Cooperation; Access; Consents Sample Clauses

Cooperation; Access; Consents. Each of the parties hereto agrees to fully cooperate in good faith with the other in connection with the Services provided under this Agreement. Each of the parties hereto shall take such actions, upon the request of the other party, as may be necessary or reasonably appropriate to implement or give effect to this Agreement.
AutoNDA by SimpleDocs
Cooperation; Access; Consents. (a) Each of the parties hereto agrees to fully cooperate in good faith with the other in connection with the Services provided under this Agreement. Each of the parties hereto shall take such actions, upon the request of the other party, as may be necessary or reasonably appropriate to implement or give effect to this Agreement. (b) Seller shall permit the Company and its employees and agents reasonable access during regular business hours upon reasonable prior notice to (i) individuals responsible for the Services and (ii) such data and records relating to the Services as the Company may reasonably request for the purposes of allowing the Company to exercise general oversight and to monitor the performance of the Services. (c) The Company shall make available on a timely basis to Seller all information, systems, materials and data reasonably requested by Seller to enable it to provide the Services. Upon reasonable prior notice from Seller, the Company shall give Seller reasonable access during regular business hours and at such other times as are reasonably required to the premises of the Company’s business for the purposes of providing the Services.

Related to Cooperation; Access; Consents

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization.

  • Data Privacy Consent In order to administer the Plan and this Agreement and to implement or structure future equity grants, the Company, its subsidiaries and affiliates and certain agents thereof (together, the “Relevant Companies”) may process any and all personal or professional data, including but not limited to Social Security or other identification number, home address and telephone number, date of birth and other information that is necessary or desirable for the administration of the Plan and/or this Agreement (the “Relevant Information”). By entering into this Agreement, the Grantee (i) authorizes the Company to collect, process, register and transfer to the Relevant Companies all Relevant Information; (ii) waives any privacy rights the Grantee may have with respect to the Relevant Information; (iii) authorizes the Relevant Companies to store and transmit such information in electronic form; and (iv) authorizes the transfer of the Relevant Information to any jurisdiction in which the Relevant Companies consider appropriate. The Grantee shall have access to, and the right to change, the Relevant Information. Relevant Information will only be used in accordance with applicable law.

  • Information Access Each Party (“Disclosing Party”) shall make available to another Party (“Requesting Party”) information that is in the possession of the Disclosing Party and is necessary in order for the Requesting Party to: (i) verify the costs incurred by the Disclosing Party for which the Requesting Party is responsible under this Agreement; and (ii) carry out its obligations and responsibilities under this Agreement. The Parties shall not use such information for purposes other than those set forth in this Article 25.1 of this Agreement and to enforce their rights under this Agreement.

  • Post-Closing Access to Information For a period of seven (7) years from the Closing Date, except as prohibited by applicable Law, Seller and Buyer shall, subject to compliance by the other with the provisions of Section 5.12 and the Transition Services Agreement, afford to each other and to each other’s Representatives reasonable access and duplicating rights (with copying costs to be borne by the requesting party) during normal business hours to all books and records, documents and other information (collectively, “Information”) within the knowledge, possession or control of the other party or its Affiliates solely to the extent relating to (a) in the case of requests by Buyer, the FH Business, Transferred FH Companies (and their Closing Subsidiaries), FH Assets, the Acquired FH Assets, Assumed Liabilities or Transferred Employees and (b) in the case of requests by Seller, the Excluded Businesses, the Excluded Assets or the Retained Liabilities, insofar in each case as such access is reasonably required by Seller or Buyer or any of their Subsidiaries or Affiliates for legitimate business reasons and does not violate any applicable Law or any confidentiality obligations applicable to Seller or Buyer or any of their Subsidiaries or Affiliates, as the case may be (and shall use reasonable efforts to cause persons or firms possessing relevant Information to give similar access) and, to the extent practicable, such Information is identified by the requesting party with reasonable specificity; provided, however, that no party shall be required to disclose any Information if (i) it believes in good faith that doing so presents a significant risk, based on advice of counsel (which can be inside counsel) of resulting in a loss of the ability to successfully assert a claim of Privilege or (ii) Seller or any of its Subsidiaries, on the one hand, and Buyer or any of its Subsidiaries, on the other hand, are adverse parties in a litigation (other than a litigation with respect to a claim for indemnification under this Agreement) and such information is reasonably pertinent thereto; provided, further, that, in the case of clause (i) above, the parties hereto shall reasonably cooperate in seeking to find a way to allow disclosure of such information without resulting in a loss of the ability to successfully assert a claim of Privilege; provided, further, that Seller and its Affiliates shall not be required to provide Buyer or its Representatives with any information related to the Sale Process or Seller’s or its Representatives’ evaluation thereof, including projections, financial or other information related thereto other than projections, financial or other information prepared in the ordinary course of the FH Business without being primarily prepared for the Sale Process. Without limiting the generality of the foregoing, Information may be requested under this Section 5.9 for audit and accounting purposes and in connection with Actions, as well as for purposes of fulfilling disclosure and reporting obligations.

  • California Accessibility Disclosure For purposes of Section 1938(a) of the California Civil Code, Landlord hereby discloses to Tenant, and Tenant hereby acknowledges, that the Project has not undergone inspection by a Certified Access Specialist (CASp). In addition, the following notice is hereby provided pursuant to Section 1938(e) of the California Civil Code: “A Certified Access Specialist (CASp) can inspect the subject premises and determine whether the subject premises comply with all of the applicable construction-related accessibility standards under state law. Although state law does not require a CASp inspection of the subject premises, the commercial property owner or lessor may not prohibit the lessee or tenant from obtaining a CASp inspection of the subject premises for the occupancy or potential occupancy of the lessee or tenant, if requested by the lessee or tenant. The parties shall mutually agree on the arrangements for the time and manner of the CASp inspection, the payment of the fee for the CASp inspection, and the cost of making any repairs necessary to correct violations of construction-related accessibility standards within the premises.” In furtherance of and in connection with such notice: (i) Tenant, having read such notice and understanding Tenant’s right to request and obtain a CASp inspection, hereby elects not to obtain such CASp inspection and forever waives its rights to obtain a CASp inspection with respect to the Premises, Building and/or Project to the extent permitted by Legal Requirements; and (ii) if the waiver set forth in clause (i) hereinabove is not enforceable pursuant to Legal Requirements, then Landlord and Tenant hereby agree as follows (which constitutes the mutual agreement of the parties as to the matters described in the last sentence of the foregoing notice): (A) Tenant shall have the one-time right to request for and obtain a CASp inspection, which request must be made, if at all, in a written notice delivered by Tenant to Landlord; (B) any CASp inspection timely requested by Tenant shall be conducted (1) at a time mutually agreed to by Landlord and Tenant, (2) in a professional manner by a CASp designated by Landlord and without any testing that would damage the Premises, Building or Project in any way, and (3) at Tenant’s sole cost and expense, including, without limitation, Tenant’s payment of the fee for such CASp inspection, the fee for any reports prepared by the CASp in connection with such CASp inspection (collectively, the “CASp Reports”) and all other costs and expenses in connection therewith; (C) the CASp Reports shall be delivered by the CASp simultaneously to Landlord and Tenant; (D) Tenant, at its sole cost and expense, shall be responsible for making any improvements, alterations, modifications and/or repairs to or within the Premises to correct violations of construction-related accessibility standards including, without limitation, any violations disclosed by such CASp inspection; and (E) if such CASp inspection identifies any improvements, alterations, modifications and/or repairs necessary to correct violations of construction-related accessibility standards relating to those items of the Building and Project located outside the Premises that are Landlord’s obligation to repair as set forth in this Lease, then Landlord shall perform such improvements, alterations, modifications and/or repairs as and to the extent required by Legal Requirements to correct such violations, and Tenant shall reimburse Landlord for the cost of such improvements, alterations, modifications and/or repairs within 10 business days after Tenant’s receipt of an invoice therefor from Landlord.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage.

  • Access Control Supplier will maintain an appropriate access control policy that is designed to restrict access to Accenture Data and Supplier assets to authorized Personnel. Supplier will require that all accounts have complex passwords that contain letters, numbers, and special characters, be changed at least every 90 days, and have a minimum length of 8 characters.

  • Governmental Consent, etc No permit, consent, approval or authorization of, or declaration to or filing with, any governmental authority is required in connection with the execution, delivery and performance by the Company of this Agreement or the other agreements contemplated hereby, or the consummation by the Company of any other transactions contemplated hereby or thereby.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CSTC chooses to subtend a Verizon access Tandem, CSTC’s NPA/NXX must be assigned by CSTC to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 CSTC shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from CSTC’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office CSTC utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow CSTC’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!