Access to the Data System Sample Clauses

The 'Access to the Data System' clause defines the terms under which parties are permitted to use or interact with a specified data system. It typically outlines who is authorized to access the system, the scope of permissible activities, and any security or confidentiality requirements that must be followed. For example, it may restrict access to certain employees or require the use of secure login credentials. This clause ensures that sensitive data is protected and that only appropriate individuals can interact with the system, thereby reducing the risk of unauthorized access or data breaches.
Access to the Data System. Only Subscriber and its directors, officers, employees, contractors, and other agents who are authorized by Subscriber shall be authorized to access the Data System and use the Data (such authorized directors, officers, employees, contractors, and other agents together comprising “Authorized Users”). Subscriber will not permit any person that is not an Authorized User to access or use the Data System and shall implement and maintain security systems and procedures reasonably designed to prevent unauthorized access, use, or misuse by any person of the Data or Data System. Without limiting the generality of the foregoing, Subscriber shall: (i) ensure that access to the Data System is strictly controlled through the use of a password and unique user identifier for each Authorized User which prevent multiple simultaneous accesses utilizing such single user identifier (“User ID”); (ii) inform each Authorized User of Subscriber’s obligations under this Agreement with respect to access to the Data System and take all necessary steps to ensure that all Authorized Users comply with such obligations; (iii) ensure that Subscriber’s hardware, software, devices, and any other equipment through which the Data System may be accessed are secure and able to prevent any unauthorized access, use, or misuse of the Data; and (iv) notify TCM promptly upon any breach in Subscriber’s security procedures related to the Data or Data System of which Subscriber becomes aware. Subscriber shall be responsible for all instructions entered, transmitted, or received under any User ID of any Authorized User and for the consequences thereof.

Related to Access to the Data System

  • Data Storage Where required by applicable law, Student Data shall be stored within the United States. Upon request of the LEA, Provider will provide a list of the locations where Student Data is stored.

  • Access to PHI Business Associate shall provide access to PHI in a Designated Record Set to Covered Entity or as directed by Covered Entity to an Individual to meet the requirements under 45 CFR § 164.524. Business Associate shall provide such access in the time and manner reasonably designated by Covered Entity. Within three (3) business days, Business Associate shall forward to Covered Entity for handling any request for access to PHI that Business Associate directly receives from an Individual.

  • Data Services In lieu of any other rates or discounts, the Customer will receive a discount equal to 15% for the following Data Services: Access: Standard VBS3 Guide local loop charges for DS-1 Access Service.

  • Access to the Service Subject to Subscriber’s compliance with the terms of this Agreement, Inriver hereby grants to Subscriber the right to access and use the Service and the Documentation for the internal business purposes for such Business Units as specified in an Order Form on a limited, revocable, non-exclusive, non-transferable basis in accordance with the scope identified in an Order Form. Inriver will provide Subscriber with a primary administrator Account for managing and granting access to its Authorized Users and Subscriber is responsible for activating them. Subscriber hereby instructs Inriver to grant the Subscriber’s implementing partner access to Subscriber’s environment for the Service. If an implementing partner no longer shall have access to the Service, Subscriber shall notify Inriver of this and Inriver will remove such access.

  • Access to the Services ID’s for access to Vendor Core Research and Analyst Inquiry may not be shared. Access to the Services is restricted to the number of named individuals (each a “Licensed User”) as identified in the Customer Purchase Order.