Support Access Sample Clauses

Support Access. 8.2.1 Technical support may be obtained by Customer’s nominated contact person. Customer must designate one employee to serve as their primary contact person, they may nominate an alternate contact person. Customer may change their contact person so long as they provide notice to SyncEzy of such change.
AutoNDA by SimpleDocs
Support Access. Customer may access the password-protected portion of Oxford’s website containing frequently-asked questions, support forums, Metrichor Agent Documentation and MinKNOW Documentation.
Support Access. (a) Citigroup will cause each Citigroup Distributor which is a party to a Selling Agreement from time to time to provide Xxxx Xxxxx and any of its Affiliates with Access to Citigroup Distributors in connection with the distribution of the Covered Products covered thereby. For purposes of this Agreement, “
Support Access. Customer shall have direct access via telephone to Noname Security’s support center during Support Hours. Customer shall also have access to the web support services knowledge base and user forum services.
Support Access. Subject to the provisions of ARTICLE VII, following the Closing, Purchaser and its Affiliates, on the one hand, and Seller and the Divesting Entities, on the other hand, shall use commercially reasonable efforts to cooperate with each other in conducting recalls and/or in the defense or settlement of any Liabilities or lawsuits involving the Purchased Assets or the Products, in each case for which the other Party has responsibility under this Agreement or the Transitional Business License Agreement, by providing the other Party and such other Party’s legal counsel reasonable access to employees, records, documents, data, equipment, facilities, products, parts, prototypes and other information relating primarily to the Purchased Assets or the Products, as such other Party may reasonably request, to the extent maintained or under the possession or control of the requested Party; provided, however, that such access shall not unreasonably interfere with the business of Purchaser or Seller, or any of their respective Affiliates; provided, further, that either Party may restrict the foregoing access to the extent that (a) such restriction is required by applicable Law, (b) such access or provision of information would reasonably be expected to result in a violation of confidentiality obligations to a third party or (c) disclosure of any such information would result in the loss or waiver of the attorney-client privilege, except that Purchaser may have reasonable access to the records described in Section 2.03(h)(iii) if (i) the records can be redacted to the reasonable satisfaction of Seller to avoid a loss or waiver of any attorney-client privilege belonging to Seller; or (ii) if the records cannot be redacted to the reasonable satisfaction of Seller to avoid a loss or waiver of any attorney-client privilege, Xxxxxxxxx enters into a joint defense agreement with respect to such records in a form reasonably acceptable to Seller and Purchaser for the purpose of maintaining any attorney-client privilege that may apply to the records. Each Party shall reimburse the other Party for reasonable out-of-pocket expenses paid by such Party to third parties in performing its obligations under this Section 6.12. Following Closing, upon the written request of Purchaser, Seller will provide to Purchaser access to and copies of the Business Books and Records and Regulatory Information described in Section 2.03(h)(iii), and, at the request of Seller, Purchaser and Seller will en...
Support Access. CAI will provide telephone and/or on-site software support on a business day basis for licensed CAI programs. Business day is defined as 8:00 AM through 5:00 PM in the location in which a CAI office is operated and maintained, excluding holidays and weekends. In addition, CAI will provide an 800 help desk support line generally available seven (7) days a week, twenty-four (24) hours a day. CAI will make every reasonable effort to provide Customer with timely and acceptable support in the use, functions, procedures and maintenance of the licensed software modules through the use of: • Help Desk Telephone support. (Toll free 800 number access to CAI headquarters) • Computer-to-computer or network-to-network secure communications (VPN). • On-site service at Customer’s computer site. • On-line meetings, documentation and Issue tracking.
Support Access a) Email - Maintain a dedicated support email address for sending and receiving Support related communication. Email: xxxxxxxxxxxxxx@xxxxxxxxxxxxxxxxxxxxx.xxx. Monitor Support email from 8:00 AM to 5:00 PM (Pacific), Monday through Friday, 52 weeks per year. All Support email to be replied to within 24 hours.
AutoNDA by SimpleDocs
Support Access a) We shall maintain a technical support telephone number in Redwood City, California, US, which will be staffed by knowledgeable employees capable of providing technical assistance regarding the Software Product, its functionality, operations, and supporting documentation. Such telephone assistance will be available to you Monday-Friday, 7:30 am to 8:00 pm EST except holidays.
Support Access. If Nevro allows Provider employees to access through an application support interface, that interface, at a minimum must (a) uniquely identify the Provider employee who used it, (b) record all interactions in a log that is available to Provider upon request, and (c) have its access list audited each quarter

Related to Support Access

  • Internet Access Data and information may be made electronically accessible to the Company through Internet access to one or more links provided by the Administrator or a sub-administrator (“Web Link”). All rights in Web Link (including text and “look and feel” attributes) are owned by the sub-administrator. Any commercial use of the content or any other aspect of Web Link requires the written permission of the sub-administrator. Use of the Web Link by the Company will be subject to any terms of use set forth on the web site. Web Link and the information (including text, graphics and functionality) in the Web Link is presented “As Is” and “As Available” without express or implied warranties including, but not limited to, implied warranties of non-infringement, merchantability and fitness for a particular purpose. The sub-administrator neither warrants that the Web Link will be uninterrupted or error free, nor guarantees the accessibility, reliability, performance, timeliness, sequence, or completeness of information provided on the Web Link.

  • User Access Transfer Agent shall have a process to promptly disable access to Fund Data by any Transfer Agent personnel who no longer requires such access. Transfer Agent will also promptly remove access of Fund personnel upon receipt of notification from Fund.

  • Site Access Dell requires the right to access the APEX System in a timely way and as provided in the Service Offering Description to provide the Support Services. Failure to ensure that Customer provides Dell with timely access to a Site will relieve Dell of the Support Services obligations and Dell may also, at Dell’s discretion, suspend the APEX Service.

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • Data Access Services State Street agrees to make available to the Fund the Data Access Services subject to the terms and conditions of this Addendum and such data access operating standards and procedures as may be issued by State Street from time to time. The Fund shall be able to access the System to (i) originate electronic instructions to State Street in order to (a) effect the transfer or movement of cash or securities held under custody by State Street or (b) transmit accounting or other information (the transactions described in (i)(a) and (i)(b) above are referred to herein as “Client Originated Electronic Financial Instructions”), and (ii) access data for the purpose of reporting and analysis, which shall all be deemed to be Data Access Services for purposes of this Addendum.

  • Remote Access Access to and use of the Data over the State Governmental Network (SGN) or Secure Access Washington (SAW) will be controlled by DSHS staff who will issue authentication credentials (e.g. a Unique User ID and Hardened Password) to Authorized Users on Contractor’s staff. Contractor will notify DSHS staff immediately whenever an Authorized User in possession of such credentials is terminated or otherwise leaves the employ of the Contractor, and whenever an Authorized User’s duties change such that the Authorized User no longer requires access to perform work for this Contract.

  • Investment; Access to Data The undersigned has carefully reviewed and understands the risks of, and other considerations relating to, a purchase of the Common Stock and an investment in the Company. The undersigned has been furnished materials relating to the Company, the private placement of the Common Stock or anything else that it has requested and has been afforded the opportunity to ask questions and receive answers concerning the terms and conditions of the offering and obtain any additional information which the Company possesses or can acquire without unreasonable effort or expense. Representatives of the Company have answered all inquiries that the undersigned has made of them concerning the Company, or any other matters relating to the formation and operation of the Company and the offering and sale of the Common Stock. The undersigned has not been furnished any offering literature other than the materials that the Company may have provided at the request of the undersigned; and the undersigned has relied only on such information furnished or made available to the undersigned by the Company as described in this Section. The undersigned is acquiring the Shares for investment for the undersigned's own account, not as a nominee or agent and not with the view to, or for resale in connection with, any distribution thereof. The undersigned acknowledges that the Company is a start-up company with no current operations, assets or operating history, which may possibly cause a loss of Purchaser’s entire investment in the Company.

  • Technology Access Fee After the Effective Date, within [***] days after receipt of the corresponding invoice from Mersana, Merck will pay to Mersana, a one-time, non-refundable, non-creditable, upfront fee of Twelve Million Dollars ($12,000,000.00) (the [***] Portions of this exhibit have been redacted pursuant to a confidential treatment request. An unredacted version of this exhibit has been filed separately with the Commission. “Technology Access Fee”). Payment of the Technology Access Fee shall be subject to any withholding Tax obligations set forth in Section 6.9.1.

  • Additional Submissions – Information Access The claimant shall then have the opportunity to submit written comments, documents, records and other information relating to the claim. The Company shall also provide the claimant, upon request and free of charge, reasonable access to, and copies of, all documents, records and other information relevant (as defined in applicable ERISA regulations) to the claimant’s claim for benefits.

  • Full Access The Seller will permit representatives of the Buyer to have full access at all reasonable times, and in a manner so as not to interfere with the normal business operations of the Seller to the Property and to obtain copies of all books, records, contracts, and documents of or pertaining to the Property.

Time is Money Join Law Insider Premium to draft better contracts faster.