Security and Access The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies (“Facilities Information Technology and Access Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction or reverse engineering of, or tampering with any Facilities and Information Technology Access Resources or other Company property or materials by others.
Inspection and Access Landlord and its agents, representatives, and contractors may enter the Premises at any reasonable time to inspect the Premises and to make such repairs as may be required or permitted pursuant to this Lease and for any other business purpose. Landlord and Landlord’s representatives may enter the Premises during business hours on not less than 48 hours advance written notice (except in the case of emergencies in which case no such notice shall be required and such entry may be at any time) for the purpose of effecting any such repairs, inspecting the Premises, showing the Premises to prospective purchasers and, during the last year of the Term, to prospective tenants or for any other business purpose. Landlord may erect a suitable sign on the Premises stating the Premises are available to let or that the Project is available for sale. Landlord may grant easements, make public dedications, designate Common Areas and create restrictions on or about the Premises, provided that no such easement, dedication, designation or restriction materially, adversely affects Tenant’s use or occupancy of the Premises for the Permitted Use. At Landlord’s request, Tenant shall execute such instruments as may be necessary for such easements, dedications or restrictions. Tenant shall at all times, except in the case of emergencies, have the right to escort Landlord or its agents, representatives, contractors or guests while the same are in the Premises, provided such escort does not materially and adversely affect Landlord’s access rights hereunder.
Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.
Zone File Access Agreement Registry Operator will enter into an agreement with any Internet user, which will allow such user to access an Internet host server or servers designated by Registry Operator and download zone file data. The agreement will be standardized, facilitated and administered by a Centralized Zone Data Access Provider, which may be ICANN or an ICANN designee (the “CZDA Provider”). Registry Operator (optionally through the CZDA Provider) will provide access to zone file data per Section 2.1.3 of this Specification and do so using the file format described in Section 2.1.4 of this Specification. Notwithstanding the foregoing, (a) the CZDA Provider may reject the request for access of any user that does not satisfy the credentialing requirements in Section 2.1.2 below; (b) Registry Operator may reject the request for access of any user that does not provide correct or legitimate credentials under Section 2.1.2 below or where Registry Operator reasonably believes will violate the terms of Section 2.1.5. below; and, (c) Registry Operator may revoke access of any user if Registry Operator has evidence to support that the user has violated the terms of Section 2.1.5 below.
LEAST RESTRICTIVE ENVIRONMENT/DUAL ENROLLMENT CONTRACTOR and XXX shall follow all LEA policies and procedures that support Least Restrictive Environment (“LRE”) options and/or dual enrollment options if available and appropriate, for students to have access to the general curriculum and to be educated with their nondisabled peers to the maximum extent appropriate. CONTRACTOR and XXX shall ensure that LRE placement options are addressed at all IEP team meetings regarding students for whom ISAs have been or may be executed. This shall include IEP team consideration of supplementary aids and services, goals and objectives necessary for placement in the LRE and necessary to enable students to transition to less restrictive settings. When an IEP team has determined that a student should be transitioned into the public school setting, CONTRACTOR shall assist the LEA in implementing the IEP team’s recommended activities to support the transition.
Records and Access The Advisor, in the conduct of its responsibilities to the Company, shall maintain adequate and separate books and records for the Company’s operations in accordance with GAAP, which shall be supported by sufficient documentation to ascertain that such books and records are properly and accurately recorded. Such books and records shall be the property of the Company and shall be available for inspection by the Board and by counsel, auditors and other authorized agents of the Company, at any time or from time to time during normal business hours. The Advisor shall at all reasonable times have access to the books and records of the Company and the Operating Partnership.
Security Violations and Accounts Updates Grantee will adhere to the Confidentiality Article requirements and HHS Data Usage Agreement of this contract and immediately contact System Agency if a security violation is detected, or if Grantee has any reason to suspect that the security or integrity of the CMBHS data has been or may be compromised in any way.
Power Supply Information and Access to Information POWER SUPPLY INFORMATION
Dissemination of Research Findings and Acknowledgement of Controlled-Access Datasets Subject to the NIH GDS Policy
Records Retention and Access 1. Grantee will keep and maintain, as applicable, accurate and complete records necessary to determine compliance with this Contract and applicable laws. 2. Grantee will provide access to its records to DFPS, the Texas State Auditor’s Office (SAO), the Federal Government, and their authorized representatives. 3. Unless otherwise specified in this Contract, Grantee will maintain legible copies of this Contract and all related documentation for a minimum of seven years after the termination of this Contract or seven years after the completion of any litigation or dispute involving the Contract, whichever is longer. 4. THE GRANTEE WILL NOT DISPOSE OF RECORDS BEFORE PROVIDING THE DFPS CONTRACT MANAGER WRITTEN NOTICE OF ITS INTENT TO DISPOSE OF RECORDS AND RECEIVING WRITTEN APPROVAL FROM THE DFPS CONTRACT MANAGER.