Access Rights Upon reasonable notice and supervision by the Granting Party, and subject to any required or necessary regulatory approvals, either the Connecting Transmission Owner or Developer (“Granting Party”) shall furnish to the other of those two Parties (“Access Party”) at no cost any rights of use, licenses, rights of way and easements with respect to lands owned or controlled by the Granting Party, its agents (if allowed under the applicable agency agreement), or any Affiliate, that are necessary to enable the Access Party to obtain ingress and egress at the Point of Interconnection to construct, operate, maintain, repair, test (or witness testing), inspect, replace or remove facilities and equipment to: (i) interconnect the Large Generating Facility with the New York State Transmission System; (ii) operate and maintain the Large Generating Facility, the Attachment Facilities and the New York State Transmission System; and (iii) disconnect or remove the Access Party’s facilities and equipment upon termination of this Agreement. In exercising such licenses, rights of way and easements, the Access Party shall not unreasonably disrupt or interfere with normal operation of the Granting Party’s business and shall adhere to the safety rules and procedures established in advance, as may be changed from time to time, by the Granting Party and provided to the Access Party. The Access Party shall indemnify the Granting Party against all claims of injury or damage from third parties resulting from the exercise of the access rights provided for herein.
Additional Access Rights For the avoidance of doubt any grant of Access Rights not covered by the Grant Agreement or this Consortium Agreement shall be at the absolute discretion of the owning Party and subject to such terms and conditions as may be agreed between the owning and receiving Parties.
Specific Provisions for Access Rights to Software For the avoidance of doubt, the general provisions for Access Rights provided for in this Section 9 are applicable also to Software. Parties’ Access Rights to Software do not include any right to receive source code or object code ported to a certain hardware platform or any right to receive respective Software documentation in any particular form or detail, but only as available from the Party granting the Access Rights.
USE OF TBS ACCESS CODE (a) An Account Holder may operate the TBS in relation to his Account by using his TBS Access Code. (b) Any Service Instructions identified by the Account Holder’s TBS Access Code shall be deemed to be given by the Account Holder and shall be conclusive and binding on the Account Holder and the Account Holder hereby authorises the Bank to act on any such Service Instructions identified by the Account Holder’s TBS Access Code. (c) All acts on the part of the Bank pursuant to such Service Instructions identified by the Account Holder’s TBS Access Code shall be conclusive and binding on the Account Holder (notwithstanding that such Service Instructions may not have been given by the Account Holder or with his consent or authority). (d) Notwithstanding and without prejudice to the other terms and conditions herein, the Bank shall be entitled (but not obliged), in its reasonable discretion, to permit the Account Holder to operate the TBS without the use of his T-PIN upon verifying the identity of the Account Holder in accordance with the Bank’s prevailing prescribed procedure at the time. (e) Notwithstanding and without prejudice to the other terms and conditions herein, the Bank shall be entitled, in its reasonable discretion, to refuse to act on all or any Service Instructions; and the Bank shall be entitled in its reasonable discretion to require written confirmation of the Account Holder’s Service Instructions (even where identified by the Account Holder’s TBS Access Code), and to refuse to act on any such Service Instructions unless and until such written confirmation is received by the Bank. (f) The use of any TBS and the TBS Access Code is also subject to the Bank’s terms and conditions governing the type of Account or facility of which the TBS may be operated in connection therewith and nothing in these terms and conditions shall be construed as amending or varying those terms and conditions. (g) The Bank shall at its reasonable discretion, be entitled to change, de- activate or revoke the use of the TBS Access Code at any time without giving any reason but with reasonable notice to the Account Holder.
Data Subjects Rights 5.1. Where a data subject asserts claims for rectification, erasure or access to Us, and where We are able to correlate the data subject to You, based on the information provided by the data subject, We shall refer such data subject to You without undue delay. We shall support You, where possible, and based upon Your instruction insofar as agreed upon. We shall not be liable in cases where You fail to respond to the data subject’s request completely, correctly, or in a timely manner. Notwithstanding the foregoing, if Your employee submits a data subject request in relation to Online Training Cloud, You agree that we can fulfill such request without Your further approval. 5.2. We shall support You, insofar as is agreed upon by the parties, and where possible for Us, in fulfilling data subjects’ requests and claims, as detailed in chapter III of the GDPR and in fulfilling the obligations enumerated in Articles 33 to 36 GDPR.
Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.
Facility Access Notwithstanding any other provision of the Agreement, the Customer shall provide the Authority with such access to the Facility, and such documentation, as the Authority deems necessary to determine the Customer’s compliance with the Customer’s Supplemental Commitments specified in this Schedule B.
Restricted Access (a) Buyer agrees that the Facilities themselves contain Seller’s valuable trade secrets. Buyer agrees (i) to restrict the use of such information to matters relating to the Facilities, and (ii) to restrict access to such information as provided in Section 10.3(b). (b) Seller’s Confidential Information will not be reproduced without Seller’s prior written consent, and following termination of this Agreement all copies of such written information will be returned to Seller upon written request (not to be made while materials are still of use to the operation of a Facility and no Buyer Default has occurred and is continuing), unless otherwise agreed by the Parties. Buyer’s Confidential Information will not be reproduced by Seller without Buyer’s prior written consent, and following termination of this Agreement all copies of such written information will be returned to Buyer upon written request or shall be certified by Seller as having been destroyed. (c) Subject to ARTICLE XI and Section 10.2(a) and (b) hereof, the Facilities are offered for sale and are sold by Seller subject to the condition that such sale does not convey any license, expressly or by implication, to manufacture, reverse engineer, duplicate or otherwise copy or reproduce any part of the Facilities, documentation or Software without Seller’s express advance written permission. Subject to ARTICLE XI hereof, Buyer agrees not to remove the covering, not to access the interior or to reverse engineer, or cause or knowingly allow any third party to open, access the interior or reverse engineer any Facility or Software provided by Seller. Subject to ARTICLE XI hereof, and anything contemplated pursuant to this Agreement, only Seller or its authorized representatives may open or access the interior of a Facility. Notwithstanding the foregoing or anything else herein to the contrary, and without limitation of the rights set forth in ARTICLE XI hereof, if any Facility is no longer covered by this Agreement or another agreement between Buyer and Seller (or any Affiliate of Seller) regarding the operation and maintenance of such Facility, Buyer shall be entitled to maintain, or cause a third party to maintain, such Facility, including replacing parts or components as needed or desired; provided that Buyer shall use commercially reasonable efforts to engage a third party to provide such maintenance that is not a competitor of Seller or its Affiliates and is not in litigation or other material dispute with Seller.
Site Access Dell requires the right to access the APEX System in a timely way and as provided in the Service Offering Description to provide the Support Services. Failure to ensure that Customer provides Dell with timely access to a Site will relieve Dell of the Support Services obligations and Dell may also, at Dell’s discretion, suspend the APEX Service.
User Access Transfer Agent shall have a process to promptly disable access to Fund Data by any Transfer Agent personnel who no longer requires such access. Transfer Agent will also promptly remove access of Fund personnel upon receipt of notification from Fund.