ACCESS TO THE SOLUTION Sample Clauses

The 'Access to the Solution' clause defines the rights and conditions under which a party, typically the client, can use or interact with a provided product, service, or software. It outlines the scope of access, such as whether it is limited to certain users, devices, or timeframes, and may specify technical requirements or restrictions on usage. This clause ensures that both parties have a clear understanding of how and when the solution can be accessed, thereby preventing disputes and safeguarding the provider’s intellectual property or service integrity.
ACCESS TO THE SOLUTION. The Customer acknowledges that the Solution and the Application Service are accessible via a remote connection requiring internet access. It is up to them to have the appropriate equipment and means of connection to maintain Internet access. Access to the Solution and Application Service is granted from any Terminal, within the limits of the availability conditions referred to in Appendix 1, by means of Identifiers assigned by the Provider to the Customer or the identification system set up by the Customer. The Customer is required to comply with the Service Provider's instructions and the technical prerequisites contained in the Documentation relating to the Solution and the Application Service. It is the customer's responsibility to regularly modify and have modified by Authorized Users the passwords associated with the Identifiers. Identifiers are intended to restrict access to the Solution and Application Service to authorized Users only and to protect the completeness and availability of the Solution, Application Service and Customer Data. The Identifiers are personal to each Authorized User and confidential, they are proof of the identity of the Authorized User. They may only be changed at the Customer's request or at the Service Provider's initiative in the event of a security risk, subject to informing the Customer by any means. The Customer undertakes to maintain the confidentiality and secrecy of the Identifiers and not to disclose them in any form whatsoever to third parties. The use of the Identifiers binds the customer to any use of the Solution and the Application Service; it is his responsibility to ensure that the Authorized Users respect the terms of the Contract. The customer shall bear the consequences of any unauthorized use by third parties who have had access to or knowledge of the Identifiers. If the Customer becomes aware of the theft or misuse of Identifiers by a third party, the Customer shall inform the Service Provider without delay and confirm this by registered mail addressed to the Service Provider. In the event of loss or theft of an Identifier, the customer will use the procedure set up by the Service Provider to recover its Identifiers. The Customer is informed that the connection to the Solution and the Application Service is via the Internet. The Customer is fully aware of the technical risks inherent in the Internet network and of interruptions or slowdowns that may affect the connection. Consequently, the Service Provi...
ACCESS TO THE SOLUTION. You acknowledge and agree that: 5.4.1 we may need to restrict your access to some parts of or all of the Solution at any time or for any period for the purposes of maintenance, upgrade, content updates, or repair. We will use reasonable endeavours to give you as much notice as is reasonably practicable in the circumstances of such planned activity and to minimise any restriction or down- time where reasonably practicable; 5.4.2 you shall at all times be responsible for (i) all Customer Material used, transmitted and stored in connection with the Solution and shall ensure that the Customer Materials comply with, and that your and the Enrolled Users’ use of the Solution complies with the Acceptable Use Policy

Related to ACCESS TO THE SOLUTION

  • Access to the Service Subject to Subscriber’s compliance with the terms of this Agreement, Inriver hereby grants to Subscriber the right to access and use the Service and the Documentation for the internal business purposes for such Business Units as specified in an Order Form on a limited, revocable, non-exclusive, non-transferable basis in accordance with the scope identified in an Order Form. Inriver will provide Subscriber with a primary administrator Account for managing and granting access to its Authorized Users and Subscriber is responsible for activating them. Subscriber hereby instructs Inriver to grant the Subscriber’s implementing partner access to Subscriber’s environment for the Service. If an implementing partner no longer shall have access to the Service, Subscriber shall notify Inriver of this and Inriver will remove such access.

  • Access to the Services ID’s for access to Vendor Core Research and Analyst Inquiry may not be shared. Access to the Services is restricted to the number of named individuals (each a “Licensed User”) as identified in the Customer Purchase Order.

  • Access to the Site 22.1 The Contractor shall allow the Engineer and any person authorized by the Engineer access to the Site, to any place where work in connection with the Contract is being carried out or is intended to be carried out and to any place where materials or plant are being manufactured / fabricated / assembled for the works.

  • Access to Services Subject to and in accordance with the terms of this Agreement, including any Schedules, Company grants You a non-exclusive, non-sublicensable, nontransferable, non-assignable, revocable license for the term of this Agreement to access and use the Services. Services may only be used by Your Users for internal business purposes only. You agree to comply with the terms and conditions of this Agreement, including any Schedules, and with all applicable Company procedures and policies that further define use of the Services. You acknowledge and agree that the actions of any of Your Users with respect to the Services will be deemed to be actions by You and that any breach by any of Your Users of the terms of this Agreement, including any Schedule, will be deemed to be a breach by You.

  • Access to NID 2.7.3.1 NewPhone may access the customer’s premises wiring by any of the following means and NewPhone shall not disturb the existing form of electrical protection and shall maintain the physical integrity of the NID: 2.7.3.1.1 BellSouth shall allow NewPhone to connect its Loops directly to BellSouth’s multi-line residential NID enclosures that have additional space and are not used by BellSouth or any other telecommunications carriers to provide service to the premises; 2.7.3.1.2 Where an adequate length of the customer’s premises wiring is present and environmental conditions permit, either Party may remove the customer premises wiring from the other Party’s NID and connect such wiring to that Party’s own NID; 2.7.3.1.3 Either Party may enter the subscriber access chamber or dual chamber NID enclosures for the purpose of extending a cross-connect or spliced jumper wire from the customer premises wiring through a suitable “punch-out” hole of such NID enclosures; or 2.7.3.1.4 NewPhone may request BellSouth to make other rearrangements to the customer premises wiring terminations or terminal enclosure on a time and materials cost basis. 2.7.3.2 In no case shall either Party remove or disconnect the other Party’s loop facilities from either Party’s NIDs, enclosures, or protectors unless the applicable Commission has expressly permitted the same and the disconnecting Party provides prior notice to the other Party. In such cases, it shall be the responsibility of the Party disconnecting loop facilities to leave undisturbed the existing form of electrical protection and to maintain the physical integrity of the NID. It will be NewPhone’s responsibility to ensure there is no safety hazard, and NewPhone will hold BellSouth harmless for any liability associated with the removal of the BellSouth Loop from the BellSouth NID. Furthermore, it shall be the responsibility of the disconnecting Party, once the other Party’s loop has been disconnected from the NID, to reconnect the disconnected loop to a nationally recognized testing laboratory listed station protector, which has been grounded as per Article 800 of the National Electrical Code. If no spare station protector exists in the NID, the disconnected loop must be appropriately cleared, capped and stored. 2.7.3.3 NewPhone shall not remove or disconnect ground wires from BellSouth’s NIDs, enclosures, or protectors. 2.7.3.4 NewPhone shall not remove or disconnect NID modules, protectors, or terminals from BellSouth’s NID enclosures. 2.7.3.5 Due to the wide variety of NID enclosures and outside plant environments, BellSouth will work with NewPhone to develop specific procedures to establish the most effective means of implementing this section if the procedures set forth herein do not apply to the NID in question.