Suspending access Sample Clauses

Suspending access. Without limiting any other right or remedy available to the Supplier, the Supplier may re- strict or suspend the Subscriber’s access to the SaaS Service where the Subscriber (including any of its personnel):
AutoNDA by SimpleDocs
Suspending access. Without limiting any other right or remedy available to the Supplier, the Supplier may restrict or suspend the Client's access to the SaaS Service where the Client (including any of its personnel) or one or more of its Permitted Users: a undermines, or attempts to undermine, the security or integrity of the SaaS Service or any Underlying Systems; b uses, or attempts to use, the SaaS Service: i for improper purposes; or ii in a manner, other than for normal operational purposes, that materially reduces the operational performance of the SaaS Service; or c has otherwise materially breached the Agreement (in the Supplier's reasonable opinion).
Suspending access. Without limiting any other right or remedy available to the Supplier, the Supplier may restrict or suspend the Client’s access to the Datch Service where the Client (including any of its personnel):
Suspending access. Without limiting any other right or remedy available to CySEP, CySEP may restrict or suspend your access to the SaaS Service where you (including any of its personnel): a undermines, or attempts to undermine, the security or integrity of the SaaS Service or any Underlying Systems; b uses, or attempts to use, the SaaS Service: i for improper purposes; or ii in a manner, other than for normal operational purposes, that materially reduces the operational performance of the SaaS Service; or c has otherwise materially breached these Terms of Service (in CySEP’s reasonable opinion).
Suspending access. Without limiting any other right or remedy available to the Supplier, the Supplier may restrict the Client’s access to the SaaS Service where the Client (including any of its personnel):
Suspending access. Without limiting any other right or remedy available to us, we may restrict or suspend your access to the Geneious Subscription Services where you (including any of your Personnel):
Suspending access. Without limiting any other right or remedy available to us, we may restrict or suspend your access to the Geneious Subscription Services where you (including any of your Personnel): a undermine, or attempt to undermine, the security or integrity of the Geneious Subscription Services or any Underlying Systems; b use, or attempt to use, the Geneious Subscription Services or the Geneious Software: i for improper purposes; or ii in a manner, other than for normal operational purposes, that materially reduces the operational performance of the Geneious Subscription Services; or c have otherwise materially breached this Agreement (in our reasonable opinion).
AutoNDA by SimpleDocs

Related to Suspending access

  • Exceptional Access to Thick Registration Data In case of a registrar failure, deaccreditation, court order, etc. that prompts the temporary or definitive transfer of its domain names to another registrar, at the request of ICANN, Registry Operator will provide ICANN with up-­‐to-­‐date data for the domain names of the losing registrar. The data will be provided in the format specified in Specification 2 for Data Escrow. The file will only contain data related to the domain names of the losing registrar. Registry Operator will provide the data as soon as commercially practicable, but in no event later than five (5) calendar days following ICANN’s request. Unless otherwise agreed by Registry Operator and ICANN, the file will be made available for download by ICANN in the same manner as the data specified in Section 3.1 of this Specification.

  • Open Access Same-Time Information System (OASIS): The information system and standards of conduct contained in Part 37 and Part 38 of the Commission’s regulations and all additional requirements implemented by subsequent Commission orders dealing with OASIS.

  • System Access CUSTOMER agrees to provide to PROVIDER, at CUSTOMER’S expense, necessary access to the mainframe computer and related information technology systems (the “System”) on which CUSTOMER data is processed during the times (the “Service Hours”) specified in the PSAs, subject to reasonable downtime for utility outages, maintenance, performance difficulties and the like. In the event of a change in the Service Hours, CUSTOMER will provide PROVIDER with at least fifteen (15) calendar days written notice of such change.

  • ICANN Access Registry Operator shall provide bulk access to the zone files for the TLD to ICANN or its designee on a continuous basis in the manner ICANN may reasonably specify from time to time. Access will be provided at least daily. Zone files will include SRS data committed as close as possible to 00:00:00 UTC.

  • Facility Access Notwithstanding any other provision of the Agreement, the Customer shall provide the Authority with such access to the Facility, and such documentation, as the Authority deems necessary to determine the Customer’s compliance with the Customer’s Supplemental Commitments specified in this Schedule B.

  • Site Access Dell requires the right to access the APEX System in a timely way and as provided in the Service Offering Description to provide the Support Services. Failure to ensure that Customer provides Dell with timely access to a Site will relieve Dell of the Support Services obligations and Dell may also, at Dell’s discretion, suspend the APEX Service.

  • Unbundled Loop Modifications (Line Conditioning 2.5.1 Line Conditioning is defined as routine network modification that BellSouth regularly undertakes to provide xDSL services to its own customers. This may include the removal of any device, from a copper Loop or copper Sub-loop that may diminish the capability of the Loop or Sub-loop to deliver high-speed switched wireline telecommunications capability, including xDSL service. Such devices include, but are not limited to, load coils, excessive bridged taps, low pass filters, and range extenders. Excessive bridged taps are bridged taps that serves no network design purpose and that are beyond the limits set according to industry standards and/or the XxxxXxxxx XX 00000.

  • EU Access SAP will use only European Subprocessors to provide support requiring access to Personal Data in the Cloud Service and SAP shall not export Personal Data outside of the EEA or Switzerland unless expressly authorized by Customer in writing (e-mail permitted) on a case by case basis; or as excluded under Section 9.4.

  • Information Access Each Party (“Disclosing Party”) shall make available to another Party (“Requesting Party”) information that is in the possession of the Disclosing Party and is necessary in order for the Requesting Party to: (i) verify the costs incurred by the Disclosing Party for which the Requesting Party is responsible under this Agreement; and (ii) carry out its obligations and responsibilities under this Agreement. The Parties shall not use such information for purposes other than those set forth in this Article 25.1 of this Agreement and to enforce their rights under this Agreement.

  • General Access BCA agrees to provide Agency with access to the Minnesota Criminal Justice Data Communications Network (CJDN) and those systems and tools which the Agency is authorized by law to access via the CJDN for the purposes outlined in Minn. Stat. § 299C.46.

Time is Money Join Law Insider Premium to draft better contracts faster.