Access Protocols Clause Samples
The Access Protocols clause defines the rules and procedures governing how parties may access certain premises, systems, or information. Typically, it outlines the conditions under which access is granted, such as requiring advance notice, specifying authorized personnel, or setting security measures that must be followed. This clause ensures that access is controlled and secure, protecting sensitive assets and minimizing the risk of unauthorized entry or data breaches.
POPULAR SAMPLE Copied 1 times
Access Protocols. Iron Mountain will provide the Services to Customer at the rates and charges set forth in the applicable Statement(s) ofWork. Iron Mountain will work with the Customer to provide access through the Access Protocol implementation process, including providing Customer with training on user account setup and access control implementation with the applicable IDP. Customer is solely responsible for obtaining andmaintaining its equipment, computers, networks, and communications, including Internet access, required toaccess and utilise the Services and for all expenses related thereto. Iron Mountain is not responsible for any issues relating to access attributable to Customer or any third party. Customer agrees to maintain and update an industry standard anti-virus program withinits computer systems that are used in connection withthe Services.
Access Protocols. On or as soon as reasonably practicable after the execution of this Agreement, Provider shall provide to Customer the necessary access credentials and protocols to allow Authorized Users to access the SaaS (the “Access Protocols”). [The Parties further agree that prior to installing the Mobile App, any Authorized User shall be required accept an End User License Agreement (“▇▇▇▇”) to be provided upon download of the Mobile App.] Customer acknowledges and agrees that, as between Customer and Provider, Customer shall be responsible for all acts and omissions of Authorized Users, including any act or omission by an Authorized User, which, if undertaken by ▇▇▇▇▇▇▇▇, would constitute a breach of this Agreement and any act by a person (whether or not an Authorized User) using Customer’s Access Protocols. Customer shall undertake reasonable efforts to make all Authorized Users aware of the provisions of this Agreement that are applicable their use of the SaaS and shall cause them to comply with such provisions.
Access Protocols. On or as soon as reasonably practicable after the execution of this Agreement, Provider shall provide to Customer the necessary access credentials and protocols to allow Authorized Users to access the Services (the “Access Protocols”). Customer acknowledges and agrees that, as between Customer and Provider, Customer shall be responsible for all acts and omissions of Authorized Users, including any act or omission by an Authorized User, which, if undertaken by Customer, would constitute a breach of this Agreement and any act by a person (whether or not an Authorized User) using Customer’s Access Protocols.
Access Protocols. Any person who is given access pursuant to clauses 8.2, 8.3 or 8.4 must be required to fully comply with:
(a) all access protocols established by the Participants;
(b) any Site safety regulations, Site rules and directions of the Principal Contractor with respect to work health and safety.
Access Protocols. Customer will safeguard, and ensure that all Authorized Users safeguard the Access Protocols. Customer will be responsible for all acts and omissions of Authorized Users. Customer will notify Virsae immediately if it learns of any unauthorized use of any Access Protocols or any other known or suspected breach of security.
Access Protocols. Upon written request by Customer, QUMULUSAI will provide Customer with the credentials, IP address(es), access codes, technical specifications, connectivity standards or protocols, or other relevant procedures, necessary to enable Customer to access the Services.
Access Protocols. On or promptly following the Effective Date, in respect of not more than the maximum number of Authorized Users to whom Access Protocols are agreed to be issued (as specified on the front page of this Agreement), Customer shall provide to Searchlight such Authorized Users’: (a) full names; and (b) Customer-provided email addresses. Following Customer having provided such details, Searchlight shall provide the necessary Access Protocols to the designated Authorized Users by email to the relevant email addresses provided by Customer. Customer will not allow any Access Protocols provided to it under this Agreement to be used by more than one individual Authorized User.
Access Protocols. Upon execution of an Order, Hexalytics will provide to Customer the necessary access credentials and protocols to allow Authorized Users to access the applicable SaaS Software (the “Access Protocols”). Customer acknowledges that Authorized Users may be required to accept Hexalytics’s online Terms of Use and Privacy Policy before being permitted to access the SaaS Software, or an End User License Agreement (“▇▇▇▇”) prior to being permitted to download and install a Mobile App. Customer shall undertake reasonable efforts to make all Authorized Users aware of the provisions of the Agreement that are applicable their use of the SaaS and shall cause them to comply with such provisions. Customer acknowledges and agrees that, as between Customer and Hexalytics, Customer shall be responsible for all acts and omissions of Authorized Users and for any activity, whether or not authorized by ▇▇▇▇▇▇▇▇, conducted using Authorized Users’ access credentials.
Access Protocols. Purchaser and its representatives shall comply with the following (collectively, the "Access Protocols"): (a) any access to the Property shall comply with any applicable laws regarding coronavirus disease 2019 ("COVID-19"); (b) no person will enter the Property if such person, or anyone in such person’s household, has been ill, has a fever, or has shown any symptoms of COVID-19; (c) temperature checks may be performed on all individuals prior to entering the Property; and (d) face masks shall be worn at all times and all persons entering the Property shall practice social distancing while on the Property. Purchaser hereby acknowledges and represents as follows: (1) Purchaser is aware of the COVID-19 pandemic and associated Safer at Home/Shelter in Place Orders (and any other similar federal, state or local orders) that have been enacted in response to the pandemic; (2) Purchaser voluntarily assumes all risks associated with entering the Property and all risks associated with the transmission of COVID-19; and (3) there are no guarantees that Purchaser or the representatives will not be exposed to and/or contract COVID-19 as a result of Purchaser's and the representatives' entry onto the Property. In consideration of Seller granting Purchaser the right to enter upon the Property pursuant to the terms and provisions of this Agreement, Purchaser hereby waives, covenants not to ▇▇▇, releases and discharges forever Seller and each Indemnified Party (collectively, the "Released Parties") from all Claims of any form whatsoever, whether known or unknown, foreseen or unforeseen, anticipated or unanticipated, manifest or latent, which Purchaser now owns or holds, has at any time heretofore owned or held or may at any time own or hold by reason of any matter or thing arising out of or relating to any COVID-19 exposure as a result of Purchaser's entry onto the Property.
Access Protocols. On or as soon as reasonably practicable after the submission of an Order Form or a registration form, Provider shall promptly review the information submitted by the prospective user against relevant Eligibility Criteria. If in the judgment of the Provider such prospective user meets the relevant Elibility Criteria, Provider will provide such prospective user with an opportunity to review these Terms and Conditions and the Privacy Policy. Upon its affirmative acceptance of these Terms and Conditions and the Privacy Policy, such prospective user shall be deemed to be a “User” hereunder and will receive the necessary access credentials, passwords, and protocols to allow the User to access the SaaS (the “Access Protocols”).
