Access Tokens Sample Clauses

Access Tokens. The access tokens are issued to the application which wants to access some resource on the Web API. Your application can get Access Token only following the OAuth protocol. Access Tokens are long lived, but do have an expiration date. If the access token expires, it cannot be used to access the API anymore and a new one must be obtained. The Access Token consists of two values:  Token - this is a string value and looks very similar is structure to the Consumer Key. It is sent plain with every request to the API. Because your application will be sending it in sub-sequent calls to the API, you'll need to persist this value in-between calls.  Secret - this is the shared secret between your application and the server. You need to keep this value safe. The access token is issued per consumer and user, meaning:
AutoNDA by SimpleDocs
Access Tokens. Flipkart will provide you with Access Tokens that permit you to access Flipkart’s databases. The Access Tokens are the property of Flipkart and may be revoked if you share them with any third-party (other than as allowed under this Agreement), if they are compromised, if you violate any term of this Agreement, or if Flipkart terminates this Agreement.

Related to Access Tokens

  • Access to NID 2.17.3.1 TWTC may access the customer’s premises wiring by any of the following means and TWTC shall not disturb the existing form of electrical protection and shall maintain the physical integrity of the NID:

  • Access to Site 3.05.1 Contractor may enter and leave the premises at all reasonable times without charge. Contractor and its employees may use the common areas and roadways of the premises where it is to perform the services together with all facilities, equipment, improvements, and services provided in connection with the premises for common use. This excludes parking for Contractor’s personnel. Contractor shall repair any damage caused by it or its employees as a result of its use of the common areas.

  • Access to System If Business Associate needs access to a Covered Entity Information Technology system to comply with its obligations under the Contract or this Agreement, Business Associate shall request, review, and comply with any and all policies applicable to Covered Entity regarding such system including, but not limited to, any policies promulgated by the Office of Information Technology and available at xxxx://xxx.xxxxx.xx.xx/about/policies.

  • Access to PHI Business Associate shall provide access to PHI in a Designated Record Set to Covered Entity or as directed by Covered Entity to an Individual to meet the requirements under 45 CFR § 164.524. Business Associate shall provide such access in the time and manner reasonably designated by Covered Entity. Within three (3) business days, Business Associate shall forward to Covered Entity for handling any request for access to PHI that Business Associate directly receives from an Individual.

  • Access to Worksite 9.4.1 Authorized representatives of the Association shall have the right to transact official Association business on school property during regular school business hours provided that such activities or use do not interfere with classroom instruction or interrupt normal operations.

  • Access to Facility 13.1 Each Party shall ensure that its facilities are secured at all times.

  • Access to the Workplace Union health and safety staff or Union consultants shall be provided access to the workplace and to attend meetings of the committee or Union committee or for inspecting, investigating or monitoring the workplace.

  • Access to Software Access Rights to Software which is Results shall comprise: Access to the Object Code; and, where normal use of such an Object Code requires an Application Programming Interface (hereafter API), Access to the Object Code and such an API; and, if a Party can show that the execution of its tasks under the Project or the Exploitation of its own Results is technically or legally impossible without Access to the Source Code, Access to the Source Code to the extent necessary. Background shall only be provided in Object Code unless otherwise agreed between the Parties concerned.

  • Access to Facilities Each of the Company and each of its Subsidiaries will permit any representatives designated by the Purchaser (or any successor of the Purchaser), upon reasonable notice and during normal business hours, at such person's expense and accompanied by a representative of the Company, to:

  • Access to Work Locations Reasonable access to employee work locations shall be granted officers of the Association and their officially designated representatives for the purpose of processing grievances or contacting members of the Association concerning business within the scope of representation. Such officers or representatives shall not enter any work location without the consent of the City Manager. Access shall be restricted so as not to interfere with the normal operations of the department or with established safety or security requirements. Solicitation of membership and activities concerned with the internal management of the Association, such as collecting dues, holding membership meetings, campaigning for office, conducting elections and distributing literature, shall not be conducted during working hours.

Time is Money Join Law Insider Premium to draft better contracts faster.