Access and Records A. County, the State of California and the United States Government and/or their representatives, shall have access, for purposes of monitoring, auditing, and examining, to Subrecipient’s activities, books, documents and papers (including computer records and emails) and to records of Subrecipient’s subcontractors, consultants, contracted employees, bookkeepers, accountants, employees and participants related to this Contract. Subrecipient shall insert this condition in each Contract between Subrecipient and a subcontractor that is pursuant to this Contract shall require the subcontractor to agree to this condition. Such departments or representatives shall have the right to make excerpts, transcripts and photocopies of such records and to schedule on site monitoring at their discretion. Monitoring activities also may include, but are not limited to, questioning employees and participants and entering any premises or onto any site in which any of the services or activities funded hereunder are conducted or in which any of the records of Subrecipient are kept. Subrecipient shall make available its books, documents, papers, financial records, etc., within three (3) days after receipt of written demand by Director which shall be deemed received upon date of sending. In the event Subrecipient does not make the above referenced documents available within the County of Orange, California, Subrecipient agrees to pay all necessary and reasonable expenses incurred by County, or County’s designee, in conducting any audit at the location where said records and books of account are maintained.
Access and Use Grantee agrees to license or otherwise make available to MassCEC in perpetuity, without charge, Xxxxxxx’s interest in and copyright (if any) to all non-confidential materials prepared and produced in relation to the Project, including, without limitation, all plans, specifications, and analyses developed in connection with the Project and specified as being for MassCEC’s use and public dissemination; provided, however, that any and all inventions that are conceived or first reduced to use during the course of the Project shall be the sole property of Grantee (except that if jointly invented, title shall flow in accordance with United States patent law), and any licensing requests for such inventions shall be subject to good faith negotiations between the Parties. Grantee represents and warrants that Deliverables will not infringe on any copyright, right of privacy, or personal or proprietary rights of others.
Access and Cooperation Each Party will, and will cause its Other Indemnified Persons to, cooperate and assist in all reasonable respects regarding such Third Party Claim, including by promptly making available to such other Party (and its legal counsel and other professional advisers with a reasonable need to know) all books and records of such Person relating to such Third Party Claim, subject to reasonable confidentiality precautions.
Information and Data Upon request of the Union, the Employer agrees to furnish the Union with the following information: budgets for the Board of Regents; budgets for each College; public information used in the preparation of budgets as provided by law such as salaries; minutes of meetings of the Board; policies of the Board of Regents which apply to faculty members. Voluminous information shall be made available for inspection or will be provided at reproduction cost.
Access to Information Systems Access, if any, to DXC’s Information Systems is granted solely to perform the Services under this Order, and is limited to those specific DXC Information Systems, time periods and personnel as are separately agreed to by DXC and Supplier from time to time. DXC may require Supplier’s employees, subcontractors or agents to sign individual agreements prior to access to DXC’s Information Systems. Use of DXC Information Systems during other time periods or by individuals not authorized by DXC is expressly prohibited. Access is subject to DXC business control and information protection policies, standards and guidelines as may be modified from time to time. Use of any other DXC Information Systems is expressly prohibited. This prohibition applies even when an DXC Information System that Supplier is authorized to access, serves as a gateway to other Information Systems outside Supplier’s scope of authorization. Supplier agrees to access Information Systems only from specific locations approved for access by DXC. For access outside of DXC premises, DXC will designate the specific network connections to be used to access Information Systems.
Background Data The Disclosing Party's Background Data, if any, will be identified in a separate technical document.
Access and Security Customer shall employ all physical, administrative and technical controls, screening and security procedures and other safeguards necessary to: (a) securely administer the distribution and use of all Access Credentials and protect against any unauthorized access to or use of the Hosted Services; and (b) control the content and use of Customer Data, including the uploading or other provision of Customer Data for Processing by the Hosted Services.
Access and Retention of Records County agrees to provide the State Arresting Agencies, the Legislative Auditor, or their authorized agents with access to any records necessary to determine contract compliance. County agrees to create and retain records supporting the services rendered for a period of eight years after either the completion date of the Agreement or the conclusion of any claim, litigation, or exception relating to the Agreement taken by the State of Montana or third party.
Zone File Access Agreement Registry Operator will enter into an agreement with any Internet user, which will allow such user to access an Internet host server or servers designated by Registry Operator and download zone file data. The agreement will be standardized, facilitated and administered by a Centralized Zone Data Access Provider, which may be ICANN or an ICANN designee (the “CZDA Provider”). Registry Operator (optionally through the CZDA Provider) will provide access to zone file data per Section 2.1.3 of this Specification and do so using the file format described in Section 2.1.4 of this Specification. Notwithstanding the foregoing, (a) the CZDA Provider may reject the request for access of any user that does not satisfy the credentialing requirements in Section 2.1.2 below; (b) Registry Operator may reject the request for access of any user that does not provide correct or legitimate credentials under Section 2.1.2 below or where Registry Operator reasonably believes will violate the terms of Section 2.1.5. below; and, (c) Registry Operator may revoke access of any user if Registry Operator has evidence to support that the user has violated the terms of Section 2.1.5 below.
Access and Reports Subject to applicable Law, upon reasonable notice, the Company and EFIH shall (and each shall cause its Subsidiaries (other than the Oncor Entities) to) afford Parent’s officers and other Representatives reasonable access, during normal business hours throughout the period from the date hereof through the earlier of the Termination Date and the Effective Time, to its employees, properties, books, contracts and records and, during such period, the Company and EFIH shall (and each shall cause its Subsidiaries (other than the Oncor Entities) to) furnish to Parent all such information concerning its business, properties, facilities, operations and personnel as Parent reasonably requests; provided that, no investigation pursuant to this Section 6.4 shall (a) unreasonably interfere with the ongoing operations of the Company or its Subsidiaries or (b) affect or be deemed to modify any representation or warranty made by the Company herein, and provided, further, that the foregoing shall not require the Company or any of its Subsidiaries to (i) permit any inspection, or to disclose any information, that in the reasonable judgment of the Company or such Subsidiary would result in the disclosure of any trade secrets of third parties or violate any of its or any of its Subsidiaries’ obligations with respect to confidentiality if the Company or such Subsidiary shall have used reasonable best efforts to furnish such information in a manner that does not result in any such disclosure, including obtaining the consent of such third party to such inspection or disclosure, (ii) disclose any privileged information of the Company or any of its Subsidiaries if the Company or such Subsidiary shall have used reasonable best efforts to furnish such information in a manner that does not result in the loss of such privilege or (iii) permit any invasive environmental investigation or sampling, including a Phase II environmental assessment. All information requested pursuant to this Section 6.4 shall be governed by the Confidentiality Agreement.