Access
Most of the range on the English side is mapped as 'open country' and hence there is a general right to roam over it as prescribed in the Countryside and Rights of Way Act 2000. Traditional rights of access in Scotland, bolstered by the Land Reform (Scotland) Act 2004 provide for similar access for the public to the north of the border. In addition, a sparse network of public bridleways and footpaths stretches around the area, often providing useful means of access from the lower ground onto the open hills.
The northernmost leg of the Pennine Way runs from Byrness to Kirk Yetholm. It is the longest, and most exposed, on the whole of the national trail. The Way follows the high level Border Ridge (literally the England–Scotland boundary fence) for nearly 20 miles (30 km) after the ascent to the ridge from Byrness. The terrain is boggy and remote, and two mountain refuge huts are situated on the Way for those too tired or weather-beaten to continue.
Read more about this topic: Cheviot Hills
Famous quotes containing the word access:
“Power, in Cases world, meant corporate power. The zaibatsus, the multinationals ..., had ... attained a kind of immortality. You couldnt kill a zaibatsu by assassinating a dozen key executives; there were others waiting to step up the ladder; assume the vacated position, access the vast banks of corporate memory.”
—William Gibson (b. 1948)
“The professional celebrity, male and female, is the crowning result of the star system of a society that makes a fetish of competition. In America, this system is carried to the point where a man who can knock a small white ball into a series of holes in the ground with more efficiency than anyone else thereby gains social access to the President of the United States.”
—C. Wright Mills (19161962)
“The Hacker Ethic: Access to computersand anything which might teach you something about the way the world worksshould be unlimited and total.
Always yield to the Hands-On Imperative!
All information should be free.
Mistrust authoritypromote decentralization.
Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position.
You can create art and beauty on a computer.
Computers can change your life for the better.”
—Steven Levy, U.S. writer. Hackers, ch. 2, The Hacker Ethic, pp. 27-33, Anchor Press, Doubleday (1984)