Granting Access Sample Clauses

Granting Access. To obtain access via VPN, the Agency and Authorized Party must be sponsored by a party currently employed at Collin County and IT must agree this access is needed for the Collin County information systems. The Agency and Authorized Party must sign this form agreeing to protect the security of the Collin County network. For external Authorized Parties, the Request for VPN Access must be signed and approved by the Manager who is responsible for the external Authorized Party’s use. VPN expiration will be based on the contract length unless further time is requested by Collin County Management. The initial setup and testing will be performed during normal operating hours, Monday – Friday, 8 am – 5 pm, and requires a minimal of two weeksnotice to schedule.
AutoNDA by SimpleDocs
Granting Access. To obtain access via REMOTE ACCESS, the Agency and Authorized Party must be sponsored by a party currently employed at Collin County and IT must agree this access is needed for the Collin County information systems. The Agency and Authorized Party must sign this form agreeing to protect the security of the Collin County network. For external Authorized Parties, the Request for REMOTE ACCESS must be signed and approved by the Manager who is responsible for the external Authorized Party’s use. REMOTE ACCESS expiration will be based on the contract length unless further time is requested by Collin County Management. The initial setup and testing will be performed during normal operating hours, Monday – Friday, 8 am – 5 pm, and requires a minimal of two weeksnotice to schedule.
Granting Access. (a) The Vendor acknowledges that access to the System is granted for the exclusive convenience of the House and may be denied or withdrawn at will by the CAO, with or without cause. (b) If the CAO i s not satisfied with the Vendor's performance, the CAO may terminate the Agreement, pursuant to Section 9. (c) Ifthe Vendor fails to (i) comply with this Agreement , (ii) comply with the policies, rules and regulations of the House, or (iii) take the necessary action to ensure future performance in compliance with any of the foregoing, the CAO may, in addition to any other remedies specified elsewhere herein or available under applicable law, the CAO may revoke Vendor's access to the House information network; or may delay or deny a request for payment for any services to the House (or an office of the House) until the applicable issue is remedied. (d) In the event that the CAO denies or withdraws access to the System (or terminates this Agreement), the CAO will promptly notify the Vendor by email or by any other communication method set forth in Section 4(a). If appropriate, the CAO will notify the Vendor of the cause and what the Vendor may do to remedy the situation.
Granting Access a. That upon execution of the contract, the contractor will provide the Contract Manager a list of all contractor’s employees or subcontractor staff that will require access to Department facilities, confidential or sensitive information, or information systems. The list should include the following information: • Name, telephone number, email address, work location, access desired, justification, and the effective date of the desired access for each person listed. b. That any time during the life of the contract, the contractor may submit a request for additional contractor’s employees or subcontractor staff to be granted access to Department facilities, confidential or sensitive information, or information systems. The list should include the same information listed in above. c. That resources and facilities to which specific authorized access may be requested include but are not limited to: • Office Buildings, • Restricted Rooms within Office Buildings, • Restricted Data, • Department Intranet, • Department Network, and • Data Management Systems such as FLORIDA, CAMS and SUNTAX. d. Upon receipt of the list, the Department Contract Manager will determine the appropriateness of each access request and work with the contractor to have the appropriate accesses granted. e. That contractor’s employees and subcontractor staff may be required to sign Department or other agency security forms to gain access. Additionally, they may be required to view security videos, take on-line or instructor-led training, and review Department policies. f. That access will not be granted to contractors’ employees and subcontractor staff until criminal history record check results have been received and deemed satisfactory by the Department. g. That contractor’s employees and subcontractor staff must not share user names, passwords, or security devices for access to Department information resources or facilities. The Department will terminate access and may initiate other contractual remedies if sharing occurs.
Granting Access. 2.1 Following receipt: (a) of a fully completed Data Request Form; (b) confirmation from all Co-Investigators that they agree to the Co-Investigator Access Terms and Conditions (found here: insert URL). Instructions will be emailed to your Co- Investigators who will be required to read and confirm acceptance of the Co-Investigator Access Terms and Conditions; and (c) any other information the University requests from you to allow the University to consider your request for access to the Data (i.e., further information regarding data management), the University will use reasonable endeavours to provide you with a decision regarding the outcome of your Data Request Form within three (3) weeks, however you acknowledge this may be longer period. 2.2 The University may deny a request under a Data Request Form for the following reasons:‌ (a) you intend for the Data to be used for any purpose that is not for research or teaching; (b) you intend (or the University believe you may intend) to use the Data for a commercial purpose; (c) you are not a researcher with an ORCID; (d) the University has previously granted access to the Data for a research project that is the same or substantially similar to your intended Approved Research; (e) you are not affiliated to a university or research institute; (f) the request form is incomplete or incorrect; (g) the University considers (in its reasonable opinion) that the Data being requested does not align with the Approved Research; or (h) the University considers (in its reasonable opinion) that your information provided around data management is insufficient or unsatisfactory. 2.3 Clause 2.2 is not intended to limit the reasons that the University may deny a request under a Data Request Form and you acknowledge the University retains the right to grant or deny any request in its sole and absolute discretion. 2.4 Following consideration of your Data Request Form, the University will: (a) send you Data Access Approval via email; or (b) notify you via email that it has declined your request for data. 2.5 If you receive Data Access Approval, you will be emailed confirmation that you and the Co- Investigators have been granted access to the Data, and the University will make the Data available for download via your EMOTE account.
Granting Access 

Related to Granting Access

  • Additional Access Rights For the avoidance of doubt any grant of Access Rights not covered by the Grant Agreement or this Consortium Agreement shall be at the absolute discretion of the owning Party and subject to such terms and conditions as may be agreed between the owning and receiving Parties.

  • Union Access The Union shall have reasonable access to all work locations to verify that the terms and conditions of this Agreement are being carried out and for the purpose of conferring with employees, provided that access shall be subject to such rules and regulations immediately below, as well as to such rules and regulations as may be agreed to by the department and the union. Union access to work locations will not disrupt or interfere with a department’s mission and services or involve any political activities.

  • Restricted Access (a) Buyer agrees that the Facilities themselves contain Seller’s valuable trade secrets. Buyer agrees (i) to restrict the use of such information to matters relating to the Facilities, and (ii) to restrict access to such information as provided in Section 10.3(b). (b) Seller’s Confidential Information will not be reproduced without Seller’s prior written consent, and following termination of this Agreement all copies of such written information will be returned to Seller upon written request (not to be made while materials are still of use to the operation of a Facility and no Buyer Default has occurred and is continuing), unless otherwise agreed by the Parties. Buyer’s Confidential Information will not be reproduced by Seller without Buyer’s prior written consent, and following termination of this Agreement all copies of such written information will be returned to Buyer upon written request or shall be certified by Seller as having been destroyed. (c) Subject to ARTICLE XI and Section 10.2(a) and (b) hereof, the Facilities are offered for sale and are sold by Seller subject to the condition that such sale does not convey any license, expressly or by implication, to manufacture, reverse engineer, duplicate or otherwise copy or reproduce any part of the Facilities, documentation or Software without Seller’s express advance written permission. Subject to ARTICLE XI hereof, Buyer agrees not to remove the covering, not to access the interior or to reverse engineer, or cause or knowingly allow any third party to open, access the interior or reverse engineer any Facility or Software provided by Seller. Subject to ARTICLE XI hereof, and anything contemplated pursuant to this Agreement, only Seller or its authorized representatives may open or access the interior of a Facility. Notwithstanding the foregoing or anything else herein to the contrary, and without limitation of the rights set forth in ARTICLE XI hereof, if any Facility is no longer covered by this Agreement or another agreement between Buyer and Seller (or any Affiliate of Seller) regarding the operation and maintenance of such Facility, Buyer shall be entitled to maintain, or cause a third party to maintain, such Facility, including replacing parts or components as needed or desired; provided that Buyer shall use commercially reasonable efforts to engage a third party to provide such maintenance that is not a competitor of Seller or its Affiliates and is not in litigation or other material dispute with Seller.

  • ICANN Access Registry Operator shall provide bulk access to the zone files for the TLD to ICANN or its designee on a continuous basis in the manner ICANN may reasonably specify from time to time. Access will be provided at least daily. Zone files will include SRS data committed as close as possible to 00:00:00 UTC.

  • Information Access Each Party (“Disclosing Party”) shall make available to another Party (“Requesting Party”) information that is in the possession of the Disclosing Party and is necessary in order for the Requesting Party to: (i) verify the costs incurred by the Disclosing Party for which the Requesting Party is responsible under this Agreement; and (ii) carry out its obligations and responsibilities under this Agreement. The Parties shall not use such information for purposes other than those set forth in this Article 25.1 of this Agreement and to enforce their rights under this Agreement.

  • User Access Transfer Agent shall have a process to promptly disable access to Fund Data by any Transfer Agent personnel who no longer requires such access. Transfer Agent will also promptly remove access of Fund personnel upon receipt of notification from Fund.

  • Collateral Access Agreements Such Grantor shall use commercially reasonable efforts to obtain a Collateral Access Agreement, from the lessor of each leased property, mortgagee of owned property or bailee or consignee with respect to the operator of any warehouse, processor or converter facility or other location (each of which is identified on Exhibit B hereto), where Collateral in excess of $1,000,000 is stored or located at any given time (other than (i) company-owned facilities and (ii) retail stores), which agreement or letter shall provide access rights, contain a waiver or subordination of all Liens or claims that the landlord, mortgagee, bailee or consignee may assert against the Collateral at that location, and shall otherwise be reasonably satisfactory in form and substance to the Administrative Agent. With respect to such locations or warehouse space leased as of the Effective Date and thereafter where Collateral in excess of $1,000,000 is stored or located (other than (i) company-owned facilities and (ii) retail stores), if the Administrative Agent has not received a Collateral Access Agreement as of the Effective Date (or, if later as of the date such location is acquired or leased), the Borrower’s Eligible Inventory at that location shall be subject to such Reserves as may be established by the Administrative Agent. After the Effective Date, no real property or warehouse space shall be leased by such Grantor (other than retail stores) and no Inventory shall be shipped to a processor or converter under arrangements established after the Effective Date, unless and until a satisfactory Collateral Access Agreement shall first have been obtained with respect to such location or if it has not been obtained, the Borrower’s Eligible Inventory at that location shall be subject to the establishment of Reserves acceptable to the Administrative Agent. Such Grantor shall timely and fully pay and perform its obligations under all leases and other agreements with respect to each leased location or third party warehouse where any Collateral is or may be located.

  • Passwords and Employee Access Provider shall secure usernames, passwords, and any other means of gaining access to the Services or to Student Data, at a level suggested by Article 4.3 of NIST 800-63-3. Provider shall only provide access to Student Data to employees or contractors that are performing the Services. Employees with access to Student Data shall have signed confidentiality agreements regarding said Student Data. All employees with access to Student Records shall pass criminal background checks.

  • Additional Acceptable Uses of Student Data Contractor is prohibited from using Student Data for any secondary use not described in this agreement except: a. for adaptive learning or customized student learning purposes; b. to market an educational application or product to a parent or legal guardian of a student if Contractor did not use Data, shared by or collected per this Contract, to market the educational application or product; c. to use a recommendation engine to recommend to a student i. content that relates to learning or employment, within the third-party contractor's internal application, if the recommendation is not motivated by payment or other consideration from another party; or

  • Emergency Access Landlord shall have the right to enter the Premises at any time without notice in the event of an emergency.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!