Data: Access and Ownership Sample Clauses

Data: Access and Ownership a. Access to Contract and State Data. The Contractor shall provide to the Client Agency access to any data, as defined in Conn. Gen Stat. Sec. 4e-1, concerning the Contract and the Client Agency that are in the possession or control of the Contractor upon demand and shall provide the data to the Client Agency in a format prescribed by the Client Agency and the State Auditors of Public Accounts at no additional cost.
AutoNDA by SimpleDocs
Data: Access and Ownership. The Scientific Services data are intended for use by registered researchers only and the database administrator (DBA) has the right to withhold data from any person or body in accordance with the SA Promotion of Access to Information Act, 2000. All data collected and captured by SANParks registered researchers and staff belong jointly to the researcher and to SANParks. SANParks reserves the right to demand that the data user returns the data to SANParks and destroys all other copies. Data Categories Data provided by Scientific Services fall into one or more of the categories below:
Data: Access and Ownership. (a) Provider grants Owner access to BloomConnect and all the data available therein regarding any and all Facilities in the Portfolio (the “Portfolio Data”).
Data: Access and Ownership. All use and traffic data concerning all Policyholders or Leads collected by ChannelPoint through the Service, including but not limited to impression data, usage summaries and click through activity collected by ChannelPoint ("IMPRESSION DATA") shall be the sole and exclusive property of GEFA. ChannelPoint shall be entitled to capture and collect Impression Data in its operation of the Commerce Exchange and the hosting of the Branded Portals and ChannelPoint may use Impression Data concerning Policyholders or Leads in any aggregate form that does not identify any particular Policyholder for any lawful purpose without a duty of accounting to GEFA . ChannelPoint will, at no charge to GEFA, provide GEFA with access to (in a format and frequency mutually agreed to by ChannelPoint and GEFA) all Impression Data and other Policyholder information collected by ChannelPoint in connection with the generation of quotes or proposals for a Policyholder or the enrollment of any Policyholder. ChannelPoint will, at no charge to GEFA, provide GEFA with monthly reports of Impression Data collected by ChannelPoint in connection with uses of the Service other than on behalf of Policyholders on an aggregated basis ("REPORTS") that are (a) ChannelPoint standard or generally available reports or (b) other Reports that ChannelPoint provides to other customers at no charge that are not unique or proprietary to such customers. ChannelPoint will use commercially reasonable efforts to provide other special Reports requested by GEFA from time-to-time in consideration of a service fee equal to ChannelPoint's fully burdened costs in creating and providing such Reports. All Reports provided by ChannelPoint hereunder shall not (i) identify any particular individual, broker, agent or insurance carrier, (ii) violate ChannelPoint's privacy policy or any applicable law or regulation or (iii) violate the terms of any agreement between ChannelPoint and any third party; provided that ChannelPoint will not enter into agreements with third parties exclusively preventing GEFA from receiving data generated through through the Commerce Exchange.

Related to Data: Access and Ownership

  • Data Ownership BA acknowledges that BA has no ownership rights with respect to the Protected Information.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage. Measures: • As part of the SAP Security Policy, Personal Data requires at least the same protection level as “confidential” information according to the SAP Information Classification standard. • Access to Personal Data is granted on a need-to-know basis. Personnel have access to the information that they require in order to fulfill their duty. SAP uses authorization concepts that document grant processes and assigned roles per account (user ID). All Customer Data is protected in accordance with the SAP Security Policy. • All production servers are operated in the Data Centers or in secure server rooms. Security measures that protect applications processing Personal Data are regularly checked. To this end, SAP conducts internal and external security checks and penetration tests on its IT systems. • SAP does not allow the installation of software that has not been approved by SAP. • An SAP security standard governs how data and data carriers are deleted or destroyed once they are no longer required.

  • Data Access Access to Contract and State Data The Contractor shall provide to the Client Agency access to any data, as defined in Conn. Gen Stat. Sec. 4e-1, concerning the Contract and the Client Agency that are in the possession or control of the Contractor upon demand and shall provide the data to the Client Agency in a format prescribed by the Client Agency and the State Auditors of Public Accounts at no additional cost.

  • Data Access Services State Street agrees to make available to the Fund the Data Access Services subject to the terms and conditions of this Addendum and such data access operating standards and procedures as may be issued by State Street from time to time. The Fund shall be able to access the System to (i) originate electronic instructions to State Street in order to (a) effect the transfer or movement of cash or securities held under custody by State Street or (b) transmit accounting or other information (the transactions described in (i)(a) and (i)(b) above are referred to herein as “Client Originated Electronic Financial Instructions”), and (ii) access data for the purpose of reporting and analysis, which shall all be deemed to be Data Access Services for purposes of this Addendum.

  • License and Ownership 1.1 Pursuant to the terms and conditions specified in this Agreement, Starfish hereby grants to Customer, and Customer hereby accepts from Starfish, a nontransferable, nonexclusive right and license to use the software (the “Solution”) identified in the Ordering Document during the Term (as defined in Section 2.1) for Customer’s own internal business purposes.

  • Data Access and Proprietary Information 6.1 The Fund acknowledges that the databases, computer programs, screen formats, report formats, interactive design techniques, and documentation manuals furnished to the Fund by the Transfer Agent as part of the Fund’s ability to access certain Fund Confidential Information maintained by the Transfer Agent on databases under the control and ownership of the Transfer Agent or other third party (“Data Access Services”) constitute copyrighted, trade secret, or other proprietary information of substantial value to the Transfer Agent or other third party (collectively, “Transfer Agent Proprietary Information”). In no event shall Transfer Agent Proprietary Information be deemed Fund Confidential Information. The Fund agrees to treat all Transfer Agent Proprietary Information as proprietary to the Transfer Agent and further agrees that it shall not divulge any Transfer Agent Proprietary Information to any person or organization except as may be provided hereunder. Without limiting the foregoing, the Fund agrees for itself and its employees and agents to:

  • System and Data Access Services a.System. Subject to the terms and conditions of this Addendum and solely for the purpose of providing access to Fund Data as set forth herein, State Street hereby agrees to provide the Fund, or certain third parties approved by State Street that serve as the Fund`s investment advisors, investment managers or fund accountants (the "Fund Accountants") or as the Fund`s independent auditors (the "Auditor"), with access to State Street`s Multicurrency HORIZONR Accounting System and the other information systems described in Attachment A (collectively, the "System") on a remote basis solely on the computer hardware, system software and telecommunication links described in Attachment B (the "Designated Configuration") or on any designated substitute or back-up equipment configuration consented to in writing by State Street, such consent not to be unreasonably withheld.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization. Measures: • Multiple authorization levels are used when granting access to sensitive systems, including those storing and processing Personal Data. Authorizations are managed via defined processes according to the SAP Security Policy • All personnel access SAP’s systems with a unique identifier (user ID). • SAP has procedures in place so that requested authorization changes are implemented only in accordance with the SAP Security Policy (for example, no rights are granted without authorization). In case personnel leaves the company, their access rights are revoked. • SAP has established a password policy that prohibits the sharing of passwords, governs responses to password disclosure, and requires passwords to be changed on a regular basis and default passwords to be altered. Personalized user IDs are assigned for authentication. All passwords must fulfill defined minimum requirements and are stored in encrypted form. In the case of domain passwords, the system forces a password change every six months in compliance with the requirements for complex passwords. Each computer has a password-protected screensaver. • The company network is protected from the public network by firewalls. • SAP uses up–to-date antivirus software at access points to the company network (for e-mail accounts), as well as on all file servers and all workstations. • Security patch management is implemented to provide regular and periodic deployment of relevant security updates. Full remote access to SAP’s corporate network and critical infrastructure is protected by strong authentication.

  • Customer Ownership Customer owns and has sole responsibility for the accuracy, quality, integrity, and appropriateness of all original data, content and information provided to Xxxxxx Xxxxxxx in conjunction with the Services, and, when paid for, Customer will own all modified content and information as specified under the SOW (collectively the “Content,” which, together with the Customer’s trademarks or logos, are referred to as the “Customer Material).”

  • Risk and Ownership C14.1 Subject to clause C13 above, risk in the Goods shall, without prejudice to any other rights or remedies of the Authority (including the Authority’s rights and remedies under clause C16 below) pass to the Authority when delivery is completed to the Authority’s reasonable satisfaction.

Time is Money Join Law Insider Premium to draft better contracts faster.