DMAC Access Sample Clauses

DMAC Access. REGION 7 ESC provides a suite of Internet hosted, multi-user software applications known as DMAC Solutions that is resident on REGION 7 ESC’s servers, that is accessible through an Internet portal maintained by REGION 7 ESC and that permits Authorized Users with appropriate software, data input and connectivity to access purchased modules. Licensee may accomplish tasks using DMAC by establishing an Internet link with REGION 7 ESC’s Internet server, by entering or posting data using that link and by requesting and receiving Processed Data using that link. REGION 7 ESC shall permit Licensee, through the Authorized Users designated by Licensee, to access and use DMAC on a non-exclusive basis, subject to the terms of this Agreement and provided that REGION 7 ESC may restrict or condition access and use at any time if it reasonably believes that such continued access or use will imminently and materially disrupt, degrade or injure continued function or use of DMAC with respect to other REGION 7 ESC Licensees.
AutoNDA by SimpleDocs

Related to DMAC Access

  • ICANN Access Registry Operator shall provide bulk access to the zone files for the TLD to ICANN or its designee on a continuous basis in the manner ICANN may reasonably specify from time to time. Access will be provided at least daily. Zone files will include SRS data committed as close as possible to 00:00:00 UTC.

  • System Access CUSTOMER agrees to provide to PROVIDER, at CUSTOMER’S expense, necessary access to the mainframe computer and related information technology systems (the “System”) on which CUSTOMER data is processed during the times (the “Service Hours”) specified in the PSAs, subject to reasonable downtime for utility outages, maintenance, performance difficulties and the like. In the event of a change in the Service Hours, CUSTOMER will provide PROVIDER with at least fifteen (15) calendar days written notice of such change.

  • User Access Transfer Agent shall have a process to promptly disable access to Fund Data by any Transfer Agent personnel who no longer requires such access. Transfer Agent will also promptly remove access of Fund personnel upon receipt of notification from Fund.

  • Network Access TENANT may find it necessary to purchase a network interface card, wireless PC card or other hardware in order to connect to the internet service. LANDLORD is not responsible for the purchase of these items and LANDLORD cannot guarantee compatibility with any device TENANT may have. The computer and network card must have software installed that supports the Internet Protocol commonly referred to as TCP/IP. Any conflicts between the software compatibility of the network and the TENANT’S computer operating system or any other feature will be the responsibility of the TENANT to resolve. LANDLORD will not be responsible for software issues related to the user’s personal computer.

  • Cash Access You may not use the Gift Card to obtain cash from an Automated Teller Machine (“ATM”), Point-of-Sale (“POS”) device, or by any other means. You may not use the Gift Card at an ATM. Loading The Gift Card The Gift Card is not reloadable after being loaded at the time of purchase. Personal checks, cashier’s checks, and money orders sent to the Issuer are not an acceptable form of loading. Any checks and money orders sent to the Issuer for loading will be returned unless the full amount may be applied towards a negative balance, in which case the check or money order may or may not be loaded at the discretion of the Issuer. The maximum dollar value of the Gift Card is printed on the front side of the Gift Card packaging. These are the limits associated with loading the Gift Card: Transaction Type Frequency and/or Dollar Limits Initial Load One time $20.00 up to $500.00 For Gift Card balance information, please call 0-000-000-0000 or visit XxxxxxxXxxx.xxx.

  • Service Access Access to the clinical parts of our Site is restricted to Users. Users of our Site are provided with unique User IDs by the Clinic with which they are associated and must choose a password of their choice to sign on to our Site. Users must provide personal contact information, and you must ensure that your information is kept up to date at all times. User IDs and passwords constitute an electronic signature and will be used by us to authenticate access to our Site. If a User opts to sign onto Xxxxxx.xxx, the User will be able to take advantage of the non- public sections of our Site. If a User opts not to sign onto our Site, their access to our Site will be restricted to the public sections of our Site only. If you are provided with a User ID, password or any other piece of information as part of our security procedures, you must treat such information as confidential, and you must not disclose it to any third party. We have the right to disable any User ID at any time, if in our opinion, you have failed to comply with any of the provisions of this Agreement. You may only use our Site as set out in this Agreement. Any illegal or unauthorized use of our Site shall constitute a violation of this Agreement. You do not have permission to access our Site in any way that violates this Agreement or breaches any applicable law. You agree to keep your and your Patients’ Data accurate, current and complete. You may print off or download extracts of page(s) from our Site for your use in Patient care or insertion into a Patient’s electronic health records only.

  • EU Access SAP will use only European Subprocessors to provide support requiring access to Personal Data in the Cloud Service and SAP shall not export Personal Data outside of the EEA or Switzerland unless expressly authorized by Customer in writing (e-mail permitted) on a case by case basis; or as excluded under Section 9.4.

  • Data Access Access to Contract and State Data The Contractor shall provide to the Client Agency access to any data, as defined in Conn. Gen Stat. Sec. 4e-1, concerning the Contract and the Client Agency that are in the possession or control of the Contractor upon demand and shall provide the data to the Client Agency in a format prescribed by the Client Agency and the State Auditors of Public Accounts at no additional cost.

  • Customer Access The Customer is responsible for the access to the Cloud Services and is responsible for maintaining the confidentiality of its access methods such as usernames and passwords and agrees to notify the Supplier via the Cloud Services support channel if a password is compromised. The Customer is responsible for all activities that occur under its Account.

  • Open Access Same-Time Information System (OASIS): The information system and standards of conduct contained in Part 37 and Part 38 of the Commission’s regulations and all additional requirements implemented by subsequent Commission orders dealing with OASIS.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!