Access and Use Policies Sample Clauses

Access and Use Policies. Subscribing Organization will maintain and enforce policies and procedures to limit access and use of the Gateway Service and Service Information as follows:
AutoNDA by SimpleDocs
Access and Use Policies. Healthcare Entity will maintain and enforce policies and procedures to limit access and use of the Gateway Service, Service Information, PMP data, and PMP user data as follows:
Access and Use Policies. The Organization will maintain and enforce policies and procedures to limit access and use of the Application and Application Information as follows:
Access and Use Policies. Licensee will maintain and enforce policies and procedures to limit access and use of the Gateway Service and Service Information as follows:

Related to Access and Use Policies

  • Access and Use 1. Each Party shall ensure that enterprises of the other Party have access to and use of any public telecommunications network or service, including leased circuits, offered in its territory or across its borders on a timely basis and on terms and conditions that are reasonable and non-discriminatory such as those set out in paragraphs 2 to 6.

  • Fair Use Policy Betty Blocks has a fair use policy in relation to accessing and using the Services. For the purpose of this fair use policy, Client may not vary from the average in a disproportionate manner, having regard to the amount of CPU power, data storage and data traffic used by Client. In such event, Betty Blocks is entitled to temporarily limit or restrict access to the Services and/or require that Client to purchase additional Services, such as extra storage capacity.

  • Acceptable Use Policy Agreement I understand that I must use school IT systems in a responsible way, to ensure that there is no risk to my safety or to the safety and security of the IT systems and other users. For my own personal safety: • I understand that the school will monitor my use of the IT systems, email and other digital communications. • I will treat my username and password like my toothbrush – I will not share it, nor will I try to use any other person’s username and password. • I will be aware of “stranger danger”, when I am communicating on-line. • I will not disclose or share personal information about myself or others when on-line. • If I arrange to meet people off-line that I have communicated with on-line, I will do so in a public place and take an adult with me. • I will immediately report any unpleasant or inappropriate material or messages or anything that makes me feel uncomfortable when I see it on-line. I understand that everyone has equal rights to use technology as a resource and: • I understand that the school IT systems are primarily intended for educational use and that I will not use the systems for personal or recreational use unless I have permission to do so. • I will not try (unless I have permission) to make large downloads or uploads that might take up internet capacity and prevent other users from being able to carry out their work. • I will not use the school IT systems for on-line gaming, on-line gambling, internet shopping, file sharing, or video broadcasting (e.g. YouTube), unless I have permission of a member of staff to do so. I will act as I expect others to act toward me: • I will respect others’ work and property and will not access, copy, remove or otherwise alter any other user’s files, without the owner’s knowledge and permission. • I will be polite and responsible when I communicate with others, I will not use strong, aggressive or inappropriate language and I appreciate that others may have different opinions. • I will not take or distribute images of anyone without their permission. I recognise that the school has a responsibility to maintain the security and integrity of the technology it offers me and to ensure the smooth running of the school: • I will only use my personal hand held / external devices (mobile phones / USB devices etc) in school if I have permission. I understand that, if I do use my own devices in school, I will follow the rules set out in this agreement, in the same way as if I was using school equipment. • I understand the risks and will not try to upload, download or access any materials which are illegal or inappropriate or may cause harm or distress to others, nor will I try to use any programmes or software that might allow me to bypass the filtering / security systems in place to prevent access to such materials.

  • SECURITY POLICIES AND NOTIFICATIONS State Security Policies and Procedures The Contractor and its personnel shall review and be familiar with all State security policies, procedures and directives currently existing or implemented during the term of the Contract, including ITS Policy NYS-P03-002 Information Security Policy (or successor policy). Security Incidents Contractor shall address any Security Incidents in the manner prescribed in ITS Policy NYS-P03-002 Information Security Policy (or successor policy), including the New York State Cyber Incident Reporting Procedures incorporated therein or in such successor policy.

  • Anti-­‐Abuse Policy i. Registry Operator’s Anti-­‐Abuse Policy will be required under the Registry Registrar Agreement and posted on the Registry Operator’s web site.

  • Rights of Ingress and Egress The rights of ingress to, and egress from, Government facilities for the Contractor's personnel must be specified in the task order. Specific federally-controlled facilities or those areas located within a given facility may have additional security clearance requirements must be specified in the task order. Contractor employees, including Subcontractor employees, shall have in their possession, at all times while working, the specific Government identification credential issued by the Government. The identification credential shall be displayed and be visible at all times while on Government property. During all operations on Government premises, the Contractor's personnel shall comply with the rules and regulations governing the facility access policies and the conduct of personnel. The Government reserves the right to require Contractor personnel to "sign-in" upon entry and "sign-out" upon departure from the Government facilities. The Contactor shall be responsible for ensuring that all identification credentials are returned to the issuing agency whenever contract employees leave the contract, when the task order has been completed, employees leave the company, or employees are dismissed or terminated. The Contractor shall notify the issuing agency whenever employee badges are lost.

  • Claims Made Policy Requirements If General Liability, Pollution and/or Asbestos Pollution Liability and/or Errors & Omissions coverage are required and are provided on a claims-made form, the following requirements also apply:

  • Acceptable Use Policy Buyer Protection Policy • Seller Protection Policy • All future changes notified in the Policy Update already published on the “Legal Agreements” page. Please read carefully all of the terms and conditions of this user agreement and each of the other documents that apply to you. We may revise this user agreement and any of the documents listed above from time to time. The revised version will be effective at the time we post it, unless otherwise noted. If our changes reduce your rights or increase your responsibilities we will post a notice on the Policy Updates page of our website and provide notice to you of at least 60 days. By continuing to use our services after any changes to this user agreement take effect, you agree to be bound by those changes. If you do not agree with any changes, you may close your account before the changes take effect. Information about us and our service PayPal’s main business is the issuance of electronic money and the provision of payment services using that electronic money. For more information about us and our service, you can read our Key Payment and Service Information. This user agreement, together with other legal terms and legally required disclosures relating to your use of our service will be made available to you at all times on the PayPal website (typically located on the “Legal Agreements” page). We may also send this information to you. You may request a copy of any legally required disclosures (including this user agreement and the Key Payment and Service Information) from us and we will provide this to you in a form which allows you to store and reproduce the information (for example, by e-mail). Opening an account We offer two types of accounts: personal accounts and business accounts. Personal accounts With a personal account you can send and request money from friends and family and pay online for purchases. Holders of certain existing personal accounts may be required to upgrade their accounts (which may include providing further information to PayPal) in order to be able to use all of the current functionality available in a personal account. To use your PayPal account primarily to sell things, you must open a business account or convert your personal account to a business account. Business accounts Business accounts are for people and organisations (whether incorporated or not) that primarily use PayPal to receive online payments for sales or donations. Business accounts may be subject to fees that differ from the fees applicable to personal accounts. See our Fees for further details. By opening a business account or converting a personal account to a business account, you certify to us that you are using it primarily for a business or commercial purpose. Commercial Entity Status If the activity through your business account reaches certain thresholds or involves certain business segments or activities, you are required by the card networks to agree to Commercial Entity Agreements directly with our processing partners to allow you to continue accepting card-funded payments. In this case, these Commercial Entity Agreements will apply to any payment processed by PayPal on your behalf in addition to this user agreement. Safe use of your PayPal account You should take reasonable steps to stop your PayPal account being misused. You must maintain adequate security and control of any and all devices, items, IDs, passwords and personal identification numbers / codes that you use to access your PayPal account and the PayPal services. Please see our Key Payment and Service Information for guidelines. You must comply with all reasonable instructions we may issue regarding how you can keep your Payment Instrument safe. We may require you to authenticate any instruction relating to your account (i.e. give us the information that we need to be sure that it’s you giving us the instruction, such as submitting your correct log-in information – this could include your e-mail address and password) and otherwise successfully log into your PayPal account to provide to us your instruction. You must keep your postal address, email address and other contact information current in your PayPal account profile. You may expressly grant, remove and manage permissions for some third parties to take certain actions on your behalf. In some cases you can do this when logged into your account – in other cases you can do this directly with the third party. You acknowledge that if you grant permission for a third party to take actions on your behalf, we may disclose certain information about your Account to this third party. You may permit third party service providers licensed by applicable law to: • provide account information services to access information about your account on your behalf; • confirm whether an amount necessary for the execution of a card-based payment transaction is available on your account; or • provide payment initiation services to initiate payments from your account on your behalf. Granting permission to any third party to access your account in any way does not relieve you of any of your responsibilities under this user agreement. You are liable to us for the actions that you authorise the third parties to carry out. You will not hold us responsible for, and you will indemnify us from, any liability arising from the actions or inactions of such third parties in connection with the permissions you granted, subject to your mandatory legal rights. Closing Your PayPal Account You can close your account at any time. See the PayPal Help Centre for how to do this. We may close your account at our convenience by providing you with two months’ prior notice. We may also close your account at any time if:

  • Violence Policies and Procedures The Employer agrees to have in place explicit policies and procedures to deal with violence. The policy will address the prevention of violence, the management of violent situations, provision of legal counsel and support to employees who have faced violence. The policies and procedures shall be part of the employee's health and safety policy and written copies shall be provided to each employee. Prior to implementing any changes to these policies, the employer agrees to consult with the Association.

  • Zone File Access Agreement Registry Operator will enter into an agreement with any Internet user, which will allow such user to access an Internet host server or servers designated by Registry Operator and download zone file data. The agreement will be standardized, facilitated and administered by a Centralized Zone Data Access Provider, which may be ICANN or an ICANN designee (the “CZDA Provider”). Registry Operator (optionally through the CZDA Provider) will provide access to zone file data per Section 2.1.3 of this Specification and do so using the file format described in Section 2.1.4 of this Specification. Notwithstanding the foregoing, (a) the CZDA Provider may reject the request for access of any user that does not satisfy the credentialing requirements in Section 2.1.2 below; (b) Registry Operator may reject the request for access of any user that does not provide correct or legitimate credentials under Section 2.1.2 below or where Registry Operator reasonably believes will violate the terms of Section 2.1.5. below; and, (c) Registry Operator may revoke access of any user if Registry Operator has evidence to support that the user has violated the terms of Section 2.1.5 below.

Time is Money Join Law Insider Premium to draft better contracts faster.