Common use of Access and Security Clause in Contracts

Access and Security. Customer shall employ all physical, administrative and technical controls, screening and security procedures and other safeguards necessary to: (a) securely administer the distribution and use of all Access Credentials and protect against any unauthorized access to or use of the Hosted Services; and (b) control the content and use of Customer Data, including the uploading or other provision of Customer Data for Processing by the Hosted Services.

Appears in 7 contracts

Samples: A Service Agreement Terms, Service User Agreement, Terms of Service

AutoNDA by SimpleDocs

Access and Security. Customer shall employ all physical, administrative administrative, and technical controls, screening screening, and security procedures and other safeguards necessary to: (a) securely administer the distribution and use of all Access Credentials and protect against any unauthorized access to or use of the Hosted Services; and (b) control the content and use of Customer Data, including the uploading or other provision of Customer Data for Processing by the Hosted Services.

Appears in 5 contracts

Samples: Software and Services Agreement, LLC Service Agreement, Software and Services Agreement

Access and Security. Customer shall employ all physical, administrative and technical controls, screening and security procedures and other safeguards necessary to: (a) securely administer the distribution and use of all Access Credentials and protect against any unauthorized access to or use of the Hosted Bundled Services; (b) ensure that each Authorized User has his or her own Access Credentials and that Access Credentials are, in no event, shared by more than one Person; and (b) control the content and use of Customer Data, including the uploading or other provision of Customer Data for Processing by the Hosted ServicesSoftware.

Appears in 4 contracts

Samples: User License Agreement and Terms of Service, License Agreement and Terms of Service, www.truqcapp.com

Access and Security. Customer shall employ all physical, administrative and technical controls, screening and security procedures and other safeguards necessary to: (a) securely administer the distribution and use of all Access Credentials access credentials and protect against any unauthorized access to or use of the Hosted Services; and (b) control the content and use of Customer Data, including the uploading or other provision of Customer Data for Processing by the Hosted Services.and

Appears in 3 contracts

Samples: assets.website-files.com, Terms of Service, www.cueaudio.com

Access and Security. Customer shall employ all physical, administrative and technical controls, screening and security procedures and other safeguards necessary to: (a) securely administer the distribution and use of all Access Credentials and protect against any unauthorized access to to, or use of of, the Hosted Services; and (b) control the content and use of the Customer Data, including the uploading or other provision of Customer Data for Processing by or within the Hosted ServicesPlatform.

Appears in 3 contracts

Samples: Trualta Platform Licence Agreement, Trualta Platform Licence Agreement, Trualta Platform Licence Agreement

Access and Security. Customer shall employ all physical, administrative administrative, and technical controls, screening screening, and security procedures and other safeguards necessary to: (a) securely administer the distribution and use of all Access Credentials and protect against any unauthorized access to or use of the Hosted ServicesServices or Guest Data; and (b) control the content and use of Customer Data and Guest Data, including the uploading or other provision of Customer Data and Guest Data provided by Customer for Processing by the Hosted Services.

Appears in 2 contracts

Samples: Terms of Service, Terms of Service

Access and Security. Customer shall employ all physical, administrative administrative, and technical controls, screening screening, and security procedures and other safeguards necessary to: (a) securely administer the distribution and use of all Access Credentials and protect against any unauthorized access to to, or use of of, the Hosted Services; and (b) control the content and use of Customer Data, including the uploading or other provision of Customer Data for Processing by the Hosted Services.

Appears in 2 contracts

Samples: A Service Subscription Agreement, A Service Subscription Agreement

Access and Security. Customer shall employ all physical, administrative and technical controls, screening and security procedures and other safeguards necessary to: (a) securely administer the distribution and use of all Access Credentials and protect against any unauthorized access to or use of the Hosted Services; Services; and (b) control the content and use of Customer Data, including the uploading or other provision of Customer Data for Processing processing by the Hosted Services.

Appears in 2 contracts

Samples: Master Services Agreement, Master Services Agreement

Access and Security. Customer shall employ all physical, administrative and technical controls, screening and security procedures and other safeguards necessary to: (a) securely administer the distribution and use of all Access Credentials and protect against any unauthorized access to or use of the Hosted Services; and (b) control the content and use of Customer Data, including the uploading or other provision of Customer Data for Processing by the Hosted Services.. Article 6. FEES; PAYMENT TERMS.‌

Appears in 2 contracts

Samples: www.kerauno.io, www.kerauno.io

Access and Security. Customer shall employ all physical, administrative and technical controls, screening and security procedures and other safeguards necessary to: (a) securely administer the distribution and use of all Access Credentials and protect against any unauthorized access to or use of the Hosted Hosting Services; and (b) control the content and use of Customer Data, including the uploading or other provision of Customer Data for Processing by the Hosted Hosting Services.

Appears in 2 contracts

Samples: Customer Purchase Terms And, Customer Purchase Terms And

Access and Security. Customer shall employ all physical, administrative and technical controls, screening and security procedures and other safeguards necessary to: (ai) securely administer the distribution and use of all Access Credentials access credentials and protect against any unauthorized access to or use of the Hosted Driveri Services; and (bii) control the content and use of Customer Proprietary Data, including the uploading or other provision of Customer Proprietary Data for Processing by the Hosted Driveri Services.

Appears in 1 contract

Samples: Master Products and Services Agreement

Access and Security. Customer shall employ all physical, administrative and technical controls, screening and security procedures and other safeguards necessary to: (a) securely administer the distribution and use of all Access Credentials and protect against any unauthorized access to to, or use of of, the Hosted Services; and (b) control the content and use of Customer Data, including the uploading or other provision of Customer Data for Processing by the Hosted Services.

Appears in 1 contract

Samples: Service Subscription License Agreement

Access and Security. Customer shall employ all physical, administrative administrative, and technical controls, screening screening, and security procedures and other safeguards necessary to: (ai) securely administer the distribution and use of all Access Credentials and protect against any unauthorized access to or use of the Hosted Services; and (bii) control the content and use of Customer Processed Data, including the uploading or other provision of Customer Data for Processing by the Hosted Services.

Appears in 1 contract

Samples: Addendum to Standard Contract

Access and Security. Customer shall employ all physical, administrative and technical controls, screening and security procedures and other safeguards necessary to: (a) securely administer the distribution and use of all Access Credentials and (b) protect against any unauthorized access to or use of the Hosted Services; and (b) control the content and use of Customer Data, including the uploading or other provision of Customer Data for Processing by the Hosted Services.

Appears in 1 contract

Samples: Application Services Agreement

Access and Security. Customer shall employ all physical, administrative administrative, and technical controls, screening screening, and security procedures and other safeguards necessary to: (a) securely administer the distribution and use of all Access Credentials and protect against any unauthorized access to or use of the Hosted Services; and (b) control the content and use of Customer Data, including the uploading or other provision of Customer Data for Processing by the Hosted Services.

Appears in 1 contract

Samples: Edwards Viewfinder Subscription Agreement

Access and Security. Customer shall employ all physical, administrative administrative, and technical controls, screening screening, and security procedures and other safeguards necessary to: (a) securely administer the distribution and use of all Access Credentials access credentials and protect against any unauthorized access to or use of the Hosted ServicesSubscription Software; and (b) control the content and use of Customer Data, including the uploading or other provision of Customer Data for Processing processing by the Hosted ServicesSubscription Software.

Appears in 1 contract

Samples: Software Licensing Agreement

Access and Security. Customer shall employ all physical, administrative administrative, and technical controls, screening screening, and security procedures and other safeguards necessary and in accordance with applicable Law to: (a) securely administer the distribution and use of all Access Credentials and protect against any unauthorized access to or use of the Hosted Services; and (b) control the content and use of Customer Data, including the uploading or other provision of Customer Data for Processing by the Hosted Services.

Appears in 1 contract

Samples: Terms of Service

Access and Security. Customer shall employ all physical, administrative and technical controls, screening and security procedures and other safeguards necessary to: (a) securely administer the distribution and use of all Access Credentials and protect against any unauthorized access to or use of to the Hosted ServicesKLaunch service; and (b) control the content and use of Customer Data, including the uploading or other provision of Customer Data for Processing by the Hosted Services.and

Appears in 1 contract

Samples: assets-global.website-files.com

AutoNDA by SimpleDocs

Access and Security. Customer shall employ all physical, administrative administrative, and technical controls, screening screening, and security procedures and other safeguards necessary to: (ai) securely administer the distribution and use of all Access Credentials access credentials and protect against any unauthorized access to or use of the Hosted Services and any Professional Services; and (bii) control the content and use of Customer Data, including the uploading or other provision of Customer Data for Processing by the Hosted Servicesunder Customer’s control.

Appears in 1 contract

Samples: Submittable Customer Terms of Service

Access and Security. Customer shall employ all physical, administrative and technical controls, screening and security procedures and other safeguards necessary to: (a) securely administer the distribution and use of all Access Credentials and protect against any unauthorized access to or use of the Hosted ServicesService; and (b) control the content and use of Customer Data, including the uploading or other provision of Customer Data for Processing by the Hosted ServicesService.

Appears in 1 contract

Samples: Saas) Agreement

Access and Security. Customer shall employ all physical, administrative and technical controls, screening and security procedures and other safeguards necessary to: (a) securely administer the distribution and use of all Access Credentials access credentials and protect against any unauthorized access to or use of the Hosted Services; and (b) control the content and use of Customer Data, including the uploading or other provision of Customer Data for Processing by the Hosted Services.

Appears in 1 contract

Samples: macromicro.com

Access and Security. Customer shall employ all physical, administrative administrative, and technical controls, screening screening, and security procedures and other safeguards necessary and in accordance with applicable Law to: (a) securely administer the distribution and use of all Access Credentials and protect against any unauthorized access to or use of the Hosted Services; and (b) control the content and use of Customer Data, including the uploading or other provision of Customer Data for Processing by the Hosted Services. Privacy. Each Party is responsible for complying with the privacy laws applicable to its business.

Appears in 1 contract

Samples: Gideon Software Terms and Conditions

Access and Security. Customer shall employ all physical, administrative and technical controls, screening and security procedures and other safeguards necessary to: (a) securely administer the distribution and use of all Access Credentials and protect against any unauthorized access to or use Unauthorized Use of the Hosted ServicesNetwork; and (b) control the content and use of Customer Patient Data, including the uploading or other provision of Customer Data for Processing by the Hosted ServicesPatient Data.

Appears in 1 contract

Samples: Exchange Agreement

Access and Security. Customer shall employ all commercially reasonable physical, administrative and technical controls, screening and security procedures and other safeguards necessary to: (a) to securely administer the distribution and use of all Access Credentials and protect against any unauthorized access to or use of the Hosted Services; and (b) control the content and use of Customer Data, including the uploading or other provision of Customer Data for Processing by the Hosted Services.

Appears in 1 contract

Samples: datafiniti.co

Access and Security. Customer shall employ all physical, administrative administrative, and technical controls, screening screening, and security procedures and other safeguards necessary to: (a) securely administer the distribution and use of all Access Credentials and protect against any unauthorized access to or use of the Hosted Services, a Node, the Finigree Node Network or the OriTrust Systems; and (b) control the content and use of Customer Data, including the uploading or other provision of Customer Data for Processing by the Hosted Services.

Appears in 1 contract

Samples: Attachment 1

Access and Security. Customer shall employ all reasonable physical, administrative administrative, and technical controls, screening screening, and security procedures and other safeguards necessary to: (a) securely administer the distribution and use of all Access Credentials and protect against any unauthorized access to or use of the Hosted Services; and (b) control the content and use of Customer Data, including the uploading or other provision of Customer Data for Processing by the Hosted Services.

Appears in 1 contract

Samples: uploads-ssl.webflow.com

Access and Security. Customer shall employ all physical, administrative administrative, and technical controls, screening screening, and security procedures and other safeguards necessary to: (a) securely administer the distribution and use of all Access Credentials and protect against any unauthorized access to or use of the Hosted Hardware or Services; and (b) control the content and use of Customer Data, including the uploading or other provision of Customer Data for Processing by the Hosted Services.

Appears in 1 contract

Samples: Services Agreement

Access and Security. Customer shall employ all physical, administrative and technical controls, screening and security procedures and other safeguards necessary to: (a) securely administer the distribution and use of all Access Credentials and protect against any unauthorized access to or use of to the Hosted ServicesK Launch service; and (b) control the content and use of Customer Data, including the uploading or other provision of Customer Data for Processing by the Hosted Services.and

Appears in 1 contract

Samples: www.kerauno.io

Access and Security. Customer shall employ all physical, administrative and technical controls, screening and security procedures and other safeguards necessary to: (a) securely administer the distribution and use of all Access Credentials access credentials and protect against any unauthorized access to or use of the Hosted Services; and (b) control the content and use of Customer Data, including the uploading or other provision of Customer Data for Processing processing by the Hosted Services.

Appears in 1 contract

Samples: dlr360.com

Time is Money Join Law Insider Premium to draft better contracts faster.