User Access Transfer Agent shall have a process to promptly disable access to Fund Data by any Transfer Agent personnel who no longer requires such access. Transfer Agent will also promptly remove access of Fund personnel upon receipt of notification from Fund.
Interconnection Customer Obligations The Interconnection Customer shall maintain the Large Generating Facility and the Interconnection Customer’s Interconnection Facilities in a safe and reliable manner and in accordance with this LGIA.
SUPPLIER’S OBLIGATIONS 4.2.1 The Supplier shall be responsible for implementing all the necessary resources for the performance of its obligations under the Contract, with the exception of those specifically mentionedin the Contractas beingunder the responsibility of the Purchaser. The Supplier shall haveall of thematerials andtoolsneededfor theperformanceof the Contractandshall allocate qualified staff in sufficient numbers to perform the Contract within the contractual deadline. The Supplier shall ensureappropriatepersonneltraining andqualification andsubmitanyproof relating to such qualification upon Purchaser’s request. Within seven (7) days, at the latest, of the Contract coming into force, the Supplier shall appoint a staff member as aprojectmanager and shall inform the Purchaser accordingly. The project manager shall plan, coordinate and monitor all the Supply’sneedsin compliancewith the Contractandthe Good Industry Practices andshall be the Supplier’s contact person for the Purchaser. 4.2.2 The Supplier shall request from the Purchaser in a timely manner, any approvals and instructions needed for the correct performance of the Contract. If applicable, the Purchaser shall grant access to the site where the Supply is to be performed (the “Site”) and /or make available to the Supplier the materials and/or perform the works identified in the Contract. 4.2.3 The Supplier shall promptly remedy or shall ensure that its subcontractors promptly remedy any defects relating to the Supply noted during the abovementioned visits as well as any defect notified to it by the Purchaser concerning its performance. 4.2.4 The Supplier shall ensure that the Supply provided are fit for the purposes that may reasonablybeinferred from the Contractandinaccordancewith the timetableforperformance defined in the Contract. In any event the Supplier commitshimself toachieveperformance and results stipulated in the Contract. The performance deadlinesmay only be extended or reduced through an amendment to the Contract, in accordance with the provisions of Article 5.1. The Supply shall be delivered in a state of full completion with the complete Documentation associated therewith as well as all instructions, recommendations and other indications necessary in order for them to be used correctly and under the appropriate safety conditions. “Documentation” shall mean any operation and maintenance manuals, drawings, calculations, technical data, logic diagrams, progress reports, quality documentation, conformity certificates, test reports, bill of lading, certificates of origin, export control classification list number as per any applicable export regulation - such as (i) the European Council Regulation 428/2009 (as amended), (ii) the U.S. Export Administration Regulations (“EAR”), (iii) percentage of U.S. origin content, (iv) U.S. Export Control Classification Number (“ECCN”), (v) U.S. Munitions List category (“USML”),(vi) (if applicable) export authorizations and licenses, and/or (vii) Harmonized Tariff Code - and any such other documents required under the Contract and/or applicable laws. The Supplier shall also furnish such programme of design, manufacture and delivery as the Purchaser may reasonably require. If so required by the Purchaser, the Supplier shall submit any such Documentation to the Purchaser with sufficient time for review and approval. Where the Documentation provided by the Supplier is not compliant with Purchaser’s contractual requirements, the Supplier must make the necessary modifications, and indemnify the Purchaser for any costs, liabilities or penalties incurred by the Purchaser due to the delays or non-compliance in Documentation delivered by the Supplier and shall not be entitled to an adjustment of the delivery schedule in case of any revision.
Additional Access Rights For the avoidance of doubt any grant of Access Rights not covered by the Grant Agreement or this Consortium Agreement shall be at the absolute discretion of the owning Party and subject to such terms and conditions as may be agreed between the owning and receiving Parties.
The Supplier's Obligations The Supplier will in writing, by the time and date specified by the Contracting Body in accordance with paragraph 3.1.3(b) provide the Contracting Body with either: 3.2.1 a statement to the effect that it does not wish to tender in relation to the relevant Service Requirements; or 3.2.2 the Statement of Work and full details of its tender made in respect of the relevant Statement of Requirements. In the event that the Supplier submits a Statement of Work, it should include, as a minimum: a) an email response subject line to comprise unique reference number and Supplier name, so as to clearly identify the Supplier; b) a brief summary, in the email (followed by a confirmation letter), stating whether or not the Supplier is bidding for the Statement of Requirements; c) a proposal covering the Services Requirements; and d) confirmation of discounts applicable to the work, as referenced in Framework Agreement Schedule 3 (Charging Structure). 3.2.3 The Supplier shall ensure that any prices submitted in relation to a further competition held pursuant to this paragraph 3 shall be based on the Charging Structure and take into account any discount to which the Contracting Body may be entitled as set out in Framework Agreement Schedule 3 (Charging Structure). 3.2.4 The Supplier agrees that: a) all tenders submitted by the Supplier in relation to a further competition held pursuant to this paragraph 3 shall remain open for acceptance by the Contracting Body for ninety (90) Working Days (or such other period specified in the invitation to tender issued by the relevant Contracting Body in accordance with the Ordering Procedure); and b) all tenders submitted by the Supplier are made and will be made in good faith and that the Supplier has not and will not fix(ed) or adjust(ed) the amount of the offer by or in accordance with any agreement or arrangement with any other person. The Supplier certifies that it has not and undertakes that it will not: (a) communicate to any person other than the person inviting these offers the amount or approximate amount of the offer, except where the disclosure, in confidence, of the approximate amount of the offer was necessary to obtain quotations required for the preparation of the offer; and (b) enter into any arrangement or agreement with any other person that he or the other person(s) shall refrain from making an offer or as to the amount of any offer to be submitted.
Processor’s Obligations Except where expressly permitted by Article 28 (3)(a) GDPR, Processor shall process data subjects’ Data only within the scope of the Agreement and the instructions issued by Controller. Where Processor believes that an instruction would be in breach of applicable law, Processor shall notify Controller of such belief without undue delay. Processor shall be entitled to suspend performance on such instruction until Controller confirms or modifies such instruction. Processor shall, within Processor’s scope of responsibility, organize Processor’s internal organization so it satisfies the specific requirements of data protection. Processor shall implement technical and organizational measures to ensure the adequate protection of Controller’s Data, which measures shall fulfil the requirements of the GDPR and specifically its Article 32. Processor shall implement technical and organizational measures and safeguards that ensure ongoing confidentiality, integrity, availability and resilience of processing systems and services and shall implement a process for regularly testing, assessing and evaluating the effectiveness of technical and organizational measures for ensuring the security of the processing. Controller is familiar with these technical and organizational measures, and it shall be Controller’s responsibility that such measures ensure a level of security appropriate to the risk. The parties agree to refer to the existing certification of Processor by Kiwa International Cert GmbH in accordance with DIN ISO/IEC 27001:2015 which is considered sufficient evidence for these purposes by Controller and which is available on the website of Processor (xxx.xxxxxxx.xxx). Processor reserves the right to modify the measures and safeguards implemented, provided, however, that that the level of security shall not be less protective than initially agreed upon. Processor shall support Controller, insofar as is agreed upon by the parties, and where possible for Processor, in fulfilling data subjects’ requests and claims, as detailed in chapter III of the GDPR and in fulfilling the obligations enumerated in Articles 33 to 36 GDPR. Processor shall ensure that all employees involved in Contract Processing of Controller’s Data and other such persons as may be involved in Contract Processing within Processor’s scope of responsibility shall only do so within the scope of the instructions. Furthermore, Processor shall ensure that any person entitled to process Data on behalf of Controller has undertaken a commitment to confidentiality under terms similar to the confidentiality terms of the Agreement. All such confidentiality obligations shall survive the termination or expiration of such Contract Processing. Processor shall notify Controller without undue delay if Processor becomes aware of any Data breaches within Processor’s scope of responsibility. Processor shall implement the measures necessary for securing Data and for mitigating potential negative consequences for the data subject; the Processor shall coordinate such efforts with Controller without undue delay. Processor shall notify to Controller the point of contact for any issues related to data protection arising out of or in connection with the Agreement. The Exhibit provides for a list of the initially designated persons. Processor shall correct or erase Data if so instructed by Controller and where covered by the scope of the instructions permissible. Where an erasure, consistent with data protection requirements, or a corresponding restriction of processing is impossible, Processor shall, based on Controller’s instructions, and unless agreed upon differently in the Agreement, destroy, in compliance with data protection requirements, all carrier media and other material or return the same to Controller. In specific cases designated by Controller, such Data shall be stored or handed over. The associated cost for doing so and protective measures to put in place shall be agreed upon separately, unless already agreed upon in the Agreement. Processor shall, upon termination of Contract Processing and upon Controller’s instruction, return all Data, carrier media and other materials to Controller or delete the same. Where a data subject asserts any claims against Controller in accordance with Article 82 of the GDPR, Processor shall support Controller in defending against such claims, where possible at Controller’s cost as set out in Section 6 para. 3. Controller shall notify Processor without undue delay, and comprehensively, of any defect or irregularity with regard to provisions on data protection detected by Controller in the results of Processor’s work.
Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.
Data Access Services State Street agrees to make available to the Fund the Data Access Services subject to the terms and conditions of this Addendum and such data access operating standards and procedures as may be issued by State Street from time to time. The Fund shall be able to access the System to (i) originate electronic instructions to State Street in order to (a) effect the transfer or movement of cash or securities held under custody by State Street or (b) transmit accounting or other information (the transactions described in (i)(a) and (i)(b) above are referred to herein as “Client Originated Electronic Financial Instructions”), and (ii) access data for the purpose of reporting and analysis, which shall all be deemed to be Data Access Services for purposes of this Addendum.
Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage.
Customer’s Obligations The Customer shall: (a) provide the Supplier with: (i) all necessary co-operation in relation to this agreement; and (ii) all necessary access to such information as may be required by the Supplier; in order to render the Services, including but not limited to Customer Data, security access information and configuration services; (b) comply with all applicable laws and regulations with respect to its activities under this agreement; (c) carry out all other Customer responsibilities set out in this agreement in a timely and efficient manner. In the event of any delays in the Customer's provision of such assistance as agreed by the parties, the Supplier may adjust any agreed timetable or delivery schedule as reasonably necessary; (d) ensure that the Authorised Users use the Services and the Documentation in accordance with the terms and conditions of this agreement and shall be responsible for any Authorised User’s breach of this agreement; (e) obtain and shall maintain all necessary licences, consents, and permissions necessary for the Supplier, its contractors and agents to perform their obligations under this agreement, including without limitation the Services; (f) ensure that its network and systems comply with the relevant specifications provided by the Supplier from time to time; and (g) be solely responsible for procuring and maintaining its network connections and telecommunications links from its systems to the Supplier’s data centres, and all problems, conditions, delays, delivery failures and all other loss or damage arising from or relating to the Customer's network connections or telecommunications links or caused by the internet.