Access and Mobility Awareness and Expansion Sample Clauses

Access and Mobility Awareness and Expansion 
AutoNDA by SimpleDocs

Related to Access and Mobility Awareness and Expansion

  • Access and Use 1. Each Party shall ensure that any service supplier of the other Party is accorded access to and use of public telecommunications transport networks and services in a timely fashion, on transparent, reasonable and nondiscriminatory terms and conditions. This obligation shall be applied, inter alia, through paragraphs 2 through 6. 2. Each Party shall ensure that service suppliers of the other Party have access to and use of any public telecommunications transport network or service offered within or across the border of that Party, including private leased circuits, and to this end shall ensure, subject to the provisions of paragraphs 5 and 6, that such suppliers are permitted: (a) to purchase or lease and attach terminal or other equipment which interfaces with the network and which is necessary to supply their services; (b) to interconnect private leased or owned circuits with public telecommunications transport networks and services or with circuits leased or owned by other service suppliers; (c) to use operating protocols of their choice in the supply of any service, other than as necessary to ensure the availability of telecommunications transport networks and services to the public generally; and (d) to perform switching, signaling and processing functions. 3. Each Party shall ensure that service suppliers of the other Party may use public telecommunications transport networks and services for the movement of information 4. Notwithstanding the provisions of paragraph 3, a Party may take such measures as are necessary: (a) to ensure the security and confidentiality of messages; or (b) to protect the personal data of users of public telecommunications transport networks or services, subject to the requirement that such measures are not applied in a manner which would constitute a means of arbitrary or unjustifiable discrimination or a disguised restriction on trade in services. 5. Each Party shall ensure that no condition is imposed on access to and use of public telecommunications transport networks and services other than as necessary: (a) to safeguard the public service responsibilities of suppliers of public telecommunications transport networks and services, in particular their ability to make their networks or services available to the public generally; or (b) to protect the technical integrity of public telecommunications transport networks or services.

  • Passwords and Employee Access Provider shall secure usernames, passwords, and any other means of gaining access to the Services or to Student Data, at a level suggested by Article 4.3 of NIST 800-63-3. Provider shall only provide access to Student Data to employees or contractors that are performing the Services. Employees with access to Student Data shall have signed confidentiality agreements regarding said Student Data. All employees with access to Student Records shall pass criminal background checks.

  • Access and Cooperation Each Party will, and will cause its Other Indemnified Persons to, cooperate and assist in all reasonable respects regarding such Third Party Claim, including by promptly making available to such other Party (and its legal counsel and other professional advisers with a reasonable need to know) all books and records of such Person relating to such Third Party Claim, subject to reasonable confidentiality precautions.

  • Data Access and Proprietary Information 6.1 The Fund acknowledges that the databases, computer programs, screen formats, report formats, interactive design techniques, and documentation manuals furnished to the Fund by the Transfer Agent as part of the Fund’s ability to access certain Fund Confidential Information maintained by the Transfer Agent on databases under the control and ownership of the Transfer Agent or other third party (“Data Access Services”) constitute copyrighted, trade secret, or other proprietary information of substantial value to the Transfer Agent or other third party (collectively, “Transfer Agent Proprietary Information”). In no event shall Transfer Agent Proprietary Information be deemed Fund Confidential Information. The Fund agrees to treat all Transfer Agent Proprietary Information as proprietary to the Transfer Agent and further agrees that it shall not divulge any Transfer Agent Proprietary Information to any person or organization except as may be provided hereunder. Without limiting the foregoing, the Fund agrees for itself and its employees and agents to: (a) Use such programs and databases (i) solely on the Fund’s computers or on computers of Federated Services Company or its affiliates (collectively, “Fund Computers”), or (ii) solely from equipment at the location agreed to between the Fund and the Transfer Agent and (iii) solely in accordance with the Transfer Agent’s applicable user documentation; (b) Refrain from copying or duplicating in any way (other than in the normal course of performing processing on the Fund Computers), the Transfer Agent Proprietary Information; (c) Refrain from obtaining unauthorized access to any portion of the Transfer Agent Proprietary Information, and if such access is inadvertently obtained, to inform Transfer Agent in a timely manner of such fact and dispose of such information in accordance with the Transfer Agent’s instructions; (d) Refrain from causing or allowing information transmitted from the Transfer Agent’s computer to the Fund’s terminal to be retransmitted to any other computer terminal or other device except as expressly permitted by the Transfer Agent (such permission not to be unreasonably withheld); (e) Allow the Fund to have access only to those authorized transactions as agreed to between the Fund and the Transfer Agent; and (f) Honor all reasonable written requests made by the Transfer Agent to protect at the Transfer Agent’s expense the rights of the Transfer Agent in the Transfer Agent Proprietary Information at common law, under federal copyright law and under other federal or state law. 6.2 The Fund shall take reasonable efforts to advise its employees of their obligations pursuant to this Section 6. The obligations of this Section shall survive any earlier termination of this Agreement. 6.3 If the Fund notifies the Transfer Agent that any of the Data Access Services do not operate in material compliance with the most recently issued user documentation for such services, the Transfer Agent shall use its best efforts in a timely manner to correct such failure. Organizations from which the Transfer Agent may obtain certain data included in the Data Access Services are solely responsible for the contents of such data and the Fund agrees to make no claim against the Transfer Agent arising out of the contents of such third-party data, including, but not limited to, the accuracy thereof; provided, however, that the Fund shall be entitled to insist that the Transfer Agent, and the Transfer Agent for the benefit of the Fund shall, enforce any and all rights under applicable contracts for the Data Access Services. SUBJECT TO THE FOREGOING OBLIGATIONS OF THE TRANSFER AGENT, DATA ACCESS SERVICES AND ALL COMPUTER PROGRAMS AND SOFTWARE SPECIFICATIONS USED IN CONNECTION THEREWITH ARE PROVIDED ON AN AS IS, AS AVAILABLE BASIS. EXCEPT AS OTHERWISE PROVIDED HEREIN TO THE CONTRARY, THE TRANSFER AGENT EXPRESSLY DISCLAIMS ALL WARRANTIES INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. 6.4 If the transactions available to the Fund include the ability to originate Proper Instructions through electronic instructions to the Transfer Agent in order to: (i) effect the transfer or movement of cash or Shares; or (ii) transmit Shareholder information or other information, then in such event the Transfer Agent shall be entitled to rely on the validity and authenticity of such Proper Instructions without undertaking any further inquiry as long as such Proper Instruction is undertaken in conformity with applicable security procedures.

  • Rights Protection Mechanisms and Abuse Mitigation ­‐ Registry Operator commits to implementing and performing the following protections for the TLD: i. In order to help registrars and registrants identify inaccurate data in the Whois database, Registry Operator will audit Whois data for accuracy on a statistically significant basis (this commitment will be considered satisfied by virtue of and for so long as ICANN conducts such audits). ii. Work with registrars and registrants to remediate inaccurate Whois data to help ensure a more accurate Whois database. Registry Operator reserves the right to cancel a domain name registration on the basis of inaccurate data, if necessary. iii. Establish and maintain a Domains Protected Marks List (DPML), a trademark protection service that allows rights holders to reserve registration of exact match trademark terms and terms that contain their trademarks across all gTLDs administered by Registry Operator under certain terms and conditions. iv. At no cost to trademark holders, establish and maintain a Claims Plus service, which is a notice protection mechanism that begins at the end of ICANN’s mandated Trademark Claims period. v. Bind registrants to terms of use that define and prohibit illegal or abusive activity. vi. Limit the use of proxy and privacy registration services in cases of malfeasance. vii. Consistent with the terms of this Registry Agreement, reserve the right to exclude from distribution any registrars with a history of non-­‐compliance with the terms of the Registrar Accreditation Agreement. viii. Registry Operator will be properly resourced to perform these protections.

  • ACCESS AND COOPERATION; DUE DILIGENCE (i) Between the date of this Agreement and the Closing Date, the COMPANY will afford to the officers and authorized representatives of URSI and the Founding Companies other than the COMPANY access to all of the COMPANY's (including the COMPANY's Subsidiaries) key employees, sites, properties, books and records and will furnish URSI with such additional financial and operating data and other information as to the business and properties of the COMPANY (including the COMPANY's Subsidiaries) as URSI or the Founding Companies other than the COMPANY may from time to time reasonably request. The COMPANY will cooperate with URSI and the Founding Companies other than the COMPANY, its representatives, auditors and counsel in the preparation of any documents or other material which may be required in connection with any documents or materials required by this Agreement. URSI, the STOCKHOLDERS and the COMPANY will treat all information obtained in connection with the negotiation and performance of this Agreement or the due diligence investigations conducted with respect to the Founding Companies other than the COMPANY as confidential in accordance with the provisions of Section 14 hereof. In addition, URSI will cause each of the Founding Companies other than the COMPANY to enter into a provision similar to this Section 7.1 requiring each such Founding Company to keep confidential any information obtained by such Founding Company. (ii) Between the date of this Agreement and the Closing Date, URSI will afford to the officers and authorized representatives of the COMPANY access to all of URSI's sites, properties, books and records and will furnish the COMPANY with such additional financial and operating data and other information as to the business and properties of URSI as the COMPANY may from time to time reasonably request. URSI will cooperate with the COMPANY, its representatives, engineers, auditors and counsel in the preparation of any documents or other material which may be required in connection with any documents or materials required by this Agreement. The COMPANY will cause all information obtained in connection with the negotiation and performance of this Agreement to be treated as confidential in accordance with the provisions of Section 14 hereof.

  • Access to Information Systems Access, if any, to DXC’s Information Systems is granted solely to perform the Services under this Order, and is limited to those specific DXC Information Systems, time periods and personnel as are separately agreed to by DXC and Supplier from time to time. DXC may require Supplier’s employees, subcontractors or agents to sign individual agreements prior to access to DXC’s Information Systems. Use of DXC Information Systems during other time periods or by individuals not authorized by DXC is expressly prohibited. Access is subject to DXC business control and information protection policies, standards and guidelines as may be modified from time to time. Use of any other DXC Information Systems is expressly prohibited. This prohibition applies even when an DXC Information System that Supplier is authorized to access, serves as a gateway to other Information Systems outside Supplier’s scope of authorization. Supplier agrees to access Information Systems only from specific locations approved for access by DXC. For access outside of DXC premises, DXC will designate the specific network connections to be used to access Information Systems.

  • Parent Right to Access and Challenge Student Data The LEA shall establish reasonable procedures pursuant to which a parent, as that term is defined in 105 ILCS 10/2(g), may inspect and/or copy Student Data and/or challenge the accuracy, relevance or propriety of Student Data, pursuant to Sections 5 and 7 of ISSRA (105 ILCS 10/5; 105 ILCS 10/7) and Section 33 of SOPPA (105 ILCS 85/33). The Provider shall respond to any request by the LEA for Student Data in the possession of the Provider when Provider cooperation is required to afford a parent an opportunity to inspect and/or copy the Student Data, no later than 5 business days from the date of the request. In the event that a parent contacts the Provider directly to inspect and/or copy Student Data, the Provider shall refer the parent to the LEA, which shall follow the necessary and proper procedures regarding the requested Student Data.

  • Data Protection Impact Assessment and Prior Consultation Processor shall provide reasonable assistance to the Company with any data protection impact assessments, and prior consultations with Supervising Authorities or other competent data privacy authorities, which Company reasonably considers to be required by article 35 or 36 of the GDPR or equivalent provisions of any other Data Protection Law, in each case solely in relation to Processing of Company Personal Data by, and taking into account the nature of the Processing and information available to, the Contracted Processors.

  • Access and Confidentiality (a) Until the earlier of the Closing Date and the date on which this Agreement is terminated pursuant to Article 10, Seller shall afford to Purchaser and its officers and authorized agents and representatives reasonable access during normal business hours to the properties, books, records, contracts, documents, files and other information of or relating to the Assets and the Assumed Liabilities; provided, however, that nothing herein shall afford Purchaser the right to review any information to the extent relating solely to loans held by Seller not constituting Loans, including information regarding borrowers, or any information to the extent relating solely to Seller’s other branches, facilities and operations not subject to this Agreement. Seller shall identify to Purchaser, within fifteen (15) calendar days after the date hereof, a group of its salaried personnel (with the necessary expertise and experience to assist Purchaser) that shall constitute a “transition group” who will be available to Purchaser at reasonable times during normal business hours to provide information and assistance in connection with Purchaser’s investigation of matters relating to the Assets, the Assumed Liabilities and transition matters. Such transition group will also work cooperatively to identify and resolve issues arising from any commingling of Records with Seller’s records for its other branches, assets and operations not subject to this Agreement. Seller shall furnish Purchaser with such additional financial and operating data and other information about its business operations at the Branches as may be reasonably necessary for the orderly transfer of the business operations of the Branches and any mutually agreeable cooperative customer retention effort; provided, however, that nothing herein shall afford Purchaser the right to review any information relating to loans held by Seller not constituting Loans, including information regarding borrowers or any information relating to Seller’s other branches, facilities and operations not subject to this Agreement. Any investigation pursuant to this Section 7.2(a) shall be conducted in such manner as not to unreasonably interfere with the conduct of Seller’s business. Notwithstanding the foregoing, Seller shall not be required to provide access to or disclose information where such access or disclosure would impose an unreasonable burden on Seller, or any employee of Seller, or would violate or prejudice the rights of customers, jeopardize any attorney-client privilege or contravene any law, rule, regulation, order, judgment, decree, fiduciary duty or binding agreement entered into and disclosed to Purchaser prior to the date of this Agreement. Seller and Purchaser shall use Commercially Reasonable Efforts to make appropriate substitute disclosure arrangements under circumstances in which the restrictions of the preceding sentence apply. (b) From and after the Closing, Seller shall keep confidential non-public information in its possession (other than information which was or becomes available to Seller on a non-confidential basis from a source other than Purchaser or any of its Affiliates) relating to Purchaser, its Affiliates, the Branches, the Assets and the Assumed Liabilities; provided, however, that Seller shall not be liable hereunder with respect to any disclosure to the extent such disclosure is required pursuant to legal process (including pursuant to the assertion of Seller’s rights under this Agreement) (by interrogatories, subpoena, civil investigative demand or similar process), regulatory process or request, or to the extent such disclosure is reasonably necessary for purposes of compliance by Seller or its Affiliates with tax or regulatory reporting requirements; provided that in the event of any disclosure pursuant to legal process Seller exercises Commercially Reasonable Efforts to preserve the confidentiality of the non-public information disclosed, including by cooperating with Purchaser to obtain an appropriate protective order or other reliable assurance that confidential treatment will be accorded the non-public information required to be disclosed. (c) From and after the Closing, Purchaser shall keep confidential non-public information in its possession (other than information which was or becomes available to Purchaser on a non-confidential basis from a source other than Seller or any of its Affiliates) relating to Seller and its Affiliates other than the Branches, the Assets and the Assumed Liabilities; provided, however that Purchaser shall not be liable hereunder with respect to any disclosure to the extent such disclosure is required pursuant to legal process (including pursuant to the assertion of Purchaser’s rights under this Agreement) (by interrogatories, subpoena, civil investigative demand or similar process) or regulatory process or request; provided that in the event of any disclosure pursuant to legal process Purchaser exercises Commercially Reasonable Efforts to preserve the confidentiality of the non-public information disclosed, including by cooperating with Seller to obtain an appropriate protective order or other reliable assurance that confidential treatment will be accorded the non-public information required to be disclosed.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!