Access and Records A. County, the State of California and the United States Government and/or their representatives, shall have access, for purposes of monitoring, auditing, and examining, to Subrecipient’s activities, books, documents and papers (including computer records and emails) and to records of Subrecipient’s subcontractors, consultants, contracted employees, bookkeepers, accountants, employees and participants related to this Contract. Subrecipient shall insert this condition in each Contract between Subrecipient and a subcontractor that is pursuant to this Contract shall require the subcontractor to agree to this condition. Such departments or representatives shall have the right to make excerpts, transcripts and photocopies of such records and to schedule on site monitoring at their discretion. Monitoring activities also may include, but are not limited to, questioning employees and participants and entering any premises or onto any site in which any of the services or activities funded hereunder are conducted or in which any of the records of Subrecipient are kept. Subrecipient shall make available its books, documents, papers, financial records, etc., within three (3) days after receipt of written demand by Director which shall be deemed received upon date of sending. In the event Subrecipient does not make the above referenced documents available within the County of Orange, California, Subrecipient agrees to pay all necessary and reasonable expenses incurred by County, or County’s designee, in conducting any audit at the location where said records and books of account are maintained.
Access and Use 1. Each Party shall ensure that enterprises of the other Party have access to and use of any public telecommunications network or service, including leased circuits, offered in its territory or across its borders on a timely basis and on terms and conditions that are reasonable and non-discriminatory such as those set out in paragraphs 2 to 6.
Access and Retention of Records Contractor agrees to provide the department, Legislative Auditor, or their authorized agents, access to any records necessary to determine contract compliance. (Section 18-1-118, MCA). Contractor agrees to create and retain records supporting the services rendered or supplies delivered for a period of eight years after either the completion date of the contract or the conclusion of any claim, litigation, or exception relating to the contract taken by the State of Montana or third party.
Personal Data, Confidentiality, Recording of Telephone Calls and Records 22.1. The Company may collect client information directly from the Client (in his completed Account Opening Application Form or otherwise) or from other persons including, for example, the credit reference agencies, fraud prevention agencies, banks, other financial institutions, third authentication service providers and the providers of public registers.
Ingress and Egress Seller represents that there is ingress and egress to the Real Property and title to 400 the Real Property is insurable in accordance with STANDARD A without exception for lack of legal right of access.
Zone File Access Agreement Registry Operator will enter into an agreement with any Internet user, which will allow such user to access an Internet host server or servers designated by Registry Operator and download zone file data. The agreement will be standardized, facilitated and administered by a Centralized Zone Data Access Provider, which may be ICANN or an ICANN designee (the “CZDA Provider”). Registry Operator (optionally through the CZDA Provider) will provide access to zone file data per Section 2.1.3 of this Specification and do so using the file format described in Section 2.1.4 of this Specification. Notwithstanding the foregoing, (a) the CZDA Provider may reject the request for access of any user that does not satisfy the credentialing requirements in Section 2.1.2 below; (b) Registry Operator may reject the request for access of any user that does not provide correct or legitimate credentials under Section 2.1.2 below or where Registry Operator reasonably believes will violate the terms of Section 2.1.5. below; and, (c) Registry Operator may revoke access of any user if Registry Operator has evidence to support that the user has violated the terms of Section 2.1.5 below.