Authorized Users and Authentication Credentials Sample Clauses

Authorized Users and Authentication Credentials. Licensee's access to the Licensed Application may be dependent upon a security access system that requires each Authorized User to use one or more Authentication Credentials. Such security access system may rely on, among other things, the issuance by Xxxxxx Xxx (and/or a third party designated by Xxxxxx Xxx) of an Authentication Credential to an Authorized User. Licensee represents and warrants that each individual or system accessing the Licensed Application using Authentication Credentials issued to Licensee is employed, retained as an Independent Contractor or used by Licensee. Licensee further represents and warrants that each individual or system registered by Licensee for access to the Licensed Application (a) is accurately identified on the associated registration form submitted to Xxxxxx Xxx (and/or a third party designated by Xxxxxx Xxx), (b) is in fact authorized by Licensee to access and use the Licensed Application for the purposes for which it is intended, and (c) possesses all licenses, certifications and other authorizations, whether required by applicable law or otherwise, to effect the transactions for which the Authorized User accesses and uses the Licensed Application. Licensee acknowledges and agrees that actions of Authorized Users shall be deemed to be actions of Licensee and Licensee guarantees the full performance by its Authorized Users of all obligations under the Agreement.
AutoNDA by SimpleDocs
Authorized Users and Authentication Credentials. Licensee's access to the Licensed Application may be dependent upon a security access system that requires each Authorized User to use one or more Authentication Credentials. Such security access system may rely on, among other things, the issuance by Xxxxxx Xxx (and/or a third party designated by Xxxxxx Xxx) of an Authentication Credential to an Authorized User. Licensee represents and warrants that each Authorized User (a) is an employee or Independent Contractor of, or a system used by, Licensee, (b) is authorized to receive an Authentication Credential, (c) is the individual or system identified as such on the associated registration form submitted to Xxxxxx Xxx (and/or a third party designated by Xxxxxx Xxx), (d) is in fact authorized by Licensee to access and use the Licensed Application, and (e) possesses all licenses, certifications and other authorizations, whether required by applicable law or otherwise, to effect the transactions for which the Authorized User accesses and uses the Licensed Application. Licensee acknowledges and agrees that actions of Authorized Users shall be deemed to be actions of Licensee and Licensee guarantees the full performance by its Authorized Users of all obligations under the Agreement.

Related to Authorized Users and Authentication Credentials

  • Access by and Authentication of Authorized Users Authorized Users of the Participating Institutions shall be granted access to the Licensed Materials pursuant to the following:

  • Execution and Authentication At least one Officer must sign the Notes for the Company by manual or facsimile signature. If an Officer whose signature is on a Note no longer holds that office at the time a Note is authenticated, the Note will nevertheless be valid. A Note will not be valid until authenticated by the manual signature of the Trustee. The signature will be conclusive evidence that the Note has been authenticated under this Indenture. The Trustee will, upon receipt of a written order of the Company signed by an Officer (an “Authentication Order”), authenticate Notes for original issue that may be validly issued under this Indenture, including any Additional Notes. The aggregate principal amount of Notes outstanding at any time may not exceed the aggregate principal amount of Notes authorized for issuance by the Company pursuant to one or more Authentication Orders, except as provided in Section 2.07 hereof. The Trustee may appoint an authenticating agent acceptable to the Company to authenticate Notes. An authenticating agent may authenticate Notes whenever the Trustee may do so. Each reference in this Indenture to authentication by the Trustee includes authentication by such agent. An authenticating agent has the same rights as an Agent to deal with Holders or an Affiliate of the Company.

  • Executed and authenticated be executed manually or in facsimile by or on behalf of the Issuer and authenticated manually by or on behalf of the Fiscal Agent; and

  • Authorization, Authentication, and Access In order to ensure that access to the Data is limited to authorized staff, the Contractor must:

  • Security Administrator and Authorized Users Grantee shall:

  • Execution, Authentication, Delivery and Dating of Rights Certificates (a) The Rights Certificates shall be executed on behalf of the Company by any of its Chairman of the Board, President, Chief Executive Officer and Chief Financial Officer. The signature of any of these officers on the Rights Certificates may be manual or facsimile. Rights Certificates bearing the manual or facsimile signatures of individuals who were at any time the proper officers of the Company shall bind the Company, notwithstanding that such individuals or any of them have ceased to hold such offices either before or after the countersignature and delivery of such Rights Certificates.

  • Data Ownership and Authorized Access 1. Student Data Property of LEA. All Student Data transmitted to the Provider pursuant to the Service Agreement is and will continue to be the property of and under the control of the LEA. The Provider further acknowledges and agrees that all copies of such Student Data transmitted to the Provider, including any modifications or additions or any portion thereof from any source, are subject to the provisions of this DPA in the same manner as the original Student Data. The Parties agree that as between them, all rights, including all intellectual property rights in and to Student Data contemplated per the Service Agreement, shall remain the exclusive property of the LEA. For the purposes of FERPA, the Provider shall be considered a School Official, under the control and direction of the LEA as it pertains to the use of Student Data, notwithstanding the above.

  • Execution, Authentication, Availability and Dating of the Residual Certificates The Residual Certificates shall be executed on behalf of Xxxxxx Mae by an Authorized Officer of Xxxxxx Xxx under the corporate seal of Xxxxxx Mae, which may be in facsimile form and be imprinted or otherwise reproduced thereon, and shall be attested by the Secretary, Assistant Secretary, or a second Authorized Officer of Xxxxxx Xxx. The signature of any of these Persons on the Residual Certificates may be manual or facsimile. A Residual Certificate bearing the manual or facsimile signature of individuals who were at any time officers of Xxxxxx Mae shall bind Xxxxxx Xxx, notwithstanding that such individuals or any of them have ceased to hold such offices prior to the authentication and delivery of such Certificate or did not hold such offices at the date of such Certificate. At any time and from time to time after the execution and delivery of this Trust Agreement, Xxxxxx Mae may deliver Residual Certificates executed by Xxxxxx Xxx to the Certificate Registrar for authentication and the Certificate Registrar shall authenticate and make available such Certificates as provided in this Trust Agreement and not otherwise. No Residual Certificate shall be entitled to any benefit under this Trust Agreement or be valid for any purpose, unless there appears on such Residual Certificate a certificate of authentication substantially in the form provided for herein, executed by the Certificate Registrar by the manual or facsimile signature of one of its authorized signatories, and such certificate upon any Residual Certificate shall be conclusive evidence, and the only evidence, that such Residual Certificate has been duly authenticated and made available hereunder. Each Residual Certificate shall be dated the date of its authentication.

  • Breach of Authorized User Not Breach of Centralized Contract. An Authorized User’s breach shall not be deemed a breach of the Centralized Contract, rather it shall be deemed a breach of the Authorized User’s performance under the terms and conditions of the Centralized Contract.

  • Designation and Authorization 1. Each Party shall have the right to designate as many airlines as it wishes to conduct international air transportation in accordance with this Agreement and to withdraw or alter such designations. Such designations shall be transmitted to the other Party in writing through diplomatic channels, and shall identify whether the airline is authorized to conduct the type of air transportation specified in Annex I or in Annex II or both.

Time is Money Join Law Insider Premium to draft better contracts faster.