Access by and Authentication of Authorized Users Sample Clauses

The 'Access by and Authentication of Authorized Users' clause defines the rules and procedures for allowing only approved individuals to access certain systems, data, or services. Typically, this clause outlines the methods of verifying user identities, such as through passwords, multi-factor authentication, or access tokens, and may specify the responsibilities of both parties in maintaining secure access. Its core function is to protect sensitive information by ensuring that only properly authenticated and authorized users can gain entry, thereby reducing the risk of unauthorized access and potential data breaches.
Access by and Authentication of Authorized Users. Authorized Users of the Participating Institutions shall be granted access to the Licensed Materials pursuant to the following:
Access by and Authentication of Authorized Users. Licensee and its Authorized Users shall be granted access to the Licensed Materials pursuant to the following: {Include all that apply; delete those that do not:}
Access by and Authentication of Authorized Users. Licensee and its Authorized Users shall be granted access to the Licensed Materials pursuant to the following: IP Addresses. Authorized Users shall be identified and authenticated by the use of Internet Protocol ("IP") addresses provided by Licensee to Licensor. The use of proxy servers is permitted as long as any proxy server IP addresses provided limit remote or off-campus access to Authorized Users.
Access by and Authentication of Authorized Users. Licensee and its Authorized Users shall be granted access to the Licensed Materials pursuant to the following: Authorized Users shall be identified and authenticated by the use of Internet Protocol (“IP”) addresses provided by Licensee to Licensor and/or by MetaPress identification number if applicable.
Access by and Authentication of Authorized Users. Authorized Users of the NTK and the Participating Institutions shall be granted access to the Materials pursuant to the following:
Access by and Authentication of Authorized Users. Licensee and its Authorized Users shall be granted access to the Licensed Materials pursuant to the following: IP Addresses. Authorized Users shall be identified and authenticated by the use of Internet Protocol (“IP”) addresses provided by Licensee to Licensor. The use of proxy servers is authorized as long as any proxy server IP addresses provided limit remote or off-campus access to Authorized Users. Authorized IP Addresses are listed in Appendix C. An updated list will be sent to Licensor on an annual or as needed basis. Licensee and Licensor shall cooperate in the implementation of new authentication protocols and procedures (such as Shibboleth) as they are developed during the term of this Agreement.
Access by and Authentication of Authorized Users. Licensee and its Authorized Users shall be granted access to the Licensed Materials. This access will be established by CALEA or IDS as necessary to ensure the seamless delivery of publication services to the licensee, under protocol established by CALEA or IDS. The development of specific connection protocols shall be identified and authenticated by such means as may be developed during the term of this Agreement to meet the service delivery requirements of this agreement.
Access by and Authentication of Authorized Users. 5.1 Licensee and its Authorized Users shall be granted access to the Licensed Materials pursuant to the following:
Access by and Authentication of Authorized Users. Licensee and its Authorized Users shall be granted access to the Licensed Materials pursuant to the following: IP Addresses. Authorized Users shall be identified and authenticated by the use of Internet Protocol ("IP") addresses provided by Licensee to Licensor. Authorized Uses. Licensee and Authorized Users may make all use of the Licensed Materials as is consistent with the Fair Use Provisions of United States and international copyright laws. In addition, the Licensed Materials may be used for purposes of research, education or other non-commercial use as follows:
Access by and Authentication of Authorized Users. Authorized Users of the Participating Institutions shall be granted access to the Licensed Materials pursuant to the following: (a) Access-Codes: AMBOSS will make available codes that are shared with the Participating Institutions as laid in Appendix B. The codes are then shared by each Participating Institution with those Authorized Users selected to access and use the AMBOSS platform. Each code, after individual redemption, grants access to AMBOSS with unlimited library usage and a limit of 50 questions per month for student licenses and unlimited questions for lecturers until the end of the respective term - for the first term until 31. 12. 2023. (b) The Licensor shall provide the individual product keys as needed, which the Licensee may pass on solely to the Authorized Users of the Participating Institutions. (c) At the beginning of the academic year new students will start their studies who may be eligible to use AMBOSS as identified by the Participating Institutions. AMBOSS will issue an additional set of codes to enable access for these students, in an amount that will be stated at the beginning of the academic year by the Participating Institutions based on the actual demand, and is roughly equal to the number of students completing their studies in September of the current year. This will be done at no additional cost. The accounts of students that completed their studies will be terminated at the end of the term of the agreement, 31.12. of the current year.