Emergency Access to Restore Service Sample Clauses

Emergency Access to Restore Service. The Customer agrees to provide TERAGO access to its premises promptly xxxx XXXXXX’s reasonable request at no charge to TERAGO where TERAGO or a TERAGO subcontractor requires such access in order to remedy, restore or maintain any Service. The Customer must provide timely access to TERAGO (or facilitate such access where the Customer is a tenant) in order to retain any remedial rights or credits to which it may be entitled in connection with the Service availability commitment in the applicable SLA. Delays caused by the Customer’s failure to provide timely access will be deducted from the time used to calculate the duration of a Service interruption or other applicable service level measurement.
AutoNDA by SimpleDocs
Emergency Access to Restore Service. The Customer agrees to provide TeraGo access to its premises promptly xxxx XxxxXx’s reasonable request at no charge to TeraGo where TeraGo or a TeraGo subcontractor requires such access in order to remedy, restore or maintain any Service. The Customer must provide timely access to TeraGo (or facilitate such access where the Customer is a tenant) in order to retain any remedial rights or credits to which it may be entitled in connection with the Service availability commitment in the applicable SLA. Delays caused by the Customer’s failure to provide timely access will be deducted from the time used to calculate the duration of a Service interruption or other applicable service level measurement.

Related to Emergency Access to Restore Service

  • Access to NID 2.7.3.1 NewPhone may access the customer’s premises wiring by any of the following means and NewPhone shall not disturb the existing form of electrical protection and shall maintain the physical integrity of the NID: 2.7.3.1.1 BellSouth shall allow NewPhone to connect its Loops directly to BellSouth’s multi-line residential NID enclosures that have additional space and are not used by BellSouth or any other telecommunications carriers to provide service to the premises; 2.7.3.1.2 Where an adequate length of the customer’s premises wiring is present and environmental conditions permit, either Party may remove the customer premises wiring from the other Party’s NID and connect such wiring to that Party’s own NID; 2.7.3.1.3 Either Party may enter the subscriber access chamber or dual chamber NID enclosures for the purpose of extending a cross-connect or spliced jumper wire from the customer premises wiring through a suitable “punch-out” hole of such NID enclosures; or 2.7.3.1.4 NewPhone may request BellSouth to make other rearrangements to the customer premises wiring terminations or terminal enclosure on a time and materials cost basis. 2.7.3.2 In no case shall either Party remove or disconnect the other Party’s loop facilities from either Party’s NIDs, enclosures, or protectors unless the applicable Commission has expressly permitted the same and the disconnecting Party provides prior notice to the other Party. In such cases, it shall be the responsibility of the Party disconnecting loop facilities to leave undisturbed the existing form of electrical protection and to maintain the physical integrity of the NID. It will be NewPhone’s responsibility to ensure there is no safety hazard, and NewPhone will hold BellSouth harmless for any liability associated with the removal of the BellSouth Loop from the BellSouth NID. Furthermore, it shall be the responsibility of the disconnecting Party, once the other Party’s loop has been disconnected from the NID, to reconnect the disconnected loop to a nationally recognized testing laboratory listed station protector, which has been grounded as per Article 800 of the National Electrical Code. If no spare station protector exists in the NID, the disconnected loop must be appropriately cleared, capped and stored. 2.7.3.3 NewPhone shall not remove or disconnect ground wires from BellSouth’s NIDs, enclosures, or protectors. 2.7.3.4 NewPhone shall not remove or disconnect NID modules, protectors, or terminals from BellSouth’s NID enclosures. 2.7.3.5 Due to the wide variety of NID enclosures and outside plant environments, BellSouth will work with NewPhone to develop specific procedures to establish the most effective means of implementing this section if the procedures set forth herein do not apply to the NID in question.

  • Access to Services Subject to and in accordance with the terms of this Agreement, including any Schedules, Company grants You a non-exclusive, non-sublicensable, nontransferable, non-assignable, revocable license for the term of this Agreement to access and use the Services. Services may only be used by Your Users for internal business purposes only. You agree to comply with the terms and conditions of this Agreement, including any Schedules, and with all applicable Company procedures and policies that further define use of the Services. You acknowledge and agree that the actions of any of Your Users with respect to the Services will be deemed to be actions by You and that any breach by any of Your Users of the terms of this Agreement, including any Schedule, will be deemed to be a breach by You.

  • Access to PHI Business Associate shall provide access to PHI in a Designated Record Set to Covered Entity or as directed by Covered Entity to an Individual to meet the requirements under 45 CFR § 164.524. Business Associate shall provide such access in the time and manner reasonably designated by Covered Entity. Within three (3) business days, Business Associate shall forward to Covered Entity for handling any request for access to PHI that Business Associate directly receives from an Individual.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization.

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • AUDITS; ACCESS TO RECORDS The CONTRACTOR shall make available to the COUNTY, its authorized agents, officers, or employees, for examination any and all ledgers, books of accounts, invoices, vouchers, cancelled checks, and other records or documents evidencing or relating to the expenditures and disbursements charged to the COUNTY, and shall furnish to the COUNTY, within sixty (60) days after examination, its authorized agents, officers or employees such other evidence or information as the COUNTY may require with regard to any such expenditure or disbursement charged by the CONTRACTOR. The CONTRACTOR shall maintain full and adequate records in accordance with County requirements to show the actual costs incurred by the CONTRACTOR in the performance of this Agreement. If such books and records are not kept and maintained by CONTRACTOR within the County of Mendocino, California, CONTRACTOR shall, upon request of the COUNTY, make such books and records available to the COUNTY for inspection at a location within County or CONTRACTOR shall pay to the COUNTY the reasonable, and necessary costs incurred by the COUNTY in inspecting CONTRACTOR’s books and records, including, but not limited to, travel, lodging and subsistence costs. CONTRACTOR shall provide such assistance as may be reasonably required in the course of such inspection. The COUNTY further reserves the right to examine and reexamine said books, records and data during the four (4) year period following termination of this Agreement or completion of all work hereunder, as evidenced in writing by the COUNTY, and the CONTRACTOR shall in no event dispose of, destroy, alter, or mutilate said books, records, accounts, and data in any manner whatsoever for four

  • Governmental Access to Records BA shall make its internal practices, books and records relating to the use and disclosure of Protected Information available to CE and to the Secretary of the U.S. Department of Health and Human Services (the “Secretary”) for purposes of determining BA’s compliance with HIPAA [45 C.F.R. Section 164.504(A)(2)(ii)(I)]. BA shall provide CE a copy of any Protected Information and other documents and records that BA provides to the Secretary concurrently with providing such Protected Information to the Secretary.

  • Access to Site 3.05.1 Contractor may enter and leave the premises at all reasonable times without charge. Contractor and its employees may use the common areas and roadways of the premises where it is to perform the services together with all facilities, equipment, improvements, and services provided in connection with the premises for common use. This excludes parking for Contractor’s personnel. Contractor shall repair any damage caused by it or its employees as a result of its use of the common areas.

  • Access to Work District representatives shall at all times have access to the Work, wherever it is, in preparation or in progress. Contractor shall provide safe and proper facilities for such access.

  • Investment; Access to Data The undersigned has carefully reviewed and understands the risks of, and other considerations relating to, a purchase of the Common Stock and an investment in the Company. The undersigned has been furnished materials relating to the Company, the private placement of the Common Stock or anything else that it has requested and has been afforded the opportunity to ask questions and receive answers concerning the terms and conditions of the offering and obtain any additional information which the Company possesses or can acquire without unreasonable effort or expense. Representatives of the Company have answered all inquiries that the undersigned has made of them concerning the Company, or any other matters relating to the formation and operation of the Company and the offering and sale of the Common Stock. The undersigned has not been furnished any offering literature other than the materials that the Company may have provided at the request of the undersigned; and the undersigned has relied only on such information furnished or made available to the undersigned by the Company as described in this Section. The undersigned is acquiring the Shares for investment for the undersigned's own account, not as a nominee or agent and not with the view to, or for resale in connection with, any distribution thereof. The undersigned acknowledges that the Company is a start-up company with no current operations, assets or operating history, which may possibly cause a loss of Purchaser’s entire investment in the Company.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!