Systems Access Sample Clauses

Systems Access. To the extent that a Party and/or its Affiliates is given access to the computer systems, infrastructure, databases, software, facilities, or networks of the other Party or any Third-Party Provider (“Systems”) in connection with the performance or receipt of Services hereunder, such access shall be limited to access in connection with performance or receipt, as applicable, of such Services. Each Party shall cause its personnel and any personnel of its Affiliates with such access to comply with the system security policies, standards, procedures and requirements of the other Party or any Third-Party Provider, as reasonably revised from time to time, with regard to the Systems or in any applicable license agreement or lease agreement in effect with regard to the Systems (the “Security Regulations”), and will not tamper with, compromise or circumvent any security or audit measures employed by the other Party or any Third-Party Provider, as applicable; provided, in either case, that such Party has prior notice of the applicable Security Regulations or security or audit measures.
AutoNDA by SimpleDocs
Systems Access. Altruist shall make available to Advisor and assist it in the use of the Advisor Dashboard and the Client Dashboard according to the Master Software License
Systems Access. UNI shall provide Bank (i) with access to copies of all documentation authenticated by Loan Applicants and Borrowers, including the information needed for Bank to underwrite and approve Loan Applications pursuant to the Program Guidelines and (ii) such daily settlement reports, including reports noting the Loan Applications ready for underwriting and a summary report of Loans to be funded to satisfy the commercially reasonable information requirements of Bank, Regulatory Authorities and Bank’s internal and external auditors. Without limiting the foregoing, upon confirmation that Bank has successfully established an automated process to obtain relevant Loan and Program information with at least two other similarly situated counterparties, UNI shall cooperate with Bank to establish and maintain an automated accounting and loan tracking system to accurately reflect all Loan Applications, Loans and related information regarding the Program to satisfy the commercially reasonable information requirements of Bank, Regulatory Authorities and Bank’s internal and external auditors
Systems Access. If XYZ grants Vendor the right to access the XYZ’s online tools allowing for the electronic presentment of certain Confidential Information (“System”) that XYZ makes available to provide up-to-date information on Program participation and related information, the following conditions apply: The System, and any documentation with respect to the System, shall be treated as Confidential Information as defined in this Agreement and subject to the same confidentiality restrictions contained herein. Any content, tools, or other materials appearing on the System are the intellectual property of XYZ and/or its licensors and may not be copied, reproduced, licensed, or sold by Vendor. Further, access to the System shall not be construed as conferring any license of XYZ’s or its licensors intellectual property rights. Vendor agrees not to modify, alter , or deface any trademarks, service marks, or other intellectual property of XYZ made available through the System. Vendor further agrees not to adapt, translate, modify, decompile, disassemble, or reverse engineer the System or any software or programs used in connection with the System. XYZ will assign a User ID and password to each Vendor user (a “User”). Users may not disclose or otherwise make User IDs or passwords available to any third party. If a User ceases to be a User for any reason, including a change in roles within Vendor’s organization or termination of employment, or the User otherwise discloses his or her intent to resign, Vendor shall notify XYZ within two (2) business days so that XYZ can disable the applicable User ID and password. Vendor is responsible for any and all breaches of security relating to the use of a User’s User ID and password until XYZ has disabled that User ID and password. Vendor also agrees to comply with XYZ’s security measures which XYZ will notify Vendor of in writing with respect to Vendor’s access and use of the System. If there is a breach or suspected breach of a User ID or password, Vendor and/or the User must notify XYZ immediately by telephone and promptly follow up with a notice in writing sent via email. Vendor shall maintain reasonable and appropriate security procedures to prevent unauthorized access to Confidential Information in its office(s) or system(s). Further, such procedures shall comply with data security standards that may be imposed by the Privacy and Security Rules of HIPAA, as well as all other applicable laws and regulations. XYZ reservices the right to...
Systems Access. To the extent that a Party and/or its Affiliates will be given access to the computer system(s), infrastructure, databases, software, facilities or networks of the other Party or of any third-party provider (“Systems”), such access shall be limited to access reasonably required in connection with performance or receipt of the Services. Each Party shall cause its personnel and any personnel of its Affiliates with such access to comply with the system security policies, standards, procedures and requirements of the other Party or any third-party provider, as reasonably revised from time to time, with regard to the Systems or in any applicable license agreement or lease agreement in effect with regard to the Systems (the “Security Regulations”), and will not tamper with, compromise or circumvent any security or audit measures employed by the other Party or any third-party provider, as applicable; provided, in either case, that such Party has prior notice of the applicable Security Regulations or security or audit measures.
Systems Access. 1. When an employee is on a leave of absence, Beacon may take necessary action to temporarily disable network and systems access of the employee. Beacon will reinstate the employee’s network and systems access upon the employee’s return to active work.
Systems Access. Smarsh will follow the principle of “least privilege” when granting access to Smarsh systems. Smarsh will enforce complex password requirements across all Smarsh systems to minimize password-related access control risks. Smarsh will utilize multi-factor authentication when feasible. Xxxxxx’x information security policies will prohibit Smarsh employees from sharing, writing down, emailing, IM’ing or storing passwords unencrypted on any Smarsh system (including desktops).
AutoNDA by SimpleDocs
Systems Access. 5.1 The Company will provide any of the Services through dedicated systems (“Systems Access”) which shall be used for 1) terminal access(es) for electronic trading, transmission of the Client’s orders; 2) monitoring the activity and positions in the Client’s account(s) and 3) receipt of reports, extracts, confirmations and other messages 4) provision of software and communication links necessary for access. Systems Access may be a proprietary service offered by the Company or a third party system offered by another broker, vendor or exchange. The Client may use the software solely for the Client’s own internal business purposes. 5. Системный доступ 5.1 Компания будет предоставлять любую из Услуг через специальные системы («Системный Доступ»), которые должны использоваться для 1) доступа(-ов) на терминалы для электронной торговли, передачи поручений Клиента; 2) мониторинга деятельности и позиций на счете(-ах) Клиента, 3) получения отчетов, выписок, подтверждений, любых иных сообщений, и 4) предоставления необходимых для доступа коммуникационных и электронных линий. Системный Доступ может быть частной услугой, предлагаемой Компанией, или сторонней системой, предлагаемой другим брокером, продавцом, или биржей. Клиент может использовать программное обеспечение исключительно для своих собственных внутренних целей.
Systems Access. 5.1. The Company will provide any of the Services through dedicated systems (“Systems Access”) which shall be used for
Systems Access. 7.1 We may provide any of the Services through a dedicated system ("Systems Access") provided by any electronic means of communication or telecommunications system, whether provided directly by ourselves or through a third party vendor. Where we do so, these Terms shall continue to apply but shall be supplemented to the extent of any additional terms and conditions specifically expressed to apply to such arrangements.
Time is Money Join Law Insider Premium to draft better contracts faster.