Internet Access Hotels and Airports Employees who travel may need to access their e-mail at night. Many hotels provide free high speed internet access and Tyler employees are encouraged to use such hotels whenever possible. If an employee’s hotel charges for internet access it is reimbursable up to $10.00 per day. Charges for internet access at airports are not reimbursable.
User Access Transfer Agent shall have a process to promptly disable access to Fund Data by any Transfer Agent personnel who no longer requires such access. Transfer Agent will also promptly remove access of Fund personnel upon receipt of notification from Fund.
Market Access 1. With respect to market access through the modes of supply identified in the "trade in services" definition of Article 104 (Definitions), each Party shall accord to services and service suppliers of the other Party treatment no less favourable than that provided for under the terms, limitations and conditions agreed and specified in its Schedule (7). 2. In sectors where market access commitments are undertaken, the measures which a Party shall not maintain or adopt either on the basis of a regional subdivision or on the basis of its entire territory, unless otherwise specified in its Schedule, are defined as: (a) limitations on the number of service suppliers whether in the form of numerical quotas, monopolies, exclusive service suppliers or the requirements of an economic needs test; (b) limitations on the total value of service transactions or assets in the form of numerical quotas or the requirement of an economic needs test; (c) limitations on the total number of service operations or on the total quantity of service output expressed in terms of designated numerical units in the form of quotas or the requirement of an economic needs test; (8) (d) limitations on the total number of natural persons that may be employed in a particular service sector or that a service supplier may employ and who are necessary for, and directly related to, the supply of a specific service in the form of numerical quotas or the requirement of an economic needs test; (e) measures which restrict or require specific types of legal entity or joint venture through which a service supplier may supply a service; or (f) limitations on the participation of foreign capital in terms of maximum percentage limit on foreign shareholding or the total value of individual or aggregate foreign investment.
Internet Use 7.1. Customer is prohibited from posting or transmitting unlawful material on or via the Internet or the World Wide Web. 7.2. Leaseweb is entitled to actively block ports or IP addresses for the Network, in the event that such is – in Leaseweb’s reasonable view – necessary to preserve or protect the security and performance of the Network or the Internet or the World Wide Web. An overview of the blocked ports or IP addresses may be requested in writing by Customer from Leaseweb. 7.3. Without prejudice to the generality of Clause 7.2 of the Acceptable Use Policy, Leaseweb shall in any event actively block the following ports for its Network: (i) UDP/137 – Netbios; (ii) UDP/139 – Netbios; (iii) TCP/135 till 139 – Netbios;(iv) TCP/445 – Smb; and (v) Protocol UDP port 11211 - Memcache 7.4. If Leaseweb reasonably suspects that Customer is subject to a DoS attack, DDoS attack, DRDoS attack or another attack and (in Leaseweb’s reasonable opinion) such attack negatively affects the Infrastructure, Leaseweb shall be entitled to immediately block access to Customer's Infrastructure. In the event that Customer is subject to repetitive attacks, and Customer does not successfully take measures to prevent that future attacks may negatively affect Leaseweb’s Infrastructure, then Leaseweb shall be entitled to immediately terminate theSales Contract by sending a written notice to Customer.
Network Access During its performance of this Contract, Contractor may be granted access to Purchaser’s computer and telecommunication networks (“Networks”). As a condition of Network use, Contractor shall: (a) use the Networks in compliance with all applicable laws, rules, and regulations; (b) use software, protocols, and procedures as directed by Purchaser to access and use the Networks; (c) only access Network locations made available to Contractor by Purchaser; (d) not interfere with or disrupt other users of the Networks;