Logins Sample Clauses

Logins. Where you wish us to access systems that contain information that identifies living individuals, you should provide us with a unique log in to your existing software platforms and systems.
AutoNDA by SimpleDocs
Logins. Partner shall use each Authorized Customer’s own login credentials in order to connect with the SAGE Services. Partner shall take reasonable steps to ensure that the Authorized Customer’s login credentials belong to such customer. PARTNER MAY NOT SHARE LOGIN CREDENTIALS AMONG DIFFERENT CUSTOMERS, SHARE SAGE DATA OBTAINED USING A CUSTOMER’S LOGIN WITH ANY OTHER CUSTOMER, OR USE PARTNER’S OWN DEVELOPMENT CREDENTIALS FOR A PRODUCTION-USE IMPLEMENTATION FOR ANY CUSTOMER.
Logins. A&M System and its Members may be required to establish a login identifier and a password. A&M System and its Members are each responsible for protecting logins and passwords from unauthorized use, and for all activity that occurs on its account. A&M System and its Members agrees to notify Provider without undue delay if it believes that its login or password has been used without its permission, so that appropriate action can be taken. Provider is not responsible for losses or damage caused by A&M System’s or its Member’s failure to safeguard its logins and passwords.
Logins. You agree and acknowledge that each Agent will be identified by a unique username and password (“Login”) and that an User Login may only be used by one (1) individual. You will not share a User Login among multiple individuals. You and Your Users are responsible for maintaining the confidentiality of all Login information for Your Account.
Logins. Subscriber and Authorized Users will maintain the security of all user IDs and passwords assigned them for their use of the Service (“Logins”). Subscriber will maintain such security by at a minimum ensuring that: (i) no one uses any Login other than the Authorized User, and (ii) it will not permit Logins to be cached in proxy servers and accessed by non-Authorized Users. Subscriber will be responsible for all use of Subscriber’s and Authorized Users’ accounts.

Related to Logins

  • Metadata Bibliographical, structural & descriptive data of the Licensed Material as defined in Schedule 5.

  • Hyperlinks 12.1 You must not link to any material using or by means of the Services that would, if it were made available through the Services, breach the provisions of this Policy.

  • Network PHARMACY is a retail, mail order or specialty pharmacy that has a contract to accept our pharmacy allowance for prescription drugs and diabetic equipment or supplies covered under this plan. NETWORK PROVIDER is a provider that has entered into a contract with us or other Blue Cross and Blue Shield plans. For pediatric dental care services, network provider is a dentist that has entered into a contract with us or participates in the Dental Coast to Coast Network. For pediatric vision hardware services, a network provider is a provider that has entered into a contract with EyeMed, our vision care service manager.

  • Passwords Passwords are an important aspect of computer security. A poorly chosen password may result in unauthorized access and/or exploitation of Placer County’s resources. All users, including contractors and vendors with access to the County’s systems, are responsible for the creation and protection of passwords and additionally any updates to County Password policies must be followed. Users must not use the same password for Placer County accounts and personal accounts. The reliability of passwords for maintaining confidentiality cannot be guaranteed. Always assume that someone, in addition to the intended or designated recipient, may read any and all messages and files. Any user suspecting that his/her password may have been compromised must, without delay, report the incident to Placer County IT.

  • Links If The Services are made available through the Internet, the Financial Institution’s website may provide links to other websites, including those of Third Parties who may also provide services to You. You acknowledge that all those other websites and Third Party services are independent from the Financial Institution’s and may be subject to separate agreements that govern their use. The Financial Institution and Central 1 have no liability for those other websites or their contents or the use of Third Party services. Links are provided for convenience only, and You assume all risk resulting from accessing or using such other websites or Third Party services.

  • MOBILE DATA COMPUTERS 20 1. As part of the law enforcement services to be provided to CITY, COUNTY 21 has provided, or will provide, mobile data computers (hereinafter called 22 “MDCs”) that are or will be mounted in patrol vehicles and motorcycles, 23 designated by COUNTY for use within CITY limits.

  • Encryption The Fund acknowledges and agrees that encryption may not be available for every communication through the System, or for all data. The Fund agrees that Custodian may deactivate any encryption features at any time, without notice or liability to the Fund, for the purpose of maintaining, repairing or troubleshooting the System or the Software.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

Time is Money Join Law Insider Premium to draft better contracts faster.