Authorized Access and Use Sample Clauses

Authorized Access and Use. Notwithstanding Section 3.1 and 3.3 of the UCA and unless otherwise defined in the Entitlements each Offering may be accessed and used only by the number of users as defined in the Entitlement being either i) Customer’s employee or ii) Authorized Agent (all “Authorized User”) in the Territory for the Subscription Term, solely for Customer’s internal use as end- user. The Offerings including corresponding Documentation and results (e.g. reports) generated with these Offerings (in whole or in part) may not be used to provide services or products to third parties. Customer may re-assign the right to access and use the Offering between uniquely identified individual Authorized Users over time, but not so frequently as to enable sharing by multiple Authorized Users. Indirect use of an Offering via hardware or software used by Customer does not reduce the number of Authorized Users rights that Customer needs to acquire.
AutoNDA by SimpleDocs
Authorized Access and Use. Section 2.1 of the DS Terms shall be replaced by the following clause:
Authorized Access and Use. Each Offering may be accessed and used only by Authorized Users in the Territory for the Subscription Term, solely in accordance with the Entitlements and the Agreement. Customer may re-assign the entitlement to access and use the Offering from one Authorized User to another Authorized User within the same entitlement category once per calendar month. Indirect use of an Offering via hardware or software used by Customer does not reduce the number of Authorized User entitlements that Customer needs to acquire.
Authorized Access and Use. IMID and CLIENT acknowledge and agree that portions of the Site may be available on a restricted access, which may be accessible only by IMID personnel and their designees, all of whom shall be selected solely by IMID. IMID agrees to accept full responsibility for the use and access obtained to the Site through passwords authorized or issued by or to IMID and their personnel and designees. In addition, portions of the Site, on the IMID Server, may be available on a restricted access to CLIENT, CLIENTʼs personnel and their designees, all of whom shall be selected solely by CLIENT and CLIENT accepts full responsibility for the use and access obtained to the Site through passwords authorized or issued by or to IMID and their personnel and designees. Other portions of the Site shall be generally available for access by the public. CLIENT understands and agrees that the character and infrastructure of the Internet is inherently insecure and subject to service interruptions and the possibility of unauthorized or malicious occurrences. CLIENT further understands and agrees that there is no assurance of privacy or security in the electronic communications made to or from the Site. CLIENT assumes all risk for, and shall hold IMID harmless from, all loss, injury or damage incurred by CLIENT caused by or resulting from actions or occurrences originating or arising at any Site, address or location other than IMID's server, including, without limitation, the unauthorized access, interception or alteration by third parties of materials or communications related to the Site.
Authorized Access and Use. Each Offering may be accessed and used only (i) by the agreed number of Users, (ii) during the Subscription Term (iv) within the Territory, provided that Customer meets its obligations with all applicable export control laws, and (v) in accordance with the Documentation and the Agreement. If the respective Entitlements and pricing model allows, Customer may re- assign the right to access and use the Offering between uniquely identified individual Authorized Users over time. Where the number of Users is restricted, Customer may not re-assign the right to access and use of the Offering so frequently as to enable sharing by multiple Authorized Users. Indirect use of an Offering via Connected Devices used by Customer does not reduce the number of Authorized hƐĞƌ͛ ƌŝŐŚƚƐ ƚŚaĂcqƚuir e. ƵƐƚŽŵĞƌ ŶĞĞĚƐ ƚŽ
Authorized Access and Use. Notwithstanding Section 3.1 and 3.3 of the UCA and unless otherwise defined in the Entitlements each Offering may be accessed and used only by the number of users as defined in the Entitlement being either Customer’s employees or service provider authorized by the Customer to act on behalf of Customer (“Authorized User”) in the Territory for the Subscription Term. Customer may re-assign the right to access and use the Offering between uniquely identified individual Authorized Users over time, but not so frequently as to enable sharing by multiple Authorized Users. Indirect use of an Offering via hardware or software used by Authorized User does not reduce the number of Authorized Users rights that Customer needs to acquire. OEM-Model In addition, Customer shall have the non-transferable, non-sublicensable, time-limited, and revocable right to permit the number of users of its customers as defined in the Entitlement (“OEM Customer”) to access and use the Offering and corresponding Documentation as part of Customer’s own services and products for OEM Customer’s internal use as end-user. For the avoidance of doubt: OEM Customer may not use the Offering including the corresponding Documentation and results (e.g., reports) generated with this Offering (in whole or in part) to provide services/products to third parties. Any use of the Offering by a Customer as part of OEM Services is subject to compliance with the Specific Terms for Customer’s OEM Services. Specific Terms for Customer’s OEM Services: OEM Contracts. Customer’s provision of OEM Services to OEM Customers requires an OEM Contract. Customer will ensure that the OEM Contracts are consistent with and no less protective of Siemens than the Agreement and will contain express provisions stating (i) Customer’s company name and address and the contact information (telephone number, e-mail address) to which any questions, complaints, or claims with respect to the OEM Services should be directed, (ii) that the contract is solely between Customer and the OEM Customer and not between Siemens and the OEM Customer, (iii) that OEM Customer will comply at all times with applicable law and the Acceptable Use Policy available at xxxxx://xxx.xxxxxxx.xxx/sw-terms/aup, (iv) that OEM Customer will comply with the stipulations in section 11 of the UCA “EXPORT CONTROL COMPLIANCE”, (v) that Siemens is a third-party beneficiary to the OEM Contract, and (vi) that the OEM Services are not designed to be used for operation of o...
Authorized Access and Use 
AutoNDA by SimpleDocs

Related to Authorized Access and Use

  • Access and Use 1. Each Party shall ensure that any service supplier of the other Party is accorded access to and use of public telecommunications transport networks and services in a timely fashion, on transparent, reasonable and nondiscriminatory terms and conditions. This obligation shall be applied, inter alia, through paragraphs 2 through 6. 2. Each Party shall ensure that service suppliers of the other Party have access to and use of any public telecommunications transport network or service offered within or across the border of that Party, including private leased circuits, and to this end shall ensure, subject to the provisions of paragraphs 5 and 6, that such suppliers are permitted: (a) to purchase or lease and attach terminal or other equipment which interfaces with the network and which is necessary to supply their services; (b) to interconnect private leased or owned circuits with public telecommunications transport networks and services or with circuits leased or owned by other service suppliers; (c) to use operating protocols of their choice in the supply of any service, other than as necessary to ensure the availability of telecommunications transport networks and services to the public generally; and (d) to perform switching, signaling and processing functions. 3. Each Party shall ensure that service suppliers of the other Party may use public telecommunications transport networks and services for the movement of information 4. Notwithstanding the provisions of paragraph 3, a Party may take such measures as are necessary: (a) to ensure the security and confidentiality of messages; or (b) to protect the personal data of users of public telecommunications transport networks or services, subject to the requirement that such measures are not applied in a manner which would constitute a means of arbitrary or unjustifiable discrimination or a disguised restriction on trade in services. 5. Each Party shall ensure that no condition is imposed on access to and use of public telecommunications transport networks and services other than as necessary: (a) to safeguard the public service responsibilities of suppliers of public telecommunications transport networks and services, in particular their ability to make their networks or services available to the public generally; or (b) to protect the technical integrity of public telecommunications transport networks or services.

  • Unauthorized Access Notification XXX shall notify Provider promptly of any known unauthorized access. XXX will assist Provider in any efforts by Provider to investigate and respond to any unauthorized access.

  • Authorized Use The Student Data shared pursuant to the Service Agreement, including persistent unique identifiers, shall be used for no purpose other than the Services outlined in Exhibit A or stated in the Service Agreement and/or otherwise authorized under the statutes referred to herein this DPA.

  • Data Ownership and Authorized Access 1. Student Data Property of LEA. All Student Data transmitted to the Provider pursuant to the Service Agreement is and will continue to be the property of and under the control of the LEA. The Provider further acknowledges and agrees that all copies of such Student Data transmitted to the Provider, including any modifications or additions or any portion thereof from any source, are subject to the provisions of this DPA in the same manner as the original Student Data. The Parties agree that as between them, all rights, including all intellectual property rights in and to Student Data contemplated per the Service Agreement, shall remain the exclusive property of the LEA. For the purposes of FERPA, the Provider shall be considered a School Official, under the control and direction of the LEA as it pertains to the use of Student Data, notwithstanding the above.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!