Designated PEG Access Providers Sample Clauses

Designated PEG Access Providers. (A) The Jurisdictions may designate up to six (6) PEG Access providers, including itself for Government Access purposes, to control and manage the use of any or all Access Resources provided by Grantee under this Franchise. To the extent of such designation by the Jurisdictions, the Designated Access Provider shall have sole and exclusive responsibility for operating and managing such Access Resources. (B) Grantee shall cooperate with Designated Access Providers in the use of the Cable System and Access Resources. Grantee shall enter into operating agreements as may be necessary to facilitate and coordinate the provision of PEG Access, provided that all such operating agreements shall not be inconsistent with the terms of this Franchise.
AutoNDA by SimpleDocs
Designated PEG Access Providers. (A) The County may designate up to three (3) Non-Commercial PEG Access providers, including itself, to control and manage the use of any or all Access Facilities and Resources provided by the Grantee under this Franchise. To the extent of such designation by the County, as between the Designated Access Provider and the Grantee, the Designated Access Provider shall have sole and exclusive responsibility for operating and managing such Access Facilities and Resources. (B) Grantee shall cooperate with Designated Access Providers in the use of the Cable System and Access Facilities for the provision of PEG Access Programming. Grantee shall enter into operating agreements as may be necessary to facilitate and coordinate the provision of PEG Access, provided that all such operating agreements shall not be inconsistent with the terms of this Franchise.

Related to Designated PEG Access Providers

  • User Access Transfer Agent shall have a process to promptly disable access to Fund Data by any Transfer Agent personnel who no longer requires such access. Transfer Agent will also promptly remove access of Fund personnel upon receipt of notification from Fund.

  • EU Access SAP will use only European Subprocessors to provide support requiring access to Personal Data in the Cloud Service and SAP shall not export Personal Data outside of the EEA or Switzerland unless expressly authorized by Customer in writing (e-mail permitted) on a case by case basis; or as excluded under Section 9.4.

  • ICANN Access Registry Operator shall provide bulk access to the zone files for the TLD to ICANN or its designee on a continuous basis in the manner ICANN may reasonably specify from time to time. Access will be provided at least daily. Zone files will include SRS data committed as close as possible to 00:00:00 UTC.

  • Site Access Dell requires the right to access the APEX System in a timely way and as provided in the Service Offering Description to provide the Support Services. Failure to ensure that Customer provides Dell with timely access to a Site will relieve Dell of the Support Services obligations and Dell may also, at Dell’s discretion, suspend the APEX Service.

  • Open Access Same-Time Information System (OASIS): 1. 28A Operating Agreement of the PJM Interconnection, L.L.C. or Operating Agreement:

  • System Access CUSTOMER agrees to provide to PROVIDER, at CUSTOMER’S expense, necessary access to the mainframe computer and related information technology systems (the “System”) on which CUSTOMER data is processed during the times (the “Service Hours”) specified in the PSAs, subject to reasonable downtime for utility outages, maintenance, performance difficulties and the like. In the event of a change in the Service Hours, CUSTOMER will provide PROVIDER with at least fifteen (15) calendar days written notice of such change.

  • Network Services Local Access Services In lieu of any other rates and discounts, Customer will pay fixed monthly recurring local loop charges ranging from $1,200 to $2,000 for TDM-based DS-3 Network Services Local Access Services at 2 CLLI codes mutually agreed upon by Customer and Company.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage.

  • Telephone Access Employees shall be entitled to reasonable use of the client's telephone for local calls during the evening to speak with family members (i.e., spouse, children, dependants, parents). Employees may not receive personal calls on the client's telephone nor give out the client's telephone number. In the case of urgent personal calls to the employee, messages will be taken by the Employer and passed on to the employee as soon as possible. In the event of an emergency, the employee shall use the client's telephone to contact the appropriate authorities or the contact person designated by the Employer.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!