Passwords and Solution Access Sample Clauses

Passwords and Solution Access. If FIS provides Client or its Authorized Users with unique access codes to access the Solution (each, a “Password”), Client shall hold any such Passwords in strict confidence and shall not assign, share, misuse or abuse the Passwords or attempt to render ineffective the password protection of the Solution. If Client suspects or learns that a Password is being used to gain unauthorized access to the Solution, Client will promptly notify FIS so that it can change, or assist Client in changing, the applicable Password. To the extent the Solution is within FIS’ network, FIS may suspend access to the Solution without advance notice if FIS reasonably believes the Solution is being used or accessed in an unauthorized, illegal or disruptive manner, provided that FIS will promptly notify Client of any such event.
AutoNDA by SimpleDocs
Passwords and Solution Access. If Superion provides Customer or its Authorized Users with unique access codes to access the Solution (each, a “Password”), Customer shall hold any such Passwords in strict confidence and shall not assign, share, misuse or abuse the Passwords or attempt to render ineffective the password protection of the Solution. If Customer suspects or learns that a Password is being used to gain unauthorized access to the Solution, Customer will immediately notify Superion so that it can change, or assist Customer in changing, the applicable Password. To the extent the Solution is within Superion’s network, Superion may suspend access to the Solution without advance notice if Superion reasonably believes the Solution is being used or accessed in an unauthorized, illegal or disruptive manner, provided that Superion will promptly notify Customer of any such event.
Passwords and Solution Access. If FIS provides Client or its Authorized Users with unique access codes to access the Solution (each, a “Password”), Client shall hold any such Passwords in strict confidence and shall not assign, share, misuse or abuse the Passwords or attempt to render ineffective the password protection of the Solution. If Client suspects or learns that a Password is being used to gain unauthorized access to the Solution, Client will immediately notify FIS so that it can change, or assist Client in changing, the applicable Password. To the extent the Solution is within FIS’ network, FIS may suspend access to the Solution without advance notice if FIS reasonably believes the Solution is being used or accessed in an unauthorized, illegal or disruptive manner, provided that FIS will promptly notify Client of any such event. Client Data. Client shall supply, or cause to be supplied, all Client Supplied Data. Client shall transmit the Client Supplied Data to FIS by communications link or in another manner described on the Order. As between FIS and Client, Client shall be responsible for ensuring that the Client Supplied Data is accurate and complete. Client represents and warrants to FIS that Client has the full legal right for Client and FIS, its affiliates and agents to use the Client Supplied Data for Processing hereunder. Client shall indemnify and defend FIS, its affiliates and agents against any third-party claim alleging breach of the foregoing warranty. Within thirty (30) days after termination of Hosting Services or of an Order for an ASP Solution, BPaaS Solution or SaaS Solution, Client shall give FIS an instruction notice regarding the disposition of any tapes, data, files and other property belonging to Client and then in FIS’ possession. To the extent practicable and at Client's expense after receipt of such notice, FIS shall use commercially reasonable efforts to comply with the notice, including converting the data on the Solution to machine-readable form. FIS may retain such property until FIS receives all payments due to FIS under that Order. If Client fails to give that notice within thirty (30) days after such termination, then FIS may dispose of such property in a commercially reasonable manner. In order to improve FIS’ product and service offerings for its clients, FIS may maintain a database of information residing on the Solution. FIS and its affiliates may use and distribute such data in an aggregated and de-identified format, including as a part of t...

Related to Passwords and Solution Access

  • Information Access Each Party (“Disclosing Party”) shall make available to another Party (“Requesting Party”) information that is in the possession of the Disclosing Party and is necessary in order for the Requesting Party to: (i) verify the costs incurred by the Disclosing Party for which the Requesting Party is responsible under this Agreement; and (ii) carry out its obligations and responsibilities under this Agreement. The Parties shall not use such information for purposes other than those set forth in this Article 25.1 of this Agreement and to enforce their rights under this Agreement.

  • Passwords and Employee Access Provider shall secure usernames, passwords, and any other means of gaining access to the Services or to Student Data, at a level suggested by Article 4.3 of NIST 800-63-3. Provider shall only provide access to Student Data to employees or contractors that are performing the Services. Employees with access to Student Data shall have signed confidentiality agreements regarding said Student Data. All employees with access to Student Records shall pass criminal background checks.

  • User IDs and Password Controls All users must be issued a unique user name for accessing DHCS PHI or PI. Username must be promptly disabled, deleted, or the password changed upon the transfer or termination of an employee with knowledge of the password, at maximum within 24 hours. Passwords are not to be shared. Passwords must be at least eight characters and must be a non-dictionary word. Passwords must not be stored in readable format on the computer. Passwords must be changed every 90 days, preferably every 60 days. Passwords must be changed if revealed or compromised. Passwords must be composed of characters from at least three of the following four groups from the standard keyboard: • Upper case letters (A-Z) • Lower case letters (a-z) • Arabic numerals (0-9) • Non-alphanumeric characters (punctuation symbols)

  • Records Access The Advisor shall maintain appropriate records of all its activities hereunder and make such records available for inspection by the Directors and by counsel, auditors and authorized agents of the Company, at any time or from time to time during normal business hours. The Advisor shall at all reasonable times have access to the books and records of the Company.

  • Access to Customer Data You agree that we may, for the purposes of providing Maintenance and Customer Support and/or for the purpose of otherwise protecting the integrity of the Software, access and/or download your Customer Data on a limited basis.

  • Use of information, data and software In the event that you receive any data, information or software via the Trading Platform other than that which you are entitled to receive pursuant to this Client Agreement, you will immediately notify us and will not use, in any way whatsoever, such data, information or software.

  • SUBSCRIBER RECORDS, ACCESS AND AUDIT 5.1. STAR shall, during the Audit referred to in Clause 14 of the Agreement, be entitled to access the Records, SMS, CAS and related systems of the DTHO in order to determine the correctness of the Reports referred to in Clause 4.1 of this Addendum. In the event an audit or inspection by the STAR’s representative(s) reveals that the DTHO has under-reported or has misrepresented any information contained in the Reports or any item having a bearing on the computation of the Incentives that the DTHO is entitled to avail and/ or the License Fee payable by the DTHO, the STAR shall provide the DTHO with written notice setting out the amount of such additional fee (“Shortfall Amount”) payable by the DTHO to the STAR (“Notice of Shortfall”). Upon receipt of the Notice of Shortfall, the DTHO shall immediately, and in any event no later than 2 (two) calendar days from the date of receiving such Notice of Shortfall pay the Shortfall Amount together with interest at the Late Payment Interest Rate for the period from the date when the payments should have been made by the DTHO until the actual date of payment in the manner set out in Clause 14 of the Agreement.

  • CUSTOMER SERVICE ACCESS The Competitive Supplier agrees to provide, or cause to be provided, certain customer services to Participating Consumers. Such services shall be reasonably accessible to all Participating Consumers, shall be available during normal working hours, shall allow Participating Consumers to transact business they may have with the Competitive Supplier, and shall serve as a communications liaison among the Competitive Supplier, the Town, and the Local Distributor. A toll-free telephone number will be established by Competitive Supplier and be available for Participating Consumers to contact Competitive Supplier during normal business hours (9:00 A.M. - 5:00 P.M. Eastern Standard Time, Monday through Friday) to resolve concerns, answer questions and transact business with respect to the service received from Competitive Supplier. The Town will post program-related information on the Town’s website which will be available to Participating Consumers for general information, product and service information, and other purposes.

  • Access to Software Access Rights to Software which is Results shall comprise: Access to the Object Code; and, where normal use of such an Object Code requires an Application Programming Interface (hereafter API), Access to the Object Code and such an API; and, if a Party can show that the execution of its tasks under the Project or the Exploitation of its own Results is technically or legally impossible without Access to the Source Code, Access to the Source Code to the extent necessary. Background shall only be provided in Object Code unless otherwise agreed between the Parties concerned.

  • DATA/ACCESS/CONFIDENTIALITY/ PRESERVATION 10.1 As used in this Agreement, the word “data” shall mean all information and things developed or obtained during the performance of, or acquired or developed by reason of, this Agreement, including, but not limited to, all studies, reports, files, formulae, surveys, maps, charts, sound recordings, video recordings, pictorial reproductions, drawings, analyses, graphic representations, computer programs, computer printouts, notes, letters, memoranda, papers, and documents, all whether finished or unfinished.

Time is Money Join Law Insider Premium to draft better contracts faster.