Common use of IP Addresses Clause in Contracts

IP Addresses. Authorized Users shall be identified and authenticated by the use of Internet Protocol (“IP”) addresses provided by Licensee to Licensor. The use of proxy servers is authorized as long as any proxy server IP addresses provided limit remote or off-campus access to Authorized Users. Authorized IP Addresses are listed in Appendix C. An updated list will be sent to Licensor on an annual or as needed basis. Licensee and Licensor shall cooperate in the implementation of new authentication protocols and procedures (such as Shibboleth) as they are developed during the term of this Agreement.

Appears in 12 contracts

Samples: License Agreement, Standard License Agreement, Standard License Agreement

AutoNDA by SimpleDocs

IP Addresses. Authorized Users shall be identified and authenticated by the use of Internet Protocol (“IP”) addresses provided by Licensee to Licensor. The use of proxy servers is authorized as long as any proxy server IP addresses provided limit remote or off-campus access to Authorized Users. Authorized IP Addresses are listed in Appendix C. An updated list will be sent to Licensor on an annual or as needed basisbasis without the need to amend this Agreement. Licensee and Licensor shall cooperate in the implementation of new authentication protocols and procedures (such as Shibboleth) as they are developed during the term of this Agreement.

Appears in 4 contracts

Samples: License Agreement, License Agreement, License Agreement

IP Addresses. Authorized Users shall be identified and authenticated by the use of Internet Protocol (“IP”) addresses provided by Licensee to Licensor. The use of proxy servers is authorized as long as any proxy server IP addresses provided limit remote or off-campus access to Authorized Users. Authorized IP Addresses are listed in Appendix C. An updated list will be sent to Licensor on an annual or as needed basis. Licensee and Licensor shall cooperate in the implementation of new authentication protocols and procedures (such as Shibboleth) as they are developed during the term of this Agreement.Appendix

Appears in 2 contracts

Samples: Standard License Agreement, Standard License Agreement

IP Addresses. Authorized Users shall be identified and authenticated by the use of Internet Protocol (“IP”) addresses provided by Licensee to Licensor. The use of proxy servers is authorized as long as any proxy server IP addresses provided limit remote or off-campus access to Authorized Users. Authorized IP Addresses are listed in Appendix C. An updated list will be sent to Licensor on an annual or as needed basis. Licensee and Licensor shall cooperate in the implementation of new authentication protocols and procedures (such as Shibboleth) as they are developed during the term of this Agreement.

Appears in 2 contracts

Samples: License Agreement, License Agreement

IP Addresses. Authorized Users shall be identified and authenticated by the use of Internet Protocol (“IP”) addresses provided by Licensee to LicensorDistributor. The use of proxy servers is authorized as long as any proxy server IP addresses provided limit remote or off-campus access to Authorized Users. Authorized IP Addresses are listed in Appendix C. An updated list will be sent to Licensor Distributor on an annual or as needed basis. Licensee and Licensor Distributor shall cooperate in the implementation of new authentication protocols and procedures (such as Shibboleth) as they are developed during the term of this Agreement.

Appears in 1 contract

Samples: Standard License Agreement

IP Addresses. Authorized Users shall be identified and authenticated by the use of Internet Protocol (“IP”) addresses provided by Licensee to Licensor. The use of proxy servers is authorized as long as any proxy server IP addresses provided limit remote or off-campus access to Authorized Users. Authorized IP Addresses are listed in Appendix C. An updated list will be sent to Licensor on an annual or as needed basis. Licensee and Licensor shall cooperate in the implementation of new authentication protocols and procedures (such as Shibboleth) as they are developed during the term Term of this Agreement.

Appears in 1 contract

Samples: License Agreement

AutoNDA by SimpleDocs

IP Addresses. Authorized Users shall be identified and authenticated by the use of Internet Protocol (“IP”) addresses provided by Licensee to Licensor. The use of proxy servers is authorized as long as any proxy server IP addresses provided limit limited remote or off-campus access to Authorized Users, and not Walk-In Users. Authorized IP Addresses are listed in Appendix C. An updated list will be sent to Licensor on an annual or as needed basis. Licensee and Licensor shall cooperate in the implementation of new Shibboleth authentication protocols and procedures (such as Shibboleth) as they are developed during the term of this Agreement.

Appears in 1 contract

Samples: License Agreement

IP Addresses. Authorized Users shall be identified and authenticated by the use of Internet Protocol (“IP”) addresses provided by Licensee to Licensor. The use of proxy servers is authorized as long as any proxy server IP addresses provided limit remote or off-campus access to Authorized Users. Authorized IP Addresses are listed in Appendix C. An updated list will be sent to Licensor on an annual or as needed basisbasis without the need to amend this agreement. Licensee and Licensor shall cooperate in the implementation of new authentication protocols and procedures (such as Shibboleth) as they are developed during the term of this Agreement.

Appears in 1 contract

Samples: License Agreement

IP Addresses. Authorized Users shall be identified and authenticated by the use of Internet Protocol (“IP”) addresses provided by Licensee to Licensor. The use of proxy servers is authorized as long as any proxy server IP addresses provided limit remote or off-campus access to Authorized Users. Authorized IP Addresses are listed in Appendix C. An updated list will be sent to Licensor on an annual or as needed basis. Licensee and Licensor shall cooperate in basis without the implementation of new authentication protocols and procedures (such as Shibboleth) as they are developed during the term of need to amend this Agreement.

Appears in 1 contract

Samples: License Agreement

Time is Money Join Law Insider Premium to draft better contracts faster.