Access to Systems and Data Clause Samples

The "Access to Systems and Data" clause defines the rights and limitations regarding one party's ability to use or interact with the other party's computer systems, networks, or data repositories. Typically, it outlines who is permitted access, under what circumstances, and what security or confidentiality measures must be followed. For example, a service provider may be granted access to a client's database solely for the purpose of performing contracted services, with strict controls to prevent unauthorized use or disclosure. This clause is essential for protecting sensitive information, ensuring compliance with privacy laws, and clarifying responsibilities related to data security.
Access to Systems and Data. Licensor shall use commercially reasonable efforts to (i) include in its Ticket Agent Agreements an obligation to provide the Knicks with substantially similar access to relevant information about the Knicks’ customers and sales activity that resides in the Ticket Agent’s database and other system components as is provided under Licensor’s current agreement with Ticketmaster; (ii) enforce such obligation on behalf of the Knicks at the Knicks’ expense and (iii) enforce any other terms of any Ticket Agent Agreements that affect the Knicks at the Knicks’ expense; it being understood that, with respect to any agreements where the Knicks are an express party or a third party beneficiary, Licensor shall have no obligations under clauses (ii) or (iii), above.
Access to Systems and Data. Licensor shall use commercially reasonable efforts to (i) include in its Ticket Agent Agreements an obligation to provide the Rangers with substantially similar access to relevant information about the Rangers’ customers and sales activity that resides in the Ticket Agent’s database and other system components as are provided under Licensor’s current agreement with Ticketmaster, (ii) enforce such obligation on behalf of the Rangers at the Rangers’ expense and (iii) enforce any other terms of any Ticket Agent Agreements that affect the Rangers at the Rangers’ expense; it being understood that, with respect to any agreements where the Rangers are an express party or a third party beneficiary, Licensor shall have no obligations under clauses (ii) or (iii), above.
Access to Systems and Data. 6.5.1 The Service Provider shall ensure that the identity of all Users is securely authenticated before using any Service System. 6.5.2 The Service Provider shall ensure that access to and use of all Service Systems is subject to appropriate authorisation in accordance with Schedule 14 (Security Policy) and Good Industry Practice. 6.5.3 The Service Provider shall ensure that the Services Systems prevent unauthorised Users and Service Provider Personnel from making changes to configurations and Parameters. 6.5.4 The Service Provider shall ensure that all of the Service Systems restrict Internet access; for its Service Provider Personnel employed in the provision of the Services and at the Premises used for the provision of the Services, except where required for the provision of the Services and/or on an individual basis. 6.5.5 Where the Service Provider engages in services with clients other than TTL, the Service Provider shall take all relevant steps to ensure that there is no accidental or malicious interference with the Services. 6.5.6 The Service Provider shall allocate permissions to its Service Provider Personnel at its own risk. 6.5.7 The Service Provider shall immediately disable a User’s logon and access rights when a User ceases to be a member of the Service Provider Personnel or TTL Personnel. 6.5.8 The Service Provider shall provide on-site read-only access to all Data to nominated TTL Personnel or authorised agents. 6.5.9 In accordance with Appendix 2 (Data Protection), the Service Provider shall securely delete Data at the expiry of its retention period by the following means such that the Data cannot be accessed by any User, intruder or member of the public: a) Data held on paper shall be securely shredded; b) Data held on fixed hard disks shall be deleted using tested deletion scripts; and c) Data held on any removable medium such as optical disks, floppy disks and tapes shall be securely destroyed such that the Data cannot be accessed by any reasonable means. 6.5.10 The Service Provider shall carry out a security audit on all of its Service Systems in accordance with Good Industry Practice. 6.5.11 Where fixed disks holding Data are to be retired or re-used, the Service Provider shall re-format the disks such that the Data cannot be accessed by any reasonable means. 6.5.12 In the event that a member of its Service Provider Personnel is dismissed, the Service Provider shall ensure that all security devices and access cards are taken from the...
Access to Systems and Data. 5.2.1 The Service Provider shall ensure that the identity of all Users is securely authenticated before using any of the Service Systems. 5.2.2 The Service Provider shall ensure that access to and use of all Service Systems is subject to appropriate authorisation in accordance with Schedule 14 (Security Policy) and Good Industry Practice. 5.2.3 The Service Provider shall ensure that the Service Systems prevent unauthorised Users and Service Provider Personnel from making changes to configurations and Parameters. 5.2.4 The Service Provider shall ensure that all of the Service Systems restrict Internet access for its Service Provider Personnel employed in the provision of the Services and at the Premises used for the provision of the Services, except where required for the provision of the Services and/or on an individual basis. 5.2.5 Where the Service Provider engages in services with clients other than TTL, the Service Provider shall take all relevant steps to ensure that there is no accidental or malicious interference with the Services.
Access to Systems and Data 

Related to Access to Systems and Data

  • Access to Site 3.05.1 Contractor may enter and leave the premises at all reasonable times without charge. Contractor and its employees may use the common areas and roadways of the premises where it is to perform the services together with all facilities, equipment, improvements, and services provided in connection with the premises for common use. This excludes parking for Contractor’s personnel. Contractor shall repair any damage caused by it or its employees as a result of its use of the common areas.

  • Access to Services Subject to and in accordance with the terms of this Agreement, including any Schedules, Company grants You a non-exclusive, non-sublicensable, nontransferable, non-assignable, revocable license for the term of this Agreement to access and use the Services. Services may only be used by Your Users for internal business purposes only. You agree to comply with the terms and conditions of this Agreement, including any Schedules, and with all applicable Company procedures and policies that further define use of the Services. You acknowledge and agree that the actions of any of Your Users with respect to the Services will be deemed to be actions by You and that any breach by any of Your Users of the terms of this Agreement, including any Schedule, will be deemed to be a breach by You.

  • Access to NID 2.7.3.1 NewPhone may access the customer’s premises wiring by any of the following means and NewPhone shall not disturb the existing form of electrical protection and shall maintain the physical integrity of the NID: 2.7.3.1.1 BellSouth shall allow NewPhone to connect its Loops directly to BellSouth’s multi-line residential NID enclosures that have additional space and are not used by BellSouth or any other telecommunications carriers to provide service to the premises; 2.7.3.1.2 Where an adequate length of the customer’s premises wiring is present and environmental conditions permit, either Party may remove the customer premises wiring from the other Party’s NID and connect such wiring to that Party’s own NID; 2.7.3.1.3 Either Party may enter the subscriber access chamber or dual chamber NID enclosures for the purpose of extending a cross-connect or spliced jumper wire from the customer premises wiring through a suitable “punch-out” hole of such NID enclosures; or 2.7.3.1.4 NewPhone may request BellSouth to make other rearrangements to the customer premises wiring terminations or terminal enclosure on a time and materials cost basis. 2.7.3.2 In no case shall either Party remove or disconnect the other Party’s loop facilities from either Party’s NIDs, enclosures, or protectors unless the applicable Commission has expressly permitted the same and the disconnecting Party provides prior notice to the other Party. In such cases, it shall be the responsibility of the Party disconnecting loop facilities to leave undisturbed the existing form of electrical protection and to maintain the physical integrity of the NID. It will be NewPhone’s responsibility to ensure there is no safety hazard, and NewPhone will hold BellSouth harmless for any liability associated with the removal of the BellSouth Loop from the BellSouth NID. Furthermore, it shall be the responsibility of the disconnecting Party, once the other Party’s loop has been disconnected from the NID, to reconnect the disconnected loop to a nationally recognized testing laboratory listed station protector, which has been grounded as per Article 800 of the National Electrical Code. If no spare station protector exists in the NID, the disconnected loop must be appropriately cleared, capped and stored. 2.7.3.3 NewPhone shall not remove or disconnect ground wires from BellSouth’s NIDs, enclosures, or protectors. 2.7.3.4 NewPhone shall not remove or disconnect NID modules, protectors, or terminals from BellSouth’s NID enclosures. 2.7.3.5 Due to the wide variety of NID enclosures and outside plant environments, BellSouth will work with NewPhone to develop specific procedures to establish the most effective means of implementing this section if the procedures set forth herein do not apply to the NID in question.

  • Access to Data Operator shall make Data in the possession of the Operator available to the LEA within five (5) business days of a request by the LEA.