Access to the Swan Interface Sample Clauses

Access to the Swan Interface. Access to the Swan Interface is reserved for the End Customer and any Authorised User. The End Customer guarantees compliance by the Authorised User with the rules relating to the use of the Swan Interface. The Personal Strong Authentication Device is secret and strictly confidential. The End Customer undertakes to take the necessary measures to avoid its disclosure and compromise. The provision of the Security Code to the End Customer or Authorised User completes this Personal Strong Authentication Device. SWAN shall not be liable for the consequences of the disclosure by the End Customer, the loss, theft or fraudulent use by a third party of the Personal Strong Authentication Device. The End Customer communicates to SWAN the identity of the Authorised User(s), the mobile phone number for the initialization of the Personal Strong Authentication Device and the access rights and restrictions by Authorised User. The End Customer may decide at any time to designate other Authorised Users or to remove an Authorised User's access to the Swan Interface, giving Swan two (2) Business Days' notice.
AutoNDA by SimpleDocs

Related to Access to the Swan Interface

  • Access to the Services ID’s for access to Vendor Core Research and Analyst Inquiry may not be shared. Access to the Services is restricted to the number of named individuals (each a “Licensed User”) as identified in the Customer Purchase Order.

  • Access to the Site 22.1 The Contractor shall allow the Engineer and any person authorized by the Engineer access to the Site, to any place where work in connection with the Contract is being carried out or is intended to be carried out and to any place where materials or plant are being manufactured / fabricated / assembled for the works.

  • Access to the Service 2.1. The Service is accessed either from a web browser (Microsoft IE 6.0 or above) or directly by utilising the Web Service interface. If accessing via the internet, the URL is as directed by your GBG Account Manager.

  • Access to the Work The Design Professional and its representatives shall have access to the Work at all times while it is in progress, and shall comply with all job site safety rules.

  • ACCESS TO OPERATIONS SUPPORT SYSTEMS 2.1 BellSouth shall provide Max-Tel access to operations support systems (“OSS”) functions for pre-ordering, ordering and provisioning, maintenance and repair, and billing. BellSouth shall provide access to the OSS through manual and/or electronic interfaces as described in this Attachment. It is the sole responsibility of Max-Tel to obtain the technical capability to access and utilize BellSouth’s OSS interfaces. Specifications for Max-Tel ’s access and use of BellSouth’s electronic Version R4Q01: 12/01/01 interfaces are set forth at xxx.xxxxxxxxxxxxxxx.xxxxxxxxx.xxx and are incorporated herein by reference.

  • Access to NID 2.17.3.1 TWTC may access the customer’s premises wiring by any of the following means and TWTC shall not disturb the existing form of electrical protection and shall maintain the physical integrity of the NID:

  • Access to the Workplace Union health and safety staff or Union consultants shall be provided access to the workplace and to attend meetings of the committee or Union committee or for inspecting, investigating or monitoring the workplace.

  • Access to Services 1. Subject to DHCS provider enrollment certification requirements, the Contractor shall maintain continuous availability and accessibility of covered services and facilities, service sites, and personnel to provide the covered services through use of DMC certified providers. Such services shall not be limited due to budgetary constraints.

  • Access to PHI Business Associate shall provide access to PHI in a Designated Record Set to Covered Entity or as directed by Covered Entity to an Individual to meet the requirements under 45 CFR § 164.524. Business Associate shall provide such access in the time and manner reasonably designated by Covered Entity. Within three (3) business days, Business Associate shall forward to Covered Entity for handling any request for access to PHI that Business Associate directly receives from an Individual.

  • Access to the Property At such times as COUNTY and PURCHASER may mutually agree prior to the closing, COUNTY shall provide to PURCHASER or to its employees, agents, and contractors: (i) reasonable access to the Property and to the books, records, and personnel of COUNTY relating thereto for the purpose of making any surveys, inspections, or investigations permitted by this Agreement; and (ii) such information regarding the Property as PURCHASER or its employees, agents, and contractors may reasonably request. PURCHASER shall promptly repair any damage to the Property caused by its or any such person(s) entry upon the Property and shall hold COUNTY harmless from and against any and all claims, damages, losses, liabilities, costs, and expenses (including, without limitation, attorneys' fees and court costs) arising out of or in connection with any such entry upon the Property.

Time is Money Join Law Insider Premium to draft better contracts faster.