Solution Access and Usage Sample Clauses

Solution Access and Usage. 5.1. ACCESS TO THE SOLUTION - The Licensee acknowledges that the Solution and the Application Service are accessible via a remote connection requiring Internet access. It is up to them to have the appropriate equipment and means of connection to maintain Internet access. The Licensee is fully aware of the technical hazards inherent in the Internet and of interruptions or slowdowns that can affect the connection. Consequently, the Licensor cannot be held liable for difficulties in accessing the Solution or the Application Service due to disruptions in the Internet network. Access to the Solution and / or the Application Service may also be occasionally suspended, without the Licensor's liability being sought in this regard, due to maintenance interventions necessary for the proper functioning of the Licensor's servers. The Licensor undertakes to inform the Licensee under the conditions referred into article 7 below of the interruption of access to the Solution or to the Application Service. Access to the Solution and Application Service is granted from any Terminal, within the limits of the availability conditions referred to in Appendix 1, by means of Identifiers assigned by the Licensor or one of its distributors or resellers to the Licensee or the identification system set up by the Licensee. The Licensee is required to comply with the Licensor's instructions and the technical prerequisites contained in the Documentation relating to the Solution and the Application Xxxxxxx.Xx is the Licensee's responsibility to regularly modify and have modified by Authorized Users the passwords associated with the Identifiers. Identifiers are intended to restrict access to the Solution and Application Service to authorized Users only and to protect the completeness and availability of the Solution, Application Service and Licensee Data.The Identifiers are personal to each Authorized User and confidential, they are proof of the identity of the Authorized User. They may only be changed at the Licensee's request or at the Licensor's initiative in the event of a security risk, subject to informing the Licensee by any means. The Licensee undertakes to maintain the confidentiality and secrecy of the Identifiers and not to disclose them in any form whatsoever to third parties. The use of the Identifiers binds the Licensee to any use of the Solution and the Application Service; it is his responsibility to ensure that the Authorized Users respect the terms of the License Agreeme...
AutoNDA by SimpleDocs
Solution Access and Usage. Subject to the terms of the Agreement, up to the maximum number of Users indicated in your Order under may access the StartSourcing Solution during the Subscription Term and any applicable Renewal Term to conduct, in the aggregate, up to the maximum number of Projects per Month indicated. In addition, Team Members may access the StartSourcing Solution during the Subscription Term solely for purposes of participating in a Project managed by a User. Team Members are not permitted to initiate or manage Projects on the StartSourcing Solution.
Solution Access and Usage. Subject to the terms of your Order and the Agreement, up to the maximum number of Users indicated in your Order may access the Solution during the Subscription Term. In addition, Team Members may access the Solution during the Subscription Term to view, edit, revise, request and reference contracts, but not to create any new contract workspaces, or to serve as the "Owner" of any active Contract Workspace. "Owner" means, in regards to an active Contract Workspace, the individual: (a) listed as "Owner" on the tab titled "Overview"; (b) included in the list of individuals under the group titled "Project Owner" on the team tab; or, (c) included in a Project Group (as an individual or as a member of another group) where such Project Group is assigned the role of "Project Owner". For purposes of this section, "Contract Workspace" includes any Sales Contract Workspace, Internal Contract Workspace, or Procurement Contract Workspace, but does not include any Sales Contract Request or Procurement Contract Request. Capitalized terms not defined in this section or elsewhere in the Agreement are defined in the Solution's Documentation.
Solution Access and Usage 

Related to Solution Access and Usage

  • Union Access 54. The Union shall have reasonable access to all work locations to verify that the terms and conditions of this Agreement are being carried out and for the purpose of conferring with employees provided that access shall be subject to such rules and regulations immediately below, as well as to such rules and regulations as may be agreed to by the department and the Union.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization. Measures: • Multiple authorization levels are used when granting access to sensitive systems, including those storing and processing Personal Data. Authorizations are managed via defined processes according to the SAP Security Policy • All personnel access SAP’s systems with a unique identifier (user ID). • SAP has procedures in place so that requested authorization changes are implemented only in accordance with the SAP Security Policy (for example, no rights are granted without authorization). In case personnel leaves the company, their access rights are revoked. • SAP has established a password policy that prohibits the sharing of passwords, governs responses to password disclosure, and requires passwords to be changed on a regular basis and default passwords to be altered. Personalized user IDs are assigned for authentication. All passwords must fulfill defined minimum requirements and are stored in encrypted form. In the case of domain passwords, the system forces a password change every six months in compliance with the requirements for complex passwords. Each computer has a password-protected screensaver. • The company network is protected from the public network by firewalls. • SAP uses up–to-date antivirus software at access points to the company network (for e-mail accounts), as well as on all file servers and all workstations. • Security patch management is implemented to provide regular and periodic deployment of relevant security updates. Full remote access to SAP’s corporate network and critical infrastructure is protected by strong authentication.

  • User Access Transfer Agent shall have a process to promptly disable access to Fund Data by any Transfer Agent personnel who no longer requires such access. Transfer Agent will also promptly remove access of Fund personnel upon receipt of notification from Fund.

  • Union Access to Premises Representatives of the Union shall have access to the Company’s premises to carry on inspections or investigations pertaining to the terms and conditions of this Agreement, upon reasonable advance notice to the Company. Such access shall be carried on at reasonable hours and in such a manner so as not to interfere with the normal operations of the Company. The Union will advise the Company of its designated representatives who wish to gain access to the premises and the Union agrees to comply with all reasonable Company security precautions as may be in force from time to time.

  • System Access CUSTOMER agrees to provide to PROVIDER, at CUSTOMER’S expense, necessary access to the mainframe computer and related information technology systems (the “System”) on which CUSTOMER data is processed during the times (the “Service Hours”) specified in the PSAs, subject to reasonable downtime for utility outages, maintenance, performance difficulties and the like. In the event of a change in the Service Hours, CUSTOMER will provide PROVIDER with at least fifteen (15) calendar days written notice of such change.

  • Network Services Local Access Services In lieu of any other rates and discounts, Customer will pay fixed monthly recurring local loop charges ranging from $1,200 to $2,000 for TDM-based DS-3 Network Services Local Access Services at 2 CLLI codes mutually agreed upon by Customer and Company.

  • Network Access TENANT may find it necessary to purchase a network interface card, wireless PC card or other hardware in order to connect to the internet service. LANDLORD is not responsible for the purchase of these items and LANDLORD cannot guarantee compatibility with any device TENANT may have. The computer and network card must have software installed that supports the Internet Protocol commonly referred to as TCP/IP. Any conflicts between the software compatibility of the network and the TENANT’S computer operating system or any other feature will be the responsibility of the TENANT to resolve. LANDLORD will not be responsible for software issues related to the user’s personal computer.

  • Zone File Access Agreement Registry Operator will enter into an agreement with any Internet user, which will allow such user to access an Internet host server or servers designated by Registry Operator and download zone file data. The agreement will be standardized, facilitated and administered by a Centralized Zone Data Access Provider, which may be ICANN or an ICANN designee (the “CZDA Provider”). Registry Operator (optionally through the CZDA Provider) will provide access to zone file data per Section 2.1.3 of this Specification and do so using the file format described in Section 2.1.4 of this Specification. Notwithstanding the foregoing, (a) the CZDA Provider may reject the request for access of any user that does not satisfy the credentialing requirements in Section 2.1.2 below; (b) Registry Operator may reject the request for access of any user that does not provide correct or legitimate credentials under Section 2.1.2 below or where Registry Operator reasonably believes will violate the terms of Section 2.1.5. below; and, (c) Registry Operator may revoke access of any user if Registry Operator has evidence to support that the user has violated the terms of Section 2.1.5 below.

  • Access to Facility 13.1 Each Party shall ensure that its facilities are secured at all times.

  • Account Access Electronic Check Transactions may only be made from your checking account.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!