Access to State Systems Sample Clauses

Access to State Systems. If Quest is given access, whether on-site or through remote facilities, to any of State’s computer or electronic data storage systems in order for Quest to accomplish the work called for in this Agreement, Quest will limit such access and use solely to perform work within the scope of this Agreement and will not attempt to access any computer system, electronic file, software or other electronic services other than those specifically required to accomplish the work required under this Agreement. Quest will limit such access to those of its employees or representatives with an express requirement to have such access in connection with this Agreement, will advise State in writing of the name of each such employee and representatives who will be granted such access, and will strictly follow all State security rules and procedures for use of State electronic resources. All user identification numbers and passwords disclosed to Quest and any information obtained by Quest as a result of Quest’s access to, and use of, State’s computer and electronic storage systems will be deemed to be, and will be treated as, Confidential Information.
AutoNDA by SimpleDocs
Access to State Systems. Client is responsible for maintaining master accounts with associated usernames and passwords for accessing the CALPADS state system, the CBEDS online reporting system, and any 3rd party systems (e.g. CAASPP/TOMS, CASEMIS, SEDS, Cal-SAAS).
Access to State Systems 

Related to Access to State Systems

  • Access to System If Business Associate needs access to a Covered Entity Information Technology system to comply with its obligations under the Contract or this Agreement, Business Associate shall request, review, and comply with any and all policies applicable to Covered Entity regarding such system including, but not limited to, any policies promulgated by the Office of Information Technology and available at xxxx://xxx.xxxxx.xx.xx/about/policies.

  • Access to Site 3.05.1 Contractor may enter and leave the premises at all reasonable times without charge. Contractor and its employees may use the common areas and roadways of the premises where it is to perform the services together with all facilities, equipment, improvements, and services provided in connection with the premises for common use. This excludes parking for Contractor’s personnel. Contractor shall repair any damage caused by it or its employees as a result of its use of the common areas.

  • Access to Software Access Rights to Software which is Results shall comprise: Access to the Object Code; and, where normal use of such an Object Code requires an Application Programming Interface (hereafter API), Access to the Object Code and such an API; and, if a Party can show that the execution of its tasks under the Project or the Exploitation of its own Results is technically or legally impossible without Access to the Source Code, Access to the Source Code to the extent necessary. Background shall only be provided in Object Code unless otherwise agreed between the Parties concerned.

  • Access to Services 1. Subject to DHCS provider enrollment certification requirements, the Contractor shall maintain continuous availability and accessibility of covered services and facilities, service sites, and personnel to provide the covered services through use of DMC certified providers. Such services shall not be limited due to budgetary constraints.

  • Access to NID 2.17.3.1 TWTC may access the customer’s premises wiring by any of the following means and TWTC shall not disturb the existing form of electrical protection and shall maintain the physical integrity of the NID:

  • Access to Service You acknowledge that Your ability to access the Service may require the payment of third- party fees (such as telephone toll charges, ISP, or airtime charges) and that You are responsible for paying such fees. The Provider is not responsible for any equipment You may need to be able to access the Service.

  • ACCESS TO SECURITY LOGS AND REPORTS Upon request, the Contractor shall provide access to security logs and reports to the State or Authorized User in a format as specified in the Authorized User Agreement.

  • Access to Worksite 9.4.1 Authorized representatives of the Association shall have the right to transact official Association business on school property during regular school business hours provided that such activities or use do not interfere with classroom instruction or interrupt normal operations.

  • Access to Network Interface Device (NID 2.4.3.1. Due to the wide variety of NIDs utilized by BellSouth (based on subscriber size and environmental considerations), Mpower may access the on-premises wiring by any of the following means: BellSouth shall allow Mpower to connect its loops directly to BellSouth’s multi-line residential NID enclosures that have additional space and are not used by BellSouth or any other telecommunications carriers to provide service to the premise. Mpower agrees to install compatible protectors and test jacks and to maintain the protection system and equipment and to indemnify BellSouth pursuant to Section 8 of the General Terms and Conditions of this Agreement.

  • Access to PHI Business Associate shall provide access to PHI in a Designated Record Set to Covered Entity or as directed by Covered Entity to an Individual to meet the requirements under 45 CFR § 164.524. Business Associate shall provide such access in the time and manner reasonably designated by Covered Entity. Within three (3) business days, Business Associate shall forward to Covered Entity for handling any request for access to PHI that Business Associate directly receives from an Individual.

Time is Money Join Law Insider Premium to draft better contracts faster.