Access to Applications Sample Clauses

Access to Applications. Upon written request, You shall provide to UPS, at the election of UPS, access to or a copy of the Application (and/or any Update thereto) and the URL for each location of the Application on the Internet (if the Application is used or made available through the Internet) for the purpose of determining the Application’s compliance with the terms of this Agreement, including without limitation, API Technical Documentation. UPS may suspend access to the UPS Developer Kit API(s) without notice if it reasonably believes an Application is in violation of this Agreement.
AutoNDA by SimpleDocs
Access to Applications. Providing Mersana with access to any applications for Regulatory Approval proposed to be made to or with a Regulatory Authority with respect to a Licensed Product reasonably in advance of filing such applications; and
Access to Applications. Customer agrees to make the Applications to be Assessed available to Veracode in accordance with Veracode’s submission specifications. Each Application shall be provided in a form mutually agreed to by the parties, including, but not limited to, executable object code form (unless the particular Application is only deployed in source, in which case Customer will provide source) or, in the case of a web Application, by providing the URL. Customer is responsible for providing the systems, servers, software and network and communications necessary to connect to and utilize the Solution.
Access to Applications. ATSA will provide to Mersana copies of all Regulatory Documentation related to the Mersana Technology reasonably in advance of such filing or major submission to Regulatory Authorities for Xxxxxxx to have a reasonable opportunity to review such filing or submission (and in any event at least [**] in advance). Xxxxxxx will provide comments on such proposed Regulatory Documentation, if any, to ATSA as soon as practicable following receipt thereof, and ATSA will consider in good faith any timely comments provided by Xxxxxxx. ATSA will provide Mersana final copies of such Regulatory Documentation following such filing or submission to Regulatory Authorities.
Access to Applications applications may include offers for digital products intended for access or use in an application, such as additional or enhanced functions, media content, or shared access to content or services. In-app products available through the services of Bonti are provided by the programmer, who determines whether they are available free of charge or for a fee. In-app programs or products are sold to you by the programmer. When you complete a purchase using the services of Bonti, Bonti acts as an authorized commercial representative of the developer to complete the sale of the application or product within the program. Bonti is not a party to your contract and is not responsible for any payment transactions or purchases you make through in-app transactions. After purchasing an in-app product, we’ll help you download it (if any) and access it quickly to make sure you get it. If you are unable to complete the download or access an in-app product, please contact Bonti Customer Service for assistance. You are responsible for completing the download (if any) and all risks of loss after downloading or accessing the app or product within the app, including any loss due to malfunction of the mobile device. The developer of an application may provide an end-user license agreement with any application. Bonti is not responsible for any compliance or non-compliance by you or the developer under the Developer End User License Agreement. If the developer does not make the Developer End User License Agreement available, the following constitutes the entire End User License Agreement between the developer and you: If the application does not include an end-user license agreement that sets out the license rights, the developer issues a limited, nontransferable license to the end user to download and use the program only for personal and non-commercial purposes. You cannot modify the application, reverse engineer, disassemble the program in whole or in part, create derivative works, or grant any rights in the program under any license unless expressly granted by the developer. Another license has been issued in writing. The application is protected by copyright and other intellectual property laws and treaties. Unless explicitly stated in the developer’s end-user license agreement, the developer or licensors own the entire title, copyright, and other intellectual property rights in the program, and the program is licensed. The end user agrees that Xxxxx has no responsibility or lia...
Access to Applications. One or more software programmes (including extensions, media, and Services that are enclosed in a single software bundle) provisioned by the Licensee in compliance with the terms of this License (collectively and individually, “Applications”) for distribution on Apple App Store and Google Play, as applicable, under the Licensor’s own trading name (individually, “Built with Appy Hive”) , and for specific use with the AppyHive Platform.
Access to Applications. 12.1 In order to carry out our services we may require access to certain applications that you use to run your business (Applications). This access will generally be provided by the way of: (a) a username and password; and/or (b) access to the Application’s relevant application programming interface (API) collectively known as ‘Credentials’. 12.2 By providing us the Credentials you acknowledge and agree that: (a) you are responsible for obtaining and providing us with adequate permissions to access the information we require to carry out our services, and you are solely responsible for ensuring that you maintain necessary security parameters around such access (eg. ensuring that access to areas of the Application that we do not require is not provided); (b) should you grant permission or access in excess of those we require to deliver the services we are engaged to provide, we are not responsible for changes made to the Application or errors or issues arising as a result of or related to such additional permission or access; (c) you are responsible for enabling and maintaining all security measures within the Applications that mitigate unauthorised access (eg. two factor authentication, password protection, limited number of users etc); (d) we may share the Credentials amongst employees of mi-fi for the purposes of carrying out our services; (e) mi-fi is not responsible for monitoring or maintaining access of individuals to your Applications other than employees of mi-fi; (f) other than losses arising directly from unauthorised access obtained through the Credentials assigned to us and only if such Credentials were inadequately secured by us, mi-fi is in no way liable for loss or damage incurred by you as a result of any unauthorised access to or use of the Application; (g) you are responsible for maintaining security of the Application; (h) you are responsible for revoking access to the Application when it is no longer required for the services we have been engaged to provide. Access is deemed to be no longer required upon disengagement or when otherwise advised by mi-fi. (i) when access is no longer required by mi-fi in accordance with the preceding item, mi-fi is no longer responsible for maintaining security of the Credentials and, on and from disengagement or notice by mi-fi, you release us from any liability in relation to those Credentials you have previously provided. 12.3 For the avoidance of doubt mi-fi will never request access to online banking...
AutoNDA by SimpleDocs
Access to Applications. 2.2.1. The Applications available with the Service are available from 4net upon request and subject to update from time to time. 2.2.2. 4net will provide all Applications in English and all of the user interfaces and reports will be labelled in English. 2.2.3. The Service supports the integration of Customer or 3rd party owned applications via the application programming interfaces (API)s with further information availbale from 4net upon request. 2.2.4. 4net will provide information describing how to use the API features of the Service, including best practice application development. 2.2.5. Where applicable, The Service will store recorded calls for 30 days after which the Customer will be responsible for providing and managing storage for call recordings. Alternatively, additional storage may be purchasd from 4net..

Related to Access to Applications

  • Access to NID 2.7.3.1 NewPhone may access the customer’s premises wiring by any of the following means and NewPhone shall not disturb the existing form of electrical protection and shall maintain the physical integrity of the NID: 2.7.3.1.1 BellSouth shall allow NewPhone to connect its Loops directly to BellSouth’s multi-line residential NID enclosures that have additional space and are not used by BellSouth or any other telecommunications carriers to provide service to the premises; 2.7.3.1.2 Where an adequate length of the customer’s premises wiring is present and environmental conditions permit, either Party may remove the customer premises wiring from the other Party’s NID and connect such wiring to that Party’s own NID; 2.7.3.1.3 Either Party may enter the subscriber access chamber or dual chamber NID enclosures for the purpose of extending a cross-connect or spliced jumper wire from the customer premises wiring through a suitable “punch-out” hole of such NID enclosures; or 2.7.3.1.4 NewPhone may request BellSouth to make other rearrangements to the customer premises wiring terminations or terminal enclosure on a time and materials cost basis. 2.7.3.2 In no case shall either Party remove or disconnect the other Party’s loop facilities from either Party’s NIDs, enclosures, or protectors unless the applicable Commission has expressly permitted the same and the disconnecting Party provides prior notice to the other Party. In such cases, it shall be the responsibility of the Party disconnecting loop facilities to leave undisturbed the existing form of electrical protection and to maintain the physical integrity of the NID. It will be NewPhone’s responsibility to ensure there is no safety hazard, and NewPhone will hold BellSouth harmless for any liability associated with the removal of the BellSouth Loop from the BellSouth NID. Furthermore, it shall be the responsibility of the disconnecting Party, once the other Party’s loop has been disconnected from the NID, to reconnect the disconnected loop to a nationally recognized testing laboratory listed station protector, which has been grounded as per Article 800 of the National Electrical Code. If no spare station protector exists in the NID, the disconnected loop must be appropriately cleared, capped and stored. 2.7.3.3 NewPhone shall not remove or disconnect ground wires from BellSouth’s NIDs, enclosures, or protectors. 2.7.3.4 NewPhone shall not remove or disconnect NID modules, protectors, or terminals from BellSouth’s NID enclosures. 2.7.3.5 Due to the wide variety of NID enclosures and outside plant environments, BellSouth will work with NewPhone to develop specific procedures to establish the most effective means of implementing this section if the procedures set forth herein do not apply to the NID in question.

  • Access to Services Subject to and in accordance with the terms of this Agreement, including any Schedules, Company grants You a non-exclusive, non-sublicensable, nontransferable, non-assignable, revocable license for the term of this Agreement to access and use the Services. Services may only be used by Your Users for internal business purposes only. You agree to comply with the terms and conditions of this Agreement, including any Schedules, and with all applicable Company procedures and policies that further define use of the Services. You acknowledge and agree that the actions of any of Your Users with respect to the Services will be deemed to be actions by You and that any breach by any of Your Users of the terms of this Agreement, including any Schedule, will be deemed to be a breach by You.

  • Mobile Application If Red Hat offers products and services through applications available on your wireless or other mobile Device (such as a mobile phone) (the "Mobile Application Services"), these Mobile Application Services are governed by the applicable additional terms governing such Mobile Application Service. Red Hat does not charge for these Mobile Application Services unless otherwise provided in the applicable additional terms. However, your wireless carrier's standard messaging rates and other messaging, data and other rates and charges will apply to certain Mobile Application Services. You should check with your carrier to find out what plans your carrier offers and how much the plans cost. In addition, the use or availability of certain Mobile Application Services may be prohibited or restricted by your wireless carrier, and not all Mobile Application Services may work with all wireless carriers or Devices. Therefore, you should check with your wireless carrier to find out if the Mobile Application Services are available for your wireless Device, and what restrictions, if any, may be applicable to your use of such Mobile Application Services.

  • Access to PHI Business Associate shall provide access to PHI in a Designated Record Set to Covered Entity or as directed by Covered Entity to an Individual to meet the requirements under 45 CFR § 164.524. Business Associate shall provide such access in the time and manner reasonably designated by Covered Entity. Within three (3) business days, Business Associate shall forward to Covered Entity for handling any request for access to PHI that Business Associate directly receives from an Individual.

  • General Application The rules set forth below in this Article VI shall apply for the purposes of determining each Member’s allocable share of the items of income, gain, loss and expense of the Company comprising Net Income or Net Loss for each Fiscal Year, determining special allocations of other items of income, gain, loss and expense, and adjusting the balance of each Member’s Capital Account to reflect the aforementioned general and special allocations. For each Fiscal Year, the special allocations in Section 6.03 hereof shall be made immediately prior to the general allocations of Section 6.02 hereof.

  • Scope of Application Except as otherwise provided in this Agreement, the dispute settlement provisions of this Chapter shall apply with respect to the settlement of all disputes between the Parties regarding the interpretation or application of this Agreement, whenever a Party considers that the other Party has failed to carry out its obligations under this Agreement.

  • ACCESS TO SECURITY LOGS AND REPORTS Upon request, the Contractor shall provide access to security logs and reports to the State or Authorized User in a format as specified in the Authorized User Agreement.

  • Obligation to Provide Public Access to Grant Records The Division reserves the right to unilaterally cancel this Agreement in the event that the Grantee refuses public access to all documents or other materials made or received by the Grantee that are subject to the provisions of Chapter 119, Florida Statutes, known as the Florida Public Records Act. The Grantee must immediately contact the Division's Contract Manager for assistance if it receives a public records request related to this Agreement.

  • Access to Personnel File Each employee shall have reasonable access to his/her personnel file for the purpose of reviewing any evaluations or formal disciplinary notations contained therein, in the presence of the Director of Personnel or designate. An employee has the right to request copies of any evaluations in this file.

  • Access to Work District representatives shall at all times have access to the Work, wherever it is, in preparation or in progress. Contractor shall provide safe and proper facilities for such access.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!