Access and Use of Systems Sample Clauses

Access and Use of Systems. You warrant that no individual will be allowed access to the Services in the absence of proper supervision and safeguards and agree to maintain the confidentiality of any Security Procedures or related instructions provided by us in connection with the Services. If you, at any time, have reason to believe or suspect that any such information or instructions have been compromised or disclosed to or accessed by any unauthorized person or used in a manner not authorized by you, you shall notify us immediately by telephone, and shall follow such notification with written confirmation. The occurrence of unauthorized access will not affect any transactions executed in good faith by us prior to receipt of such notification and for a reasonable time thereafter.
AutoNDA by SimpleDocs
Access and Use of Systems. You warrant that no individual will be allowed access to the Services in the absence of proper supervision and safeguards and agree to maintain the confidentiality of any Security Procedures or related instructions provided by us in connection with the Services. If you, at any time, have reason to believe or suspect that any such information or instructions have been compromised or disclosed to or accessed by any unauthorized person or used in a manner not authorized by you, you shall notify us immediately by telephone, and shall follow such notification with written confirmation. The occurrence of unauthorized access will not affect any transactions executed in good faith by us prior to receipt of such notification and for a reasonable time thereafter. E-mail Phishing. We will never contact you via email and ask you for your account number or Login Credentials. You acknowledge that certain viruses may be delivered via e-mail and are typically disguised as appearing from legitimate sources (such as us). You agree to protect yourself against e-mail fraud and to educate yourself, all Authorized Users and, in the case of Business Customers, your employees, officers, directors, agents, managers, and partners, as applicable, of the risks of such e-mail fraud. If you receive an e-mail or other electronic communication that you believe is fraudulent, do not open it, click any link within it, or respond to it. You agree to assume all risk related to any e-mail that you receive or open. Technical (Hardware and Software) Requirements. In order to access the Services, your computer, handheld device or other device (each, a "Device") must meet certain minimum hardware and software requirements. We may require the use or activation of specific applications, Internet browser software features, plug-ins and add-ons, such as JavaScript support and "cookies," in order to utilize the Services. Failure to meet such requirements may disable your access to the Services. You agree that we may place cookies and other identifiers on the computers and handheld devices used to access the Services. Cookies help us confirm your identity and help us keep your transactions secure when you utilize the Services. We also use cookies for various purposes such as maintaining continuity during an online session, gathering data about your use of the Services and other websites, and optimizing the performance of the Website. We may also acquire information concerning the computers and Devices you use to...

Related to Access and Use of Systems

  • Access and Use 1. Each Party shall ensure that enterprises of the other Party have access to and use of any public telecommunications network or service, including leased circuits, offered in its territory or across its borders on a timely basis and on terms and conditions that are reasonable and non-discriminatory such as those set out in paragraphs 2 to 6.

  • Installation and Use Rights You may install and use any number of copies of the software on your devices.

  • Access to and Use of Content Customer has the right to access and use applicable Content subject to the terms of applicable Order Forms, this Agreement and the Documentation.

  • Use of Software Any software that is available on the Services ("Software") is the copyrighted work of Red Hat and/or its licensors. Copying or reproducing the Software to any other server or location for further reproduction or redistribution is strictly prohibited, unless such reproduction or redistribution is permitted by a license agreement accompanying such Software. You may not create derivative works of the Software, or attempt to decompile or reverse-engineer the Software unless otherwise permitted by law. Use of the Software is subject to the license terms of any license agreement that may accompany or is provided with the Software. You may not download any Software until you have read and accepted the terms of the accompanying software license. WITHOUT LIMITING THE FOREGOING, THE SOFTWARE IS WARRANTED, IF AT ALL, ONLY ACCORDING TO THE TERMS OF THE SEPARATE LICENSE AGREEMENT ACCOMPANYING THE SOFTWARE. EXCEPT AS WARRANTED IN SUCH LICENSE AGREEMENT, RED HAT, ITS PARENT, SUBSIDIARY, AND AFFILIATE COMPANIES, AND ITS LICENSORS DISCLAIM ALL WARRANTIES AND CONDITIONS WITH REGARD TO THE SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT, TO THE MAXIMUM EXTENT PERMITTED BY LAW.

  • Use of School Equipment The Association shall have the right to use school facilities and equipment, including duplicating equipment, calculating machines, computers and printers and all types of audiovisual equipment at reasonable times, when such equipment is not otherwise in use.

  • Allocation and use of scarce resources Any procedures for the allocation and use of scarce resources, including frequencies, numbers and rights of way, will be carried out in an objective, timely, transparent and non-discriminatory manner. The current state of allocated frequency bands will be made publicly available, but detailed identification of frequencies allocated for specific government uses is not required.

  • Access to Software Access Rights to Software which is Results shall comprise: Access to the Object Code; and, where normal use of such an Object Code requires an Application Programming Interface (hereafter API), Access to the Object Code and such an API; and, if a Party can show that the execution of its tasks under the Project or the Exploitation of its own Results is technically or legally impossible without Access to the Source Code, Access to the Source Code to the extent necessary. Background shall only be provided in Object Code unless otherwise agreed between the Parties concerned.

  • Access Rights for implementation Access Rights to Results and Background Needed for the performance of the own work of a Party under the Project shall be granted on a royalty-free basis, unless otherwise agreed for Background in Attachment 1.

  • Access to Work Locations Reasonable access to employee work locations shall be granted officers of the Association and their officially designated representatives for the purpose of processing grievances or contacting members of the Association concerning business within the scope of representation. Such officers or representatives shall not enter any work location without the consent of the City Manager. Access shall be restricted so as not to interfere with the normal operations of the department or with established safety or security requirements. Solicitation of membership and activities concerned with the internal management of the Association, such as collecting dues, holding membership meetings, campaigning for office, conducting elections and distributing literature, shall not be conducted during working hours.

  • Installation and Use You may install and use the Software only for the number of licenses acquired by you. In order to exercise your rights to the Software under this Agreement, you must activate your copy of the Software in the manner described during the launch sequence.

Time is Money Join Law Insider Premium to draft better contracts faster.