IT Access Sample Clauses

IT Access. As of the date hereof, except as otherwise expressly provided herein, or unless required in connection with, or as specifically contemplated by, the performance, delivery or receipt of a Service, Service Recipient shall cease to use and shall have no further access to, and Service Provider shall have no obligation to otherwise provide, (i) Service Provider’s intranet and other owned, licensed or leased information technology related resources, including software, networks, hardware, servers or other related technology, and (ii) computer-based resources (including e-mail and access to Service Provider’s computer networks and databases) which require a password or are available on a secured access basis (collectively, the “Provider Systems”).
AutoNDA by SimpleDocs
IT Access. To the extent Consultant is granted access to any Allogene resources or facilities, including, but not limited to, Allogene information technology resources such as email accounts, laptops, Allogene systems, networks, or any other equipment provided by or through Allogene, Consultant agrees to use or access those resources solely for the performance of the Services and in accordance with any applicable policies or procedures which Allogene may have in place at any time during the term of this Agreement. Allogene reserves the right to terminate access and/or require the return of any resources provided by Allogene with or without cause at any time.
IT Access. The Student may be granted IT access for the duration of their role for placement preparation work as well as personal study. Occasional personal use of PPA IT resources by the student is permitted when it does not consume a significant amount of those resources. The student is responsible for any activity originating from their computer or device. Account or wifi passwords should not be shared with anyone else unless advised to do so by the Line Manager. Disruptive use of PPA IT resources is not permitted. The PPA may monitor the activity and accounts of any users on their IT resources. The PPA has the right to terminate the student’s access to IT resources where trust has been abused. The creation or display of any kind of obscene, sexual, or racial material using PPA IT resources is a serious violation and will lead to disciplinary action.
IT Access. All Contractor personnel with access to unclassified information systems, including e-mail, shall have, at a minimum, a favorable National Agency Check (NAC). The Contractor shall coordinate with the COR all IT network or website access requirements after award of the Contract and shall be IAW the latest DoD policies and the SCMS Division RDT&E Network SOP. (Attachment 14)

Related to IT Access

  • Internet Access Data and information may be made electronically accessible to the Company through Internet access to one or more links provided by the Administrator or a sub-administrator (“Web Link”). All rights in Web Link (including text and “look and feel” attributes) are owned by the sub-administrator. Any commercial use of the content or any other aspect of Web Link requires the written permission of the sub-administrator. Use of the Web Link by the Company will be subject to any terms of use set forth on the web site. Web Link and the information (including text, graphics and functionality) in the Web Link is presented “As Is” and “As Available” without express or implied warranties including, but not limited to, implied warranties of non-infringement, merchantability and fitness for a particular purpose. The sub-administrator neither warrants that the Web Link will be uninterrupted or error free, nor guarantees the accessibility, reliability, performance, timeliness, sequence, or completeness of information provided on the Web Link.

  • User Access Transfer Agent shall have a process to promptly disable access to Fund Data by any Transfer Agent personnel who no longer requires such access. Transfer Agent will also promptly remove access of Fund personnel upon receipt of notification from Fund.

  • Site Access Dell requires the right to access the APEX System in a timely way and as provided in the Service Offering Description to provide the Support Services. Failure to ensure that Customer provides Dell with timely access to a Site will relieve Dell of the Support Services obligations and Dell may also, at Dell’s discretion, suspend the APEX Service.

  • Data Access Services State Street agrees to make available to the Fund the Data Access Services subject to the terms and conditions of this Addendum and such data access operating standards and procedures as may be issued by State Street from time to time. The Fund shall be able to access the System to (i) originate electronic instructions to State Street in order to (a) effect the transfer or movement of cash or securities held under custody by State Street or (b) transmit accounting or other information (the transactions described in (i)(a) and (i)(b) above are referred to herein as “Client Originated Electronic Financial Instructions”), and (ii) access data for the purpose of reporting and analysis, which shall all be deemed to be Data Access Services for purposes of this Addendum.

  • Technology Access Fee After the Effective Date, within [***] days after receipt of the corresponding invoice from Mersana, Merck will pay to Mersana, a one-time, non-refundable, non-creditable, upfront fee of Twelve Million Dollars ($12,000,000.00) (the [***] Portions of this exhibit have been redacted pursuant to a confidential treatment request. An unredacted version of this exhibit has been filed separately with the Commission. “Technology Access Fee”). Payment of the Technology Access Fee shall be subject to any withholding Tax obligations set forth in Section 6.9.1.

  • Tenant Access Landlord, in Landlord’s reasonable discretion and upon receipt of a written request from Tenant, may grant Tenant a license to have access to the Premises prior to the Completion Date to allow Tenant to do other work required by Tenant to make the Premises ready for Tenant’s use and (the “Tenant’s Pre-Occupancy Work”). It shall be a condition to the grant by Landlord and continued effectiveness of such license that:

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • Data Access and Proprietary Information 6.1 The Fund acknowledges that the databases, computer programs, screen formats, report formats, interactive design techniques, and documentation manuals furnished to the Fund by the Transfer Agent as part of the Fund’s ability to access certain Fund Confidential Information maintained by the Transfer Agent on databases under the control and ownership of the Transfer Agent or other third party (“Data Access Services”) constitute copyrighted, trade secret, or other proprietary information of substantial value to the Transfer Agent or other third party (collectively, “Transfer Agent Proprietary Information”). In no event shall Transfer Agent Proprietary Information be deemed Fund Confidential Information. The Fund agrees to treat all Transfer Agent Proprietary Information as proprietary to the Transfer Agent and further agrees that it shall not divulge any Transfer Agent Proprietary Information to any person or organization except as may be provided hereunder. Without limiting the foregoing, the Fund agrees for itself and its employees and agents to:

  • Investment; Access to Data The undersigned has carefully reviewed and understands the risks of, and other considerations relating to, a purchase of the Common Stock and an investment in the Company. The undersigned has been furnished materials relating to the Company, the private placement of the Common Stock or anything else that it has requested and has been afforded the opportunity to ask questions and receive answers concerning the terms and conditions of the offering and obtain any additional information which the Company possesses or can acquire without unreasonable effort or expense. Representatives of the Company have answered all inquiries that the undersigned has made of them concerning the Company, or any other matters relating to the formation and operation of the Company and the offering and sale of the Common Stock. The undersigned has not been furnished any offering literature other than the materials that the Company may have provided at the request of the undersigned; and the undersigned has relied only on such information furnished or made available to the undersigned by the Company as described in this Section. The undersigned is acquiring the Shares for investment for the undersigned's own account, not as a nominee or agent and not with the view to, or for resale in connection with, any distribution thereof. The undersigned acknowledges that the Company is a start-up company with no current operations, assets or operating history, which may possibly cause a loss of Purchaser’s entire investment in the Company.

  • Infrastructure (a) The Borrower has and will maintain a sufficient infrastructure to conduct its business as presently conducted and as contemplated to be conducted following its execution of this Agreement.

Time is Money Join Law Insider Premium to draft better contracts faster.