Supplier access to Data Sample Clauses

The 'Supplier access to Data' clause defines the conditions under which a supplier may access, use, or process data belonging to the customer or end users. Typically, this clause outlines the types of data the supplier can access, the purposes for which access is granted (such as maintenance or support), and any security or confidentiality requirements that must be followed. By clearly specifying these terms, the clause helps protect sensitive information and ensures that data is only accessed in authorized ways, thereby mitigating risks related to data privacy and misuse.
Supplier access to Data. (a) The Client acknowledges that: (i) the Supplier may require access to the Data to exercise its rights and perform its obligations under this Agreement; and (ii) to the extent that this is necessary but subject to clause 7, the Supplier may authorise a member or members of its personnel or its trusted third party service providers to access the Data for the purposes set out in clause 4.1(a)(i). (b) The Client must arrange all consents and approvals that are necessary for the Supplier to access the Data as described in clause 4.1(a).
Supplier access to Data a The Client acknowledges that: i the Supplier may require access to the Data to exercise its rights and perform its obligations under the Agreement; and ii to the extent that this is necessary but subject to clause 8, the Supplier may authorise a member or members of its personnel and any third parties contemplated by clauses 2.3b to access the Data for this purpose (provided that such third parties are bound by obligations in respect of privacy and confidentiality at least equivalent to those set out in this Agreement). b The Client must arrange all consents and approvals that are necessary for the Supplier to access the Data as described in clause 4.1a. c Without limiting the Client’s obligations under this agreement, the Supplier will take all reasonable steps in accordance with best industry practice to: i prevent any loss, corruption and/or destruction of the Data; ii secure any Data, the SaaS Service and the Underlying Systems against unauthorised access; and iii protect against the introduction of security, vulnerabilities, malicious code or bugs into the SaaS Service and Underlying Systems.
Supplier access to Data a The Client acknowledges that: i the Supplier may require access to the Data to exercise its rights and perform its obligations under the Agreement; and ii the Supplier may use the Data in the process of improving the product and data science capabilities of the Supplier; and iii to the extent that this is necessary but subject to clause 8, the Supplier authorises members of its personnel to access the Data for this purpose; iv to the extent that this is necessary but subject to clause 8, the Supplier warrants that the Data is stored in an access-controlled database and access to the Data will be for the Supplier to exercise its rights and perform its obligations under the Agreement. b The Client must arrange all consents and approvals that are necessary for the Supplier to access the Data as described in clause 5.1a.
Supplier access to Data a The Client acknowledges that: i the Supplier may require access to the Data to provide the SaaS Service, conduct maintenance and otherwise exercise its rights and perform its obligations under the Agreement; and ii to the extent that this is necessary but subject to clause 7, the Supplier may authorise a member or members of its personnel to access the Data for this purpose. b The Client must arrange all consents and approvals that are necessary for the Supplier to access the Data as described in clause 4.1a.
Supplier access to Data a. The Subscriber acknowledges that: i. the Supplier may require access to the Data to exercise its rights and perform its obligations under the Agreement; and ii. to the extent that this is necessary but subject to clause 7, the Supplier may authorise a member or members of its personnel to access the Data for this purpose. b. The Subscriber must arrange all consents and approvals that are necessary for the Supplier to access the Data as described in clause 4.1a. c. The Subscriber warrants that no Data infringes the rights of any third party (including Intellectual Property Rights and privacy rights) and that the Data is not Objectionable, incorrect or misleading.
Supplier access to Data a) The Client acknowledges that: i) Adroit may require access to the Data to exercise its rights and perform its obligations under this Agreement; and (1. a. ii) To the extent that this is necessary, Adroit may authorise a member or members of its personnel to access the Data for this purpose.
Supplier access to Data a The Client owns all right, title to and interest in the Data. Other than as expressly set out herein the Supplier may only use the Data for the purpose of providing the Services. The Client acknowledges that: i the Supplier may require access to the Data to exercise its rights and perform its obligations under the Agreement; and ii to the extent that this is necessary but subject to clause 7, the Supplier may authorise a member or members of its personnel and any third parties contemplated by clauses 2.3b to access the Data for this purpose (provided that such third parties are bound by obligations in respect of privacy and confidentiality at least equivalent to those set out in this Agreement). b The Client must arrange all consents and approvals that are necessary for the Supplier to access the Data as described in clause 4.1a. c Without limiting the Client’s obligations under this agreement, the Supplier will take all reasonable steps in accordance with best industry practice to: i prevent any loss, corruption and/or destruction of the Data; ii secure any Data, the SaaS Service and the Underlying Systems against unauthorised access; and iii protect against the introduction of security, vulnerabilities, malicious code or bugs into the SaaS Service and Underlying Systems.

Related to Supplier access to Data

  • Access to Data Operator shall make Data in the possession of the Operator available to the LEA within five (5) business days of a request by the LEA.

  • Investment; Access to Data The undersigned has carefully reviewed and understands the risks of, and other considerations relating to, a purchase of the Common Stock and an investment in the Company. The undersigned has been furnished materials relating to the Company, the private placement of the Common Stock or anything else that it has requested and has been afforded the opportunity to ask questions and receive answers concerning the terms and conditions of the offering and obtain any additional information which the Company possesses or can acquire without unreasonable effort or expense. Representatives of the Company have answered all inquiries that the undersigned has made of them concerning the Company, or any other matters relating to the formation and operation of the Company and the offering and sale of the Common Stock. The undersigned has not been furnished any offering literature other than the materials that the Company may have provided at the request of the undersigned; and the undersigned has relied only on such information furnished or made available to the undersigned by the Company as described in this Section. The undersigned is acquiring the Shares for investment for the undersigned's own account, not as a nominee or agent and not with the view to, or for resale in connection with, any distribution thereof. The undersigned acknowledges that the Company is a start-up company with no current operations, assets or operating history, which may possibly cause a loss of Purchaser’s entire investment in the Company.

  • Access to NID 2.7.3.1 NewPhone may access the customer’s premises wiring by any of the following means and NewPhone shall not disturb the existing form of electrical protection and shall maintain the physical integrity of the NID: 2.7.3.1.1 BellSouth shall allow NewPhone to connect its Loops directly to BellSouth’s multi-line residential NID enclosures that have additional space and are not used by BellSouth or any other telecommunications carriers to provide service to the premises; 2.7.3.1.2 Where an adequate length of the customer’s premises wiring is present and environmental conditions permit, either Party may remove the customer premises wiring from the other Party’s NID and connect such wiring to that Party’s own NID; 2.7.3.1.3 Either Party may enter the subscriber access chamber or dual chamber NID enclosures for the purpose of extending a cross-connect or spliced jumper wire from the customer premises wiring through a suitable “punch-out” hole of such NID enclosures; or 2.7.3.1.4 NewPhone may request BellSouth to make other rearrangements to the customer premises wiring terminations or terminal enclosure on a time and materials cost basis. 2.7.3.2 In no case shall either Party remove or disconnect the other Party’s loop facilities from either Party’s NIDs, enclosures, or protectors unless the applicable Commission has expressly permitted the same and the disconnecting Party provides prior notice to the other Party. In such cases, it shall be the responsibility of the Party disconnecting loop facilities to leave undisturbed the existing form of electrical protection and to maintain the physical integrity of the NID. It will be NewPhone’s responsibility to ensure there is no safety hazard, and NewPhone will hold BellSouth harmless for any liability associated with the removal of the BellSouth Loop from the BellSouth NID. Furthermore, it shall be the responsibility of the disconnecting Party, once the other Party’s loop has been disconnected from the NID, to reconnect the disconnected loop to a nationally recognized testing laboratory listed station protector, which has been grounded as per Article 800 of the National Electrical Code. If no spare station protector exists in the NID, the disconnected loop must be appropriately cleared, capped and stored. 2.7.3.3 NewPhone shall not remove or disconnect ground wires from BellSouth’s NIDs, enclosures, or protectors. 2.7.3.4 NewPhone shall not remove or disconnect NID modules, protectors, or terminals from BellSouth’s NID enclosures. 2.7.3.5 Due to the wide variety of NID enclosures and outside plant environments, BellSouth will work with NewPhone to develop specific procedures to establish the most effective means of implementing this section if the procedures set forth herein do not apply to the NID in question.

  • Access to PHI Business Associate shall provide access to PHI in a Designated Record Set to Covered Entity or as directed by Covered Entity to an Individual to meet the requirements under 45 CFR § 164.524. Business Associate shall provide such access in the time and manner reasonably designated by Covered Entity. Within three (3) business days, Business Associate shall forward to Covered Entity for handling any request for access to PHI that Business Associate directly receives from an Individual.

  • User Access Transfer Agent shall have a process to promptly disable access to Fund Data by any Transfer Agent personnel who no longer requires such access. Transfer Agent will also promptly remove access of Fund personnel upon receipt of notification from Fund.