ACCESS TO THE INTERNET Sample Clauses

ACCESS TO THE INTERNET. Whilst the Moresk Centre takes reasonable measures restrict access to inappropriate content placed on or accessible through the Internet, you acknowledge that if you access the Internet you may receive or be exposed to content, goods or services which you consider to be improper, inaccurate, misleading, defamatory, obscene or otherwise offensive. You agree that the Moresk Centre is not liable for any action or inaction with respect to any such content on the Internet accessible through Moresk WiFi. You must:
AutoNDA by SimpleDocs
ACCESS TO THE INTERNET. A computer shall be considered to have access to the Internet if such computer is equipped with a modem or is connected to a computer network, which has access to the Internet.
ACCESS TO THE INTERNET. You are solely responsible for obtaining and maintaining all internet, computer hardware and other equipment needed to access and use this Website and the Services, and you shall be solely responsible for all charges and fees related thereto. Please note that the Internet is not a fully secure medium and any communication may be lost, intercepted or altered. Lincoln Tech is not liable for any damages related to communications to, or from, this Website or the Services.
ACCESS TO THE INTERNET. Access to the Internet from NYSERDA networks is considered a special case. Two trusted points are used, including the Border Router and the Firewall. Encryption is accomplished by session encryption within the browser. Since user actions can override security, separate policies cover acceptable use and security awareness. Automated monitoring systems (such as network based Internet content filters) and desktop controls (such as antivirus, anti-malware, and local software firewall systems) are deployed to increase network security. Classification of Users Every user of the NYSERDA network is designated as “Security Level 1 - Unclassified” until their classification is explicitly changed by the Information Security Officer. NYSERDA staff will be granted “Security Level 2 - Shared” once they are assigned to a NYSERDA work group. It is the responsibility of an employee's manager to justify any requested higher levels of clearance. For example, the appropriate department head may request that an employee in the Finance Unit be granted “Security Level 3 - NYSERDA Only,” to be able to work in the Financial Management System. The Information Security Officer is responsible for the management and control of the clearance levels for all personnel and for oversight for the System Administrators who will actually implement the security level changes. It is the responsibility of all System Owners (the functional owner of a computer-based application can also be responsible for establishing the rules for appropriate use and protection of the data), and System Administrators (any individual authorized by the Chief Information Officer to administer a particular information technology hardware system software) to determine the Security Level of a given user before granting that user access to any system. It is the responsibility of the User to know his or her own clearance level and to understand the rights and limitations associated with that clearance. Classification of Equipment All computing equipment must be given a classification by the Information Security Officer. Classifications for existing NYSERDA equipment are as follows: • Security Xxxxx 0 - Xxxxxxxxxxxx, XXXX. • Security Level 2 - Shared, all equipment that is not located on NYSERDA premises; all equipment used in the transfer of data to and from the Internet; • Security Level 3 - NYSERDA Only, all user workstations, file-servers, print-servers, etc.; and, • Security Level 4 - Confidential, all Local Area Net...

Related to ACCESS TO THE INTERNET

  • Access to NID 2.17.3.1 TWTC may access the customer’s premises wiring by any of the following means and TWTC shall not disturb the existing form of electrical protection and shall maintain the physical integrity of the NID:

  • Access to the Site 22.1 The Contractor shall allow the Engineer and any person authorized by the Engineer access to the Site, to any place where work in connection with the Contract is being carried out or is intended to be carried out and to any place where materials or plant are being manufactured / fabricated / assembled for the works.

  • Access to the Property At such times as COUNTY and PURCHASER may mutually agree prior to the closing, COUNTY shall provide to PURCHASER or to its employees, agents, and contractors: (i) reasonable access to the Property and to the books, records, and personnel of COUNTY relating thereto for the purpose of making any surveys, inspections, or investigations permitted by this Agreement; and (ii) such information regarding the Property as PURCHASER or its employees, agents, and contractors may reasonably request. PURCHASER shall promptly repair any damage to the Property caused by its or any such person(s) entry upon the Property and shall hold COUNTY harmless from and against any and all claims, damages, losses, liabilities, costs, and expenses (including, without limitation, attorneys' fees and court costs) arising out of or in connection with any such entry upon the Property.

  • Access to PHI Business Associate shall provide access to PHI in a Designated Record Set to Covered Entity or as directed by Covered Entity to an Individual to meet the requirements under 45 CFR § 164.524. Business Associate shall provide such access in the time and manner reasonably designated by Covered Entity. Within three (3) business days, Business Associate shall forward to Covered Entity for handling any request for access to PHI that Business Associate directly receives from an Individual.

  • Access to Site 3.05.1 Contractor may enter and leave the premises at all reasonable times without charge. Contractor and its employees may use the common areas and roadways of the premises where it is to perform the services together with all facilities, equipment, improvements, and services provided in connection with the premises for common use. This excludes parking for Contractor’s personnel. Contractor shall repair any damage caused by it or its employees as a result of its use of the common areas.

  • Access to the Services ID’s for access to Vendor Core Research and Analyst Inquiry may not be shared. Access to the Services is restricted to the number of named individuals (each a “Licensed User”) as identified in the Customer Purchase Order.

  • Internet Access Data and information may be made electronically accessible to the Company through Internet access to one or more links provided by the Administrator or a sub-administrator (“Web Link”). All rights in Web Link (including text and “look and feel” attributes) are owned by the sub-administrator. Any commercial use of the content or any other aspect of Web Link requires the written permission of the sub-administrator. Use of the Web Link by the Company will be subject to any terms of use set forth on the web site. Web Link and the information (including text, graphics and functionality) in the Web Link is presented “As Is” and “As Available” without express or implied warranties including, but not limited to, implied warranties of non-infringement, merchantability and fitness for a particular purpose. The sub-administrator neither warrants that the Web Link will be uninterrupted or error free, nor guarantees the accessibility, reliability, performance, timeliness, sequence, or completeness of information provided on the Web Link.

  • Access to Property Borrower shall permit agents, representatives and employees of Lender to inspect the Property or any part thereof at reasonable hours upon reasonable advance notice.

  • Access to Information Systems Access, if any, to DXC’s Information Systems is granted solely to perform the Services under this Order, and is limited to those specific DXC Information Systems, time periods and personnel as are separately agreed to by DXC and Supplier from time to time. DXC may require Supplier’s employees, subcontractors or agents to sign individual agreements prior to access to DXC’s Information Systems. Use of DXC Information Systems during other time periods or by individuals not authorized by DXC is expressly prohibited. Access is subject to DXC business control and information protection policies, standards and guidelines as may be modified from time to time. Use of any other DXC Information Systems is expressly prohibited. This prohibition applies even when an DXC Information System that Supplier is authorized to access, serves as a gateway to other Information Systems outside Supplier’s scope of authorization. Supplier agrees to access Information Systems only from specific locations approved for access by DXC. For access outside of DXC premises, DXC will designate the specific network connections to be used to access Information Systems.

  • Access to Services Subject to and in accordance with the terms of this Agreement, including any Schedules, Company grants You a non-exclusive, non-sublicensable, nontransferable, non-assignable, revocable license for the term of this Agreement to access and use the Services. Services may only be used by Your Users for internal business purposes only. You agree to comply with the terms and conditions of this Agreement, including any Schedules, and with all applicable Company procedures and policies that further define use of the Services. You acknowledge and agree that the actions of any of Your Users with respect to the Services will be deemed to be actions by You and that any breach by any of Your Users of the terms of this Agreement, including any Schedule, will be deemed to be a breach by You.

Time is Money Join Law Insider Premium to draft better contracts faster.