Network Access Sample Clauses

The Network Access clause defines the terms under which parties are permitted to access and use a specified network or system. It typically outlines the conditions, limitations, and security requirements for connecting to the network, such as user authentication, permitted devices, and acceptable use policies. This clause ensures that network resources are used appropriately and securely, helping to prevent unauthorized access and protect sensitive information.
POPULAR SAMPLE Copied 9 times
Network Access. (a) The Service Provider may provide the Service Recipients with access to the Service Provider’s or its Affiliates’ computer hardware, computer software and information technology systems, including the data they contain (collectively, “Networks”) via a secure method selected by the Service Provider. The Service Recipients shall only use (and will ensure that their employees, agents and subcontractors (collectively, “Personnel”) only use), and shall only have access to, the Networks for the purpose of receiving, and only to the extent required to receive, the Services. The Service Recipients shall not permit their Personnel to use or have access to the Networks except to the extent that (i) such Personnel (or such Personnel’s functional equivalent) had access to the Networks prior to the Effective Time, or (ii) the Service Provider has given prior written approval for such access. (b) The Service Recipients shall cause all of the Service Recipients’ Personnel having access to the Networks in connection with receipt of a Service to comply with all security guidelines (including physical security, network access, internet security, confidentiality and personal data security guidelines) of the Service Provider which the Service Provider provides or makes available to the Service Recipients. (c) The Service Recipients shall not, and shall cause their Personnel not to: (i) use the Networks to develop software, process data or perform any work or services other than for the purpose of receiving the Services; (ii) break, interrupt, circumvent, adversely affect or attempt to break, interrupt, circumvent or adversely affect any security system or measure of the Service Provider; (iii) obtain, or attempt to obtain, access to any hardware, software or data stored in the Networks except to the extent necessary to receive the Services; or (iv) use, disclose or give access to any part of the Networks to any Third Party, other than their agents and subcontractors authorized by the Service Provider in accordance with this Section 3.5. All user identification numbers and passwords for the Networks disclosed to the Service Recipients, and any information obtained from the use of the Networks, shall be deemed Confidential Information of the Service Provider for purposes of Section 8.1. (d) If a Service Recipient or its Personnel breach any provision of this Section 3.5, such Service Recipient shall promptly notify the Service Provider of such breach and cooperate as request...
Network Access. The Licensed Materials will be stored at one or more Publisher´s locations in digital form accessible by telecommunication links between such locations and authorized locations of Licensee and Participating institutions.
Network Access. When performing services for the County, ImageSoft shall comply with, and ensure that all ImageSoft personnel comply with, all rules, regulations and policies of County that are communicated to ImageSoft in writing, including security procedures concerning systems and data and remote access thereto, building security procedures, including the restriction of access by County to certain areas of its premises or systems for security reasons, and general health and safety practices and procedures.
Network Access. During its performance of this Contract, Contractor may be granted access to Purchaser’s computer and telecommunication networks (“Networks”). As a condition of Network use, Contractor shall: (a) use the Networks in compliance with all applicable laws, rules, and regulations; (b) use software, protocols, and procedures as directed by Purchaser to access and use the Networks; (c) only access Network locations made available to Contractor by Purchaser; (d) not interfere with or disrupt other users of the Networks;
Network Access. We maintain an adequate network of providers, pharmacies, durable medical equipment suppliers and other suppliers to provide you with adequate and timely access to medically necessary diabetes resources. If a contract lapses or is terminated, we will ensure the availability and continuity of your care through another network provider or a single-case agreement with an out-of-network provider.
Network Access. State Street must implement controls designed to prevent unauthorized devices from physically connecting to the internal network or to detect and alert an administrator (e.g. Network Access Control device (NAC)).
Network Access. DST must implement controls designed to prevent unauthorized devices from physically connecting to the internal network or to detect and alert an administrator (e.g. Network Access Control device (NAC)). DST must scan for rogue wireless access points on a regular basis.
Network Access. TENANT may find it necessary to purchase a network interface card, wireless PC card or other hardware in order to connect to the internet service. LANDLORD is not responsible for the purchase of these items and LANDLORD cannot guarantee compatibility with any device TENANT may have. The computer and network card must have software installed that supports the Internet Protocol commonly referred to as TCP/IP. Any conflicts between the software compatibility of the network and the TENANT’S computer operating system or any other feature will be the responsibility of the TENANT to resolve. LANDLORD will not be responsible for software issues related to the user’s personal computer.
Network Access. During its performance of this Master Contract, Contractor may be granted access to Purchaser’s computer and telecommunication networks (“Networks”). As a condition of Network use, Contractor shall: (a) use the Networks in compliance with all applicable laws, rules, and regulations; (b) use software, protocols, and procedures as directed by Purchaser to access and use the Networks; (c) only access Network locations made available to Contractor by Purchaser; (d) not interfere with or disrupt other users of the Networks; (e) assure the transmissions over the Networks by Contractor (i) do not contain any libelous, defamatory, profane, offensive, obscene, pornographic, or unlawful material, and (ii) are not used to perform any illegal activities, including but not limited to, encouraging, selling, or soliciting illegal drugs, gambling, pornography, prostitution, robbery, spreading computer worms or viruses, hacking into computer systems, or trafficking credit card codes; and (f) upon termination or expiration of the Master Contract, relinquish all IP addresses or address blocks assigned to them on the Networks. Additionally, Contractor shall comply with Purchaser’s IT policies.
Network Access. The Licensed Materials will be stored at one or more Licensor´s locations in digital form accessible by telecommunication links between such locations and authorized locations of Licensee and Participating institutions.