Computer System Access Sample Clauses

Computer System Access. The Service Provider will access the Computer System only in accordance with the BCLC Services Manual and will not modify, revise or otherwise change, or allow any other person to modify any aspect of the Computer System in any manner that would or would reasonably be expected to interfere with or compromise the systems, infrastructure, architecture, security, integrity, coding or functionality of the Computer System, any data residing on or being processed by the Computer System, or otherwise adversely impact the Corporation. Without limiting the foregoing, the Service Provider will ensure that: (a) access to the Computer System by the SP Systems is only through the network(s) and means specified in the BCLC Services Manual, and (b) the SP Systems will comply with the BCLC Services Manual. The Service Provider will comply with any testing, security, controls and production requirements as outlined in the BCLC Services Manual. The Service Provider will only remove Corporation Data from the Computer System as expressly permitted by the Corporation or the BCLC Services Manual, and in any event will segregate, physically and logically, all Corporation Data from its own data, including as required by the BCLC Services Manual. In the event of an Information Security Incident, the Service Provider will follow the procedure set out in the BCLC Services Manual.
AutoNDA by SimpleDocs
Computer System Access. 10.1 From time to time, White Cap may provide Supplier access to proprietary computer systems and technologies owned and operated by White Cap (the “Systems”) to facilitate e-commerce and business-to-business (B2B) transactions. The Systems are to be used only for the business purposes of White Cap. White Cap may periodically monitor all uses of the Systems as allowed by Xxx. Supplier’s users shall have no expectation of privacy when using the Systems. In order to receive such access, Supplier agrees to the following:
Computer System Access. 10.1 From time to time, White Cap may provide Supplier access to proprietary computer systems and technologies owned and operated by White Cap (the “Systems”) to facilitate e-commerce and business-to-business (B2B) transactions. The Systems are to be used only for the business purposes of White Cap. White Cap may periodically monitor all uses of the Systems as allowed by Law. Supplier’s users shall have no expectation of privacy when using the Systems. In order to receive such access, Supplier agrees to the following: White Cap hereby grants Supplier limited, non-transferable access to certain Systems as may be determined by White Cap from time to time in its sole discretion. Supplier accepts the liability of managing its users’ access to the Systems as outlined in this Section 10. Each employee or agent of Supplier having access to the Systems will: (i) be assigned a separate User ID by Supplier and will use only that ID when logging on to the Systems; (ii) log off the Systems immediately upon completion of each session of service; (iii) not allow unauthorized individuals to access the Systems; (iv) keep strictly confidential the User ID and password and all other information that enables such access; (v) not reuse a compromised password (e.g. a password that has become known to anyone else at any time, including in an emergency); (vi) only utilize such access to perform its obligations to White Cap; (vi) comply with White Cap’s encryption requirements or other service policies instituted by White Cap from time to time; (vii) not perform any unauthorized exploring or mining of the Systems; and (viii) only have access to the portion of the Systems necessary to perform Supplier’s obligations. Supplier is solely responsible for obtaining the hardware and software necessary to properly access the Systems. Supplier shall assign an individual working for Supplier that shall act as its Supplier Guardian Point of Contact (“SGPOC”). The SGPOC will be the security liaison between White Cap and Supplier and (i) oversee compliance with the requirements of this Section 10, (ii) manage Supplier’s access to the Systems by granting and removing individual user access and working with White Cap to resolve any Systems-related issues that may arise, (iii) receive notice of security breaches within Supplier’s organization, (iv) coordinate security breach incident response and remedial action, and (v) provide notice, reporting and work within Supplier to undertake other actio...
Computer System Access. (1) Bonded Web User shall access DMV’s databases only between the hours of 6:00 a.m. and 6:00 p.m. Pacific Standard Time Monday through Friday excluding California State approved holidays and furloughs. All other hours are prohibited. Updates can be completed periodically during normal working hours. There will be no technical support on weekends, furloughs, and state holidays.
Computer System Access. I acknowledge that "Computer System" means a computer, its software, related equipment and communications facilities (if any), and includes computer networks. Further, I acknowledge that any information obtained by access to a GS, Inc. Computer System shall be a part of GS, Inc. Confidential Information as defined herein, and that any access to a GS, Inc. Computer System other than in the course of my regularly assigned tasks as a consultant is unauthorized. I also acknowledge that any use of a GS, Inc. computer other than in respect to my services as a consultant is unauthorized.
Computer System Access 

Related to Computer System Access

  • Computer Systems (a) The Computer Systems adequately meet the data processing and other computing needs of the Business as presently conducted. The Computer Systems function, operate, process and compute in accordance with all Applicable Laws, industry standards and trade practices. The Computer Systems operate and perform in all material respects in accordance with their documentation and functional specifications. The Computer Systems have not materially malfunctioned or failed within the past three years.

  • Internet Access Data and information may be made electronically accessible to the Company through Internet access to one or more links provided by the Administrator or a sub-administrator (“Web Link”). All rights in Web Link (including text and “look and feel” attributes) are owned by the sub-administrator. Any commercial use of the content or any other aspect of Web Link requires the written permission of the sub-administrator. Use of the Web Link by the Company will be subject to any terms of use set forth on the web site. Web Link and the information (including text, graphics and functionality) in the Web Link is presented “As Is” and “As Available” without express or implied warranties including, but not limited to, implied warranties of non-infringement, merchantability and fitness for a particular purpose. The sub-administrator neither warrants that the Web Link will be uninterrupted or error free, nor guarantees the accessibility, reliability, performance, timeliness, sequence, or completeness of information provided on the Web Link.

  • Infrastructure (a) The Borrower has and will maintain a sufficient infrastructure to conduct its business as presently conducted and as contemplated to be conducted following its execution of this Agreement.

  • Computer Software The Grantee certifies that it has appropriate systems and controls in place to ensure that state funds will not be used in the performance of this Grant Agreement for the acquisition, operation, or maintenance of computer software in violation of copyright laws.

  • Site Access Dell requires the right to access the APEX System in a timely way and as provided in the Service Offering Description to provide the Support Services. Failure to ensure that Customer provides Dell with timely access to a Site will relieve Dell of the Support Services obligations and Dell may also, at Dell’s discretion, suspend the APEX Service.

  • User Access Transfer Agent shall have a process to promptly disable access to Fund Data by any Transfer Agent personnel who no longer requires such access. Transfer Agent will also promptly remove access of Fund personnel upon receipt of notification from Fund.

  • Hardware and Software Requirements In order to access and retain Disclosures electronically, you must satisfy the following computer hardware and software requirements: access to the Internet; an email account and related software capable of receiving email through the Internet; a web browser which is SSL-compliant and supports secure sessions, and hardware capable of running this software.

  • Sprinkler System If there now is or shall be installed in the Building a "sprinkler system", and such system or any of its appliances shall be damaged or injured or not in proper working order by reason of any act or omission of Tenant, Tenant's agents, servants, employees, licensees or visitors, Tenant shall forthwith restore the same to good working condition at its own expense; and if the New York Board of Fire Underwriters or the New York Fire Insurance Rating Organization or any bureau, department or official of the state or city government, shall require or recommend that any changes, modifications, alterations or additional sprinkler heads or other equipment be made or supplied by reason of Tenant's business, or the location of the partitions, trade fixtures, or other contents of the Premises, Tenant shall, at Tenant's expense, promptly make and supply such changes, modifications, alterations, additional sprinkler heads or other equipment.

Time is Money Join Law Insider Premium to draft better contracts faster.