student Data The LEA shall establish reasonable procedures pursuant to which a parent, as that term is defined in 105 ILCS 10/2(g), may inspect and/or copy Student Data and/or challenge the accuracy, relevance or propriety of Student Data, pursuant to Sections 5 and 7 of ISSRA (105 ILCS 10/5; 105 ILCS 10/7) and Section 33 of SOPPA (105 ILCS 85/33). The Provider shall respond to any request by the LEA for Student Data in the possession of the Provider when Provider cooperation is required to afford a parent an opportunity to inspect and/or copy the Student Data, no later than 5 business days from the date of the request. In the event that a parent contacts the Provider directly to inspect and/or copy Student Data, the Provider shall refer the parent to the LEA, which shall follow the necessary and proper procedures regarding the requested Student Data.

  • Additional Access Rights For the avoidance of doubt any grant of Access Rights not covered by the Grant Agreement or this Consortium Agreement shall be at the absolute discretion of the owning Party and subject to such terms and conditions as may be agreed between the owning and receiving Parties.

  • Claims Made Policies If any of the required policies provide coverage on a claims-made basis: 11.5.1 The Retroactive Date must be shown and must be before the date of the contract or the beginning of contract work. 11.5.2 Insurance must be maintained and evidence of insurance must be provided for at least five (5) years after completion of the contract of work. 11.5.3 If coverage is canceled or non-renewed, and not replaced with another claims-made policy form with a Retroactive Date prior to the contract effective date, the Contractor must purchase “extended reporting” coverage for a minimum of five (5) years after completion of contract work.

  • Access and Records ‌ A. County, the State of California and the United States Government and/or their representatives, shall have access, for purposes of monitoring, auditing, and examining, to Subrecipient’s activities, books, documents and papers (including computer records and emails) and to records of Subrecipient’s subcontractors, consultants, contracted employees, bookkeepers, accountants, employees and participants related to this Contract. Subrecipient shall insert this condition in each Contract between Subrecipient and a subcontractor that is pursuant to this Contract shall require the subcontractor to agree to this condition. Such departments or representatives shall have the right to make excerpts, transcripts and photocopies of such records and to schedule on site monitoring at their discretion. Monitoring activities also may include, but are not limited to, questioning employees and participants and entering any premises or onto any site in which any of the services or activities funded hereunder are conducted or in which any of the records of Subrecipient are kept. Subrecipient shall make available its books, documents, papers, financial records, etc., within three (3) days after receipt of written demand by Director which shall be deemed received upon date of sending. In the event Subrecipient does not make the above referenced documents available within the County of Orange, California, Subrecipient agrees to pay all necessary and reasonable expenses incurred by County, or County’s designee, in conducting any audit at the location where said records and books of account are maintained.

  • Collateral Access Agreements Such Grantor shall use commercially reasonable efforts to obtain a Collateral Access Agreement, from the lessor of each leased property, mortgagee of owned property or bailee or consignee with respect to the operator of any warehouse, processor or converter facility or other location (each of which is identified on Exhibit B hereto), where Collateral in excess of $1,000,000 is stored or located at any given time (other than (i) company-owned facilities and (ii) retail stores), which agreement or letter shall provide access rights, contain a waiver or subordination of all Liens or claims that the landlord, mortgagee, bailee or consignee may assert against the Collateral at that location, and shall otherwise be reasonably satisfactory in form and substance to the Administrative Agent. With respect to such locations or warehouse space leased as of the Effective Date and thereafter where Collateral in excess of $1,000,000 is stored or located (other than (i) company-owned facilities and (ii) retail stores), if the Administrative Agent has not received a Collateral Access Agreement as of the Effective Date (or, if later as of the date such location is acquired or leased), the Borrower’s Eligible Inventory at that location shall be subject to such Reserves as may be established by the Administrative Agent. After the Effective Date, no real property or warehouse space shall be leased by such Grantor (other than retail stores) and no Inventory shall be shipped to a processor or converter under arrangements established after the Effective Date, unless and until a satisfactory Collateral Access Agreement shall first have been obtained with respect to such location or if it has not been obtained, the Borrower’s Eligible Inventory at that location shall be subject to the establishment of Reserves acceptable to the Administrative Agent. Such Grantor shall timely and fully pay and perform its obligations under all leases and other agreements with respect to each leased location or third party warehouse where any Collateral is or may be located.

  • Violence Policies and Procedures The Employer agrees to have in place explicit policies and procedures to deal with violence. The policy will address the prevention of violence, the management of violent situations, provision of legal counsel and support to employees who have faced violence. The policies and procedures shall be part of the employee's health and safety policy and written copies shall be provided to each employee. Prior to implementing any changes to these policies, the employer agrees to consult with the Association.

  • SPAM POLICY You are strictly prohibited from using the Website or any of the Company's Services for illegal spam activities, including gathering email addresses and personal information from others or sending any mass commercial emails.

  • Compliance Policies and Procedures To assist the Fund in complying with Rule 38a-1 of the 1940 Act, BBH&Co. represents that it has adopted written policies and procedures reasonably designed to prevent violation of the federal securities laws in fulfilling its obligations under the Agreement and that it has in place a compliance program to monitor its compliance with those policies and procedures. BBH&Co will upon request provide the Fund with information about our compliance program as mutually agreed.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!