ICANN Access Registry Operator shall provide bulk access to the zone files for the TLD to ICANN or its designee on a continuous basis in the manner ICANN may reasonably specify from time to time. Access will be provided at least daily. Zone files will include SRS data committed as close as possible to 00:00:00 UTC.
User Access Transfer Agent shall have a process to promptly disable access to Fund Data by any Transfer Agent personnel who no longer requires such access. Transfer Agent will also promptly remove access of Fund personnel upon receipt of notification from Fund.
Open Access Same-Time Information System (OASIS): 1. 28A Operating Agreement of the PJM Interconnection, L.L.C. or Operating Agreement:
Early Access Subject to Tenant’s delivery of an executed original of this Lease, the prepaid Base Rent and the Letter of Credit as required elsewhere in this Lease, and the insurance certificates evidencing Tenant’s insurance policies required under this Lease, Landlord shall provide Tenant with early access to the Premises on the latest to occur of (i) the first (1st) Business Day following the date of mutual execution and delivery of this Lease, (ii) the first (1st) Business Day following the date on which Landlord determines the Premises is free and clear of any existing tenancy, and (iii) fifteen (15) days prior to Landlord’s then-estimated date of delivery of the Premises (in any case, the “Access Date”). Such period of early access shall commence on the Access Date and continue through the date immediately preceding the Commencement Date (the “Early Access Period”), and Tenant’s access during the Early Access Period shall be subject to all of the terms and conditions of this Lease, except for Tenant’s obligation to pay Rent (which obligation shall commence upon the Commencement Date, subject to the abatement of Base Rent provided in the Basic Lease Information). Notwithstanding the foregoing, the conduct of business in the Premises shall cause an immediate acceleration of the Commencement Date to the date of Tenant’s initial conduct of business in the Premises. During the Early Access Period, Tenant may enter the Premises (but not any other portion of the Building or the Project other than for ingress and egress) for the sole purpose of installing cabling, furniture, fixtures and equipment, provided that Tenant shall be solely responsible for all of the foregoing and for any loss or damage thereto from any cause whatsoever. Such early access and installation shall be permitted only to the extent that such early access and installation activities will not interfere with the access, use and occupancy of the Building or the Project by Landlord or any other tenant or occupant and/or Landlord’s performance of the Work and/or otherwise delay Landlord’s delivery of possession of the Premises to Tenant in the condition required under this Lease. The provisions of Sections 8(a) and 11 of this Lease shall apply in full during the Early Access Period, and Tenant shall (x) provide certificates of insurance evidencing the existence and amounts of liability insurance carried by Tenant and its agents and contractors, reasonably satisfactory to Landlord, prior to and as a condition to such early access, and (y) comply with all Laws applicable to such early access work in the Premises. If Landlord reasonably determines that Tenant’s early access is interfering in any material way with Landlord’s ability to deliver possession of the Premises in the condition required under this Lease and/or to complete the Work, then Landlord shall have the right to limit or otherwise restrict Tenant’s access during the Early Access Period without any liability.
Technology Access Fee After the Effective Date, within [***] days after receipt of the corresponding invoice from Mersana, Merck will pay to Mersana, a one-time, non-refundable, non-creditable, upfront fee of Twelve Million Dollars ($12,000,000.00) (the “Technology Access Fee”). Payment of the Technology Access Fee shall be subject to any withholding Tax obligations set forth in Section 6.9.1.
Post-Closing Access (a) Each of Seller and Buyer shall, and Buyer shall cause the Company to, preserve and keep all books and records and other information relating to the accounting, legal, Tax, regulatory, business and financial affairs of the Company and the Rolling Mill Business for a period of seven (7) years after the Closing Date (or, in the case of information relating to Taxes, until the expiration of any applicable statute of limitations), or for a longer period if (i) required by Law (including any statute of limitations and applicable extensions thereof) or any Governmental Authority or (ii) reasonably necessary with respect to the prosecution or defense of any audit or other legal or regulatory action that is then pending or threatened so long as the requesting Party has notified the other Party with prior written notice of the need to retain such books, records or information. (b) Following the Closing, for so long as such information is retained by Buyer in accordance with Section 5.8(a), Buyer shall, and shall cause the Company, to permit Seller and its authorized Representatives, at Seller’s sole cost and expense, to have reasonable access and duplication rights during normal business hours, upon reasonable prior written notice to Buyer to the information described in Section 5.8(a) to the extent that such access may be reasonably required in connection with (i) the preparation of any Tax Return, accounting records or with respect to any Tax Claim or similar proceedings, (ii) any Action relating to Seller, the Company or the Rolling Mill Business, (iii) any Governmental Filing or matter (including investigations by Governmental Authorities) or (iv) any other valid legal or business purpose. Notwithstanding the foregoing, Seller shall have no right of access to, and Buyer shall have no obligation to provide, (A) any information if doing so would reasonably be expected to (1) violate any Contract or Law to which Buyer or any of its Affiliates (including the Company) is a party or is subject, (2) result in a loss of the ability to successfully assert a claim of privilege (including the attorney-client and work product privileges), (3) result in the disclosure of any competitively sensitive information of Buyer or of any of its Affiliates (including the Company), or (4) breach a confidentiality or other obligation to a Third Party (provided that Buyer shall use commercially reasonable efforts to obtain the consent of any Third Party with regards to such disclosure), or (B) any consolidated, combined, affiliated or unitary Tax Return which includes Buyer or any of its Affiliates (including the Company) or any Tax-related work papers. (c) Following the Closing, for so long as such information is retained by Seller in accordance with Section 5.8(a), Seller shall permit Buyer and its authorized Representatives, at Buyer’s sole cost and expense, to have reasonable access and duplication rights during normal business hours, upon reasonable prior written notice to Seller, to the information described in Section 5.8(a) to the extent that such access may be reasonably required in connection with (i) the preparation of any Tax Return, accounting records or with any Tax Claim or similar proceedings, (ii) any Action relating to the Company or the Rolling Mill Business, (iii) any Governmental Filing or matter (including investigations by Governmental Authorities) or (iv) any other valid legal or business purpose. Notwithstanding the foregoing, Buyer shall have no right of access to, and Seller shall have no obligation to provide, (A) any information if doing so would reasonably be expected to (1) violate any Contract or Law to which Seller or any of its Affiliates is a party or is subject,
Technology Access Contractor expressly acknowledges that state funds may not be expended in connection with the purchase of an automated information system unless that system meets certain statutory requirements relating to accessibility by persons with visual impairments. Accordingly, Contractor represents and warrants to System Agency that the technology provided to System Agency for purchase (if applicable under this Contract or any related Solicitation) is capable, either by virtue of features included within the technology or because it is readily adaptable by use with other technology, of: • providing equivalent access for effective use by both visual and non-visual means; • presenting information, including prompts used for interactive communications, in formats intended for non-visual use; and • being integrated into networks for obtaining, retrieving, and disseminating information used by individuals who are not blind or visually impaired. For purposes of this Section, the phrase “equivalent access” means a substantially similar ability to communicate with or make use of the technology, either directly by features incorporated within the technology or by other reasonable means such as assistive devices or services which would constitute reasonable accommodations under the Americans With Disabilities Act or similar state or federal laws. Examples of methods by which equivalent access may be provided include, but are not limited to, keyboard alternatives to mouse commands and other means of navigating graphical displays, and customizable display appearance. In accordance with Section 2157.005 of the Texas Government Code, the Technology Access Clause contract provision remains in effect for any contract entered into before September 1, 2006.
Network Access TENANT may find it necessary to purchase a network interface card, wireless PC card or other hardware in order to connect to the internet service. LANDLORD is not responsible for the purchase of these items and LANDLORD cannot guarantee compatibility with any device TENANT may have. The computer and network card must have software installed that supports the Internet Protocol commonly referred to as TCP/IP. Any conflicts between the software compatibility of the network and the TENANT’S computer operating system or any other feature will be the responsibility of the TENANT to resolve. LANDLORD will not be responsible for software issues related to the user’s personal computer.
Secondary Systems The Developer and Connecting Transmission Owner shall each cooperate with the other in the inspection, maintenance, and testing of control or power circuits that operate below 600 volts, AC or DC, including, but not limited to, any hardware, control or protective devices, cables, conductors, electric raceways, secondary equipment panels, transducers, batteries, chargers, and voltage and current transformers that directly affect the operation of Developer or Connecting Transmission Owner’s facilities and equipment which may reasonably be expected to impact the other Party. The Developer and Connecting Transmission Owner shall each provide advance notice to the other Party, and to NYISO, before undertaking any work on such circuits, especially on electrical circuits involving circuit breaker trip and close contacts, current transformers, or potential transformers.
Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.