Alternative Access Sample Clauses

Alternative Access. In the event that CMCI, acting or purporting to act under the Discharge and Access Agreem ent, denies or materially restricts access to or egress from the Wastewater Treatment Complex via the Access Road by any particular vehicle and the Lessee believes the denial or material restr iction to be unjust ified under the terms of the Discharge and Access Agreement or otherwise to be unreasonable, the Lessee shall promptly notify the Lessor and upon provision of such notice, the Lessee m ay allow the affected vehicle access to or egress from the Wastewater Treatment Complex by the Cherry Street entrance via the Elm Street/Xxxxxxx Street/Cherry Street E xtension route as delineated in Appendix 1 or an oth er alternative route approved by the Lessor. Promptly follow ing the Lessee's provision of such notice, the Lessee shall investigate the cause of CM CI's denial or restriction of access for the affected veh icle and shall prepare a report summarizing the findings of such investigation and recommending actions that should be reasonably pursued by the Lessor, the Lessee or both in connection therewith. The Lessor shall use all reasonable efforts to assure that any such alternative route provides reasonable vehicular access to and egress from the Wastewater Treatment Com plex. To the extent that denial of use of the Access Road arises from the violation by a vehicle owner or operator of the Rules for Vehicle Owners or Operators established under the Discharge an d Access Agreement. The Lessee shall use all reasonable efforts to prevent the occurrence or recurrence of such violation by the involved vehicle owner or operator.
AutoNDA by SimpleDocs

Related to Alternative Access

  • Alternative A The grievance shall be determined by the Personnel Commission. The decision of the Commission shall be made in writing within sixty (60) calendar days after the filing of the appeal at step 3 and shall be final and binding on all parties subject to ratification by the Board of Supervisors if the decision requires an unbudgeted expenditure.

  • Representative Access (A) The state agrees that designated Union Representatives shall have access to state controlled premises where employees are employed.

  • Information Access Each Party (“Disclosing Party”) shall make available to another Party (“Requesting Party”) information that is in the possession of the Disclosing Party and is necessary in order for the Requesting Party to: (i) verify the costs incurred by the Disclosing Party for which the Requesting Party is responsible under this Agreement; and (ii) carry out its obligations and responsibilities under this Agreement. The Parties shall not use such information for purposes other than those set forth in this Article 25.1 of this Agreement and to enforce their rights under this Agreement.

  • EU Access SAP will use only European Subprocessors to provide support requiring access to Personal Data in the Cloud Service and SAP shall not export Personal Data outside of the EEA or Switzerland unless expressly authorized by Customer in writing (e-mail permitted) on a case by case basis; or as excluded under Section 9.4.

  • Cash Access You may not use the Gift Card to obtain cash from an Automated Teller Machine (“ATM”), Point-of-Sale (“POS”) device, or by any other means. You may not use the Gift Card at an ATM. Loading The Gift Card The Gift Card is not reloadable after being loaded at the time of purchase. Personal checks, cashier’s checks, and money orders sent to the Issuer are not an acceptable form of loading. Any checks and money orders sent to the Issuer for loading will be returned unless the full amount may be applied towards a negative balance, in which case the check or money order may or may not be loaded at the discretion of the Issuer. The maximum dollar value of the Gift Card is printed on the front side of the Gift Card packaging. These are the limits associated with loading the Gift Card: Transaction Type Frequency and/or Dollar Limits Initial Load One time $20.00 up to $500.00 For Gift Card balance information, please call 0-000-000-0000 or visit XxxxxxxXxxx.xxx.

  • Site Access Dell requires the right to access the APEX System in a timely way and as provided in the Service Offering Description to provide the Support Services. Failure to ensure that Customer provides Dell with timely access to a Site will relieve Dell of the Support Services obligations and Dell may also, at Dell’s discretion, suspend the APEX Service.

  • Market Access 1. With respect to market access through the modes of supply identified in the "trade in services" definition of Article 104 (Definitions), each Party shall accord to services and service suppliers of the other Party treatment no less favourable than that provided for under the terms, limitations and conditions agreed and specified in its Schedule (7). 2. In sectors where market access commitments are undertaken, the measures which a Party shall not maintain or adopt either on the basis of a regional subdivision or on the basis of its entire territory, unless otherwise specified in its Schedule, are defined as: (a) limitations on the number of service suppliers whether in the form of numerical quotas, monopolies, exclusive service suppliers or the requirements of an economic needs test; (b) limitations on the total value of service transactions or assets in the form of numerical quotas or the requirement of an economic needs test; (c) limitations on the total number of service operations or on the total quantity of service output expressed in terms of designated numerical units in the form of quotas or the requirement of an economic needs test; (8) (d) limitations on the total number of natural persons that may be employed in a particular service sector or that a service supplier may employ and who are necessary for, and directly related to, the supply of a specific service in the form of numerical quotas or the requirement of an economic needs test; (e) measures which restrict or require specific types of legal entity or joint venture through which a service supplier may supply a service; or (f) limitations on the participation of foreign capital in terms of maximum percentage limit on foreign shareholding or the total value of individual or aggregate foreign investment.

  • Service Access Access to the clinical parts of our Site is restricted to Users. Users of our Site are provided with unique User IDs by the Clinic with which they are associated and must choose a password of their choice to sign on to our Site. Users must provide personal contact information, and you must ensure that your information is kept up to date at all times. User IDs and passwords constitute an electronic signature and will be used by us to authenticate access to our Site. If a User opts to sign onto Xxxxxx.xxx, the User will be able to take advantage of the non- public sections of our Site. If a User opts not to sign onto our Site, their access to our Site will be restricted to the public sections of our Site only. If you are provided with a User ID, password or any other piece of information as part of our security procedures, you must treat such information as confidential, and you must not disclose it to any third party. We have the right to disable any User ID at any time, if in our opinion, you have failed to comply with any of the provisions of this Agreement. You may only use our Site as set out in this Agreement. Any illegal or unauthorized use of our Site shall constitute a violation of this Agreement. You do not have permission to access our Site in any way that violates this Agreement or breaches any applicable law. You agree to keep your and your Patients’ Data accurate, current and complete. You may print off or download extracts of page(s) from our Site for your use in Patient care or insertion into a Patient’s electronic health records only.

  • Alternative Procedures By electing not to use all available Security Procedures (as described above) to initiate and authorize Wire Transfers, Customer acknowledges that it has declined to use other available security procedures, including, but not limited to, security procedures that use a call back feature to verify authorization of Wire Transfers initiated by telephone or facsimile transmission. Wire Notification Procedures‌ Information sent by e-mail is not secure! The bank will attempt to keep non-public information out of the advice by masking fields normally containing account number information. However, because we cannot control the information as it is received by a sending institution, confidential information may appear in parts of the incoming e- mail advice. By selecting this option you expressly agree to be liable for any information contained in such advice. ACH SERVICES‌ ACH Origination‌ The Customer (“Originator”) has requested to initiate electronic fund transfer entries (“Entry” or “Entries”) through the Bank (“Originating Depository Financial Institution” or “ODFI”) for the deposit ("Credit") and/or payment ("Debit") of money to and from the accounts of Receivers maintained at Bank and at other Depository Financial Institutions (“DFIs”), by means of the Automated Clearing House ("ACH.")

  • Restricted Access By choosing restricted access, you are requesting that the library restrict access to all full-text copies of your dissertation – both print and electronic – for a specified period of time. Your dissertation will be listed and indexed in the Emory Library Online Catalog and in the ETD repository, but the content, the full text of your thesis or dissertation and any supplementary files, will not be accessible until the expiration of the restricted access period. If you choose to restrict access to the full-text copy of your thesis or dissertation, then you may opt to also restrict access to your abstract or table of contents. You will need to indicate your desire to restrict access to these components of your ETD record during the electronic submission process. If you do not restrict access to your abstract and/or table of contents, then this information will be displayed on the web in the ETD record for your thesis or dissertation even if you have restricted access to the full-text copy. You will be notified by the library sixty ( 60 ) days prior to the expiration of the restricted period that your thesis or dissertation will be published on the internet. It is your responsibility to notify the Graduate School and the library that you need to extend the access restriction, and to provide the library with an updated e- mail address. ☐ 6 months after my graduation ☐ 1 year after my graduation ☐ 2 years after my graduation Please select a time period you would like restricted access below. I request that the full text of my thesis or dissertation (and any supplemental files) be published no sooner than: Part 4 – Inclusion of Previously Copyrighted Material I hereby certify that all text, audio-visual, or other material not created by me or for which I no longer control copyright that is included in my submission (a) has been identified in my submission by quotation, if directly quoted, and with appropriate source citations; and (b) • falls within the parameters of “Fair Use” as defined by US copyright law; or • is unambiguously a part of the public domain as a matter of law; or • is the subject of a properly documented permission obtained from the entity that owns or controls the copyright in the material. I will provide copies of any such permission upon request. Following is a list of the items for which I have sought and received written permission from the copyright owners to include in my submission (attach a separate page if necessary):

Time is Money Join Law Insider Premium to draft better contracts faster.