Authentification Sample Clauses

Authentification. Institutional users: Via IP-ranges, Username / Password, Shibboleth and comparable future developments to be agreed by the parties. Non-institutional users: Via individual registration by Username / Password, Shibboleth and comparable future developments to be agreed by the parties. Term/Termination The licence is for usage of the licensed material through the server of licensor and / or licensee and the relevant special collection field library and / or the server of a contractor of each of those institutions without restriction of concurrent use. The Licensed Materials or parts thereof may be compiled, indexed and catalogued (including, without limitation, the Header Data and Abstracts) by Eligible Institutions. Anything thereby created or compiled may be integrated into the Products and Services of Eligible Institutions. The license is for perpetual use of the product. Licensee is authorized to make necessary technical arrangements for long term preservation of the product. If the product is accessible exclusively via the licensor's technical equipment, licensor warrants the long term unrestricted and non alleviated access. In the case that licensor cannot warrant this access, licensor is committed to deliver the database to the licensee. Requested standards: - delivery complete and congruent with the licensed product - standardised data formats - standardised character sets (UTF 8) - metadata and content connected by non-proprietary persistent identifier (e.g. DOI) - content and applications disconnected - content deliverable as logical units - no digital rights management by licensor - re-formatting / content migration for the purpose of long-term accessability and preservation is permitted
AutoNDA by SimpleDocs
Authentification. Four Js’ Channel Partner will provide appropriate End User authentification information to Four Js for End User support entitlement verification and will have verified that the End User is entitled to support prior to contacting Four Js. This authentification shall include, at a minimum, the End User name, maintenance invoice numbers and license numbers. As needed, Four Js will provide a Four Js Service Access Number to its Channel Partner for entitlement verification purposes.
Authentification a range of measures carried out to verify the Cardholder’s identity and the authenticity of his/her messages;

Related to Authentification

  • Identification of Goods Identification of the goods shall not be deemed to have been made until both Buyer and Seller have agreed that the goods in question are to be appropriate to the performance of this Agreement.

  • Identification Badges Identification badges will be supplied by Advanced Behavioral Health (ABH) to all credentialed individuals who are providing services to children. Badges must be presented to the child/youth and any present adults at the time of service and must be worn for the duration of the service. Badges will be updated every two years during the re- credentialing process. Any individual or agency who fails to submit a photo ID to ABH within the designated timeframe will have their credentialing status terminated.

  • Identification When performing work on District property, Contractor shall be in appropriate work attire (or uniform, if applicable) at all times. If Contractor does not have a specific uniform, then Contractor shall provide identification tags and/or any other mechanism the District in its sole discretion determines is required to easily identify Contractor. Contractor and its employees shall (i) display on their clothes the above-mentioned identifying information and (ii) carry photo identification and present it to any District personnel upon request. If Contractor cannot produce such identification or if the identification is unacceptable to District, District may provide at its sole discretion, District-produced identification tags to Contractor, costs to be borne by Contractor.

  • Client identification 9.1. The Company has the right to require the Client to confirm his/her registration information specified when opening a trading account. To do so, the Company may ask the Client at its own discretion and at any time to provide a notarized electronic copy of his/her identification document, bank statement or public utilities xxxx as a proof of residence. In particular cases, the Company may ask the Client to provide a photo of him/her holding his/her ID near his/her face. The detailed client identification requirements are set out in the “AML policies” section on the Company’s official site.

  • Product Identification Before removal from Sale Area, unless Contracting Officer determines that circumstances warrant a written waiver or adjustment, Purchaser shall:

  • Contractor’s Staff Identification Contractor shall provide, at Contractor’s expense, all staff providing services under this Contract with a photo identification badge.

  • Identification Card Any cards issued to Members are for identification only.

  • Identification Cards Identification (“ID”) cards are issued by Us for identification purposes only. Possession of any ID card confers no right to services or benefits under this Contract. To be entitled to such services or benefits, Your Premiums must be paid in full at the time that the services are sought to be received.

  • Non-Identification Approved Users agree not to use the requested datasets, either alone or in concert with any other information, to identify or contact individual participants from whom data and/or samples were collected. Approved Users also agree not to generate information (e.g., facial images or comparable representations) that could allow the identities of research participants to be readily ascertained. These provisions do not apply to research investigators operating with specific IRB approval, pursuant to 45 CFR 46, to contact individuals within datasets or to obtain and use identifying information under an 2 The project anniversary date can be found in “My Projects” after logging in to the dbGaP authorized-access portal. IRB-approved research protocol. All investigators including any Approved User conducting “human subjects research” within the scope of 45 CFR 46 must comply with the requirements contained therein.

  • T1 IDENTIFICATION PROCEDURES During the restoration of service after a disaster, BellSouth may be forced to aggregate traffic for delivery to a CLEC. During this process, T1 traffic may be consolidated onto DS3s and may become unidentifiable to the Carrier. Because resources will be limited, BellSouth may be forced to "package" this traffic entirely differently then normally received by the CLECs. Therefore, a method for identifying the T1 traffic on the DS3s and providing the information to the Carriers is required.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!