Computer System Access Sample Clauses

Computer System Access. (1) Bonded Web User shall access DMV’s databases only between the hours of 6:00 a.m. and 6:00 p.m. Pacific Standard Time Monday through Friday excluding California State approved holidays and furloughs. All other hours are prohibited. Updates can be completed periodically during normal working hours. There will be no technical support on weekends, furloughs, and state holidays.
AutoNDA by SimpleDocs
Computer System Access. The Service Provider will access the Computer System only in accordance with the BCLC Services Manual and will not modify, revise or otherwise change, or allow any other person to modify any aspect of the Computer System in any manner that would or would reasonably be expected to interfere with or compromise the systems, infrastructure, architecture, security, integrity, coding or functionality of the Computer System, any data residing on or being processed by the Computer System, or otherwise adversely impact the Corporation. Without limiting the foregoing, the Service Provider will ensure that: (a) access to the Computer System by the SP Systems is only through the network(s) and means specified in the BCLC Services Manual, and (b) the SP Systems will comply with the BCLC Services Manual. The Service Provider will comply with any testing, security, controls and production requirements as outlined in the BCLC Services Manual. The Service Provider will only remove Corporation Data from the Computer System as expressly permitted by the Corporation or the BCLC Services Manual, and in any event will segregate, physically and logically, all Corporation Data from its own data, including as required by the BCLC Services Manual. In the event of an Information Security Incident, the Service Provider will follow the procedure set out in the BCLC Services Manual.
Computer System Access. I acknowledge that "Computer System" means a computer, its software, related equipment and communications facilities (if any), and includes computer networks. Further, I acknowledge that any information obtained by access to a GS, Inc. Computer System shall be a part of GS, Inc. Confidential Information as defined herein, and that any access to a GS, Inc. Computer System other than in the course of my regularly assigned tasks as a consultant is unauthorized. I also acknowledge that any use of a GS, Inc. computer other than in respect to my services as a consultant is unauthorized.
Computer System Access. 10.1 From time to time, White Cap may provide Supplier access to proprietary computer systems and technologies owned and operated by White Cap (the “Systems”) to facilitate e-commerce and business-to-business (B2B) transactions. The Systems are to be used only for the business purposes of White Cap. White Cap may periodically monitor all uses of the Systems as allowed by Xxx. Supplier’s users shall have no expectation of privacy when using the Systems. In order to receive such access, Supplier agrees to the following:
Computer System Access. 10.1 From time to time, White Cap may provide Supplier access to proprietary computer systems and technologies owned and operated by White Cap (the “Systems”) to facilitate e-commerce and business-to-business (B2B) transactions. The Systems are to be used only for the business purposes of White Cap. White Cap may periodically monitor all uses of the Systems as allowed by Law. Supplier’s users shall have no expectation of privacy when using the Systems. In order to receive such access, Supplier agrees to the following: White Cap hereby grants Supplier limited, non-transferable access to certain Systems as may be determined by White Cap from time to time in its sole discretion. Supplier accepts the liability of managing its users’ access to the Systems as outlined in this Section 10. Each employee or agent of Supplier having access to the Systems will: (i) be assigned a separate User ID by Supplier and will use only that ID when logging on to the Systems; (ii) log off the Systems immediately upon completion of each session of service; (iii) not allow unauthorized individuals to access the Systems; (iv) keep strictly confidential the User ID and password and all other information that enables such access; (v) not reuse a compromised password (e.g. a password that has become known to anyone else at any time, including in an emergency); (vi) only utilize such access to perform its obligations to White Cap; (vi) comply with White Cap’s encryption requirements or other service policies instituted by White Cap from time to time; (vii) not perform any unauthorized exploring or mining of the Systems; and (viii) only have access to the portion of the Systems necessary to perform Supplier’s obligations. Supplier is solely responsible for obtaining the hardware and software necessary to properly access the Systems. Supplier shall assign an individual working for Supplier that shall act as its Supplier Guardian Point of Contact (“SGPOC”). The SGPOC will be the security liaison between White Cap and Supplier and (i) oversee compliance with the requirements of this Section 10, (ii) manage Supplier’s access to the Systems by granting and removing individual user access and working with White Cap to resolve any Systems-related issues that may arise, (iii) receive notice of security breaches within Supplier’s organization, (iv) coordinate security breach incident response and remedial action, and (v) provide notice, reporting and work within Supplier to undertake other actio...
Computer System Access 

Related to Computer System Access

  • System Access CUSTOMER agrees to provide to PROVIDER, at CUSTOMER’S expense, necessary access to the mainframe computer and related information technology systems (the “System”) on which CUSTOMER data is processed during the times (the “Service Hours”) specified in the PSAs, subject to reasonable downtime for utility outages, maintenance, performance difficulties and the like. In the event of a change in the Service Hours, CUSTOMER will provide PROVIDER with at least fifteen (15) calendar days written notice of such change.

  • Computer Systems (a) Servicer to operate systems The Servicer shall operate and maintain systems capable of providing data processing, management information and other related information technology requirements to enable it to carry out the Services.

  • Computer Access Where possible, providing no additional costs are incurred by the Employer, one (1) authorized representative of each Union shall be entitled to submit for posting on the Employer's electronic communication system one electronic Union notice per month for members of the bargaining unit. The Employer shall determine the method of distribution. The Employer shall review all proposed notices and retain a discretion not to post any notice that it deems unlawful or contrary to the Employer’s interests, which discretion shall not be unreasonably exercised. The Union agrees to indemnify the Employer for any liability arising out of offensive or otherwise unlawful notices posted by the Union. Nothing in this Article requires a change to distribution practices that existed prior to April 1, 2015.

  • Internet Access Data and information may be made electronically accessible to the Company through Internet access to one or more links provided by the Administrator or a sub-administrator (“Web Link”). All rights in Web Link (including text and “look and feel” attributes) are owned by the sub-administrator. Any commercial use of the content or any other aspect of Web Link requires the written permission of the sub-administrator. Use of the Web Link by the Company will be subject to any terms of use set forth on the web site. Web Link and the information (including text, graphics and functionality) in the Web Link is presented “As Is” and “As Available” without express or implied warranties including, but not limited to, implied warranties of non-infringement, merchantability and fitness for a particular purpose. The sub-administrator neither warrants that the Web Link will be uninterrupted or error free, nor guarantees the accessibility, reliability, performance, timeliness, sequence, or completeness of information provided on the Web Link.

  • Infrastructure (a) The Borrower has and will maintain a sufficient infrastructure to conduct its business as presently conducted and as contemplated to be conducted following its execution of this Agreement.

  • Network Access TENANT may find it necessary to purchase a network interface card, wireless PC card or other hardware in order to connect to the internet service. LANDLORD is not responsible for the purchase of these items and LANDLORD cannot guarantee compatibility with any device TENANT may have. The computer and network card must have software installed that supports the Internet Protocol commonly referred to as TCP/IP. Any conflicts between the software compatibility of the network and the TENANT’S computer operating system or any other feature will be the responsibility of the TENANT to resolve. LANDLORD will not be responsible for software issues related to the user’s personal computer.

  • System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.

  • Computer Software The Grantee certifies that it has appropriate systems and controls in place to ensure that state funds will not be used in the performance of this Grant Agreement for the acquisition, operation, or maintenance of computer software in violation of copyright laws.

  • Site Access Dell requires the right to access the APEX System in a timely way and as provided in the Service Offering Description to provide the Support Services. Failure to ensure that Customer provides Dell with timely access to a Site will relieve Dell of the Support Services obligations and Dell may also, at Dell’s discretion, suspend the APEX Service.

  • Server Software Subject to the terms and conditions of this XXXX, Vocera grants you the non-exclusive right to (i) install and run (“Use”) the Server Software on computer systems (each, a “Server Computer”) located at End User’s Facilities in the geographic territory designated above (“Territory”); (ii) to Use the Client Software in conjunction with Authorized Client Devices and such Server Computers; and (iii) for pilot licenses for certain Software provided on a trial basis, use such Software for the limited term specified by Vocera in writing. You may Use the standard Server Software on one primary Server Computer (or a primary cluster of computers suitably configured for productive use of the Server Software). You may install backup copies of the Server Software on backup Server Computers to provide redundancy in the event of failure of the primary Server Computer(s) but, unless you have acquired additional licenses or a failover license from Vocera, you may not run such backup or additional copies concurrently with the primary copies. Vocera grants you the right to use the applicable License Key issued by Vocera only to enable Use of the Server Software in conjunction with the licensed Server Computers. Server Software may be licensed for a Subscription Term as specified in the Quote.

Time is Money Join Law Insider Premium to draft better contracts faster.