Access by University Sample Clauses

Access by University. The Organizer and the Charter School shall permit access by any authorized representative, agent or contractor of the University to the Charter School premises at any time, with or without advance notice from the University, for the purpose of observing, reviewing or inspecting the Charter School for compliance with Applicable Law and the provisions of this Charter. Because the University has the responsibility of accrediting the Charter School, the Organizer and the Charter School upon request shall also take all reasonable steps to allow the University access to any and all data in the possession of the Organizer, the Charter School, the ESP, the Indiana Department of Education, and any other party holding data as to the performance of students at the Charter School.‌
AutoNDA by SimpleDocs
Access by University. Licensee shall permit access to the Private Facilities by University employees (including, without limitation, Environmental Health & Safety staff and College safety officers) and agents and by government officials at any time and for any reason. University will use reasonable efforts to provide reasonable prior notice to Licensee prior to accessing Private Facilities, except in cases of emergency. University may access Shared Facilities at any time, for any purpose.
Access by University. Licensee shall permit access to the Private Facilities by University staff and/or government officials upon request to conduct periodic environmental and safety inspections. The scope of such inspection may include, but not be limited to, testing and inspection of the HVAC system, laboratory exhaust venting system fume hoods, biological safety cabinets and any other Licensee equipment. University reserves the right to access the Private Facilities without notice in case of emergency. University may access Shared Facilities at any time, for any purpose.
Access by University. University shall have access to Startup Hall at all reasonable times for the purpose of making any alterations, repairs or improvements which University may deem necessary for the preservation of Startup Hall. Furthermore, Startup Hall may be moved or reconfigured at University’s sole discretion.
Access by University. 4.1 Access and Entry by University to the Property

Related to Access by University

  • Access to NID 2.17.3.1 TWTC may access the customer’s premises wiring by any of the following means and TWTC shall not disturb the existing form of electrical protection and shall maintain the physical integrity of the NID:

  • Research Use The Requester agrees that if access is approved, (1) the PI named in the DAR and (2) those named in the “Senior/Key Person Profile” section of the DAR, including the Information Technology Director and any trainee, employee, or contractor1 working on the proposed research project under the direct oversight of these individuals, shall become Approved Users of the requested dataset(s). Research use will occur solely in connection with the approved research project described in the DAR, which includes a 1-2 paragraph description of the proposed research (i.e., a Research Use Statement). Investigators interested in using Cloud Computing for data storage and analysis must request permission to use Cloud Computing in the DAR and identify the Cloud Service Provider (CSP) or providers and/or Private Cloud System (PCS) that they propose to use. They must also submit a Cloud Computing Use Statement as part of the DAR that describes the type of service and how it will be used to carry out the proposed research as described in the Research Use Statement. If the Approved Users plan to collaborate with investigators outside the Requester, the investigators at each external site must submit an independent DAR using the same project title and Research Use Statement, and if using the cloud, Cloud Computing Use Statement. New uses of these data outside those described in the DAR will require submission of a new DAR; modifications to the research project will require submission of an amendment to this application (e.g., adding or deleting Requester Collaborators from the Requester, adding datasets to an approved project). Access to the requested dataset(s) is granted for a period of one (1) year, with the option to renew access or close-out a project at the end of that year. Submitting Investigator(s), or their collaborators, who provided the data or samples used to generate controlled-access datasets subject to the NIH GDS Policy and who have Institutional Review Board (IRB) approval and who meet any other study specific terms of access, are exempt from the limitation on the scope of the research use as defined in the DAR.

  • Access to PHI Business Associate shall provide access to PHI in a Designated Record Set to Covered Entity or as directed by Covered Entity to an Individual to meet the requirements under 45 CFR § 164.524. Business Associate shall provide such access in the time and manner reasonably designated by Covered Entity. Within three (3) business days, Business Associate shall forward to Covered Entity for handling any request for access to PHI that Business Associate directly receives from an Individual.

  • Access to Services 1. Subject to DHCS provider enrollment certification requirements, the Contractor shall maintain continuous availability and accessibility of covered services and facilities, service sites, and personnel to provide the covered services through use of DMC certified providers. Such services shall not be limited due to budgetary constraints.

  • Joint Network Implementation and Grooming Process Upon request of either Party, the Parties shall jointly develop an implementation and grooming process (the “Joint Grooming Process” or “Joint Process”) which may define and detail, inter alia:

  • Access to Software Access Rights to Software which is Results shall comprise: Access to the Object Code; and, where normal use of such an Object Code requires an Application Programming Interface (hereafter API), Access to the Object Code and such an API; and, if a Party can show that the execution of its tasks under the Project or the Exploitation of its own Results is technically or legally impossible without Access to the Source Code, Access to the Source Code to the extent necessary. Background shall only be provided in Object Code unless otherwise agreed between the Parties concerned.

Time is Money Join Law Insider Premium to draft better contracts faster.