Protection from Unauthorized Access and Use Sample Clauses

Protection from Unauthorized Access and Use. The Subscriber will use reasonable efforts to:  limit access to and use of the Subscribed Products to Authorized Users and notify all Authorized Users of the usage restrictions set forth in this Agreement and that they must comply with such restrictions;  issue any passwords or credentials used to access the Subscribed Products only to Authorized Users, not divulge any passwords or credentials to any third party, and notify all Authorized Users not to divulge any passwords or credentials to any third party;  provide true, complete and accurate IP addresses, as identified on Schedule 2, (if any) for the exclusive use by the Subscriber (including, if requested by Elsevier, written confirmation by the relevant third party internet service provider) and proactively inform Elsevier of any changes to the Subscriber IP addresses, including the addresses no longer being used exclusively by the Subscriber; and  promptly upon becoming aware of any unauthorized use of the Subscribed Products, inform Elsevier and take appropriate steps to end such activity and to prevent any recurrence. In the event of any unauthorized use of the Subscribed Products, Elsevier may suspend the access and/or require that the Subscriber suspend the access from where the unauthorized use occurred upon notice to the Subscriber. The Subscriber will not be liable for unauthorized use of the Subscribed Products by any Authorized Users provided that the unauthorized use did not result from the Subscriber’s own negligence or willful misconduct and that the Subscriber did not permit such unauthorized use to continue after having actual notice thereof. The Subscriber will be responsible for the adherence to the terms and conditions of this Agreement by a third party provider the Subscriber engages, in particular, if such third party provider supplies and manages IP addresses.
AutoNDA by SimpleDocs
Protection from Unauthorized Access and Use. The Subscriber will use reasonable efforts to: • limit access to and use of the Subscribed Products to Authorized Users and notify all Authorized Users of the usage restrictions set forth in this Agreement and that they must comply with such restrictions; • issue any passwords or credentials used to access the Subscribed Products only to Authorized Users, not divulge any passwords or credentials to any third party, and notify all Authorized Users not to divulge any passwords or credentials to any third party; and • promptly upon becoming aware of any unauthorized use of the Subscribed Products, inform Open-SCS and OPC Foundation who will take appropriate steps to end such activity and to prevent any recurrence. In the event of any unauthorized use of the Subscribed Products, Open-SCS and OPC Foundation may suspend the access and/or require that the Subscriber suspend the access from where the unauthorized use occurred upon notice to the Subscriber. The Subscriber will not be liable for unauthorized use of the Subscribed Products by any Authorized Users provided that the unauthorized use did not result from the Subscriber’s own negligence or willful misconduct and that the Subscriber did not permit such unauthorized use to continue after having actual notice thereof.
Protection from Unauthorized Access and Use. The Subscriber shall use reasonable efforts to:
Protection from Unauthorized Access and Use. The Subscriber shall use reasonable efforts to:  ensure that access to and use of the Subscribed Products is limited to Authorized Users and that all Authorized Users are notified of and comply with the usage restrictions set forth in this Agreement;  ensure that any passwords or credentials used to access the Subscribed Products are issued only to Authorized Users and that neither the Subscriber nor its Authorized Users divulge any passwords or credentials to any third party; and  immediately upon becoming aware of any unauthorized use of the Subscribed Products, inform Elsevier and take appropriate steps to ensure that such activity ceases and to prevent any recurrence. In the event of any unauthorized use of the Subscribed Products, Elsevier may suspend the access and/or require that the Consortium and relevant Institution(s) suspend the access from where the unauthorized use occurred upon notice to the Consortium and relevant Institution(s).
Protection from Unauthorized Access and Use. The Subscriber will use reasonable efforts to: ▪ limit access to and use of the Subscribed Products to Authorized Users and notify all Authorized Users of the usage restrictions set forth in this Agreement and that they must comply with such restrictions; ▪ issue any passwords or credentials used to access the Subscribed Products only to Authorized Users, not divulge any credentials for authentication to any third party, and ensure that Authorized Users do not divulge any passwords or credentials to any third party; ▪ provide true, complete and accurate IP addresses, as needed by Elsevier for the performance of this Agreement (if any); ▪ implement systems for the prompt deactivation of any credentials for authentication when an individual ceases to be an Authorized User or where their access presents a security risk; ▪ promptly, on becoming aware of any unauthorized use of the Subscribed Products, inform Elsevier and take appropriate steps to end such activity and to prevent any recurrence; and ▪ ensure that all Authorized Users comply with the Documentation, as updated from time to time. If any unauthorized use of the Subscribed Products occurs or if Elsevier suspects that it may have occurred or be about to occur, Elsevier may immediately suspend the access and/or require that the Subscriber suspend the access from where the unauthorized use occurred or where it is suspected. The Subscriber will cooperate fully with Elsevier’s reasonable requests surrounding the investigation and remediation of any unauthorized use. The Subscriber will be responsible for the adherence to the terms and conditions of this Agreement by a third party provider the Subscriber engages, in particular, if such third party provider supplies and manages IP addresses.

Related to Protection from Unauthorized Access and Use

  • Unauthorized Access Notification XXX shall notify Provider promptly of any known unauthorized access. XXX will assist Provider in any efforts by Provider to investigate and respond to any unauthorized access.

  • Unauthorized Access Using service to access, or to attempt to access without authority, the accounts of others, or to penetrate, or attempt to penetrate, security measures of Company’s or a third party’s computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in disruption of service or the corruption or loss of data.

Time is Money Join Law Insider Premium to draft better contracts faster.