Granting Access Clause Samples

The Granting Access clause defines the conditions under which one party is permitted to enter, use, or otherwise access certain property, information, or systems belonging to another party. Typically, this clause outlines the scope of access, any limitations or restrictions, and the duration for which access is granted; for example, it may specify that access is only allowed during business hours or for specific purposes such as inspections or maintenance. Its core practical function is to clearly establish the rights and boundaries of access, thereby preventing unauthorized use and reducing the risk of disputes over entry or usage.
Granting Access. To obtain access via VPN, the Agency and Authorized Party must be sponsored by a party currently employed at Collin County and IT must agree this access is needed for the Collin County information systems. The Agency and Authorized Party must sign this form agreeing to protect the security of the Collin County network. For external Authorized Parties, the Request for VPN Access must be signed and approved by the Manager who is responsible for the external Authorized Party’s use. VPN expiration will be based on the contract length unless further time is requested by Collin County Management. The initial setup and testing will be performed during normal operating hours, Monday – Friday, 8 am – 5 pm, and requires a minimal of two weeksnotice to schedule.
Granting Access. To obtain access via REMOTE ACCESS, the Agency and Authorized Party must be sponsored by a party currently employed at Collin County and IT must agree this access is needed for the Collin County information systems. The Agency and Authorized Party must sign this form agreeing to protect the security of the Collin County network. For external Authorized Parties, the Request for REMOTE ACCESS must be signed and approved by the Manager who is responsible for the external Authorized Party’s use. REMOTE ACCESS expiration will be based on the contract length unless further time is requested by Collin County Management. The initial setup and testing will be performed during normal operating hours, Monday – Friday, 8 am – 5 pm, and requires a minimal of two weeksnotice to schedule.
Granting Access. (a) The Vendor acknowledges that access to the System is granted for the exclusive convenience of the House and may be denied or withdrawn at will by the CAO, with or without cause. (b) If the CAO i s not satisfied with the Vendor's performance, the CAO may terminate the Agreement, pursuant to Section 9. (c) Ifthe Vendor fails to (i) comply with this Agreement , (ii) comply with the policies, rules and regulations of the House, or (iii) take the necessary action to ensure future performance in compliance with any of the foregoing, the CAO may, in addition to any other remedies specified elsewhere herein or available under applicable law, the CAO may revoke Vendor's access to the House information network; or may delay or deny a request for payment for any services to the House (or an office of the House) until the applicable issue is remedied. (d) In the event that the CAO denies or withdraws access to the System (or terminates this Agreement), the CAO will promptly notify the Vendor by email or by any other communication method set forth in Section 4(a). If appropriate, the CAO will notify the Vendor of the cause and what the Vendor may do to remedy the situation.
Granting Access. 2.1 Following receipt: (a) of a fully completed Data Request Form; (b) confirmation from all Co-Investigators that they agree to the Co-Investigator Access Terms and Conditions (found here: insert URL). Instructions will be emailed to your Co- Investigators who will be required to read and confirm acceptance of the Co-Investigator Access Terms and Conditions; and (c) any other information the University requests from you to allow the University to consider your request for access to the Data (i.e., further information regarding data management), the University will use reasonable endeavours to provide you with a decision regarding the outcome of your Data Request Form within three (3) weeks, however you acknowledge this may be longer period. 2.2 The University may deny a request under a Data Request Form for the following reasons:‌ (a) you intend for the Data to be used for any purpose that is not for research or teaching; (b) you intend (or the University believe you may intend) to use the Data for a commercial purpose; (c) you are not a researcher with an ORCID; (d) the University has previously granted access to the Data for a research project that is the same or substantially similar to your intended Approved Research; (e) you are not affiliated to a university or research institute; (f) the request form is incomplete or incorrect; (g) the University considers (in its reasonable opinion) that the Data being requested does not align with the Approved Research; or (h) the University considers (in its reasonable opinion) that your information provided around data management is insufficient or unsatisfactory. 2.3 Clause 2.2 is not intended to limit the reasons that the University may deny a request under a Data Request Form and you acknowledge the University retains the right to grant or deny any request in its sole and absolute discretion. 2.4 Following consideration of your Data Request Form, the University will: (a) send you Data Access Approval via email; or (b) notify you via email that it has declined your request for data. 2.5 If you receive Data Access Approval, you will be emailed confirmation that you and the Co- Investigators have been granted access to the Data, and the University will make the Data available for download via your EMOTE account.
Granting Access a. That upon execution of the contract, the contractor will provide the Contract Manager a list of all contractor’s employees or subcontractor staff that will require access to Department facilities, confidential or sensitive information, or information systems. The list should include the following information: • Name, telephone number, email address, work location, access desired, justification, and the effective date of the desired access for each person listed. b. That any time during the life of the contract, the contractor may submit a request for additional contractor’s employees or subcontractor staff to be granted access to Department facilities, confidential or sensitive information, or information systems. The list should include the same information listed in above. c. That resources and facilities to which specific authorized access may be requested include but are not limited to: • Office Buildings, • Restricted Rooms within Office Buildings, • Restricted Data, • Department Intranet, • Department Network, and • Data Management Systems such as FLORIDA, CAMS and SUNTAX. d. Upon receipt of the list, the Department Contract Manager will determine the appropriateness of each access request and work with the contractor to have the appropriate accesses granted. e. That contractor’s employees and subcontractor staff may be required to sign Department or other agency security forms to gain access. Additionally, they may be required to view security videos, take on-line or instructor-led training, and review Department policies. f. That access will not be granted to contractors’ employees and subcontractor staff until criminal history record check results have been received and deemed satisfactory by the Department. g. That contractor’s employees and subcontractor staff must not share user names, passwords, or security devices for access to Department information resources or facilities. The Department will terminate access and may initiate other contractual remedies if sharing occurs.
Granting Access 

Related to Granting Access

  • Additional Access Rights For the avoidance of doubt any grant of Access Rights not covered by the Grant Agreement or this Consortium Agreement shall be at the absolute discretion of the owning Party and subject to such terms and conditions as may be agreed between the owning and receiving Parties.

  • Service Access Access to the clinical parts of our Site is restricted to Users. Users of our Site are provided with unique User IDs by the Clinic with which they are associated and must choose a password of their choice to sign on to our Site. Users must provide personal contact information, and you must ensure that your information is kept up to date at all times. User IDs and passwords constitute an electronic signature and will be used by us to authenticate access to our Site. If a User opts to sign onto ▇▇▇▇▇▇.▇▇▇, the User will be able to take advantage of the non- public sections of our Site. If a User opts not to sign onto our Site, their access to our Site will be restricted to the public sections of our Site only. If you are provided with a User ID, password or any other piece of information as part of our security procedures, you must treat such information as confidential, and you must not disclose it to any third party. We have the right to disable any User ID at any time, if in our opinion, you have failed to comply with any of the provisions of this Agreement. You may only use our Site as set out in this Agreement. Any illegal or unauthorized use of our Site shall constitute a violation of this Agreement. You do not have permission to access our Site in any way that violates this Agreement or breaches any applicable law. You agree to keep your and your Patients’ Data accurate, current and complete. You may print off or download extracts of page(s) from our Site for your use in Patient care or insertion into a Patient’s electronic health records only.

  • Parent and Eligible Student Access Education Law Section 2-d and FERPA provide Parents and Eligible Students the right to inspect and review their child's or the Eligible Student’s Student Data stored or maintained by the EA. To the extent Student Data is held by Contractor pursuant to the Service Agreement, Contractor shall respond within thirty (30) calendar days to the EA's requests for access to Student Data so the EA can facilitate such review by a Parent or Eligible Student, and facilitate corrections, as necessary. If a Parent or Eligible Student contacts Contractor directly to review any of the Student Data held by Contractor pursuant to the Service Agreement, Contractor shall promptly notify the EA and refer the Parent or Eligible Student to the EA.

  • Union Access The Union shall have reasonable access to all work locations to verify that the terms and conditions of this Agreement are being carried out and for the purpose of conferring with employees, provided that access shall be subject to such rules and regulations immediately below, as well as to such rules and regulations as may be agreed to by the department and the union. Union access to work locations will not disrupt or interfere with a department’s mission and services or involve any political activities.

  • Restricted Access (a) Buyer agrees that the Facilities themselves contain Seller’s valuable trade secrets. Buyer agrees (i) to restrict the use of such information to matters relating to the Facilities, and (ii) to restrict access to such information as provided in Section 10.3(b). (b) Seller’s Confidential Information will not be reproduced without Seller’s prior written consent, and following termination of this Agreement all copies of such written information will be returned to Seller upon written request (not to be made while materials are still of use to the operation of a Facility and no Buyer Default has occurred and is continuing), unless otherwise agreed by the Parties. Buyer’s Confidential Information will not be reproduced by Seller without Buyer’s prior written consent, and following termination of this Agreement all copies of such written information will be returned to Buyer upon written request or shall be certified by Seller as having been destroyed. (c) Subject to ARTICLE XI and Section 10.2(a) and (b) hereof, the Facilities are offered for sale and are sold by Seller subject to the condition that such sale does not convey any license, expressly or by implication, to manufacture, reverse engineer, duplicate or otherwise copy or reproduce any part of the Facilities, documentation or Software without Seller’s express advance written permission. Subject to ARTICLE XI hereof, Buyer agrees not to remove the covering, not to access the interior or to reverse engineer, or cause or knowingly allow any third party to open, access the interior or reverse engineer any Facility or Software provided by Seller. Subject to ARTICLE XI hereof, and anything contemplated pursuant to this Agreement, only Seller or its authorized representatives may open or access the interior of a Facility. Notwithstanding the foregoing or anything else herein to the contrary, and without limitation of the rights set forth in ARTICLE XI hereof, if any Facility is no longer covered by this Agreement or another agreement between Buyer and Seller (or any Affiliate of Seller) regarding the operation and maintenance of such Facility, Buyer shall be entitled to maintain, or cause a third party to maintain, such Facility, including replacing parts or components as needed or desired; provided that Buyer shall use commercially reasonable efforts to engage a third party to provide such maintenance that is not a competitor of Seller or its Affiliates and is not in litigation or other material dispute with Seller.