Customer Access to Data Sample Clauses

Customer Access to Data. Customer shall be permitted electronic access to Customer Data residing in the System at all times, except where limitations on access are required by security requirements, during a period of repair or maintenance of the Software or the Equipment, or at any time EasyHRweb has suspended or terminated Customer’s access to the System as permitted under this Agreement. Upon written request by Customer at any time and from time to time, or upon the termination or expiration of the Term, EasyHRweb shall return to Customer, at Customer’s expense, a copy of all electronic Customer Data in EasyHRweb’s then existing machine-readable formats and media types for the period of this contract. EasyHRweb shall also delete any Customer Data from the Equipment upon termination of this Agreement, except as necessary for EasyHRweb to perform any of its obligations under this Agreement.
AutoNDA by SimpleDocs
Customer Access to Data. Customers enrolled in the Demand Response Program may subscribe to the Energy Profiler Online (“EPO”) system through the Company’s Optional Interval Data Service. Through the EPO system, Customer will receive access to their electrical load data. If not already enrolled, Customers may enroll by completing and signing the “Energy Profiler Online Enrollment Form.”
Customer Access to Data. Customer shall be permitted electronic access to Customer Data residing in the System at all times, except where limitations on access are required by security requirements, during a period of repair or maintenance of the Software or the Equipment, or at any time BlueFinHR has suspended or terminated Customer’s access to the System as permitted under this Agreement. Upon written request by Customer at any time and from time to time, or upon the termination or expiration of the Term, BlueFinHR shall return to Customer, at Customer’s expense, a copy of all electronic Customer Data in BlueFinHR’s then existing machine-readable formats and media types for the period of this contract. BlueFinHR shall also delete any Customer Data from the Equipment upon termination of this Agreement, except as necessary for BlueFinHR to perform any of its obligations under this Agreement.

Related to Customer Access to Data

  • Customer Access The Customer is responsible for the access to the Cloud Services and is responsible for maintaining the confidentiality of its access methods such as usernames and passwords and agrees to notify the Supplier via the Cloud Services support channel if a password is compromised. The Customer is responsible for all activities that occur under its Account.

  • Access to Customer Data You agree that we may, for the purposes of providing Maintenance and Customer Support and/or for the purpose of otherwise protecting the integrity of the Software, access and/or download your Customer Data on a limited basis.

  • Access to Software Access Rights to Software which is Results shall comprise: Access to the Object Code; and, where normal use of such an Object Code requires an Application Programming Interface (hereafter API), Access to the Object Code and such an API; and, if a Party can show that the execution of its tasks under the Project or the Exploitation of its own Results is technically or legally impossible without Access to the Source Code, Access to the Source Code to the extent necessary. Background shall only be provided in Object Code unless otherwise agreed between the Parties concerned.

  • User Access Transfer Agent shall have a process to promptly disable access to Fund Data by any Transfer Agent personnel who no longer requires such access. Transfer Agent will also promptly remove access of Fund personnel upon receipt of notification from Fund.

  • Access to System If Business Associate needs access to a Covered Entity Information Technology system to comply with its obligations under the Contract or this Agreement, Business Associate shall request, review, and comply with any and all policies applicable to Covered Entity regarding such system including, but not limited to, any policies promulgated by the Office of Information Technology and available at xxxx://xxx.xxxxx.xx.xx/about/policies.

  • Access to Network Interface Device (NID 2.4.3.1. Due to the wide variety of NIDs utilized by BellSouth (based on subscriber size and environmental considerations), Mpower may access the on-premises wiring by any of the following means: BellSouth shall allow Mpower to connect its loops directly to BellSouth’s multi-line residential NID enclosures that have additional space and are not used by BellSouth or any other telecommunications carriers to provide service to the premise. Mpower agrees to install compatible protectors and test jacks and to maintain the protection system and equipment and to indemnify BellSouth pursuant to Section 8 of the General Terms and Conditions of this Agreement.

  • CUSTOMER SERVICE ACCESS The Competitive Supplier agrees to provide, or cause to be provided, certain customer services to Participating Consumers. Such services shall be reasonably accessible to all Participating Consumers, shall be available during normal working hours, shall allow Participating Consumers to transact business they may have with the Competitive Supplier, and shall serve as a communications liaison among the Competitive Supplier, the Town, and the Local Distributor. A toll-free telephone number will be established by Competitive Supplier and be available for Participating Consumers to contact Competitive Supplier during normal business hours (9:00 A.M. - 5:00 P.M. Eastern Standard Time, Monday through Friday) to resolve concerns, answer questions and transact business with respect to the service received from Competitive Supplier. The Town will post program-related information on the Town’s website which will be available to Participating Consumers for general information, product and service information, and other purposes.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage. Measures: • As part of the SAP Security Policy, Personal Data requires at least the same protection level as “confidential” information according to the SAP Information Classification standard. • Access to Personal Data is granted on a need-to-know basis. Personnel have access to the information that they require in order to fulfill their duty. SAP uses authorization concepts that document grant processes and assigned roles per account (user ID). All Customer Data is protected in accordance with the SAP Security Policy. • All production servers are operated in the Data Centers or in secure server rooms. Security measures that protect applications processing Personal Data are regularly checked. To this end, SAP conducts internal and external security checks and penetration tests on its IT systems. • SAP does not allow the installation of software that has not been approved by SAP. • An SAP security standard governs how data and data carriers are deleted or destroyed once they are no longer required.

  • FOREIGN ACCESS TO TECHNOLOGY This Article shall remain in effect during the term of the Agreement and for (INSERT NUMBER OF YEARS) ( ) years thereafter.

  • Data Access Access to Contract and State Data The Contractor shall provide to the Client Agency access to any data, as defined in Conn. Gen Stat. Sec. 4e-1, concerning the Contract and the Client Agency that are in the possession or control of the Contractor upon demand and shall provide the data to the Client Agency in a format prescribed by the Client Agency and the State Auditors of Public Accounts at no additional cost.

Time is Money Join Law Insider Premium to draft better contracts faster.