Type of Access Sample Clauses

Type of Access. SUBSCRIBER desires access to the following information:
AutoNDA by SimpleDocs
Type of Access. The various types of Data Exporter end user access are documented in the Administrator Guide and are controlled by Data Exporter administrators through Active Directory. End user access can also be added importing CSV files or manually entering through the user interface.
Type of Access. The various types of customer end user access are documented in the Administrator Guide and are controlled by customer administrators through the service dashboard or user interface.
Type of Access. TA-uc if trans-national access with access costs declared on the basis of unit cost, TA-ac if trans-national access with access costs declared as actual costs, and XX-xx if trans-national access with access costs declared as a combination of actual costs and costs on the basis of unit cost, VA-uc if virtual access with access costs declared on the basis of unit cost, VA-ac if virtual access with access costs declared as actual costs, and VA-cb if virtual access with access costs declared as a combination of actual costs and costs on the basis of unit cost.
Type of Access. Subscriber, an attorney duly licensed in the State of Texas, desires to access certain records, data, and files held by the Clerks’ offices by using an internet or web connection. Xxxxxxx County has agreed to allow authorized Subscriber’s access to such information. The type of records and files which will be accessible to Subscriber on a password-restricted basis include civil and criminal judicial case files.
Type of Access. The district’s Acceptable Use Policy will govern all use of the district computer network and systems (including the Internet). All users will be required to sign an agreement for access to the Internet. Students will have access to the internet through the district computer network. The district will offer three levels of Internet use:
Type of Access. Online access to raw data is encouraged upon mutual agreement between participating agencies. Such access shall incorporate appropriate site security, access security provisions as required by both agencies, required identification and passwords and level of access provisions as determined by the system administrators of the participating agencies. Measures will be in accordance with the Computer Security Act of 1987.
AutoNDA by SimpleDocs
Type of Access. Access to the Property may be by foot or motor -------------- vehicle, including trucks and equipment. Lessor shall provide Lessee with appropriate security devices to provide Lessee with access to the Property. Lessee acknowledges that the foregoing access rights are subject to any limitations or restrictions on access imposed upon Lessor (and therefore upon Lessee) by the document or documents evidencing Lessor's underlying real estate interest including any ground lease or master lease relating to a particular Site, which shall be provided to Lessee by Lessor together with the SLA. Lessee agrees to indemnify Lessor for claims of liability by Lessor or a third party, and for any losses or damages sustained by Lessor as a result of Lessee's activities at the Property, including but not limited to any curtailment or interruption of its operations at a Site. Only authorized engineers, employees or contractors of Lessee will be permitted access. Lessee may retain ownership of all equipment and appurtenances installed by Lessee at a Site so long as the removal of such personalty will not affect the structural integrity of any portion of the communications facility.
Type of Access. NCTC personnel may be provided account-based access to the datasets of other entitiesdata providers that may contain or may contain terrorism information either directly or through role-based accounts. (hereinafter “Track 1” access).
Type of Access. NCTC may provide the owner of a dataset that may contains or that may contain terrorism information with query terms-either singly or in batches-consisting of terrorism datapoints so that a search of the dataset may be run (hereinafter “Track 2” access).
Time is Money Join Law Insider Premium to draft better contracts faster.