Access to Other Servers Sample Clauses

Access to Other Servers. HortonWorks access to the QE Servers, Sandbox Servers, Research Servers and Production Servers (i) will be limited to work performed by HortonWorks in connection with the Yahoo Services for Yahoo’s benefit, (ii) will only take place via Yahoo-monitored Supervised Access Sessions (“buddy system”), and (iii) must be arranged with a Yahoo designated supervisor for Supervised Access Sessions in advance (including articulating a basis for and proposed scope for requesting such access), except in the case of addressing P0 Errors, P1 Errors or a Security Issue, where Yahoo and HortonWorks will cooperate to arrange for Yahoo-monitored Supervised Access Session as appropriate to meet applicable service levels for such incidents. As part of the Supervised Access Sessions, Yahoo will initiate a shared desktop session from which both Yahoo personnel and HortonWorks Personnel can co-browse the session. The sessions will be required to come from a Yahoo machine, Yahoo personnel will monitor the session (including the right to record the session via audio and/or video), and at all times Yahoo will control the state of the session, including the ability to modify, suspend or terminate the session at anytime. Yahoo will determine the appropriate tools for such support sessions (e.g., Adobe Connect), including the right to change such tools from time to time at its sole discretion. Yahoo will make a list of Yahoo’s designated supervisor for Supervised Access Sessions available to HortonWorks. Furthermore, HortonWorks agrees not to take any screen shots, video or audio recording of, or otherwise attempt to retain any Confidential Information embodied in or accessible or viewable from, the QE Servers, Sandbox Servers, Research Servers and Production Servers. HortonWorks will ensure that no code, software, or data belonging to a third party will be stored on any of the QE Servers, Sandbox Servers, Research Servers or Production Servers without express written pre-approval by a Yahoo personnel specifically identified by Yahoo in advance as authorized to review such code. HortonWorks will not take any action via access to the QE Servers, Sandbox Servers, Research Servers, or Production Servers that materially adversely affects the Supported Hadoop Software or Yahoo’s systems.
AutoNDA by SimpleDocs

Related to Access to Other Servers

  • Links to Other Sites Information that Institution publishes on the World Wide Web may contain links to other sites and third parties may establish links to Institution’s site. Institution makes no representations about any other web site that you may access to, from or through this site. Unless expressly stated in writing, Institution does not endorse the products or services offered by any company or person linked to this site nor is Institution responsible for any software or the content of any information published on the site of any third party. You should take precautions when downloading files from sites to protect your computer software and data from viruses and other destructive programs.

  • Access to PHI Business Associate shall provide access to PHI in a Designated Record Set to Covered Entity or as directed by Covered Entity to an Individual to meet the requirements under 45 CFR § 164.524. Business Associate shall provide such access in the time and manner reasonably designated by Covered Entity. Within three (3) business days, Business Associate shall forward to Covered Entity for handling any request for access to PHI that Business Associate directly receives from an Individual.

  • Access to NID 2.7.3.1 NewPhone may access the customer’s premises wiring by any of the following means and NewPhone shall not disturb the existing form of electrical protection and shall maintain the physical integrity of the NID: 2.7.3.1.1 BellSouth shall allow NewPhone to connect its Loops directly to BellSouth’s multi-line residential NID enclosures that have additional space and are not used by BellSouth or any other telecommunications carriers to provide service to the premises; 2.7.3.1.2 Where an adequate length of the customer’s premises wiring is present and environmental conditions permit, either Party may remove the customer premises wiring from the other Party’s NID and connect such wiring to that Party’s own NID; 2.7.3.1.3 Either Party may enter the subscriber access chamber or dual chamber NID enclosures for the purpose of extending a cross-connect or spliced jumper wire from the customer premises wiring through a suitable “punch-out” hole of such NID enclosures; or 2.7.3.1.4 NewPhone may request BellSouth to make other rearrangements to the customer premises wiring terminations or terminal enclosure on a time and materials cost basis. 2.7.3.2 In no case shall either Party remove or disconnect the other Party’s loop facilities from either Party’s NIDs, enclosures, or protectors unless the applicable Commission has expressly permitted the same and the disconnecting Party provides prior notice to the other Party. In such cases, it shall be the responsibility of the Party disconnecting loop facilities to leave undisturbed the existing form of electrical protection and to maintain the physical integrity of the NID. It will be NewPhone’s responsibility to ensure there is no safety hazard, and NewPhone will hold BellSouth harmless for any liability associated with the removal of the BellSouth Loop from the BellSouth NID. Furthermore, it shall be the responsibility of the disconnecting Party, once the other Party’s loop has been disconnected from the NID, to reconnect the disconnected loop to a nationally recognized testing laboratory listed station protector, which has been grounded as per Article 800 of the National Electrical Code. If no spare station protector exists in the NID, the disconnected loop must be appropriately cleared, capped and stored. 2.7.3.3 NewPhone shall not remove or disconnect ground wires from BellSouth’s NIDs, enclosures, or protectors. 2.7.3.4 NewPhone shall not remove or disconnect NID modules, protectors, or terminals from BellSouth’s NID enclosures. 2.7.3.5 Due to the wide variety of NID enclosures and outside plant environments, BellSouth will work with NewPhone to develop specific procedures to establish the most effective means of implementing this section if the procedures set forth herein do not apply to the NID in question.

  • Access to Site 3.05.1 Contractor may enter and leave the premises at all reasonable times without charge. Contractor and its employees may use the common areas and roadways of the premises where it is to perform the services together with all facilities, equipment, improvements, and services provided in connection with the premises for common use. This excludes parking for Contractor’s personnel. Contractor shall repair any damage caused by it or its employees as a result of its use of the common areas.

  • Links to Other Web Sites Our website does contain links to affiliate and other websites. Xxxxxx Xxxxxxx does not claim nor accept responsibility for any privacy policies, practices and/or procedures of other such websites. Therefore, we encourage all users and visitors to be aware when they leave our website and to read the privacy statements of each and every website that collects personally identifiable information. The aforementioned Privacy Policy Agreement applies only and solely to the information collected by our website and its licensed agents.

  • Access to Work Locations Reasonable access to employee work locations shall be granted officers of the Association and their officially designated representatives for the purpose of processing grievances or contacting members of the Association concerning business within the scope of representation. Such officers or representatives shall not enter any work location without the consent of the City Manager. Access shall be restricted so as not to interfere with the normal operations of the department or with established safety or security requirements. Solicitation of membership and activities concerned with the internal management of the Association, such as collecting dues, holding membership meetings, campaigning for office, conducting elections and distributing literature, shall not be conducted during working hours.

  • Access to the Services ID’s for access to Vendor Core Research and Analyst Inquiry may not be shared. Access to the Services is restricted to the number of named individuals (each a “Licensed User”) as identified in the Customer Purchase Order.

  • Links to Other Websites As part of the Service, we may provide links to or compatibility with other websites or applications. However, we are not responsible for the privacy practices employed by those websites or the information or content they contain. This Privacy Policy applies solely to information collected by us through the Site and the Service. Therefore, this Privacy Policy does not apply to your use of a third party website accessed by selecting a link on our Site or via our Service. To the extent that you access or use the Service through or on another website or application, then the privacy policy of that other website or application will apply to your access or use of that site or application. We encourage our users to read the privacy statements of other websites before proceeding to use them.

  • Access to Services Subject to and in accordance with the terms of this Agreement, including any Schedules, Company grants You a non-exclusive, non-sublicensable, nontransferable, non-assignable, revocable license for the term of this Agreement to access and use the Services. Services may only be used by Your Users for internal business purposes only. You agree to comply with the terms and conditions of this Agreement, including any Schedules, and with all applicable Company procedures and policies that further define use of the Services. You acknowledge and agree that the actions of any of Your Users with respect to the Services will be deemed to be actions by You and that any breach by any of Your Users of the terms of this Agreement, including any Schedule, will be deemed to be a breach by You.

  • Access to Work District representatives shall at all times have access to the Work, wherever it is, in preparation or in progress. Contractor shall provide safe and proper facilities for such access.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!