Premature Access Sample Clauses

Premature Access. The TSIP log shall also be used to ensure that Users who are affiliated with the Provider's company (or any other User) do not have access to TS information before it is publicly available. l. Firewalls: TSIPs shall employ security measures such as firewalls to minimize the possibility that unauthorized S&CP Phase IA Version 1.2 May 27, 1998 87 � users shall access or modify TS Information or reach into Provider or User systems. Interfaces through Public Data Networks or the Internet shall be permitted as long as these security requirements are met. m. Certificates and Public Key Standards (optional): Use of alternative forms of login and authentication using certificates and public key standards is acceptable. 5.2 ACCESS PRIVILEGES Users shall be assigned different Access Privileges based on external agreements between the User and the Provider. These Access Privileges are associated with individual Users rather than just a company, to ensure that only authorized Users within a company have the appropriate access. The following Access Privileges shall be available as a minimum: a. Access Privilege Read-Only: The User may only read publicly available TS Information. b. Access Privilege for Transactions: The Customer is authorized to transact Service Requests. c. Access Privilege Read/Write: A Secondary Provider shall have write access to his own Provider Account on an OASIS Node. 5.3 OASIS RESPONSE TIME REQUIREMENTS TSIPs can only be responsible for the response capabilities of two portions of the Internet-based OASIS network: The response capabilities of the OASIS Node server to process interactions with Users The bandwidth of the connection(s) between the OASIS Node server and the Internet. Therefore, the OASIS response time requirements are as follows: a. OASIS Node Server Response Time: The OASIS Node server shall be capable of supporting its connection(s) to S&CP Phase IA Version 1.2 May 27, 1998 88 � Users with an average aggregate data rate of at least "A" bits per second. "A" is defined as follows: * A = N R bits/sec where: N = 5% of registered Customers. and R = 28,800 bits/sec per Customer. b. OASIS Node Network Connection Bandwidth: The bandwidth "B" of the OASIS Node connection(s) to the Internet shall be at least: * B = 2 A bits/sec c. Time to Meet Response Requirements: The minimum time responses shall be met within 1 month of User registration for any single new User. If more than 10 new Users register in one month, 2 months lead time shall ...
AutoNDA by SimpleDocs

Related to Premature Access

  • Service Access Access to the clinical parts of our Site is restricted to Users. Users of our Site are provided with unique User IDs by the Clinic with which they are associated and must choose a password of their choice to sign on to our Site. Users must provide personal contact information, and you must ensure that your information is kept up to date at all times. User IDs and passwords constitute an electronic signature and will be used by us to authenticate access to our Site. If a User opts to sign onto Xxxxxx.xxx, the User will be able to take advantage of the non- public sections of our Site. If a User opts not to sign onto our Site, their access to our Site will be restricted to the public sections of our Site only. If you are provided with a User ID, password or any other piece of information as part of our security procedures, you must treat such information as confidential, and you must not disclose it to any third party. We have the right to disable any User ID at any time, if in our opinion, you have failed to comply with any of the provisions of this Agreement. You may only use our Site as set out in this Agreement. Any illegal or unauthorized use of our Site shall constitute a violation of this Agreement. You do not have permission to access our Site in any way that violates this Agreement or breaches any applicable law. You agree to keep your and your Patients’ Data accurate, current and complete. You may print off or download extracts of page(s) from our Site for your use in Patient care or insertion into a Patient’s electronic health records only.

  • Market Access 1. With respect to market access through the modes of supply identified in the "trade in services" definition of Article 104 (Definitions), each Party shall accord to services and service suppliers of the other Party treatment no less favourable than that provided for under the terms, limitations and conditions agreed and specified in its Schedule (7). 2. In sectors where market access commitments are undertaken, the measures which a Party shall not maintain or adopt either on the basis of a regional subdivision or on the basis of its entire territory, unless otherwise specified in its Schedule, are defined as: (a) limitations on the number of service suppliers whether in the form of numerical quotas, monopolies, exclusive service suppliers or the requirements of an economic needs test; (b) limitations on the total value of service transactions or assets in the form of numerical quotas or the requirement of an economic needs test; (c) limitations on the total number of service operations or on the total quantity of service output expressed in terms of designated numerical units in the form of quotas or the requirement of an economic needs test; (8) (d) limitations on the total number of natural persons that may be employed in a particular service sector or that a service supplier may employ and who are necessary for, and directly related to, the supply of a specific service in the form of numerical quotas or the requirement of an economic needs test; (e) measures which restrict or require specific types of legal entity or joint venture through which a service supplier may supply a service; or (f) limitations on the participation of foreign capital in terms of maximum percentage limit on foreign shareholding or the total value of individual or aggregate foreign investment.

  • Technology Access A. Contractor expressly acknowledges that state funds may not be expended in connection with the purchase of an automated information system unless that system meets certain statutory requirements relating to accessibility by persons with visual impairments. Accordingly, Contractor represents and warrants to System Agency that the technology provided to System Agency for purchase (if applicable under this Contract or any related Solicitation) is capable, either by virtue of features included within the technology or because it is readily adaptable by use with other technology, of:

  • Cash Access You may not use the Gift Card to obtain cash from an Automated Teller Machine (“ATM”), Point-of-Sale (“POS”) device, or by any other means. You may not use the Gift Card at an ATM. Loading The Gift Card The Gift Card is not reloadable after being loaded at the time of purchase. Personal checks, cashier’s checks, and money orders sent to the Issuer are not an acceptable form of loading. Any checks and money orders sent to the Issuer for loading will be returned unless the full amount may be applied towards a negative balance, in which case the check or money order may or may not be loaded at the discretion of the Issuer. The maximum dollar value of the Gift Card is printed on the front side of the Gift Card packaging. These are the limits associated with loading the Gift Card: Transaction Type Frequency and/or Dollar Limits Initial Load One time $20.00 up to $500.00 For Gift Card balance information, please call 0-000-000-0000 or visit XxxxxxxXxxx.xxx.

  • PROJECT ACCESS The Grantee shall ensure that the State, the Governor of the State, or any authorized representative of the foregoing, will have safe and suitable access to the Project site at all reasonable times during Project construction and thereafter for the term of this Agreement.

  • ICANN Access Registry Operator shall provide bulk access to the zone files for the TLD to ICANN or its designee on a continuous basis in the manner ICANN may reasonably specify from time to time. Access will be provided at least daily. Zone files will include SRS data committed as close as possible to 00:00:00 UTC.

  • System Access CUSTOMER agrees to provide to PROVIDER, at CUSTOMER’S expense, necessary access to the mainframe computer and related information technology systems (the “System”) on which CUSTOMER data is processed during the times (the “Service Hours”) specified in the PSAs, subject to reasonable downtime for utility outages, maintenance, performance difficulties and the like. In the event of a change in the Service Hours, CUSTOMER will provide PROVIDER with at least fifteen (15) calendar days written notice of such change.

  • EU Access SAP will use only European Subprocessors to provide support requiring access to Personal Data in the Cloud Service and SAP shall not export Personal Data outside of the EEA or Switzerland unless expressly authorized by Customer in writing (e-mail permitted) on a case by case basis; or as excluded under Section 9.4.

  • Information Access Each Party (“Disclosing Party”) shall make available to another Party (“Requesting Party”) information that is in the possession of the Disclosing Party and is necessary in order for the Requesting Party to: (i) verify the costs incurred by the Disclosing Party for which the Requesting Party is responsible under this Agreement; and (ii) carry out its obligations and responsibilities under this Agreement. The Parties shall not use such information for purposes other than those set forth in this Article 25.1 of this Agreement and to enforce their rights under this Agreement.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization. Measures: • Multiple authorization levels are used when granting access to sensitive systems, including those storing and processing Personal Data. Authorizations are managed via defined processes according to the SAP Security Policy • All personnel access SAP’s systems with a unique identifier (user ID). • SAP has procedures in place so that requested authorization changes are implemented only in accordance with the SAP Security Policy (for example, no rights are granted without authorization). In case personnel leaves the company, their access rights are revoked. • SAP has established a password policy that prohibits the sharing of passwords, governs responses to password disclosure, and requires passwords to be changed on a regular basis and default passwords to be altered. Personalized user IDs are assigned for authentication. All passwords must fulfill defined minimum requirements and are stored in encrypted form. In the case of domain passwords, the system forces a password change every six months in compliance with the requirements for complex passwords. Each computer has a password-protected screensaver. • The company network is protected from the public network by firewalls. • SAP uses up–to-date antivirus software at access points to the company network (for e-mail accounts), as well as on all file servers and all workstations. • Security patch management is implemented to provide regular and periodic deployment of relevant security updates. Full remote access to SAP’s corporate network and critical infrastructure is protected by strong authentication.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!