We use cookies on our site to analyze traffic, enhance your experience, and provide you with tailored content.

For more information visit our privacy policy.

Authorized Access and Use Sample Clauses

Authorized Access and Use. Each Offering may be accessed and used only by Authorized Users in the Territory for the Subscription Term, solely in accordance with the Entitlements and the Agreement. Customer may re-assign the entitlement to access and use the Offering from one Authorized User to another Authorized User within the same entitlement category once per calendar month. Indirect use of an Offering via hardware or software used by Customer does not reduce the number of Authorized User entitlements that Customer needs to acquire.
Authorized Access and Use. Notwithstanding Section 3.1 and 3.3 of the UCA and unless otherwise defined in the Entitlements each Offering may be accessed and used only by the number of users as defined in the Entitlement being either i) Customer’s employee or ii) Authorized Agent (all “Authorized User”) in the Territory for the Subscription Term, solely for Customer’s internal use as end- user. The Offerings including corresponding Documentation and results (e.g. reports) generated with these Offerings (in whole or in part) may not be used to provide services or products to third parties. Customer may re-assign the right to access and use the Offering between uniquely identified individual Authorized Users over time, but not so frequently as to enable sharing by multiple Authorized Users. Indirect use of an Offering via hardware or software used by Customer does not reduce the number of Authorized Users rights that Customer needs to acquire.
Authorized Access and UseSection 2.1 of the DS Terms shall be replaced by the following clause:
Authorized Access and Use. IMID and CLIENT acknowledge and agree that portions of the Site may be available on a restricted access, which may be accessible only by IMID personnel and their designees, all of whom shall be selected solely by IMID. IMID agrees to accept full responsibility for the use and access obtained to the Site through passwords authorized or issued by or to IMID and their personnel and designees. In addition, portions of the Site, on the IMID Server, may be available on a restricted access to CLIENT, CLIENT’s personnel and their designees, all of whom shall be selected solely by CLIENT and CLIENT accepts full responsibility for the use and access obtained to the Site through passwords authorized or issued by or to IMID and their personnel and designees. Other portions of the Site shall be generally available for access by the public. CLIENT understands and agrees that the character and infrastructure of the Internet is inherently insecure and subject to service interruptions and the possibility of unauthorized or malicious occurrences. CLIENT further understands and agrees that there is no assurance of privacy or security in the electronic communications made to or from the Site. CLIENT assumes all risk for, and shall hold IMID harmless from, all loss, injury or damage incurred by CLIENT caused by or resulting from actions or occurrences originating or arising at any Site, address or location other than IMID's server, including, without limitation, the unauthorized access, interception or alteration by third parties of materials or communications related to the Site.
Authorized Access and Use. Each Offering may be accessed and used only (i) by the agreed number of Users, (ii) during the Subscription Term (iv) within the Territory, provided that Customer meets its obligations with all applicable export control laws, and (v) in accordance with the Documentation and the Agreement. If the respective Entitlements and pricing model allows, Customer may re- assign the right to access and use the Offering between uniquely identified individual Authorized Users over time. Where the number of Users is restricted, Customer may not re-assign the right to access and use of the Offering so frequently as to enable sharing by multiple Authorized Users. Indirect use of an Offering via Connected Devices used by Customer does not reduce the number of Authorized hƐĞƌ͛ ƌŝŐŚƚƐ ƚŚaĂcqƚuir e. ƵƐƚŽŵĞƌ ŶĞĞĚƐ ƚŽ
Authorized Access and Use. Notwithstanding Section 3.1 and 3.3 of the UCA and unless otherwise defined in the Entitlements each Offering may be accessed and used only by the number of users as defined in the Entitlement being either Customer’s employees or service provider authorized by the Customer to act on behalf of Customer (“Authorized User”) in the Territory for the Subscription Term. Customer may re-assign the right to access and use the Offering between uniquely identified individual Authorized Users over time, but not so frequently as to enable sharing by multiple Authorized Users. Indirect use of an Offering via hardware or software used by Authorized User does not reduce the number of Authorized Users rights that Customer needs to acquire. OEM-Model In addition, Customer shall have the non-transferable, non-sublicensable, time-limited, and revocable right to permit the number of users of its customers as defined in the Entitlement (“OEM Customer”) to access and use the Offering and corresponding Documentation as part of Customer’s own services and products for OEM Customer’s internal use as end-user. For the avoidance of doubt: OEM Customer may not use the Offering including the corresponding Documentation and results (e.g., reports) generated with this Offering (in whole or in part) to provide services/products to third parties. Any use of the Offering by a Customer as part of OEM Services is subject to compliance with the Specific Terms for Customer’s OEM Services. Specific Terms for Customer’s OEM Services: OEM Contracts. Customer’s provision of OEM Services to OEM Customers requires an OEM Contract. Customer will ensure that the OEM Contracts are consistent with and no less protective of Siemens than the Agreement and will contain express provisions stating (i) Customer’s company name and address and the contact information (telephone number, e-mail address) to which any questions, complaints, or claims with respect to the OEM Services should be directed, (ii) that the contract is solely between Customer and the OEM Customer and not between Siemens and the OEM Customer, (iii) that OEM Customer will comply at all times with applicable law and the Acceptable Use Policy available at xxxxx://xxx.xxxxxxx.xxx/sw-terms/aup, (iv) that OEM Customer will comply with the stipulations in section 11 of the UCA “EXPORT CONTROL COMPLIANCE”, (v) that Siemens is a third-party beneficiary to the OEM Contract, and (vi) that the OEM Services are not designed to be used for operation of o...
Authorized Access and Use 

Related to Authorized Access and Use

  • Authorized Access Transfer Agent shall have controls that are designed to maintain the logical separation such that access to systems hosting Fund Data and/or being used to provide services to Fund will uniquely identify each individual requiring access, grant access only to authorized personnel based on the principle of least privileges, and prevent unauthorized access to Fund Data.

  • Access and Use Grantee agrees to license or otherwise make available to MassCEC in perpetuity, without charge, Xxxxxxx’s interest in and copyright (if any) to all non-confidential materials prepared and produced in relation to the Project, including, without limitation, all plans, specifications, and analyses developed in connection with the Project and specified as being for MassCEC’s use and public dissemination; provided, however, that any and all inventions that are conceived or first reduced to use during the course of the Project shall be the sole property of Grantee (except that if jointly invented, title shall flow in accordance with United States patent law), and any licensing requests for such inventions shall be subject to good faith negotiations between the Parties. Grantee represents and warrants that Deliverables will not infringe on any copyright, right of privacy, or personal or proprietary rights of others.

  • Authorized Uses The Participating Institutions and the Authorized Users may make all use of the Licensed Materials as is consistent with the applicable law and with this Agreement, including but not limited to the following licensing conditions ("Authorized Uses"). In addition, the Licensed Materials may be used for purposes of research, education or other non-commercial use as particularly follows:

  • Unauthorized Access Notification XXX shall notify Provider promptly of any known unauthorized access. XXX will assist Provider in any efforts by Provider to investigate and respond to any unauthorized access.

  • Authorized Use The Student Data shared pursuant to the Service Agreement, including persistent unique identifiers, shall be used for no purpose other than the Services outlined in Exhibit A or stated in the Service Agreement and/or otherwise authorized under the statutes referred to herein this DPA.

  • Unauthorized Access Using service to access, or to attempt to access without authority, the accounts of others, or to penetrate, or attempt to penetrate, security measures of Company’s or a third party’s computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in disruption of service or the corruption or loss of data.

  • Zone File Access Agreement Registry Operator will enter into an agreement with any Internet user, which will allow such user to access an Internet host server or servers designated by Registry Operator and download zone file data. The agreement will be standardized, facilitated and administered by a Centralized Zone Data Access Provider, which may be ICANN or an ICANN designee (the “CZDA Provider”). Registry Operator (optionally through the CZDA Provider) will provide access to zone file data per Section 2.1.3 of this Specification and do so using the file format described in Section 2.1.4 of this Specification. Notwithstanding the foregoing, (a) the CZDA Provider may reject the request for access of any user that does not satisfy the credentialing requirements in Section 2.1.2 below; (b) Registry Operator may reject the request for access of any user that does not provide correct or legitimate credentials under Section 2.1.2 below or where Registry Operator reasonably believes will violate the terms of Section 2.1.5. below; and, (c) Registry Operator may revoke access of any user if Registry Operator has evidence to support that the user has violated the terms of Section 2.1.5 below.

  • Data Ownership and Authorized Access 1. Student Data Property of LEA. All Student Data transmitted to the Provider pursuant to the Service Agreement is and will continue to be the property of and under the control of the LEA. The Provider further acknowledges and agrees that all copies of such Student Data transmitted to the Provider, including any modifications or additions or any portion thereof from any source, are subject to the provisions of this DPA in the same manner as the original Student Data. The Parties agree that as between them, all rights, including all intellectual property rights in and to Student Data contemplated per the Service Agreement, shall remain the exclusive property of the LEA. For the purposes of FERPA, the Provider shall be considered a School Official, under the control and direction of the LEA as it pertains to the use of Student Data, notwithstanding the above.