User Access Transfer Agent shall have a process to promptly disable access to Fund Data by any Transfer Agent personnel who no longer requires such access. Transfer Agent will also promptly remove access of Fund personnel upon receipt of notification from Fund.
Product Support a. In the event that any goods delivered under this contract become defective or malfunction for any reason and at any time (even after the applicable warranty period has expired), including while “in-orbit” if integrated into a satellite, Seller shall promptly perform a failure verification or analysis and determine the appropriate corrective action at no additional cost to Buyer. Seller shall take the appropriate measures to correct all defects, determined to be Seller's responsibility, in all applicable documentation, undelivered goods, and delivered un-launched goods, as required by Buyer.
Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.
New Products You agree to comply with NASD Notice to Members 5-26 recommending best practices for reviewing new products.
Technology Access Fee After the Effective Date, within [***] days after receipt of the corresponding invoice from Mersana, Merck will pay to Mersana, a one-time, non-refundable, non-creditable, upfront fee of Twelve Million Dollars ($12,000,000.00) (the [***] Portions of this exhibit have been redacted pursuant to a confidential treatment request. An unredacted version of this exhibit has been filed separately with the Commission. “Technology Access Fee”). Payment of the Technology Access Fee shall be subject to any withholding Tax obligations set forth in Section 6.9.1.
TECHNICAL SUPPORT SERVICES 2.1 The technical support services (the "Services"): Party A agrees to provide to Party B the relevant services requested by Party B, which are specified in Exhibit 1 attached hereto ("Exhibit 1").
License; Use Upon delivery to an Authorized Person or a person reasonably believed by Custodian to be an Authorized Person of the Fund of software enabling the Fund to obtain access to the System (the “Software”), Custodian grants to the Fund a personal, nontransferable and nonexclusive license to use the Software solely for the purpose of transmitting Written Instructions, receiving reports, making inquiries or otherwise communicating with Custodian in connection with the Account(s). The Fund shall use the Software solely for its own internal and proper business purposes and not in the operation of a service bureau. Except as set forth herein, no license or right of any kind is granted to the Fund with respect to the Software. The Fund acknowledges that Custodian and its suppliers retain and have title and exclusive proprietary rights to the Software, including any trade secrets or other ideas, concepts, know-how, methodologies, or information incorporated therein and the exclusive rights to any copyrights, trademarks and patents (including registrations and applications for registration of either), or other statutory or legal protections available in respect thereof. The Fund further acknowledges that all or a part of the Software may be copyrighted or trademarked (or a registration or claim made therefor) by Custodian or its suppliers. The Fund shall not take any action with respect tot the Software inconsistent with the foregoing acknowledgement, nor shall the Fund attempt to decompile, reverse engineer or modify the Software. The Fund may not xxx, sell, lease or provide, directly or indirectly, any of the Software of any portion thereof to any other person or entity without Custodian’s prior written consent. The Fund may not remove any statutory copyright notice or other notice included in the Software or on any media containing the Software. The Fund shall reproduce any such notice on any reproduction of the Software and shall add any statutory copyright notice or other notice to the Software or media upon Custodian’s request.
Data Access Services State Street agrees to make available to the Fund the Data Access Services subject to the terms and conditions of this Addendum and such data access operating standards and procedures as may be issued by State Street from time to time. The Fund shall be able to access the System to (i) originate electronic instructions to State Street in order to (a) effect the transfer or movement of cash or securities held under custody by State Street or (b) transmit accounting or other information (the transactions described in (i)(a) and (i)(b) above are referred to herein as “Client Originated Electronic Financial Instructions”), and (ii) access data for the purpose of reporting and analysis, which shall all be deemed to be Data Access Services for purposes of this Addendum.
Product Recall (a) If a recall is required by applicable Law, or if Buyer or Supplier reasonably determines that a recall is advisable because the goods may create a potential safety hazard, are not in compliance with any applicable code, standard or legal requirement, or contain a defect or non-conformance with the requirements of this Order occurring or likely to occur in multiple goods, which such defects or non-conformances are substantially similar or have substantially similar causes or effects (collectively a “Serial Defect”), the parties shall promptly communicate such facts to each other. At Buyer’s request, Supplier shall promptly develop a corrective action plan satisfactory to Buyer, which shall include all actions required to recall and/or repair the goods and any actions required by applicable Law (“Corrective Action Plan”) for Buyer’s review and approval. At Buyer’s election, Xxxxx may develop the Corrective Action Plan. In no event shall Buyer and Supplier’s failure to agree on the Corrective Action Plan delay the timely notification of a potential safety hazard, non-compliance or Serial Defect to users of the goods, cause either party to be non-compliant with applicable Law or prevent Buyer from taking reasonable actions to prevent injury or damage to persons, equipment or other property. Supplier and Buyer shall cooperate with and assist each other in any corrective actions and/or filings, if applicable.
Additional Products Upon satisfying the minimum order requirements above, Enrolled Affiliate may order Additional Products.