PEG ACCESS AND LO CHANNELS Sample Clauses

PEG ACCESS AND LO CHANNELS. (a) Upon the Effective Date, the Licensee shall continue to make available three (3) six- Megahertz (6 MHz) Downstream Channels for Westford PEG Access use, with corresponding Upstream Channel capacity, in addition to any statutorily-required Leased Access Channels. (b) The Licensee shall continue to make available one (1) six-Megahertz (6 MHz) Downstream Channel for Westford PEG Access/LO use. (c) Said Channels shall be used to transmit PEG Access and LO Programming to Subscribers, at no cost to Subscribers, the Town and/or PEG Access Users. (d) The Licensee shall not move or otherwise change the channel assignments of the PEG Access Channels, without advance written notice to the Issuing Authority. (e) Said PEG Access and LO channels shall be maintained and operated by the Licensee at no charge to Users. Operating rules for such channels shall be formulated after conferring with the Issuing Authority and the Advisory Committee. A copy of such rules shall be filed with the Advisory Committee within thirty (30) days of the Effective Date of the Renewal License, and annually thereafter if amended in any manner. (f) The Licensee shall monitor the PEG Access Channels for technical quality and shall ensure that they are maintained at standards commensurate with those that apply to the Cable System‟s non-Access channels. (g) Pursuant to Section 611(d) of the Cable Act, in the event that any of said PEG Access Channels are not being substantially programmed on a regular daily basis, the Licensee may use said PEG Access channels for the presentation of other Programming; provided, however, that PEG Access Programming shall always be a priority use of said PEG Access channels. In the event that such other Programming precludes the presentation of PEG Access Programming, the Issuing Authority shall notify the Licensee, in writing, of such fact and the Licensee shall cease utilizing said PEG Access channel(s) within sixty (60) days of said notification from the Issuing Authority. (h) In the event that the Licensee utilizes any such PEG Access Channel(s), per paragraph (g) supra, the Licensee shall place a notice on any such channel(s), on a regular basis, that said channel is a PEG Access Channel and can be utilized by PEG Access Users as such.
AutoNDA by SimpleDocs
PEG ACCESS AND LO CHANNELS. Upon the Effective Date, the Licensee shall continue to make available three (3) six- Megahertz (6 MHz) Downstream Channels for Westford PEG Access use, with corresponding Upstream Channel capacity, in addition to any statutorily-required Leased Access Channels.

Related to PEG ACCESS AND LO CHANNELS

  • Additional Access Rights For the avoidance of doubt any grant of Access Rights not covered by the Grant Agreement or this Consortium Agreement shall be at the absolute discretion of the owning Party and subject to such terms and conditions as may be agreed between the owning and receiving Parties.

  • User Access Transfer Agent shall have a process to promptly disable access to Fund Data by any Transfer Agent personnel who no longer requires such access. Transfer Agent will also promptly remove access of Fund personnel upon receipt of notification from Fund.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization.

  • REMOTE ACCESS SERVICES ADDENDUM The Custodian and each Fund agree to be bound by the terms of the Remote Access Services Addendum hereto.

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • Use of Basement and Service Areas The basement(s) and service areas, if any, as located within the

  • Zone File Access Agreement Registry Operator will enter into an agreement with any Internet user, which will allow such user to access an Internet host server or servers designated by Registry Operator and download zone file data. The agreement will be standardized, facilitated and administered by a Centralized Zone Data Access Provider, which may be ICANN or an ICANN designee (the “CZDA Provider”). Registry Operator (optionally through the CZDA Provider) will provide access to zone file data per Section 2.1.3 of this Specification and do so using the file format described in Section 2.1.4 of this Specification. Notwithstanding the foregoing, (a) the CZDA Provider may reject the request for access of any user that does not satisfy the credentialing requirements in Section 2.1.2 below; (b) Registry Operator may reject the request for access of any user that does not provide correct or legitimate credentials under Section 2.1.2 below or where Registry Operator reasonably believes will violate the terms of Section 2.1.5. below; and, (c) Registry Operator may revoke access of any user if Registry Operator has evidence to support that the user has violated the terms of Section 2.1.5 below.

  • Originating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage.

  • Additional Acceptable Uses of Student Data Contractor is prohibited from using Student Data for any secondary use not described in this agreement except: a. for adaptive learning or customized student learning purposes; b. to market an educational application or product to a parent or legal guardian of a student if Contractor did not use Data, shared by or collected per this Contract, to market the educational application or product; c. to use a recommendation engine to recommend to a student i. content that relates to learning or employment, within the third-party contractor's internal application, if the recommendation is not motivated by payment or other consideration from another party; or

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!