Access and Cooperation Each Party will, and will cause its Other Indemnified Persons to, cooperate and assist in all reasonable respects regarding such Third Party Claim, including by promptly making available to such other Party (and its legal counsel and other professional advisers with a reasonable need to know) all books and records of such Person relating to such Third Party Claim, subject to reasonable confidentiality precautions.
Access and Use 1. Each Party shall ensure that any service supplier of the other Party is accorded access to and use of public telecommunications transport networks and services in a timely fashion, on transparent, reasonable and nondiscriminatory terms and conditions. This obligation shall be applied, inter alia, through paragraphs 2 through 6. 2. Each Party shall ensure that service suppliers of the other Party have access to and use of any public telecommunications transport network or service offered within or across the border of that Party, including private leased circuits, and to this end shall ensure, subject to the provisions of paragraphs 5 and 6, that such suppliers are permitted: (a) to purchase or lease and attach terminal or other equipment which interfaces with the network and which is necessary to supply their services; (b) to interconnect private leased or owned circuits with public telecommunications transport networks and services or with circuits leased or owned by other service suppliers; (c) to use operating protocols of their choice in the supply of any service, other than as necessary to ensure the availability of telecommunications transport networks and services to the public generally; and (d) to perform switching, signaling and processing functions. 3. Each Party shall ensure that service suppliers of the other Party may use public telecommunications transport networks and services for the movement of information 4. Notwithstanding the provisions of paragraph 3, a Party may take such measures as are necessary: (a) to ensure the security and confidentiality of messages; or (b) to protect the personal data of users of public telecommunications transport networks or services, subject to the requirement that such measures are not applied in a manner which would constitute a means of arbitrary or unjustifiable discrimination or a disguised restriction on trade in services. 5. Each Party shall ensure that no condition is imposed on access to and use of public telecommunications transport networks and services other than as necessary: (a) to safeguard the public service responsibilities of suppliers of public telecommunications transport networks and services, in particular their ability to make their networks or services available to the public generally; or (b) to protect the technical integrity of public telecommunications transport networks or services.
Access and Records A. County, the State of California and the United States Government and/or their representatives, shall have access, for purposes of monitoring, auditing, and examining, to Subrecipient’s activities, books, documents and papers (including computer records and emails) and to records of Subrecipient’s subcontractors, consultants, contracted employees, bookkeepers, accountants, employees and participants related to this Contract. Subrecipient shall insert this condition in each Contract between Subrecipient and a subcontractor that is pursuant to this Contract shall require the subcontractor to agree to this condition. Such departments or representatives shall have the right to make excerpts, transcripts and photocopies of such records and to schedule on site monitoring at their discretion. Monitoring activities also may include, but are not limited to, questioning employees and participants and entering any premises or onto any site in which any of the services or activities funded hereunder are conducted or in which any of the records of Subrecipient are kept. Subrecipient shall make available its books, documents, papers, financial records, etc., within three (3) days after receipt of written demand by Director which shall be deemed received upon date of sending. In the event Subrecipient does not make the above referenced documents available within the County of Orange, California, Subrecipient agrees to pay all necessary and reasonable expenses incurred by County, or County’s designee, in conducting any audit at the location where said records and books of account are maintained.
Access to Services Subject to and in accordance with the terms of this Agreement, including any Schedules, Company grants You a non-exclusive, non-sublicensable, nontransferable, non-assignable, revocable license for the term of this Agreement to access and use the Services. Services may only be used by Your Users for internal business purposes only. You agree to comply with the terms and conditions of this Agreement, including any Schedules, and with all applicable Company procedures and policies that further define use of the Services. You acknowledge and agree that the actions of any of Your Users with respect to the Services will be deemed to be actions by You and that any breach by any of Your Users of the terms of this Agreement, including any Schedule, will be deemed to be a breach by You.
Access to PHI Business Associate shall provide access to PHI in a Designated Record Set to Covered Entity or as directed by Covered Entity to an Individual to meet the requirements under 45 CFR § 164.524. Business Associate shall provide such access in the time and manner reasonably designated by Covered Entity. Within three (3) business days, Business Associate shall forward to Covered Entity for handling any request for access to PHI that Business Associate directly receives from an Individual.
Network Services Local Access Services In lieu of any other rates and discounts, Customer will pay fixed monthly recurring local loop charges ranging from $1,200 to $2,000 for TDM-based DS-3 Network Services Local Access Services at 2 CLLI codes mutually agreed upon by Customer and Company.
Access to NID 2.7.3.1 NewPhone may access the customer’s premises wiring by any of the following means and NewPhone shall not disturb the existing form of electrical protection and shall maintain the physical integrity of the NID: 2.7.3.1.1 BellSouth shall allow NewPhone to connect its Loops directly to BellSouth’s multi-line residential NID enclosures that have additional space and are not used by BellSouth or any other telecommunications carriers to provide service to the premises; 2.7.3.1.2 Where an adequate length of the customer’s premises wiring is present and environmental conditions permit, either Party may remove the customer premises wiring from the other Party’s NID and connect such wiring to that Party’s own NID; 2.7.3.1.3 Either Party may enter the subscriber access chamber or dual chamber NID enclosures for the purpose of extending a cross-connect or spliced jumper wire from the customer premises wiring through a suitable “punch-out” hole of such NID enclosures; or 2.7.3.1.4 NewPhone may request BellSouth to make other rearrangements to the customer premises wiring terminations or terminal enclosure on a time and materials cost basis. 2.7.3.2 In no case shall either Party remove or disconnect the other Party’s loop facilities from either Party’s NIDs, enclosures, or protectors unless the applicable Commission has expressly permitted the same and the disconnecting Party provides prior notice to the other Party. In such cases, it shall be the responsibility of the Party disconnecting loop facilities to leave undisturbed the existing form of electrical protection and to maintain the physical integrity of the NID. It will be NewPhone’s responsibility to ensure there is no safety hazard, and NewPhone will hold BellSouth harmless for any liability associated with the removal of the BellSouth Loop from the BellSouth NID. Furthermore, it shall be the responsibility of the disconnecting Party, once the other Party’s loop has been disconnected from the NID, to reconnect the disconnected loop to a nationally recognized testing laboratory listed station protector, which has been grounded as per Article 800 of the National Electrical Code. If no spare station protector exists in the NID, the disconnected loop must be appropriately cleared, capped and stored. 2.7.3.3 NewPhone shall not remove or disconnect ground wires from BellSouth’s NIDs, enclosures, or protectors. 2.7.3.4 NewPhone shall not remove or disconnect NID modules, protectors, or terminals from BellSouth’s NID enclosures. 2.7.3.5 Due to the wide variety of NID enclosures and outside plant environments, BellSouth will work with NewPhone to develop specific procedures to establish the most effective means of implementing this section if the procedures set forth herein do not apply to the NID in question.
Access to Information Systems Access, if any, to DXC’s Information Systems is granted solely to perform the Services under this Order, and is limited to those specific DXC Information Systems, time periods and personnel as are separately agreed to by DXC and Supplier from time to time. DXC may require Supplier’s employees, subcontractors or agents to sign individual agreements prior to access to DXC’s Information Systems. Use of DXC Information Systems during other time periods or by individuals not authorized by DXC is expressly prohibited. Access is subject to DXC business control and information protection policies, standards and guidelines as may be modified from time to time. Use of any other DXC Information Systems is expressly prohibited. This prohibition applies even when an DXC Information System that Supplier is authorized to access, serves as a gateway to other Information Systems outside Supplier’s scope of authorization. Supplier agrees to access Information Systems only from specific locations approved for access by DXC. For access outside of DXC premises, DXC will designate the specific network connections to be used to access Information Systems.
Access and Confidentiality (a) Until the earlier of the Closing Date and the date on which this Agreement is terminated pursuant to Article 10, Seller shall afford to Purchaser and its officers and authorized agents and representatives reasonable access during normal business hours to the properties, books, records, contracts, documents, files and other information of or relating to the Assets and the Assumed Liabilities; provided, however, that nothing herein shall afford Purchaser the right to review any information to the extent relating solely to loans held by Seller not constituting Loans, including information regarding borrowers, or any information to the extent relating solely to Seller’s other branches, facilities and operations not subject to this Agreement. Seller shall identify to Purchaser, within fifteen (15) calendar days after the date hereof, a group of its salaried personnel (with the necessary expertise and experience to assist Purchaser) that shall constitute a “transition group” who will be available to Purchaser at reasonable times during normal business hours to provide information and assistance in connection with Purchaser’s investigation of matters relating to the Assets, the Assumed Liabilities and transition matters. Such transition group will also work cooperatively to identify and resolve issues arising from any commingling of Records with Seller’s records for its other branches, assets and operations not subject to this Agreement. Seller shall furnish Purchaser with such additional financial and operating data and other information about its business operations at the Branches as may be reasonably necessary for the orderly transfer of the business operations of the Branches and any mutually agreeable cooperative customer retention effort; provided, however, that nothing herein shall afford Purchaser the right to review any information relating to loans held by Seller not constituting Loans, including information regarding borrowers or any information relating to Seller’s other branches, facilities and operations not subject to this Agreement. Any investigation pursuant to this Section 7.2(a) shall be conducted in such manner as not to unreasonably interfere with the conduct of Seller’s business. Notwithstanding the foregoing, Seller shall not be required to provide access to or disclose information where such access or disclosure would impose an unreasonable burden on Seller, or any employee of Seller, or would violate or prejudice the rights of customers, jeopardize any attorney-client privilege or contravene any law, rule, regulation, order, judgment, decree, fiduciary duty or binding agreement entered into and disclosed to Purchaser prior to the date of this Agreement. Seller and Purchaser shall use Commercially Reasonable Efforts to make appropriate substitute disclosure arrangements under circumstances in which the restrictions of the preceding sentence apply. (b) From and after the Closing, Seller shall keep confidential non-public information in its possession (other than information which was or becomes available to Seller on a non-confidential basis from a source other than Purchaser or any of its Affiliates) relating to Purchaser, its Affiliates, the Branches, the Assets and the Assumed Liabilities; provided, however, that Seller shall not be liable hereunder with respect to any disclosure to the extent such disclosure is required pursuant to legal process (including pursuant to the assertion of Seller’s rights under this Agreement) (by interrogatories, subpoena, civil investigative demand or similar process), regulatory process or request, or to the extent such disclosure is reasonably necessary for purposes of compliance by Seller or its Affiliates with tax or regulatory reporting requirements; provided that in the event of any disclosure pursuant to legal process Seller exercises Commercially Reasonable Efforts to preserve the confidentiality of the non-public information disclosed, including by cooperating with Purchaser to obtain an appropriate protective order or other reliable assurance that confidential treatment will be accorded the non-public information required to be disclosed. (c) From and after the Closing, Purchaser shall keep confidential non-public information in its possession (other than information which was or becomes available to Purchaser on a non-confidential basis from a source other than Seller or any of its Affiliates) relating to Seller and its Affiliates other than the Branches, the Assets and the Assumed Liabilities; provided, however that Purchaser shall not be liable hereunder with respect to any disclosure to the extent such disclosure is required pursuant to legal process (including pursuant to the assertion of Purchaser’s rights under this Agreement) (by interrogatories, subpoena, civil investigative demand or similar process) or regulatory process or request; provided that in the event of any disclosure pursuant to legal process Purchaser exercises Commercially Reasonable Efforts to preserve the confidentiality of the non-public information disclosed, including by cooperating with Seller to obtain an appropriate protective order or other reliable assurance that confidential treatment will be accorded the non-public information required to be disclosed.
Access to the Services ID’s for access to Vendor Core Research and Analyst Inquiry may not be shared. Access to the Services is restricted to the number of named individuals (each a “Licensed User”) as identified in the Customer Purchase Order.