Unauthorized Access Using service to access, or to attempt to access without authority, the accounts of others, or to penetrate, or attempt to penetrate, security measures of Company’s or a third party’s computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in disruption of service or the corruption or loss of data.
Authorized Uses The Participating Institutions and the Authorized Users may make all use of the Licensed Materials as is consistent with the applicable law and with this Agreement, including but not limited to the following licensing conditions ("Authorized Uses"). In addition, the Licensed Materials may be used for purposes of research, education or other non-commercial use as particularly follows:
Unauthorized Access Notification XXX shall notify Provider promptly of any known unauthorized access. XXX will assist Provider in any efforts by Provider to investigate and respond to any unauthorized access.
Authorized User You may request us to issue a Card to an individual who has no financial responsibility under this Agreement. An Authorized User has the same access to your Account as you do, subject to any limitations we may impose. An Authorized User has no authority to add or delete Cardholders, request a replacement Card or terminate or modify this Agreement. You may terminate an Authorized User’s authority to access your Account at any time. To do this, you must return the Card to PenFed. You agree that you are responsible for all charges and cash advances made by an Authorized User, including charges made before the Card is returned, recurring charges, or charges made without the use of the Card initiated by the Authorized User after termination of the Authorized User’s access.
Authorized Use The Student Data shared pursuant to the Service Agreement, including persistent unique identifiers, shall be used for no purpose other than the Services outlined in Exhibit A or stated in the Service Agreement and/or otherwise authorized under the statutes referred to herein this DPA.
Authorized Users Authorized Users" are:
Limited Access If necessary for the fulfillment of the Agreement, NBU may provide the Professional with non-exclusive, limited access to NBU’s information technology infrastructure. The Professional understands and agrees to abide by NBU policies, standards, regulations and restrictions regarding access and usage of NBU’s information technology infrastructure. The Professional shall reasonably enforce such policies, standards, regulations and restrictions with all the Professional’s employees, agents or any tier of subcontractor granted access in the performance of this Agreement, and shall be granted and authorize only such access as may be necessary for the purpose of fulfilling the requirements of the Agreement. The Professional’s employees, agents and subcontractors must receive prior, written approval from NBU before being granted access to NBU’s information technology infrastructure and data and NBU, in its sole determination, shall determine accessibility and limitations thereto. The Professional agrees that the requirements of this Section shall be incorporated into all subcontractor agreements entered into by the Professional. It is further agreed that a violation of this Section shall be deemed to cause irreparable harm that justifies injunctive relief in court. A violation of this Section may result in immediate termination of this Agreement without notice.