Open Access Same-Time Information System (OASIS): 1. 28A Operating Agreement of the PJM Interconnection, L.L.C. or Operating Agreement:
Gold Open Access Articles May be shared according to the author-selected end-user license and should contain a CrossMark logo, the end user license, and a DOI link to the formal publication on ScienceDirect. Please refer to Elsevier's posting policy for further information.
C-TPAT In connection with providing Goods and Services to AGILENT, Seller shall comply with Customs-Trade Partnership Against Terrorism (C- TPAT) or equivalent supply chain security measures. When requested by AGILENT, Seller shall demonstrate compliance by providing certification thereof to AGILENT.
ICANN Access Registry Operator shall provide bulk access to the zone files for the TLD to ICANN or its designee on a continuous basis in the manner ICANN may reasonably specify from time to time. Access will be provided at least daily. Zone files will include SRS data committed as close as possible to 00:00:00 UTC.
PARTICIPATION, CONTRACT ACCESS, AND PARTICIPATING ENTITY REQUIREMENTS A. PARTICIPATION. Sourcewell’s cooperative contracts are available and open to public and nonprofit entities across the United States and Canada; such as federal, state/province, municipal, K-12 and higher education, tribal government, and other public entities. The benefits of this Contract should be available to all Participating Entities that can legally access the Equipment, Products, or Services under this Contract. A Participating Entity’s authority to access this Contract is determined through its cooperative purchasing, interlocal, or joint powers laws. Any entity accessing benefits of this Contract will be considered a Service Member of Sourcewell during such time of access. Supplier understands that a Participating Entity’s use of this Contract is at the Participating Entity’s sole convenience and Participating Entities reserve the right to obtain like Equipment, Products, or Services from any other source. Supplier is responsible for familiarizing its sales and service forces with Sourcewell contract use eligibility requirements and documentation and will encourage potential participating entities to join Sourcewell. Sourcewell reserves the right to add and remove Participating Entities to its roster during the term of this Contract.
Post-Closing Access (a) Each of Seller and Buyer shall, and Buyer shall cause the Company to, preserve and keep all books and records and other information relating to the accounting, legal, Tax, regulatory, business and financial affairs of the Company and the Rolling Mill Business for a period of seven (7) years after the Closing Date (or, in the case of information relating to Taxes, until the expiration of any applicable statute of limitations), or for a longer period if (i) required by Law (including any statute of limitations and applicable extensions thereof) or any Governmental Authority or (ii) reasonably necessary with respect to the prosecution or defense of any audit or other legal or regulatory action that is then pending or threatened so long as the requesting Party has notified the other Party with prior written notice of the need to retain such books, records or information. (b) Following the Closing, for so long as such information is retained by Buyer in accordance with Section 5.8(a), Buyer shall, and shall cause the Company, to permit Seller and its authorized Representatives, at Seller’s sole cost and expense, to have reasonable access and duplication rights during normal business hours, upon reasonable prior written notice to Buyer to the information described in Section 5.8(a) to the extent that such access may be reasonably required in connection with (i) the preparation of any Tax Return, accounting records or with respect to any Tax Claim or similar proceedings, (ii) any Action relating to Seller, the Company or the Rolling Mill Business, (iii) any Governmental Filing or matter (including investigations by Governmental Authorities) or (iv) any other valid legal or business purpose. Notwithstanding the foregoing, Seller shall have no right of access to, and Buyer shall have no obligation to provide, (A) any information if doing so would reasonably be expected to (1) violate any Contract or Law to which Buyer or any of its Affiliates (including the Company) is a party or is subject, (2) result in a loss of the ability to successfully assert a claim of privilege (including the attorney-client and work product privileges), (3) result in the disclosure of any competitively sensitive information of Buyer or of any of its Affiliates (including the Company), or (4) breach a confidentiality or other obligation to a Third Party (provided that Buyer shall use commercially reasonable efforts to obtain the consent of any Third Party with regards to such disclosure), or (B) any consolidated, combined, affiliated or unitary Tax Return which includes Buyer or any of its Affiliates (including the Company) or any Tax-related work papers. (c) Following the Closing, for so long as such information is retained by Seller in accordance with Section 5.8(a), Seller shall permit Buyer and its authorized Representatives, at Buyer’s sole cost and expense, to have reasonable access and duplication rights during normal business hours, upon reasonable prior written notice to Seller, to the information described in Section 5.8(a) to the extent that such access may be reasonably required in connection with (i) the preparation of any Tax Return, accounting records or with any Tax Claim or similar proceedings, (ii) any Action relating to the Company or the Rolling Mill Business, (iii) any Governmental Filing or matter (including investigations by Governmental Authorities) or (iv) any other valid legal or business purpose. Notwithstanding the foregoing, Buyer shall have no right of access to, and Seller shall have no obligation to provide, (A) any information if doing so would reasonably be expected to (1) violate any Contract or Law to which Seller or any of its Affiliates is a party or is subject,
Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.
Additional Acceptable Uses of Student Data Contractor is prohibited from using Student Data for any secondary use not described in this agreement except: a. for adaptive learning or customized student learning purposes; b. to market an educational application or product to a parent or legal guardian of a student if Contractor did not use Data, shared by or collected per this Contract, to market the educational application or product; c. to use a recommendation engine to recommend to a student i. content that relates to learning or employment, within the third-party contractor's internal application, if the recommendation is not motivated by payment or other consideration from another party; or
Union Access The Union shall have reasonable access to all work locations to verify that the terms and conditions of this Agreement are being carried out and for the purpose of conferring with employees, provided that access shall be subject to such rules and regulations immediately below, as well as to such rules and regulations as may be agreed to by the department and the union. Union access to work locations will not disrupt or interfere with a department’s mission and services or involve any political activities.
System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization.