Specific Provisions for Access Rights to Software For the avoidance of doubt, the general provisions for Access Rights provided for in this Section 9 are applicable also to Software. Parties’ Access Rights to Software do not include any right to receive source code or object code ported to a certain hardware platform or any right to receive respective Software documentation in any particular form or detail, but only as available from the Party granting the Access Rights.
System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization.
Gold Open Access Articles May be shared according to the author-selected end-user license and should contain a CrossMark logo, the end user license, and a DOI link to the formal publication on ScienceDirect. Please refer to Elsevier's posting policy for further information.
Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage.
Data Privacy Notice and Consent The Participant hereby explicitly and unambiguously consents to the collection, use and transfer, in electronic or other form, of his or her personal data as described in this paragraph, by and among, as applicable, the Participant’s employer and the Company and its subsidiaries and affiliates for, among other purposes, implementing, administering and managing the Participant’s participation in the Plan. The Participant understands that the Company and its subsidiaries hold certain personal information about the Participant, including the Participant’s name, home address and telephone number, date of birth, social security number or identification number, salary, nationality, job title, any Shares or directorships held in the Company, details of all options or any other entitlement to Shares awarded, canceled, exercised, vested, unvested or outstanding in the Participant’s favor, for the purpose of managing and administering the Plan (“Data”). The Participant further understands that the Company and/or its subsidiaries will transfer Data amongst themselves as necessary for employment purposes, including implementation, administration and management of the Participant’s participation in the Plan, and that the Company and/or any of its subsidiaries may each further transfer Data to Broker or such other stock plan service provider or other third parties assisting the Company with processing of Data. The Participant understands that these recipients may be located in the United States, and that the recipient’s country may have different data privacy laws and protections than in the Participant’s country. The Participant authorizes them to receive, possess, use, retain and transfer the Data, in electronic or other form, for the purposes described in this section, including any requisite transfer to Broker or such other stock plan service provider or other third party as may be required for the administration of the Plan and/or the subsequent holding of Shares of stock on the Participant’s behalf. The Participant understands that he or she may, at any time, request access to the Data, request any necessary amendments to it or refuse or withdraw the consents herein, in any case without cost, by contacting in writing his or her local human resources representative. The Participant understands, however, that withdrawal of consent may affect the Participant’s ability participate in or realize benefits from the Plan. For more information on the consequences of refusal to consent or withdrawal of consent, the Participant understands that he or she may contact his or her local human resources representative.
Data Privacy Consent In order to administer the Plan and this Agreement and to implement or structure future equity grants, the Company, its subsidiaries and affiliates and certain agents thereof (together, the “Relevant Companies”) may process any and all personal or professional data, including but not limited to Social Security or other identification number, home address and telephone number, date of birth and other information that is necessary or desirable for the administration of the Plan and/or this Agreement (the “Relevant Information”). By entering into this Agreement, the Grantee (i) authorizes the Company to collect, process, register and transfer to the Relevant Companies all Relevant Information; (ii) waives any privacy rights the Grantee may have with respect to the Relevant Information; (iii) authorizes the Relevant Companies to store and transmit such information in electronic form; and (iv) authorizes the transfer of the Relevant Information to any jurisdiction in which the Relevant Companies consider appropriate. The Grantee shall have access to, and the right to change, the Relevant Information. Relevant Information will only be used in accordance with applicable law.
Additional Access Rights For the avoidance of doubt any grant of Access Rights not covered by the Grant Agreement or this Consortium Agreement shall be at the absolute discretion of the owning Party and subject to such terms and conditions as may be agreed between the owning and receiving Parties.
Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.
System Access CUSTOMER agrees to provide to PROVIDER, at CUSTOMER’S expense, necessary access to the mainframe computer and related information technology systems (the “System”) on which CUSTOMER data is processed during the times (the “Service Hours”) specified in the PSAs, subject to reasonable downtime for utility outages, maintenance, performance difficulties and the like. In the event of a change in the Service Hours, CUSTOMER will provide PROVIDER with at least fifteen (15) calendar days written notice of such change.
System Upgrade Facilities and System Deliverability Upgrades Connecting Transmission Owner shall design, procure, construct, install, and own the System Upgrade Facilities and System Deliverability Upgrades described in Appendix A hereto. The responsibility of the Developer for costs related to System Upgrade Facilities and System Deliverability Upgrades shall be determined in accordance with the provisions of Attachment S to the ISO OATT.