Sponsored Access Sample Clauses

Sponsored Access. If You are a licensed provider, you may request Physician Gateway access for certain members of your office staff who require such access in order for You to provide Treatment to patients currently under your care. By making a request for access by a member of your office staff: (i) You acknowledge and agree that You are sponsoring the access for such staff and will ensure that each member of the staff complies with all terms and conditions of this Agreement; and (ii) You represent and warrant to Partners that such office staff member requires access to Physician Gateway in order for You to provide Treatment to patients currently under your care. You will notify Partners in advance of your termination of the employment (or other similar work relationship) of any office staff member with sponsored access to Physician Gateway and notify Partners immediately upon the resignation of any office staff member so that Partners may terminate Physician Gateway access for such individual. If You are a licensed physician, you may also request temporary sponsored access for another physician who is also an authorized user of Physician Gateway in order to provide Treatment to patients currently under your care during certain temporary situations where you are unavailable (such as vacations and temporary leaves of absence). All requests for sponsored access remain subject to the written approval of such request by Partners in its sole and absolute discretion, registration of such sponsored user with Physician Gateway, and acceptance of the terms of this Agreement by such user. You acknowledge and agree that You are and shall remain responsible for the actions of any of your sponsored users. COMPLIANCE WITH LAWS You shall comply in all material respects with all Federal, state and local laws, rules and regulations and JCAHO accreditation standards, including, without limitation, the standards for privacy of individually identifiable health information under HIPAA and HITECH and the standards for the protection of Personal Information under the MA Data Security Standards.
AutoNDA by SimpleDocs
Sponsored Access. It is the same as Direct Market Access, provided that the Client does not use the Bank’s infrastructure but rather route its Orders to the Third-party Provider using the Bank’s Access Code. Under applicable law, the controls for Sponsored Access applied by the Third-party Provider (not the Bank as the Bank’s infrastructure is not used) must be at least equivalent to those for Direct Market Access, including applying the Bank’s usual pre-trade controls to the trading flow such as setting appropriate trading limits and credit thresholds. Naked or unfiltered access to a Third-party System is prohibited under applicable law.
Sponsored Access. Where a Client uses Instinet for sponsored access at an Execution Venue, the Client shall be required to sign an additional addendum to this Agreement as is required by Instinet and/or the relevant Execution Venue and provide any such additional information as is requested by them. For the avoidance of doubt, Instinet retains responsibility for a Client usi ng sponsored access under Applicable Rules.
Sponsored Access. 1.1 Subject to the Sponsored Participant at all times complying with the Obligations (as defined in clause 3.2.1 of this Addendum), BATS grants to the Sponsoring Participant the right to permit the Sponsored Participant access to and use of such of the Services as BATS may from time to time permit.
Sponsored Access. Where a Client uses Instinet for sponsored access at an Execution Venue, the Client shall be required to sign an additional addendum to this Agreement as is required by Instinet and/or the relevant Execution Venue and provide any such additional information as is requested by them. For the avoidance of doubt, Instinet retains responsibility for a Client using sponsored access under MiFID II. Part 2 to Schedule D The terms set out in this Part 2 reflect requirements that Third Party Licensors have imposed on Instinet in relation to the provision to and use by the Client of the Third Party Licensors’ data (such data being “Market Data” and such requirements together being the “Data Terms”).

Related to Sponsored Access

  • Restricted Access By choosing restricted access, you are requesting that the library restrict access to all full-text copies of your dissertation – both print and electronic – for a specified period of time. Your dissertation will be listed and indexed in the Emory Library Online Catalog and in the ETD repository, but the content, the full text of your thesis or dissertation and any supplementary files, will not be accessible until the expiration of the restricted access period. If you choose to restrict access to the full-text copy of your thesis or dissertation, then you may opt to also restrict access to your abstract or table of contents. You will need to indicate your desire to restrict access to these components of your ETD record during the electronic submission process. If you do not restrict access to your abstract and/or table of contents, then this information will be displayed on the web in the ETD record for your thesis or dissertation even if you have restricted access to the full-text copy. You will be notified by the library sixty ( 60 ) days prior to the expiration of the restricted period that your thesis or dissertation will be published on the internet. It is your responsibility to notify the Graduate School and the library that you need to extend the access restriction, and to provide the library with an updated e- mail address. ☐ 6 months after my graduation ☐ 1 year after my graduation ☐ 2 years after my graduation Please select a time period you would like restricted access below. I request that the full text of my thesis or dissertation (and any supplemental files) be published no sooner than: Part 4 – Inclusion of Previously Copyrighted Material I hereby certify that all text, audio-visual, or other material not created by me or for which I no longer control copyright that is included in my submission (a) has been identified in my submission by quotation, if directly quoted, and with appropriate source citations; and (b) • falls within the parameters of “Fair Use” as defined by US copyright law; or • is unambiguously a part of the public domain as a matter of law; or • is the subject of a properly documented permission obtained from the entity that owns or controls the copyright in the material. I will provide copies of any such permission upon request. Following is a list of the items for which I have sought and received written permission from the copyright owners to include in my submission (attach a separate page if necessary):

  • Originating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.

  • Terminating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.

  • ICANN Access Registry Operator shall provide bulk access to the zone files for the TLD to ICANN or its designee on a continuous basis in the manner ICANN may reasonably specify from time to time. Access will be provided at least daily. Zone files will include SRS data committed as close as possible to 00:00:00 UTC.

  • User Access Transfer Agent shall have a process to promptly disable access to Fund Data by any Transfer Agent personnel who no longer requires such access. Transfer Agent will also promptly remove access of Fund personnel upon receipt of notification from Fund.

  • Authorized Access Transfer Agent shall have controls that are designed to maintain the logical separation such that access to systems hosting Fund Data and/or being used to provide services to Fund will uniquely identify each individual requiring access, grant access only to authorized personnel based on the principle of least privileges, and prevent unauthorized access to Fund Data.

  • Limited Access If necessary for the fulfillment of the Agreement, NBU may provide the Professional with non-exclusive, limited access to NBU’s information technology infrastructure. The Professional understands and agrees to abide by NBU policies, standards, regulations and restrictions regarding access and usage of NBU’s information technology infrastructure. The Professional shall reasonably enforce such policies, standards, regulations and restrictions with all the Professional’s employees, agents or any tier of subcontractor granted access in the performance of this Agreement, and shall be granted and authorize only such access as may be necessary for the purpose of fulfilling the requirements of the Agreement. The Professional’s employees, agents and subcontractors must receive prior, written approval from NBU before being granted access to NBU’s information technology infrastructure and data and NBU, in its sole determination, shall determine accessibility and limitations thereto. The Professional agrees that the requirements of this Section shall be incorporated into all subcontractor agreements entered into by the Professional. It is further agreed that a violation of this Section shall be deemed to cause irreparable harm that justifies injunctive relief in court. A violation of this Section may result in immediate termination of this Agreement without notice.

  • Data Access Access to Contract and State Data The Contractor shall provide to the Client Agency access to any data, as defined in Conn. Gen Stat. Sec. 4e-1, concerning the Contract and the Client Agency that are in the possession or control of the Contractor upon demand and shall provide the data to the Client Agency in a format prescribed by the Client Agency and the State Auditors of Public Accounts at no additional cost.

  • Site Access Dell requires the right to access the APEX System in a timely way and as provided in the Service Offering Description to provide the Support Services. Failure to ensure that Customer provides Dell with timely access to a Site will relieve Dell of the Support Services obligations and Dell may also, at Dell’s discretion, suspend the APEX Service.

  • Service Access Access to the clinical parts of our Site is restricted to Users. Users of our Site are provided with unique User IDs by the Clinic with which they are associated and must choose a password of their choice to sign on to our Site. Users must provide personal contact information, and you must ensure that your information is kept up to date at all times. User IDs and passwords constitute an electronic signature and will be used by us to authenticate access to our Site. If a User opts to sign onto Xxxxxx.xxx, the User will be able to take advantage of the non- public sections of our Site. If a User opts not to sign onto our Site, their access to our Site will be restricted to the public sections of our Site only. If you are provided with a User ID, password or any other piece of information as part of our security procedures, you must treat such information as confidential, and you must not disclose it to any third party. We have the right to disable any User ID at any time, if in our opinion, you have failed to comply with any of the provisions of this Agreement. You may only use our Site as set out in this Agreement. Any illegal or unauthorized use of our Site shall constitute a violation of this Agreement. You do not have permission to access our Site in any way that violates this Agreement or breaches any applicable law. You agree to keep your and your Patients’ Data accurate, current and complete. You may print off or download extracts of page(s) from our Site for your use in Patient care or insertion into a Patient’s electronic health records only.

Time is Money Join Law Insider Premium to draft better contracts faster.