Access to NID 2.7.3.1 NewPhone may access the customer’s premises wiring by any of the following means and NewPhone shall not disturb the existing form of electrical protection and shall maintain the physical integrity of the NID: 2.7.3.1.1 BellSouth shall allow NewPhone to connect its Loops directly to BellSouth’s multi-line residential NID enclosures that have additional space and are not used by BellSouth or any other telecommunications carriers to provide service to the premises; 2.7.3.1.2 Where an adequate length of the customer’s premises wiring is present and environmental conditions permit, either Party may remove the customer premises wiring from the other Party’s NID and connect such wiring to that Party’s own NID; 2.7.3.1.3 Either Party may enter the subscriber access chamber or dual chamber NID enclosures for the purpose of extending a cross-connect or spliced jumper wire from the customer premises wiring through a suitable “punch-out” hole of such NID enclosures; or 2.7.3.1.4 NewPhone may request BellSouth to make other rearrangements to the customer premises wiring terminations or terminal enclosure on a time and materials cost basis. 2.7.3.2 In no case shall either Party remove or disconnect the other Party’s loop facilities from either Party’s NIDs, enclosures, or protectors unless the applicable Commission has expressly permitted the same and the disconnecting Party provides prior notice to the other Party. In such cases, it shall be the responsibility of the Party disconnecting loop facilities to leave undisturbed the existing form of electrical protection and to maintain the physical integrity of the NID. It will be NewPhone’s responsibility to ensure there is no safety hazard, and NewPhone will hold BellSouth harmless for any liability associated with the removal of the BellSouth Loop from the BellSouth NID. Furthermore, it shall be the responsibility of the disconnecting Party, once the other Party’s loop has been disconnected from the NID, to reconnect the disconnected loop to a nationally recognized testing laboratory listed station protector, which has been grounded as per Article 800 of the National Electrical Code. If no spare station protector exists in the NID, the disconnected loop must be appropriately cleared, capped and stored. 2.7.3.3 NewPhone shall not remove or disconnect ground wires from BellSouth’s NIDs, enclosures, or protectors. 2.7.3.4 NewPhone shall not remove or disconnect NID modules, protectors, or terminals from BellSouth’s NID enclosures. 2.7.3.5 Due to the wide variety of NID enclosures and outside plant environments, BellSouth will work with NewPhone to develop specific procedures to establish the most effective means of implementing this section if the procedures set forth herein do not apply to the NID in question.
Access to Site 3.05.1 Contractor may enter and leave the premises at all reasonable times without charge. Contractor and its employees may use the common areas and roadways of the premises where it is to perform the services together with all facilities, equipment, improvements, and services provided in connection with the premises for common use. This excludes parking for Contractor’s personnel. Contractor shall repair any damage caused by it or its employees as a result of its use of the common areas.
Rights of Use of the results and of pre-existing rights by the NA and the Union (a) for its own purposes and in particular to make available to persons working for the NA, Union institutions, agencies and bodies and to Member States’ institutions, as well as to copy and reproduce in whole or in part and in an unlimited number of copies." For the rest of this article, the references to the "Union" must be read as reference to "the NA and/or the Union".
Access to PHI Business Associate shall provide access to PHI in a Designated Record Set to Covered Entity or as directed by Covered Entity to an Individual to meet the requirements under 45 CFR § 164.524. Business Associate shall provide such access in the time and manner reasonably designated by Covered Entity. Within three (3) business days, Business Associate shall forward to Covered Entity for handling any request for access to PHI that Business Associate directly receives from an Individual.
Access to Data Operator shall make Data in the possession of the Operator available to the LEA within five (5) business days of a request by the LEA.
Access to Services Subject to and in accordance with the terms of this Agreement, including any Schedules, Company grants You a non-exclusive, non-sublicensable, nontransferable, non-assignable, revocable license for the term of this Agreement to access and use the Services. Services may only be used by Your Users for internal business purposes only. You agree to comply with the terms and conditions of this Agreement, including any Schedules, and with all applicable Company procedures and policies that further define use of the Services. You acknowledge and agree that the actions of any of Your Users with respect to the Services will be deemed to be actions by You and that any breach by any of Your Users of the terms of this Agreement, including any Schedule, will be deemed to be a breach by You.
Access to Work District representatives shall at all times have access to the Work, wherever it is, in preparation or in progress. Contractor shall provide safe and proper facilities for such access.
Access to Records and Documents It shall permit the Administrative Agent (or, if Independent Accountants are not engaged by the Collateral Manager or the Borrower, Protiviti, Inc. or another nationally recognized audit firm selected by the Administrative Agent with prior notice to the Borrower and subject to delivery of standard confidentiality agreements) to, upon reasonable advance notice and during normal business hours, but, so long as no Event of Default has occurred and is continuing, no more than one (1) time per calendar year, visit and inspect and make copies thereof at reasonable intervals (i) its books, records and accounts relating to its business, financial condition, operations, assets and its performance under the Facility Documents and the Related Documents and to discuss the foregoing with its and such Person’s officers, partners, employees and accountants, and (ii) all of its Related Documents, in each case as often as the Administrative Agent may reasonably request; provided that so long as no Event of Default has occurred and is continuing, the Borrower shall be responsible for all costs and expenses for only one such visit per fiscal year by the Administrative Agent or its respective designees; provided, further, that an officer or employee of the Collateral Manager shall have the opportunity to be present at any discussion between the Administrative Agent, any Lender or any other Person designated by the Administrative Agent, on the one hand, and the Collateral Manager’s accountants, on the other hand. The Administrative Agent shall provide two (2) Business Days’ prior notice to the Lenders of any such visit and any Lender shall be permitted to accompany the Administrative Agent in such visit. Any such visit and inspection shall be made simultaneously with any visit and inspection pursuant to Section 5.01(e).
RESERVATION OF NAME The Investment Adviser shall at all times have all rights in and to the Portfolio’s name and all investment models used by or on behalf of the Portfolio. The Investment Adviser may use the Portfolio’s name or any portion thereof in connection with any other mutual fund or business activity without the consent of any shareholder and the Fund shall execute and deliver any and all documents required to indicate the consent of the Fund to such use. The Fund hereby agrees that in the event that neither the Investment Adviser nor any of its affiliates acts as investment adviser to the Portfolio, the name of the Portfolio will be changed to one that does not suggest an affiliation with the Investment Adviser.
Access and Use 1. Each Party shall ensure that any service supplier of the other Party is accorded access to and use of public telecommunications transport networks and services in a timely fashion, on transparent, reasonable and nondiscriminatory terms and conditions. This obligation shall be applied, inter alia, through paragraphs 2 through 6. 2. Each Party shall ensure that service suppliers of the other Party have access to and use of any public telecommunications transport network or service offered within or across the border of that Party, including private leased circuits, and to this end shall ensure, subject to the provisions of paragraphs 5 and 6, that such suppliers are permitted: (a) to purchase or lease and attach terminal or other equipment which interfaces with the network and which is necessary to supply their services; (b) to interconnect private leased or owned circuits with public telecommunications transport networks and services or with circuits leased or owned by other service suppliers; (c) to use operating protocols of their choice in the supply of any service, other than as necessary to ensure the availability of telecommunications transport networks and services to the public generally; and (d) to perform switching, signaling and processing functions. 3. Each Party shall ensure that service suppliers of the other Party may use public telecommunications transport networks and services for the movement of information 4. Notwithstanding the provisions of paragraph 3, a Party may take such measures as are necessary: (a) to ensure the security and confidentiality of messages; or (b) to protect the personal data of users of public telecommunications transport networks or services, subject to the requirement that such measures are not applied in a manner which would constitute a means of arbitrary or unjustifiable discrimination or a disguised restriction on trade in services. 5. Each Party shall ensure that no condition is imposed on access to and use of public telecommunications transport networks and services other than as necessary: (a) to safeguard the public service responsibilities of suppliers of public telecommunications transport networks and services, in particular their ability to make their networks or services available to the public generally; or (b) to protect the technical integrity of public telecommunications transport networks or services.