Access to Systems Sample Clauses

Access to Systems. Agency authorizes Axon to access Agency’s relevant computers, network systems, and CAD or RMS solely for performing Auto-Tagging Services. Axon will work diligently to identify as soon as reasonably practicable resources and information Axon expects to use and will provide an initial list to Agency. Agency is responsible for and assumes the risk of any problems, delays, losses, claims, or expenses resulting from the content, accuracy, completeness, and consistency of all data, materials, and information supplied by Agency.
AutoNDA by SimpleDocs
Access to Systems. (a) Without limitation of this Article 4, Confidential Information of NewCo includes all employee, customer and user data, software (including source and object code), technology, documentation, and other information and materials residing on NewCo’s networks and systems to which MCK may have access in connection with receiving the Services described in the Service Schedule (the “NewCo Systems”). MCK will comply with all policies and procedures of NewCo in connection with any access to or use of any NewCo Systems. MCK will not (i) render any NewCo Systems unusable or inoperable, or otherwise interfere with or impede NewCo’s or its Affiliates’ use of or access to any NewCo Systems; (ii) take possession of or exclude NewCo or its Affiliates from any NewCo Systems; or (iii) otherwise impede or interfere with NewCo’s or its Affiliates’, or their employees’, customers’ or end users’, businesses. MCK will not access or use or attempt to access or use any NewCo Systems, or any information or materials residing on any NewCo Systems, except to the extent expressly authorized in writing by NewCo or expressly required to receive the Services described in the Service Schedule. Without limitation of the foregoing, MCK will cease all access to and use of the NewCo Systems and any information or materials residing on any NewCo Systems immediately upon expiration or termination of the Services described in the Service Schedule.
Access to Systems. The Provider must provide information technology systems to Access and use the Department’s IT Systems and to carry out its other obligations under this Agreement that meet the requirements set out in this clause 164. Third Party Systems The Provider must: advise the Department of any Third Party System that the Provider proposes to interface with the Department’s IT Systems and if the Department imposes any terms and conditions in respect of such use, comply with those terms and conditions; ensure that any Third Party System it uses: meets the minimum requirements of the Department for entry to the Department’s IT Systems, and for record keeping and program assurance purposes, as advised by the Department; does not negatively impact the performance, availability or data integrity of the Department’s IT Systems; is built and assessed to meet the accreditation requirements of the Department of Jobs and Small Business; does not introduce or permit the introduction of Harmful Code into the Department’s IT Systems; has secure logons for each operator such that each operator’s logon is identifiable to the Department and entries are traceable, and have date and time stamps; does not default answers to questions or input fields where the Department’s IT Systems has no default setting; and ensure that Records held in any Third Party System relating to the Services can be, and are, provided on request, to the Department and in an unadulterated form, i.e. with no amendment to the Records. The Department: may make changes to the Department’s IT Systems at any time, notwithstanding that such changes may affect the functioning of a Third Party System; and will provide reasonable information about those changes to the Provider; and the Provider: must, notwithstanding any such change, at its sole cost, ensure that all Third Party Systems operate in a manner that is consistent with the Department’s IT System at all times; and agrees that the Department is not responsible for any loss, costs or legal liability of the Provider arising from such changes. System accreditation Subject to the Statement of Applicability (‘SOA’), the Provider must, and must ensure that its Subcontractors: obtain accreditation for any Third Party System in accordance with the requirements and timeframes set out in the SOA and bear any costs associated with doing so; and maintain such accreditation for the duration of the Agreement Term. Where the Provider modifies a Third Party System, it must ens...
Access to Systems. 23 11. RELOCATION............................................................24 11.1. Relocation..........................................................24 11.2. Cost of Relocation..................................................24 11.3. Updated As-Built Drawings...........................................24
Access to Systems. Customer authorizes Axon to access Customer’s relevant computers, network systems, and CAD or RMS solely for performing Auto-Tagging Services. Axon will work diligently to identify the resources and information Axon expects to use and will provide an initial list to Customer. Customer is responsible for and assumes the risk of any problems, delays, losses, claims, or expenses resulting from the content, accuracy, completeness, and consistency of all data, materials, and information supplied by Customer.
Access to Systems. WinStar shall not access any physical part of any System Segment (other than pursuant to the Fiber Collocation Provisions) without the prior written consent of Xxxxxxxx, and then only upon the terms and conditions specified by Xxxxxxxx.
AutoNDA by SimpleDocs
Access to Systems. If any Party has been provided access (either on-site or remotely) to any other Party’s electronic information systems and records in connection with the Services, such Party shall limit such access solely to the use of such systems and records for purposes of the provision or receipt of the Services and shall not access, or attempt to access, the other Parties’ electronic information systems or records other than as may be agreed to by such Parties to the extent required for the provision or receipt of Services or those that are publicly available (e.g., public websites). Each Party shall limit such access to those of its employees, agents and representatives that have a bona fide need for such access in connection with the Services. Each Party shall follow, and shall cause all of its applicable employees, agents and representatives to follow, all of the other Parties’ security rules and procedures when accessing such Parties’ systems. All user identification numbers and passwords disclosed by a Party to any other Party and any information obtained by a Party as a result of such Party’s access to and use of any other Party’s computer systems shall be deemed to be, and treated as, Confidential Information of such other Party. Each Party shall cooperate in the investigation of any apparent unauthorized access to any electronic information system or records of any Party.
Access to Systems. During the Transition Period, if either Party is given access to the other Party’s information technology infrastructure, including network and other equipment, proprietary and third party software, electronic files, and databases (collectively, “Systems”) in connection with the Services, such Party shall access and use, and cause its Affiliates to access and use, the other Party's Systems solely in accordance with this Agreement and, without limiting the foregoing, solely as necessary to provide or receive the Services, as applicable. Each Party shall limit, and cause its Affiliates to limit, access to the Systems to employees (and, with the other Party’s consent, to contractors) of such Party and its Affiliates who the other Party has approved in writing (such approval not to be unreasonably withheld or delayed; provided that ADS may deny access to any individual whom ADS reasonably and good faith believes is not adequately trained to use the Systems) to access the Systems and who have a specific requirement to have such access in connection with this Agreement. All access to the Systems and any portion thereof shall be through secured controlled processes agreed by the Parties prior to any such access and shall be subject to information technology, data security, acceptable use and other policies applicable to the access or use of such Systems and each Party shall comply with all such policies, in each case, to the extent such policies have been provided to the other Party in writing prior to the date of such access. The Providing Party shall be excused from the performance of a Service or portion thereof to the extent the Receiving Party’s or its Affiliates’ policies applicable to its or their Systems prevent the performance of such Service or portion thereof but only to the extent such policies differ from policies that were applicable during the Baseline Period; provided, however, that the Parties will cooperate in good faith to make alternative arrangements and the Providing Party’s obligation with respect to the applicable Service shall be to provide as much of the benefit of the applicable Service as is reasonably practicable in compliance with the Receiving Party’s or its Affiliates’ policies applicable to its or their Systems. Each Party shall cooperate, and cause its Affiliates to cooperate, with the other Party in the investigation of any apparent unauthorized access to any Systems by employees, contractors or other personnel of such Party or ...
Access to Systems. During the period beginning on the initial Closing Date and ending thirty (30) days after the Commitment Period, the Transferor shall give the Administrative Agent and the Lender and their duly authorized representatives, attorneys and auditors, upon reasonable request of the Administrative Agent, on-site access to the Transferor’s loan tracking systems and document repository, which access shall facilitate quality assurance and quality control reviews, enable the Administrative Agent and the Lenders to back-up Receivables Files to the their respective systems, to enable them to review Receivables tracking processes, procedures, approvals and boarding and permit them with reasonable access to the Transferor’s quality reporting and backup documentation (e.g., workpapers, sampled transactions and account-level results). Promptly following the end of each calendar month during the period beginning on the initial Closing Date and ending thirty (30) days after the Commitment Period, the Transferor shall, at the reasonable request of the Administrative Agent, provide the Administrative Agent and the Lenders with screenshots that would enable them to complete the foregoing review on a sample of Receivables determined by the Administrative Agent (limited to one hundred (100) Receivables in any calendar week.
Time is Money Join Law Insider Premium to draft better contracts faster.