Access to Tableau Online Sample Clauses

Access to Tableau Online. Subject to the terms and conditions of the Agreement, and except as set forth in Section 9 (Term and Termination) Field Dynamics, in its capacity as authorised reseller, hereby grants to you a non-exclusive, non-transferable, non-sublicensable (except as permitted under Section 3.8), worldwide right during the applicable Subscription Term to access and use Tableau Online solely for your business purposes but only in accordance with:
AutoNDA by SimpleDocs
Access to Tableau Online. Subject to the terms and conditions of the Agreement, and except as set forth in Section 5 (Term and Termination) Tableau hereby grants to you a non-exclusive, non- transferable, non-sublicensable (except as permitted under Section 1.5), worldwide right during the applicable Subscription Term to access and use Tableau Online solely for your business purposes but only in accordance with: (i) the Documentation; (ii) the restrictions in Section 1.1 (Provision of Tableau Online), Section 1.7 (General Restrictions), and Section 2 (Customer Data and Customer Obligations) and (iii) any restrictions designated on the applicable Ordering Document, including, but not limited to the number of Authorized Users. You will use reasonable efforts to prevent any unauthorized access to or use of Tableau Online and the Documentation, and will promptly notify Tableau in writing of any unauthorized access or use of which you become aware and provide all reasonable cooperation to prevent and terminate such access or use.

Related to Access to Tableau Online

  • Access to NID 2.17.3.1 TWTC may access the customer’s premises wiring by any of the following means and TWTC shall not disturb the existing form of electrical protection and shall maintain the physical integrity of the NID:

  • Access to PHI Business Associate shall provide access to PHI in a Designated Record Set to Covered Entity or as directed by Covered Entity to an Individual to meet the requirements under 45 CFR § 164.524. Business Associate shall provide such access in the time and manner reasonably designated by Covered Entity. Within three (3) business days, Business Associate shall forward to Covered Entity for handling any request for access to PHI that Business Associate directly receives from an Individual.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • Access to Software Access Rights to Software which is Results shall comprise: Access to the Object Code; and, where normal use of such an Object Code requires an Application Programming Interface (hereafter API), Access to the Object Code and such an API; and, if a Party can show that the execution of its tasks under the Project or the Exploitation of its own Results is technically or legally impossible without Access to the Source Code, Access to the Source Code to the extent necessary. Background shall only be provided in Object Code unless otherwise agreed between the Parties concerned.

  • Access to Information Systems Access, if any, to DXC’s Information Systems is granted solely to perform the Services under this Order, and is limited to those specific DXC Information Systems, time periods and personnel as are separately agreed to by DXC and Supplier from time to time. DXC may require Supplier’s employees, subcontractors or agents to sign individual agreements prior to access to DXC’s Information Systems. Use of DXC Information Systems during other time periods or by individuals not authorized by DXC is expressly prohibited. Access is subject to DXC business control and information protection policies, standards and guidelines as may be modified from time to time. Use of any other DXC Information Systems is expressly prohibited. This prohibition applies even when an DXC Information System that Supplier is authorized to access, serves as a gateway to other Information Systems outside Supplier’s scope of authorization. Supplier agrees to access Information Systems only from specific locations approved for access by DXC. For access outside of DXC premises, DXC will designate the specific network connections to be used to access Information Systems.

  • Access to and Use of Content Customer has the right to access and use applicable Content subject to the terms of applicable Order Forms, this Agreement and the Documentation.

  • Access to System If Business Associate needs access to a Covered Entity Information Technology system to comply with its obligations under the Contract or this Agreement, Business Associate shall request, review, and comply with any and all policies applicable to Covered Entity regarding such system including, but not limited to, any policies promulgated by the Office of Information Technology and available at xxxx://xxx.xxxxx.xx.xx/about/policies.

  • ACCESS TO OPERATIONS SUPPORT SYSTEMS 2.1 BellSouth shall provide Max-Tel access to operations support systems (“OSS”) functions for pre-ordering, ordering and provisioning, maintenance and repair, and billing. BellSouth shall provide access to the OSS through manual and/or electronic interfaces as described in this Attachment. It is the sole responsibility of Max-Tel to obtain the technical capability to access and utilize BellSouth’s OSS interfaces. Specifications for Max-Tel ’s access and use of BellSouth’s electronic Version R4Q01: 12/01/01 interfaces are set forth at xxx.xxxxxxxxxxxxxxx.xxxxxxxxx.xxx and are incorporated herein by reference.

  • Access to Network Interface Device (NID 2.4.3.1. Due to the wide variety of NIDs utilized by BellSouth (based on subscriber size and environmental considerations), Mpower may access the on-premises wiring by any of the following means: BellSouth shall allow Mpower to connect its loops directly to BellSouth’s multi-line residential NID enclosures that have additional space and are not used by BellSouth or any other telecommunications carriers to provide service to the premise. Mpower agrees to install compatible protectors and test jacks and to maintain the protection system and equipment and to indemnify BellSouth pursuant to Section 8 of the General Terms and Conditions of this Agreement.

  • Access to Public Records The Department may unilaterally cancel this Contract for refusal by the Contractor to comply with this section by not allowing public access to all documents, papers, letters or other material made or received by the Contractor in conjunction with the Contract, unless the records are exempt from section 24(a) of Article I of the State Constitution and section 119.07(1), Florida Statutes.

Time is Money Join Law Insider Premium to draft better contracts faster.