Access to Email Sample Clauses

Access to Email. Any email account issued to the Executive by the Company is deemed the exclusive property of the Company and is to be used by the Executive solely for the purpose of performing the General Services under this Agreement. Furthermore, by accepting the terms of this Agreement, the Executive agrees and consents to the Company accessing the issued email account and disclosing any information obtained therein to any third party whenever the Company finds it necessary to protect its interests in connection with: (i) preventing acts of libel through email; (ii) protecting Confidential Information and other business secrets; (iii) preventing infringement of intellectual property rights; (iv) preventing the illegal use of email; (v) the use of emails as evidence in legal proceedings; and (vi) any other reason that the Company deems necessary to protect its interests.
AutoNDA by SimpleDocs
Access to Email. INTERNET; CONSENT TO COMMUNICATION MEDIUM: 2.24.1. The Applicant acknowledges that the world-wide web (www), internet, intranet, extranet, email, and similar medium are becoming an increasingly accepted and normal way of communicating. The Applicant further acknowledges that PMBI may from time to time desire to communicate with the Applicant using any of the foregoing medium. Therefore, the Applicant shall at all times, before and during the tenure of association have ready access to a computer at PMBJK with internet access and a reasonably current web browser, and: 2.24.2. Maintain an email address to which PMBI may send electronic communications; keep PMBI apprised of the Applicant’s current email address; regularly check at a frequency which may be every day, for email communications from PMBI; 2.24.3. Timely respond to email communications from PMBI, within a maximum of 48 hours from receipt. 2.24.4. In the event PMBI establishes an intranet, extranet, or other means of posting information on a web site or similar on-line medium, then regularly check at a frequency, which may be every day, for information communicated by PMBI. Except in the case of a notice, the Applicant hereby consents to receive any communication or information contemplated by Agreement in any manner contemplated by this Section 2.23, which communication or information shall be deemed communicated upon sending electronically to the email address submitted by the Applicant for such purpose, or upon posting on any web site or other on-line medium maintained by PMBI for such purpose.

Related to Access to Email

  • Access to NID 2.7.3.1 NewPhone may access the customer’s premises wiring by any of the following means and NewPhone shall not disturb the existing form of electrical protection and shall maintain the physical integrity of the NID: 2.7.3.1.1 BellSouth shall allow NewPhone to connect its Loops directly to BellSouth’s multi-line residential NID enclosures that have additional space and are not used by BellSouth or any other telecommunications carriers to provide service to the premises; 2.7.3.1.2 Where an adequate length of the customer’s premises wiring is present and environmental conditions permit, either Party may remove the customer premises wiring from the other Party’s NID and connect such wiring to that Party’s own NID; 2.7.3.1.3 Either Party may enter the subscriber access chamber or dual chamber NID enclosures for the purpose of extending a cross-connect or spliced jumper wire from the customer premises wiring through a suitable “punch-out” hole of such NID enclosures; or 2.7.3.1.4 NewPhone may request BellSouth to make other rearrangements to the customer premises wiring terminations or terminal enclosure on a time and materials cost basis. 2.7.3.2 In no case shall either Party remove or disconnect the other Party’s loop facilities from either Party’s NIDs, enclosures, or protectors unless the applicable Commission has expressly permitted the same and the disconnecting Party provides prior notice to the other Party. In such cases, it shall be the responsibility of the Party disconnecting loop facilities to leave undisturbed the existing form of electrical protection and to maintain the physical integrity of the NID. It will be NewPhone’s responsibility to ensure there is no safety hazard, and NewPhone will hold BellSouth harmless for any liability associated with the removal of the BellSouth Loop from the BellSouth NID. Furthermore, it shall be the responsibility of the disconnecting Party, once the other Party’s loop has been disconnected from the NID, to reconnect the disconnected loop to a nationally recognized testing laboratory listed station protector, which has been grounded as per Article 800 of the National Electrical Code. If no spare station protector exists in the NID, the disconnected loop must be appropriately cleared, capped and stored. 2.7.3.3 NewPhone shall not remove or disconnect ground wires from BellSouth’s NIDs, enclosures, or protectors. 2.7.3.4 NewPhone shall not remove or disconnect NID modules, protectors, or terminals from BellSouth’s NID enclosures. 2.7.3.5 Due to the wide variety of NID enclosures and outside plant environments, BellSouth will work with NewPhone to develop specific procedures to establish the most effective means of implementing this section if the procedures set forth herein do not apply to the NID in question.

  • Access to Employees Staff representatives of the Union shall be allowed to visit work areas of employees during working hours and confer on conditions of employment to the extent that such visitations do not disrupt the work activities of the area being visited. Prior to entering the work area, the representative shall receive permission from the appropriate department head or his/her designee stating the reason(s) for such visitations. Permission shall not be unreasonably denied.

  • Access to Services Subject to and in accordance with the terms of this Agreement, including any Schedules, Company grants You a non-exclusive, non-sublicensable, nontransferable, non-assignable, revocable license for the term of this Agreement to access and use the Services. Services may only be used by Your Users for internal business purposes only. You agree to comply with the terms and conditions of this Agreement, including any Schedules, and with all applicable Company procedures and policies that further define use of the Services. You acknowledge and agree that the actions of any of Your Users with respect to the Services will be deemed to be actions by You and that any breach by any of Your Users of the terms of this Agreement, including any Schedule, will be deemed to be a breach by You.

  • Access to Site 3.05.1 Contractor may enter and leave the premises at all reasonable times without charge. Contractor and its employees may use the common areas and roadways of the premises where it is to perform the services together with all facilities, equipment, improvements, and services provided in connection with the premises for common use. This excludes parking for Contractor’s personnel. Contractor shall repair any damage caused by it or its employees as a result of its use of the common areas.

  • Access to Data Operator shall make Data in the possession of the Operator available to the LEA within five (5) business days of a request by the LEA.

  • Access to PHI Business Associate shall provide access to PHI in a Designated Record Set to Covered Entity or as directed by Covered Entity to an Individual to meet the requirements under 45 CFR § 164.524. Business Associate shall provide such access in the time and manner reasonably designated by Covered Entity. Within three (3) business days, Business Associate shall forward to Covered Entity for handling any request for access to PHI that Business Associate directly receives from an Individual.

  • Access to the Services ID’s for access to Vendor Core Research and Analyst Inquiry may not be shared. Access to the Services is restricted to the number of named individuals (each a “Licensed User”) as identified in the Customer Purchase Order.

  • ACCESS TO SECURITY LOGS AND REPORTS Upon request, the Contractor shall provide access to security logs and reports to the State or Authorized User in a format as specified in the Authorized User Agreement.

  • Access to and Maintenance of Auction Records The Auction Agent shall afford to the Company, its agents, independent public accountants and counsel, access at reasonable times during normal business hours to review and make extracts or copies (at the Company's sole cost and expense) of all books, records, documents and other information concerning the conduct and results of Auctions, provided that any such agent, accountant or counsel shall furnish the Auction Agent with a letter from the Company requesting that the Auction Agent afford such person access. The Auction Agent shall maintain records relating to any Auction for a period of two years after such Auction (unless requested by the Company to maintain such records for such longer period not in excess of four years, then for such longer period), and such records, in reasonable detail, shall accurately and fairly reflect the actions taken by the Auction Agent hereunder. The Company agrees to keep confidential any information regarding the customers of any Broker-Dealer received from the Auction Agent in connection with this Agreement or any Auction, and shall not disclose such information or permit the disclosure of such information without the prior written consent of the applicable Broker- Dealer to anyone except such agent, accountant or counsel engaged to audit or review the results of Auctions as permitted by this Section 2.7, provided that the Company reserves the right to disclose any such information if it is advised by its counsel that its failure to do so would (i) be unlawful or (ii) expose it to liability, unless the Broker-Dealer shall have offered indemnification satisfactory to the Company. Any such agent, accountant or counsel, before having access to such information, shall agree to keep such information confidential and not to disclose such information or permit disclosure of such information without the prior written consent of the applicable Broker-Dealer, provided that such agent, accountant or counsel may reserve the right to disclose any such information if it is advised by its counsel that its failure to do so would (i) be unlawful or (ii) expose it to liability, unless the Broker-Dealer shall have offered indemnification satisfactory to such agent, accountant or counsel.

  • Specific Provisions for Access Rights to Software For the avoidance of doubt, the general provisions for Access Rights provided for in this Section 9 are applicable also to Software. Parties’ Access Rights to Software do not include any right to receive source code or object code ported to a certain hardware platform or any right to receive respective Software documentation in any particular form or detail, but only as available from the Party granting the Access Rights.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!