Access and Data Sample Clauses

Access and Data. SISW is able to provide support services through remote connection upon request and in mutual agreement between the Customer and SISW. Customer shall provide SISW with secure remote access to the Customer’s systems that are running the MC Software.
AutoNDA by SimpleDocs
Access and Data. SISW is able to provide support services through remote connection upon request and in mutual agreement between the Customer and SISW. Customer shall provide SISW with secure remote access to Customer’s computer systems that are running the MOM Software. The access protocols and passwords to be used for this access will be determined by each party’s technical contacts from time to time. Customer shall provide SISW with copies of Customer data upon SISW’s reasonable request in order to provide the Support Services.
Access and Data. Customer shall provide SISW with secure remote access to Customer’s computer systems that are running the Camstar Enterprise Software. The access protocols and passwords to be used for this access will be determined by each party’s technical contacts from time to time. Customer shall provide SISW with copies of Customer data upon SISW’s reasonable request in order to provide the Support Services.
Access and Data. Throughout the Earn-in Period, TGR will afford to Barrel such access to the Project Property and to all Existing Data pertaining to the Project Property within TGR's possession or control as Company may, from time to time, reasonably request in connection with the enjoyment of its rights and the performance of its obligations under this Agreement. The Parties will afford to each other access to and copies of, and will keep each other fully informed of, all Confidential Information pertaining to the Property, if and to the extent pertinent to the selection of drill targets on the Project Property or otherwise relevant to planning Exploration including, without limitation, Exploration by TGR or Barrel pursuant to Section 3.15, and will keep TGR fully informed of, and, as TGR may, from time to time, reasonably request, afford to TGR access to, the Operations, the Project Property and all information generated by Company pursuant to the Earn-in Expenditures.

Related to Access and Data

  • Access and Records A. County, the State of California and the United States Government and/or their representatives, shall have access, for purposes of monitoring, auditing, and examining, to Subrecipient’s activities, books, documents and papers (including computer records and emails) and to records of Subrecipient’s subcontractors, consultants, contracted employees, bookkeepers, accountants, employees and participants related to this Contract. Subrecipient shall insert this condition in each Contract between Subrecipient and a subcontractor that is pursuant to this Contract shall require the subcontractor to agree to this condition. Such departments or representatives shall have the right to make excerpts, transcripts and photocopies of such records and to schedule on site monitoring at their discretion. Monitoring activities also may include, but are not limited to, questioning employees and participants and entering any premises or onto any site in which any of the services or activities funded hereunder are conducted or in which any of the records of Subrecipient are kept. Subrecipient shall make available its books, documents, papers, financial records, etc., within three (3) days after receipt of written demand by Director which shall be deemed received upon date of sending. In the event Subrecipient does not make the above referenced documents available within the County of Orange, California, Subrecipient agrees to pay all necessary and reasonable expenses incurred by County, or County’s designee, in conducting any audit at the location where said records and books of account are maintained.

  • Access and Use 1. Each Party shall ensure that enterprises of the other Party have access to and use of any public telecommunications network or service, including leased circuits, offered in its territory or across its borders on a timely basis and on terms and conditions that are reasonable and non-discriminatory such as those set out in paragraphs 2 to 6.

  • Access and Cooperation Each Party will, and will cause its Other Indemnified Persons to, cooperate and assist in all reasonable respects regarding such Third Party Claim, including by promptly making available to such other Party (and its legal counsel and other professional advisers with a reasonable need to know) all books and records of such Person relating to such Third Party Claim, subject to reasonable confidentiality precautions.

  • INFORMATION AND DATA 21.1 At all times during the subsistence of this Agreement the duly authorized representatives of each Participant shall, at its and their sole risk and expense and at reasonable intervals and times, have access to the Property and to all technical records and other factual engineering data and information relating to the Property which is in the possession of the Operator.

  • Access to Information Systems Access, if any, to DXC’s Information Systems is granted solely to perform the Services under this Order, and is limited to those specific DXC Information Systems, time periods and personnel as are separately agreed to by DXC and Supplier from time to time. DXC may require Supplier’s employees, subcontractors or agents to sign individual agreements prior to access to DXC’s Information Systems. Use of DXC Information Systems during other time periods or by individuals not authorized by DXC is expressly prohibited. Access is subject to DXC business control and information protection policies, standards and guidelines as may be modified from time to time. Use of any other DXC Information Systems is expressly prohibited. This prohibition applies even when an DXC Information System that Supplier is authorized to access, serves as a gateway to other Information Systems outside Supplier’s scope of authorization. Supplier agrees to access Information Systems only from specific locations approved for access by DXC. For access outside of DXC premises, DXC will designate the specific network connections to be used to access Information Systems.

  • Background Data The Disclosing Party's Background Data, if any, will be identified in a separate technical document.

  • Access and Security Customer shall employ all physical, administrative and technical controls, screening and security procedures and other safeguards necessary to: (a) securely administer the distribution and use of all Access Credentials and protect against any unauthorized access to or use of the Hosted Services; and (b) control the content and use of Customer Data, including the uploading or other provision of Customer Data for Processing by the Hosted Services.

  • Access and Retention of Records Contractor agrees to provide the department, Legislative Auditor, or their authorized agents, access to any records necessary to determine contract compliance. (Section 18-1-118, MCA). Contractor agrees to create and retain records supporting the services rendered or supplies delivered for a period of eight years after either the completion date of the contract or the conclusion of any claim, litigation, or exception relating to the contract taken by the State of Montana or third party.

  • Records and Documentation The Sub-Recipient agrees to make available to AAAPP staff and/or any party designated by the AAAPP any and all contract related records and documentation. The Sub-Recipient shall ensure the collection and maintenance of all program related information and documentation on any such system designated by the AAAPP. Maintenance includes valid exports and backups of all data and systems according to AAAPP standards.

  • Zone File Access Agreement Registry Operator will enter into an agreement with any Internet user, which will allow such user to access an Internet host server or servers designated by Registry Operator and download zone file data. The agreement will be standardized, facilitated and administered by a Centralized Zone Data Access Provider, which may be ICANN or an ICANN designee (the “CZDA Provider”). Registry Operator (optionally through the CZDA Provider) will provide access to zone file data per Section 2.1.3 of this Specification and do so using the file format described in Section 2.1.4 of this Specification. Notwithstanding the foregoing, (a) the CZDA Provider may reject the request for access of any user that does not satisfy the credentialing requirements in Section 2.1.2 below; (b) Registry Operator may reject the request for access of any user that does not provide correct or legitimate credentials under Section 2.1.2 below or where Registry Operator reasonably believes will violate the terms of Section 2.1.5. below; and, (c) Registry Operator may revoke access of any user if Registry Operator has evidence to support that the user has violated the terms of Section 2.1.5 below.

Time is Money Join Law Insider Premium to draft better contracts faster.