Inadvertent access Sample Clauses

Inadvertent access. Design-Builder shall provide all safety barriers, signage, fences, and barricades necessary to: (a) protect persons on the Project site and those entering it; (b) prevent inadvertent or unauthorized entry by the public onto the Project site and any Work Area; and (c) designate the Work Area as a “Danger” area to warn and protect person from any hazards which may occur during the course of the Work. The Danger area shall be the area immediately surrounding the location where the site is disturbed or where Work is underway. The exact location of barriers shall be placed by Design- Builder and coordinated with ADR before commencement of the Work. Design-Builder shall erect a fence to protect the limits of construction and to secure materials kept on- site – or otherwise secure the materials. Costs associated with the foregoing shall be deemed to be part of the Design-Builder Construction Overhead Costs within the GMP.
AutoNDA by SimpleDocs
Inadvertent access. Contractor shall provide all safety barriers, signage, fences, and barricades necessary to: (a) protect persons on the Project site and those entering it; (b) prevent inadvertent or unauthorized entry by the public onto the Project site and any Work Area; and (c) designate the Work Area as a “Danger” area to warn and protect person from any hazards which may occur during the course of the Work. The Danger area shall be the area immediately surrounding the location where the site is disturbed or where Work is underway. The exact location of barriers shall be placed by Contractor and coordinated with ADR before commencement of the Work. Contractor shall erect a fence to protect the limits of construction and to secure materials kept on-site – or otherwise secure the materials.
Inadvertent access. CM shall provide all safety barriers, signage, fences, and barricades necessary to: (a) protect persons on the Project site and those entering it; (b) prevent inadvertent or unauthorized entry by the public onto the Project site and any Work Area; and (c) designate the Work Area as a “Danger” area to warn and protect person from any hazards which may occur during the course of the Work. The Danger area shall be the area immediately surrounding the location where the site is disturbed or where Work is underway. The exact location of barriers shall be placed by CM and coordinated with the ADR before commencement of the Work. CM shall erect a fence to protect the limits of construction and to secure materials kept on-site – or otherwise secure the materials. Costs associated with the foregoing shall be deemed to be part of the CM Construction Overhead Costs within the GMP.
Inadvertent access. (a) Each party recognizes that its Co-Located Employees may each become exposed to certain information considered confidential hereunder by another party (whether by overhearing, visual observance or otherwise), the disclosure of which occurs because such Co-Located Employees are present at another party’s (or its Affiliates’) facilities. Each party also recognizes that its employees may gain access to information that another party considers confidential, from the Co-Located Employee of another party (whether by overhearing, visual observance or otherwise) on its own premises. Such information may be related or unrelated to the activities under this Agreement. (b) The parties recognize that in these circumstances, it is impractical to require strict adherence to the requirement that all information a party considers confidential to be identified as such in order to enjoy the protections of this Section 8. Therefore, notwithstanding the definition of Confidential Information, tangible information obtained from a party hereto under the circumstances described in this Section 8.5 need not be marked as confidential, and information that is learned orally or by observation, need not be identified as confidential at the time of disclosure and confirmed in writing as confidential to be deemed Confidential Information hereunder, and subject to the restrictions and limitation in this Section 8. [ * ] = Certain confidential information contained in this document, marked by brackets, is filed with the Securities and Exchange Commission pursuant to Rule 24b-2 of the Securities Exchange Act of 1934, as amended. (c) Each party agrees to advise its employees of this provision. Without limiting the restrictions set forth in Section 8.2(a) or otherwise, each party will advise its Co-Located Employees that information learned by a Co-Located Employee that is unrelated to the activities under this Agreement may not be shared with any other person for any reason. (d) The rights of EMRE and EMCC to use and disclose Ancillary Combinatorial Chemistry Information acquired by its Co-Located Employees will be the same as their rights to use and disclose the Symyx Combinatorial Chemistry Know-How to the extent the Ancillary Combinatorial Chemistry Information relates to the Project(s). “Ancillary Combinatorial Chemistry Information” means [ * ].

Related to Inadvertent access

  • Information Access Each Party (“Disclosing Party”) shall make available to another Party (“Requesting Party”) information that is in the possession of the Disclosing Party and is necessary in order for the Requesting Party to: (i) verify the costs incurred by the Disclosing Party for which the Requesting Party is responsible under this Agreement; and (ii) carry out its obligations and responsibilities under this Agreement. The Parties shall not use such information for purposes other than those set forth in this Article 25.1 of this Agreement and to enforce their rights under this Agreement.

  • Computer Access Where possible, providing no additional costs are incurred by the Employer, one (1) authorized representative of each Union shall be entitled to submit for posting on the Employer's electronic communication system one electronic Union notice per month for members of the bargaining unit. The Employer shall determine the method of distribution. The Employer shall review all proposed notices and retain a discretion not to post any notice that it deems unlawful or contrary to the Employer’s interests, which discretion shall not be unreasonably exercised. The Union agrees to indemnify the Employer for any liability arising out of offensive or otherwise unlawful notices posted by the Union. Nothing in this Article requires a change to distribution practices that existed prior to April 1, 2015.

  • User Access Transfer Agent shall have a process to promptly disable access to Fund Data by any Transfer Agent personnel who no longer requires such access. Transfer Agent will also promptly remove access of Fund personnel upon receipt of notification from Fund.

  • Parent Access To the extent required by law the LEA shall establish reasonable procedures by which a parent, legal guardian, or eligible student may review Education Records and/or Student Data correct erroneous information, and procedures for the transfer of student-generated content to a personal account, consistent with the functionality of services. Provider shall respond in a reasonably timely manner (and no later than forty five (45) days from the date of the request or pursuant to the time frame required under state law for an LEA to respond to a parent or student, whichever is sooner) to the LEA’s request for Student Data in a student’s records held by the Provider to view or correct as necessary. In the event that a parent of a student or other individual contacts the Provider to review any of the Student Data accessed pursuant to the Services, the Provider shall refer the parent or individual to the LEA, who will follow the necessary and proper procedures regarding the requested information.

  • Unauthorized Access Using service to access, or to attempt to access without authority, the accounts of others, or to penetrate, or attempt to penetrate, security measures of Company’s or a third party’s computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in disruption of service or the corruption or loss of data.

  • Confidential System Information HHSC prohibits the unauthorized disclosure of Other Confidential Information. Grantee and all Grantee Agents will not disclose or use any Other Confidential Information in any manner except as is necessary for the Project or the proper discharge of obligations and securing of rights under the Contract. Grantee will have a system in effect to protect Other Confidential Information. Any disclosure or transfer of Other Confidential Information by Xxxxxxx, including information requested to do so by HHSC, will be in accordance with the Contract. If Grantee receives a request for Other Confidential Information, Xxxxxxx will immediately notify HHSC of the request, and will make reasonable efforts to protect the Other Confidential Information from disclosure until further instructed by the HHSC. Grantee will notify HHSC promptly of any unauthorized possession, use, knowledge, or attempt thereof, of any Other Confidential Information by any person or entity that may become known to Grantee. Grantee will furnish to HHSC all known details of the unauthorized possession, use, or knowledge, or attempt thereof, and use reasonable efforts to assist HHSC in investigating or preventing the reoccurrence of any unauthorized possession, use, or knowledge, or attempt thereof, of Other Confidential Information. HHSC will have the right to recover from Grantee all damages and liabilities caused by or arising from Grantee or Grantee Agents’ failure to protect HHSC’s Confidential Information as required by this section.

  • ICANN Access Registry Operator shall provide bulk access to the zone files for the TLD to ICANN or its designee on a continuous basis in the manner ICANN may reasonably specify from time to time. Access will be provided at least daily. Zone files will include SRS data committed as close as possible to 00:00:00 UTC.

  • Account Access Electronic Check Transactions may only be made from your checking account.

  • Internet Access Hotels and Airports Employees who travel may need to access their e-mail at night. Many hotels provide free high speed internet access and Tyler employees are encouraged to use such hotels whenever possible. If an employee’s hotel charges for internet access it is reimbursable up to $10.00 per day. Charges for internet access at airports are not reimbursable.

  • Line Information Database (LIDB 9.1 BellSouth will store in its Line Information Database (LIDB) records relating to service only in the BellSouth region. The LIDB Storage Agreement is included in this Attachment as Exhibit C. 9.2 BellSouth will provide LIDB Storage upon written request to <<customer_name>>’s Account Manager stating a requested activation date.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!