{"component": "clause", "props": {"groups": [{"size": 16, "samples": [{"hash": "4Kg9MMuTxgu", "uri": "/contracts/4Kg9MMuTxgu#access-methods", "label": "Membership and Account Agreement", "score": 21.8184738159, "published": true}, {"hash": "mgzccgwMjL", "uri": "/contracts/mgzccgwMjL#access-methods", "label": "Membership and Account Agreement", "score": 21.4093093872, "published": true}, {"hash": "do3JpACI1gB", "uri": "/contracts/do3JpACI1gB#access-methods", "label": "Membership and Account Agreement", "score": 21.4093093872, "published": true}], "snippet": "You may withdraw or transfer funds from your account(s) by any method we offer, (e.g. via ATM, Visa Debit Card, check, in person, by mail, MoneyLine, ComputerLine, or MSUFCU Mobile app) as applicable. We may refuse to honor any draft drawn on a form we do not supply, and you are liable for any loss we incur handling such an item. We have the right to examine and authorize any form of power of attorney, and we may limit account withdrawals or transfers. We are not required to recognize any power of attorney. If any of your accounts become delinquent or overdrawn, we may restrict use of any and all access methods until such accounts are brought current.", "snippet_links": [{"key": "transfer-funds", "type": "definition", "offset": [20, 34]}, {"key": "visa-debit-card", "type": "definition", "offset": [95, 110]}, {"key": "in-person", "type": "clause", "offset": [119, 128]}, {"key": "by-mail", "type": "definition", "offset": [130, 137]}, {"key": "mobile-app", "type": "clause", "offset": [174, 184]}, {"key": "any-loss", "type": "definition", "offset": [291, 299]}, {"key": "right-to-examine", "type": "clause", "offset": [344, 360]}, {"key": "form-of-power-of-attorney", "type": "clause", "offset": [379, 404]}, {"key": "withdrawals-or-transfers", "type": "clause", "offset": [431, 455]}, {"key": "not-required", "type": "definition", "offset": [464, 476]}, {"key": "your-accounts", "type": "clause", "offset": [523, 536]}, {"key": "all-access", "type": "clause", "offset": [600, 610]}], "hash": "45b46d9c1fe43a34ae0fa0743fea9779", "id": 1}, {"size": 9, "samples": [{"hash": "hC1QdCirJ6S", "uri": "/contracts/hC1QdCirJ6S#access-methods", "label": "Nodal Exchange Participant Agreement", "score": 33.2141342163, "published": true}, {"hash": "kKrzQ8LrDa2", "uri": "/contracts/kKrzQ8LrDa2#access-methods", "label": "Nodal Exchange Participant Agreement", "score": 26.7741279602, "published": true}, {"hash": "g2RHu3a3Rrt", "uri": "/contracts/g2RHu3a3Rrt#access-methods", "label": "Nodal Exchange Participant Agreement", "score": 26.7563304901, "published": true}], "snippet": "Nodal shall provide to Participant, through such Participant\u2019s Account Administrator(s), Access Methods for use by Participant\u2019s Authorized Users. Participant shall notify Nodal of any change of Authorized Users or Account Administrators in accordance with the Rules. Participant shall not divulge, and shall not permit any other Person to divulge, any Access Methods to any Person other than an Account Administrator or an Authorized User. Participant is and shall remain fully responsible for\n(i) maintaining the confidentiality of Participant\u2019s Access Methods, (ii) controlling and monitoring any use of any such Access Methods, (iii) all Transactions and other activities that occur through use of such Access Methods, and all charges resulting therefrom, whether or not such use is authorized by Participant, except to the extent that such unauthorized use is proximately caused by Nodal\u2019s willful misconduct or negligence, and (iv) notifying Nodal immediately of any unauthorized use of Participant\u2019s Access Methods or any other known or suspected breach of security relative to the System or the Services.", "snippet_links": [{"key": "to-participant", "type": "definition", "offset": [20, 34]}, {"key": "by-participant", "type": "clause", "offset": [112, 126]}, {"key": "authorized-users", "type": "definition", "offset": [129, 145]}, {"key": "participant-shall", "type": "definition", "offset": [147, 164]}, {"key": "change-of", "type": "clause", "offset": [185, 194]}, {"key": "account-administrators", "type": "clause", "offset": [215, 237]}, {"key": "in-accordance-with", "type": "clause", "offset": [238, 256]}, {"key": "the-rules", "type": "clause", "offset": [257, 266]}, {"key": "any-other-person", "type": "definition", "offset": [320, 336]}, {"key": "any-person", "type": "definition", "offset": [371, 381]}, {"key": "responsible-for", "type": "clause", "offset": [479, 494]}, {"key": "and-monitoring", "type": "clause", "offset": [581, 595]}, {"key": "all-transactions", "type": "clause", "offset": [638, 654]}, {"key": "other-activities", "type": "clause", "offset": [659, 675]}, {"key": "all-charges", "type": "clause", "offset": [727, 738]}, {"key": "authorized-by", "type": "definition", "offset": [787, 800]}, {"key": "except-to-the-extent", "type": "clause", "offset": [814, 834]}, {"key": "unauthorized-use", "type": "definition", "offset": [845, 861]}, {"key": "caused-by", "type": "clause", "offset": [877, 886]}, {"key": "willful-misconduct", "type": "definition", "offset": [895, 913]}, {"key": "breach-of-security", "type": "definition", "offset": [1054, 1072]}, {"key": "the-system", "type": "definition", "offset": [1085, 1095]}, {"key": "the-services", "type": "definition", "offset": [1099, 1111]}], "hash": "1100039a1d48353e1a7575b08a1b567d", "id": 2}, {"size": 8, "samples": [{"hash": "4I5NQvgxc2Z", "uri": "/contracts/4I5NQvgxc2Z#access-methods", "label": "Intellectual Property Matters Agreement (Lumentum Holdings Inc.)", "score": 26.5934295654, "published": true}, {"hash": "d1MM6We8xdz", "uri": "/contracts/d1MM6We8xdz#access-methods", "label": "Intellectual Property Matters Agreement (Viavi Solutions Inc.)", "score": 26.5906906128, "published": true}, {"hash": "dI9HxTApAtK", "uri": "/contracts/dI9HxTApAtK#access-methods", "label": "Intellectual Property Matters Agreement (Lumentum Holdings Inc.)", "score": 26.4565372467, "published": true}], "snippet": "Lumentum acknowledges and agrees that, subsequent to the Distribution Date, the Lumentum Group may no longer use decryption algorithms or other access methods that were previously provided by JDSU to internal JDSU users to enable those internal JDSU users to use locked or encrypted copies of JDSU Commercial Software, except to the extent necessary to continue using those copies rightfully in use before the Distribution Date. Any access after the Distribution Date by any member of the Lumentum Group, to additional copies of such JDSU Commercial Software beyond those copies rightfully in use before the Distribution Date, or to support, updates, revisions or service, shall be as separately agreed with JDSU or with an appropriate Third Party software vendor.", "snippet_links": [{"key": "subsequent-to-the", "type": "clause", "offset": [39, 56]}, {"key": "lumentum-group", "type": "definition", "offset": [80, 94]}, {"key": "other-access", "type": "clause", "offset": [138, 150]}, {"key": "copies-of", "type": "definition", "offset": [283, 292]}, {"key": "commercial-software", "type": "definition", "offset": [298, 317]}, {"key": "except-to-the-extent", "type": "clause", "offset": [319, 339]}, {"key": "after-the-distribution-date", "type": "clause", "offset": [440, 467]}, {"key": "member-of-the", "type": "clause", "offset": [475, 488]}, {"key": "additional-copies", "type": "clause", "offset": [508, 525]}, {"key": "an-appropriate", "type": "clause", "offset": [721, 735]}, {"key": "third-party-software-vendor", "type": "definition", "offset": [736, 763]}], "hash": "b4db7f59f57ac24c1b47fae392fb11f2", "id": 3}, {"size": 7, "samples": [{"hash": "8SRlpiHq8J9", "uri": "/contracts/8SRlpiHq8J9#access-methods", "label": "Membership and Account Agreement", "score": 31.4933452606, "published": true}, {"hash": "f1e3RuNKROB", "uri": "/contracts/f1e3RuNKROB#access-methods", "label": "Membership and Account Agreement", "score": 31.4112243652, "published": true}], "snippet": "You may withdraw or transfer funds from your account(s) by any method we offer, (e.g. via ATM, Interactive Teller Machine (ITM), Visa Debit Card, check, digital banking, or mobile application) as applicable. We may refuse to honor any draft or check drawn on a form we do not supply, and you are liable for any loss we incur handling such an item. If any of your accounts become delinquent or overdrawn, we may restrict use of any and all access methods until such accounts are brought current.", "snippet_links": [{"key": "transfer-funds", "type": "definition", "offset": [20, 34]}, {"key": "visa-debit-card", "type": "definition", "offset": [129, 144]}, {"key": "digital-banking", "type": "clause", "offset": [153, 168]}, {"key": "mobile-application", "type": "definition", "offset": [173, 191]}, {"key": "any-loss", "type": "definition", "offset": [307, 315]}, {"key": "your-accounts", "type": "clause", "offset": [358, 371]}, {"key": "all-access", "type": "clause", "offset": [435, 445]}], "hash": "2447db7080a76e738c061a4d38f7cdd9", "id": 4}, {"size": 6, "samples": [{"hash": "dk3l9DG6crv", "uri": "/contracts/dk3l9DG6crv#access-methods", "label": "Intellectual Property Agreement", "score": 29.3408622742, "published": true}, {"hash": "2jM72GR699v", "uri": "/contracts/2jM72GR699v#access-methods", "label": "Intellectual Property Agreement (CONDUENT Inc)", "score": 28.0061607361, "published": true}, {"hash": "7JlQREnTkpz", "uri": "/contracts/7JlQREnTkpz#access-methods", "label": "Intellectual Property Agreement (CONDUENT Inc)", "score": 27.7351131439, "published": true}], "snippet": "Conduent acknowledges and agrees that, subsequent to the Distribution Date, Conduent and the members of its Group may no longer use de-encryption algorithms or other access methods that were previously provided by Xerox to internal Xerox users to enable those internal Xerox users to use locked or encrypted copies of Xerox Commercial Software or other software, except to the extent necessary to continue using those copies rightfully in use before the Distribution Date. Xerox acknowledges and agrees to allow Conduent, or a member of its Group, after the Distribution Date, reasonable access to any of the Licensed Xerox IPR, materials or data licensed to them in this Article III.", "snippet_links": [{"key": "subsequent-to-the", "type": "clause", "offset": [39, 56]}, {"key": "members-of", "type": "clause", "offset": [93, 103]}, {"key": "other-access", "type": "clause", "offset": [160, 172]}, {"key": "copies-of", "type": "definition", "offset": [308, 317]}, {"key": "commercial-software", "type": "definition", "offset": [324, 343]}, {"key": "other-software", "type": "definition", "offset": [347, 361]}, {"key": "except-to-the-extent", "type": "clause", "offset": [363, 383]}, {"key": "agrees-to", "type": "clause", "offset": [496, 505]}, {"key": "a-member-of", "type": "clause", "offset": [525, 536]}, {"key": "after-the-distribution-date", "type": "clause", "offset": [548, 575]}, {"key": "access-to", "type": "definition", "offset": [588, 597]}, {"key": "article-iii", "type": "definition", "offset": [672, 683]}], "hash": "5a0416837c16b5c42fa35266fbf0dc8e", "id": 5}, {"size": 6, "samples": [{"hash": "8OuuSOGQaRG", "uri": "/contracts/8OuuSOGQaRG#access-methods", "label": "Intellectual Property Matters Agreement (Keysight Technologies, Inc.)", "score": 25.6132793427, "published": true}, {"hash": "halfRxeH3Dr", "uri": "/contracts/halfRxeH3Dr#access-methods", "label": "Intellectual Property Matters Agreement (Agilent Technologies Inc)", "score": 25.591375351, "published": true}, {"hash": "eRS80tPIPzV", "uri": "/contracts/eRS80tPIPzV#access-methods", "label": "Intellectual Property Matters Agreement (Keysight Technologies, Inc.)", "score": 25.5420951843, "published": true}], "snippet": "Agilent acknowledges and agrees that, subsequent to the Distribution Date, Agilent and its Affiliates may no longer use de-encryption algorithms or other access methods that were previously provided by the Keysight Business to internal Agilent users to enable those internal Agilent users to use locked or encrypted copies of Keysight Commercial Software, except to the extent necessary to continue using those copies rightfully in use before the Distribution Date. Any access after the Distribution Date by Agilent, or an Agilent Affiliate, to additional copies of such Keysight Commercial Software beyond those copies rightfully in use before the Distribution Date, or to support, updates, revisions or service, shall be as separately agreed with Keysight or with an appropriate Third Party software vendor.", "snippet_links": [{"key": "subsequent-to-the", "type": "clause", "offset": [38, 55]}, {"key": "other-access", "type": "clause", "offset": [148, 160]}, {"key": "keysight-business", "type": "definition", "offset": [206, 223]}, {"key": "copies-of", "type": "definition", "offset": [316, 325]}, {"key": "commercial-software", "type": "definition", "offset": [335, 354]}, {"key": "except-to-the-extent", "type": "clause", "offset": [356, 376]}, {"key": "after-the-distribution-date", "type": "clause", "offset": [477, 504]}, {"key": "additional-copies", "type": "clause", "offset": [545, 562]}, {"key": "an-appropriate", "type": "clause", "offset": [766, 780]}, {"key": "third-party-software-vendor", "type": "definition", "offset": [781, 808]}], "hash": "26552f107bdab116143b84c93f3f6c8a", "id": 6}, {"size": 5, "samples": [{"hash": "4AOYgZ56DKF", "uri": "/contracts/4AOYgZ56DKF#access-methods", "label": "Service Description", "score": 26.4188919067, "published": true}, {"hash": "8FRl02bGwCK", "uri": "/contracts/8FRl02bGwCK#access-methods", "label": "Service Description", "score": 24.5763168335, "published": true}], "snippet": "You may access the Service: \u2022 by File Transfer Protocol (FTP) file transfer, \u2022 through OLBB (when available) if you have subscribed for Bank\u2019s OLBB service, or \u2022 by other means made available by Bank from time to time and expressly approved by Bank in writing in advance. Payment Instructions must be transmitted or delivered to Bank in compliance with the applicable Security Procedures and in compliance with the transmission and format requirements and cut-off times established by Bank, which may be changed by Bank from time to time. Payment Instructions received after the established cut-off times will be rejected and not processed. You acknowledge and agree that Bank may delay or suspend the processing of any Payment Instructions to verify compliance with Applicable Law and may reject any Payment Instructions for failure to comply with Applicable Law. You are solely responsible for the accuracy and completeness of all Payment Instructions delivered to Bank by you or on your behalf. Bank is not responsible for detecting errors in Payment Instructions and shall be fully protected in processing such Payment Instructions as received by Bank. You are solely responsible for ensuring that the Security Procedures are known to and used only by authorized users within your organization. In Bank\u2019s discretion, Bank may deny access to the Service to any user. You will notify Bank immediately if you become aware of any unauthorized access to or use of the Service, or if any Security Procedures have been lost, stolen, or compromised. You will cooperate with Bank in any investigation and any effort by Bank to recover funds on your or Bank\u2019s behalf and agree to take corrective measures to protect your account from further unauthorized use or fraudulent activity. You will provide to Bank and keep current all information Bank reasonably requires from time to time with respect to each authorized user and will notify Bank immediately if an authorized user ceases to be associated with your organization or is no longer authorized to access the Service on your behalf, or if for any other reason you would like to modify or remove an authorized user\u2019s access to the Service.", "snippet_links": [{"key": "file-transfer-protocol", "type": "definition", "offset": [33, 55]}, {"key": "when-available", "type": "clause", "offset": [93, 107]}, {"key": "for-bank", "type": "clause", "offset": [132, 140]}, {"key": "by-bank", "type": "clause", "offset": [192, 199]}, {"key": "from-time-to-time", "type": "clause", "offset": [200, 217]}, {"key": "approved-by", "type": "clause", "offset": [232, 243]}, {"key": "in-writing", "type": "clause", "offset": [249, 259]}, {"key": "in-advance", "type": "clause", "offset": [260, 270]}, {"key": "payment-instructions", "type": "definition", "offset": [272, 292]}, {"key": "to-bank", "type": "definition", "offset": [326, 333]}, {"key": "security-procedures", "type": "definition", "offset": [368, 387]}, {"key": "the-transmission", "type": "clause", "offset": [411, 427]}, {"key": "format-requirements", "type": "clause", "offset": [432, 451]}, {"key": "off-times", "type": "clause", "offset": [460, 469]}, {"key": "will-be-rejected", "type": "clause", "offset": [605, 621]}, {"key": "you-acknowledge-and-agree-that", "type": "clause", "offset": [641, 671]}, {"key": "the-processing", "type": "clause", "offset": [698, 712]}, {"key": "compliance-with-applicable-law", "type": "definition", "offset": [751, 781]}, {"key": "failure-to-comply-with-applicable-law", "type": "clause", "offset": [826, 863]}, {"key": "responsible-for", "type": "clause", "offset": [880, 895]}, {"key": "accuracy-and-completeness-of", "type": "clause", "offset": [900, 928]}, {"key": "not-responsible", "type": "clause", "offset": [1006, 1021]}, {"key": "errors-in-payment", "type": "clause", "offset": [1036, 1053]}, {"key": "received-by", "type": "definition", "offset": [1139, 1150]}, {"key": "the-security", "type": "clause", "offset": [1202, 1214]}, {"key": "authorized-users", "type": "definition", "offset": [1256, 1272]}, {"key": "within-your-organization", "type": "definition", "offset": [1273, 1297]}, {"key": "access-to-the-service", "type": "clause", "offset": [1335, 1356]}, {"key": "notify-bank-immediately", "type": "clause", "offset": [1379, 1402]}, {"key": "unauthorized-access", "type": "definition", "offset": [1430, 1449]}, {"key": "use-of-the-service", "type": "clause", "offset": [1456, 1474]}, {"key": "cooperate-with-bank", "type": "clause", "offset": [1555, 1574]}, {"key": "agree-to", "type": "clause", "offset": [1665, 1673]}, {"key": "measures-to", "type": "clause", "offset": [1690, 1701]}, {"key": "your-account", "type": "definition", "offset": [1710, 1722]}, {"key": "unauthorized-use", "type": "definition", "offset": [1736, 1752]}, {"key": "fraudulent-activity", "type": "clause", "offset": [1756, 1775]}, {"key": "will-provide", "type": "clause", "offset": [1781, 1793]}, {"key": "all-information", "type": "clause", "offset": [1819, 1834]}, {"key": "with-respect-to", "type": "clause", "offset": [1878, 1893]}, {"key": "associated-with", "type": "definition", "offset": [1983, 1998]}, {"key": "for-any-other-reason", "type": "clause", "offset": [2088, 2108]}], "hash": "c5ad0440ca794cde153d4f73525505da", "id": 7}, {"size": 4, "samples": [{"hash": "j5qidBKgTRP", "uri": "/contracts/j5qidBKgTRP#access-methods", "label": "Deposit Account Agreement", "score": 33.628868103, "published": true}, {"hash": "9nT0UiAKsWc", "uri": "/contracts/9nT0UiAKsWc#access-methods", "label": "Bank Deposit Account Agreement", "score": 33.4834136963, "published": true}, {"hash": "BdlvFVaFoZ", "uri": "/contracts/BdlvFVaFoZ#access-methods", "label": "Bank Deposit Account Agreement", "score": 33.4134941101, "published": true}], "snippet": "You may access your Account online through a personal computer at \u2587\u2587\u2587.\u2587\u2587\u2587\u2587.\u2587\u2587\u2587 or through the SoFi Mobile App via a personal computer or a mobile device, including a smartphone, tablet, or any other eligible handheld or wearable communication device (the \u201cAccess Devices\u201d). Please note that certain Access Devices may not be available when using certain digital devices or applications. For example, some functions may be available online through a personal computer but not available through the SoFi Mobile App. SoFi is committed to keeping your money safe. For the safety and security of our members\u2019 information, SoFi will never ask you for your password or login credentials, and you should not share this information with a third party. You will choose your own password (we will never suggest one), and we will never ask you to provide two-factor authentication information over the phone. Please be sure to keep this account information secure. All messages containing sensitive data with us will be sent through secure platforms, not social media. If you encounter a suspicious contact or receive requests asking for your two-factor authentication code or password changes that claim to be from SoFi, please do not respond. You should disconnect and call us to report it immediately at (\u2587\u2587\u2587) \u2587\u2587\u2587-\u2587\u2587\u2587\u2587.", "snippet_links": [{"key": "access-your-account", "type": "clause", "offset": [8, 27]}, {"key": "personal-computer", "type": "definition", "offset": [45, 62]}, {"key": "sofi-mobile-app", "type": "definition", "offset": [94, 109]}, {"key": "mobile-device", "type": "definition", "offset": [139, 152]}, {"key": "communication-device", "type": "definition", "offset": [229, 249]}, {"key": "access-devices", "type": "definition", "offset": [256, 270]}, {"key": "please-note-that", "type": "clause", "offset": [274, 290]}, {"key": "for-example", "type": "clause", "offset": [387, 398]}, {"key": "not-available", "type": "clause", "offset": [471, 484]}, {"key": "your-money", "type": "definition", "offset": [543, 553]}, {"key": "security-of", "type": "clause", "offset": [579, 590]}, {"key": "your-password", "type": "clause", "offset": [645, 658]}, {"key": "login-credentials", "type": "definition", "offset": [662, 679]}, {"key": "a-third-party", "type": "clause", "offset": [728, 741]}, {"key": "to-provide", "type": "clause", "offset": [832, 842]}, {"key": "authentication-information", "type": "definition", "offset": [854, 880]}, {"key": "account-information", "type": "clause", "offset": [925, 944]}, {"key": "sensitive-data", "type": "clause", "offset": [977, 991]}, {"key": "social-media", "type": "clause", "offset": [1043, 1055]}, {"key": "report-it", "type": "clause", "offset": [1270, 1279]}], "hash": "e048f264031ac63948040fef42de9743", "id": 8}, {"size": 3, "samples": [{"hash": "2PkCzMRN0eC", "uri": "/contracts/2PkCzMRN0eC#access-methods", "label": "Fidelity Billpay Service Agreement", "score": 29.9303092957, "published": true}, {"hash": "k5AdXrghHEf", "uri": "/contracts/k5AdXrghHEf#access-methods", "label": "Fidelity Billpay Service Agreement", "score": 19.0, "published": true}, {"hash": "8J2U5ooAcgb", "uri": "/contracts/8J2U5ooAcgb#access-methods", "label": "Fidelity Billpay Service Agreement", "score": 19.0, "published": true}], "snippet": "The Service is accessible through \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587.\u2587\u2587\u2587 and eligible mobile devices as determined by Fidelity. To use the Services, you must obtain, at your own expense, the necessary hardware and software. More information about the specific hardware and software requirements can be found in the Frequently asked Questions for the Services. Please check the online Help Menu described in Section 2 below for more information regarding the Service. Please note feature availability and navigation will differ between the \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587.\u2587\u2587\u2587 and mobile versions of the Service.", "snippet_links": [{"key": "mobile-devices", "type": "definition", "offset": [60, 74]}, {"key": "hardware-and-software-requirements", "type": "clause", "offset": [234, 268]}, {"key": "frequently-asked-questions", "type": "definition", "offset": [289, 315]}, {"key": "for-the-services", "type": "clause", "offset": [316, 332]}, {"key": "please-check", "type": "definition", "offset": [334, 346]}, {"key": "help-menu", "type": "clause", "offset": [358, 367]}, {"key": "in-section-2", "type": "clause", "offset": [378, 390]}, {"key": "information-regarding", "type": "clause", "offset": [406, 427]}, {"key": "please-note", "type": "clause", "offset": [441, 452]}, {"key": "the-\u2587", "type": "clause", "offset": [509, 514]}], "hash": "30f2fae99aa81f9130f4360c47640165", "id": 9}, {"size": 3, "samples": [{"hash": "ghqEB64ceY0", "uri": "/contracts/ghqEB64ceY0#access-methods", "label": "Grant Agreement", "score": 33.4276504517, "published": true}, {"hash": "7FYYJn2F1Y", "uri": "/contracts/7FYYJn2F1Y#access-methods", "label": "Online Grant Administration System Access Agreement", "score": 33.3729019165, "published": true}, {"hash": "dxu963j1Zbj", "uri": "/contracts/dxu963j1Zbj#access-methods", "label": "Grant Agreement", "score": 31.4276485443, "published": true}], "snippet": "5.1 Unless otherwise agreed to in writing, the Organization will be granted permission to create Authorized Users. The Organization shall exercise reasonable care to ensure no Unauthorized Users access the System.\n5.2 Authorized Users will not disclose or give their Password to any other person; will not provide login credentials to any person not approved by the Organization; will not store their Password in any data file; will use every reasonable effort to refrain from any action that could allow any person to get access to their Password; and will report any actual or suspected breach of Password or any other unauthorized access.\n5.3 Both of the Parties recognize the potential impact that a security breach may cause and will promptly notify the other Party of an actual or suspected security breach.\n5.4 The Organization shall take all reasonable measures to prevent the introduction of computer viruses into the System.", "snippet_links": [{"key": "agreed-to", "type": "definition", "offset": [21, 30]}, {"key": "in-writing", "type": "clause", "offset": [31, 41]}, {"key": "the-organization", "type": "definition", "offset": [43, 59]}, {"key": "reasonable-care", "type": "definition", "offset": [147, 162]}, {"key": "to-ensure", "type": "clause", "offset": [163, 172]}, {"key": "unauthorized-users", "type": "clause", "offset": [176, 194]}, {"key": "the-system", "type": "definition", "offset": [202, 212]}, {"key": "any-other-person", "type": "definition", "offset": [279, 295]}, {"key": "login-credentials", "type": "definition", "offset": [314, 331]}, {"key": "any-person", "type": "definition", "offset": [335, 345]}, {"key": "approved-by", "type": "clause", "offset": [350, 361]}, {"key": "not-store", "type": "definition", "offset": [385, 394]}, {"key": "data-file", "type": "clause", "offset": [417, 426]}, {"key": "every-reasonable-effort", "type": "definition", "offset": [437, 460]}, {"key": "any-action", "type": "definition", "offset": [477, 487]}, {"key": "access-to", "type": "definition", "offset": [523, 532]}, {"key": "breach-of", "type": "definition", "offset": [589, 598]}, {"key": "unauthorized-access", "type": "definition", "offset": [621, 640]}, {"key": "the-parties-recognize", "type": "clause", "offset": [654, 675]}, {"key": "potential-impact", "type": "clause", "offset": [680, 696]}, {"key": "security-breach", "type": "clause", "offset": [704, 719]}, {"key": "notify-the", "type": "clause", "offset": [748, 758]}, {"key": "other-party", "type": "clause", "offset": [759, 770]}, {"key": "measures-to", "type": "clause", "offset": [861, 872]}, {"key": "computer-viruses", "type": "clause", "offset": [901, 917]}], "hash": "a888ef2e1bb1d4932fba09c65e97c375", "id": 10}], "next_curs": "ClcSUWoVc35sYXdpbnNpZGVyY29udHJhY3RzcjMLEhZDbGF1c2VTbmlwcGV0R3JvdXBfdjU2IhdhY2Nlc3MtbWV0aG9kcyMwMDAwMDAwYQyiAQJlbhgAIAA=", "clause": {"size": 99, "parents": [["account-access", "Account Access"], ["exchange-services", "Exchange Services"], ["license-grants", "License Grants"], ["description-and-terms-of-service", "Description and Terms of Service"], ["operation", "Operation"]], "title": "Access Methods", "children": [["toll-free-meet-me-access", "Toll Free Meet Me Access"], ["toll-meet-me", "Toll Meet Me"], ["dial-out-access", "Dial-Out Access"]], "id": "access-methods", "related": [["network-interconnection-methods", "Network Interconnection Methods", "Network Interconnection Methods"], ["construction-methods", "Construction Methods", "Construction Methods"], ["system-upgrades", "System Upgrades", "System Upgrades"], ["equipment-and-materials", "Equipment and Materials", "Equipment and Materials"], ["data-access-control", "Data Access Control", "Data Access Control"]], "related_snippets": [], "updated": "2025-07-24T04:27:57+00:00", "also_ask": [], "drafting_tip": null, "explanation": "The Access Methods clause defines the ways in which parties can obtain or use certain resources, data, or systems covered by the agreement. It typically outlines the procedures, credentials, or permissions required for access, and may specify limitations such as timeframes, authorized personnel, or security protocols. By clearly establishing how access is granted and controlled, this clause helps prevent unauthorized use and ensures that both parties understand their rights and responsibilities regarding access."}, "json": true, "cursor": ""}}