Access Methods means any user identification, passwords and other security credentials assigned to you and required to access and use the Platform using your Account.
Access Methods means one or more User IDs, passwords, certificates or other access methods provided by Nodal for accessing the System and Services.
Access Methods means the user identifiers and passwords for the Cloud Service or DNS Flex Services issued by Customer to Authorized Users pursuant to this Agreement;
Examples of Access Methods in a sentence
You further agree that you are solely responsible for the handling of your Access Methods and Syfe shall be entitled to presume that all actions taken in relation to your account are instructed or effected by your duly authorised person(s).
More Definitions of Access Methods
Access Methods means all passwords, user names, logon identifiers, PINs, smartcards and any other authentication methods.
Access Methods means the user identifiers and passwords used to verify an Authorized User’s credentials to use the Software Services and Support pursuant to this Agreement.
Access Methods means any User identification, passwords and other securitycredentials assigned to you and required to access and use the Longbridge Platform.“Account”shall mean an account opened for you, our Customer, and maintained with Long Bridge Securities following acceptance by Long Bridge Securities of the Customer’s application or written request under which the Customer effects Transactions or uses Services pursuant to this Customer Agreement, its Annexes andSchedules as applicable.“Account Opening Form”shall mean the forms or documents (whether online or not) prescribed by us from time to time to be completed and signed by you for the purpose of opening and maintaining an Account, entering into Transactions or receiving any Services under thisCustomer Agreement.“Accredited Investor”shall have the same meaning ascribed to it in the SFA.“Affiliate”shall mean any person or entity which directly or indirectly, controls or is controlled by or is under common control with the company and for the purposes of this definition, a person is in "control" of a company, if:(a) it is in accordance with such person's directions or instructions that the directors of the company or of another company of which it is a subsidiary are accustomed to act; or(b) such person, either alone or with any Associate, is entitled to exercise, or control the exercise of, more than 20% of the voting power at general meetings of the company or of another company of which it is a subsidiary; In particular, in relation to the Long Bridge Securities, an Affiliate includes any subsidiaries, related companies, holding companies, offices, branches, or representative offices of the Company and their respective successors and assigns. “Associate” shall mean: any firm or corporation in which Long Bridge Securities’ ultimate controlling/majority shareholder(s) has, whether directly or indirectly and either individually or collectively, control of not less than twenty percent (20%) of the voting power in the firm or corporation.“Applicable Laws”shall mean all relevant or applicable statutes, laws, rules, regulations, notices, orders, by-laws, rulings, directives, circulars, guidelines, practice notes and interpretations (and any and all forms, letters, undertakings, agreements, deeds, contracts and all other documentation prescribed thereunder), whether of a governmental body, regulatory or other authority, market, exchange, clearing house or self-regulatory organisations in relation to which a party or a ...
Access Methods means any user identification, passwords andother security credentials assigned to you and required to access and use the Platform using your Account.
Access Methods or “Access Methods” means the ThreatScape MySIGHT Portal (“MySIGHT”), Software Development Kit (“SDK”), Application Programming Interface (“API”), Browser Plugin, ThreatScape App for Splunk, or any other method provided by iSIGHT for Customer to access the ThreatScape Subscription, individually or collectively. All Access Methods are FireEye Material as defined in the Agreement.
Access Methods has the meaning in clause 5.1 below;
Access Methods means any and all IDs, passwords, hints, personal identification numbers (PINs), API keys or any other codes that Client uses to access Institutional Services.