Access to Computer System Sample Clauses

Access to Computer System. Subject to the provisions of this Agreement, BCBSMS will allow PHARMACY controlled access to the PHARMACY myBlue Pharmacy portal (also referred to as “myBlue”), to conduct activities for subscribers and their enrolled dependents covered under a health benefit plan. Such activities include, but are not limited to, viewing Disease Specific Drug Prior Authorization. For purposes of this Agreement, Benefit Plan means any health benefit plan issued or administered by BCBSMS, entitling subscribers and their covered dependents to receive healthcare and wellness benefits as defined in the Benefit Plan. PHARMACY’s access to BCBSMS’ computer system shall be limited to Benefit Plans designated by BCBSMS.
Access to Computer System. For a transitional period after Closing not exceeding three months following the Closing Date, Seller shall grant to the Partnership viewer access to the Seller's AS 400 computer system in relation to the Business, free of charge and otherwise on terms and conditions acceptable to Seller, acting reasonably, provided that Seller shall not have any liability whatsoever to the Purchaser or the Partnership as a result of or in relation to the Seller granting such access to the Partnership or the Partnership accessing such system.
Access to Computer System. Subject to the provisions of this Agreement, BCBSMS will allow PROVIDER controlled access to the myBlue Provider portal (also referred to as “myBlue”), to conduct activities for subscribers and their enrolled dependents covered under a health benefit plan. Such activities include, but are not limited to, member eligibility and benefits inquiry, claim status inquiry, and viewing vouchers and medical policy. For purposes of this Agreement, Benefit Plan means any health benefit plan issued or administered by BCBSMS, entitling subscribers and their covered dependents to receive healthcare and wellness benefits, as defined in the Benefit Plan. PROVIDER’s access to BCBSMS’ computer system shall be limited to Benefit Plans designated by BCBSMS.
Access to Computer System. Access to Computer System -- Upon expiration or termination of this Agreement, UCAR shall have access, as reasonably required by UCAR, to the CGI Site to effect the transfer of its Data to an alternate site at UCAR's cost. If such termination is the result of CGI exercising its right according to Section 11.2 hereof, such access by UCAR shall be granted by CGI upon payment to CGI of any fees due and unpaid at the time of termination, plus the fees, if any, due under Section 11.9. UCAR may elect to repurchase the Computer System (other than those tangible assets addressed in Section 11.9 which are addressed in such Sections) upon any such termination or expiration by delivering written notice to CGI within 60 days after the date of termination or expiration and CGI shall sell the Computer System to UCAR in the event of such election. The purchase price of the Computer System shall be CGI's net book value of the Computer System, which shall be reported to UCAR within 30 days of UCAR's election. UCAR may revoke its election following receipt of the net book value. If UCAR does not revoke its election to purchase the Computer System the purchase price shall be paid within 30 days of the date the net book value is delivered and CGI shall render reasonable assistance to facilitate the transfer or removal of all or any part of the Computer System by UCAR after such purchase.

Related to Access to Computer System

  • COMMERCIAL COMPUTER SOFTWARE If performance involves acquisition of existing computer software, the following Company Exhibit is incorporated by reference: CCS Commercial Computer Software License (Company – July 2010).

  • Computer Systems (a) Servicer to operate systems (b) Servicer to maintain back-up facilities (c) Servicer to notify location of computer tapes

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes. 11.2 We may (i) compile statistical and other information related to the performance, operation and use of the Services, and (ii) use data from the Services in aggregated form for security and operations management, to create statistical analyses, and for research and development purposes (clauses i and ii are collectively referred to as “Service Analyses”). We may make Service Analyses publicly available; however, Service Analyses will not incorporate Your Content, Personal Data or Confidential Information in a form that could serve to identify You or any individual. We retain all intellectual property rights in Service Analyses. 11.3 We may provide You with the ability to obtain certain Oracle Software (as defined below) for use with the Services. If we provide Oracle Software to You and do not specify separate terms for such software, then such Oracle Software is provided as part of the Services and You have the non-exclusive, worldwide, limited right to use such Oracle Software, subject to the terms of this Agreement and Your order (except for separately licensed elements of the Oracle Software, which separately licensed elements are governed by the applicable separate terms), solely to facilitate Your use of the Services. You may allow Your Users to use the Oracle Software for this purpose, and You are responsible for their compliance with the license terms. Your right to use any Oracle Software will terminate upon the earlier of our notice (by web posting or otherwise) or the end of the Services associated with the Oracle Software. Notwithstanding the foregoing, if Oracle Software is licensed to You under separate terms, then Your use of such software is governed by the separate terms. Your right to use any part of the Oracle Software that is licensed under the separate terms is not restricted in any way by this Agreement.

  • Computer Software The Grantee certifies that it has appropriate systems and controls in place to ensure that state funds will not be used in the performance of this Grant Agreement for the acquisition, operation, or maintenance of computer software in violation of copyright laws.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Records Maintenance; Access Contractor shall maintain all financial records relating to this Contract in accordance with generally accepted accounting principles. In addition, Contractor shall maintain any other records, books, documents, papers, plans, records of shipments and payments and writings of Contractor, whether in paper, electronic or other form, that are pertinent to this Contract (“Records”) in such a manner as to clearly document Contractor's performance. Contractor acknowledges and agrees that Agency and the Oregon Secretary of State's Office and the federal government and their duly authorized representatives will have access to such financial records and other Records that are pertinent to this Contract, whether in paper, electronic or other form, to perform examinations and audits and make excerpts and transcripts. Contractor shall retain and keep accessible all such financial records and other Records for a minimum of 6 years, or such longer period as may be required by applicable law, following final payment and termination of this Contract, or until the conclusion of any audit, controversy or litigation arising out of or related to this Contract, whichever date is later.

  • Use of Interconnection Facilities by Third Parties 494950 9.9.1 Purpose of Interconnection Facilities 494950 9.9.2 Third Party Users. 50 9.10 Disturbance Analysis Data Exchange. 50 ARTICLE 10. MAINTENANCE 50 10.1 Participating TO Obligations. 50 10.2 Interconnection Customer Obligations. 50 10.3 Coordination 505051

  • Technology Access Contractor expressly acknowledges that state funds may not be expended in connection with the purchase of an automated information system unless that system meets certain statutory requirements relating to accessibility by persons with visual impairments. Accordingly, Contractor represents and warrants to System Agency that the technology provided to System Agency for purchase (if applicable under this Contract or any related Solicitation) is capable, either by virtue of features included within the technology or because it is readily adaptable by use with other technology, of: • providing equivalent access for effective use by both visual and non-visual means; • presenting information, including prompts used for interactive communications, in formats intended for non-visual use; and • being integrated into networks for obtaining, retrieving, and disseminating information used by individuals who are not blind or visually impaired. For purposes of this Section, the phrase “equivalent access” means a substantially similar ability to communicate with or make use of the technology, either directly by features incorporated within the technology or by other reasonable means such as assistive devices or services which would constitute reasonable accommodations under the Americans With Disabilities Act or similar state or federal laws. Examples of methods by which equivalent access may be provided include, but are not limited to, keyboard alternatives to mouse commands and other means of navigating graphical displays, and customizable display appearance. In accordance with Section 2157.005 of the Texas Government Code, the Technology Access Clause contract provision remains in effect for any contract entered into before September 1, 2006.

  • Device Data We may share certain personal information and device-identifying technical data about you and your devices with third party service providers, who will compare and add device data and fraud data from and about you to a database of similar device and fraud information in order to provide fraud management and prevention services, which include but are not limited to identifying and blocking access to the applicable service or Web site by devices associated with fraudulent or abusive activity. Such information may be used by us and our third party service providers to provide similar fraud management and prevention services for services or Web sites not provided by us. We will not share with service providers any information that personally identifies the user of the applicable device.