Access to Service Provider Systems Sample Clauses

Access to Service Provider Systems. Customer will, and will require that all Recipient Personnel who have access to Service Provider Systems in accordance with the provisions of Section 11.3, including computer or electronic data storage systems, limit their access to those portions of such systems for which they are authorized in connection with their receipt and use of the Services. Customer will (i) limit such access to those Recipient Personnel who are authorized to use the Services in accordance with the provisions of Section 11.3, (ii) maintain and make available to Service Provider a written list of the names of each individual who will be granted such access, and (iii) adhere to Service Provider’s security rules and procedures for use of Service Provider Systems. All user identification numbers and passwords disclosed to Recipients to permit any Recipient Personnel to access the Service Provider Systems will be deemed to be, and will be treated as, Service Provider’s Confidential Information. Customer will cooperate with Service Provider in the investigation of any apparent unauthorized access by Recipient Personnel to Service Provider Systems. Service Provider shall, in its sole discretion, be entitled to approve or restrict access to Service Provider Systems by any Customer contractor.
AutoNDA by SimpleDocs
Access to Service Provider Systems. Service Provider shall, in its sole discretion, be entitled to approve or restrict access to Service Provider Systems by any Customer contractor.

Related to Access to Service Provider Systems

  • Access to Services Subject to and in accordance with the terms of this Agreement, including any Schedules, Company grants You a non-exclusive, non-sublicensable, nontransferable, non-assignable, revocable license for the term of this Agreement to access and use the Services. Services may only be used by Your Users for internal business purposes only. You agree to comply with the terms and conditions of this Agreement, including any Schedules, and with all applicable Company procedures and policies that further define use of the Services. You acknowledge and agree that the actions of any of Your Users with respect to the Services will be deemed to be actions by You and that any breach by any of Your Users of the terms of this Agreement, including any Schedule, will be deemed to be a breach by You.

  • Access to PHI Business Associate shall provide access to PHI in a Designated Record Set to Covered Entity or as directed by Covered Entity to an Individual to meet the requirements under 45 CFR § 164.524. Business Associate shall provide such access in the time and manner reasonably designated by Covered Entity. Within three (3) business days, Business Associate shall forward to Covered Entity for handling any request for access to PHI that Business Associate directly receives from an Individual.

  • Access to the Services ID’s for access to Vendor Core Research and Analyst Inquiry may not be shared. Access to the Services is restricted to the number of named individuals (each a “Licensed User”) as identified in the Customer Purchase Order.

  • Restricted Use By Outsourcers / Facilities Management, Service Bureaus or Other Third Parties Outsourcers, facilities management or service bureaus retained by Licensee shall have the right to use the Product to maintain Licensee’s business operations, including data processing, for the time period that they are engaged in such activities, provided that: 1) Licensee gives notice to Contractor of such party, site of intended use of the Product, and means of access; and 2) such party has executed, or agrees to execute, the Product manufacturer’s standard nondisclosure or restricted use agreement which executed agreement shall be accepted by the Contractor (“Non-Disclosure Agreement”); and 3) if such party is engaged in the business of facility management, outsourcing, service bureau or other services, such third party will maintain a logical or physical partition within its computer system so as to restrict use and access to the program to that portion solely dedicated to beneficial use for Licensee. In no event shall Licensee assume any liability for third party’s compliance with the terms of the Non-Disclosure Agreement, nor shall the Non-Disclosure Agreement create or impose any liabilities on the State or Licensee. Any third party with whom a Licensee has a relationship for a state function or business operation, shall have the temporary right to use Product (e.g., JAVA Applets), provided that such use shall be limited to the time period during which the third party is using the Product for the function or business activity.

  • Access to NID 2.17.3.1 TWTC may access the customer’s premises wiring by any of the following means and TWTC shall not disturb the existing form of electrical protection and shall maintain the physical integrity of the NID:

  • Access to Data Operator shall make Data in the possession of the Operator available to the LEA within five (5) business days of a request by the LEA.

  • Access to Site 3.05.1 Contractor may enter and leave the premises at all reasonable times without charge. Contractor and its employees may use the common areas and roadways of the premises where it is to perform the services together with all facilities, equipment, improvements, and services provided in connection with the premises for common use. This excludes parking for Contractor’s personnel. Contractor shall repair any damage caused by it or its employees as a result of its use of the common areas.

  • ACCESS TO OPERATIONS SUPPORT SYSTEMS 2.1 BellSouth shall provide Cellutell Communications, Inc. access to operations support systems (“OSS”) functions for pre-ordering, ordering and provisioning, maintenance and repair, and billing. BellSouth shall provide access to the OSS through manual and/or electronic interfaces as described in this Attachment. It is the sole responsibility of Cellutell Communications, Inc. to obtain the technical Version R4Q01: 12/01/01 capability to access and utilize BellSouth’s OSS interfaces. Specifications for Cellutell Communications, Inc.’s access and use of BellSouth’s electronic interfaces are set forth at xxx.xxxxxxxxxxxxxxx.xxxxxxxxx.xxx and are incorporated herein by reference.

  • Access to Personal Information by Subcontractors Supplier agrees to require any subcontractors or agents to which it discloses Personal Information under this Agreement or under any SOW to provide reasonable assurance, evidenced by written contract, that they will comply with the same or substantially similar confidentiality, privacy and security obligations with respect to such Personal Information as apply to Supplier under this Agreement or any SOW. Supplier shall confirm in writing to DXC that such contract is in place as a condition to DXC’s approval of use of a subcontractor in connection with any SOW. Upon request of DXC, Supplier will provide to DXC a copy of the subcontract or an extract of the relevant clauses. Supplier shall ensure that any failure on the part of any subcontractor or agent to comply with the Supplier obligations under this Agreement or any SOW shall be grounds to promptly terminate such subcontractor or agent. If during the term of this Agreement or any SOW, DXC determines, in its exclusive discretion, that any Supplier subcontractor or agent cannot comply with the Supplier obligations under this Agreement or with any SOW, then DXC may terminate this Agreement in whole or in part (with respect to any SOW for which such subcontractor or agent is providing services), if not cured by Supplier within the time prescribed in the notice of such deficiency.

  • Service Locations X.X. Xxxxxx maintains various operational/service centers and locations in the United States and other jurisdictions. The services provided under this Agreement may be provided from one or more such locations. X.X. Xxxxxx may change the operational/service centers and locations as it deems necessary or appropriate for its business concerns.

Time is Money Join Law Insider Premium to draft better contracts faster.