Operational Access and Control Sample Clauses

Operational Access and Control. Except as provided in Attachment 5, AEP shall have the sole right to enter upon, test, operate and control the facilities covered by this Agreement that are owned by AEP. The right to test, operate and control said facilities includes but is not limited to the power to direct the opening and closing of switches for construction, operation, testing, maintenance and other relevant purposes. All meters and test switches, whether provided by AEP or Customer, shall be sealed and the seals shall be broken only when the meters are to be tested, adjusted or replaced. The other Party shall be provided as much advance notice as is practicable in the circumstances when the facilities of that Party are to be entered or the seals of any meter are to be broken, and such Party shall be afforded the opportunity to be present during such test, adjustment, repair, replacement.
AutoNDA by SimpleDocs
Operational Access and Control. Unless otherwise specifically agreed, AEP shall have the sole right to enter upon, test, operate and control the facilities covered by this Agreement that are owned by Customer when such facilities can directly affect the safety, reliability and/or continuity of service to other customers. The right to test, operate and control said facilities includes but is not limited to the power to direct the opening and closing of switches for construction, operation, testing, maintenance and other relevant purposes. All meters and test switches, whether provided by AEP or IMPA, shall be sealed and the seals shall be broken only when the meters are to be tested, adjusted or replaced. The other Party shall be provided as much advance notice as is practicable in the circumstances when the facilities of that Party are to be entered or the seals of any meter are to be broken, and such Party shall be afforded the opportunity to be present during such test, adjustment, repair, replacement.
Operational Access and Control. Except as provided in Attachment 5, Host Transmission Owner shall have the sole right to enter upon, test, operate and control the facilities covered by this Agreement that are owned by Host Transmission Owner. The right to test, operate and control said facilities includes but is not limited to the power to direct the opening and closing of switches for construction, operation, testing, maintenance and other relevant purposes. All meters and test switches, whether provided by Host Transmission Owner or Customer, shall be sealed and the seals shall be broken only when the meters are to be tested, adjusted or replaced. The other Party shall be provided as much advance notice as is practicable in the circumstances when the facilities of that Party are to be entered or the seals of any meter are to be broken, and such Party shall be afforded the opportunity to be present during such test, adjustment, repair, replacement.

Related to Operational Access and Control

  • Additional Access Rights For the avoidance of doubt any grant of Access Rights not covered by the Grant Agreement or this Consortium Agreement shall be at the absolute discretion of the owning Party and subject to such terms and conditions as may be agreed between the owning and receiving Parties.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization. Measures: • Multiple authorization levels are used when granting access to sensitive systems, including those storing and processing Personal Data. Authorizations are managed via defined processes according to the SAP Security Policy • All personnel access SAP’s systems with a unique identifier (user ID). • SAP has procedures in place so that requested authorization changes are implemented only in accordance with the SAP Security Policy (for example, no rights are granted without authorization). In case personnel leaves the company, their access rights are revoked. • SAP has established a password policy that prohibits the sharing of passwords, governs responses to password disclosure, and requires passwords to be changed on a regular basis and default passwords to be altered. Personalized user IDs are assigned for authentication. All passwords must fulfill defined minimum requirements and are stored in encrypted form. In the case of domain passwords, the system forces a password change every six months in compliance with the requirements for complex passwords. Each computer has a password-protected screensaver. • The company network is protected from the public network by firewalls. • SAP uses up–to-date antivirus software at access points to the company network (for e-mail accounts), as well as on all file servers and all workstations. • Security patch management is implemented to provide regular and periodic deployment of relevant security updates. Full remote access to SAP’s corporate network and critical infrastructure is protected by strong authentication.

  • Additional Acceptable Uses of Student Data Contractor is prohibited from using Student Data for any secondary use not described in this agreement except:

  • Network Services Local Access Services In lieu of any other rates and discounts, Customer will pay fixed monthly recurring local loop charges ranging from $1,200 to $2,000 for TDM-based DS-3 Network Services Local Access Services at 2 CLLI codes mutually agreed upon by Customer and Company.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage. Measures: • As part of the SAP Security Policy, Personal Data requires at least the same protection level as “confidential” information according to the SAP Information Classification standard. • Access to Personal Data is granted on a need-to-know basis. Personnel have access to the information that they require in order to fulfill their duty. SAP uses authorization concepts that document grant processes and assigned roles per account (user ID). All Customer Data is protected in accordance with the SAP Security Policy. • All production servers are operated in the Data Centers or in secure server rooms. Security measures that protect applications processing Personal Data are regularly checked. To this end, SAP conducts internal and external security checks and penetration tests on its IT systems. • SAP does not allow the installation of software that has not been approved by SAP. • An SAP security standard governs how data and data carriers are deleted or destroyed once they are no longer required.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • User Access Transfer Agent shall have a process to promptly disable access to Fund Data by any Transfer Agent personnel who no longer requires such access. Transfer Agent will also promptly remove access of Fund personnel upon receipt of notification from Fund.

  • Elsevier Open Access Terms and Conditions You can publish open access with Elsevier in hundreds of open access journals or in nearly 2000 established subscription journals that support open access publishing. Permitted third party re-use of these open access articles is defined by the author's choice of Creative Commons user license. See our open access license policy for more information. Terms & Conditions applicable to all Open Access articles published with Elsevier: Any reuse of the article must not represent the author as endorsing the adaptation of the article nor should the article be modified in such a way as to damage the author's honour or reputation. If any changes have been made, such changes must be clearly indicated. The author(s) must be appropriately credited and we ask that you include the end user license and a DOI link to the formal publication on ScienceDirect. If any part of the material to be used (for example, figures) has appeared in our publication with credit or acknowledgement to another source it is the responsibility of the user to ensure their reuse complies with the terms and conditions determined by the rights holder. Additional Terms & Conditions applicable to each Creative Commons user license:

  • PROJECT ACCESS The Grantee shall ensure that the State, the Governor of the State, or any authorized representative of the foregoing, will have safe and suitable access to the Project site at all reasonable times during Project construction and thereafter for the term of this Agreement.

  • ACCESS TO OPERATIONS SUPPORT SYSTEMS 2.1 BellSouth shall provide Max-Tel access to operations support systems (“OSS”) functions for pre-ordering, ordering and provisioning, maintenance and repair, and billing. BellSouth shall provide access to the OSS through manual and/or electronic interfaces as described in this Attachment. It is the sole responsibility of Max-Tel to obtain the technical capability to access and utilize BellSouth’s OSS interfaces. Specifications for Max-Tel ’s access and use of BellSouth’s electronic Version R4Q01: 12/01/01 interfaces are set forth at xxx.xxxxxxxxxxxxxxx.xxxxxxxxx.xxx and are incorporated herein by reference.

Time is Money Join Law Insider Premium to draft better contracts faster.