Access to NID 2.7.3.1 NewPhone may access the customer’s premises wiring by any of the following means and NewPhone shall not disturb the existing form of electrical protection and shall maintain the physical integrity of the NID: 2.7.3.1.1 BellSouth shall allow NewPhone to connect its Loops directly to BellSouth’s multi-line residential NID enclosures that have additional space and are not used by BellSouth or any other telecommunications carriers to provide service to the premises; 2.7.3.1.2 Where an adequate length of the customer’s premises wiring is present and environmental conditions permit, either Party may remove the customer premises wiring from the other Party’s NID and connect such wiring to that Party’s own NID; 2.7.3.1.3 Either Party may enter the subscriber access chamber or dual chamber NID enclosures for the purpose of extending a cross-connect or spliced jumper wire from the customer premises wiring through a suitable “punch-out” hole of such NID enclosures; or 2.7.3.1.4 NewPhone may request BellSouth to make other rearrangements to the customer premises wiring terminations or terminal enclosure on a time and materials cost basis. 2.7.3.2 In no case shall either Party remove or disconnect the other Party’s loop facilities from either Party’s NIDs, enclosures, or protectors unless the applicable Commission has expressly permitted the same and the disconnecting Party provides prior notice to the other Party. In such cases, it shall be the responsibility of the Party disconnecting loop facilities to leave undisturbed the existing form of electrical protection and to maintain the physical integrity of the NID. It will be NewPhone’s responsibility to ensure there is no safety hazard, and NewPhone will hold BellSouth harmless for any liability associated with the removal of the BellSouth Loop from the BellSouth NID. Furthermore, it shall be the responsibility of the disconnecting Party, once the other Party’s loop has been disconnected from the NID, to reconnect the disconnected loop to a nationally recognized testing laboratory listed station protector, which has been grounded as per Article 800 of the National Electrical Code. If no spare station protector exists in the NID, the disconnected loop must be appropriately cleared, capped and stored. 2.7.3.3 NewPhone shall not remove or disconnect ground wires from BellSouth’s NIDs, enclosures, or protectors. 2.7.3.4 NewPhone shall not remove or disconnect NID modules, protectors, or terminals from BellSouth’s NID enclosures. 2.7.3.5 Due to the wide variety of NID enclosures and outside plant environments, BellSouth will work with NewPhone to develop specific procedures to establish the most effective means of implementing this section if the procedures set forth herein do not apply to the NID in question.
Access to Site 3.05.1 Contractor may enter and leave the premises at all reasonable times without charge. Contractor and its employees may use the common areas and roadways of the premises where it is to perform the services together with all facilities, equipment, improvements, and services provided in connection with the premises for common use. This excludes parking for Contractor’s personnel. Contractor shall repair any damage caused by it or its employees as a result of its use of the common areas.
Access to PHI Business Associate shall provide access to PHI in a Designated Record Set to Covered Entity or as directed by Covered Entity to an Individual to meet the requirements under 45 CFR § 164.524. Business Associate shall provide such access in the time and manner reasonably designated by Covered Entity. Within three (3) business days, Business Associate shall forward to Covered Entity for handling any request for access to PHI that Business Associate directly receives from an Individual.
Access to the Site 22.1 The Contractor shall allow the Engineer and any person authorized by the Engineer access to the Site, to any place where work in connection with the Contract is being carried out or is intended to be carried out and to any place where materials or plant are being manufactured / fabricated / assembled for the works.
Access to Information Systems Access, if any, to DXC’s Information Systems is granted solely to perform the Services under this Order, and is limited to those specific DXC Information Systems, time periods and personnel as are separately agreed to by DXC and Supplier from time to time. DXC may require Supplier’s employees, subcontractors or agents to sign individual agreements prior to access to DXC’s Information Systems. Use of DXC Information Systems during other time periods or by individuals not authorized by DXC is expressly prohibited. Access is subject to DXC business control and information protection policies, standards and guidelines as may be modified from time to time. Use of any other DXC Information Systems is expressly prohibited. This prohibition applies even when an DXC Information System that Supplier is authorized to access, serves as a gateway to other Information Systems outside Supplier’s scope of authorization. Supplier agrees to access Information Systems only from specific locations approved for access by DXC. For access outside of DXC premises, DXC will designate the specific network connections to be used to access Information Systems.
Access to Data Operator shall make Data in the possession of the Operator available to the LEA within five (5) business days of a request by the LEA.
Access to Work District representatives shall at all times have access to the Work, wherever it is, in preparation or in progress. Contractor shall provide safe and proper facilities for such access.
Access to Books and Records (a) The Borrower and the Guarantors will make and keep books, records and accounts in which full, true and correct entries in conformity with GAAP are made of all financial dealings and transactions in relation to its business and activities, including, without limitation, an accurate and fair reflection of the transactions and dispositions of the assets of the Borrower and the Guarantors. (b) The Borrower and the Guarantors will permit, to the extent not prohibited by applicable law or contractual obligations, any representatives designated by the Administrative Agent or the Collateral Trustee or any Governmental Authority that is authorized to supervise or regulate the operations of a Lender, as designated by such Lender, upon reasonable prior written notice and, so long as no Event of Default has occurred and is continuing, at no out-of-pocket cost to the Borrower and the Guarantors, to (x) visit and inspect the Collateral and the properties of the Borrower and the Guarantors, (y) examine its books and records, and (z) discuss its affairs, finances and condition with its officers and independent accountants, all at such reasonable times during normal business hours and as often as reasonably requested (it being understood that a representative of the Borrower will be present) subject to any restrictions in any applicable Collateral Document; provided that if an Event of Default has occurred and is continuing, the Borrower and the Guarantors shall be responsible for the reasonable costs and expenses of any visits of the Administrative Agent, the Collateral Trustee and the Lenders, acting together (but not separately); provided, further, that with respect to Collateral and matters relating thereto, the rights of Administrative Agent, the Collateral Trustee and the Lenders under this Section 5.13 shall, subject to the inspection provisions of the applicable Collateral Documents, be limited to the following: upon the request of the Administrative Agent or the Collateral Trustee, the applicable Grantor will permit the Administrative Agent and/or the Collateral Trustee or any of its agents or representatives, at reasonable times and intervals upon reasonable prior notice, to (x) visit during normal business hours its offices, sites and properties and (y) inspect any documents relating to (i) the existence of such Collateral, (ii) with respect to Collateral other than Pledged Routes, Pledged Slots and Pledged Gate Leaseholds, the condition of such Collateral, and (iii) the validity, perfection and priority of the Liens on such Collateral, and to discuss such matters with its officers, except to the extent the disclosure of any such document or any such discussion would result in the applicable Grantor’s violation of its contractual or legal obligations. All confidential or proprietary information obtained in connection with any such visit, inspection or discussion shall be held confidential by the Administrative Agent, the Collateral Trustee and each of their respective agents and representatives and shall not be furnished or disclosed by any of them to anyone other than their respective bank examiners, auditors, accountants, agents and legal counsel, and except as may be required by any court or administrative agency or by any statute, rule, regulation or order of any Governmental Authority.
Access to Bank's Records (a) Bank shall create and maintain all records relating to its activities and obligations under this Agreement in such manner as will meet the obligations of Customer under the 1940 Act, with particular attention to Section 31 thereof and rules 31a-1 and 31a-2 thereunder. All such records shall be property of Customer. Bank will allow Customer's duly authorized officers, employees, and agents, including Customer's independent public accountants, and the employees and agents of the SEC access at all times during the regular business hours of Bank to such records. Except, in the case of access by the SEC as otherwise required by the SEC, such access will be subject to reasonable notice to Bank. Subject to restrictions under Applicable Law, Bank also will obtain an undertaking to permit Customer's independent public accountants reasonable access to the records of any Subcustodian of Securities held in the Securities Account as may be required in connection with such examination. (b) In addition, Bank shall cooperate with and supply necessary information to any entity or entities appointed by the Customer to keep its books of account and/or compute its net asset value. Bank shall provide reports and other data as Customer may from time to time reasonably request to enable Customer to obtain, from year to year, favorable opinions from Customer's independent accountants with respect to Bank's activities hereunder in connection with (i) the preparation of any registration statement of Customer and any other reports required by a governmental agency or regulatory authority with jurisdiction over the Fund, and (ii) the fulfillment by Customer of any other requirements of a governmental agency or regulatory authority with jurisdiction over the Fund. (c) Upon reasonable request of Customer, Bank shall provide Customer with a copy of Bank's Service Organizational Control (SOC) 1 reports (or any successor reports) prepared in accordance with the requirements of AT-C section 320, Reporting on an Examination of Controls at a Service Organization Relevant to User Entities' Internal Control Over Financial Reporting (or any successor attestation standard). In addition, from time to time as requested, Bank will furnish Customer a "gap" or "bridge" letter that will address any material changes that might have occurred in Customer's controls covered in the SOC Report from the end of the SOC Report period through a specified requested date. Bank shall use commercially reasonable efforts to provide Customer with such reports as Customer may reasonably request or otherwise reasonably require to fulfill its duties under Rule 38a-l of the 1940 Act or similar legal and regulatory requirements. Upon reasonable request by Customer, Bank shall also provide to Customer customary sub- certifications in connection with Xxxxxxxx-Xxxxx Act of 2002 certification requirements. Upon written request, Bank shall provide Customer with information about Bank's processes for the management and monitoring of Subcustodians for safeguarding Financial Assets.
Access to the Services ID’s for access to Vendor Core Research and Analyst Inquiry may not be shared. Access to the Services is restricted to the number of named individuals (each a “Licensed User”) as identified in the Customer Purchase Order.