Treatment of PEG Access Channels Sample Clauses

Treatment of PEG Access Channels. Subject to Applicable Law, the Access Channels and Downstream Transmissions of PEG Access programming over the aforesaid Access Channels shall be available for use, as provided in this Franchise, without charge or cost to the Authority, its designated agent, TBNK, or the Community Programming Center.‌
AutoNDA by SimpleDocs
Treatment of PEG Access Channels. Any cost or expense (particularly “capital costs” as defined in the FCC Third Report and Order) to Grantee associated with the provision of PEG Access Channels pursuant to this Franchise, including channel capacity being provided by Grantee in accordance with Section 15 (Required Services and Facilities – PEG Access) of this Franchise Agreement, (1) shall not be deducted from the Franchise Fee, if applicable, and (2) shall not be considered or treated as a franchise fee or tax under 47 U.S.C. § 542; subject, however, to any further or subsequent ruling and/or finding by the FCC with respect to the cost of “channel capacity.”3 The Access Channels and Downstream Transmissions of PEG Access programming over the aforesaid Access Channels shall be available for use, as provided in this Franchise, without charge or cost to the Authority, its designated agent, TBNK, or the Community Programming Center. All such associated cost for any period of time may be treated as external costs by Grantee pursuant to the rate regulations of the FCC and shall be allocated proportionately to the governmental units comprising the TBNK Member Governments on a per subscriber basis for rate base purposes, but only if such costs are not deducted from the Franchise Fees owed by Grantee to Grantor for that period of time.

Related to Treatment of PEG Access Channels

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization. Measures: • Multiple authorization levels are used when granting access to sensitive systems, including those storing and processing Personal Data. Authorizations are managed via defined processes according to the SAP Security Policy • All personnel access SAP’s systems with a unique identifier (user ID). • SAP has procedures in place so that requested authorization changes are implemented only in accordance with the SAP Security Policy (for example, no rights are granted without authorization). In case personnel leaves the company, their access rights are revoked. • SAP has established a password policy that prohibits the sharing of passwords, governs responses to password disclosure, and requires passwords to be changed on a regular basis and default passwords to be altered. Personalized user IDs are assigned for authentication. All passwords must fulfill defined minimum requirements and are stored in encrypted form. In the case of domain passwords, the system forces a password change every six months in compliance with the requirements for complex passwords. Each computer has a password-protected screensaver. • The company network is protected from the public network by firewalls. • SAP uses up–to-date antivirus software at access points to the company network (for e-mail accounts), as well as on all file servers and all workstations. • Security patch management is implemented to provide regular and periodic deployment of relevant security updates. Full remote access to SAP’s corporate network and critical infrastructure is protected by strong authentication.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage. Measures: • As part of the SAP Security Policy, Personal Data requires at least the same protection level as “confidential” information according to the SAP Information Classification standard. • Access to Personal Data is granted on a need-to-know basis. Personnel have access to the information that they require in order to fulfill their duty. SAP uses authorization concepts that document grant processes and assigned roles per account (user ID). All Customer Data is protected in accordance with the SAP Security Policy. • All production servers are operated in the Data Centers or in secure server rooms. Security measures that protect applications processing Personal Data are regularly checked. To this end, SAP conducts internal and external security checks and penetration tests on its IT systems. • SAP does not allow the installation of software that has not been approved by SAP. • An SAP security standard governs how data and data carriers are deleted or destroyed once they are no longer required.

  • Quality Management System Supplier hereby undertakes, warrants and confirms, and will ensue same for its subcontractors, to remain certified in accordance with ISO 9001 standard or equivalent. At any time during the term of this Agreement, the Supplier shall, if so instructed by ISR, provide evidence of such certifications. In any event, Supplier must notify ISR, in writing, in the event said certification is suspended and/or canceled and/or not continued.

  • User Access Transfer Agent shall have a process to promptly disable access to Fund Data by any Transfer Agent personnel who no longer requires such access. Transfer Agent will also promptly remove access of Fund personnel upon receipt of notification from Fund.

Time is Money Join Law Insider Premium to draft better contracts faster.