Authorized Third-Party Access Sample Clauses

Authorized Third-Party Access. (a) Licensee may provide access to the Software to its Users, subject to the terms of this Agreement including the protection of Confidential Information, and if applicable, any Channel Partner Agreement, for the Permitted Use only. Unless expressly stated otherwise, no User shall be permitted to use the Software for its own benefit. Licensee will promptly on request notify Licensor in writing of all Users which have been provided access. Notwithstanding the foregoing, Licensee may provide access to the Software and to the data generated by the Software to third parties to the extent such right is expressly granted to Licensee in the Additional Licensing Terms and the third party is licensed as either a Concurrent User or Authorized User if access to and use of the Software is provided. Even if the third party only has rights to review data, generate data, and input data, the third party must still be a User of the Software and licensed appropriately.
AutoNDA by SimpleDocs
Authorized Third-Party Access a. PROVIDER may allow Third Parties access to Confidential Information, via myBlue, through PROVIDER's access path, as authorized under this Agreement and subject to the myBlue Provider Guidelines.
Authorized Third-Party Access a. PHARMACY may allow Third Parties access to Confidential Information, via myBlue, through PHARMACY access path, as authorized under this Agreement and subject to the myBlue Pharmacy Guidelines.

Related to Authorized Third-Party Access

  • Third Party Access 6.1 You can instruct a TPP to access information on your Account or initiate certain Transactions from your Account provided such TPP has identified itself to us and it has acted in accordance with the relevant regulatory requirements. We will treat any instruction from an TPP as if it was from you or an Account Manager.

  • Party Access Each Party shall supply information to the other Party as required by this Agreement. Information shall be treated as Confidential Information under this Agreement if (i) it has been clearly marked or otherwise designated as “Confidential information” by the Party supplying the information, or (ii) it is information designated as Confidential Information by applicable provisions of the ISO Tariffs; provided, however, Confidential Information does not include information: (i) in the public domain or that has been previously publicly disclosed without violation of this Agreement, (ii) required by law to be publicly submitted or disclosed (with notice to the other Party), or (iii) necessary to be divulged in an action to enforce this Agreement. Notwithstanding anything in this Section to the contrary, the NTO shall not have a right hereunder to receive or review any documents, data or other information of another Market Participant or the ISO, including documents, data or other information provided to the ISO, to the extent such documents, data or information have been designated as confidential pursuant to the procedures specified in the ISO Tariffs or to the extent that they have been designated as confidential by such other Market Participant; provided, however, that the NTO may receive and review any composite documents, data and other information that may be developed based on such confidential documents, data or information if the composite does not disclose any individual Market Participant’s confidential data or information.

  • Authorized Access Transfer Agent shall have controls that are designed to maintain the logical separation such that access to systems hosting Fund Data and/or being used to provide services to Fund will uniquely identify each individual requiring access, grant access only to authorized personnel based on the principle of least privileges, and prevent unauthorized access to Fund Data.

  • Unauthorized Access Using service to access, or to attempt to access without authority, the accounts of others, or to penetrate, or attempt to penetrate, security measures of Company’s or a third party’s computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in disruption of service or the corruption or loss of data.

  • Links to Third Party Websites In your use of the Service and/or the Company’s website, you may encounter various types of links that enable you to visit websites operated or owned by third parties (“Third Party Site”). These links are provided to you as a convenience and are not under the control or ownership of the Company. The inclusion of any link to a Third Party Site is not (i) an endorsement by the Company of the Third Party Site, (ii) an acknowledgement of any affiliation with its operators or owners, or (iii) a warranty of any type regarding any information or offer on the Third Party Site. Your use of any Third Party Site is governed by the various legal agreements and policies posted at that website.

  • Services and Third Party Materials A. The tvOS Software may enable access to Apple’s iTunes Store, App Store, Game Center, iCloud and other Apple and third party services, and web sites (collectively and individually, “Services”). Such Services may not be available in all languages or in all countries. Use of these Services requires Internet access and use of certain Services may require an Apple ID, may require you to accept additional terms and may be subject to additional fees. By using this software in connection with an Apple ID, or other Apple Service, you agree to the applicable terms of service for that Service, such as the latest iTunes Store Terms and Conditions, which you may access and review at xxxx://xxx.xxxxx.xxx/legal/itunes/ ww/.

  • Authorized User You may request us to issue a Card to an individual who has no financial responsibility under this Agreement. An Authorized User has the same access to your Account as you do, subject to any limitations we may impose. An Authorized User has no authority to add or delete Cardholders, request a replacement Card or terminate or modify this Agreement. You may terminate an Authorized User’s authority to access your Account at any time. To do this, you must return the Card to PenFed. You agree that you are responsible for all charges and cash advances made by an Authorized User, including charges made before the Card is returned, recurring charges, or charges made without the use of the Card initiated by the Authorized User after termination of the Authorized User’s access.

  • Third Party Websites The Service may contain or reference links to websites operated by third parties ("Third Party Websites"). These links are provided as a convenience only. Such Third Party Websites are not under our control. We are not responsible for the content of any Third Party Website or any link contained in a Third Party Website. We do not review, approve, monitor, endorse, warrant, or make any representations with respect to Third Party Websites, and the inclusion of any link in the Service, Debit Rewards Offers or any other services provided in connection with them is not and does not imply an affiliation, sponsorship, endorsement, approval, investigation, verification or monitoring by us of any information contained in any Third Party Website. In no event will we be responsible for the information contained in such Third Party Website or for your use of or inability to use such website. Access to any Third Party Website is at your own risk, and you acknowledge and understand that linked Third Party Websites may contain terms and privacy policies that are different from ours. We are not responsible for such provisions, and expressly disclaim any liability for them.

  • Technology Access A. Contractor expressly acknowledges that state funds may not be expended in connection with the purchase of an automated information system unless that system meets certain statutory requirements relating to accessibility by persons with visual impairments. Accordingly, Contractor represents and warrants to System Agency that the technology provided to System Agency for purchase (if applicable under this Contract or any related Solicitation) is capable, either by virtue of features included within the technology or because it is readily adaptable by use with other technology, of:

  • Authorized Users Authorized Users" are:

Time is Money Join Law Insider Premium to draft better contracts faster.