ALPS Virtual Access Sample Clauses

ALPS Virtual Access. The Trust has requested, and ALPS will provide, access to ALPS Virtual Access (“AVA”), an ALPS’s proprietary web-based platform that provides access to information and data maintained on behalf of the Trust and maintains a complete audit trail of all activity on the site. Through AVA, the Trust may have, based on the third-party services offered under separate contract: (i) access to AdLit, which permits the Trust to submit sales/marketing pieces for review by ALPS’s compliance and tracks the progress of the review; (ii) links to ALPS Virtual Policies (AVP), which provides the Trust with access to ALPS’s policies and procedures and also provides the Trust with regulatory updates; and (iii) secure access to transfer agency reports.
AutoNDA by SimpleDocs
ALPS Virtual Access. The Fund has requested, and ALPS will provide, access to ALPS Virtual Access (“AVA”), an ALPS proprietary platform that provides web-based access to information and data maintained on behalf of the Fund and maintains a complete audit trail of all activity on the site. Through AVA, the Fund may have, based on the third-party services offered under separate contract: (i) shareholder data access, which interfaces with the transfer agency system and allows data retrieval and updates; (ii) Portfolio data access, which provides daily Portfolio and securities detail and permits the Fund to create and save its own customized reports; (iii) access to AdLit, which permits the Fund to submit sales/marketing pieces for review by ALPS’ compliance and tracks the progress of the review; and (iv) links to PolicyIQ, which provides the Fund with access to ALPS’ policies and procedures and also provides the Fund with regulatory updates.
ALPS Virtual Access. The Transfer Agent has requested, and ALPS will provide, access to ALPS Virtual Access (“AVA”), an ALPS proprietary platform that provides web-based access to information and data maintained on behalf of the Fund and maintains a complete audit trail of all activity on the site. Through AVA, the Transfer Agent, the Fund and broker-dealers and other financial institutions authorized by the Transfer Agent, deemed to be acting as a limited agent of the Fund (“Designated Agent(s)”), as applicable may have, based on the third party services offered under separate contract: (1) Fund shareholder data access, which interfaces with the transfer agency system and allows data retrieval and updates; (2) portfolio data access, which provides daily portfolio and securities detail and permits the Fund to create and save its own customized reports; and (3) links to PolicyIQ, which provides the Transfer Agent with access to ALPS’ policies and procedures and also provides the Transfer Agent with regulatory updates.
ALPS Virtual Access. Cortina has requested, and ALPS will provide, access to ALPS Virtual Access (“AVA”), an ALPS proprietary platform that provides web-based access to information and data maintained on behalf of the Funds and maintains a complete audit trail of all activity on the site. Through AVA, Cortina may have, based on the third-party services offered under separate contract: (i) shareholder data access, which interfaces with the transfer agency system and allows data retrieval and updates; (ii) Fund data access, which provides daily Fund and securities detail and permits Cortina to create and save its own customized reports; (iii) access to AdLit, which permits Cortina to submit sales/marketing pieces for review by ALPS’s compliance and tracks the progress of the review; and (iv) links to PolicyIQ, which provides Cortina with access to ALPS’s policies and procedures and also provides Cortina with regulatory updates.

Related to ALPS Virtual Access

  • ICANN Access Registry Operator shall provide bulk access to the zone files for the TLD to ICANN or its designee on a continuous basis in the manner ICANN may reasonably specify from time to time. Access will be provided at least daily. Zone files will include SRS data committed as close as possible to 00:00:00 UTC.

  • EU Access SAP will use only European Subprocessors to provide support requiring access to Personal Data in the Cloud Service and SAP shall not export Personal Data outside of the EEA or Switzerland unless expressly authorized by Customer in writing (e-mail permitted) on a case by case basis; or as excluded under Section 9.4.

  • System Access CUSTOMER agrees to provide to PROVIDER, at CUSTOMER’S expense, necessary access to the mainframe computer and related information technology systems (the “System”) on which CUSTOMER data is processed during the times (the “Service Hours”) specified in the PSAs, subject to reasonable downtime for utility outages, maintenance, performance difficulties and the like. In the event of a change in the Service Hours, CUSTOMER will provide PROVIDER with at least fifteen (15) calendar days written notice of such change.

  • Data Access Access to Contract and State Data The Contractor shall provide to the Client Agency access to any data, as defined in Conn. Gen Stat. Sec. 4e-1, concerning the Contract and the Client Agency that are in the possession or control of the Contractor upon demand and shall provide the data to the Client Agency in a format prescribed by the Client Agency and the State Auditors of Public Accounts at no additional cost.

  • User Access Transfer Agent shall have a process to promptly disable access to Fund Data by any Transfer Agent personnel who no longer requires such access. Transfer Agent will also promptly remove access of Fund personnel upon receipt of notification from Fund.

  • Physical Access Control Unauthorized persons are prevented from gaining physical access to premises, buildings or rooms where data processing systems that process and/or use Personal Data are located.

  • Network Access TENANT may find it necessary to purchase a network interface card, wireless PC card or other hardware in order to connect to the internet service. LANDLORD is not responsible for the purchase of these items and LANDLORD cannot guarantee compatibility with any device TENANT may have. The computer and network card must have software installed that supports the Internet Protocol commonly referred to as TCP/IP. Any conflicts between the software compatibility of the network and the TENANT’S computer operating system or any other feature will be the responsibility of the TENANT to resolve. LANDLORD will not be responsible for software issues related to the user’s personal computer.

  • Site Access Dell requires the right to access the APEX System in a timely way and as provided in the Service Offering Description to provide the Support Services. Failure to ensure that Customer provides Dell with timely access to a Site will relieve Dell of the Support Services obligations and Dell may also, at Dell’s discretion, suspend the APEX Service.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization. Measures: • Multiple authorization levels are used when granting access to sensitive systems, including those storing and processing Personal Data. Authorizations are managed via defined processes according to the SAP Security Policy • All personnel access SAP’s systems with a unique identifier (user ID). • SAP has procedures in place so that requested authorization changes are implemented only in accordance with the SAP Security Policy (for example, no rights are granted without authorization). In case personnel leaves the company, their access rights are revoked. • SAP has established a password policy that prohibits the sharing of passwords, governs responses to password disclosure, and requires passwords to be changed on a regular basis and default passwords to be altered. Personalized user IDs are assigned for authentication. All passwords must fulfill defined minimum requirements and are stored in encrypted form. In the case of domain passwords, the system forces a password change every six months in compliance with the requirements for complex passwords. Each computer has a password-protected screensaver. • The company network is protected from the public network by firewalls. • SAP uses up–to-date antivirus software at access points to the company network (for e-mail accounts), as well as on all file servers and all workstations. • Security patch management is implemented to provide regular and periodic deployment of relevant security updates. Full remote access to SAP’s corporate network and critical infrastructure is protected by strong authentication.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage. Measures: • As part of the SAP Security Policy, Personal Data requires at least the same protection level as “confidential” information according to the SAP Information Classification standard. • Access to Personal Data is granted on a need-to-know basis. Personnel have access to the information that they require in order to fulfill their duty. SAP uses authorization concepts that document grant processes and assigned roles per account (user ID). All Customer Data is protected in accordance with the SAP Security Policy. • All production servers are operated in the Data Centers or in secure server rooms. Security measures that protect applications processing Personal Data are regularly checked. To this end, SAP conducts internal and external security checks and penetration tests on its IT systems. • SAP does not allow the installation of software that has not been approved by SAP. • An SAP security standard governs how data and data carriers are deleted or destroyed once they are no longer required.

Time is Money Join Law Insider Premium to draft better contracts faster.