Access Protocol Sample Clauses

Access Protocol. The T-Mobile Information provided to the Bank Purchasing Agent will be made available through a secured file transfer protocol (“SFTP”) website on the T-Mobile network. Bank Purchasing Agent will be provided with authentication and login credentials by Funding Seller or its affiliates to access the SFTP website and securely obtain the T-Mobile Information. In addition, Funding Seller or its affiliates will provide Bank Purchasing Agent with an email notice monthly when new T-Mobile Information has been posted to the SFTP website and is available to be accessed by the Bank Purchasing Agent. (A) We refer to that certain Master Receivables Purchase Agreement, dated as of February 26, 2014, by and among T-Mobile US, Inc. (“TMUS”), T-Mobile PCS Holdings LLC (“PCS” or the “Servicer”), T-Mobile Airtime Funding LLC (the “Funding Seller”), Billing Gate One LLC (“Billing Gate One”), and Landesbank Hessen-Thüringen Girozentrale (“Helaba”) in its capacity as “Bank Purchasing Agent” thereunder (as amended, restated, supplemented or otherwise modified from time to time, the “Master Receivables Purchase Agreement”); and that certain Onward Receivables Purchase Agreement, dated as of February 26, 2014, by and among Billing Gate One, the “Bank Purchasers” from time to time party thereto, and the Bank Purchasing Agent (as amended, restated, supplemented or otherwise modified from time to time, the “Onward Receivables Purchase Agreement”). The transactions contemplated by the Master Receivables Purchase Agreement, the Onward Receivables Purchase Agreement and the other Transaction Documents (as such term is defined in the Master Receivables Purchase Agreement) are collectively referred to herein as the “Transaction.” Each capitalized term that is used, but not defined herein, shall have the meaning prescribed by the Master Receivables Purchase Agreement and/or the Onward Receivables Purchase Agreement. (B) This guarantee (this “Guarantee”) is the “DT Payment Guarantee” (as such term is defined in the Master Receivables Purchase Agreement), and is being delivered to each of the Purchasing Entities in connection with Section 11.4(i) of the Master Receivables Purchase Agreement. We, Deutsche Telekom AG, a corporation (Aktiengesellschaft) incorporated under the laws of Germany, registered in the commercial register kept at the local court of Bonn, Germany, under registration number HRB 6794, with its business address at Xxxxxxxxx-Xxxxx Xxxxx 00, 00000 Xxxx (the “Guarantor”), her...
AutoNDA by SimpleDocs
Access Protocol. 6.1.1 In accordance with a Participant’s internal protocol for access to the SCA Network (the "Access Protocol"), only Authorized Users will be granted access to the SCA Network. The Participants agree that the Access Protocol will, among other items, require that each Authorized User has: 6.1.1.1 access to Client Data in the SCA Network only for the purposes of performing his or her role and duties for the SCA Program; 6.1.1.2 entered into a written confidentiality agreement with respect to Client Data accessed through the SCA Network; 6.1.1.3 undergone the requisite training to use the SCA Network; 6.1.1.4 undergone privacy and security training; and 6.1.1.5 agreed to comply with the terms and conditions set out by the Electronic Service Provider prior to being granted access to the SCA Network (the “Participant Licensing Agreement”). 6.1.2 No Participant shall grant access to the SCA Network to an Authorized User unless such person has met all the requirements set out in its Access Protocol. 6.1.3 Each Participant agrees that making available Client Data to the SCA Network in accordance with the provisions of this Agreement shall entitle the Authorized Users to access such Client Data and that, if a Client withdraws their consent, the Client Data shall no longer be available to the Authorized Users as described on the SCA Website but may continue to be accessed by the Centre, in its capacity as a HINP and Agent, solely for the purposes of providing the Services. 6.1.4 The Authorized User Terms and Conditions may be modified as may be appropriate or necessary in light of new developments and changes, which include but is not limited to legislative or regulatory changes. A copy of such revised Authorized User Terms and Conditions will be provided to each Participant, and will be modified on the log on page of the SCA Network. The Participants must ensure that Authorized Users agree to Participant Licensing Agreement, as presented on the SCA Network log on page, before they can access the SCA Network. 6.1.5 If a Participant revokes or suspends an Authorized User's right of access to Client Data, such Participant shall at the same time revoke or suspend, as the case may be, such Authorized User's access to the SCA Network. 6.1.6 If such suspension or revocation as described in section 6.1.5 is the result of an actual or alleged Privacy Breach by such Authorized User, the Participant must follow the Privacy and Security Incident Management Process set out in...
Access Protocol. (a) Between (and including) the date of this deed and the Implementation Date, Veda will provide Bidder with limited access to senior executives and information of Veda in accordance with the Access Protocol approved by the Veda Board and initialled by the parties as at the date of this deed. (b) Both parties will comply with the terms of the Access Protocol.
Access Protocol. The Company's rights under this clause 2 in respect of any part or parts of the Project Site or the Temporary Areas commence upon the later of: (a) the date specified as the "Earliest Access Date" in the Site Access Schedule; and (b) the date which is 10 Business Days after the receipt by RTA of written notice from the Company that the Company is exercising its rights under this clause 2 in respect of such parts of the Project Site or the Temporary Areas (as applicable).
Access Protocol. The T-Mobile Information provided to the Bank Purchasing Agent will be made available through a secured file transfer protocol (“SFTP”) website on the T-Mobile network. Bank Purchasing Agent will be provided with authentication and login credentials by Funding Seller or its affiliates to access the SFTP website and securely obtain the T-Mobile Information. In addition, Funding Seller or its affiliates will provide Bank Purchasing Agent with an email notice monthly when new T-Mobile Information has been posted to the SFTP website and is available to be accessed by the Bank Purchasing Agent.
Access Protocol. In connection with Vendor’s access to and use of files within the Company’s computer system (the “System”), only those Vendor Employee’s who have been delegated to perform the Services, and meet the necessary back ground and drug testing requirements hereunder will have access to the System. Access will be directly supervised by both Vendor and the Company’s management. Access will be determined by the Company.
AutoNDA by SimpleDocs
Access Protocol. The parties will comply with the Access Protocol.
Access Protocol 

Related to Access Protocol

  • Protocol The attached Protocol shall be an integral part of this Agreement.

  • Review Protocol A narrative description of how the Claims Review was conducted and what was evaluated.

  • Terms of Use The Clean Energy Council Limited (CEC) owns all intellectual property rights in the Solar PV Sale and Installation Agreement (Agreement).

  • Signaling protocol The Parties will interconnect their networks using SS7 signaling where Technically Feasible and available as defined in GR 905 Telcordia Standards including ISDN User Part (ISUP) for trunk signaling and TCAP for CCS-based features in the Interconnection of their networks. All Network Operations Forum (NOF) adopted standards shall be adhered to. Where available, CenturyLink signaling services to link its Signaling Transfer Points (STPs) for CLEC switches which connect to CenturyLink’s STPs via “A” links or for CLEC’s STPs to connect to CenturyLink’s STPs via “D” links which are dedicated to the transport of signaling for local Interconnection, may be ordered from the CenturyLink Tariff.

  • Access to Review Materials The Servicer will give the Asset Representations Reviewer access to the Review Materials for all of the Subject Receivables within sixty (60) calendar days after receipt of the review notice in one or more of the following ways in the Servicer’s reasonable discretion: (i) by electronic posting of Review Materials to a password-protected website to which the Asset Representations Reviewer has access, (ii) by providing originals or photocopies of documents relating to the Subject Receivables at one of the properties of the Servicer or (iii) in another manner agreed by the Servicer and the Asset Representations Reviewer. The Servicer may redact or remove PII from the Review Materials so long as all information in the Review Materials necessary for the Asset Representations Reviewer to complete the Asset Review remains intact and unchanged.

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • Proposed Policies and Procedures Regarding New Online Content and Functionality By October 31, 2017, the School will submit to OCR for its review and approval proposed policies and procedures (“the Plan for New Content”) to ensure that all new, newly-added, or modified online content and functionality will be accessible to people with disabilities as measured by conformance to the Benchmarks for Measuring Accessibility set forth above, except where doing so would impose a fundamental alteration or undue burden. a) When fundamental alteration or undue burden defenses apply, the Plan for New Content will require the School to provide equally effective alternative access. The Plan for New Content will require the School, in providing equally effective alternate access, to take any actions that do not result in a fundamental alteration or undue financial and administrative burdens, but nevertheless ensure that, to the maximum extent possible, individuals with disabilities receive the same benefits or services as their nondisabled peers. To provide equally effective alternate access, alternates are not required to produce the identical result or level of achievement for persons with and without disabilities, but must afford persons with disabilities equal opportunity to obtain the same result, to gain the same benefit, or to reach the same level of achievement, in the most integrated setting appropriate to the person’s needs. b) The Plan for New Content must include sufficient quality assurance procedures, backed by adequate personnel and financial resources, for full implementation. This provision also applies to the School’s online content and functionality developed by, maintained by, or offered through a third-party vendor or by using open sources. c) Within thirty (30) days of receiving OCR’s approval of the Plan for New Content, the School will officially adopt, and fully implement the amended policies and procedures.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Changes to Specifications All Specifications and any changes thereto agreed to by the parties from time to time shall be in writing, dated and signed by the parties. Any change to the Process shall be deemed a Specification change. No change in the Specifications shall be implemented by Catalent, whether requested by Client or requested or required by any Regulatory Authority, until the parties have agreed in writing to such change, the implementation date of such change, and any increase or decrease in costs, expenses or fees associated with such change (including any change to Unit Pricing). Catalent shall respond promptly to any request made by Client for a change in the Specifications, and both parties shall use commercially reasonable, good faith efforts to agree to the terms of such change in a timely manner. As soon as possible after a request is made for any change in Specifications, Catalent shall notify Client of the costs associated with such change and shall provide such supporting documentation as Client may reasonably require. Client shall pay all costs associated with such agreed upon changes. If there is a conflict between the terms of this Agreement and the terms of the Specifications, this Agreement shall control. Catalent reserves the right to postpone effecting changes to the Specifications until such time as the parties agree to and execute the required written amendment.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!