Authorised Users. 5.1 The Client shall designate its Authorised Users, with no limit in number, and may make changes at any time. The Client shall be responsible for maintaining a current and accurate written list of Authorised Users and shall provide such list to Acolyte on request. 5.2 Authorised Users shall be the only users of the Application, and Authorised Users must access the Application solely for the benefit of the Client. 5.3 To be an Authorised User, an individual must: 5.3.1 have authorisation from the Client to access and use the Application; 5.3.2 complete the registration process, and keep such registration information current during the Term; and 5.3.3 have a User ID, such as his or her email, to enable his or her access to the Application. 5.4 The Client is responsible for all damage and losses arising as a result of Authorised Users’ access to and use of the Application, such as, for instance, the granting of access to Candidate Data to third parties by an Authorised User in breach of this Agreement and Data Protection Legislation. Any breach of this Agreement by any Authorised User will be deemed to be a breach of this Agreement by the Client, and the Client will be liable for any losses arising. 5.5 The Client shall notify Acolyte as soon as reasonably possible if the Client becomes aware of any unauthorised use of the whole or any part of the Application by any of the Client’s employees, contractors or officers, or anyone else. 5.6 The Client shall use all reasonable endeavours to prevent any unauthorised access to, or use of, the Application, and in the event of any such unauthorised access or use, promptly notify Acolyte. 5.7 In relation to the Authorised Users, the Client 5.7.1 it shall procure that each Authorised User 5.7.2 it shall not knowingly permit anyone other than an Authorised User to use or access the Application; 5.7.3 each Authorised User shall keep a secure password for his use of the Application and that each Authorised User shall keep his password confidential and not share their log-in credentials with anyone else, including other Authorised Users or Client personnel; 5.7.4 authorised Users shall use only their own User IDs and never share their User ID; keep their respective User ID and password information secure and confidential; and change their password as frequently as is reasonably required by Acolyte; 5.7.5 it shall adopt and maintain reasonable security precautions for User IDs to prevent their disclosure to and use by unauthorised persons and promptly notify Acolyte upon becoming aware that the security or integrity of a User ID or password has been compromised; 5.7.6 it shall permit Acolyte to audit the Client’s use of the Application in order to establish the name and password of each Authorised User. Such audit may be conducted no more than once per year, at Acolyte’s expense, and this right shall be exercised with reasonable prior notice, in such a manner as not to substantially interfere with the Client’s normal conduct of business; 5.7.7 if any of the audits referred to in clause 5.7.6 reveal that any password has been provided to any individual who is not an Authorised User, then without prejudice to Acolyte’s other rights, Acolyte shall promptly disable such passwords and Acolyte shall not issue any new passwords to any such individual. 5.8 The Client shall not, and shall not permit any Authorised User or third party to, access or use the Application in any way that: 5.8.1 infringes, misappropriates or violates any Intellectual Property Rights or publicity, privacy or other right of Acolyte or any third party; 5.8.2 violates any applicable laws, statutes, ordinances, rules or regulations or any judicial or administrative orders; or 5.8.3 is unlawful, harmful, threatening, defamatory, obscene, infringing, harassing or racially or ethnically offensive; facilitates illegal activity; depicts sexually explicit images; or promotes unlawful violence, discrimination based on race, gender, colour, religious belief, sexual orientation, disability, or any other illegal activities. 5.9 In addition to any other rights Acolyte may have, Acolyte may, without liability, remove or disable access by any Authorised User that violates the foregoing restrictions.
Appears in 2 contracts
Samples: Terms of Business, Terms of Business
Authorised Users. 5.1 8.1 The Client shall designate its Authorised Users, with no limit in number, and may make changes at any time. The Client shall be responsible for maintaining a current and accurate written list of Authorised Users and shall provide such list to Acolyte on request.
5.2 Authorised Users shall be the only users right of the Application, and Authorised Users must access the Application solely for the benefit of the Client.
5.3 To be an Authorised User, an individual must:
5.3.1 have authorisation from the Client Customer to access and use the Application;
5.3.2 complete the registration process, and keep such registration information current during the Term; and
5.3.3 have a User ID, such as his or her email, to enable his or her access to the Application.
5.4 The Client Hosted Software is responsible for all damage and losses arising as a result of Authorised Users’ access to and use of the Application, such as, for instance, the granting of access to Candidate Data to third parties by an Authorised User in breach of this Agreement and Data Protection Legislation. Any breach of this Agreement by any Authorised User will be deemed to be a breach of this Agreement by the Client, and the Client will be liable for any losses arising.
5.5 The Client shall notify Acolyte as soon as reasonably possible if the Client becomes aware of any unauthorised use of the whole or any part of the Application by any of the Client’s employees, contractors or officers, or anyone else.
5.6 The Client shall use all reasonable endeavours to prevent any unauthorised access to, or use of, the Application, and in the event of any such unauthorised access or use, promptly notify Acolyte.
5.7 In relation limited to the Authorised Users.
8.2 The number of concurrent Authorised Users that a Customer may have may be restricted in accordance with the services provided to the Customer pursuant to a relevant Purchase Order, Statement of Work, Professional Services Agreement or Maintenance + Support Services Agreement.
8.3 The Customer shall notify the ClientCompany of any known unauthorised use(s) of the Hosted Software, or any known breach of security within the IT infrastructure of the Customer which impacts upon the security of the Hosted Software (Breach), forthwith after it becomes aware of the Breach.
5.7.1 8.4 The Customer agrees that it shall procure will cooperate with the Company and take all reasonable steps in investigating and mitigating the Breach.
8.5 The Customer undertakes to the Company that each it will not allow or suffer any User Subscription to be used by more than one individual Authorised User unless the User Subscription for that Authorised User:
5.7.2 8.5.1 relates to a specific Location and it shall not knowingly permit anyone other than an is agreed in writing that the specific Location may access or use the Hosted Software by a single local machine irrespective of the identity of the Authorised User from time to time; or
8.5.2 has been reassigned in its entirety to another individual Authorised User, in which case the prior Authorised User shall no longer have any right to access or use or access the Application;Hosted Software.
5.7.3 each 8.6 Each Authorised User shall keep a secure password for his or her use of the Application Hosted Software, such password shall be changed no less frequently than a 90 day cycle and that each Authorised User shall keep his or her password confidential and not share their log-in credentials with anyone else, including other Authorised Users or Client personnel;
5.7.4 authorised Users shall use only their own User IDs and never share their User ID; keep their respective User ID and password information secure and confidential; and change their password as frequently as is reasonably required by Acolyte;
5.7.5 it shall adopt and maintain reasonable security precautions for User IDs to prevent their disclosure to and use by unauthorised persons and promptly notify Acolyte upon becoming aware that the security or integrity of a User ID or password has been compromised;
5.7.6 it shall permit Acolyte to audit the Client’s use of the Application in order to establish the name and password of each Authorised User. Such audit may be conducted no more than once per year, at Acolyte’s expense, and this right shall be exercised with reasonable prior notice, in such a manner as not to substantially interfere with the Client’s normal conduct of business;
5.7.7 if any of the audits referred to in clause 5.7.6 reveal that any password has been provided to any individual who is not an Authorised User, then without prejudice to Acolyte’s other rights, Acolyte shall promptly disable such passwords and Acolyte shall not issue any new passwords to any such individual.
5.8 The Client shall not, and shall not permit any Authorised User or third party to, access or use the Application in any way that:
5.8.1 infringes, misappropriates or violates any Intellectual Property Rights or publicity, privacy or other right of Acolyte or any third party;
5.8.2 violates any applicable laws, statutes, ordinances, rules or regulations or any judicial or administrative orders; or
5.8.3 is unlawful, harmful, threatening, defamatory, obscene, infringing, harassing or racially or ethnically offensive; facilitates illegal activity; depicts sexually explicit images; or promotes unlawful violence, discrimination based on race, gender, colour, religious belief, sexual orientation, disability, or any other illegal activities.
5.9 In addition to any other rights Acolyte may have, Acolyte may, without liability, remove or disable access by any Authorised User that violates the foregoing restrictions.
Appears in 2 contracts
Samples: Software as a Service Agreement, Software as a Service Agreement
Authorised Users. 5.1 The Client shall designate its 6.1. In relation to the Authorised Users, with no limit in numberthe Customer undertakes that:
6.1.1. each Authorised User shall keep a secure password for their use of the Service, regularly change their password, and may make changes at not disclose their password to any timeother person;
6.1.2. The Client it will not allow or suffer any subscription to be used by more than one individual Authorised User unless it has been reassigned in its entirety to another individual Authorised User, in which case the prior Authorised User shall no longer have any right to access or use the Services;
6.1.3. no password or login shall be responsible for maintaining used by more than one person, or by anyone who is not an Authorised User;
6.1.4. it shall maintain a current and accurate written written, up to date list of current Authorised Users and shall provide such list to Acolyte on requestCUBE within five (5) Business Days of CUBE’s written request at any time; and
6.1.5. it shall be at all times responsible and liable for the acts and omissions of each Authorised User in relation to this Agreement (whether or not such Authorised User is a member of staff of the Customer) as though they were the acts and omissions of the Customer itself.
5.2 6.2. The Customer shall not (and shall procure that its Authorised Users shall not):
6.2.1. except as may be allowed by any law which is incapable of exclusion by agreement between the only users parties and except to the extent expressly permitted under this Agreement, attempt to copy, modify, republish, display, transmit, or distribute all or any portion of the Application, and Authorised Users must access the Application solely for the benefit of the Client.
5.3 To be an Authorised User, an individual must:
5.3.1 have authorisation from the Client to access and use the Application;
5.3.2 complete the registration process, and keep such registration information current during the Term; and
5.3.3 have a User ID, such as his Service in any form or her email, to enable his media or her access to the Application.
5.4 The Client is responsible for all damage and losses arising as a result of Authorised Users’ access to and use of the Application, such as, for instance, the granting of access to Candidate Data to third parties by an Authorised User in breach of this Agreement and Data Protection Legislation. Any breach of this Agreement by any Authorised User will be deemed means or attempt to be a breach of this Agreement by the Clientreverse compile, and the Client will be liable for any losses arising.
5.5 The Client shall notify Acolyte as soon as reasonably possible if the Client becomes aware of any unauthorised use of the whole disassemble, or reverse engineer all or any part of the Application by Service;
6.2.2. access all or any part of the Client’s employeesService or the Content in order to build a product or service which competes with the Service;
6.2.3. attempt to circumvent any security or access restriction features within the Service; or
6.2.4. license, contractors or officersrent, lease, transfer, assign, disclose, or anyone elseotherwise commercially exploit or make the Service available to any third party.
5.6 6.3. The Client Customer shall use all reasonable endeavours to prevent any unauthorised access to, or use of, the ApplicationService and, and in the event of any such unauthorised access or use, promptly notify AcolyteCUBE of the same.
5.7 In relation to 6.4. Customer shall ensure that the Authorised Users, Users do not use the Client
5.7.1 it shall procure that each Authorised User
5.7.2 it shall not knowingly permit anyone Content other than an Authorised User to use or access the Application;
5.7.3 each Authorised User shall keep a secure password for his use of the Application and that each Authorised User shall keep his password confidential and not share their log-in credentials with anyone else, including other Authorised Users or Client personnel;
5.7.4 authorised Users shall use only their own User IDs and never share their User ID; keep their respective User ID and password information secure and confidential; and change their password as frequently as is reasonably required by Acolyte;
5.7.5 it shall adopt and maintain reasonable security precautions for User IDs to prevent their disclosure to and use by unauthorised persons and promptly notify Acolyte upon becoming aware that the security or integrity of a User ID or password has been compromised;
5.7.6 it shall permit Acolyte to audit the Client’s use of the Application in order to establish the name and password of each Authorised User. Such audit may be conducted no more than once per year, at Acolyte’s expense, and this right shall be exercised with reasonable prior notice, in such a manner as not to substantially interfere accordance with the Client’s normal conduct terms of business;
5.7.7 if any of applicable Order Forms, this Agreement and the audits referred to in clause 5.7.6 reveal that any password has been provided to any individual who is not an Authorised User, then without prejudice to Acolyte’s other rights, Acolyte shall promptly disable such passwords and Acolyte shall not issue any new passwords to any such individualDocumentation.
5.8 The Client shall not, and shall not permit any Authorised User or third party to, access or use the Application in any way that:
5.8.1 infringes, misappropriates or violates any Intellectual Property Rights or publicity, privacy or other right of Acolyte or any third party;
5.8.2 violates any applicable laws, statutes, ordinances, rules or regulations or any judicial or administrative orders; or
5.8.3 is unlawful, harmful, threatening, defamatory, obscene, infringing, harassing or racially or ethnically offensive; facilitates illegal activity; depicts sexually explicit images; or promotes unlawful violence, discrimination based on race, gender, colour, religious belief, sexual orientation, disability, or any other illegal activities.
5.9 In addition to any other rights Acolyte may have, Acolyte may, without liability, remove or disable access by any Authorised User that violates the foregoing restrictions.
Appears in 1 contract
Samples: End User License Agreement
Authorised Users. 5.1 6.1 The Client shall designate its Authorised Users, with no limit in number, and may make changes at any time. The Client shall be responsible for maintaining formaintaining a current and accurate written list of Authorised Users and shall provide such list to Acolyte on request.
5.2 6.2 Authorised Users shall be the only users of the Application, and Authorised Users must access the Application solely for the benefit of the Client.
5.3 6.3 To be an Authorised User, ,an individual must:
5.3.1 have 6.3.1 Have authorisation from the Client client to access and use the Applicationapplication;
5.3.2 complete 6.3.2 Complete the registration process, and keep such registration information current during the Termterm; and
5.3.3 have 6.3.3 Have a User IDuser id, such as his or her email, to enable his or her access to the Applicationapplication.
5.4 6.4 The Client is responsible for all damage and losses arising as a result of Authorised Users’ access to and use of the Application, such as, for instance, the granting of access to Candidate Data to third parties by an Authorised User in breach of this Agreement and Data Protection Legislation. Any breach of this Agreement by any Authorised User will be deemed to be a breach of this Agreement by the Client, and the Client will be liable for any losses arising.
5.5 6.5 The Client shall notify Acolyte as soon as reasonably possible if the Client becomes aware of any unauthorised use of the whole or any part of the Application by any of the Client’s employees, contractors or officers, or anyone else.
5.6 6.6 The Client shall use all reasonable endeavours to prevent any unauthorised access to, or use of, the Application, and in the event of any such unauthorised access or use, promptly notify Acolyte.
5.7 6.7 In relation to the Authorised Users, the ClientClient undertakes that:
5.7.1 it 6.7.1 It shall procure that each Authorised UserUser abides by the End User Terms;
5.7.2 it 6.7.2 It shall not knowingly permit anyone other than an Authorised User to use or access the Application;
5.7.3 each 6.7.3 Each Authorised User shall keep a secure password for his use of the Application and that each Authorised User shall keep his password confidential and not share their log-in credentials with anyone else, including other Authorised Users or Client personnel;
5.7.4 authorised 6.7.4 Authorised Users shall use only their own User IDs and never share their User ID; keep their respective User ID and password information secure and confidential; and change their password as frequently as is reasonably required by Acolyte;
5.7.5 it 6.7.5 It shall adopt and maintain reasonable security precautions for User IDs to prevent their disclosure to and use by unauthorised persons and promptly notify Acolyte upon becoming aware that the security or integrity of a User ID or password has been compromised;
5.7.6 it 6.7.6 It shall permit Acolyte to audit the Client’s use of the Application in order to establish the name and password of each Authorised User. Such audit may be conducted no more than once per year, at Acolyte’s expense, and this right shall be exercised with reasonable prior notice, in such a manner as not to substantially interfere with the Client’s normal conduct of business;
5.7.7 if 6.7.7 If any of the audits referred to in clause 5.7.6 reveal that any password has been provided to any individual who is not an Authorised User, then without prejudice to Acolyte’s other rights, Acolyte shall promptly disable such passwords and Acolyte shall not issue any new passwords to any such individual.
5.8 6.8 The Client shall not, and shall not permit any Authorised User or third party to, access or use the Application in any way that:
5.8.1 infringes6.8.1 Infringes, misappropriates or violates any Intellectual Property Rights or publicity, privacy or other right of Acolyte or any third party;
5.8.2 violates 6.8.2 Violates any applicable laws, statutes, ordinances, rules or regulations or any judicial or administrative orders; or
5.8.3 is unlawful, harmful, threatening, defamatory, obscene, infringing, harassing or racially or ethnically offensive; facilitates illegal activity; depicts sexually explicit images; or promotes unlawful violence, discrimination based on race, gender, colour, religious belief, sexual orientation, disability, or any other illegal activities.
5.9 In addition to any other rights Acolyte may have, Acolyte may, without liability, remove or disable access by any Authorised User that violates the foregoing restrictions.
Appears in 1 contract
Samples: Terms of Business
Authorised Users. 5.1 The Client shall designate its Authorised Users, with no limit in number, and may make changes at any time. The Client shall be responsible for maintaining formaintaining a current and accurate written list of Authorised Users and shall provide such list to Acolyte on request.
5.2 Authorised Users shall be the only users of the Application, and Authorised Users must access the Application solely for the benefit of the Client.
5.3 To be an Authorised User, an individual mustTobeanAuthorisedUser,anindividualmust:
5.3.1 have authorisation from the Client to access and use the Application;
5.3.2 complete the registration process, and keep such registration information current during the Term; and
5.3.3 5.3.1 have a User ID, such as his or her email, to enable his or her access to the Application.
5.4 The Client is responsible for all damage and losses arising as a result of Authorised Users’ access to and use of the Application, such as, for instance, the granting of access to Candidate Data to third parties by an Authorised User in breach of this Agreement and Data Protection Legislation. Any breach of this Agreement by any Authorised User will be deemed to be a breach of this Agreement by the Client, and the Client will be liable for any losses arising.
5.5 The Client shall notify Acolyte as soon as reasonably possible if the Client becomes aware of any unauthorised use of the whole or any part of the Application by any of the Client’s employees, contractors or officers, or anyone else.
5.6 The Client shall use all reasonable endeavours to prevent any unauthorised access to, or use of, the Application, and in the event of any such unauthorised access or use, promptly notify Acolyte.
5.7 In relation to the Authorised Users, the ClientClient undertakes that:
5.7.1 it shall procure that each Authorised UserUser abides by the End User Terms;
5.7.2 it shall not knowingly permit anyone other than an Authorised User to use or access the Application;
5.7.3 each Authorised User shall keep a secure password for his use of the Application and that each Authorised User shall keep his password confidential and not share their log-log- in credentials with anyone else, including other Authorised Users or Client personnel;
5.7.4 authorised Users shall use only their own User IDs and never share their User ID; keep their respective User ID and password information secure and confidential; and change their password as frequently as is reasonably required by Acolyte;
5.7.5 it shall adopt and maintain reasonable security precautions for User IDs to prevent their disclosure to and use by unauthorised persons and promptly notify Acolyte upon becoming aware that the security or integrity of a User ID or password has been compromised;
5.7.6 it shall permit Acolyte to audit the Client’s use of the Application in order to establish the name and password of each Authorised User. Such audit may be conducted no more than once per year, at Acolyte’s expense, and this right shall be exercised with reasonable prior notice, in such a manner as not to substantially interfere with the Client’s normal conduct of business;
5.7.7 if any of the audits referred to in clause 5.7.6 reveal that any password has been provided to any individual who is not an Authorised User, then without prejudice to Acolyte’s other rights, Acolyte shall promptly disable such passwords and Acolyte shall not issue any new passwords to any such individual.
5.8 The Client shall not, and shall not permit any Authorised User or third party to, access or use the Application in any way that:
5.8.1 infringes, misappropriates or violates any Intellectual Property Rights or publicity, privacy or other right of Acolyte or any third party;
5.8.2 violates any applicable laws, statutes, ordinances, rules or regulations or any judicial or administrative orders; or
5.8.3 is unlawful, harmful, threatening, defamatory, obscene, infringing, harassing or racially or ethnically offensive; facilitates illegal activity; depicts sexually explicit images; or promotes unlawful violence, discrimination based on race, gender, colour, religious belief, sexual orientation, disability, or any other illegal activities.
5.9 In addition to any other rights Acolyte may have, Acolyte may, without liability, remove or disable access by any Authorised User that violates the foregoing restrictions.
Appears in 1 contract
Samples: Terms of Business
Authorised Users. 5.1 6.1 The Client shall designate its Authorised Users, with no limit in number, and may make changes at any time. The Client shall be responsible for maintaining a current and accurate written list of Authorised Users and shall provide such list to Acolyte on request.
5.2 6.2 Authorised Users shall be the only users of the Application, and Authorised Users must access the Application solely for the benefit of the Client.
5.3 6.3 To be an Authorised User, ,an individual must:
5.3.1 have 6.3.1 Have authorisation from the Client client to access and use the Applicationapplication;
5.3.2 complete 6.3.2 Complete the registration process, and keep such registration information current during the Termterm; and
5.3.3 have 6.3.3 Have a User IDuser id, such as his or her email, to enable his or her access to the Applicationapplication.
5.4 6.4 The Client is responsible for all damage and losses arising as a result of Authorised Users’ access to and use of the Application, such as, for instance, the granting of access to Candidate Data to third parties by an Authorised User in breach of this Agreement and Data Protection Legislation. Any breach of this Agreement by any Authorised User will be deemed to be a breach of this Agreement by the Client, and the Client will be liable for any losses arising.
5.5 6.5 The Client shall notify Acolyte as soon as reasonably possible if the Client becomes aware of any unauthorised use of the whole or any part of the Application by any of the Client’s employees, contractors or officers, or anyone else.
5.6 6.6 The Client shall use all reasonable endeavours to prevent any unauthorised access to, or use of, the Application, and in the event of any such unauthorised access or use, promptly notify Acolyte.
5.7 6.7 In relation to the Authorised Users, the ClientClient undertakes that:
5.7.1 it 6.7.1 It shall procure that each Authorised UserUser abides by the End User Terms;
5.7.2 it 6.7.2 It shall not knowingly permit anyone other than an Authorised User to use or access the Application;
5.7.3 each 6.7.3 Each Authorised User shall keep a secure password for his use of the Application and that each Authorised User shall keep his password confidential and not share their log-in credentials with anyone else, including other Authorised Users or Client personnel;
5.7.4 authorised 6.7.4 Authorised Users shall use only their own User IDs and never share their User ID; keep their respective User ID and password information secure and confidential; and change their password as frequently as is reasonably required by Acolyte;
5.7.5 it 6.7.5 It shall adopt and maintain reasonable security precautions for User IDs to prevent their disclosure to and use by unauthorised persons and promptly notify Acolyte upon becoming aware that the security or integrity of a User ID or password has been compromised;
5.7.6 it 6.7.6 It shall permit Acolyte to audit the Client’s use of the Application in order to establish the name and password of each Authorised User. Such audit may be conducted no more than once per year, at Acolyte’s expense, and this right shall be exercised with reasonable prior notice, in such a manner as not to substantially interfere with the Client’s normal conduct of business;
5.7.7 if 6.7.7 If any of the audits referred to in clause 5.7.6 reveal that any password has been provided to any individual who is not an Authorised User, then without prejudice to Acolyte’s other rights, Acolyte shall promptly disable such passwords and Acolyte shall not issue any new passwords to any such individual.
5.8 6.8 The Client shall not, and shall not permit any Authorised User or third party to, access or use the Application in any way that:
5.8.1 infringes6.8.1 Infringes, misappropriates or violates any Intellectual Property Rights or publicity, privacy or other right of Acolyte or any third party;
5.8.2 violates 6.8.2 Violates any applicable laws, statutes, ordinances, rules or regulations or any judicial or administrative orders; or
5.8.3 is unlawful, harmful, threatening, defamatory, obscene, infringing, harassing or racially or ethnically offensive; facilitates illegal activity; depicts sexually explicit images; or promotes unlawful violence, discrimination based on race, gender, colour, religious belief, sexual orientation, disability, or any other illegal activities.
5.9 In addition to any other rights Acolyte may have, Acolyte may, without liability, remove or disable access by any Authorised User that violates the foregoing restrictions.
Appears in 1 contract
Samples: Terms of Business
Authorised Users. 5.1 The Client shall designate its Authorised Users, with no limit in number, and may make changes at any time. The Client shall be responsible for maintaining a current and accurate written list of Authorised Users and shall provide such list to Acolyte on request.
5.2 Authorised Users shall be the only users of the Application, and Authorised Users must access the Application solely for the benefit of the Client.
5.3 To be an Authorised User, ,an individual must:
5.3.1 have Have authorisation from the Client to access and use the Applicationapplication;
5.3.2 complete Complete the registration process, and keep such registration information current during the Termterm; and
5.3.3 have Have a User IDuser id, such as his or her email, to enable his or her access to the Applicationapplication.
5.4 The Client is responsible for all damage and losses arising as a result of Authorised Users’ access to and use of the Application, such as, for instance, the granting of access to Candidate Data to third parties by an Authorised User in breach of this Agreement and Data Protection Legislation. Any breach of this Agreement by any Authorised User will be deemed to be a breach of this Agreement by the Client, and the Client will be liable for any losses arising.
5.5 The Client shall notify Acolyte as soon as reasonably possible if the Client becomes aware of any unauthorised use of the whole or any part of the Application by any of the Client’s employees, contractors or officers, or anyone else.
5.6 The Client shall use all reasonable endeavours to prevent any unauthorised access to, or use of, the Application, and in the event of any such unauthorised access or use, promptly notify Acolyte.
5.7 In relation to the Authorised Users, the ClientClient undertakes that:
5.7.1 it It shall procure that each Authorised UserUser abides by the End User Terms;
5.7.2 it It shall not knowingly permit anyone other than an Authorised User to use or access the Application;
5.7.3 each Each Authorised User shall keep a secure password for his use of the Application and that each Authorised User shall keep his password confidential and not share their log-in credentials with anyone else, including other Authorised Users or Client personnel;
5.7.4 authorised Authorised Users shall use only their own User IDs and never share their User ID; keep their respective User ID and password information secure and confidential; and change their password as frequently as is reasonably required by Acolyte;
5.7.5 it It shall adopt and maintain reasonable security precautions for User IDs to prevent their disclosure to and use by unauthorised persons and promptly notify Acolyte upon becoming aware that the security or integrity of a User ID or password has been compromised;
5.7.6 it It shall permit Acolyte to audit the Client’s use of the Application in order to establish the name and password of each Authorised User. Such audit may be conducted no more than once per year, at Acolyte’s expense, and this right shall be exercised with reasonable prior notice, in such a manner as not to substantially interfere with the Client’s normal conduct of business;
5.7.7 if If any of the audits referred to in clause 5.7.6 6.7.6 reveal that any password has been provided to any individual who is not an Authorised User, then without prejudice to Acolyte’s other rights, Acolyte shall promptly disable such passwords and Acolyte shall not issue any new passwords to any such individual.
5.8 The Client shall not, and shall not permit any Authorised User or third party to, access or use the Application in any way that:
5.8.1 infringesInfringes, misappropriates or violates any Intellectual Property Rights or publicity, privacy or other right of Acolyte or any third party;
5.8.2 violates Violates any applicable laws, statutes, ordinances, rules or regulations or any judicial or administrative orders; or
5.8.3 is unlawful, harmful, threatening, defamatory, obscene, infringing, harassing or racially or ethnically offensive; facilitates illegal activity; depicts sexually explicit images; or promotes unlawful violence, discrimination based on race, gender, colour, religious belief, sexual orientation, disability, or any other illegal activities.
5.9 In addition to any other rights Acolyte may have, Acolyte may, without liability, remove or disable access by any Authorised User that violates the foregoing restrictions.
Appears in 1 contract
Samples: Terms of Business
Authorised Users. 5.1 The Client shall designate its Authorised Users, with no limit in number, and may make changes at any time. The Client shall be responsible for maintaining a current and accurate written list of Authorised Users and shall provide such list to Acolyte on request.
5.2 Authorised Users shall be the only users of the Application, and Authorised Users must access the Application solely for the benefit of the Client.
5.3 To be an Authorised User, an individual must:
5.3.1 have authorisation from the Client to access and use the Application;
5.3.2 complete the registration process, and keep such registration information current during the Term; and
5.3.3 have a User ID, such as his or her email, to enable his or her access to the Application.
5.4 The Client is responsible for all damage and losses arising as a result of Authorised Users’ access to and use of the Application, such as, for instance, the granting of access to Candidate Data to third parties by an Authorised User in breach of this Agreement and Data Protection Legislation. Any breach of this Agreement by any Authorised User will be deemed to be a breach of this Agreement by the Client, and the Client will be liable for any losses arising.
5.5 The Client shall notify Acolyte as soon as reasonably possible if the Client becomes aware of any unauthorised use of the whole or any part of the Application by any of the Client’s employees, contractors or officers, or anyone else.
5.6 The Client shall use all reasonable endeavours to prevent any unauthorised access to, or use of, the Application, and in the event of any such unauthorised access or use, promptly notify Acolyte.
5.7 In relation to the Authorised Users, the ClientClient undertakes that:
5.7.1 it shall procure that each Authorised UserUser abides by the End User Terms;
5.7.2 it shall not knowingly permit anyone other than an Authorised User to use or access the Application;
5.7.3 each Authorised User shall keep a secure password for his use of the Application and that each Authorised User shall keep his password confidential and not share their log-in credentials with anyone else, including other Authorised Users or Client personnel;
5.7.4 authorised Users shall use only their own User IDs and never share their User ID; keep their respective User ID and password information secure and confidential; and change their password as frequently as is reasonably required by Acolyte;
5.7.5 it shall adopt and maintain reasonable security precautions for User IDs to prevent their disclosure to and use by unauthorised persons and promptly notify Acolyte upon becoming aware that the security or integrity of a User ID or password has been compromised;
5.7.6 it shall permit Acolyte to audit the Client’s use of the Application in order to establish the name and password of each Authorised User. Such audit may be conducted no more than once per year, at Acolyte’s expense, and this right shall be exercised with reasonable prior notice, in such a manner as not to substantially interfere with the Client’s normal conduct of business;
5.7.7 if any of the audits referred to in clause 5.7.6 reveal that any password has been provided to any individual who is not an Authorised User, then without prejudice to Acolyte’s other rights, Acolyte shall promptly disable such passwords and Acolyte shall not issue any new passwords to any such individual.
5.8 The Client shall not, and shall not permit any Authorised User or third party to, access or use the Application in any way that:
5.8.1 infringes, misappropriates or violates any Intellectual Property Rights or publicity, privacy or other right of Acolyte or any third party;
5.8.2 violates any applicable laws, statutes, ordinances, rules or regulations or any judicial or administrative orders; or
5.8.3 is unlawful, harmful, threatening, defamatory, obscene, infringing, harassing or racially or ethnically offensive; facilitates illegal activity; depicts sexually explicit images; or promotes unlawful violence, discrimination based on race, gender, colour, religious belief, sexual orientation, disability, or any other illegal activities.
5.9 In addition to any other rights Acolyte may have, Acolyte may, without liability, remove or disable access by any Authorised User that violates the foregoing restrictions.
Appears in 1 contract
Samples: Terms of Business