Authorized Access Only Sample Clauses

Authorized Access Only. ‌ Access to the Data provided by OFM will be restricted to RECIPIENT staff, officials, and agents who are authorized to access the Data and need it to perform their official duties as detailed in the Addendum under which the Data is shared.
AutoNDA by SimpleDocs
Authorized Access Only. The Customer represents, warrants, covenants, and agrees that it:
Authorized Access Only. The Customer represents, warrants, covenants, and agrees that it: (i) will only use this Service to access and view Insights for Location(s), for which the Customer is properly authorized to access and view such information; (ii) has all right, power, and authority required to access and view Insights for the Location(s) associated with the Customer’s Service platform; and (iii) will only use this Service and the Insights for the Permitted Use. The Customer is responsible, and will indemnify and hold harmless Royal Bank and its Representatives, for all Losses arising out of, or incidental to, the use, including any unauthorized use, of this Service, Service Materials, or Insights by the Customer or its Representatives, including all actions or omissions of the Customer or its Representatives. The Customer will immediately notify Royal Bank, verbally and in writing, of any Location associated with the Customer’s Service platform that was done in error or should no longer be associated with the Customer’s Service platform due to any reason, including the Customer no longer has the authority to view Insights for such Location.
Authorized Access Only. The Information Exchange System shall only be available to the Agency and any of the Agency’s employees after they have received access approval from FHI, completed all required training (including HIPAA compliance), and have executed an Authorized User Agreement (collectively, the “Authorized Users”). Agency shall submit to FHI the names and email addresses of those individuals who need to access the Information Exchange System based on their job functions. FHI shall provide Agency with such identification codes (the “Agency Name”) and login password (the “Password”, and together with the Agency Name, the “Credentials”) by which the Authorized Users may access and use the Information Exchange System. FHI may, at its discretion, add or change the security protocols, systems, or procedures to enable Agency to access the Information Exchange System, which upon implementation shall be deemed Credentials. FHI will notify Agency of any such changes. Agency shall not, directly or indirectly, provide or disclose to any third party the Credentials, or use the Credentials to provide to third parties access to or use of the Information Exchange System, and Agency shall require all Authorized Users to comply with the foregoing covenant of Agency. If an Authorized User does not access the Information Exchange System for eleven (11) consecutive business days, then such Authorized User will automatically be locked-out of the Information Exchange System and must contact his or her supervisor or FHI Technical Support to verify that his or her Information Exchange System access is still valid.

Related to Authorized Access Only

  • Authorized Access Transfer Agent shall have controls that are designed to maintain the logical separation such that access to systems hosting Fund Data and/or being used to provide services to Fund will uniquely identify each individual requiring access, grant access only to authorized personnel based on the principle of least privileges, and prevent unauthorized access to Fund Data.

  • Unauthorized Access Notification LEA shall notify Provider promptly of any known or suspected unauthorized access. LEA will assist Provider in any efforts by Provider to investigate and respond to any unauthorized access.

  • Unauthorized Access Using service to access, or to attempt to access without authority, the accounts of others, or to penetrate, or attempt to penetrate, security measures of Company’s or a third party’s computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in disruption of service or the corruption or loss of data.

  • Authorized Uses The Participating Institutions and the Authorized Users may make all use of the Licensed Materials as is consistent with the applicable law and with this Agreement, including but not limited to the following licensing conditions ("Authorized Uses"). In addition, the Licensed Materials may be used for purposes of research, education or other non-commercial use as particularly follows:

  • Limited Access If necessary for the fulfillment of the Agreement, NBU may provide the Professional with non-exclusive, limited access to NBU’s information technology infrastructure. The Professional understands and agrees to abide by NBU policies, standards, regulations and restrictions regarding access and usage of NBU’s information technology infrastructure. The Professional shall reasonably enforce such policies, standards, regulations and restrictions with all the Professional’s employees, agents or any tier of subcontractor granted access in the performance of this Agreement, and shall be granted and authorize only such access as may be necessary for the purpose of fulfilling the requirements of the Agreement. The Professional’s employees, agents and subcontractors must receive prior, written approval from NBU before being granted access to NBU’s information technology infrastructure and data and NBU, in its sole determination, shall determine accessibility and limitations thereto. The Professional agrees that the requirements of this Section shall be incorporated into all subcontractor agreements entered into by the Professional. It is further agreed that a violation of this Section shall be deemed to cause irreparable harm that justifies injunctive relief in court. A violation of this Section may result in immediate termination of this Agreement without notice.

  • Authorized Sub-processors Customer agrees that MailChimp may engage Sub- processors to process Customer Data on Customer's behalf. The Sub-processors currently engaged by MailChimp and authorized by Customer are listed in Annex A.

  • Authorized User You may request us to issue a Card to an individual who has no financial responsibility under this Agreement. An Authorized User has the same access to your Account as you do, subject to any limitations we may impose. An Authorized User has no authority to add or delete Cardholders, request a replacement Card or terminate or modify this Agreement. You may terminate an Authorized User’s authority to access your Account at any time. To do this, you must return the Card to PenFed. You agree that you are responsible for all charges and cash advances made by an Authorized User, including charges made before the Card is returned, recurring charges, or charges made without the use of the Card initiated by the Authorized User after termination of the Authorized User’s access.

  • Authorized User’s Statement of Work A competitive Mini-Bid is required for every transaction under this Centralized Contract. An Authorized User must prepare a detailed Statement of Work using Appendix F, Attachment 1, Mini-Bid Template. The Authorized User must distribute the Mini-Bid to all qualified Vendors per Lot(s) (unless a Vendor has removed itself from consideration via the Appendix F, Attachment 5, Mini-Bid Participation Interest Template). Contact information, organized by Lot, will be available on the OGS website for this Contract. An Authorized User shall conduct its Mini-Bid in accordance with the requirements set forth in Appendix F, Attachment 2, How to Use this Contract. The following terms and conditions shall apply to each Mini-Bid issued by an Authorized User:  An Authorized User may require the execution of unique forms, such as Confidentiality Non- Disclosure agreements; and  An Authorized User is required to make tentative award and non-award notifications to each Contractor who submitted a response to the Mini-Bid. Additionally, the minimum time, excluding the date of release, between issuance of the Mini-Bid by the Authorized User to the Mini-Bid Opening is as follows:  Xxx 0 Xxxx-Xxxx: Xxxx (0) Xxxxxxxx Xxxx  Xxx 0 Mini-Bids: Ten (10) Business Days

  • Authorized Use The Student Data shared pursuant to the Service Agreement, including persistent unique identifiers, shall be used for no purpose other than the Services outlined in Exhibit A or stated in the Service Agreement and/or otherwise authorized under the statutes referred to herein this DPA.

  • Originating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.

Time is Money Join Law Insider Premium to draft better contracts faster.