Solution Access and Usage Sample Clauses

Solution Access and Usage. 5.1. ACCESS TO THE SOLUTION - The Licensee acknowledges that the Solution and the Application Service are accessible via a remote connection requiring Internet access. It is up to them to have the appropriate equipment and means of connection to maintain Internet access. The Licensee is fully aware of the technical hazards inherent in the Internet and of interruptions or slowdowns that can affect the connection. Consequently, the Licensor cannot be held liable for difficulties in accessing the Solution or the Application Service due to disruptions in the Internet network. Access to the Solution and / or the Application Service may also be occasionally suspended, without the Licensor's liability being sought in this regard, due to maintenance interventions necessary for the proper functioning of the Licensor's servers. The Licensor undertakes to inform the Licensee under the conditions referred into article 7 below of the interruption of access to the Solution or to the Application Service.
AutoNDA by SimpleDocs
Solution Access and Usage. Subject to the terms of the Agreement, up to the maximum number of Users indicated in your Order under may access the StartSourcing Solution during the Subscription Term and any applicable Renewal Term to conduct, in the aggregate, up to the maximum number of Projects per Month indicated. In addition, Team Members may access the StartSourcing Solution during the Subscription Term solely for purposes of participating in a Project managed by a User. Team Members are not permitted to initiate or manage Projects on the StartSourcing Solution.
Solution Access and Usage. Subject to the terms of your Order and the Agreement, up to the maximum number of Users indicated in your Order may access the Solution during the Subscription Term. In addition, Team Members may access the Solution during the Subscription Term to view, edit, revise, request and reference contracts, but not to create any new contract workspaces, or to serve as the "Owner" of any active Contract Workspace. "Owner" means, in regards to an active Contract Workspace, the individual: (a) listed as "Owner" on the tab titled "Overview"; (b) included in the list of individuals under the group titled "Project Owner" on the team tab; or, (c) included in a Project Group (as an individual or as a member of another group) where such Project Group is assigned the role of "Project Owner". For purposes of this section, "Contract Workspace" includes any Sales Contract Workspace, Internal Contract Workspace, or Procurement Contract Workspace, but does not include any Sales Contract Request or Procurement Contract Request. Capitalized terms not defined in this section or elsewhere in the Agreement are defined in the Solution's Documentation.
Solution Access and Usage 

Related to Solution Access and Usage

  • Union Access The Union shall have reasonable access to all work locations to verify that the terms and conditions of this Agreement are being carried out and for the purpose of conferring with employees, provided that access shall be subject to such rules and regulations immediately below, as well as to such rules and regulations as may be agreed to by the department and the union. Union access to work locations will not disrupt or interfere with a department’s mission and services or involve any political activities.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization.

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • User Access Transfer Agent shall have a process to promptly disable access to Fund Data by any Transfer Agent personnel who no longer requires such access. Transfer Agent will also promptly remove access of Fund personnel upon receipt of notification from Fund.

  • System Access CUSTOMER agrees to provide to PROVIDER, at CUSTOMER’S expense, necessary access to the mainframe computer and related information technology systems (the “System”) on which CUSTOMER data is processed during the times (the “Service Hours”) specified in the PSAs, subject to reasonable downtime for utility outages, maintenance, performance difficulties and the like. In the event of a change in the Service Hours, CUSTOMER will provide PROVIDER with at least fifteen (15) calendar days written notice of such change.

  • Network Services Local Access Services In lieu of any other rates and discounts, Customer will pay fixed monthly recurring local loop charges ranging from $1,200 to $2,000 for TDM-based DS-3 Network Services Local Access Services at 2 CLLI codes mutually agreed upon by Customer and Company.

  • REMOTE ACCESS SERVICES ADDENDUM The Custodian and each Fund agree to be bound by the terms of the Remote Access Services Addendum hereto.

  • Collateral Access Agreements Such Grantor shall use commercially reasonable efforts to obtain a Collateral Access Agreement, from the lessor of each leased property, mortgagee of owned property or bailee or consignee with respect to the operator of any warehouse, processor or converter facility or other location (each of which is identified on Exhibit B hereto), where Collateral in excess of $1,000,000 is stored or located at any given time (other than (i) company-owned facilities and (ii) retail stores), which agreement or letter shall provide access rights, contain a waiver or subordination of all Liens or claims that the landlord, mortgagee, bailee or consignee may assert against the Collateral at that location, and shall otherwise be reasonably satisfactory in form and substance to the Administrative Agent. With respect to such locations or warehouse space leased as of the Effective Date and thereafter where Collateral in excess of $1,000,000 is stored or located (other than (i) company-owned facilities and (ii) retail stores), if the Administrative Agent has not received a Collateral Access Agreement as of the Effective Date (or, if later as of the date such location is acquired or leased), the Borrower’s Eligible Inventory at that location shall be subject to such Reserves as may be established by the Administrative Agent. After the Effective Date, no real property or warehouse space shall be leased by such Grantor (other than retail stores) and no Inventory shall be shipped to a processor or converter under arrangements established after the Effective Date, unless and until a satisfactory Collateral Access Agreement shall first have been obtained with respect to such location or if it has not been obtained, the Borrower’s Eligible Inventory at that location shall be subject to the establishment of Reserves acceptable to the Administrative Agent. Such Grantor shall timely and fully pay and perform its obligations under all leases and other agreements with respect to each leased location or third party warehouse where any Collateral is or may be located.

  • Network Access TENANT may find it necessary to purchase a network interface card, wireless PC card or other hardware in order to connect to the internet service. LANDLORD is not responsible for the purchase of these items and LANDLORD cannot guarantee compatibility with any device TENANT may have. The computer and network card must have software installed that supports the Internet Protocol commonly referred to as TCP/IP. Any conflicts between the software compatibility of the network and the TENANT’S computer operating system or any other feature will be the responsibility of the TENANT to resolve. LANDLORD will not be responsible for software issues related to the user’s personal computer.

  • Zone File Access Agreement Registry Operator will enter into an agreement with any Internet user, which will allow such user to access an Internet host server or servers designated by Registry Operator and download zone file data. The agreement will be standardized, facilitated and administered by a Centralized Zone Data Access Provider, which may be ICANN or an ICANN designee (the “CZDA Provider”). Registry Operator (optionally through the CZDA Provider) will provide access to zone file data per Section 2.1.3 of this Specification and do so using the file format described in Section 2.1.4 of this Specification. Notwithstanding the foregoing, (a) the CZDA Provider may reject the request for access of any user that does not satisfy the credentialing requirements in Section 2.1.2 below; (b) Registry Operator may reject the request for access of any user that does not provide correct or legitimate credentials under Section 2.1.2 below or where Registry Operator reasonably believes will violate the terms of Section 2.1.5. below; and, (c) Registry Operator may revoke access of any user if Registry Operator has evidence to support that the user has violated the terms of Section 2.1.5 below.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!