Systems Access Sample Clauses

Systems Access. To the extent that a Party and/or its Affiliates is given access to the computer systems, infrastructure, databases, software, facilities, or networks of the other Party or any Third-Party Provider (“Systems”) in connection with the performance or receipt of Services hereunder, such access shall be limited to access in connection with performance or receipt, as applicable, of such Services. Each Party shall cause its personnel and any personnel of its Affiliates with such access to comply with the system security policies, standards, procedures and requirements of the other Party or any Third-Party Provider, as reasonably revised from time to time, with regard to the Systems or in any applicable license agreement or lease agreement in effect with regard to the Systems (the “Security Regulations”), and will not tamper with, compromise or circumvent any security or audit measures employed by the other Party or any Third-Party Provider, as applicable; provided, in either case, that such Party has prior notice of the applicable Security Regulations or security or audit measures.
AutoNDA by SimpleDocs
Systems Access. Altruist shall make available to Advisor and assist it in the use of the Advisor Dashboard and the Client Dashboard according to the Master Software License Agreement, and Advisor’s, and each of its Authorized Person’s, access to and use of the Advisor Dashboard shall be subject to the terms and conditions of the Platform and the Master Software License Agreement.
Systems Access. If XYZ grants Vendor the right to access the XYZ’s online tools allowing for the electronic presentment of certain Confidential Information (“System”) that XYZ makes available to provide up-to-date information on Program participation and related information, the following conditions apply: The System, and any documentation with respect to the System, shall be treated as Confidential Information as defined in this Agreement and subject to the same confidentiality restrictions contained herein. Any content, tools, or other materials appearing on the System are the intellectual property of XYZ and/or its licensors and may not be copied, reproduced, licensed, or sold by Vendor. Further, access to the System shall not be construed as conferring any license of XYZ’s or its licensors intellectual property rights. Vendor agrees not to modify, alter , or deface any trademarks, service marks, or other intellectual property of XYZ made available through the System. Vendor further agrees not to adapt, translate, modify, decompile, disassemble, or reverse engineer the System or any software or programs used in connection with the System. XYZ will assign a User ID and password to each Vendor user (a “User”). Users may not disclose or otherwise make User IDs or passwords available to any third party. If a User ceases to be a User for any reason, including a change in roles within Vendor’s organization or termination of employment, or the User otherwise discloses his or her intent to resign, Vendor shall notify XYZ within two (2) business days so that XYZ can disable the applicable User ID and password. Vendor is responsible for any and all breaches of security relating to the use of a User’s User ID and password until XYZ has disabled that User ID and password. Vendor also agrees to comply with XYZ’s security measures which XYZ will notify Vendor of in writing with respect to Vendor’s access and use of the System. If there is a breach or suspected breach of a User ID or password, Vendor and/or the User must notify XYZ immediately by telephone and promptly follow up with a notice in writing sent via email. Vendor shall maintain reasonable and appropriate security procedures to prevent unauthorized access to Confidential Information in its office(s) or system(s). Further, such procedures shall comply with data security standards that may be imposed by the Privacy and Security Rules of HIPAA, as well as all other applicable laws and regulations. XYZ reservices the right to...
Systems Access. UNI shall provide Bank (i) with access to copies of all documentation authenticated by Loan Applicants and Borrowers, including the information needed for Bank to underwrite and approve Loan Applications pursuant to the Program Guidelines and (ii) such daily settlement reports, including reports noting the Loan Applications ready for underwriting and a summary report of Loans to be funded to satisfy the commercially reasonable information requirements of Bank, Regulatory Authorities and Bank’s internal and external auditors. Without limiting the foregoing, upon confirmation that Bank has successfully established an automated process to obtain relevant Loan and Program information with at least two other similarly situated counterparties, UNI shall cooperate with Bank to establish and maintain an automated accounting and loan tracking system to accurately reflect all Loan Applications, Loans and related information regarding the Program to satisfy the commercially reasonable information requirements of Bank, Regulatory Authorities and Bank’s internal and external auditors
Systems Access. 6.1 We will provide our Services through a dedicated system (“Systems Access”) provided by any electronic means of communication or telecommunications system, whether provided directly by ourselves or through a third-party vendor.
Systems Access. 1. When an employee is on a leave of absence, Beacon may take necessary action to temporarily disable network and systems access of the employee. Beacon will reinstate the employee’s network and systems access upon the employee’s return to active work.
Systems Access. Smarsh will follow the principle of “least privilege” when granting access to Smarsh systems. Smarsh will enforce complex password requirements across all Smarsh systems to minimize password-related access control risks. Smarsh will utilize multi-factor authentication when feasible. Xxxxxx’x information security policies will prohibit Smarsh employees from sharing, writing down, emailing, IM’ing or storing passwords unencrypted on any Smarsh system (including desktops).
AutoNDA by SimpleDocs
Systems Access. 5.1. The Company will provide any of the Services through dedicated systems (“Systems Access”) which shall be used for
Systems Access. 5.1 The Company will provide any of the Services through dedicated systems (“Systems Access”) which shall be used for 1) terminal access(es) for electronic trading, transmission of the Client’s orders; 2) monitoring the activity and positions in the Client’s account(s) and 3) receipt of reports, extracts, confirmations and other messages 4) provision of software and communication links necessary for access. Systems Access may be a proprietary service offered by the Company or a third party system offered by another broker, vendor or exchange. The Client may use the software solely for the Client’s own internal business purposes. 5. Системный доступ 5.1 Компания будет предоставлять любую из Услуг через специальные системы («Системный Доступ»), которые должны использоваться для 1) доступа(-ов) на терминалы для электронной торговли, передачи поручений Клиента; 2) мониторинга деятельности и позиций на счете(-ах) Клиента, 3) получения отчетов, выписок, подтверждений, любых иных сообщений, и 4) предоставления необходимых для доступа коммуникационных и электронных линий. Системный Доступ может быть частной услугой, предлагаемой Компанией, или сторонней системой, предлагаемой другим брокером, продавцом, или биржей. Клиент может использовать программное обеспечение исключительно для своих собственных внутренних целей.
Systems Access. The Company Officers, as part of the Corporate Services, shall oversee the Company Employees and any contractors, subcontractors or vendors of, or third party providers of services to, the Company (each, a “Company Third Party Provider”) in): (i) not attempting to obtain access to, use or interfere with any information technology systems of Pernix or any of its Affiliates, or any data owned, used or processed by Pernix or any of its Affiliates, except to the extent granted by Pernix in connection with receipt by the Company of the Services, (ii) not permitting access to or the use of information technology systems of Pernix or any of its Affiliates by a third party other than as authorized by Pernix and (iii) not disabling, damaging or erasing or disrupting or impairing the normal operation of the information technology systems of Pernix or any of its Affiliates; provided that so long as the Company Officers meet their obligations in performing such Corporate Services in accordance with Section 2.03, nothing in this Section 2.11 shall eliminate the liability of the Company to Pernix to the extent set forth in Article 6 in the event that any of the Company Employees or any Company Third Party Providers take the actions set forth in the foregoing. To the extent deemed necessary by Pernix, the Company shall use its commercially reasonable efforts to: (A) provide Pernix and each other Pernix Party with access to the Company’s information technology systems, as well as any data owned, used or processed by Pernix or any of its Affiliates, and (B) permit access to, or the use of, information technology systems of the Company by a third party as authorized by Pernix, except in either case to the extent so doing would violate Applicable Law or otherwise not comply with any obligation of the Company including its contractual obligations to third parties.
Time is Money Join Law Insider Premium to draft better contracts faster.