PEG Access Designee Clause Samples

The PEG Access Designee clause designates a specific individual or entity responsible for managing and coordinating public, educational, and governmental (PEG) access channels on a cable system. This clause typically outlines the authority of the designee to schedule programming, oversee channel operations, and act as a liaison between the cable operator and the community or local government. By clearly identifying who holds these responsibilities, the clause ensures efficient management of PEG channels and helps prevent disputes or confusion over operational control.
PEG Access Designee. Any entity designated by the Issuing Authority for the purpose of owning and/or operating the equipment and facilities used in the production and/or broadcast of PEG Access Channel programming for the Issuing Authority, including but not limited to any Access Corporation.

Related to PEG Access Designee

  • Keys or Access Devices We’ll furnish keys and/or access devices on the Lease start date and only after: (1) all parties have signed the Lease and all other rental documents and (2) all applicable rents and security deposits have been paid in full.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage.

  • Access Control Supplier will maintain an appropriate access control policy that is designed to restrict access to Accenture Data and Supplier assets to authorized Personnel. Supplier will require that all accounts have complex passwords that contain letters, numbers, and special characters, be changed at least every 90 days, and have a minimum length of 8 characters.

  • Physical Access Control Unauthorized persons are prevented from gaining physical access to premises, buildings or rooms where data processing systems that process and/or use Personal Data are located.