Access to Networks information systems and databases Unless otherwise provided in this Agreement, at the end of the xxxx sition period the United Kingdom shall cease to be entitled to access any network, any information system and any database established on the basis of Union law. The United Kingdom shall take appropriate measures to ensure that it does not access a network, information system or database which it is no longer entitled to access. PART TWO
Access to Networks. (a) Each Party must provide the other Party with access to such Party’s Network via a secure, industry-standard method selected by such Party with reasonable input from such other Party, as necessary to provide or receive the Services, as applicable; provided, that no Party shall be required to accept a method selected by the other Party to the extent that such method would require such Party to violate its generally applicable policies and procedures; and provided further that the cost of providing access shall be borne by CitiLife pursuant to Section 4.1.
Access to Networks. Each Party and its Affiliates may provide the other Party and its Affiliates with access to such Party’s IT Assets via a secure method selected by such Party, as further described in the Data Sharing Agreement.
Access to Networks. (a) Each Party and its Affiliates (collectively, the “Network Owner”) may provide the other Party and its Affiliates (collectively, the “Accessing Party”) with access to the Network Owner’s IT Assets via a secure method selected by such Party.
Access to Networks. Business Associate agrees that while present at any Covered Entity facility and/or when accessing Covered Entity's computer network(s), it and all of its employees, agents, representatives and subcontractors shall at all times comply with any network access and other security practices, procedures and/or policies established by Covered Entity including, without limitation, those established pursuant to HIPAA's Security Rules.
Access to Networks. (a) If as part of the ATM Services provided by Fidelity to Client hereunder, Client instructs Fidelity to provide Client with access to networks maintained by Fidelity and/or third parties, Client shall comply with the rules, regulations, procedures, fees, assessments, penalties and other membership duties, obligations and costs of such networks, as from time to time in effect, which are applicable to Client.
Access to Networks. SETTLEMENT If, as part of the EFT Services provided by BISYS to Client hereunder, Client instructs BISYS to provide Client with access to EFT networks maintained by BISYS and/or third parties, Client agrees to comply with the rules, regulations, procedures, fees, assessments, penalties and other membership duties, obligations and costs of such third party networks, as from time to time in effect, which are applicable to Client. Client will comply with all BISYS and third party network rules, regulations, procedures and costs relating to settlement, as from time to time in effect during the term of this Agreement. If Client is participating in the VISACHECK or MasterCard debit card program, Client agrees to maintain a demand deposit account with a financial depository institution which is capable of receiving and processing debits and credits initiated by EDS and presented through the automatic Clearing House ("ACH") system (the "Settlement Account")~. Client hereby authorizes BISYS and/or EDS to charge the Settlement Account for settlement of all transactions and Client acknowledges that EDS may, in its sole discretion, delay settlement or require Client to deposit additional deposits in appropriate amounts with EDS to offset any shortfall of funds EDS may incur as a result of settling such transactions. BISYS shall have no liability to Client for any shortfall of funds in the Settlement Account. ELECTRONIC FUNDS TRANSFER ADDITIONAL SERVICES ADDENDUM - CONTINUED
Access to Networks. 9.1 If, as part of the EFT Services provided by Fidelity to Customer hereunder, Customer instructs Fidelity to provide Customer with access to networks maintained by Fidelity and/or third parties, Customer shall comply with the rules, regulations, procedures, fees, assessments, penalties and other membership duties, obligations and costs of such networks then in effect, which are applicable to Customer. Fidelity’s ability to provide the network related services is contingent upon Customer obtaining financial institution sponsorship into the shared transaction network(s) in which Customer wishes to participate. Fidelity shall only render network related services concurrently with network sponsorship. Customer and/or its agents shall provide proof of sponsorship to Fidelity by providing a copy of the executed agreement between Customer and each network sponsor.
Access to Networks. Last, the project will promote coordination and collaboration with other actors of the chain to establish linkages, find synergies and share information through knowledge exchanges and regular industry level meetings in arder to improve the performance of the chain and have impact at the national level. The SDC has extensive experiences facilitating such a lliances between private companies and cooperatives in countries including Cote d'Ivoire, Ghana, and Honduras. Thus, the SDC will join efforts with the MlF in facilitating these linkages with international actors, particularly Swiss Companies, for knowledge sharing. ln addition, The program will work in collaboration with CATIE (the Tropical Agricultural Research and Higher Education Center) to establish a sustainable cocoa agroforestry system. A special effort will be made to promote collaboration with the cocoa sector in the Dominican Republic through the Dominican Cocoa Cluster in arder to promote south-south learning and collaboration.
Access to Networks. (a) Each Party may provide the other Party with access to such Party’s Network via a secure, industry-standard method selected by such Party with reasonable input from such other Party, to the extent reasonably required to provide or receive the Services. (b) Each Party shall only use (and will ensure that its employees, agents and subcontractors only use) the other Party’s Network for the purpose of providing or receiving, and only to the extent required to provide or receive, the Services. (c) Neither Party shall allow nor permit its agents or subcontractors to use or have access to the other Party’s Network except to the extent that such other Party gives its express prior written approval for such use or access by each relevant agent or subcontractor; provided that such approval shall not be unreasonably withheld, delayed or conditioned in the event such access by an agent or subcontractor occurred in the ordinary course of the provision or receipt of such Services prior to the Effective Date. E-9 (d) Neither Party shall (and shall ensure that its employees, agents and subcontractors shall not): (i) use the other Party’s Network to develop software, process data or perform any work or services other than for the purpose of providing or receiving the Services; (ii) break, interrupt, circumvent, adversely affect or attempt to break, interrupt, circumvent or adversely affect any security system or measure of the other Party; (iii) obtain, or attempt to obtain, access to any hardware, program or data comprised in the other Party’s Network except to the extent reasonably necessary to perform or receive the Services; or to which such other Party has given its prior written consent for such Party to obtain or attempt to obtain such access; and (iv) use, disclose or give access to any part of the other Party’s Network to any third party, other than its agents and sub-contractors authorized by such other Party in accordance with this Section 5.1. All user identification numbers and passwords for a Party’s Network disclosed to the other Party, and any information obtained from the use of such Party’s Network, shall be deemed Confidential Material of such disclosing Party. (e) If a Party or any of its employees, agents or subcontractors breach any provision of this Article, such Party shall promptly notify the other Party of such breach and cooperate as requested by such other Party in any investigation of such breach. Section 5.2