Prohibition on Workspot Access to Company Content Sample Clauses

Prohibition on Workspot Access to Company Content. Workspot represents and warrants that Workspot’s access to Company Content in providing Workspot DaaS Services is limited to the items of End User Activity. Workspot acknowledges and agrees that, except as necessary to provide the Workspot DaaS Services and to the limited extent permitted with respect to End User Activity information under Section 6.3 of this Agreement, Workspot’s access and use of Company Content is strictly prohibited. Workspot shall make available the Workspot DaaS Services in such a way that Workspot is not required to, and does not, access Company Content (other than End User Activity). Workspot represents and warrants that, except as required to provide the Workspot DaaS Services, Support Services or Professional Services, its personnel are technically incapable of accessing or using the Company Content. Workspot personnel shall not attempt to access or use Company Content other than as expressly permitted under this Agreement with respect to End User Activity. To the extent that Company inadvertently exposes Workspot personnel to Company Content beyond End User Activity, such as in the course of Workspot providing Support Services (e.g. troubleshooting through screen sharing), such Company Content shall not be retained, processed or used by Workspot or its personnel and Company shall limit such exposure to the minimum extent required for Workspot to render the requested service to Company.
AutoNDA by SimpleDocs

Related to Prohibition on Workspot Access to Company Content

  • Prohibition on Unauthorized Use or Disclosure The Business Associate will neither use nor disclose the Covered Entity’s Protected Health Information, except as permitted or required by this Addendum or in writing by the Covered Entity or as Required by Law. This Agreement does not authorize the Business Associate to use or disclose the Covered Entity’s Protected Health Information in a manner that will violate Subpart E of 45 CFR Part 164 if done by the Covered Entity.

  • Access to Information Systems Access, if any, to DXC’s Information Systems is granted solely to perform the Services under this Order, and is limited to those specific DXC Information Systems, time periods and personnel as are separately agreed to by DXC and Supplier from time to time. DXC may require Supplier’s employees, subcontractors or agents to sign individual agreements prior to access to DXC’s Information Systems. Use of DXC Information Systems during other time periods or by individuals not authorized by DXC is expressly prohibited. Access is subject to DXC business control and information protection policies, standards and guidelines as may be modified from time to time. Use of any other DXC Information Systems is expressly prohibited. This prohibition applies even when an DXC Information System that Supplier is authorized to access, serves as a gateway to other Information Systems outside Supplier’s scope of authorization. Supplier agrees to access Information Systems only from specific locations approved for access by DXC. For access outside of DXC premises, DXC will designate the specific network connections to be used to access Information Systems.

  • Provide Data In Compliance With Laws LEA shall provide data for the purposes of the DPA in compliance with the FERPA, PPRA, IDEA, 603 C.M.R. 23.00, 603 CMR 28.00, and Massachusetts General Law, Chapter 71, Sections 34D to 34H, and the other privacy statutes quoted in this DPA. LEA shall ensure that its annual notice under FERPA includes vendors, such as the Provider, as “School Officials.”

  • Access to Site 3.05.1 Contractor may enter and leave the premises at all reasonable times without charge. Contractor and its employees may use the common areas and roadways of the premises where it is to perform the services together with all facilities, equipment, improvements, and services provided in connection with the premises for common use. This excludes parking for Contractor’s personnel. Contractor shall repair any damage caused by it or its employees as a result of its use of the common areas.

  • Access to Information Such Purchaser acknowledges that it has had the opportunity to review the Transaction Documents (including all exhibits and schedules thereto) and the SEC Reports and has been afforded, (i) the opportunity to ask such questions as it has deemed necessary of, and to receive answers from, representatives of the Company concerning the terms and conditions of the offering of the Securities and the merits and risks of investing in the Securities; (ii) access to information about the Company and its financial condition, results of operations, business, properties, management and prospects sufficient to enable it to evaluate its investment; and (iii) the opportunity to obtain such additional information that the Company possesses or can acquire without unreasonable effort or expense that is necessary to make an informed investment decision with respect to the investment. Such Purchaser acknowledges and agrees that neither the Placement Agent nor any Affiliate of the Placement Agent has provided such Purchaser with any information or advice with respect to the Securities nor is such information or advice necessary or desired. Neither the Placement Agent nor any Affiliate has made or makes any representation as to the Company or the quality of the Securities and the Placement Agent and any Affiliate may have acquired non-public information with respect to the Company which such Purchaser agrees need not be provided to it. In connection with the issuance of the Securities to such Purchaser, neither the Placement Agent nor any of its Affiliates has acted as a financial advisor or fiduciary to such Purchaser.

  • Access to Software Access Rights to Software which is Results shall comprise: Access to the Object Code; and, where normal use of such an Object Code requires an Application Programming Interface (hereafter API), Access to the Object Code and such an API; and, if a Party can show that the execution of its tasks under the Project or the Exploitation of its own Results is technically or legally impossible without Access to the Source Code, Access to the Source Code to the extent necessary. Background shall only be provided in Object Code unless otherwise agreed between the Parties concerned.

  • Access to NID 2.17.3.1 TWTC may access the customer’s premises wiring by any of the following means and TWTC shall not disturb the existing form of electrical protection and shall maintain the physical integrity of the NID:

  • Accessibility of Web-Based Information and Applications For State Agency Authorized User Acquisitions: Any web-based information and applications development, or programming delivered pursuant to the contract or procurement, will comply with New York State Enterprise IT Policy NYS-P08-005, Accessibility of Web-Based Information and Applications as follows: Any web-based information and applications development, or programming delivered pursuant to the contract or procurement, will comply with New York State Enterprise IT Policy NYS-P08- 005, Accessibility of Web-Based Information and Applications as such policy may be amended, modified or superseded, which requires that state agency web-based information and applications are accessible to persons with disabilities. Web-based information and applications must conform to New York State Enterprise IT Policy NYS-P08-005 as determined by quality assurance testing. Such quality assurance testing will be conducted by the State Agency Authorized User and the results of such testing must be satisfactory to the Authorized User before web-based information and applications will be considered a qualified deliverable under the contract or procurement.

  • Insurance and Fingerprint Requirements Information Insurance If applicable and your staff will be on TIPS member premises for delivery, training or installation etc. and/or with an automobile, you must carry automobile insurance as required by law. You may be asked to provide proof of insurance. Fingerprint It is possible that a vendor may be subject to Chapter 22 of the Texas Education Code. The Texas Education Code, Chapter 22, Section 22.0834. Statutory language may be found at: xxxx://xxx.xxxxxxxx.xxxxx.xxxxx.xx.xx/ If the vendor has staff that meet both of these criterion: (1) will have continuing duties related to the contracted services; and (2) has or will have direct contact with students Then you have ”covered” employees for purposes of completing the attached form. TIPS recommends all vendors consult their legal counsel for guidance in compliance with this law. If you have questions on how to comply, see below. If you have questions on compliance with this code section, contact the Texas Department of Public Safety Non-Criminal Justice Unit, Access and Dissemination Bureau, FAST-FACT at XXXX@xxxxx.xxxxx.xx.xx and you should send an email identifying you as a contractor to a Texas Independent School District or ESC Region 8 and TIPS. Texas DPS phone number is (000) 000-0000. See form in the next attribute to complete entitled: Texas Education Code Chapter 22 Contractor Certification for Contractor Employees

  • PROHIBITION ON NON-COMPETE RESTRICTIONS Grantee shall not require any employees or Subcontractors to agree to any conditions, such as non-compete clauses or other contractual arrangements that would limit or restrict such persons or entities from employment or contracting with the State of Texas.

Time is Money Join Law Insider Premium to draft better contracts faster.