Administrator Access End User Consent Sample Clauses

Administrator Access End User Consent. (a) Administrator Access. Administrators will have the ability to access all Customer’s End User Accounts, including the ability to access, monitor, use, modify, withhold, or disclose any data available to End Users associated with their End User Accounts. (b) End User Consent. Customer will obtain and maintain all required consents from End Users to allow: (i) Administrators to have the access described in this Agreement; and (ii) SA’s provision of the Services to Administrators and End Users.
AutoNDA by SimpleDocs
Administrator Access End User Consent 

Related to Administrator Access End User Consent

  • REMOTE ACCESS SERVICES ADDENDUM The Custodian and each Fund agree to be bound by the terms of the Remote Access Services Addendum hereto.

  • Interconnection Customer Compensation for Actions During Emergency Condition The CAISO shall compensate the Interconnection Customer in accordance with the CAISO Tariff for its provision of real and reactive power and other Emergency Condition services that the Interconnection Customer provides to support the CAISO Controlled Grid during an Emergency Condition in accordance with Article 11.6.

  • END USER AGREEMENTS (“EUA GAC acknowledges that the END USER may choose to enter into an End User Agreement (“EUA) with the Contractor through this Agreement, and that the term of the EUA may exceed the term of the current H-GAC Agreement. H-GAC’s acknowledgement is not an endorsement or approval of the End User Agreement’s terms and conditions. Contractor agrees not to offer, agree to or accept from the END USER, any terms or conditions that conflict with those in Contractor’s Agreement with H-GAC. Contractor affirms that termination of its Agreement with H-GAC for any reason shall not result in the termination of any underlying EUA, which shall in each instance, continue pursuant to the EUA’s stated terms and duration. Pursuant to the terms of this Agreement, termination of this Agreement will disallow the Contractor from entering into any new EUA with END USERS. Applicable H-GAC order processing charges will be due and payable to H-GAC

  • Zone File Access Agreement Registry Operator will enter into an agreement with any Internet user, which will allow such user to access an Internet host server or servers designated by Registry Operator and download zone file data. The agreement will be standardized, facilitated and administered by a Centralized Zone Data Access Provider, which may be ICANN or an ICANN designee (the “CZDA Provider”). Registry Operator (optionally through the CZDA Provider) will provide access to zone file data per Section 2.1.3 of this Specification and do so using the file format described in Section 2.1.4 of this Specification. Notwithstanding the foregoing, (a) the CZDA Provider may reject the request for access of any user that does not satisfy the credentialing requirements in Section 2.1.2 below; (b) Registry Operator may reject the request for access of any user that does not provide correct or legitimate credentials under Section 2.1.2 below or where Registry Operator reasonably believes will violate the terms of Section 2.1.5. below; and, (c) Registry Operator may revoke access of any user if Registry Operator has evidence to support that the user has violated the terms of Section 2.1.5 below.

  • End User Agreement This publication is distributed under the terms of Article 25fa of the Dutch Copyright Act. This article entitles the maker of a short scientific work funded either wholly or partially by Dutch public funds to make that work publicly available for no consideration following a reasonable period of time after the work was first published, provided that clear reference is made to the source of the first publication of the work. Research outputs of researchers employed by Dutch Universities that comply with the legal requirements of Article 25fa of the Dutch Copyright Act, are distributed online and free of cost or other barriers in institutional repositories. Research outputs are distributed six months after their first online publication in the original published version and with proper attribution to the source of the original publication. You are permitted to download and use the publication for personal purposes. All rights remain with the author(s) and/or copyrights owner(s) of this work. Any use of the publication other than authorised under this licence or copyright law is prohibited. If you believe that digital publication of certain material infringes any of your rights or (privacy) interests, please let the University Library know, stating your reasons. In case of a legitimate complaint, the University Library will, as a precaution, make the material inaccessible and/or remove it from the website. Please contact the University Library through email: xxxxxxxxx@xxx.xx.xx. You will be contacted as soon as possible. University Library Radboud University

  • Instructions for Certification – First Tier Participants a. By signing and submitting this proposal, the prospective first tier participant is providing the certification set out below. b. The inability of a person to provide the certification set out below will not necessarily result in denial of participation in this covered transaction. The prospective first tier participant shall submit an explanation of why it cannot provide the certification set out below. The certification or explanation will be considered in connection with the department or agency's determination whether to enter into this transaction. However, failure of the prospective first tier participant to furnish a certification or an explanation shall disqualify such a person from participation in this transaction. c. The certification in this clause is a material representation of fact upon which reliance was placed when the contracting agency determined to enter into this transaction. If it is later determined that the prospective participant knowingly rendered an erroneous certification, in addition to other remedies available to the Federal Government, the contracting agency may terminate this transaction for cause of default. d. The prospective first tier participant shall provide immediate written notice to the contracting agency to whom this proposal is submitted if any time the prospective first tier participant learns that its certification was erroneous when submitted or has become erroneous by reason of changed circumstances. e. The terms "covered transaction," "debarred," "suspended," "ineligible," "participant," "person," "principal," and "voluntarily excluded," as used in this clause, are defined in 2 CFR Parts 180 and 1200. “First Tier Covered Transactions” refers to any covered transaction between a grantee or subgrantee of Federal funds and a participant (such as the prime or general contract). “Lower Tier Covered Transactions” refers to any covered transaction under a First Tier Covered Transaction (such as subcontracts). “First Tier Participant” refers to the participant who has entered into a covered transaction with a grantee or subgrantee of Federal funds (such as the prime or general contractor). “Lower Tier Participant” refers any participant who has entered into a covered transaction with a First Tier Participant or other Lower Tier Participants (such as subcontractors and suppliers).

  • Specific Provisions for Access Rights to Software For the avoidance of doubt, the general provisions for Access Rights provided for in this Section 9 are applicable also to Software. Parties’ Access Rights to Software do not include any right to receive source code or object code ported to a certain hardware platform or any right to receive respective Software documentation in any particular form or detail, but only as available from the Party granting the Access Rights.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage.

  • Additional Acceptable Uses of Student Data Contractor is prohibited from using Student Data for any secondary use not described in this agreement except: a. for adaptive learning or customized student learning purposes; b. to market an educational application or product to a parent or legal guardian of a student if Contractor did not use Data, shared by or collected per this Contract, to market the educational application or product; c. to use a recommendation engine to recommend to a student i. content that relates to learning or employment, within the third-party contractor's internal application, if the recommendation is not motivated by payment or other consideration from another party; or

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!