Suspending access Sample Clauses

Suspending access. Without limiting any other right or remedy available to the Supplier, the Supplier may restrict or suspend the Client's access to the SaaS Service where the Client (including any of its personnel) or one or more of its Permitted Users: a undermines, or attempts to undermine, the security or integrity of the SaaS Service or any Underlying Systems; b uses, or attempts to use, the SaaS Service: i for improper purposes; or ii in a manner, other than for normal operational purposes, that materially reduces the operational performance of the SaaS Service; or c has otherwise materially breached the Agreement (in the Supplier's reasonable opinion).
AutoNDA by SimpleDocs
Suspending access. Without limiting any other right or remedy available to us, we may restrict or suspend your access to the Geneious Subscription Services where you (including any of your Personnel): a undermine, or attempt to undermine, the security or integrity of the Geneious Subscription Services or any Underlying Systems; b use, or attempt to use, the Geneious Subscription Services or the Geneious Software: i for improper purposes; or ii in a manner, other than for normal operational purposes, that materially reduces the operational performance of the Geneious Subscription Services; or c have otherwise materially breached this Agreement (in our reasonable opinion).
Suspending access. Without limiting any other right or remedy available to the Supplier, the Supplier may restrict or suspend the Client’s access to the Datch Service where the Client (including any of its personnel): a) undermines, or attempts to undermine, the security or integrity of the Datch Service or any Underlying Systems; b) uses, or attempts to use, the Datch Service: i) for improper purposes; or ii) in a manner, other than for normal operational purposes, that materially reduces the operational performance of the Datch Service; or c) has otherwise materially breached the Agreement (in the Supplier’s reasonable opinion).
Suspending access. Without limiting any other right or remedy available to the Supplier, the Supplier may re- strict or suspend the Subscriber’s access to the SaaS Service where the Subscriber (including any of its personnel): a. undermines, or attempts to undermine, the security or integrity of the SaaS Service or any Underlying Systems; b. uses, or attempts to use, the SaaS Service: i. for improper purposes; or ii. in a manner, other than for normal operational purposes, that materially reduces the operational performance of the SaaS Service; or c. has otherwise materially breached the Agreement (in the Supplier’s reasonable opinion).
Suspending access. Without limiting any other right or remedy available to CySEP, CySEP may restrict or suspend your access to the SaaS Service where you (including any of its personnel):
Suspending access. Without limiting any other right or remedy available to the Supplier, the Supplier may restrict the Client’s access to the SaaS Service where the Client (including any of its personnel): 1. undermines, or attempts to undermine, the security or integrity of the SaaS Service or any Underlying Systems; 2. uses, or attempts to use, the SaaS Service:

Related to Suspending access

  • Exceptional Access to Thick Registration Data In case of a registrar failure, deaccreditation, court order, etc. that prompts the temporary or definitive transfer of its domain names to another registrar, at the request of ICANN, Registry Operator will provide ICANN with up-­‐to-­‐date data for the domain names of the losing registrar. The data will be provided in the format specified in Specification 2 for Data Escrow. The file will only contain data related to the domain names of the losing registrar. Registry Operator will provide the data as soon as commercially practicable, but in no event later than five (5) calendar days following ICANN’s request. Unless otherwise agreed by Registry Operator and ICANN, the file will be made available for download by ICANN in the same manner as the data specified in Section 3.1 of this Specification.

  • Open Access Same-Time Information System (OASIS): 1. 28A Operating Agreement of the PJM Interconnection, L.L.C. or Operating Agreement:

  • System Access CUSTOMER agrees to provide to PROVIDER, at CUSTOMER’S expense, necessary access to the mainframe computer and related information technology systems (the “System”) on which CUSTOMER data is processed during the times (the “Service Hours”) specified in the PSAs, subject to reasonable downtime for utility outages, maintenance, performance difficulties and the like. In the event of a change in the Service Hours, CUSTOMER will provide PROVIDER with at least fifteen (15) calendar days written notice of such change.

  • ICANN Access Registry Operator shall provide bulk access to the zone files for the TLD to ICANN or its designee on a continuous basis in the manner ICANN may reasonably specify from time to time. Access will be provided at least daily. Zone files will include SRS data committed as close as possible to 00:00:00 UTC.

  • Facility Access Notwithstanding any other provision of the Agreement, the Customer shall provide the Authority with such access to the Facility, and such documentation, as the Authority deems necessary to determine the Customer’s compliance with the Customer’s Supplemental Commitments specified in this Schedule B.

  • Site Access Dell requires the right to access the APEX System in a timely way and as provided in the Service Offering Description to provide the Support Services. Failure to ensure that Customer provides Dell with timely access to a Site will relieve Dell of the Support Services obligations and Dell may also, at Dell’s discretion, suspend the APEX Service.

  • Unbundled Loop Modifications (Line Conditioning 2.5.1 Line Conditioning is defined as routine network modification that BellSouth regularly undertakes to provide xDSL services to its own customers. This may include the removal of any device, from a copper Loop or copper Subloop that may diminish the capability of the Loop or Subloop to deliver high-speed switched wireline telecommunications capability, including xDSL service. Such devices include, load coils, excessive bridged taps, low pass filters, and range extenders. Excessive bridged taps are bridged taps that serves no network design purpose and that are beyond the limits set according to industry standards and/or the BellSouth’s TR 73600 Unbundled Local Loop Technical Specification. 2.5.2 BellSouth will remove load coils only on copper Loops and Subloops that are less than eighteen thousand (18,000) feet in length. 2.5.3 For any copper loop being ordered by NewPhone which has over six thousand (6,000) feet of combined bridged tap will be modified, upon request from NewPhone, so that the loop will have a maximum of six thousand (6,000) feet of bridged tap. This modification will be performed at no additional charge to NewPhone. Loop conditioning orders that require the removal of bridged tap that serves no network design purpose on a copper Loop that will result in a combined total of bridged tap between two thousand five hundred (2,500) and six thousand (6,000) feet will be performed at the rates set forth in Exhibit A. 2.5.4 NewPhone may request removal of any unnecessary and non-excessive bridged tap (bridged tap between zero (0) and two thousand five hundred (2,500) feet which serves no network design purpose), at rates pursuant to BellSouth’s SC Process as mutually agreed to by the Parties. 2.5.5 Rates for ULM are as set forth in Exhibit A. 2.5.6 BellSouth will not modify a Loop in such a way that it no longer meets the technical parameters of the original Loop type (e.g., voice grade, ADSL, etc.) being ordered. 2.5.7 If NewPhone requests ULM on a reserved facility for a new Loop order, BellSouth may perform a pair change and provision a different Loop facility in lieu of the reserved facility with ULM if feasible. The Loop provisioned will meet or exceed specifications of the requested Loop facility as modified. NewPhone will not be charged for ULM if a different Loop is provisioned. For Loops that require a DLR or its equivalent, BellSouth will provide LMU detail of the Loop provisioned. 2.5.8 NewPhone shall request Loop make up information pursuant to this Attachment prior to submitting a service inquiry and/or a LSR for the Loop type that NewPhone desires BellSouth to condition. 2.5.9 When requesting ULM for a Loop that BellSouth has previously provisioned for NewPhone, NewPhone will submit a SI to BellSouth. If a spare Loop facility that meets the Loop modification specifications requested by NewPhone is available at the location for which the ULM was requested, NewPhone will have the option to change the Loop facility to the qualifying spare facility rather than to provide ULM. In the event that BellSouth changes the Loop facility in lieu of providing ULM, NewPhone will not be charged for ULM but will only be charged the service order charges for submitting an order.

  • Service Activation For new customers - the services are activated immediately after successful processing of payment and our fraud detection software approves the order. The payment verification procedure is obligatory and if we fail to approve a transaction within 48 hours of the payment submission, the funds will be credited back to the payer and the order will be cancelled. Free Trials - All free trial orders are manually processed. If we deem your order to be suspicious or high risk, we will notify you and request additional information before process the order. Failure to comply with our request for more information will result in cancellation of the order. For existing customers - the services for existing customers, including upgrade services and renewals, are activated immediately after our Sales Department receives the according service payment.

  • EU Access SAP will use only European Subprocessors to provide support requiring access to Personal Data in the Cloud Service and SAP shall not export Personal Data outside of the EEA or Switzerland unless expressly authorized by Customer in writing (e-mail permitted) on a case by case basis; or as excluded under Section 9.4.

  • Customer Requirements Customer will be required to maintain complex passwords for their User accounts where applicable. For any such passwords LightEdge will provide a secure URL that any User can access to change passwords. All User passwords are set to a ninety (90) day password expiration schedule by default. LightEdge is not responsible for unexpected use of Services whether by ex-employees, compromised User passwords or any other misuse of Customer accounts. Customer shall be responsible for all costs incurred by such unexpected use of Service. Customer shall be fully responsible for providing to LightEdge at Customer’s own expense and in a timely manner the following: - All security for its Services and systems used or accessible in connection with Service; - Cooperative testing of all Customer-provided hardware, software, and Services for compatibility with Service; - Designating an Authorized Contact(s) to be the point of contact to interface with LightEdge Technical Support; - All cabling necessary to support Service; and - Physical and remote management access to any and all Servers onto which Service is installed.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!