Unauthorized Access Using service to access, or to attempt to access without authority, the accounts of others, or to penetrate, or attempt to penetrate, security measures of Company’s or a third party’s computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in disruption of service or the corruption or loss of data.
Unauthorized Access Notification XXX shall notify Provider promptly of any known unauthorized access. XXX will assist Provider in any efforts by Provider to investigate and respond to any unauthorized access.
Unauthorized Use The Participating Institutions, or the Authorized Users shall not knowingly permit anyone other than the Authorized Users to access the Licensed Materials.
Authorized Access Transfer Agent shall have controls that are designed to maintain the logical separation such that access to systems hosting Fund Data and/or being used to provide services to Fund will uniquely identify each individual requiring access, grant access only to authorized personnel based on the principle of least privileges, and prevent unauthorized access to Fund Data.
Access and Use 1. Each Party shall ensure that any service supplier of the other Party is accorded access to and use of public telecommunications transport networks and services in a timely fashion, on transparent, reasonable and nondiscriminatory terms and conditions. This obligation shall be applied, inter alia, through paragraphs 2 through 6. 2. Each Party shall ensure that service suppliers of the other Party have access to and use of any public telecommunications transport network or service offered within or across the border of that Party, including private leased circuits, and to this end shall ensure, subject to the provisions of paragraphs 5 and 6, that such suppliers are permitted: (a) to purchase or lease and attach terminal or other equipment which interfaces with the network and which is necessary to supply their services; (b) to interconnect private leased or owned circuits with public telecommunications transport networks and services or with circuits leased or owned by other service suppliers; (c) to use operating protocols of their choice in the supply of any service, other than as necessary to ensure the availability of telecommunications transport networks and services to the public generally; and (d) to perform switching, signaling and processing functions. 3. Each Party shall ensure that service suppliers of the other Party may use public telecommunications transport networks and services for the movement of information 4. Notwithstanding the provisions of paragraph 3, a Party may take such measures as are necessary: (a) to ensure the security and confidentiality of messages; or (b) to protect the personal data of users of public telecommunications transport networks or services, subject to the requirement that such measures are not applied in a manner which would constitute a means of arbitrary or unjustifiable discrimination or a disguised restriction on trade in services. 5. Each Party shall ensure that no condition is imposed on access to and use of public telecommunications transport networks and services other than as necessary: (a) to safeguard the public service responsibilities of suppliers of public telecommunications transport networks and services, in particular their ability to make their networks or services available to the public generally; or (b) to protect the technical integrity of public telecommunications transport networks or services.
Authorized Use The Student Data shared pursuant to the Service Agreement, including persistent unique identifiers, shall be used for no purpose other than the Services outlined in Exhibit A or stated in the Service Agreement and/or otherwise authorized under the statutes referred to herein this DPA.
Authorized Uses The Participating Institutions and the Authorized Users may make all use of the Licensed Materials as is consistent with the applicable law and with this Agreement, including but not limited to the following licensing conditions ("Authorized Uses"). In addition, the Licensed Materials may be used for purposes of research, education or other non-commercial use as particularly follows:
Unauthorized Aliens Consultant hereby promises and agrees to comply with all the provisions of the Federal Immigration and Nationality Act, 8 U.S.C.A. § 1101, et seq., as amended, and in connection therewith, shall not employ unauthorized aliens as defined therein. Should Consultant so employ such unauthorized aliens for performance of work and/or services covered by this Agreement, and should any liability or sanctions be imposed against City for such use of unauthorized aliens, Consultant hereby agrees to and shall reimburse City for the cost of all such liabilities or sanctions imposed, together with any and all costs, including attorneys’ fees, incurred by City.
Unauthorized Use or Disclosure The Contractor shall notify COMMERCE within five (5) working days of any unauthorized use or disclosure of any confidential information, and shall take necessary steps to mitigate the harmful effects of such use or disclosure.
Unauthorized Work The contractor is not authorized at any time to commence task order performance prior to issuance of a signed TO or other written approval provided by the CO to begin work.