Protectionfrom Unauthorized Access and Use Sample Clauses

Protectionfrom Unauthorized Access and Use. The Subscriber shall use reasonable efforts to: • limit access to and use of the Subscribed Products to Authorized Users and notify all Authorized Users of the usage restrictions set forth in this Agreement and that they must comply with such restrictions; • issue any passwords or credentials used to access the Subscribed Products only to Authorized Users, not divulge any passwords or credentials to any third party, and notify all Authorized Users not to divulge any passwords or credentials to any third party; and • promptly upon becoming aware of any unauthorized use of the Subscribed Products, inform Elsevier and take appropriate steps to end such activity and to prevent any recurrence. In the event o f any unauthorized use of the Subscribed Products, Elsevier may suspend the access and/or require that the Consortium and relevant Institution(s) suspend the access from where the unauthorized use occurred upon notice to the Consortium and relevant Institution(s). The Subscriber shall not be liable for unauthorized use o f the Subscribed Products by any Authorized Users provided that the unauthorized use did not result from the Subscriber’s own negligence or willful misconduct and that the Subscriber did not permit such unauthorized use to continue after having actual notice thereof.
AutoNDA by SimpleDocs
Protectionfrom Unauthorized Access and Use. The Subscriber will use reasonable efforts to: • limit access to and use of the Subscribed Producťs to Authorized Users and notify all Authorized Users of the usage restrictions set forth in this Agreement and that they must comply with such restrictions; • issue any passwords or credentials used to access the Subscribed Products only to Authorized Users, not divulge any passwords or credentials to any third party, and notify all Authorized Users not to divulge any passwords or credentials to any third party; • provide true, complete and accurate lP addresses, as identified on Schedule 2, (ifany) for the exclusive use by the Subscriber (including, if requested by Elsevier, written confirmation by the relevant third party internet service provider) and proactively inform Elsevier of any changes to the Subscriber IP addresses, including the addresses no longer being used exclusively by the Subscriber; and • promptly upon becoming aware of any unauthorized use of the Subscribed Products, inform Elsevier and take appropriate steps to end such activity and to prevent any recurrence. ln the event ofany unauthorized use of the Subscribed Products, Elsevier may suspend the access and/or require that the Subscriber suspend the access from where the unauthorized use occurred upon notice to the Subscriber. The Subscriber will not be liable for unauthorized use of the Subscribed Products by any Authorized Users provided that the unauthorized use did not result from the Subscriber's own negligence or wiIlfu! misconduct and that the Subscriber did not permit such unauthorized use to continue after having actual notice thereof. The Subscriber will be responsible for the adherence to the terms and conditions of this Agreement by a third party provider the Subscriber engages, in particular, ifsuch third party provider supplies and manages IP addresses.

Related to Protectionfrom Unauthorized Access and Use

  • Protection from Unauthorized Use Licensee shall secure that Participating Institutions will use reasonable efforts to restrict access to the Licensed Materials to Authorized Users.

  • Unauthorized Access Notification LEA shall notify Provider promptly of any known or suspected unauthorized access. LEA will assist Provider in any efforts by Provider to investigate and respond to any unauthorized access.

  • Unauthorized Access Using service to access, or to attempt to access without authority, the accounts of others, or to penetrate, or attempt to penetrate, security measures of Company’s or a third party’s computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in disruption of service or the corruption or loss of data.

  • Notice of Unauthorized Use The Receiving Party will notify the Disclosing Party immediately upon discovery of any unauthorized use or disclosure of Confidential Information or any other breach of this Agreement by Receiving Party. The Receiving Party will cooperate with the Disclosing Party in every reasonable way to help the Disclosing Party regain possession of such Confidential Information and prevent its further unauthorized use.

  • Access and Use 1. Each Party shall ensure that enterprises of the other Party have access to and use of any public telecommunications network or service, including leased circuits, offered in its territory or across its borders on a timely basis and on terms and conditions that are reasonable and non-discriminatory such as those set out in paragraphs 2 to 6.

  • Unauthorized Use Licensee, the Participating Institutions, or Authorized Users shall not knowingly permit anyone other than Authorized Users to access the Licensed Materials.

  • Control and Access to Information The Financial Mechanism Committee, the EFTA Board of Auditors and their representatives have the right to carry out any technical or financial mission or review they consider necessary to follow the planning, implementation and monitoring of programmes and projects as well as the use of funds. The Beneficiary State shall provide all necessary assistance, information and documentation.

  • Notification of Xxxxxx and Unauthorized Release (a) Vendor will promptly notify the District of any breach or unauthorized release of Protected Data it has received from the District in the most expedient way possible and without unreasonable delay, but no more than seven (7) calendar days after Vendor has discovered or been informed of the breach or unauthorized release.

  • Authorized Access Transfer Agent shall have controls that are designed to maintain the logical separation such that access to systems hosting Fund Data and/or being used to provide services to Fund will uniquely identify each individual requiring access, grant access only to authorized personnel based on the principle of least privileges, and prevent unauthorized access to Fund Data.

  • Employment of Unauthorized Aliens The employment of unauthorized aliens by the Grantee is considered a violation of Section 274A (a) of the Immigration and Nationality Act. If the Grantee knowingly employs unauthorized aliens, such violation shall be cause for unilateral cancellation of this Agreement.

Time is Money Join Law Insider Premium to draft better contracts faster.