Open Access Same-Time Information System (OASIS): 1. 28A Operating Agreement of the PJM Interconnection, L.L.C. or Operating Agreement:
ICANN Access Registry Operator shall provide bulk access to the zone files for the TLD to ICANN or its designee on a continuous basis in the manner ICANN may reasonably specify from time to time. Access will be provided at least daily. Zone files will include SRS data committed as close as possible to 00:00:00 UTC.
Network Access TENANT may find it necessary to purchase a network interface card, wireless PC card or other hardware in order to connect to the internet service. LANDLORD is not responsible for the purchase of these items and LANDLORD cannot guarantee compatibility with any device TENANT may have. The computer and network card must have software installed that supports the Internet Protocol commonly referred to as TCP/IP. Any conflicts between the software compatibility of the network and the TENANT’S computer operating system or any other feature will be the responsibility of the TENANT to resolve. LANDLORD will not be responsible for software issues related to the user’s personal computer.
Post-Closing Access to Information For a period of seven (7) years from the Closing Date, except as prohibited by applicable Law, Seller and Buyer shall, subject to compliance by the other with the provisions of Section 5.12 and the Transition Services Agreement, afford to each other and to each other’s Representatives reasonable access and duplicating rights (with copying costs to be borne by the requesting party) during normal business hours to all books and records, documents and other information (collectively, “Information”) within the knowledge, possession or control of the other party or its Affiliates solely to the extent relating to (a) in the case of requests by Buyer, the FH Business, Transferred FH Companies (and their Closing Subsidiaries), FH Assets, the Acquired FH Assets, Assumed Liabilities or Transferred Employees and (b) in the case of requests by Seller, the Excluded Businesses, the Excluded Assets or the Retained Liabilities, insofar in each case as such access is reasonably required by Seller or Buyer or any of their Subsidiaries or Affiliates for legitimate business reasons and does not violate any applicable Law or any confidentiality obligations applicable to Seller or Buyer or any of their Subsidiaries or Affiliates, as the case may be (and shall use reasonable efforts to cause persons or firms possessing relevant Information to give similar access) and, to the extent practicable, such Information is identified by the requesting party with reasonable specificity; provided, however, that no party shall be required to disclose any Information if (i) it believes in good faith that doing so presents a significant risk, based on advice of counsel (which can be inside counsel) of resulting in a loss of the ability to successfully assert a claim of Privilege or (ii) Seller or any of its Subsidiaries, on the one hand, and Buyer or any of its Subsidiaries, on the other hand, are adverse parties in a litigation (other than a litigation with respect to a claim for indemnification under this Agreement) and such information is reasonably pertinent thereto; provided, further, that, in the case of clause (i) above, the parties hereto shall reasonably cooperate in seeking to find a way to allow disclosure of such information without resulting in a loss of the ability to successfully assert a claim of Privilege; provided, further, that Seller and its Affiliates shall not be required to provide Buyer or its Representatives with any information related to the Sale Process or Seller’s or its Representatives’ evaluation thereof, including projections, financial or other information related thereto other than projections, financial or other information prepared in the ordinary course of the FH Business without being primarily prepared for the Sale Process. Without limiting the generality of the foregoing, Information may be requested under this Section 5.9 for audit and accounting purposes and in connection with Actions, as well as for purposes of fulfilling disclosure and reporting obligations.
Zone File Access Agreement Registry Operator will enter into an agreement with any Internet user, which will allow such user to access an Internet host server or servers designated by Registry Operator and download zone file data. The agreement will be standardized, facilitated and administered by a Centralized Zone Data Access Provider, which may be ICANN or an ICANN designee (the “CZDA Provider”). Registry Operator (optionally through the CZDA Provider) will provide access to zone file data per Section 2.1.3 of this Specification and do so using the file format described in Section 2.1.4 of this Specification. Notwithstanding the foregoing, (a) the CZDA Provider may reject the request for access of any user that does not satisfy the credentialing requirements in Section 2.1.2 below; (b) Registry Operator may reject the request for access of any user that does not provide correct or legitimate credentials under Section 2.1.2 below or where Registry Operator reasonably believes will violate the terms of Section 2.1.5. below; and, (c) Registry Operator may revoke access of any user if Registry Operator has evidence to support that the user has violated the terms of Section 2.1.5 below.
Network Services Local Access Services In lieu of any other rates and discounts, Customer will pay fixed monthly recurring local loop charges ranging from $1,200 to $2,000 for TDM-based DS-3 Network Services Local Access Services at 2 CLLI codes mutually agreed upon by Customer and Company.
Gold Open Access Articles May be shared according to the author-selected end-user license and should contain a CrossMark logo, the end user license, and a DOI link to the formal publication on ScienceDirect. Please refer to Elsevier's posting policy for further information.
System Access CUSTOMER agrees to provide to PROVIDER, at CUSTOMER’S expense, necessary access to the mainframe computer and related information technology systems (the “System”) on which CUSTOMER data is processed during the times (the “Service Hours”) specified in the PSAs, subject to reasonable downtime for utility outages, maintenance, performance difficulties and the like. In the event of a change in the Service Hours, CUSTOMER will provide PROVIDER with at least fifteen (15) calendar days written notice of such change.
User Access Transfer Agent shall have a process to promptly disable access to Fund Data by any Transfer Agent personnel who no longer requires such access. Transfer Agent will also promptly remove access of Fund personnel upon receipt of notification from Fund.
Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.