Contractor Access to Data Sample Clauses

Contractor Access to Data. The Contractor shall not copy or transfer Data unless authorized by the Authorized User. In such an event the Data shall be copied and/or transferred in accordance with the provisions of this Section. Contractor shall not access any Data for any purpose other than fulfilling the service. Contractor is prohibited from Data Mining, cross tabulating, monitoring Authorized User’s Data usage and/or access, or performing any other Data Analytics other than those required within the Authorized User Agreement. At no time shall any Data or processes (e.g. workflow, applications, etc.), which either are owned or used by the Authorized User be copied, disclosed, or retained by the Contractor or any party related to the Contractor. Contractors are allowed to perform industry standard back-ups of Data. Documentation of back-up must be provided to the Authorized User upon request. Contractor must comply with any and all security requirements within the Authorized User Agreement.
AutoNDA by SimpleDocs
Contractor Access to Data. The Contractor shall not copy or transfer Data unless authorized by SBOE. In such an event the Data shall be copied and/or transferred in accordance with the provisions of this Section. Contractor shall not access any Data for anypurpose other than fulfilling the service. Contractor is prohibited from Data Mining, cross tabulating, monitoring SBOE’s Data usage and/or access, or performing any other Data analytics other than those required within the This Agreement. At no time shall any Data or processes (e.g. workflow, applications, etc.), which either are owned or usedby SBOE be copied, disclosed, or retained by the Contractor or any party related to the Contractor. Contractors are allowed to perform industry standard back-ups of Data. Documentation of back-up must be provided toSBOE upon request. Contractor must comply with any and all security requirements within this Agreement.
Contractor Access to Data. The Contractor shall not copy or transfer Data unless authorized by the Authorized User. In such an event, the Data shall be copied and/or transferred in accordance with the provisions of this Section. Contractor shall not access any Data for any purpose other than fulfilling the service. Contractor is prohibited from Data Mining, cross tabulating, monitoring Authorized User’s Data usage and/or access, or performing any other Data analytics other than those agreed to within the Authorized User Agreement. At time of RFQ response, a Contractor shall identify its monitoring practices for the Authorized User’s written acceptance, which includes but is not limited to those that will monitor the Authorized User’s usage to facilitate system maintenance, service, fixes, and other such solution functionality-based services. Unless otherwise agreed to in an Authorized User Agreement, at no time shall any Data or processes (e.g. workflow, applications, etc.), which either are owned or used by the Authorized User, be copied, disclosed, or retained by the Contractor or any party related to the Contractor. Contractors are allowed to perform industry standard back-ups of Data. Documentation of back-ups must be provided to the Authorized User upon request. Contractor must comply with any and all security requirements within the Authorized User Agreement.
Contractor Access to Data. The Contractor shall not copy or transfer Personally Identifiable Data unless authorized by the Authorized User. In such an event the Personally Identifiable Data shall be copied and/or transferred in accordance with the provisions of this Section. Contractor shall not access any Personally Identifiable Data for any purpose other than fulfilling Network Services. Contractor is prohibited from utilizing Personally Identifiable Data for the purposes of Data Mining, cross tabulating, monitoring EVSE usage and/or access, or performing any other Data analytics other than those required within the Authorized User Agreement. At no time shall any Data or processes (e.g. workflow, applications, etc.), which either are owned or used by the Authorized User be copied, disclosed, or retained by the Contractor or any party related to the Contractor. Contractors may use Data that has been anonymized to exclude Personally Identifiable Data to perform industry standard back-ups of Data, and to perform analytics on the Data for the purposes of optimizing and improving Contractor’s EVSE infrastructure, including but not limited to, understanding and predicting usage patterns for improving station availability, smart charging and load management. . Documentation of back-up, and the Data anonymization process utilized by the Contractor, must be provided to the Authorized User upon request. Contractor must comply with any and all security requirements within the Authorized User Agreement.

Related to Contractor Access to Data

  • Access to Data Operator shall make Data in the possession of the Operator available to the LEA within five (5) business days of a request by the LEA.

  • Access to NID 2.17.3.1 TWTC may access the customer’s premises wiring by any of the following means and TWTC shall not disturb the existing form of electrical protection and shall maintain the physical integrity of the NID:

  • Access to Services Subject to and in accordance with the terms of this Agreement, including any Schedules, Company grants You a non-exclusive, non-sublicensable, nontransferable, non-assignable, revocable license for the term of this Agreement to access and use the Services. Services may only be used by Your Users for internal business purposes only. You agree to comply with the terms and conditions of this Agreement, including any Schedules, and with all applicable Company procedures and policies that further define use of the Services. You acknowledge and agree that the actions of any of Your Users with respect to the Services will be deemed to be actions by You and that any breach by any of Your Users of the terms of this Agreement, including any Schedule, will be deemed to be a breach by You.

  • Specific Provisions for Access Rights to Software For the avoidance of doubt, the general provisions for Access Rights provided for in this Section 9 are applicable also to Software. Parties’ Access Rights to Software do not include any right to receive source code or object code ported to a certain hardware platform or any right to receive respective Software documentation in any particular form or detail, but only as available from the Party granting the Access Rights.

  • Access to Site 3.05.1 Contractor may enter and leave the premises at all reasonable times without charge. Contractor and its employees may use the common areas and roadways of the premises where it is to perform the services together with all facilities, equipment, improvements, and services provided in connection with the premises for common use. This excludes parking for Contractor’s personnel. Contractor shall repair any damage caused by it or its employees as a result of its use of the common areas.

  • Access to PHI Business Associate shall provide access to PHI in a Designated Record Set to Covered Entity or as directed by Covered Entity to an Individual to meet the requirements under 45 CFR § 164.524. Business Associate shall provide such access in the time and manner reasonably designated by Covered Entity. Within three (3) business days, Business Associate shall forward to Covered Entity for handling any request for access to PHI that Business Associate directly receives from an Individual.

  • Payroll Records Contractors and Subcontractors must keep original payrolls or transcripts subscribed and affirmed as true under the penalties of perjury as required by law. For public works contracts over $25,000 where the Contractor maintains no regular place of business in New York State, such records must be kept at the work site. For building services contracts, such records must be kept at the work site while work is being performed.

Time is Money Join Law Insider Premium to draft better contracts faster.