Additional Access Channel Sample Clauses

Additional Access Channel. The Town may request one additional access channel from Grantee for Public Access. The Town shall not request the additional access channel until the Town, or its Designated Access Provider, proves that it has all resources necessary for the additional channel, including but not limited to all equipment needed to produce and distribute programming; an access studio and the funds available for constructing a return line, if needed; and has the capability to distribute Public Access programming sufficient to meet community needs, as determined by the Town Board. In determining community needs and interests, the Town Board shall consider these issues through an appropriate survey methodology that is mutually acceptable between the Town and the Grantee. The survey methodology will consider the programming that would be displaced, and how much programming is produced on the existing access channels in the Denver metro area. The costs of such survey shall be paid by Grantee.
AutoNDA by SimpleDocs
Additional Access Channel. A. The County may request, and Grantee shall provide, a second PEG Access Channel upon 180 days advance written notice by the County and sufficient proof that the current Channel is inadequate for all programming offered. “Sufficient proof” shall include a verified program log of all original, non-repeat, first-run, locally produced programs that are carried on the existing PEG Access Channel for the prior six month period during the times of noon to midnight. In the event that 80% of the programming on the existing PEG Access Channel meets the criteria of being original, non-repeat, first-run locally produced programming, Grantee shall provide a second PEG Access Channel. The Grantee agrees to submit a cost estimate to activate the second PEG Access Channel within sixty (60) days after the County’s request. The County may accept or decline Xxxxxxx’s cost estimate in the County’s sole discretion. After an agreement to reimburse the Grantee the costs of activating the second PEG Access Channel, the Grantee shall proceed to activate the PEG Access Channel. If no reimbursement agreement is reached between Grantee and County, Grantee is not obligated to activate the additional PEG Access Channel. B. Once provided, the additional PEG Access Channel may not be removed or withdrawn by Grantee for the first twelve (12) months following the provision of such additional PEG Access Channel. Any such removal or withdrawal shall not occur until the Grantee has given the County written notice that the Threshold Use Requirement for the initial channels provided as of the Effective Date of this Agreement is not being satisfied. The County shall have one hundred twenty (120) days to cure, or take diligent steps towards curing such condition, in which to establish that the Threshold Use Requirement on the initial PEG Access Channels is satisfied.

Related to Additional Access Channel

  • Additional Access Rights For the avoidance of doubt any grant of Access Rights not covered by the Grant Agreement or this Consortium Agreement shall be at the absolute discretion of the owning Party and subject to such terms and conditions as may be agreed between the owning and receiving Parties.

  • Additional Acceptable Uses of Student Data Contractor is prohibited from using Student Data for any secondary use not described in this agreement except: a. for adaptive learning or customized student learning purposes; b. to market an educational application or product to a parent or legal guardian of a student if Contractor did not use Data, shared by or collected per this Contract, to market the educational application or product; c. to use a recommendation engine to recommend to a student i. content that relates to learning or employment, within the third-party contractor's internal application, if the recommendation is not motivated by payment or other consideration from another party; or

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage.

  • User Access Transfer Agent shall have a process to promptly disable access to Fund Data by any Transfer Agent personnel who no longer requires such access. Transfer Agent will also promptly remove access of Fund personnel upon receipt of notification from Fund.

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization.

  • Exceptional Access to Thick Registration Data In case of a registrar failure, deaccreditation, court order, etc. that prompts the temporary or definitive transfer of its domain names to another registrar, at the request of ICANN, Registry Operator will provide ICANN with up-­‐to-­‐date data for the domain names of the losing registrar. The data will be provided in the format specified in Specification 2 for Data Escrow. The file will only contain data related to the domain names of the losing registrar. Registry Operator will provide the data as soon as commercially practicable, but in no event later than five (5) calendar days following ICANN’s request. Unless otherwise agreed by Registry Operator and ICANN, the file will be made available for download by ICANN in the same manner as the data specified in Section 3.1 of this Specification.

  • Data Access Access to Contract and State Data The Contractor shall provide to the Client Agency access to any data, as defined in Conn. Gen Stat. Sec. 4e-1, concerning the Contract and the Client Agency that are in the possession or control of the Contractor upon demand and shall provide the data to the Client Agency in a format prescribed by the Client Agency and the State Auditors of Public Accounts at no additional cost.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CSTC chooses to subtend a Verizon access Tandem, CSTC’s NPA/NXX must be assigned by CSTC to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 CSTC shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from CSTC’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office CSTC utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow CSTC’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.

  • ICANN Access Registry Operator shall provide bulk access to the zone files for the TLD to ICANN or its designee on a continuous basis in the manner ICANN may reasonably specify from time to time. Access will be provided at least daily. Zone files will include SRS data committed as close as possible to 00:00:00 UTC.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!