Authorized Access and Use Sample Clauses

Authorized Access and Use. IMID and CLIENT acknowledge and agree that portions of the Site may be available on a restricted access, which may be accessible only by IMID personnel and their designees, all of whom shall be selected solely by IMID. IMID agrees to accept full responsibility for the use and access obtained to the Site through passwords authorized or issued by or to IMID and their personnel and designees. In addition, portions of the Site, on the IMID Server, may be available on a restricted access to CLIENT, CLIENT’s personnel and their designees, all of whom shall be selected solely by CLIENT and CLIENT accepts full responsibility for the use and access obtained to the Site through passwords authorized or issued by or to IMID and their personnel and designees. Other portions of the Site shall be generally available for access by the public. CLIENT understands and agrees that the character and infrastructure of the Internet is inherently insecure and subject to service interruptions and the possibility of unauthorized or malicious occurrences. CLIENT further understands and agrees that there is no assurance of privacy or security in the electronic communications made to or from the Site. CLIENT assumes all risk for, and shall hold IMID harmless from, all loss, injury or damage incurred by CLIENT caused by or resulting from actions or occurrences originating or arising at any Site, address or location other than IMID's server, including, without limitation, the unauthorized access, interception or alteration by third parties of materials or communications related to the Site.
AutoNDA by SimpleDocs
Authorized Access and Use. Each Offering may be accessed and used only by Authorized Users in the Territory for the Subscription Term, solely in accordance with the Entitlements and the Agreement. Customer may re-assign the entitlement to access and use the Offering from one Authorized User to another Authorized User within the same entitlement category once per calendar month. Indirect use of an Offering via hardware or software used by Customer does not reduce the number of Authorized User entitlements that Customer needs to acquire.
Authorized Access and Use. Notwithstanding Section 3.1 and 3.3 of the UCA and unless otherwise defined in the Entitlements each Offering may be accessed and used only by one employee of Customer (“Authorized User”) in the Territory for the Subscription Term, solely for Customer’s internal use as end-user. The Offering including corresponding Documentation and results (e.g., reports) generated with this Offering (in whole or in part) may not be used to provide services or products to third parties. Customer may re- assign the right to access and use the Offering between uniquely identified individual Authorized Users over time, but not so frequently as to enable sharing by multiple Authorized Users. Indirect use of an Offering via hardware or software used by Customer does not reduce the number of Authorized User’ rights that Customer needs to acquire.
Authorized Access and Use. Section 2.1 of the DS Terms shall be replaced by the following clause:
Authorized Access and Use 

Related to Authorized Access and Use

  • Authorized Access Transfer Agent shall have controls that are designed to maintain the logical separation such that access to systems hosting Fund Data and/or being used to provide services to Fund will uniquely identify each individual requiring access, grant access only to authorized personnel based on the principle of least privileges, and prevent unauthorized access to Fund Data.

  • Access and Use 1. Each Party shall ensure that enterprises of the other Party have access to and use of any public telecommunications network or service, including leased circuits, offered in its territory or across its borders on a timely basis and on terms and conditions that are reasonable and non-discriminatory such as those set out in paragraphs 2 to 6.

  • Authorized Uses The Participating Institutions and the Authorized Users may make all use of the Licensed Materials as is consistent with the applicable law and with this Agreement, including but not limited to the following licensing conditions ("Authorized Uses"). In addition, the Licensed Materials may be used for purposes of research, education or other non-commercial use as particularly follows:

  • Unauthorized Access Notification LEA shall notify Provider promptly of any known or suspected unauthorized access. LEA will assist Provider in any efforts by Provider to investigate and respond to any unauthorized access.

  • Authorized Use The Student Data shared pursuant to the Service Agreement, including persistent unique identifiers, shall be used for no purpose other than the Services outlined in Exhibit A or stated in the Service Agreement and/or otherwise authorized under the statutes referred to herein this DPA.

  • Authorized User You may request us to issue a Card to an individual who has no financial responsibility under this Agreement. An Authorized User has the same access to your Account as you do, subject to any limitations we may impose. An Authorized User has no authority to add or delete Cardholders, request a replacement Card or terminate or modify this Agreement. You may terminate an Authorized User’s authority to access your Account at any time. To do this, you must return the Card to PenFed. You agree that you are responsible for all charges and cash advances made by an Authorized User, including charges made before the Card is returned, recurring charges, or charges made without the use of the Card initiated by the Authorized User after termination of the Authorized User’s access.

  • Zone File Access Agreement Registry Operator will enter into an agreement with any Internet user, which will allow such user to access an Internet host server or servers designated by Registry Operator and download zone file data. The agreement will be standardized, facilitated and administered by a Centralized Zone Data Access Provider, which may be ICANN or an ICANN designee (the “CZDA Provider”). Registry Operator (optionally through the CZDA Provider) will provide access to zone file data per Section 2.1.3 of this Specification and do so using the file format described in Section 2.1.4 of this Specification. Notwithstanding the foregoing, (a) the CZDA Provider may reject the request for access of any user that does not satisfy the credentialing requirements in Section 2.1.2 below; (b) Registry Operator may reject the request for access of any user that does not provide correct or legitimate credentials under Section 2.1.2 below or where Registry Operator reasonably believes will violate the terms of Section 2.1.5. below; and, (c) Registry Operator may revoke access of any user if Registry Operator has evidence to support that the user has violated the terms of Section 2.1.5 below.

  • Data Ownership and Authorized Access 1. Student Data Property of LEA. All Student Data transmitted to the Provider pursuant to the Service Agreement is and will continue to be the property of and under the control of the LEA. The Provider further acknowledges and agrees that all copies of such Student Data transmitted to the Provider, including any modifications or additions or any portion thereof from any source, are subject to the provisions of this DPA in the same manner as the original Student Data. The Parties agree that as between them, all rights, including all intellectual property rights in and to Student Data contemplated per the Service Agreement, shall remain the exclusive property of the LEA. For the purposes of FERPA, the Provider shall be considered a School Official, under the control and direction of the LEA as it pertains to the use of Student Data, notwithstanding the above.

Time is Money Join Law Insider Premium to draft better contracts faster.