Access to Networks information systems and databases
Access to Networks. (a) Each Party may provide the other Party with access to such Party’s Network via a secure, industry-standard method selected by such Party with reasonable input from such other Party, as necessary to provide or receive the Services, as applicable; provided, that the cost of providing access shall be charged in accordance with Section 4.1.
(b) Each Party shall only use (and will ensure that its Personnel only use) the other Party’s Network for the purpose of providing or receiving, and only to the extent required to provide or receive, the Services.
(c) Neither Party shall allow nor permit its agents or subcontractors to use or have access to the other Party’s Network except to the extent that such other Party gives its express prior written approval for such use or access by each relevant agent or subcontractor.
(d) Neither Party shall (and shall ensure that its Personnel shall not): (i) use the other Party’s Network to develop software, process data or perform any work or services other than for the purpose of providing or receiving the Services, (ii) break, interrupt, circumvent, adversely affect or attempt to break, interrupt, circumvent or adversely affect any security system or measure of the other Party; (iii) obtain, or attempt to obtain, access to any hardware, program or data comprised in the other Party’s Network except to the extent reasonably necessary to perform or receive the Services; or to which such other Party has given its prior written consent for such Party to obtain or attempt to obtain such access; or (iv) use, disclose or give access to any part of the other Party’s Network to any third party, other than its agents and sub-contractors authorized by such other Party in accordance with this Section 5.1. All user identification numbers and passwords for a Party’s Network disclosed to the other Party, and any information obtained from the use of such Party’s Network, shall be deemed Confidential Material of such Party.
(e) If a Party or any of its Personnel breach any provision of this Article, such Party shall promptly notify the other Party of such breach and cooperate as requested by such other Party in any investigation of such breach.
(f) A material failure to comply with the provisions of this Section 5.1 shall constitute a material breach of this Agreement.
Access to Networks. Each Party and its Affiliates may provide the other Party and its Affiliates with access to such Party’s IT Assets via a secure method selected by such Party, as further described in the Data Sharing Agreement.
Access to Networks. Each Party may provide the other Party with access to such Party’s Network via a secure, industry-standard method selected by such Party with reasonable input from such other Party, to the extent reasonably required to provide or receive the Services.
Access to Networks. (a) Each Party and its Affiliates (collectively, the “Network Owner”) may provide the other Party and its Affiliates (collectively, the “Accessing Party”) with access to the Network Owner’s IT Assets via a secure method selected by such Party.
(b) The Accessing Party shall only use (and will ensure that its Personnel only use), and shall only have access to, the Network Owner’s IT Assets for the purpose of, and to the extent required for, exercising its rights or performing its obligations under the Separation and Distribution Agreement, this Agreement or another Ancillary Agreement (including the provision or receipt of services under the Transition Services Agreement).
(c) The Accessing Party shall not allow nor permit its agents or subcontractors to use or have access to the Network Owner’s IT Assets unless (i) such agents or subcontractors are employees of the Accessing Party or of an Affiliate of the Accessing Party, (ii) such agents and subcontractors are currently engaged under the Separation and Distribution Agreement or any other Ancillary Agreement or (iii) the Network Owner gives its express prior written approval for such use or access by each relevant agent or subcontractor, such approval not to be unreasonably withheld.
(d) The Accessing Party shall not (and shall ensure that its Personnel shall not): (i) use the Network Owner’s IT Assets to develop Software, process data or perform any work or services other than for the purpose of exercising its rights or performing its obligations under the Separation and Distribution Agreement, this Agreement or another Ancillary Agreement (including the provision or receipt of services under the Transition Services Agreement); (ii) break, interrupt, circumvent, adversely affect or attempt to break, interrupt, circumvent or adversely affect any security system or measure of the Network Owner’s IT Assets; (iii) obtain, or attempt to obtain, access to any hardware, program or data stored in the Network Owner’s IT Assets except to the extent reasonably necessary to exercise the Accessing Party’s rights or perform its obligations under the Separation and Distribution Agreement, this Agreement or another Ancillary Agreement (including the provision or receipt of services under the Transition Services Agreement) or with respect to which the Network Owner has given its prior written consent for the Accessing Party to obtain or attempt to obtain such access; and (iv) use, disclose or give access to any part of th...
Access to Networks information systems and databases CITIZENS' RIGHTS
Access to Networks. 9.1 If, as part of the EFT Services provided by Fidelity to Customer hereunder, Customer instructs Fidelity to provide Customer with access to networks maintained by Fidelity and/or third parties, Customer shall comply with the rules, regulations, procedures, fees, assessments, penalties and other membership duties, obligations and costs of such networks then in effect, which are applicable to Customer. Fidelity’s ability to provide the network related services is contingent upon Customer obtaining financial institution sponsorship into the shared transaction network(s) in which Customer wishes to participate. Fidelity shall only render network related services concurrently with network sponsorship. Customer and/or its agents shall provide proof of sponsorship to Fidelity by providing a copy of the executed agreement between Customer and each network sponsor.
9.2 Customer will comply with all Fidelity and third party network rules, regulations, procedures and pay all costs which Fidelity may incur in providing Services to Customer.
9.3 Fidelity may, upon receipt of written instructions from any network to which Fidelity is providing access hereunder, including without limitation a network owned and/or operated by the Fidelity, immediately cease to provide to Customer, including Customer's customers, access to such network. Fidelity shall use its reasonable efforts to promptly notify Customer of such interruption in network access. Customer shall indemnify and hold Fidelity harmless from any claims, liabilities or losses, including cost and attorney's fees, resulting from Fidelity’s compliance with the written instructions of any network.
9.4 Customer shall indemnify and hold Fidelity harmless from any claims, liabilities or losses, including costs and attorneys' fees, resulting from (i) transactions effected with lost, stolen, counterfeit or misused Access Cards issued by, or on behalf of, Customer to allow customers of Customer to access the EFT Services, and/or (ii) actions, omissions or commissions of Customer's agents and third party host processors relating to the EFT Services provided that the indemnity provided for in this paragraph shall not be applicable to losses caused by the gross negligence or willful misconduct of Fidelity.
Access to Networks. Business Associate agrees that while present at any Covered Entity facility and/or when accessing Covered Entity's computer network(s), it and all of its employees, agents, representatives and subcontractors shall at all times comply with any network access and other security practices, procedures and/or policies established by Covered Entity including, without limitation, those established pursuant to HIPAA's Security Rules.
Access to Networks. Last, the project will promote coordination and collaboration with other actors of the chain to establish linkages, find synergies and share information through knowledge exchanges and regular industry level meetings in arder to improve the performance of the chain and have impact at the national level. The SDC has extensive experiences facilitating such a lliances between private companies and cooperatives in countries including Cote d'Ivoire, Ghana, and Honduras. Thus, the SDC will join efforts with the MlF in facilitating these linkages with international actors, particularly Swiss Companies, for knowledge sharing. ln addition, The program will work in collaboration with CATIE (the Tropical Agricultural Research and Higher Education Center) to establish a sustainable cocoa agroforestry system. A special effort will be made to promote collaboration with the cocoa sector in the Dominican Republic through the Dominican Cocoa Cluster in arder to promote south-south learning and collaboration.
C. Components Component 1: lmproving Productivity and Natural Resource Management of Cocoa Farms. ( MlF: US$1,202,511; Counterpart: US$290,888;Co-financing: US$249,334 ).
Access to Networks. SETTLEMENT