Third Party Access. If, to the extent permitted by Section 4.10, you grant express permission to a Regulated Third Party to access or connect to your Coinbase Account(s), either through the Regulated Third Party's product or service or through the Site, you acknowledge that granting permission to a Regulated Third Party to take specific actions on your behalf does not relieve you of any of your responsibilities under this Agreement. You are fully responsible for all acts or omissions of any Regulated Third Party with access to your Coinbase Account(s) and any action of such Regulated Third Party shall be considered to be an action authorised by you. Further, you acknowledge and agree that you will not hold Coinbase responsible for, and will indemnify Coinbase from, any liability arising out of or related to any act or omission of any Regulated Third Party with access to your Coinbase Account(s). You may change or remove permissions granted by you to a Regulated Third Party with respect to your Coinbase Account(s) at any time through the tabs on the ‘Settings’ page on the Site.
Third Party Access. Customer may allow its Authorized Users and Affiliates to use the Technology and access the Services solely for Customer’s internal business purposes, provided that (i) Customer ensures its Authorized Users and Affiliates comply with the terms of this Agreement and (ii) Customer shall be liable towards UiPath as if their acts and omissions would have been Customer’s own. Upon request, Customer will provide UiPath with details and use reports of all Authorized Users and Affiliates having received access to the Technology.
Third Party Access. 6.1 You can instruct a TPP to access information on your Account or initiate certain Transactions from your Account provided such TPP has identified itself to us and it has acted in accordance with the relevant regulatory requirements. We will treat any instruction from an TPP as if it was from you or an Account Manager.
Third Party Access. Outside Entity shall obtain the written approval of UC Health prior to allowing any agent or subcontractor access to PHI that is acquired from UC Health, through the System or otherwise, or created or received on behalf of the UC Health. The Outside Entity understands that the UC Health Study Coordinator will request approval and account setup for such agent or subcontractor. Upon approval, which shall be in UC Health’s sole discretion, the UC Health Study Coordinator will release access for such agent or subcontractor to the EMR records through EpicCare Link. In the event that UC Health consents to such third party access on a case-by-case basis (which consent shall be in UC Health’s sole discretion), Outside Entity shall ensure that the agent or subcontractor agrees to be bound by the same restrictions, terms and conditions that apply to Outside Entity through this Agreement. Without limiting the foregoing, Outside Entity shall require that any agent or subcontractor notify Outside Entity of any instances in which PHI is used or disclosed in an unauthorized manner. Once Outside Entity receives the aforementioned notice, Outside Entity shall take steps to cure the breach of confidentiality and end the violation or shall terminate the agency, agreement, arrangement, or subcontract.
Third Party Access. 2.1.1 Zone File Access Agreement. XxXXX will enter into an agreement with any Internet user, which will allow such user to access an Internet host server or servers designated by XxXXX and download zone file data. The agreement will be standardized, facilitated and administered by a XxXXX Centralized Zone Data Access Provider, which may be cxDA or an cxDA designee (the “CZDA Provider”). XxXXX (optionally through the CZDA Provider) will provide access to zone file data per Section 2.1.3 of this Specification and do so using the file format described in Section 2.1.4 of this Specification. Notwithstanding the foregoing, (a) the CZDA Provider may reject the request for access of any user that does not satisfy the credentialing requirements in Section 2.1.2 below; (b) XxXXX may reject the request for access of any user that does not provide correct or legitimate credentials under Section 2.1.2 below or where XxXXX reasonably believes will violate the terms of Section 2.1.5. below; and, (c) XxXXX may revoke access of any user if XxXXX has evidence to support that the user has violated the terms of Section 2.1.5 below.
Third Party Access. Each party to this Agreement (each, a “Contracting Party”) shall be and remain fully responsible and liable for all actions and omissions by any third party using or accessing ITWS through or on behalf of such Contracting Party (including through the use of any applicable identification numbers, passwords, or other access keys or credentials in the possession of the Contracting Party, or under any unique identifiers assigned to such Contracting Party with respect to ITWS), including without limitation any third party agent or service provider permitted, directed, and/or authorized by such Contracting Party to access and/or act through or upon ITWS with respect to any Accounts or Orders. Any such third party shall be bound by the terms and conditions of this Agreement applicable to the Contracting Party, and any failure by such third party to comply with the terms of this Agreement shall constitute a breach of this Agreement by the Contracting Party. The Contracting Party shall be liable for such third parties’ compliance with the terms of this Agreement to the same extent as if the Contracting Party itself had acted or failed to act instead of the third party.
Third Party Access. Subject to the terms and conditions of this Service Schedule, you have the non-exclusive right to authorize access to DiaLinx Services to your employees and/or to any third party (including the right to sell such DiaLinx Service). You agree that if you offer DiaLinx Service other than to your bona fide employees, you will do so only pursuant to a binding agreement incorporating terms substantially similar to those stated in Section 14 (Mandatory Flow-down Terms) of this Service Schedule.
Third Party Access. You may allow Your Users to access and use the Tools solely for Your internal business purposes, provided that (i) You ensure that Your Users comply with the terms of this Agreement, and (ii) You are liable towards Us as if their acts and omissions would have been Your own. Upon reasonable request, You will provide Us with information about, and use reports of, Your Users.
Third Party Access. To the extent Customer permits or authorizes any third-party to access, interface with, or otherwise engage with the Products in any respect (“Third Party Access”), Customer assumes complete responsibility for any liability arising out or in connection with such Third Party Access. This includes but is not limited to any claims arising out of or in connection with breaches of data security measures arising from such Third Party Access that affect Customer Data. Customer shall defend, indemnify, and hold harmless Nextep and its Affiliates from and against any claims, actions or demands, losses, liabilities, including, without limitation all reasonable attorney’s fees and costs, made by any third party arising from or relating to such Third Party Access.