HOW TO ACCESS THE HALL Sample Clauses

HOW TO ACCESS THE HALL. The keys are contained within a ‘key safe’ which is in the form of a combination padlock locked to the car park gate. You will need to have the combination to the lock to obtain the three keys inside, which the Booking Officer will e-mail it to you. The 3 keys are:
AutoNDA by SimpleDocs

Related to HOW TO ACCESS THE HALL

  • Right to Access The Tenant shall not unreasonably withhold consent to the Landlord to enter into the dwelling unit in order to inspect the premises; make necessary or agreed repairs, decorations, alterations, or improvements; supply necessary or agreed services; or exhibit the dwelling unit to prospective or actual purchasers, mortgagees, tenants, workmen, or contractors.There will be semi-annual inspections of the property by a contractor secured by landlord. Ample notice will be provided to tenant when scheduling this inspection. The Landlord or Landlord's agent may enter the dwelling unit without consent of the Tenant:

  • Additional Access Rights For the avoidance of doubt any grant of Access Rights not covered by the Grant Agreement or this Consortium Agreement shall be at the absolute discretion of the owning Party and subject to such terms and conditions as may be agreed between the owning and receiving Parties.

  • Technology Access Fee In consideration of the licenses and rights granted to Regado herein, Regado shall, as of the date immediately preceding the closing (the “Closing”) of the first equity financing of Regado in which Regado is assigned a pre-money valuation of not less than [***] dollars ($[***]), issue to Archemix fully-paid and non-assessable shares of common stock of Regado equal to [***] percent ([***]%) of the total number of equity shares of Regado, on a fully diluted basis, immediately prior to the issuance of shares at the Closing. Regado shall deliver written notice of the Closing to Archemix at least [***] business days prior to such Closing in accordance with the notice provisions contained in Section 14.1 of this Agreement. Archemix and Regado shall enter into such agreements relating to the issuance of the common stock as are customary under such circumstances. For the purpose of this Agreement, “fully diluted basis” shall mean the aggregate of (a) the number of shares of common stock issued and outstanding on the determination date, (b) the number of shares of common stock issuable upon exercise, exchange or conversion of all exercisable, exchangeable or convertible securities outstanding on the determination date, assuming such securities were exercised, exchanged or converted on the determination date (without regard to whether such securities are actually exercisable, exchangeable or convertible on the determination date) and (c) the number of shares of common stock issuable pursuant to any other obligation or agreement of, or right granted by, Regado, whether vested or unvested, contingent or otherwise.

  • Parent Right to Access and Challenge Student Data The LEA shall establish reasonable procedures pursuant to which a parent, as that term is defined in 105 ILCS 10/2(g), may inspect and/or copy Student Data and/or challenge the accuracy, relevance or propriety of Student Data, pursuant to Sections 5 and 7 of ISSRA (105 ILCS 10/5; 105 ILCS 10/7) and Section 33 of SOPPA (105 ILCS 85/33). The Provider shall respond to any request by the LEA for Student Data in the possession of the Provider when Provider cooperation is required to afford a parent an opportunity to inspect and/or copy the Student Data, no later than 5 business days from the date of the request. In the event that a parent contacts the Provider directly to inspect and/or copy Student Data, the Provider shall refer the parent to the LEA, which shall follow the necessary and proper procedures regarding the requested Student Data.

  • Technology Access A. Contractor expressly acknowledges that state funds may not be expended in connection with the purchase of an automated information system unless that system meets certain statutory requirements relating to accessibility by persons with visual impairments. Accordingly, Contractor represents and warrants to System Agency that the technology provided to System Agency for purchase (if applicable under this Contract or any related Solicitation) is capable, either by virtue of features included within the technology or because it is readily adaptable by use with other technology, of:

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization. Measures: • Multiple authorization levels are used when granting access to sensitive systems, including those storing and processing Personal Data. Authorizations are managed via defined processes according to the SAP Security Policy • All personnel access SAP’s systems with a unique identifier (user ID). • SAP has procedures in place so that requested authorization changes are implemented only in accordance with the SAP Security Policy (for example, no rights are granted without authorization). In case personnel leaves the company, their access rights are revoked. • SAP has established a password policy that prohibits the sharing of passwords, governs responses to password disclosure, and requires passwords to be changed on a regular basis and default passwords to be altered. Personalized user IDs are assigned for authentication. All passwords must fulfill defined minimum requirements and are stored in encrypted form. In the case of domain passwords, the system forces a password change every six months in compliance with the requirements for complex passwords. Each computer has a password-protected screensaver. • The company network is protected from the public network by firewalls. • SAP uses up–to-date antivirus software at access points to the company network (for e-mail accounts), as well as on all file servers and all workstations. • Security patch management is implemented to provide regular and periodic deployment of relevant security updates. Full remote access to SAP’s corporate network and critical infrastructure is protected by strong authentication.

  • No Fee for Access Registry Operator will provide, and CZDA Provider will facilitate, access to the zone file to user at no cost.

  • ICANN Access Registry Operator shall provide bulk access to the zone files for the TLD to ICANN or its designee on a continuous basis in the manner ICANN may reasonably specify from time to time. Access will be provided at least daily. Zone files will include SRS data committed as close as possible to 00:00:00 UTC.

  • Specific Provisions for Access Rights to Software For the avoidance of doubt, the general provisions for Access Rights provided for in this Section 9 are applicable also to Software. Parties’ Access Rights to Software do not include any right to receive source code or object code ported to a certain hardware platform or any right to receive respective Software documentation in any particular form or detail, but only as available from the Party granting the Access Rights.

  • Early Access Subtenant and Subtenant’s representatives shall have the right to enter the Subleased Premises from and after the date of mutual execution and delivery of this Sublease (the date upon which Subtenant first has such access to the Subleased Premises being referred to herein as the “Early Access Date”) for the sole purposes of installation of Subtenant’s personal property and equipment, furniture, fixtures and voice and data cabling, all subject to the terms, conditions and requirements of the Master Sublease; in no event will Subtenant perform work which requires the procurement of a construction permit prior to the Effective Date. All of the rights and obligations of the parties under this Sublease (other than Subtenant’s obligation to pay Base Rent and the cost of utilities under Section 3.3, but expressly including without limitation, Subtenant’s obligation to carry (and provide evidence of) insurance pursuant to the Master Sublease, and Subtenant’s indemnification obligations) shall commence upon the Early Access Date. Subtenant shall coordinate such entry with Sublandlord. Notwithstanding the foregoing to the contrary, if either (i) Landlord or Master Sublandlord require that Subtenant vacate the Subleased Premises or (ii) cease its installations until the Effective Date has occurred, Subtenant shall promptly comply with any such requirement. Additionally, if either party hereto terminates this Sublease pursuant to the provisions of Section 2.1 above, Subtenant shall promptly remove from the Subleased Premises any personal property, equipment, furniture, fixtures and/or voice or date cabling previously installed by Subtenant in the Subleased Premises and repair any portion of the Subleased Premises damaged or otherwise altered as a result of such installation, all at Subtenant’s sole cost and expense.

Time is Money Join Law Insider Premium to draft better contracts faster.