Access to Client Data Sample Clauses

Access to Client Data. Client agrees that the Client Data belongs solely to the Client entity, not any particular individual owner, member, or employee of Client. Upon a request for access to or a copy of the Client Data, FOCUSIT will make Client Data available to Client for electronic retrieval and/or provide a copy of Client Data to, in FOCUSIT’s sole discretion: (a) the Client Contact; (b) a CRM super user; (c) the CEO, President, or Manager of Client; or (d) the Calyx PointCentral software license owner. In the event of a Client disagreement regarding the Client Data, and only upon prompt notification to FOCUSIT of such disagreement, FOCUSIT will freeze and archive the Client Data and only make the Client Data available only in accordance with a court order or a fully executed settlement agreement. FOCUSIT reserves the right to hold Client Content and any other Client data pending final payment from Client. Once account is current, FOCUSIT will provide Client all of the Client Content via a secure download or on a Client provided media.
AutoNDA by SimpleDocs
Access to Client Data. Upon written request by Client made prior to any expiration or termination of this Agreement, SpryPoint will make Client Data available to Client through the Service solely for purposes of Client retrieving Client Data for a period of up to sixty (60) days. After sixty (60) days, SpryPoint will have no obligation to maintain or provide any Client Data and shall thereafter, unless legally prohibited, delete all Client Data and will have no further obligation to make it available to Client.
Access to Client Data. 12.1 The Client acknowledges that the Professional and the Authorised Users may have access to Client Data when using the Electronic Services. The Professional and the Authorised Users however acknowledge that, for confidentiality purposes, certain Information or documents provided via the Electronic Services may not contain Client Data. 12.2 The Bank reserves the right to impose contractual or technical restrictions on the access to Client Data via the Electronic Services at any time and notably where such restrictions are required to comply with Regulatory Requirements. Restrictions on access to Client Data will be processed as a change to services in accordance with Clause 24.1 of these General Conditions. 12.3 To protect the confidentiality of Client Data, Authorised Users using the Electronic Services in relation to Accounts that are not held by the Professional shall not use eKBL Pro and eKBL via the eKBL Site outside of the Professional’s premises, whether such premises form the Professional’s head office or a permanent establishment (hereinafter, the Premises). 12.4 By way of exception, use of eKBL Pro outside of the Premises may be granted to Authorised Users managing and administering Accounts that are not held by the Professional provided that it has been expressly requested and specified in the Access Creation Form and/or the Access Renewal Form or, where appropriate, in the Access Modification Form and provided that it has been accepted by the Bank. In case such use is accepted by the Bank: (a) the latter will technically restrict the access to Client Data on eKBL Pro for the Authorised Users concerned and (b) the Authorised Users concerned agree not to print documents containing Client Data via eKBL Pro outside of the Premises.
Access to Client Data. During the Subscription Term, Authorized Users may use standard functionality within the JAGGAER Applications to extract Client Data in accordance with then-current, published JAGGAER specifications. For a period of thirty (30) days following termination or expiration of a Subscription (the “Retrieval Period”), Authorized Users may access the JAGGAER Applications solely for the purpose of extracting Client Data. If requested in writing by Client, during the Subscription Term and the Retrieval Period, JAGGAER will perform such data extraction from the JAGGAER Applications for Client, under a mutually agreed Statement of Work. After the Retrieval Period, Client will have no further access to Client Data in the JAGGAER Applications, JAGGAER shall have no further obligation to make Client Data available to Client, and subject to applicable law, JAGGAER may delete Client Data in the JAGGAER Applications.

Related to Access to Client Data

  • Client Data The Subrecipient shall maintain client data demonstrating client eligibility for services provided. Such data shall include, but not be limited to, client name, address, income level or other basis for determining eligibility, and description of service provided. Such information shall be made available to Grantee monitors or their designees for review upon request.

  • Customer Data 6.1 The Customer shall own all right, title and interest in and to all of the Customer Data and shall have sole responsibility for the legality, reliability, integrity, accuracy and quality of the Customer Data. 6.2 Where the Customer stores the Customer Data on its own systems, the Customer shall follow its own back-up procedures for such Customer Data and Protean shall have no responsibility for any loss, destruction, alteration or disclosure of Customer Data that is held on the Customer’s own systems. 6.3 Where Protean is hosting the Customer Data, Protean shall follow its back-up procedures for Customer Data (details of which are available on request from Protean) or such other website address as may be notified to the Customer from time to time, as such procedures may be amended by Protean in its sole discretion from time to time. In the event of any loss or damage to Customer Data, the Customer’s sole and exclusive remedy shall be for Protean to use reasonable commercial endeavours to restore the lost or damaged Customer Data from the latest back-up of such Customer Data maintained by Protean in accordance with the back-up procedure described above. Protean shall not be responsible for any loss, destruction, alteration or disclosure of Customer Data caused by any third party (except those third parties sub-contracted by Protean to perform services related to Customer Data maintenance and back-up). 6.4 Protean shall, in supplying the Software to the Customer comply with its Privacy and Security Policy relating to the privacy and security of the Customer Data available on request to the Customer and on such website address as may be notified to the Customer from time to time, as such document may be amended from time to time by Protean in its sole discretion. 6.5 If Protean processes any personal data on the Customer’s behalf when performing its obligations under this agreement, the parties record their intention that the Customer shall be the data controller and Protean shall be a data processor and in any such case: 6.5.1 the Customer acknowledges and agrees that the personal data may be transferred or stored outside the EEA or the country where the Customer and the Authorised Users are located in order to carry out the Cloud Service and Xxxxxxx’s other obligations under this agreement; 6.5.2 the Customer shall ensure that the Customer is entitled to transfer the relevant personal data to Protean so that Protean may lawfully use, process and transfer the personal data in accordance with this agreement on the Customer’s behalf; 6.5.3 the Customer shall ensure that the relevant third parties have been informed of, and have given their consent to, such use, processing, and transfer as required by all applicable data protection legislation; 6.5.4 Protean shall process the personal data only in accordance with the terms of this agreement and any lawful instructions reasonably given by the Customer from time to time; and 6.5.5 each party shall take appropriate technical and organisational measures against unauthorised or unlawful processing of the personal data or its accidental loss, destruction or damage. 6.6 Without prejudice to clause 4.2, the Customer acknowledges and agrees that: 6.6.1 Protean is reliant upon third party providers in order to supply the Cloud Service; and 6.6.2 Protean shall have no liability to the Customer for any loss (including any loss arising from the loss or misuse of Customer Data) to the Customer which is caused by an act or omission of such third party providers. 6.7 The Customer acknowledges and agrees that when using the Software: 6.7.1 it is able to integrate with third party software (such as accounting software) in order to submit and exchange Customer Data; and 6.7.2 it shall indemnify Protean for any claim against Protean by such third party software suppliers arising from the Customer’s submission and exchange of Customer Data pursuant to clause 6.7.1. 6.8 The Customer hereby gives consent to Protean to allow Protean to collate and use its Customer Data for Protean’s own marketing and other commercial purposes, provided that such Customer Data is anonymised by Protean prior to its use, and such use is subject to Protean’s obligations of confidentiality under clause 11.

  • Access to NID 2.7.3.1 NewPhone may access the customer’s premises wiring by any of the following means and NewPhone shall not disturb the existing form of electrical protection and shall maintain the physical integrity of the NID: 2.7.3.1.1 BellSouth shall allow NewPhone to connect its Loops directly to BellSouth’s multi-line residential NID enclosures that have additional space and are not used by BellSouth or any other telecommunications carriers to provide service to the premises; 2.7.3.1.2 Where an adequate length of the customer’s premises wiring is present and environmental conditions permit, either Party may remove the customer premises wiring from the other Party’s NID and connect such wiring to that Party’s own NID; 2.7.3.1.3 Either Party may enter the subscriber access chamber or dual chamber NID enclosures for the purpose of extending a cross-connect or spliced jumper wire from the customer premises wiring through a suitable “punch-out” hole of such NID enclosures; or 2.7.3.1.4 NewPhone may request BellSouth to make other rearrangements to the customer premises wiring terminations or terminal enclosure on a time and materials cost basis. 2.7.3.2 In no case shall either Party remove or disconnect the other Party’s loop facilities from either Party’s NIDs, enclosures, or protectors unless the applicable Commission has expressly permitted the same and the disconnecting Party provides prior notice to the other Party. In such cases, it shall be the responsibility of the Party disconnecting loop facilities to leave undisturbed the existing form of electrical protection and to maintain the physical integrity of the NID. It will be NewPhone’s responsibility to ensure there is no safety hazard, and NewPhone will hold BellSouth harmless for any liability associated with the removal of the BellSouth Loop from the BellSouth NID. Furthermore, it shall be the responsibility of the disconnecting Party, once the other Party’s loop has been disconnected from the NID, to reconnect the disconnected loop to a nationally recognized testing laboratory listed station protector, which has been grounded as per Article 800 of the National Electrical Code. If no spare station protector exists in the NID, the disconnected loop must be appropriately cleared, capped and stored. 2.7.3.3 NewPhone shall not remove or disconnect ground wires from BellSouth’s NIDs, enclosures, or protectors. 2.7.3.4 NewPhone shall not remove or disconnect NID modules, protectors, or terminals from BellSouth’s NID enclosures. 2.7.3.5 Due to the wide variety of NID enclosures and outside plant environments, BellSouth will work with NewPhone to develop specific procedures to establish the most effective means of implementing this section if the procedures set forth herein do not apply to the NID in question.

  • Protection of Customer Data The Supplier shall not delete or remove any proprietary notices contained within or relating to the Customer Data. The Supplier shall not store, copy, disclose, or use the Customer Data except as necessary for the performance by the Supplier of its obligations under this Call Off Contract or as otherwise Approved by the Customer. To the extent that the Customer Data is held and/or Processed by the Supplier, the Supplier shall supply that Customer Data to the Customer as requested by the Customer and in the format (if any) specified by the Customer in the Call Off Order Form and, in any event, as specified by the Customer from time to time in writing. The Supplier shall take responsibility for preserving the integrity of Customer Data and preventing the corruption or loss of Customer Data. The Supplier shall perform secure back-ups of all Customer Data and shall ensure that up-to-date back-ups are stored off-site at an Approved location in accordance with any BCDR Plan or otherwise. The Supplier shall ensure that such back-ups are available to the Customer (or to such other person as the Customer may direct) at all times upon request and are delivered to the Customer at no less than six (6) Monthly intervals (or such other intervals as may be agreed in writing between the Parties). The Supplier shall ensure that any system on which the Supplier holds any Customer Data, including back-up data, is a secure system that complies with the Security Policy and the Security Management Plan (if any). If at any time the Supplier suspects or has reason to believe that the Customer Data is corrupted, lost or sufficiently degraded in any way for any reason, then the Supplier shall notify the Customer immediately and inform the Customer of the remedial action the Supplier proposes to take. If the Customer Data is corrupted, lost or sufficiently degraded as a result of a Default so as to be unusable, the Supplier may: require the Supplier (at the Supplier's expense) to restore or procure the restoration of Customer Data to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer, and the Supplier shall do so as soon as practicable but not later than five (5) Working Days from the date of receipt of the Customer’s notice; and/or itself restore or procure the restoration of Customer Data, and shall be repaid by the Supplier any reasonable expenses incurred in doing so to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!