Assigned/Authorized Accesses Sample Clauses

Assigned/Authorized Accesses a. Area of Operation River sections for commercial use will be designated by the Service. Canoe, kayak, raft and tube rentals will be restricted to the district in which allotted. District limits may be set, raised, lowered, or eliminated by the Service at any time based on needs for resource protection and visitor use and enjoyment. Concessioners permitted to operate in the Upper Buffalo District will be allowed to use the following river access points: Xxxxxx Ponca Steel Creek Xxxxx Xxxxx Xxxxx Xxxxxx Xxxxx Xxxxxx Concessioners permitted to operate in the Middle Buffalo District will be allowed to use the following river access points: Mount Xxxxxx Xxxxxx Xxxxx Xxxx Xxxxx Xxxx Grinder's Xxxxx Xxxxxxx Maumee South Concessioners permitted to operate in the Lower Buffalo District will be allowed to use the following river access points: Maumee North Buffalo Point Xxxx Xxxxxxx'x Ferry Spring Creek Camp Xxx No public access is available at Camp Xxx. Camp Xxx may be used when the Concessioner’s clients have rented Camp Xxx for their group or on an emergency basis for pickup of visitors who have overshot the Xxxxx take-out. Concessioners must contact staff at Camp Xxx prior to picking up visitors.
AutoNDA by SimpleDocs

Related to Assigned/Authorized Accesses

  • Authorized Access Transfer Agent shall have controls that are designed to maintain the logical separation such that access to systems hosting Fund Data and/or being used to provide services to Fund will uniquely identify each individual requiring access, grant access only to authorized personnel based on the principle of least privileges, and prevent unauthorized access to Fund Data.

  • Unauthorized Access Using service to access, or to attempt to access without authority, the accounts of others, or to penetrate, or attempt to penetrate, security measures of Company’s or a third party’s computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in disruption of service or the corruption or loss of data.

  • Data Ownership and Authorized Access 1. Student Data Property of LEA. All Student Data transmitted to the Provider pursuant to the Service Agreement is and will continue to be the property of and under the control of the LEA. The Provider further acknowledges and agrees that all copies of such Student Data transmitted to the Provider, including any modifications or additions or any portion thereof from any source, are subject to the provisions of this DPA in the same manner as the original Student Data. The Parties agree that as between them, all rights, including all intellectual property rights in and to Student Data contemplated per the Service Agreement, shall remain the exclusive property of the LEA. For the purposes of FERPA, the Provider shall be considered a School Official, under the control and direction of the LEA as it pertains to the use of Student Data, notwithstanding the above.

  • Unauthorized Access Notification LEA shall notify Provider promptly of any known or suspected unauthorized access. LEA will assist Provider in any efforts by Provider to investigate and respond to any unauthorized access.

  • Authorized Activities In carrying out the purposes of the Partnership, but subject to all other provisions of this Agreement, the Partnership is authorized to engage in any kind of lawful activity, and perform and carry out contracts of any kind, necessary or advisable in connection with the accomplishment of the purposes and business of the Partnership described herein and for the protection and benefit of the Partnership; provided that the General Partner shall not be obligated to cause the Partnership to take, or refraining from taking, any action which, in the judgment of the General Partner, (i) could adversely affect the ability of the General Partner to qualify and continue to qualify as a REIT, (ii) could subject the General Partner to additional taxes under Code Section 857 or 4981 or (iii) could violate any law or regulation of any governmental body or agency having jurisdiction over the General Partner or its securities.

  • Restricted Access By choosing restricted access, you are requesting that the library restrict access to all full-text copies of your dissertation – both print and electronic – for a specified period of time. Your dissertation will be listed and indexed in the Emory Library Online Catalog and in the ETD repository, but the content, the full text of your thesis or dissertation and any supplementary files, will not be accessible until the expiration of the restricted access period. If you choose to restrict access to the full-text copy of your thesis or dissertation, then you may opt to also restrict access to your abstract or table of contents. You will need to indicate your desire to restrict access to these components of your ETD record during the electronic submission process. If you do not restrict access to your abstract and/or table of contents, then this information will be displayed on the web in the ETD record for your thesis or dissertation even if you have restricted access to the full-text copy. You will be notified by the library sixty ( 60 ) days prior to the expiration of the restricted period that your thesis or dissertation will be published on the internet. It is your responsibility to notify the Graduate School and the library that you need to extend the access restriction, and to provide the library with an updated e- mail address. ☐ 6 months after my graduation ☐ 1 year after my graduation ☐ 2 years after my graduation Please select a time period you would like restricted access below. I request that the full text of my thesis or dissertation (and any supplemental files) be published no sooner than: Part 4 – Inclusion of Previously Copyrighted Material I hereby certify that all text, audio-visual, or other material not created by me or for which I no longer control copyright that is included in my submission (a) has been identified in my submission by quotation, if directly quoted, and with appropriate source citations; and (b) • falls within the parameters of “Fair Use” as defined by US copyright law; or • is unambiguously a part of the public domain as a matter of law; or • is the subject of a properly documented permission obtained from the entity that owns or controls the copyright in the material. I will provide copies of any such permission upon request. Following is a list of the items for which I have sought and received written permission from the copyright owners to include in my submission (attach a separate page if necessary):

  • Assignment and Subcontracting City and Consultant recognize and agree that this Agreement contemplates personal performance by Consultant and is based upon a determination of Consultant’s unique personal competence, experience, and specialized personal knowledge. Moreover, a substantial inducement to City for entering into this Agreement was and is the professional reputation and competence of Consultant. Consultant may not assign this Agreement or any interest therein without the prior written approval of the City. Consultant shall not subcontract any portion of the performance contemplated and provided for herein, other than to the subcontractors listed in the Consultant’s proposal, without prior written approval of the City.

  • Unauthorized Assignment Any assignment or purported assignment in violation of this Section 10.6 is void.

  • Limited Access If necessary for the fulfillment of the Agreement, NBU may provide the Professional with non-exclusive, limited access to NBU’s information technology infrastructure. The Professional understands and agrees to abide by NBU policies, standards, regulations and restrictions regarding access and usage of NBU’s information technology infrastructure. The Professional shall reasonably enforce such policies, standards, regulations and restrictions with all the Professional’s employees, agents or any tier of subcontractor granted access in the performance of this Agreement, and shall be granted and authorize only such access as may be necessary for the purpose of fulfilling the requirements of the Agreement. The Professional’s employees, agents and subcontractors must receive prior, written approval from NBU before being granted access to NBU’s information technology infrastructure and data and NBU, in its sole determination, shall determine accessibility and limitations thereto. The Professional agrees that the requirements of this Section shall be incorporated into all subcontractor agreements entered into by the Professional. It is further agreed that a violation of this Section shall be deemed to cause irreparable harm that justifies injunctive relief in court. A violation of this Section may result in immediate termination of this Agreement without notice.

  • ASSIGNMENT AND SUBCONTRACTS 12.1 The CONTRACTOR shall not assign his interest in this contract nor sublet nor subcontract any portion of the work. The CONTRACTOR agrees to bind every subcontractor approved by the OWNER to all of the terms and conditions of this agreement. The CONTRACTOR agrees that he is fully responsible to the OWNER for the acts and omissions of his subcontractor, as CONTRACTOR is for the acts and omissions of himself and of persons directly employed by him.

Time is Money Join Law Insider Premium to draft better contracts faster.