Continuing Access Journals Sample Clauses

Continuing Access Journals. During the Term, Licensee shall have access to the Continuing Access Journals listed in Section 3.1 first published during the Term. After the Term, Licensee shall have Continuing Access to the Continuing Access Journals first published during the Term, subject to all the terms and conditions of this License Agreement.
AutoNDA by SimpleDocs
Continuing Access Journals. During the Term, Licensee shall have access to the Continuing Access Journals listed in Schedule 2: Continuing Access Journals first published during the Term. After the Term, Licensee shall have Continuing Access to the Continuing Access Journals first published during the Term, subject to all the terms and conditions of this License Agreement. Publicaciones de Acceso Continuo: Durante el Plazo de vigencia, el Licenciatario tendrá acceso a las Publicaciones de Acceso Continuo listadas en el Apéndice 2: Publicaciones de Acceso Continuo publicadas por primera vez durante el Plazo de vigencia. Después del Plazo de vigencia, el Licenciatario tendrá Acceso Continuo a las Publicaciones de Acceso Continuo publicadas por primera vez durante el Plazo de vigencia, ello sujeto a todos los términos y condiciones del presente Contrato de Licencia.

Related to Continuing Access Journals

  • Facility Access Notwithstanding any other provision of the Agreement, the Customer shall provide the Authority with such access to the Facility, and such documentation, as the Authority deems necessary to determine the Customer’s compliance with the Customer’s Supplemental Commitments specified in this Schedule B.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization.

  • Open Access Same-Time Information System (OASIS): 1. 28A Operating Agreement of the PJM Interconnection, L.L.C. or Operating Agreement:

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • Gold Open Access Articles May be shared according to the author-selected end-user license and should contain a CrossMark logo, the end user license, and a DOI link to the formal publication on ScienceDirect. Please refer to Elsevier's posting policy for further information.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage.

  • User Access Transfer Agent shall have a process to promptly disable access to Fund Data by any Transfer Agent personnel who no longer requires such access. Transfer Agent will also promptly remove access of Fund personnel upon receipt of notification from Fund.

  • Information Access Each Party (“Disclosing Party”) shall make available to another Party (“Requesting Party”) information that is in the possession of the Disclosing Party and is necessary in order for the Requesting Party to: (i) verify the costs incurred by the Disclosing Party for which the Requesting Party is responsible under this Agreement; and (ii) carry out its obligations and responsibilities under this Agreement. The Parties shall not use such information for purposes other than those set forth in this Article 25.1 of this Agreement and to enforce their rights under this Agreement.

  • Site Access Dell requires the right to access the APEX System in a timely way and as provided in the Service Offering Description to provide the Support Services. Failure to ensure that Customer provides Dell with timely access to a Site will relieve Dell of the Support Services obligations and Dell may also, at Dell’s discretion, suspend the APEX Service.

  • Coordination, Oversight and Monitoring of Service Providers As set forth in the Administrative Services Agreement between the Fund and CRMC, CRMC shall coordinate, monitor and oversee the activities performed by the Service Providers with which AFS contracts. AFS shall monitor Service Providers’ provision of services including the delivery of Customer account statements and all Fund-related material, including summary prospectuses and/or prospectuses, shareholder reports, and proxies.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!