Visual Access Sample Clauses

Visual Access. The Developer agrees not to substantially obstruct the opportunity of the general public to view the exterior architectural/archaeological features and exhibits of the ancient and historic context of the Property from publicly accessible areas such as public streets or public use easements.
AutoNDA by SimpleDocs
Visual Access. The Property Owner agrees not to substantially obstruct the opportunity of the general public to view the exterior architectural, historical and archaeological features of the Site from adjacent publicly accessible areas such as public streets and sidewalks. If the Site is not visible from a public area, then the Property Owner agrees that the general public shall be given the opportunity on a periodic basis to view the characteristics and features of the Site which are preserved by this Easement to the extent consistent with the nature and conditions of the Property.
Visual Access. The Developer agrees not to substantially obstruct the opportunity of the general public to view the exterior/archeological features and exhibits of the ancient and historic context of the Hayden House Property from publicly accessible areas such as public streets or public use easements.
Visual Access. The Property Owner agrees not to substantially obstruct the opportunity of the general public to view the exterior architectural and archaeological features of the Property from adjacent publicly accessible areas such as public streets and sidewalks. The Property Owner shall obtain advance approval from the City Preservation Division for any proposed changes to the Property that would obstruct or modify the general public view of the exterior architectural or archeological features of the Property from adjacent publicly accessible areas. If the Structures are not visible from a public area, then the Property Owner agrees that the general public shall be given the opportunity on a periodic basis to view the characteristics and features of the Facades that are preserved by this Easement to the extent consistent with the nature and conditions of the Property.

Related to Visual Access

  • ICANN Access Registry Operator shall provide bulk access to the zone files for the TLD to ICANN or its designee on a continuous basis in the manner ICANN may reasonably specify from time to time. Access will be provided at least daily. Zone files will include SRS data committed as close as possible to 00:00:00 UTC.

  • EU Access SAP will use only European Subprocessors to provide support requiring access to Personal Data in the Cloud Service and SAP shall not export Personal Data outside of the EEA or Switzerland unless expressly authorized by Customer in writing (e-mail permitted) on a case by case basis; or as excluded under Section 9.4.

  • Physical Access PROVIDER agrees to allow the Office of Early Learning and COALITION staff or sub-contractors immediate access to the facilities and spaces used to offer the VPK Program during normal business hours.

  • Data Access Access to Contract and State Data The Contractor shall provide to the Client Agency access to any data, as defined in Conn. Gen Stat. Sec. 4e-1, concerning the Contract and the Client Agency that are in the possession or control of the Contractor upon demand and shall provide the data to the Client Agency in a format prescribed by the Client Agency and the State Auditors of Public Accounts at no additional cost.

  • Cash Access You may not use the Gift Card to obtain cash from an Automated Teller Machine (“ATM”), Point-of-Sale (“POS”) device, or by any other means. You may not use the Gift Card at an ATM. Loading The Gift Card The Gift Card is not reloadable after being loaded at the time of purchase. Personal checks, cashier’s checks, and money orders sent to the Issuer are not an acceptable form of loading. Any checks and money orders sent to the Issuer for loading will be returned unless the full amount may be applied towards a negative balance, in which case the check or money order may or may not be loaded at the discretion of the Issuer. The maximum dollar value of the Gift Card is printed on the front side of the Gift Card packaging. These are the limits associated with loading the Gift Card: Transaction Type Frequency and/or Dollar Limits Initial Load One time $20.00 up to $500.00 For Gift Card balance information, please call 0-000-000-0000 or visit XxxxxxxXxxx.xxx.

  • System Access CUSTOMER agrees to provide to PROVIDER, at CUSTOMER’S expense, necessary access to the mainframe computer and related information technology systems (the “System”) on which CUSTOMER data is processed during the times (the “Service Hours”) specified in the PSAs, subject to reasonable downtime for utility outages, maintenance, performance difficulties and the like. In the event of a change in the Service Hours, CUSTOMER will provide PROVIDER with at least fifteen (15) calendar days written notice of such change.

  • User Access Transfer Agent shall have a process to promptly disable access to Fund Data by any Transfer Agent personnel who no longer requires such access. Transfer Agent will also promptly remove access of Fund personnel upon receipt of notification from Fund.

  • Physical Access Control Unauthorized persons are prevented from gaining physical access to premises, buildings or rooms where data processing systems that process and/or use Personal Data are located.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage. Measures: • As part of the SAP Security Policy, Personal Data requires at least the same protection level as “confidential” information according to the SAP Information Classification standard. • Access to Personal Data is granted on a need-to-know basis. Personnel have access to the information that they require in order to fulfill their duty. SAP uses authorization concepts that document grant processes and assigned roles per account (user ID). All Customer Data is protected in accordance with the SAP Security Policy. • All production servers are operated in the Data Centers or in secure server rooms. Security measures that protect applications processing Personal Data are regularly checked. To this end, SAP conducts internal and external security checks and penetration tests on its IT systems. • SAP does not allow the installation of software that has not been approved by SAP. • An SAP security standard governs how data and data carriers are deleted or destroyed once they are no longer required.

  • Site Access Dell requires the right to access the APEX System in a timely way and as provided in the Service Offering Description to provide the Support Services. Failure to ensure that Customer provides Dell with timely access to a Site will relieve Dell of the Support Services obligations and Dell may also, at Dell’s discretion, suspend the APEX Service.

Time is Money Join Law Insider Premium to draft better contracts faster.