Granting Access Clause Samples

The Granting Access clause defines the conditions under which one party is permitted to enter, use, or otherwise access certain property, information, or systems belonging to another party. Typically, this clause outlines the scope of access, any limitations or restrictions, and the duration for which access is granted; for example, it may specify that access is only allowed during business hours or for specific purposes such as inspections or maintenance. Its core practical function is to clearly establish the rights and boundaries of access, thereby preventing unauthorized use and reducing the risk of disputes over entry or usage.
Granting Access. To obtain access via VPN, the Agency and Authorized Party must be sponsored by a party currently employed at Collin County and IT must agree this access is needed for the Collin County information systems. The Agency and Authorized Party must sign this form agreeing to protect the security of the Collin County network. For external Authorized Parties, the Request for VPN Access must be signed and approved by the Manager who is responsible for the external Authorized Party’s use. VPN expiration will be based on the contract length unless further time is requested by Collin County Management. The initial setup and testing will be performed during normal operating hours, Monday – Friday, 8 am – 5 pm, and requires a minimal of two weeksnotice to schedule.
Granting Access. To obtain access via REMOTE ACCESS, the Agency and Authorized Party must be sponsored by a party currently employed at Collin County and IT must agree this access is needed for the Collin County information systems. The Agency and Authorized Party must sign this form agreeing to protect the security of the Collin County network. For external Authorized Parties, the Request for REMOTE ACCESS must be signed and approved by the Manager who is responsible for the external Authorized Party’s use. REMOTE ACCESS expiration will be based on the contract length unless further time is requested by Collin County Management. The initial setup and testing will be performed during normal operating hours, Monday – Friday, 8 am – 5 pm, and requires a minimal of two weeksnotice to schedule.
Granting Access. (a) The Vendor acknowledges that access to the System is granted for the exclusive convenience of the House and may be denied or withdrawn at will by the CAO, with or without cause. (b) If the CAO i s not satisfied with the Vendor's performance, the CAO may terminate the Agreement, pursuant to Section 9. (c) Ifthe Vendor fails to (i) comply with this Agreement , (ii) comply with the policies, rules and regulations of the House, or (iii) take the necessary action to ensure future performance in compliance with any of the foregoing, the CAO may, in addition to any other remedies specified elsewhere herein or available under applicable law, the CAO may revoke Vendor's access to the House information network; or may delay or deny a request for payment for any services to the House (or an office of the House) until the applicable issue is remedied. (d) In the event that the CAO denies or withdraws access to the System (or terminates this Agreement), the CAO will promptly notify the Vendor by email or by any other communication method set forth in Section 4(a). If appropriate, the CAO will notify the Vendor of the cause and what the Vendor may do to remedy the situation.
Granting Access. 2.1 Following receipt: (a) of a fully completed Data Request Form; (b) confirmation from all Co-Investigators that they agree to the Co-Investigator Access Terms and Conditions (found here: insert URL). Instructions will be emailed to your Co- Investigators who will be required to read and confirm acceptance of the Co-Investigator Access Terms and Conditions; and (c) any other information the University requests from you to allow the University to consider your request for access to the Data (i.e., further information regarding data management), the University will use reasonable endeavours to provide you with a decision regarding the outcome of your Data Request Form within three (3) weeks, however you acknowledge this may be longer period. 2.2 The University may deny a request under a Data Request Form for the following reasons:‌ (a) you intend for the Data to be used for any purpose that is not for research or teaching; (b) you intend (or the University believe you may intend) to use the Data for a commercial purpose; (c) you are not a researcher with an ORCID; (d) the University has previously granted access to the Data for a research project that is the same or substantially similar to your intended Approved Research; (e) you are not affiliated to a university or research institute; (f) the request form is incomplete or incorrect; (g) the University considers (in its reasonable opinion) that the Data being requested does not align with the Approved Research; or (h) the University considers (in its reasonable opinion) that your information provided around data management is insufficient or unsatisfactory. 2.3 Clause 2.2 is not intended to limit the reasons that the University may deny a request under a Data Request Form and you acknowledge the University retains the right to grant or deny any request in its sole and absolute discretion. 2.4 Following consideration of your Data Request Form, the University will: (a) send you Data Access Approval via email; or (b) notify you via email that it has declined your request for data. 2.5 If you receive Data Access Approval, you will be emailed confirmation that you and the Co- Investigators have been granted access to the Data, and the University will make the Data available for download via your EMOTE account.
Granting Access a. That upon execution of the contract, the contractor will provide the Contract Manager a list of all contractor’s employees or subcontractor staff that will require access to Department facilities, confidential or sensitive information, or information systems. The list should include the following information: • Name, telephone number, email address, work location, access desired, justification, and the effective date of the desired access for each person listed. b. That any time during the life of the contract, the contractor may submit a request for additional contractor’s employees or subcontractor staff to be granted access to Department facilities, confidential or sensitive information, or information systems. The list should include the same information listed in above. c. That resources and facilities to which specific authorized access may be requested include but are not limited to: • Office Buildings, • Restricted Rooms within Office Buildings, • Restricted Data, • Department Intranet, • Department Network, and • Data Management Systems such as FLORIDA, CAMS and SUNTAX. d. Upon receipt of the list, the Department Contract Manager will determine the appropriateness of each access request and work with the contractor to have the appropriate accesses granted. e. That contractor’s employees and subcontractor staff may be required to sign Department or other agency security forms to gain access. Additionally, they may be required to view security videos, take on-line or instructor-led training, and review Department policies. f. That access will not be granted to contractors’ employees and subcontractor staff until criminal history record check results have been received and deemed satisfactory by the Department. g. That contractor’s employees and subcontractor staff must not share user names, passwords, or security devices for access to Department information resources or facilities. The Department will terminate access and may initiate other contractual remedies if sharing occurs.
Granting Access