Access to Database Sample Clauses

The 'Access to Database' clause defines the terms under which one party is permitted to use or interact with a specific database. It typically outlines who is authorized to access the database, the scope of permissible use, and any restrictions or security measures that must be followed, such as login credentials or data confidentiality requirements. This clause ensures that sensitive or proprietary information within the database is protected and that only approved individuals can retrieve or modify data, thereby reducing the risk of unauthorized access or data breaches.
POPULAR SAMPLE Copied 2 times
Access to Database. Vendor shall allow Reliance to access all available inventory management system for tracking and analysing all spares at all location of Vendor and provide assistance to Reliance for interfacing the same with the inventory system maintained by Reliance. In addition, subject to the confidentiality arrangements Vendor shall provide access to its database for the problems encountered and its solutions in provision of services in other networks world wide and which are accessible and available with Vendor’s local representative.
Access to Database. Unless the Customer purchases the optionalDatabase Access,” the Customer will not have access to the database or database server. However, the Customer will have access to download a copy of the database backup file on a regular basis. In addition, through the user interface of FASTER Web the Customer will have access to the Business Intelligence built into FASTER Web to search data, run reports and view data in dashboards. In other words, this means that unless you purchase the optional “Database Access,” which is at an added cost, there will NOT be the ability to run queries against the database or access the database directly in any way. As noted above, you can still get copies of the database backup file.
Access to Database. You agree to provide NetMotion access to the Software data subject to the terms and conditions set forth in Section 16.
Access to Database. During the Term of this Agreement, GSK shall continue to permit Amgen and its Affiliates to have access to the existing ZINC database solely for the purpose of and as necessary for, retrieval by Amgen and its Affiliates of Product Data or GSK’s transfer of Product Data to Amgen or its Affiliates.
Access to Database. OpenMarkets will permit access by the Licensee to specified data contained on the OpenMarkets Database relating to the Licensee and the Clients in the manner set out in the Reporting component of the Services. The Licensee acknowledges that it will have no access to any data within the OpenMarkets Database which does not relate directly to the Licensee or a Client.
Access to Database. You agree to provide NetMotion access to the Software data subject
Access to Database. 3.1. During the term of this licence the Australasian Region of the TRICS Database will be made available, as an internet application, via the TRICS link on the TDB website at ▇▇▇.▇▇▇▇▇▇▇▇▇.▇▇▇ to you or directly via ▇▇▇.▇▇▇▇▇.▇▇▇. Use of the TRICS link will automatically redirect you to the membership log-in area of the TRICS Database. 3.2. To enable us to provide a more efficient service to you, you agree to tell us about any defect in the system within five days of you first becoming aware of it. 3.3. We cannot guarantee that the Australasian Region of the TRICS Database will meet all your needs or that we will be able to fix any problem with the software within the same working day. 3.4. You should make every effort to inform TDB if your contact details change. It is very important to us that our records are kept up to date, and that our communications with regards to access to the Australasian Region of the TRICS Database are directed to the appropriate person(s).
Access to Database. 9.1 In exchange for providing the Licensed Data to the University, the Data Contributor will be entitled to obtain advanced access to each release of data released via the Database. 9.2 Data releases will occur on a yearly basis, for a period determined by the SADEY Leadership Group. 9.3 Data Contributors will have a period of twelve (12) months advanced access to each release of data within the Database, at the end of which Third-Party Users will then be provided access to the same data release. 9.4 In order to be provided with the advanced data access, the Data Contributor must follow the application process outlined in the SADEY Publication and Authorship Policy. 9.5 As outlined in the SADEY Publication and Authorship Policy, other Data Contributors, Leadership Group members, and Data Users will be required to invite Data Contributors as collaborators and co-authors on their projects if their projects use data provided by the Data Contributor. Data Contributors will be able to accept or decline these invitations on a case-by-case basis.
Access to Database. You agree to provide NetMotion access to the Locality Database subject to the terms and conditions set forth in Section 16.

Related to Access to Database

  • Access to Data Operator shall make Data in the possession of the Operator available to the LEA within five (5) business days of a request by the LEA.

  • Access to Site 3.05.1 Contractor may enter and leave the premises at all reasonable times without charge. Contractor and its employees may use the common areas and roadways of the premises where it is to perform the services together with all facilities, equipment, improvements, and services provided in connection with the premises for common use. This excludes parking for Contractor’s personnel. Contractor shall repair any damage caused by it or its employees as a result of its use of the common areas.

  • Access to NID 2.7.3.1 NewPhone may access the customer’s premises wiring by any of the following means and NewPhone shall not disturb the existing form of electrical protection and shall maintain the physical integrity of the NID: 2.7.3.1.1 BellSouth shall allow NewPhone to connect its Loops directly to BellSouth’s multi-line residential NID enclosures that have additional space and are not used by BellSouth or any other telecommunications carriers to provide service to the premises; 2.7.3.1.2 Where an adequate length of the customer’s premises wiring is present and environmental conditions permit, either Party may remove the customer premises wiring from the other Party’s NID and connect such wiring to that Party’s own NID; 2.7.3.1.3 Either Party may enter the subscriber access chamber or dual chamber NID enclosures for the purpose of extending a cross-connect or spliced jumper wire from the customer premises wiring through a suitable “punch-out” hole of such NID enclosures; or 2.7.3.1.4 NewPhone may request BellSouth to make other rearrangements to the customer premises wiring terminations or terminal enclosure on a time and materials cost basis. 2.7.3.2 In no case shall either Party remove or disconnect the other Party’s loop facilities from either Party’s NIDs, enclosures, or protectors unless the applicable Commission has expressly permitted the same and the disconnecting Party provides prior notice to the other Party. In such cases, it shall be the responsibility of the Party disconnecting loop facilities to leave undisturbed the existing form of electrical protection and to maintain the physical integrity of the NID. It will be NewPhone’s responsibility to ensure there is no safety hazard, and NewPhone will hold BellSouth harmless for any liability associated with the removal of the BellSouth Loop from the BellSouth NID. Furthermore, it shall be the responsibility of the disconnecting Party, once the other Party’s loop has been disconnected from the NID, to reconnect the disconnected loop to a nationally recognized testing laboratory listed station protector, which has been grounded as per Article 800 of the National Electrical Code. If no spare station protector exists in the NID, the disconnected loop must be appropriately cleared, capped and stored. 2.7.3.3 NewPhone shall not remove or disconnect ground wires from BellSouth’s NIDs, enclosures, or protectors. 2.7.3.4 NewPhone shall not remove or disconnect NID modules, protectors, or terminals from BellSouth’s NID enclosures. 2.7.3.5 Due to the wide variety of NID enclosures and outside plant environments, BellSouth will work with NewPhone to develop specific procedures to establish the most effective means of implementing this section if the procedures set forth herein do not apply to the NID in question.

  • Investment; Access to Data The undersigned has carefully reviewed and understands the risks of, and other considerations relating to, a purchase of the Common Stock and an investment in the Company. The undersigned has been furnished materials relating to the Company, the private placement of the Common Stock or anything else that it has requested and has been afforded the opportunity to ask questions and receive answers concerning the terms and conditions of the offering and obtain any additional information which the Company possesses or can acquire without unreasonable effort or expense. Representatives of the Company have answered all inquiries that the undersigned has made of them concerning the Company, or any other matters relating to the formation and operation of the Company and the offering and sale of the Common Stock. The undersigned has not been furnished any offering literature other than the materials that the Company may have provided at the request of the undersigned; and the undersigned has relied only on such information furnished or made available to the undersigned by the Company as described in this Section. The undersigned is acquiring the Shares for investment for the undersigned's own account, not as a nominee or agent and not with the view to, or for resale in connection with, any distribution thereof. The undersigned acknowledges that the Company is a start-up company with no current operations, assets or operating history, which may possibly cause a loss of Purchaser’s entire investment in the Company.

  • Access to Information Systems Access, if any, to DXC’s Information Systems is granted solely to perform the Services under this Order, and is limited to those specific DXC Information Systems, time periods and personnel as are separately agreed to by DXC and Supplier from time to time. DXC may require Supplier’s employees, subcontractors or agents to sign individual agreements prior to access to DXC’s Information Systems. Use of DXC Information Systems during other time periods or by individuals not authorized by DXC is expressly prohibited. Access is subject to DXC business control and information protection policies, standards and guidelines as may be modified from time to time. Use of any other DXC Information Systems is expressly prohibited. This prohibition applies even when an DXC Information System that Supplier is authorized to access, serves as a gateway to other Information Systems outside Supplier’s scope of authorization. Supplier agrees to access Information Systems only from specific locations approved for access by DXC. For access outside of DXC premises, DXC will designate the specific network connections to be used to access Information Systems.