Access Requested To Sample Clauses

Access Requested To. Enter the Building Name(s), Room Number(s) or Door Number(s) for which access is needed. e.g., Engineering/ 41CS 406, Student Union / RH 310, etc… Enter the key number needed if known.
AutoNDA by SimpleDocs
Access Requested To. Enter the Building Name(s), Room Number(s) or Door Number(s) for which access is needed.

Related to Access Requested To

  • Access Requests (a) Each party agrees to reasonably cooperate with the other in connection with requests to access or amend Personal Data.

  • Access Requirements You will be responsible for providing the System to enable you to use an Electronic Service.

  • Access Control Supplier will maintain an appropriate access control policy that is designed to restrict access to Accenture Data and Supplier assets to authorized Personnel. Supplier will require that all accounts have complex passwords that contain letters, numbers, and special characters, be changed at least every 90 days, and have a minimum length of 8 characters.

  • Bona Fide Request/New Business Request Process for Further Unbundling 6.1 BellSouth shall, upon request of <<customer_name>>, provide to <<customer_name>> access to its network elements at any technically feasible point for the provision of <<customer_name>>'s telecommunications service where such access is necessary and failure to provide access would impair the ability of <<customer_name>> to provide services that it seeks to offer. Any request by <<customer_name>> for access to a network element, interconnection option, or for the provisioning of any service or product that is not already available shall be treated as a Bona Fide Request/New Business Request (BFR/NBR), and shall be submitted to BellSouth pursuant to the BFR/NBR process.

  • Possibility of Declining a Request 1. The requested Party shall not be required to obtain or provide information that the applicant Party would not be able to obtain under its own laws for purposes of the administration or enforcement of its own tax laws. The competent authority of the requested Party may decline to assist where the request is not made in conformity with this Agreement.

  • Access to the Work The Design Professional and its representatives shall have access to the Work at all times while it is in progress, and shall comply with all job site safety rules.

  • Access Controls a. Authorized Access - DST shall have controls that are designed to maintain the logical separation such that access to systems hosting Fund Data and/or being used to provide services to Fund will uniquely identify each individual requiring access, grant access only to authorized personnel based on the principle of least privileges, and prevent unauthorized access to Fund Data.

  • Technical Feasibility of String While ICANN has encouraged and will continue to encourage universal acceptance of all top-­‐level domain strings across the Internet, certain top-­‐level domain strings may encounter difficulty in acceptance by ISPs and webhosters and/or validation by web applications. Registry Operator shall be responsible for ensuring to its satisfaction the technical feasibility of the TLD string prior to entering into this Agreement.

  • Physical Access Control Unauthorized persons are prevented from gaining physical access to premises, buildings or rooms where data processing systems that process and/or use Personal Data are located.

  • Access to the Workplace Union health and safety staff or Union consultants shall be provided access to the workplace and to attend meetings of the committee or Union committee or for inspecting, investigating or monitoring the workplace.

Time is Money Join Law Insider Premium to draft better contracts faster.