Post-Closing Access (a) Each of Seller and Buyer shall, and Buyer shall cause the Company to, preserve and keep all books and records and other information relating to the accounting, legal, Tax, regulatory, business and financial affairs of the Company and the Rolling Mill Business for a period of seven (7) years after the Closing Date (or, in the case of information relating to Taxes, until the expiration of any applicable statute of limitations), or for a longer period if (i) required by Law (including any statute of limitations and applicable extensions thereof) or any Governmental Authority or (ii) reasonably necessary with respect to the prosecution or defense of any audit or other legal or regulatory action that is then pending or threatened so long as the requesting Party has notified the other Party with prior written notice of the need to retain such books, records or information. (b) Following the Closing, for so long as such information is retained by Buyer in accordance with Section 5.8(a), Buyer shall, and shall cause the Company, to permit Seller and its authorized Representatives, at Seller’s sole cost and expense, to have reasonable access and duplication rights during normal business hours, upon reasonable prior written notice to Buyer to the information described in Section 5.8(a) to the extent that such access may be reasonably required in connection with (i) the preparation of any Tax Return, accounting records or with respect to any Tax Claim or similar proceedings, (ii) any Action relating to Seller, the Company or the Rolling Mill Business, (iii) any Governmental Filing or matter (including investigations by Governmental Authorities) or (iv) any other valid legal or business purpose. Notwithstanding the foregoing, Seller shall have no right of access to, and Buyer shall have no obligation to provide, (A) any information if doing so would reasonably be expected to (1) violate any Contract or Law to which Buyer or any of its Affiliates (including the Company) is a party or is subject, (2) result in a loss of the ability to successfully assert a claim of privilege (including the attorney-client and work product privileges), (3) result in the disclosure of any competitively sensitive information of Buyer or of any of its Affiliates (including the Company), or (4) breach a confidentiality or other obligation to a Third Party (provided that Buyer shall use commercially reasonable efforts to obtain the consent of any Third Party with regards to such disclosure), or (B) any consolidated, combined, affiliated or unitary Tax Return which includes Buyer or any of its Affiliates (including the Company) or any Tax-related work papers. (c) Following the Closing, for so long as such information is retained by Seller in accordance with Section 5.8(a), Seller shall permit Buyer and its authorized Representatives, at Buyer’s sole cost and expense, to have reasonable access and duplication rights during normal business hours, upon reasonable prior written notice to Seller, to the information described in Section 5.8(a) to the extent that such access may be reasonably required in connection with (i) the preparation of any Tax Return, accounting records or with any Tax Claim or similar proceedings, (ii) any Action relating to the Company or the Rolling Mill Business, (iii) any Governmental Filing or matter (including investigations by Governmental Authorities) or (iv) any other valid legal or business purpose. Notwithstanding the foregoing, Buyer shall have no right of access to, and Seller shall have no obligation to provide, (A) any information if doing so would reasonably be expected to (1) violate any Contract or Law to which Seller or any of its Affiliates is a party or is subject,
Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.
Closing Your Account Unless an agreement relating to a particular product or service says otherwise, you can close your Account at any time provided that you first settle any debit balance owing.
USER GENERATED CONTRIBUTIONS The Licensed Application may invite you to chat, contribute to, or participate in blogs, message boards, online forums, and other functionality, and may provide you with the opportunity to create, submit, post, display, transmit, perform, publish, distribute, or broadcast content and materials to us or in the Licensed Application, including but not limited to text, writings, video, audio, photographs, graphics, comments, suggestions, or personal information or other material (collectively, "Contributions"). Contributions may be viewable by other users of the Licensed Application and through third-party websites or applications. As such, any Contributions you transmit may be treated as non-confidential and non-proprietary. When you create or make available any Contributions, you thereby represent and warrant that: 1. The creation, distribution, transmission, public display, or performance, and the accessing, downloading, or copying of your Contributions do not and will not infringe the proprietary rights, including but not limited to the copyright, patent, trademark, trade secret, or moral rights of any third party. 2. You are the creator and owner of or have the necessary licenses, rights, consents, releases, and permissions to use and to authorize us, the Licensed Application, and other users of the Licensed Application to use your Contributions in any manner contemplated by the Licensed Application and this License Agreement. 3. You have the written consent, release, and/or permission of each and every identifiable individual person in your Contributions to use the name or likeness or each and every such identifiable individual person to enable inclusion and use of your Contributions in any manner contemplated by the Licensed Application and this License Agreement. 4. Your Contributions are not false, inaccurate, or misleading. 5. Your Contributions are not unsolicited or unauthorized advertising, promotional materials, pyramid schemes, chain letters, spam, mass mailings, or other forms of solicitation. 6. Your Contributions are not obscene, lewd, lascivious, filthy, violent, harassing, libelous, slanderous, or otherwise objectionable (as determined by us). 7. Your Contributions do not ridicule, mock, disparage, intimidate, or abuse anyone. 8. Your Contributions are not used to harass or threaten (in the legal sense of those terms) any other person and to promote violence against a specific person or class of people. 9. Your Contributions do not violate any applicable law, regulation, or rule. 10. Your Contributions do not violate the privacy or publicity rights of any third party. 11. Your Contributions do not violate any applicable law concerning child pornography, or otherwise intended to protect the health or well-being of minors. 12. Your Contributions do not include any offensive comments that are connected to race, national origin, gender, sexual preference, or physical handicap. 13. Your Contributions do not otherwise violate, or link to material that violates, any provision of this License Agreement, or any applicable law or regulation. Any use of the Licensed Application in violation of the foregoing violates this License Agreement and may result in, among other things, termination or suspension of your rights to use the Licensed Application.
Shareholder Account Maintenance (a) Maintain all shareholder records for each account in the Company. (b) Issue customer statements on scheduled cycle, providing duplicate second and third party copies if required. (c) Record shareholder account information changes. (d) Maintain account documentation files for each shareholder.
User Access Transfer Agent shall have a process to promptly disable access to Fund Data by any Transfer Agent personnel who no longer requires such access. Transfer Agent will also promptly remove access of Fund personnel upon receipt of notification from Fund.
Traffic Measurement and Billing over Interconnection Trunks 6.1 For billing purposes, each Party shall pass Calling Party Number (CPN) information on at least ninety-five percent (95%) of calls carried over the Interconnection Trunks. 6.1.1 As used in this Section 6, “Traffic Rate” means the applicable Reciprocal Compensation Traffic rate, Measured Internet Traffic rate, intrastate Switched Exchange Access Service rate, interstate Switched Exchange Access Service rate, or intrastate/interstate Tandem Transit Traffic rate, as provided in the Pricing Attachment, an applicable Tariff, or, for Measured Internet Traffic, the FCC Internet Order. 6.1.2 If the originating Party passes CPN on ninety-five percent (95%) or more of its calls, the receiving Party shall xxxx the originating Party the Traffic Rate applicable to each relevant minute of traffic for which CPN is passed. For any remaining (up to 5%) calls without CPN information, the receiving Party shall xxxx the originating Party for such traffic at the Traffic Rate applicable to each relevant minute of traffic, in direct proportion to the minutes of use of calls passed with CPN information. 6.1.3 If the originating Party passes CPN on less than ninety-five percent (95%) of its calls and the originating Party chooses to combine Reciprocal Compensation Traffic and Toll Traffic on the same trunk group, the receiving Party shall xxxx the higher of its interstate Switched Exchange Access Service rates or its intrastate Switched Exchange Access Services rates for all traffic that is passed without CPN, unless the Parties agree that other rates should apply to such traffic. 6.2 At such time as a receiving Party has the capability, on an automated basis, to use such CPN to classify traffic delivered over Interconnection Trunks by the other Party by Traffic Rate type (e.g., Reciprocal Compensation Traffic/Measured Internet Traffic, intrastate Switched Exchange Access Service, interstate Switched Exchange Access Service, or intrastate/interstate Tandem Transit Traffic), such receiving Party shall xxxx the originating Party the Traffic Rate applicable to each relevant minute of traffic for which CPN is passed. If the receiving Party lacks the capability, on an automated basis, to use CPN information on an automated basis to classify traffic delivered by the other Party by Traffic Rate type, the originating Party will supply Traffic Factor 1 and Traffic Factor
Union Access The Union shall have reasonable access to all work locations to verify that the terms and conditions of this Agreement are being carried out and for the purpose of conferring with employees, provided that access shall be subject to such rules and regulations immediately below, as well as to such rules and regulations as may be agreed to by the department and the union. Union access to work locations will not disrupt or interfere with a department’s mission and services or involve any political activities.
Physical Access Control Unauthorized persons are prevented from gaining physical access to premises, buildings or rooms where data processing systems that process and/or use Personal Data are located.
Check Meters Developer, at its option and expense, may install and operate, on its premises and on its side of the Point of Interconnection, one or more check meters to check Connecting Transmission Owner’s meters. Such check meters shall be for check purposes only and shall not be used for the measurement of power flows for purposes of this Agreement, except as provided in Article 7.4 below. The check meters shall be subject at all reasonable times to inspection and examination by Connecting Transmission Owner or its designee. The installation, operation and maintenance thereof shall be performed entirely by Developer in accordance with Good Utility Practice.