Network Access Sample Clauses

Network Access. TENANT may find it necessary to purchase a network interface card, wireless PC card or other hardware in order to connect to the internet service. LANDLORD is not responsible for the purchase of these items and LANDLORD cannot guarantee compatibility with any device TENANT may have. The computer and network card must have software installed that supports the Internet Protocol commonly referred to as TCP/IP. Any conflicts between the software compatibility of the network and the TENANT’S computer operating system or any other feature will be the responsibility of the TENANT to resolve. LANDLORD will not be responsible for software issues related to the user’s personal computer.
AutoNDA by SimpleDocs
Network Access. State Street must implement controls designed to prevent unauthorized devices from physically connecting to the internal network or to detect and alert an administrator (e.g. Network Access Control device (NAC)).
Network Access. The Licensed Materials will be stored at one or more Publisher´s locations in digital form accessible by telecommunication links between such locations and authorized locations of Licensee and Participating institutions.
Network Access. The Licensed Materials will be stored at one or more Licensor´s locations in digital form accessible by telecommunication links between such locations and authorized locations of Licensee and Participating institutions.
Network Access. DST must implement controls designed to prevent unauthorized devices from physically connecting to the internal network or to detect and alert an administrator (e.g. Network Access Control device (NAC)). DST must scan for rogue wireless access points on a regular basis.
Network Access. When performing services for the County, ImageSoft shall comply with, and ensure that all ImageSoft personnel comply with, all rules, regulations and policies of County that are communicated to ImageSoft in writing, including security procedures concerning systems and data and remote access thereto, building security procedures, including the restriction of access by County to certain areas of its premises or systems for security reasons, and general health and safety practices and procedures.
Network Access. During its performance of this Master Contract, Contractor may be granted access to Purchaser’s computer and telecommunication networks (“Networks”). As a condition of Network use, Contractor shall: (a) use the Networks in compliance with all applicable laws, rules, and regulations; (b) use software, protocols, and procedures as directed by Purchaser to access and use the Networks; (c) only access Network locations made available to Contractor by Purchaser; (d) not interfere with or disrupt other users of the Networks; (e) assure the transmissions over the Networks by Contractor (i) do not contain any libelous, defamatory, profane, offensive, obscene, pornographic, or unlawful material, and (ii) are not used to perform any illegal activities, including but not limited to, encouraging, selling, or soliciting illegal drugs, gambling, pornography, prostitution, robbery, spreading computer worms or viruses, hacking into computer systems, or trafficking credit card codes; and (f) upon termination or expiration of the Master Contract, relinquish all IP addresses or address blocks assigned to them on the Networks. Additionally, Contractor shall comply with Purchaser’s IT policies.
AutoNDA by SimpleDocs
Network Access. (a) The Service Provider may provide the Service Recipients with access to the Service Provider’s or its Affiliates’ computer hardware, computer software and information technology systems, including the data they contain (collectively, “Networks”) via a secure method selected by the Service Provider. The Service Recipients shall only use (and will ensure that their employees, agents and subcontractors only use), and shall only have access to, the Networks for the purpose of receiving, and only to the extent required to receive, the Services. The Service Recipients shall not permit their employees, agents or subcontractors (collectively, “Personnel”) to use or have access to the Networks except to the extent that (i) such Personnel (or such Personnel’s functional equivalent) had access to the Networks prior to the Effective Time, or (ii) the Service Provider has given prior written approval for such access. (b) The Service Recipients shall cause all of the Service Recipients’ Personnel having access to the Networks in connection with receipt of a Service to comply with all security guidelines (including physical security, network access, internet security, confidentiality and personal data security guidelines) of the Service Provider which the Service Provider provides to the Service Recipients in writing. (c) The Service Recipients shall ensure that they and their Personnel shall not: (i) use the Networks to develop software, process data or perform any work or services other than for the purpose of receiving the Services; (ii) break, interrupt, circumvent, adversely affect or attempt to break, interrupt, circumvent or adversely affect any security system or measure of the Service Provider; (iii) obtain, or attempt to obtain, access to any hardware, software or data stored in the Networks except to the extent necessary to receive the Services; or (iv) use, disclose or give access to any part of the Networks to any Third Party, other than their agents and subcontractors authorized by the Service Provider in accordance with this Section 2.05. All user identification numbers and passwords for the Networks disclosed to the Service Recipients, and any information obtained from the use of the Networks shall be deemed Confidential Information of the Service Provider for purposes of Section 7.01. (d) If a Service Recipient or its Personnel breach any provision of this Section 2.05, such Service Recipient shall promptly notify the Service Provider of such breach a...
Network Access. To the extent possible, and as requested by Check Point, Customer understands that it may be necessary to provide Check Point or its authorized Technical Representative access to the affected network environment for any Severity 1 issue, or when Check Point determines that its Technical Representative needs to access Customer’s network in order to remotely diagnose an issue. Customer understands that if access is not provided as requested by Check Point, problem determination will be slower or impaired.
Network Access. If FSSA determines that the Contractor has not met the network access standards established in the Contract, FSSA shall require submission of a Corrective Action Plan to FSSA within ten (10) business days following notification by the State. Determination of failure to meet network access standards shall be made following a review of the Contractor’s Network Geographic Access Assessment Report. The frequency of required report submission shall be outlined in the Hoosier Healthwise MCE Reporting Manual. Contractor will pay liquidated damages in the amount of five thousand, two hundred, and fifty dollars ($5,250) for each reporting period that the Contractor fails to meet the network access standards. Upon discovery of noncompliance, the Contractor shall be required to submit monthly Network Geographic Access Assessment Reports until compliance is demonstrated for sixty (60) consecutive days. FSSA may also require the Contractor to maintain an open network for the provider type for which the Contractor’s network is non-compliant. Further, should Contractor be out of compliance for three (3) consecutive months as a result of failure to meet network access standards, FSSA shall immediately suspend auto- enrollment of members with the Contractor, until such time as Contractor successfully demonstrates compliance with the network access standards.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!