Barriers to access Sample Clauses

Barriers to access. (1) The Provider must minimise any barriers to Service Users accessing the Services to the extent that such matters are within the Provider's reasonable control. Location of Services B.19 Service provision from within Geographical Area
AutoNDA by SimpleDocs
Barriers to access. This project is intended to expand the program of bursaries offered, to include a greater number of low SES undergraduate students. Bursaries are provided to assist with the cost of text books (including exploration of opportunities to provide free text books/e-books for core units), participation in intensive schools, and work integrated learning and placements.  Pilot XXXX – Funding is focused on the establishment of a HEPPP Tutor Office in T1 2019 and pilot in T2 2019 to assist UNE low SES undergraduate students with required support – including utilising UNE Career Resource Kit and UNE Staff, Student Mentors and Tutors handbook. Work has also been undertaken under this project to explore and develop the University of Wollongong Peer Assisted Study Sessions (PASS) for UNE, including further enhancement for online environment.  Residential Colleges Low SES Support and Retention Program – This project supports vulnerable low SES UNE students residing in the UNE Residential College System and assists in the reduction of distress they may experience, by providing support for financial, health and the meeting of their basic needs. Funding support is provided following a referral by the Head of College, Deputy Head of College, Student Advocate Office, Student Counselling Unit and Psychological Service Counsellor. Project outcomes include increasing our understanding of residential at-risk student needs; early intervention to reduce the likelihood of increased mental health problems, psychological distress and its impact upon capacity to study and obtain an excellent academic outcome. 

Related to Barriers to access

  • System Access CUSTOMER agrees to provide to PROVIDER, at CUSTOMER’S expense, necessary access to the mainframe computer and related information technology systems (the “System”) on which CUSTOMER data is processed during the times (the “Service Hours”) specified in the PSAs, subject to reasonable downtime for utility outages, maintenance, performance difficulties and the like. In the event of a change in the Service Hours, CUSTOMER will provide PROVIDER with at least fifteen (15) calendar days written notice of such change.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization. Measures: • Multiple authorization levels are used when granting access to sensitive systems, including those storing and processing Personal Data. Authorizations are managed via defined processes according to the SAP Security Policy • All personnel access SAP’s systems with a unique identifier (user ID). • SAP has procedures in place so that requested authorization changes are implemented only in accordance with the SAP Security Policy (for example, no rights are granted without authorization). In case personnel leaves the company, their access rights are revoked. • SAP has established a password policy that prohibits the sharing of passwords, governs responses to password disclosure, and requires passwords to be changed on a regular basis and default passwords to be altered. Personalized user IDs are assigned for authentication. All passwords must fulfill defined minimum requirements and are stored in encrypted form. In the case of domain passwords, the system forces a password change every six months in compliance with the requirements for complex passwords. Each computer has a password-protected screensaver. • The company network is protected from the public network by firewalls. • SAP uses up–to-date antivirus software at access points to the company network (for e-mail accounts), as well as on all file servers and all workstations. • Security patch management is implemented to provide regular and periodic deployment of relevant security updates. Full remote access to SAP’s corporate network and critical infrastructure is protected by strong authentication.

  • Technical Barriers to Trade 1. The rights and obligations of the Parties relating to standards or technical regulations and related measures shall be governed by the WTO Agreement on Technical Barriers to Trade.

  • Use of Interconnection Facilities by Third Parties 46 9.9.1 Purpose of Interconnection Facilities 46 9.9.2 Third Party Users. 46

  • Emergency Access Landlord shall have the right to enter the Premises at any time without notice in the event of an emergency.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • Network Access TENANT may find it necessary to purchase a network interface card, wireless PC card or other hardware in order to connect to the internet service. LANDLORD is not responsible for the purchase of these items and LANDLORD cannot guarantee compatibility with any device TENANT may have. The computer and network card must have software installed that supports the Internet Protocol commonly referred to as TCP/IP. Any conflicts between the software compatibility of the network and the TENANT’S computer operating system or any other feature will be the responsibility of the TENANT to resolve. LANDLORD will not be responsible for software issues related to the user’s personal computer.

  • Internet Access Data and information may be made electronically accessible to the Company through Internet access to one or more links provided by the Administrator or a sub-administrator (“Web Link”). All rights in Web Link (including text and “look and feel” attributes) are owned by the sub-administrator. Any commercial use of the content or any other aspect of Web Link requires the written permission of the sub-administrator. Use of the Web Link by the Company will be subject to any terms of use set forth on the web site. Web Link and the information (including text, graphics and functionality) in the Web Link is presented “As Is” and “As Available” without express or implied warranties including, but not limited to, implied warranties of non-infringement, merchantability and fitness for a particular purpose. The sub-administrator neither warrants that the Web Link will be uninterrupted or error free, nor guarantees the accessibility, reliability, performance, timeliness, sequence, or completeness of information provided on the Web Link.

  • Uncontrollable Forces Tariff Provisions Section 14.1 of the CAISO Tariff shall be incorporated by reference into this Agreement except that all references in Section 14.1 of the CAISO Tariff to Market Participants shall be read as a reference to the Participating Generator and references to the CAISO Tariff shall be read as references to this Agreement.

  • Switching System Hierarchy and Trunking Requirements For purposes of routing iNetworks traffic to Verizon, the subtending arrangements between Verizon Tandems and Verizon End Offices shall be the same as the Tandem/End Office subtending arrangements Verizon maintains for the routing of its own or other carriers’ traffic (i.e., traffic will be routed to the appropriate Verizon Tandem subtended by the terminating End Office serving the Verizon Customer). For purposes of routing Verizon traffic to iNetworks, the subtending arrangements between iNetworks Tandems and iNetworks End Offices shall be the same as the Tandem/End Office subtending arrangements that iNetworks maintains for the routing of its own or other carriers’ traffic.

Time is Money Join Law Insider Premium to draft better contracts faster.