Indirect Access Sample Clauses

Indirect Access. Indirect Access occurs when humans, devices or systems indirectly access or use the software via another intermediary software or Application Programming Interface (API) between the user and the Licensor’s software. Licenses will not be required for: a. One-way or two-way access for read-only, write-only or read-and write transactions. b. Real time, batch transactions or indirect static reads. c. Accessing the Licensor’s software through one or more intermediary systems, custom front end application or access via other technical interface. d. Accessing the Licensor’s software via a third-party application or custom front end application that that may or may not activate the Licensor’s software.
AutoNDA by SimpleDocs
Indirect Access. For indirect access, a directly connected customer of Operator B would use a specific Access Code to access Operator A. Operator B will implement Data Management Amendments into their network so that whenever the code is dialled, it will be recognised and the Call forwarded immediately to the Operator A network, via the nearest point of handover or such other point as is agreed under agreed routing principles. Operator A will pay Operator B for the originating part of the Call. Indirect Access is an optional access method for the end customer. If an Access Code is not used, the Call will be routed via the operator serving that customer (i.e. providing the physical connection). Two variations of this service can be implemented. The first - using ‘A’ number presentation (or Calling Line Identification), where the Caller can instantly be identified as an Operator A customer, and the Call validated. The other type relies on two stage Call set up, where the Caller will be required to enter a Personal Identification Number, which will be validated by Operator A.
Indirect Access. In the event Enrolled Affiliate incurs fees created by instances of indirect access to on-premises Microsoft Server products which the Enrolled Affiliate had no actual knowledge of, Microsoft will work with Government Partner and the Enrolled Affiliate in good faith to determine how to mitigate such fees. Reorganizations, Consolidations, and Privatizations. If the number of Licenses covered by an Enrollment changes by more than ten percent as a result of a reorganization, consolidation, or privatization of any member of the Enterprise, Microsoft will work with Government Partner in good faith to determine how to accommodate the Enterprise’s changed circumstances in the context of these Additional Use Rights and Restrictions. Modification or termination of an Online Service for regulatory reasons. Microsoft may modify or terminate an Online Service in any country or jurisdiction where there is any current or future government requirement or obligation that: (1) subjects Microsoft to any regulation or requirement not generally applicable to businesses operating there; (2) presents a hardship for Microsoft to continue operating the Online Service without modification; and/or (3) causes Microsoft to believe these terms or the Online Service may be in conflict with any such requirement or obligation. Program updates. Microsoft may make a change to the Enterprise and/or Enterprise Subscription programs that will make it necessary for Enrolled Affiliates to enter into a new agreement and Enrollments with Government Partner at the time of an Enrollment renewal. If any such updates occur during a current contract, including option periods, such change(s) will be made at no increase in cost to Enrolled Affiliate: all pricing in the current contract, including contract options will be honored despite any such change(s).
Indirect Access. 5.1 The Client shall permit 4SIGHT to attend the Client’s Site to provide any Work Order Services which require physical access, including applicable support and maintenance Services and/or to programme least cost routing into the Client's telephone system to allow access to the Carrier's telephone network. 5.2 The Client shall be responsible for ensuring that the Client’s Equipment maintenance is not jeopardised in any way as a result of requesting and/or receiving the Work Order Services.
Indirect Access. All parties will take measures to prevent unauthorized third-party indirect access to the shared Xxxxxxxx Flex System. Examples of this would be gateways, dial-up, or cascaded Telnet sessions where the originator is not an Authorized Individual of the Server Site’s network, but whose resultant IP address would appear to the network as being an Authorized Individual’s address. Should unauthorized access occur in a manner prohibited in Section 1.4 occur, any damages or costs of litigation including attorney’s fees incurred as a result of such unauthorized access shall be allocated between the parties by the Standards Committee.
Indirect Access. (a) The MOU provides that generally, Newco is responsible for access services, and Indirect Access is a part of access services. FT has however committed to assume responsibility for certain activities and the supply of certain technical features. (b) FT shall be responsible for the signaling, numbering plan, day to day capacity planning, monitoring and trouble shooting procedures relating to Indirect Access. (c) FT will be responsible for directing and managing all negotiations with PTOs for Newco for Indirect Access to and will exercise best efforts to have all necessary agreements in place for Indirect Access. (d) FT shall be responsible for development and implementation of technical solutions necessary to ensure regulatory compliance for existing and future Switched Voice Services (including number portability).

Related to Indirect Access

  • Internet Access Hotels and Airports Employees who travel may need to access their e-mail at night. Many hotels provide free high speed internet access and Tyler employees are encouraged to use such hotels whenever possible. If an employee’s hotel charges for internet access it is reimbursable up to $10.00 per day. Charges for internet access at airports are not reimbursable.

  • Market Access 1. With respect to market access through the modes of supply identified in the "trade in services" definition of Article 104 (Definitions), each Party shall accord to services and service suppliers of the other Party treatment no less favourable than that provided for under the terms, limitations and conditions agreed and specified in its Schedule (7). 2. In sectors where market access commitments are undertaken, the measures which a Party shall not maintain or adopt either on the basis of a regional subdivision or on the basis of its entire territory, unless otherwise specified in its Schedule, are defined as: (a) limitations on the number of service suppliers whether in the form of numerical quotas, monopolies, exclusive service suppliers or the requirements of an economic needs test; (b) limitations on the total value of service transactions or assets in the form of numerical quotas or the requirement of an economic needs test; (c) limitations on the total number of service operations or on the total quantity of service output expressed in terms of designated numerical units in the form of quotas or the requirement of an economic needs test; (8) (d) limitations on the total number of natural persons that may be employed in a particular service sector or that a service supplier may employ and who are necessary for, and directly related to, the supply of a specific service in the form of numerical quotas or the requirement of an economic needs test; (e) measures which restrict or require specific types of legal entity or joint venture through which a service supplier may supply a service; or (f) limitations on the participation of foreign capital in terms of maximum percentage limit on foreign shareholding or the total value of individual or aggregate foreign investment.

  • Account Access Electronic Check Transactions may only be made from your checking account.

  • Information Access Each Party (“Disclosing Party”) shall make available to another Party (“Requesting Party”) information that is in the possession of the Disclosing Party and is necessary in order for the Requesting Party to: (i) verify the costs incurred by the Disclosing Party for which the Requesting Party is responsible under this Agreement; and (ii) carry out its obligations and responsibilities under this Agreement. The Parties shall not use such information for purposes other than those set forth in this Article 25.1 of this Agreement and to enforce their rights under this Agreement.

  • ICANN Access Registry Operator shall provide bulk access to the zone files for the TLD to ICANN or its designee on a continuous basis in the manner ICANN may reasonably specify from time to time. Access will be provided at least daily. Zone files will include SRS data committed as close as possible to 00:00:00 UTC.

  • Site Access Dell requires the right to access the APEX System in a timely way and as provided in the Service Offering Description to provide the Support Services. Failure to ensure that Customer provides Dell with timely access to a Site will relieve Dell of the Support Services obligations and Dell may also, at Dell’s discretion, suspend the APEX Service.

  • System Access CUSTOMER agrees to provide to PROVIDER, at CUSTOMER’S expense, necessary access to the mainframe computer and related information technology systems (the “System”) on which CUSTOMER data is processed during the times (the “Service Hours”) specified in the PSAs, subject to reasonable downtime for utility outages, maintenance, performance difficulties and the like. In the event of a change in the Service Hours, CUSTOMER will provide PROVIDER with at least fifteen (15) calendar days written notice of such change.

  • Telephone Access Employees shall be entitled to reasonable use of the client's telephone for local calls during the evening to speak with family members (i.e., spouse, children, dependants, parents). Employees may not receive personal calls on the client's telephone nor give out the client's telephone number. In the case of urgent personal calls to the employee, messages will be taken by the Employer and passed on to the employee as soon as possible. In the event of an emergency, the employee shall use the client's telephone to contact the appropriate authorities or the contact person designated by the Employer.

  • Parent Access To the extent required by law the LEA shall establish reasonable procedures by which a parent, legal guardian, or eligible student may review Education Records and/or Student Data correct erroneous information, and procedures for the transfer of student-generated content to a personal account, consistent with the functionality of services. Provider shall respond in a reasonably timely manner (and no later than forty five (45) days from the date of the request or pursuant to the time frame required under state law for an LEA to respond to a parent or student, whichever is sooner) to the LEA’s request for Student Data in a student’s records held by the Provider to view or correct as necessary. In the event that a parent of a student or other individual contacts the Provider to review any of the Student Data accessed pursuant to the Services, the Provider shall refer the parent or individual to the LEA, who will follow the necessary and proper procedures regarding the requested information.

  • Remote Access Access to and use of the Data over the State Governmental Network (SGN) or Secure Access Washington (SAW) will be controlled by DSHS staff who will issue authentication credentials (e.g. a Unique User ID and Hardened Password) to Authorized Users on Contractor’s staff. Contractor will notify DSHS staff immediately whenever an Authorized User in possession of such credentials is terminated or otherwise leaves the employ of the Contractor, and whenever an Authorized User’s duties change such that the Authorized User no longer requires access to perform work for this Contract.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!