Access to NID 2.7.3.1 NewPhone may access the customer’s premises wiring by any of the following means and NewPhone shall not disturb the existing form of electrical protection and shall maintain the physical integrity of the NID: 2.7.3.1.1 BellSouth shall allow NewPhone to connect its Loops directly to BellSouth’s multi-line residential NID enclosures that have additional space and are not used by BellSouth or any other telecommunications carriers to provide service to the premises; 2.7.3.1.2 Where an adequate length of the customer’s premises wiring is present and environmental conditions permit, either Party may remove the customer premises wiring from the other Party’s NID and connect such wiring to that Party’s own NID; 2.7.3.1.3 Either Party may enter the subscriber access chamber or dual chamber NID enclosures for the purpose of extending a cross-connect or spliced jumper wire from the customer premises wiring through a suitable “punch-out” hole of such NID enclosures; or 2.7.3.1.4 NewPhone may request BellSouth to make other rearrangements to the customer premises wiring terminations or terminal enclosure on a time and materials cost basis. 2.7.3.2 In no case shall either Party remove or disconnect the other Party’s loop facilities from either Party’s NIDs, enclosures, or protectors unless the applicable Commission has expressly permitted the same and the disconnecting Party provides prior notice to the other Party. In such cases, it shall be the responsibility of the Party disconnecting loop facilities to leave undisturbed the existing form of electrical protection and to maintain the physical integrity of the NID. It will be NewPhone’s responsibility to ensure there is no safety hazard, and NewPhone will hold BellSouth harmless for any liability associated with the removal of the BellSouth Loop from the BellSouth NID. Furthermore, it shall be the responsibility of the disconnecting Party, once the other Party’s loop has been disconnected from the NID, to reconnect the disconnected loop to a nationally recognized testing laboratory listed station protector, which has been grounded as per Article 800 of the National Electrical Code. If no spare station protector exists in the NID, the disconnected loop must be appropriately cleared, capped and stored. 2.7.3.3 NewPhone shall not remove or disconnect ground wires from BellSouth’s NIDs, enclosures, or protectors. 2.7.3.4 NewPhone shall not remove or disconnect NID modules, protectors, or terminals from BellSouth’s NID enclosures. 2.7.3.5 Due to the wide variety of NID enclosures and outside plant environments, BellSouth will work with NewPhone to develop specific procedures to establish the most effective means of implementing this section if the procedures set forth herein do not apply to the NID in question.
Access to Facility 13.1 Each Party shall ensure that its facilities are secured at all times. 13.2 The Customer shall permit and, if the land on which the Facility is located is not owned by Customer, cause such landowner to permit, the Distributor's employees and agents to enter the property on which the Facility is located at any reasonable time. Such access shall be provided for the purposes of inspecting and/or testing the Facility as and when permitted by this Agreement, the Code or the Distributor’s Conditions of Service or as required to ensure the continued safe and satisfactory operation of the Facility, to ensure the accuracy of the Distributor's meters, to establish work protection, or to perform work. 13.3 Any inspecting and/or testing referred to in section 13.2 shall not relieve the Customer from its obligation to operate and maintain the Facility and any related equipment in a safe and satisfactory operating condition and in accordance with this Agreement. 13.4 The Distributor shall have the right to witness any testing done by the Customer of the Facility and, to that end, the Customer shall provide the Distributor with at least fifteen working days advance notice of the testing. 13.5 Notwithstanding section 10.1, where the Distributor causes damage to the Customer's property as part of this access, the Distributor shall pay to the Customer the Customer's reasonable costs of repairing such property or, if such property cannot be repaired, replacing such property. 13.6 Notwithstanding section 10.1, if the Customer has been given access to the Distributor’s property, and if the Customer causes damage to the Distributor’s property as part of that access, the Customer shall pay to the Distributor the Distributor’s reasonable costs of repairing such property or, if such property cannot be repaired, replacing such property.
Physical Access Control Unauthorized persons are prevented from gaining physical access to premises, buildings or rooms where data processing systems that process and/or use Personal Data are located.
Access to Site 3.05.1 Contractor may enter and leave the premises at all reasonable times without charge. Contractor and its employees may use the common areas and roadways of the premises where it is to perform the services together with all facilities, equipment, improvements, and services provided in connection with the premises for common use. This excludes parking for Contractor’s personnel. Contractor shall repair any damage caused by it or its employees as a result of its use of the common areas.
Access to Work Locations Reasonable access to employee work locations shall be granted officers of the Association and their officially designated representatives for the purpose of processing grievances or contacting members of the Association concerning business within the scope of representation. Such officers or representatives shall not enter any work location without the consent of the City Manager. Access shall be restricted so as not to interfere with the normal operations of the department or with established safety or security requirements. Solicitation of membership and activities concerned with the internal management of the Association, such as collecting dues, holding membership meetings, campaigning for office, conducting elections and distributing literature, shall not be conducted during working hours.
Investment; Access to Data The undersigned has carefully reviewed and understands the risks of, and other considerations relating to, a purchase of the Common Stock and an investment in the Company. The undersigned has been furnished materials relating to the Company, the private placement of the Common Stock or anything else that it has requested and has been afforded the opportunity to ask questions and receive answers concerning the terms and conditions of the offering and obtain any additional information which the Company possesses or can acquire without unreasonable effort or expense. Representatives of the Company have answered all inquiries that the undersigned has made of them concerning the Company, or any other matters relating to the formation and operation of the Company and the offering and sale of the Common Stock. The undersigned has not been furnished any offering literature other than the materials that the Company may have provided at the request of the undersigned; and the undersigned has relied only on such information furnished or made available to the undersigned by the Company as described in this Section. The undersigned is acquiring the Shares for investment for the undersigned's own account, not as a nominee or agent and not with the view to, or for resale in connection with, any distribution thereof. The undersigned acknowledges that the Company is a start-up company with no current operations, assets or operating history, which may possibly cause a loss of Purchaser’s entire investment in the Company.
Specific Provisions for Access Rights to Software For the avoidance of doubt, the general provisions for Access Rights provided for in this Section 9 are applicable also to Software. Parties’ Access Rights to Software do not include any right to receive source code or object code ported to a certain hardware platform or any right to receive respective Software documentation in any particular form or detail, but only as available from the Party granting the Access Rights.
Post-Closing Access to Information For a period of seven (7) years from the Closing Date, except as prohibited by applicable Law, Seller and Buyer shall, subject to compliance by the other with the provisions of Section 5.12 and the Transition Services Agreement, afford to each other and to each other’s Representatives reasonable access and duplicating rights (with copying costs to be borne by the requesting party) during normal business hours to all books and records, documents and other information (collectively, “Information”) within the knowledge, possession or control of the other party or its Affiliates solely to the extent relating to (a) in the case of requests by Buyer, the FH Business, Transferred FH Companies (and their Closing Subsidiaries), FH Assets, the Acquired FH Assets, Assumed Liabilities or Transferred Employees and (b) in the case of requests by Seller, the Excluded Businesses, the Excluded Assets or the Retained Liabilities, insofar in each case as such access is reasonably required by Seller or Buyer or any of their Subsidiaries or Affiliates for legitimate business reasons and does not violate any applicable Law or any confidentiality obligations applicable to Seller or Buyer or any of their Subsidiaries or Affiliates, as the case may be (and shall use reasonable efforts to cause persons or firms possessing relevant Information to give similar access) and, to the extent practicable, such Information is identified by the requesting party with reasonable specificity; provided, however, that no party shall be required to disclose any Information if (i) it believes in good faith that doing so presents a significant risk, based on advice of counsel (which can be inside counsel) of resulting in a loss of the ability to successfully assert a claim of Privilege or (ii) Seller or any of its Subsidiaries, on the one hand, and Buyer or any of its Subsidiaries, on the other hand, are adverse parties in a litigation (other than a litigation with respect to a claim for indemnification under this Agreement) and such information is reasonably pertinent thereto; provided, further, that, in the case of clause (i) above, the parties hereto shall reasonably cooperate in seeking to find a way to allow disclosure of such information without resulting in a loss of the ability to successfully assert a claim of Privilege; provided, further, that Seller and its Affiliates shall not be required to provide Buyer or its Representatives with any information related to the Sale Process or Seller’s or its Representatives’ evaluation thereof, including projections, financial or other information related thereto other than projections, financial or other information prepared in the ordinary course of the FH Business without being primarily prepared for the Sale Process. Without limiting the generality of the foregoing, Information may be requested under this Section 5.9 for audit and accounting purposes and in connection with Actions, as well as for purposes of fulfilling disclosure and reporting obligations.
Access to Data Operator shall make Data in the possession of the Operator available to the LEA within five (5) business days of a request by the LEA.
Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.