Systems Access Sample Clauses

Systems Access. To the extent that a Party and/or its Affiliates is given access to the computer systems, infrastructure, databases, software, facilities, or networks of the other Party or any Third-Party Provider (“Systems”) in connection with the performance or receipt of Services hereunder, such access shall be limited to access in connection with performance or receipt, as applicable, of such Services. Each Party shall cause its personnel and any personnel of its Affiliates with such access to comply with the system security policies, standards, procedures and requirements of the other Party or any Third-Party Provider, as reasonably revised from time to time, with regard to the Systems or in any applicable license agreement or lease agreement in effect with regard to the Systems (the “Security Regulations”), and will not tamper with, compromise or circumvent any security or audit measures employed by the other Party or any Third-Party Provider, as applicable; provided, in either case, that such Party has prior notice of the applicable Security Regulations or security or audit measures.
Systems Access. If XYZ grants Vendor the right to access the XYZ’s online tools allowing for the electronic presentment of certain Confidential Information (“System”) that XYZ makes available to provide up-to-date information on Program participation and related information, the following conditions apply: The System, and any documentation with respect to the System, shall be treated as Confidential Information as defined in this Agreement and subject to the same confidentiality restrictions contained herein. Any content, tools, or other materials appearing on the System are the intellectual property of XYZ and/or its licensors and may not be copied, reproduced, licensed, or sold by Vendor. Further, access to the System shall not be construed as conferring any license of XYZ’s or its licensors intellectual property rights. Vendor agrees not to modify, alter , or deface any trademarks, service marks, or other intellectual property of XYZ made available through the System. Vendor further agrees not to adapt, translate, modify, decompile, disassemble, or reverse engineer the System or any software or programs used in connection with the System. XYZ will assign a User ID and password to each Vendor user (a “User”). Users may not disclose or otherwise make User IDs or passwords available to any third party. If a User ceases to be a User for any reason, including a change in roles within Vendor’s organization or termination of employment, or the User otherwise discloses his or her intent to resign, Vendor shall notify XYZ within two (2) business days so that XYZ can disable the applicable User ID and password. Vendor is responsible for any and all breaches of security relating to the use of a User’s User ID and password until XYZ has disabled that User ID and password. Vendor also agrees to comply with XYZ’s security measures which XYZ will notify Vendor of in writing with respect to Vendor’s access and use of the System. If there is a breach or suspected breach of a User ID or password, Vendor and/or the User must notify XYZ immediately by telephone and promptly follow up with a notice in writing sent via email. Vendor shall maintain reasonable and appropriate security procedures to prevent unauthorized access to Confidential Information in its office(s) or system(s). Further, such procedures shall comply with data security standards that may be imposed by the Privacy and Security Rules of HIPAA, as well as all other applicable laws and regulations. XYZ reservices the right to...
Systems Access. Altruist shall make available to Advisor and assist it in the use of the Advisor Dashboard and the Client Dashboard according to the Master Software License
Systems Access. UNI shall provide Bank (i) with access to copies of all documentation authenticated by Loan Applicants and Borrowers, including the information needed for Bank to underwrite and approve Loan Applications pursuant to the Program Guidelines and (ii) such daily settlement reports, including reports noting the Loan Applications ready for underwriting and a summary report of Loans to be funded to satisfy the commercially reasonable information requirements of Bank, Regulatory Authorities and Bank’s internal and external auditors. Without limiting the foregoing, upon confirmation that Bank has successfully established an automated process to obtain relevant Loan and Program information with at least two other similarly situated counterparties, UNI shall cooperate with Bank to establish and maintain an automated accounting and loan tracking system to accurately reflect all Loan Applications, Loans and related information regarding the Program to satisfy the commercially reasonable information requirements of Bank, Regulatory Authorities and Bank’s internal and external auditors
Systems Access. 6.1 We will provide our Services through a dedicated system (“Systems Access”) provided by any electronic means of communication or telecommunications system, whether provided directly by ourselves or through a third-party vendor. 6.2 In order to avail yourself of access to the Services, you will be responsible for the provision and proper use of all equipment and facilities to enable such access and for all maintenance and support services, including the installation and proper use of any internet or computer security software which may be required from time to time. 6.3 We may impose such access restrictions or security requirements, arrangements or procedures on the use of any electronic or telecommunications system as we may in our absolute discretion require, including the use of user names, login codes, passwords and security devices. You shall be responsible for safeguarding the security of any login codes, passwords and security devices and shall hold us harmless from and against any liability or damage caused by a breach of any access restrictions or a misuse of any security codes or devices. You will take all reasonable steps to ensure that there are appropriate security arrangements and procedures to prevent unauthorised use or access to any system made available and will notify us immediately if you become aware of any such unauthorised use or access. 6.4 We reserve the right to determine in our absolute discretion which of the Services that may be provided in the manner contemplated by this clause, the investments that can be traded and any restrictions on such trading. We further reserve the right to discontinue access to, or trading on, any system at any time, either generally or in part. Where we do so, we shall notify you of such occurrence and endeavour to provide the services through alternative means but shall not be legally obliged to do so. 6.5 We accept no responsibility for any loss you may incur as a result of transmitting an order in error through any Systems Access to the services. Whilst we will endeavour to assist you in circumstances where you wish to withdraw such an order we cannot accept any responsibility for ensuring that such order is withdrawn or cancelled. 6.6 Save to the extent otherwise specified in the Terms, any Systems Access to the services will be provided entirely at your risk. We make no representation or warranty as to the availability, reliability, performance, accuracy, completeness or fitness for purpose o...
Systems Access. Smarsh will follow the principle of “least privilege” when granting access to Smarsh systems. Smarsh will enforce complex password requirements across all Smarsh systems to minimize password-related access control risks. Smarsh will utilize multi-factor authentication when feasible. Xxxxxx’x information security policies will prohibit Smarsh employees from sharing, writing down, emailing, IM’ing or storing passwords unencrypted on any Smarsh system (including desktops).
Systems Access. 5.1. The Company will provide any of the Services through dedicated systems (“Systems Access”) which shall be used for 1) terminal access(es) for electronic trading, transmission of the Client’s orders; 2) monitoring the activity and positions in the Client’s account(s) and 3) receipt of reports, extracts, confirmations and other messages
Systems Access. To the extent that a Party and/or its Affiliates will be given access to the computer system(s), infrastructure, databases, software, facilities or networks of the other Party or of any third-party provider (“Systems”), such access shall be limited to access reasonably required in connection with performance or receipt of the Services. Each Party shall cause its personnel and any personnel of its Affiliates with such access to comply with the system security policies, standards, procedures and requirements of the other Party or any third-party provider, as reasonably revised from time to time, with regard to the Systems or in any applicable license agreement or lease agreement in effect with regard to the Systems (the “Security Regulations”), and will not tamper with, compromise or circumvent any security or audit measures employed by the other Party or any third-party provider, as applicable; provided, in either case, that such Party has prior notice of the applicable Security Regulations or security or audit measures.
Systems Access. 5.1 The Company will provide any of the Services through dedicated systems (“Systems Access”) which shall be used for 1) terminal access(es) for electronic trading, transmission of the Client’s orders; 2) monitoring the activity and positions in the Client’s account(s) and 3) receipt of reports, extracts, confirmations and other messages 4) provision of software and communication links necessary for access. Systems Access may be a proprietary service offered by the Company or a third party system offered by another broker, vendor or exchange. The Client may use the software solely for the Client’s own internal business purposes. 5. Системный доступ 5.1 Компания будет предоставлять любую из Услуг через специальные системы («Системный Доступ»), которые должны использоваться для 1) доступа(-ов) на терминалы для электронной торговли, передачи поручений Клиента; 2) мониторинга деятельности и позиций на счете(-ах) Клиента, 3) получения отчетов, выписок, подтверждений, любых иных сообщений, и 4) предоставления необходимых для доступа коммуникационных и электронных линий. Системный Доступ может быть частной услугой, предлагаемой Компанией, или сторонней системой, предлагаемой другим брокером, продавцом, или биржей. Клиент может использовать программное обеспечение исключительно для своих собственных внутренних целей.