Access to Solution Sample Clauses

Access to Solution. Subject to the terms and conditions of this Agreement, Sonrai shall provide to Company the Solution, and hereby grants to Company a non-exclusive, non-transferable license (without the right to sublicense) to use the Solution, in each case during the Term solely for the Company’s access and use for its internal business purposes. Company shall be permitted to use the Solution in connection with no more than the number of Company’s cloud accounts and data stores set forth on the applicable Sonrai quotation or the applicable Sonrai authorized reseller quotation (the “Quotation”).
AutoNDA by SimpleDocs
Access to Solution. 4.1 The Customer, or at the Customer’s direction, the Supplier, will supply unique Logon IDs to each of the Authorised Users nominated by the Customer. 4.2 Subject to clause 4.4, the Customer may from time to time request to change the persons nominated as Authorised Users. 4.3 The Customer will provide a list of the Authorised Users to the Supplier on request by the Supplier. 4.4 The total number of Authorised Users must not exceed the Maximum Number of Authorised Users unless the Supplier agrees otherwise. 4.5 The Supplier may refuse to supply a particular person with a Logon ID, or cancel a particular Logon ID or direct the Customer to do either of the same, at any time for reasonable cause. Reasonable cause includes but is not limited to the Logon ID being assigned to any person other than an authorised representative of the Customer, a person who is employed by or providing access to the Solution to a competitor, or any person whom the Supplier reasonably believes is otherwise compromising the rights of the Supplier. Where the Supplier decides to take action directly to refuse supply of or to cancel a Logon ID, the Supplier will make all reasonable efforts to notify the Customer in advance of denial or cancellation and will in all cases provide the Customer with its reasons for such denial or cancellation. 4.6 The Customer acknowledges and agrees that: (a) it is responsible for ensuring that each of the Authorised Users comply with the Customer’s obligations under this Agreement , including without limitation the restrictions on copying of the Solution as set out in clause 12; (b) it must make all reasonable efforts to ensure the Authorised Users do not disclose their Logon IDs to anyone else; (c) the Customer will be responsible for any use whatsoever of the Solution through all Logon IDs issued to Customer; (d) a breach of this Agreement by an Authorised User or any person provided with a Logon ID by an Authorised User will constitute a breach by the Customer. 4.7 The Customer must immediately notify the Supplier if any Logon ID should be cancelled.
Access to Solution. (a) Based upon each of the Users (i) accepting all terms and conditions of this Agreement accepting all terms and conditions of this Agreement by execution thereof and/or by one or more of the means set forth above the titling caption of this Agreement and agreement, and (ii) paying to EPERTURE the purchase price of the Device and the Software subscription and maintenance fees therefor as set forth in paragraph 3.2 below, EPERTURE hereby agrees to grant Users access to the Solution selected by Users as hosted by or for EPERTURE. (b) EPERTURE will use its reasonable efforts to maintain Solution access seven (7) days per week, twenty-four (24) hours per day; provided, however, that EPERTURE reserves the right, without prior notice or liability, to restrict Users’ access to the Solution, or limit times of Solution access in order to maintain, upgrade and/or repair the Solution or host equipment. (c) To assist Users in the installation of the Solution and Software, EPERTURE shall (i) provide proprietary Solution access to Users together with (ii) detailed instructions on how Users may remotely link to and use such Solution via Users' own equipment. (d) Users access to the caregiver portal of the Solution will be enabled via appropriate logon and password procedures, including an identification code (“User ID”); Users access will be secured via appropriate technology; and Users’ data will be encrypted for safety when transmitted via the Solution over the Internet. (e) Users’ information shall be hosted by or for EPERTURE in a manner which will enable Users access to Users’ information in order for Users to create and generate Users' own reports from such Users information.
Access to Solution. Subject to the terms and conditions of the Agreement, commencing on the Effective Date, VidaNyx hereby grants to Client a non-exclusive, non-transferable right during the applicable Subscription Term to access and use, and authorize Permitted Users (defined below) to access and use, the Solution solely for Client’s internal use and pursuant to the restrictions set forth in the Agreement. The “Effective Date” is the date upon which VidaNyx receives the upfront fees payable by Client as provided in the initial Order Form, or if purchased online, the date of initial purchase.

Related to Access to Solution

  • Access to Site 3.05.1 Contractor may enter and leave the premises at all reasonable times without charge. Contractor and its employees may use the common areas and roadways of the premises where it is to perform the services together with all facilities, equipment, improvements, and services provided in connection with the premises for common use. This excludes parking for Contractor’s personnel. Contractor shall repair any damage caused by it or its employees as a result of its use of the common areas.

  • Access to NID 2.7.3.1 NewPhone may access the customer’s premises wiring by any of the following means and NewPhone shall not disturb the existing form of electrical protection and shall maintain the physical integrity of the NID: 2.7.3.1.1 BellSouth shall allow NewPhone to connect its Loops directly to BellSouth’s multi-line residential NID enclosures that have additional space and are not used by BellSouth or any other telecommunications carriers to provide service to the premises; 2.7.3.1.2 Where an adequate length of the customer’s premises wiring is present and environmental conditions permit, either Party may remove the customer premises wiring from the other Party’s NID and connect such wiring to that Party’s own NID; 2.7.3.1.3 Either Party may enter the subscriber access chamber or dual chamber NID enclosures for the purpose of extending a cross-connect or spliced jumper wire from the customer premises wiring through a suitable “punch-out” hole of such NID enclosures; or 2.7.3.1.4 NewPhone may request BellSouth to make other rearrangements to the customer premises wiring terminations or terminal enclosure on a time and materials cost basis. 2.7.3.2 In no case shall either Party remove or disconnect the other Party’s loop facilities from either Party’s NIDs, enclosures, or protectors unless the applicable Commission has expressly permitted the same and the disconnecting Party provides prior notice to the other Party. In such cases, it shall be the responsibility of the Party disconnecting loop facilities to leave undisturbed the existing form of electrical protection and to maintain the physical integrity of the NID. It will be NewPhone’s responsibility to ensure there is no safety hazard, and NewPhone will hold BellSouth harmless for any liability associated with the removal of the BellSouth Loop from the BellSouth NID. Furthermore, it shall be the responsibility of the disconnecting Party, once the other Party’s loop has been disconnected from the NID, to reconnect the disconnected loop to a nationally recognized testing laboratory listed station protector, which has been grounded as per Article 800 of the National Electrical Code. If no spare station protector exists in the NID, the disconnected loop must be appropriately cleared, capped and stored. 2.7.3.3 NewPhone shall not remove or disconnect ground wires from BellSouth’s NIDs, enclosures, or protectors. 2.7.3.4 NewPhone shall not remove or disconnect NID modules, protectors, or terminals from BellSouth’s NID enclosures. 2.7.3.5 Due to the wide variety of NID enclosures and outside plant environments, BellSouth will work with NewPhone to develop specific procedures to establish the most effective means of implementing this section if the procedures set forth herein do not apply to the NID in question.

  • Access to PHI Business Associate shall provide access to PHI in a Designated Record Set to Covered Entity or as directed by Covered Entity to an Individual to meet the requirements under 45 CFR § 164.524. Business Associate shall provide such access in the time and manner reasonably designated by Covered Entity. Within three (3) business days, Business Associate shall forward to Covered Entity for handling any request for access to PHI that Business Associate directly receives from an Individual.

  • Access to Services Subject to and in accordance with the terms of this Agreement, including any Schedules, Company grants You a non-exclusive, non-sublicensable, nontransferable, non-assignable, revocable license for the term of this Agreement to access and use the Services. Services may only be used by Your Users for internal business purposes only. You agree to comply with the terms and conditions of this Agreement, including any Schedules, and with all applicable Company procedures and policies that further define use of the Services. You acknowledge and agree that the actions of any of Your Users with respect to the Services will be deemed to be actions by You and that any breach by any of Your Users of the terms of this Agreement, including any Schedule, will be deemed to be a breach by You.

  • Access to Data Operator shall make Data in the possession of the Operator available to the LEA within five (5) business days of a request by the LEA.

  • Access to Shareholder List Shareholders of record may apply to the Trustees for assistance in communicating with other shareholders for the purpose of calling a meeting in order to vote upon the question of removal of a Trustee. When ten or more shareholders of record who have been such for at least six months preceding the date of application and who hold in the aggregate shares having a net asset value of at least $25,000 or at least 1% of the outstanding shares, whichever is less, so apply, the Trustees shall within five business days either: (i) afford to such applicants access to a list of names and addresses of all shareholders as recorded on the books of the Trust; or (ii) inform such applicants of the approximate number of shareholders of record and the approximate cost of mailing material to them and, within a reasonable time thereafter, mail materials submitted by the applicants to all such shareholders of record. The Trustees shall not be obligated to mail materials which they believe to be misleading or in violation of applicable law.

  • Access to Files A copy of any comple-te-d evaluation which is. to be placed in a nurse's file shall be first reviewed with the nurse. The nurse shall initial such evaluation as having been read and shall have the opportunity to add her or his views to such evaluation prior to it being placed in her or his file. It is understood that such evaluations do not constitute disciplinary action by the Hospital against the nurse. Each nurse shall have reasonable access to all her or his files for the purpose of reviewing their contents in the presence of her or his supervisor. A copy of the evaluation will be provided to the nurse at her or his request. No document shall be used against a nurse where it has not been brought to her or his attention in a timely manner. Any letter of reprimand, suspension or other sanction will be removed from the record of a nurse eighteen months following the receipt of such letter, suspension or other sanction provided that such nurse's record has been discipline free for one year. the Association of the basis of such extension. A nurse who transfers from casual or regular time to full-time status shall not be required to serve a probationary period where such nurse has previously completed one since her or his date of last hire. Where no such probationary period has been served, the number of tours worked (hours worked for nurses whose regular hours of work are other than the standard work day) during the nine months immediately preceding the transfer shall be credited towards the probationary period. A nurse who from casual part-time or full-time to regular part-time status shall not be required to serve a probationary period where such nurse has previously completed one since her or his date of last hire. Where no such probationary period has been served, the number of tours worked (hours worked for nurses whose regular hours of work are other than the standard work day) during the nine months immediately preceding the transfer shall be credited towards the probationary period. (a) A seniority list shall be for all time nurses covered by this Agreement who have completed their probationary period. For information purposes only, the names of all time probationary nurses shall be included in the seniority list. A seniority list shall be established for all regular part-time nurses covered by this Agreement who have completed their probationary period. For information purposes only, the names of all regular part-time probationary nurses shall be included in the seniority list. Seniority on such lists will be expressed in terms of total hours worked. A seniority list shall be maintained for casual part-time nurses for the purposes of Article

  • Access to the Service Subject to the rights and limitations set out in this Agreement and your payment of all Subscription Fees when due, we grant you a limited, non- exclusive, non-sublicensable, non-transferable (except as expressly permitted herein) right to permit Users to access and use the Service during the Subscription Term: (i) solely for your internal business purposes; and (ii) for the scope of use set out in your Order and/or the Documentation. You shall not permit any unauthorized access to or use of the Service and shall notify us immediately in the event that you become aware of any unauthorized access or use.

  • Access to the Site 22.1 The Contractor shall allow the Engineer and any person authorized by the Engineer access to the Site, to any place where work in connection with the Contract is being carried out or is intended to be carried out and to any place where materials or plant are being manufactured / fabricated / assembled for the works.

  • Access to Information Systems Access, if any, to DXC’s Information Systems is granted solely to perform the Services under this Order, and is limited to those specific DXC Information Systems, time periods and personnel as are separately agreed to by DXC and Supplier from time to time. DXC may require Supplier’s employees, subcontractors or agents to sign individual agreements prior to access to DXC’s Information Systems. Use of DXC Information Systems during other time periods or by individuals not authorized by DXC is expressly prohibited. Access is subject to DXC business control and information protection policies, standards and guidelines as may be modified from time to time. Use of any other DXC Information Systems is expressly prohibited. This prohibition applies even when an DXC Information System that Supplier is authorized to access, serves as a gateway to other Information Systems outside Supplier’s scope of authorization. Supplier agrees to access Information Systems only from specific locations approved for access by DXC. For access outside of DXC premises, DXC will designate the specific network connections to be used to access Information Systems.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!